Computer and Network Security

Computer and Network Security Quiz
Test your knowledge on Computer and Network Security with this comprehensive quiz featuring 240 insightful questions. This quiz covers fundamental concepts, network types, protocols, and the benefits of networking.
Join us to enhance your understanding and evaluate your skills with topics such as:
- Network Topologies
- Client-Server Models
- Different Types of Networks (LAN, WAN, PAN)
- Communication Protocols
1-Network is a collection of independent computers interconnected together in order to share resources (such as printers, scanners).
A) True
B) False
2- Network is a collection of............ Computers interconnected together in order to share resources (such as printers, scanners).
A) Independent
B) Dependent
C) Clustering
D) Evaluation
3- Network Benefits consist of:
A) Resource sharing
B) Computation speedup
C) Load sharing
D) All of the above
4- communication is one of Network Topologies.
a) True
b) False
5- ............make programs, data, and equipments available to anyone on the network.
a) Resource sharing
B) Computation speedup
C) load sharing
D) communication
6-......... Move jobs from highly loaded to lightly loaded computers
a) Resource sharing
B) Computation speedup
C) load sharing
D) communication
7- Communication distribute computations among various network computers.
a) True
b) False
8- Hardware: like printers, scanners, hard disks & Software: like database files, programs comes under..... Network Benefits.
a) Resource sharing
B) Computation speedup
C) load sharing
D) communication
9- Video conference& E-mail&Chatting are from ...... Network Benefits.
a) Resource sharing
B) Computation speedup
C) load sharing
D) communication
10- ........the way in which various network computers are connected.
A) Network Benefits
B) Computation
C) Network Topologies
D) communication
11- Network Topologies consist of:
A) Star
B) Bus
C) Ring
D) All of the above
12-...... All nodes are connected to a single wire (the bus) that has two endpoints.
A) Star
B) Bus
C) Ring
D) All of the above
13- ......all computers are connected to a central point.
A) Star
B) Bus
C) Ring
D) All of the above
14- ......all nodes connected to a closed loop.
A) Star
B) Bus
C) Ring
D) All of the above
15-.........is piece of information that is exchanged between computers on a network.
a) Segment
B) Packet
C) Frame
D) All of the above
16-Header is one of main packet parts.
a) True
b) False
17- Each packet consists of three main parts which one is incorrect.
A) Data
B) Header
C) Footer
D) None of the above
18- When a packets reaches a switching element (Router), the router determines the most suitable path is step for Computer X wishes to send a file to Computer Y.
A) True
b) False
19- We classify Network Types according to:
A) Scale
B) Network Structure
C) Connectivity
D) All of the above
20- ..... Network for one person which connecting a computer to its mouse, keyboard, printer (Bluetooth network).
A) LAN
B) WAN
C) PAN
D) MAN
21- .....covers a small geographical area& high quality cables are needed.
A) LAN
B) WAN
C) PAN
D) MAN
22-...... Consists of a number of LANs interconnected by a a telephone company.
A) LAN
B) WAN
C) PAN
D) MAN
23- PAN has lower speed, higher error rate than LANs , because low quality cables are used such as telephone lines.
A) True
B) False
24- WAN Covers a larger geographical area than the LAN (such as a city).
A) True
B) False
25- WAN consists of Enterprise Network & Public Network.
A) True
B) False
26- According to Scale ,it consist of:
a) LAN
B) WAN
C) PAN
C) PAN
E) All of the above
27- In Client-Server model some things happened:
a) Resources are stored at the server
B) Users use simple machines
C) Clients and servers are connected through a network
D) Clients can request any servers resources and the role of the server is to reply clients requests
E) All of the above
28- Printer server: Allows different clients to send multiple print jobs to the same physical printer.
A) True
B) False
29-.......uses one of these protocols :SMPT & POP.
A) Mail server
B) Web server
C) Database server
D) Proxy server
30- Proxy server stores Databases files used by network clients.
A) True
B) False
31-........ Stores web pages & Uses HTTP.
a) Mail server
B) Web server
C) Database server
D) Proxy server
32- Printer server exists between the network hosts and other hosts outside the network to protect the network from the external attacks (acts as a firewall).
