Computer Fundamentals Questions and Answers – Network Security

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Network Security”.

1. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
View Answer

Answer: c
Explanation: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and communications among business and government agencies etc.

2. Network Security provides authentication and access control for resources.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. AFS is an example. It helps us protect vital information.

3. Which is not an objective of network security?
a) Identification
b) Authentication
c) Access control
d) Lock
View Answer

Answer: d
Explanation: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.
advertisement
advertisement

4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
View Answer

Answer: a
Explanation: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.

5. The process of verifying the identity of a user.
a) Authentication
b) Identification
c) Validation
d) Verification
View Answer

Answer: a
Explanation: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. A concern of authentication that deals with user rights.
a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification
View Answer

Answer: c
Explanation: Functional authorization is concerned with individual user rights. Authorization is the function of specifying access rights to resources related to information security.

7. CHAP stands for?
a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol
View Answer

Answer: a
Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.
advertisement

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer

Answer: d
Explanation: Access control refers to the security features. Applications call access control to provide resources.

9. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module
View Answer

Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for performing encryption or decryption
advertisement

10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
View Answer

Answer: a
Explanation: The text that gets transformed is called plain text. The algorithm used is called cipher.

Sanfoundry Global Education & Learning Series – Computer Fundamentals.

To practice all areas of Computer Fundamentals, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.