This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Network Security and Encryption”.
1. WTLS stands for?
a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer
View Answer
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile device and the WAP gateway to internet.
2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol designed to make the security of wireless LAN as good as that of wired LAN.
3. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer
Explanation: The person is called hacker. A person who enjoys learning the details of computer systems and how to stretch their capabilities is called hacker.
4. A program created by Farmer and Venema for auditing capability.
a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by farmer and venema.
5. A small program that changes the way a computer operates.
a) Worm
b) Trojan
c) Bomb
d) Virus
View Answer
Explanation: The program is called virus. It alters the way that the computer operates. It often does damages like deleting and corrupting files and data.
6. A program that copies itself.
a) Worm
b) Virus
c) Trojan
d) Bomb
View Answer
Explanation: A worm copies itself from one system to another over a network without the assistance of human.
7. An attack in which the site is not capable of answering valid request.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Explanation: The answer is Denial of service. In case of denial of service attacks, a computer site is bombarded with a lot of messages.
8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used as a deterrent.
9. An indirect form of surveillance.
a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer
Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching for unscrupulous acts.
10. A malicious code hidden inside a seemingly harmless piece of code.
a) Worm
b) Bomb
c) Trojan Horse
d) Virus
View Answer
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that appears harmless.
11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears to be something else or from someone else.
13. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast addressing operations.
14. An attack in which the user receives unwanted amount of e-mails.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Explanation: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted e-mail to someone.
Sanfoundry Global Education & Learning Series – Computer Fundamentals.
To practice all areas of Computer Fundamentals, here is complete set of 1000+ Multiple Choice Questions and Answers.
If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]
- Check Computer Fundamental Books
- Practice Information Technology MCQs
- Check BCA Books
- Practice BCA MCQs
- Apply for BCA Internship