A) True
b) False
33- All computers are identical and no dedicated servers in....
A) Peer to Peer networks
B) Server based network
C) Database server
D) Proxy server
34- Server based network use powerful computers as Servers, while the others are clients and has dedicated servers.
A) True
B) False
35- Peer to Peer networks is Centralized.
A) True
B) False
36- Server Based network is More secured than Peer to Peer networks.
A) True
B) False
37- Peer to Peer networks has small size & Less expensive & Easily controlled.
A) True
B) False
38- Peer to Peer networks & Server Based network are considered of .....
A) Scale
B) Network Structure
C) Connectivity
D) All of the above
39- According to connectivity, there are two main types:
A) Wired Networks
B) Wireless Networks
C) Connectivity
D) a&b
40- .....the connection that connect computers consists of physical wires.
A) Wired Networks
B) Wireless Networks
C) Bluetooth Network
D) a&b
41- .....no wiring between the network components, connection is established using radio signals.
A) Wired Networks
B) Wireless Networks
C) Connectivity
D) a&b
42- Different types of Wireless Networks are......
a) Bluetooth Network
B) Wireless LAN
C) Wireless WAN
D) All of the above
43- .....connected through a radio signals and has two types of wireless With a base station (Access Point)& Without base station (Ad Hoc) network.
A) Bluetooth Network
B) Wireless LAN
C) Wireless WAN
D) All of the above
44-....... Covers a large geographical area it is usually divided into several service areas inwhich each service area is managed through an access point.
A) Bluetooth Network
B) Wireless LAN
C) Wireless WAN
D) All of the above
45-....... Has a range of about 10 meters and used to connect the computer components to each others (CPU to keyboard, mouse, printer,..).
A) Bluetooth Network
B) Wireless LAN
C) Wireless WAN
D) All of the above
46-Routing packets between network computers is done using IP address (each computer has a unique IP) is ..?
A) subnet mask
B) IP Address
C) a&b
D) ip classes
47- IP address consists of 32 bits divided into ….. groups (each group …. bit) and separated by dots.
A) four, 8
B) 8, four
C) four, 9
D) 9, four
48- The IP address must indicate……..,…..….?
A) network address, ip address
B) ip address, subnetmask
C) network address, host address
D) address, network
49-Use the subnet mask to indicate the host and network address so that: – Ones: define the….. , Zeros: define the…..?
A) network address , ip address
B) ip address , subnetmask
C) network address, host address
D) address, network
50- if we have subnetmask = 11111111 .11111111.0.0 , so the decimal doƩes are …?
A) 255.255.0.0
B) 255.255.255.255
C) 0.0.255.255
D) 0.0.0.0
51- if we have ip address = 10000001 , so decimal doƩed is ?
A) 199
B) 129
C) 299
D) 229
52- Class A have a range from….to… ?
A) 1-128
B) 1-120
C) 1-127
D) 1-126
53- Class C have a range from….to… ?
A) 128 - 191
B) 1-120
C) 192 – 223
D) 1-126
54- Subnet Mask for class B is …?
A)255.255.255.0
B) 255.255.0.0
C) 255.0.0.0
D) 255.255.255.255
55- Network address for class C is …?
A) 16 bit
B) 24 bit
C) 8 bit
D) 32 bit
56-Broadcast address …… Enable a computer to send to all computers within the network?
A) 255.255.255.0
B) 255.255.0.0
C) 255.0.0.0
D) 255.255.255.255
57- Loopback address…. Enable a computer to send to itself?
A) 255.255.255.0
B) 255.255.0.0
C) 127.0.0.1
D) 255.255.255.255
58- Advantages of Layered communication model
A) Reduce complexity
B) Simplify modifications (any modification in one layer will not affect the others)
C) All of the above
D) None of the above
59- There are two model of layers…?
A-) OSI reference model.
B-) TCP/IP reference model.
c-) a&b
d-) none
60- what is osi model is :
A) A standard model developed by the ISO (International Standards Organization).
B) Describes the flow of data on a computer network. From the physical connections up to the end user application.
C) Provide addressing and routing information, error checking, and retransmission requests.
