Computer Fundamentals Multiple choice Questions and Answers on Network Security and Encryption for Freshers

1. The process of transforming plain text into unreadable text.

a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
Answer: b

Explanation: Encryption is the process of transforming readable text i.e. plain text to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
2. An algorithm used in encryption is referred to as cipher.

a) True
b) False
Answer: a

Explanation: The statement is true. Cipher is the algorithm used in encryption. Encryption is making readable text as unreadable to keep it secured.
3. A process of making the encrypted text readable again.

a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
Answer: a

Explanation: The reverse process is called decryption. It is the process of making the information readable again.
4. WTLS stands for?

a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer
Answer: a

Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile device and the WAP gateway to internet.
5. The protocol designed to make the security of wireless LAN as good as that of wired LAN.

a) WTLS
b) WEP
c) RSN
d) WP
Answer: b

Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol designed to make the security of wireless LAN as good as that of wired LAN.
6. A person who enjoys learning details about computers and how to enhance their capabilities.

a) Cracker
b) Hacker
c) App controller
d) Site controller
Answer: b

Explanation: The person is called hacker. A person who enjoys learning the details of computer systems and how to stretch their capabilities is called hacker.
7. A program created by Farmer and Venema for auditing capability.

a) SAAS
b) SATAN
c) SAN
d) SAT
Answer: b

Explanation: SATAN is the Security analysis tool for auditing networks. It is created by farmer and venema.
8. A small program that changes the way a computer operates.

a) Worm
b) Trojan
c) Bomb
d) Virus
Answer: d

Explanation: The program is called virus. It alters the way that the computer operates. It often does damages like deleting and corrupting files and data.
9. A program that copies itself.

a) Worm
b) Virus
c) Trojan
d) Bomb
Answer: a

Explanation: A worm copies itself from one system to another over a network without the assistance of human.
10. An attack in which the site is not capable of answering valid request.

a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
Answer: b

Explanation: The answer is Denial of service. In case of denial of service attacks, a computer site is bombarded with a lot of messages.

Related

Multiple Choice Questions 4934825990600897714

Post a Comment

emo-but-icon

item