Network Security MCQ Questions
This section focuses on "Network Security" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. Network security consists of:
A. Protection
B. Detection
C. Reaction
D. All of the above
View Answer
Ans : D
Explanation: Network security consists of: Protection, Detection and Reaction.
2. Which of the following we should configure your systems and networks as correctly as possible?
A. Protection
B. Detection
C. Reaction
D. None of the above
View Answer
Ans : A
Explanation: Protection: You should configure your systems and networks as correctly as possible
3. Interaction between the client and server starts via the ______ message.
A. client_hi
B. client_hello
C. server_hello
D. server_hi
View Answer
Ans : B
Explanation: Interaction between the client and server starts via the client_hello message.
4. What is true about Email security in Network security methods?
A. Phishing is one of the most common ways attackers gain access to a network.
B. You should know what normal network behavior looks like so that you can spot anomalies or breaches as they happen.
C. You need to employ hardware, software, and security processes to lock those apps down.
D. All of the above
View Answer
Ans : A
Explanation: Email security: Phishing is one of the most common ways attackers gain access to a network. Email security tools can block both incoming attacks and outbound messages with sensitive data.
5. What is true about VPN in Network security methods?
A. A tool that authenticates the communication between a device and a secure network
B. VPN creating a secure, encrypted "tunnel" across the open internet.
C. VPN typically based on IPsec or SSL
D. All of the above
View Answer
Ans : D
Explanation: VPN: A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet.
6. The text that gets transformed using algorithm cipher is called?
A. Complex text
B. Transformed text
C. Plain text
D. Scalar text
View Answer
Ans : C
Explanation: The text that gets transformed is called plain text. The algorithm used is called cipher.
7. Security features that control that can access resources in the OS.
A. Authentication
B. Identification
C. Validation
D. Access control
View Answer
Ans : D
Explanation: Access control refers to the security features. Applications call access control to provide resources.
8. CHAP stands for?
A. Challenge Handshake authentication protocol
B. Challenge Hardware authentication protocol
C. Circuit Hardware authentication protocol
D. Circuit Handshake authentication protocol
View Answer
Ans : A
Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.
9. Which of the following process is used for verifying the identity of a user?
A. Authentication
B. Identification
C. Validation
D. Verification
View Answer
Ans : A
Explanation: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.
10. Which of these is a part of network identification?
A. UserID
B. Password
C. OTP
D. Fingerprint
View Answer
Ans : A
Explanation: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.
Discussion