D) a and b
61- The OSI model consists of :
A) seven layers
B)four layers
C) five layers
D) None of them
62-The OSI model consists of :
A) Physical
B) Data Link
C) Network
D) All of the above
63-The OSI model consists of :
A) Transport
B) Session
C) Presentation
D) Application
E) all of the above
64-Purpose of OSI:
A) represents a standard for network design for H/W manufactures and software developers so that components from different vendors can operate together
B) A standard model developed by the ISO (International Standards Organization).
C) Describes the flow of data on a computer network. From the physical connections up to the end user application.
D) None of them
65- Allows users programs to use the network services:
A) Transport
B) Session
C) Presentation
D) Application
66- Example programs:
A) E-mail
B) Browser
C) All of the above
D) None of the above
67-Example protocols:
A) FTP
B) SMTP
C) HTTP
D) All of the above
68- how data is represented At Receiving computer
A) Data Formatting.
B) Compression.
C) Encryption.
D) All of the above
69- how data is represented At Receiving computer
A) Data Translation
B) decompression
C) Decryption.
D) All of the above
70- Establishes, manages, and terminates sessions between applications
A) Application
B) Presentation
C) Session
D) All of the above
71- session is :
A) Inter- host communication
B) Establishes, manages, and terminates sessions between applications
C) an exchange of messages between computers.
D) all of the above
72- At Sending computer
A) Divide message into packets.
B) Assign each packet a tracking number.
C) Insures that packets are delivered error free, in sequence, and without duplicates.
d) All of the above
73- tcp and udp are
A) protocols
B) applications
C) transports
D) none of the above
74-Connection oriented
A) Tcp
B) Udp
C) Ip
D) ipx
75- Connection less:
A) Tcp
B) Udp
C) Ip
D) Ipx
76- Internet Protocol
A) Tcp
B) Udp
C) Ip
D) Ipx
77- internetwork Protocol exchange
A) Udp
B) Ip
C) Ipx
D) Tcp
78- Responsible of packe addressing and routing.
A) Session
B) Transport
C) Network
D) None of them
79- is to determine the best route between source and destination according to network conditions
A) Routing
B) Session
C) Transport
D) Network
80-In which layer would data converted into frames in OSI model ?
A)Application Layer
B)session Layer
C)Data Link Layer
D)Network Layer
81- In which layer Provides a physical link for bit transmission in electrical or optical form ?
A)Network Layer
B)session Layer
C)Presentation Layer
D)Physical Layer
82- Main Protocol Types of protocols used in computer networks ?
A) One
B) Four
C) Three
D) Five
83- Popular network protocols include:
A) IP(Internet Protocol)
B) IPX(Internetwork Packet Exchange)
C) TCP(Transmission Control Protocol)
D) a&b
84-Provide addressing and routing information,error checking, and retransmission requests.
A) network protocols
B) Transport Protocols
C) Application Protocols
D) None of the above
85- Transport protocols include:
A) TCP(Transmission Control Protocol)
B) UDP(User Datagram Protocol)
C) IP(Internet Protocol)
D) a&b
86- May be connectionless or connection-oriented
A) Transport protocols
B) Application Protocols
C) Network Protocols
D) All of the above
87- Some common application protocols are:
A) SMTP (Simple Mail Transport Protocol
B) FTP(File Transfer Protocol )
C) a&b
D) UDP(User Datagram Protocol)
88- is a standard model used for communication in Internet and It consists of four layers.
A) TCP/IP (Transmission Control Protocol/Internet Protocol)
B) OSI
C) TCP
D) None of the above
89- In which layer in TCP/IP uses the IP (Internet Protocol).?
A) Transport Layer
B) Internet Layer
C) Network Interface Layer
D) Application Layer
90- Connecting devices may be in physical layer and copies and amplify bits from one network to another
A) Bridge
B) Router
C) Repeater
D) Switch
91- Connecting devices may be in data link layer and copies frames from one network to another
A) Repeater
B) Bridge
C) Router
D) Hub
92- Connecting devices may be in network layer and makes decisions about what route a packet should take.
A) Bridge
B) Repeater
C) Modems
D) Router
93- Multi-threading is to run multiple processes (tasks).
A) True
B) False
94 -Each thread executes its code independently of the other Threads in the program.
A) True
B) False
95 -Multi-threading is to divide the task into a number of independent sub-tasks and run them concurrently.
A) True
B) False
96 –A port is defined to solve the problem of communicating With multiple applications simultaneously; it basically Expands the notion of an IP address.
A) True
B) False
97- If you use this infinite loop, you will not able to perform any other task.
A) True
B) False
98- The last step in UDP programming is to send and receive data
A) True
B) False
99- GetBytes is the function which is responsible for turning data into array of bytes
A) True
B) False
100- To send and receive it is important to determine the port number only
A) True
B) False
101- Is to run multiple processes (tasks)…………..
A) Multi-threading
B) Multi-programming
C) System Threading
d) Port
102 – A………. Is defined to solve the problem of communicating with multiple applications simultaneously; it basically expands the notion of an IP address.
A) Multi-threading
B) Multi-programming
C) System Threading
d) Port
103 - Since you do not know when to receive a message, you must continuously listen to the port…………
A) use infinite loop
B) array of bytes
C) UdpClient
D) sendBytes
104 - UDP programming starts with:
A) Creating an object from UDP-client class.
B) Creating the end point.
c)Sending and receiving data.
d) Creating the socket by the programmer.
105 - Creating the end point and UDP client object requires ----
A) PC’s Ip address
B) Port number
C) Both a & b
D) Mac address
106- In order to send messages , you must prepare the message in form of ---- of bytes:
A) List
B) Array
C) Both list and array
D) None of the above
107 -UDP.send( Data , Data_length , End_point of remote computer )-Data represents :
A) Array that holds data
B) Array’s length
C) End point of the destination
D) None
108 -UDP.send( Data , Data_length , End_point of remote computer )End_point of remote computer represents:
A) Array that holds data
B) Array’s length
C) End point of the destination
D) None
109 -UDP.send( Data , Data_length , End_point of remote computer )Data_length represents:
A) Array that holds data
B) Array’s length
C) End point of the destination
D) None
110 -The code needed to transmit “hello world” from your local machine at port = 4000 To remote machine with IP 148.182.27.12 at port 3000 The command to define your local IP :
A) Dim local_ip As IP Address = IP Address.Prase(“127.0.0.1”)
B) Dim local_End_Point As New IPEndPoint (local_ip , 4000)
C) Dim local_ip As IP Address = IP Address.Prase(“148.182.27.12”)
D) Dim local_End_Point As New IPEndPoint (ip_Address, 3000)
111-What are the three primary objectives of computer security?
A) Accountability, Authenticity, Privacy
B) Confidentiality, Integrity, and Availability
C) Encryption, Access Controls, and Data Classification
D) Redundancy, Disaster Recovery, and Backup Systems
112-What does confidentiality refer to in computer security?
A) The protection of data from unauthorized modification or destruction
B) The protection of sensitive data from unauthorized access
C) The ability to trace the actions of individuals and systems
D) The ability to ensure that data, systems, and individuals are genuine
113-What does integrity refer to in computer security?
A) The protection of data from unauthorized modification or destruction
B) The protection of sensitive data from unauthorized access
C) The ability to trace the actions of individuals and systems
D) The ability to ensure that data, systems, and individuals are genuine
114-What does availability refer to in computer security?
A) The protection of data from unauthorized modification or destruction
B) The protection of sensitive data from unauthorized access
C) The ability to trace the actions of individuals and systems
D) The protection of data and systems from disruptions that may cause downtime or prevent access to critical data
115-What are the other security objectives in addition to CIA?
A) Confidentiality, Integrity, and Availability
B) Accountability, Authenticity, Non-repudiation, and Privacy
C) Access Controls, Encryption, and Data Classification
D) Redundancy, Disaster Recovery, and Backup Systems
116-What is the definition of access control?
A) Ensuring the continuous availability of services
B) Controlling entry and use of resources
C) Protecting user information
D) None of the above
117-Which of the following is not a way to strengthen a password?
A) Use different types of characters (uppercase, lowercase, symbols)
B) Avoid using personal information (name, surname)
C) Keep the password short
D) Change the password periodically
118-What is the purpose of a password?
A) To confirm that a user is allowed to access a system or application
B) To ensure the continuous availability of services
C) To protect user information
D) None of the above
119-Which method of cracking a password involves using a dictionary?
A) Brute force attack
B) Hybrid attack
C) Dictionary attack
D) None of the above
120-How can you keep your password secure?
A) Share it with others
B) Write it down and keep it in plain sight
C) Use a unique password
D) All of the above are correct answers.
121-Computer security means protecting computer hardware only.
A) True
B) False
122- Encryption and passwords are used to protect important data.
A) True
B) False
123- The objective of computer security is to ensure the safety of computer resources.
A) True
B) False
124-Authentication means checking the validity of data.
A) True
B) False
125-One objective of computer security is to prevent unauthorized use of system resources.
A) True
B) False
126- " Access Control " is the same as "Ensuring Availability" and "Privacy".
A) True
B) False
127- "Access Control" involves controlling entry and use of resources.
A) True
B) False
128- It is necessary to ensure that services are continuously available to protect the system.
A) True
B) False
129- Privacy ensure that users control any information collected about them
A) True
B) False
130- A password is a code or symbol that proves you are an authorized user.
A) True
B) False
131-A password need to meet certain conditions to make it strong
A) True
B) False
132- You should change your password regularly to keep it safe
A) True
B) False
133- Cracking a password can be done easily with enough time
A) True
B) False
134- The Dictionary Attack is one of the three methods used to crack a password.
A) True
B) False
135- It is safe to share your password with others.
A) True
B) False
136. Computer viruses can cause damage to computer systems if left unchecked.
A) True
B) False
137. Viruses can infect other programs by modifying them.
A) True
B) False
138. The symptoms of virus infection include random use of the hard disk and a decrease in system memory.
A) True
B) False
139. Worms are programs that can spread by themselves without the help of their creator.
A) True
B) False
140. What are the different types of infections that can attack your computer and destroy your files?
A) Malware and Spyware
B) Viruses, Spyware, Adware, Worms, and Trojans
C) Ransomware and Phishing attacks
D) Trojans, Worms, and Adware
E) Spyware and Ransomware
141. Which of the following is true about computer viruses?
A) They are harmless and cannot cause any damage to a computer.
B) They are programs that execute only good and wanted actions on a computer.
C) They can infect other programs by modifying them.
D) They cannot be removed once they infect a computer.
E) They are created to improve the performance of a computer.
142. What is the definition of a computer virus?
A) A type of malware that attacks computer systems.
B) A program that executes only good and wanted actions on a computer.
C) A type of adware that displays unwanted ads on a computer.
D) A program or executable code that can do bad or unwanted things.
E) A type of spyware that tracks a user's online activity.
143. What is a common way for a virus to infect other programs?
A) By downloading files from the internet
B) By copying itself into other programs
C) By sending spam emails to users
D) By physically entering a computer through a USB drive
E) By encrypting files on a computer and demanding a ransom payment
144. Which of the following is not a type of infection that can attack a computer?
A) Viruses
B) Spyware
C) Phishing attacks
D) Ransomware
E) Firewall
145. What can viruses do if left unchecked?
A) Slow down your computer
B) Invade your email program
C) Damage or delete files
D) All of the above
146. Why do viruses slow down your computer?
A) Because they take up computer resources like memory and processing power
B) Because they change the behavior of other programs
C) Because they add malicious code to other programs
D) Because they delete critical system files
147. What kind of files can viruses damage or delete?
A) Only files critical to your operating system
B) Only files belonging to someone else
C) Only files containing non-critical data
D) Files critical to your operating system and files belonging to you which may contain critical data
148. What problems can viruses cause in your email program?
A) Filling up your inbox with useless messages
B) Using your contacts to spread themselves
C) Both A and B
D) None of the above
149. What can viruses do to halt the computer?
A) Slow it down
B) Close it suddenly
C) Restart it automatically
D) None of the above
150. What is the purpose of a denial-of-service attack?
A) To steal data
B) To overload the computational resources of the victim system.
C) To spread malware.
D) To hack into the network;
151. What is the effect of viruses on network systems?
A) Slows down the network speed
B) Prevents access to specific websites
C) Causes denial-of-service attacks
D) Causes loss of data
152. What is the common way that viruses cause denial-of-service attacks on individual computers?
A) Overloading the network bandwidth
B) Overloading the computational resources
C) Stealing personal data
D) None of the above
153. What can happen to programs in a computer affected by a virus causing denial-of-service attacks?
A) They stop running completely
B) They continue running at the same speed
C) They run very slowly
D) None of the above
154. What is the trigger that activates viruses?
A) Opening an email attachment
B) Running a program
C) A special time or action
D) A power outage
155. How do viruses spread?
A) By using the internet only
B) By copying themselves into files and other locations on a computer
C) By infecting other systems only in the local network
D) By using social media platforms
156. What is the destruction stage of viruses?
A) The stage where the virus waits for a trigger
B) The stage where the virus arrives
C) The stage where the virus spreads
D) The stage where the virus performs its programmed action
157. What is the reason viruses are considered bad programs?
A) They always cause physical damage to the computer
B) They spread quickly through social media platforms
C) They copy themselves into files without permission
D) They only affect outdated software
158. What is the initial step of a virus?
A) The destruction stage
B) The trigger stage
C) The spread stage
D) The arrival stage
159. What information does an attacker need to send a virus to your device?
A) Your name and email address
B) Your social security number
C) Your IP address and open port number
D) Your home address and phone number
160. What is the most common type of virus?
A) Executable Viruses
B) Boot Sector Viruses
C) E-mail Viruses
D) None of the above
161. Which type of virus is responsible for infecting the boot sector on floppy disks or hard disks?
A) Executable Viruses
B) Boot Sector Viruses
C) E-mail Viruses
D) None of the above
162. How do worms spread?
A) They become part of another program.
B) They slow down network connections.
C) They use networks to propagate themselves.
d) They infect specific types of files.
163. What does an executable virus do?
A) Looks around to see if it can find any other programs on the disk
B) Infects the boot sector on floppy disks or hard disks
C) Loads itself into memory and runs when the program gets executed
D) None of the above
164. Which of the following is not a symptom of virus infection?
A) Error messages without any real reasons
B) Loss of important files
C) Keyboard malfunction
D) None of the above
165. How does a Macro virus replicate itself?
A) By automatically mailing itself to people in the victim's e-mail address book
B) By hiding in a Word document and attaching it to an e-mail message
C) By infecting the victim's computer and spreading through the network
166. Which type of virus is more likely to be written in Word language?
A) E-mail viruses
B) Macro viruses
C) Both of them
167. What do users do when they receive an e-mail message with a suspicious attachment?
A) They delete the e-mail message
B) They open the attachment and become infected with the virus
C) They forward the e-mail message to their contacts
168. What is the main reason why Macro viruses are a threat?
A) They spread through e-mail messages
B) They infect the victim's computer and steal personal data
C) They can be written by simple applications like Word
169. How can users protect their computers from virus infections through e-mail messages?
A) By forwarding suspicious e-mail messages to their contacts
B) By opening all attachments to make sure they are safe
C) By using antivirus software to scan attachments before opening them
170. What is Simon Vallor known for?
A) Writing three computer viruses
B) Designing a website
C) Creating a programming language
D) Starting a tech company
171. What is a virus?
A) A program that replicates itself to cause damage to your computer
B) A tool for optimizing computer performance
C) A type of computer hardware
D) A way to protect your computer from cyber attacks
172. What can a virus do?
A) Display a message
B) Erase hard drive
C) Burn out CPU
D) All of the above
173. What is the difference between a virus and a worm?
A) A virus attaches itself to another program, while a worm does not
B) A virus spreads through email, while a worm spreads through networks
C) A virus replicates itself, while a worm does not
D) A virus causes damage to your computer, while a worm steals your personal information.
174. Which of the following is NOT a similarity between worms and viruses?
A) They are both harmful programs.
B) They try to spread between computers.
C) They both use networks to spread.
D) They slow down network connections.
175. What is the main difference between worms and viruses?
A) Worms can spread by themselves, while viruses need to be attached to another program.
B) Worms delete or modify files, while viruses do not.
C) Worms have a larger impact on the computer system than viruses.
D) Worms and viruses are essentially the same.
176. What is the main effect of worms on a computer system?
A) They delete or modify files.
B) They slow down network connections.
C) They infect specific types of files.
D) They use the computer's resources and memory, causing significant slowing.
177. What is a Trojan Horse?
A) A computer program that replicates on its own
B) A program that claims to be useful but instead does damage
C) A type of computer virus that spreads rapidly
D) A tool used for removing viruses from your computer
178. How can a computer catch a virus?
A) Through network systems
B) By using a USB drive
C) Via email
D) All of the above
179. Which of the following file extensions should you avoid opening if sent via email?
A) .jpg
B) .doc
C) .exe
D) .pdf
180. What is a firewall?
A) A type of virus that damages your computer
B) A tool used for removing malware from your computer
C) A program that protects your computer from unauthorized access
D) A type of antivirus software
181. What is the main effect of worms on a computer system?
A) They delete or modify files.
B) They slow down network connections.
C) They infect specific types of files.
D) They use the computer's resources and memory, causing significant slowing.
182. How do antivirus software detect viruses?
A) By comparing files against a list of virus signature definitions.
B) By blocking all incoming traffic.
C) By encrypting all files on the computer.
183. What is Spyware?
A) Software that gathers user information without their knowledge.
B) Software that displays advertisements while running.
C) Software that blocks access to certain websites.
184. What is Adware?
A) Software that gathers user information without their knowledge.
B) Software that displays advertisements while running.
C) Software that blocks access to certain websites.
185-Encryption is the conversion of data into an intermediate form called a ……..in which the information is present but Hidden
A-Ciphertext
B-ROT13 cipher
C-Caesar cipher
D-Exchange cipher
186-When the encrypted message reaches the target, the decryption process is performed…….
A-The original text is obtained from the ciphertext.
B-The original text could not be obtained
C-The hidden text will be understood
D-Hidden text transforms into a second shape
187-The encrypted system guarantees the next sender…..
A-Authentication
B-Privacy
C-Data integrity
D- A && B
188-The encrypted system guarantees the next receiver….
A-Authentication
B-Privacy
C-Data integrity
D- A && B
189-The encryption process takes place at any layer…..
A-Presentation
B-Physical
C-Network
D-Data Link
190-Message At Sending computer what happened…
A-Compression.
B-Encryption.
C-decompression
D- A && B
191–Message At Receiving computer what happened…
A-Compression.
B-Decryption.
C-decompression
D- B && C
192-Encryption uses ……… that consist of long strings of bits or used for encryption
A-encryption key
B-decryption key
C-algorithm
D-Ciphertext
193-There are two basic techniques for encryption……
A-symmetric encryption
B-Asymmetric encryption
C- A && B
D- Non all of the above
194-............use two keys one for encryption and the other for decryption.
A-symmetric encryption
B-Asymmetric encryption
C- A && B
D- Non all of the above
195-symmetric key Characterized……………
A-Ease of use
B-Less safe
C-Transmit key detection the decryption key will be detected.
D-All of the above
196-Asymmetric key cipher Characterized……………
A-Difficult of use
B-High safe
C-Transmit key detection the decryption key will not be detected.
D-All of the above
197-A codebook is a document used for implementing a code…………..
A-encryption
B-decryption
C-encryption and decryption
D- Non all of the above
198-which are the different coding methods......................
A-Classical methods
B-Modern methods
C- A && B
D- non all of the above
199-Which cipher is based on the substitution of one letter for another with a fixed shift?
A. Caesar cipher
B. Vigenère cipher
C. Rail fence cipher
D. One-time pad
200-Using Exchange cipher, encrypt the following text using 3 rows. “KHALID FIRST” is ciphertext
A-KL RHIFSADIT
B-FIRST KHALID
C-KHFHID FIRTHT
D-not all of the above
201-Using Exchange cipher, decrypt the following cipher text using 3 rows. “Laaaeoolr trc enwk”
A-LOCAL GHKL NETWORL
B-LOCAL AREA NETWORK
C-enwk Laaaeoolr trc
D-all of the above
202-- ……………… is the attempt of external interference in the system to harm the functioning of the system.
A) intrusion
B) introduction
C) invisibility
D) includuction
203--Attempts to use unauthorized system resources is a way of ……….
A) intrusion
B) introduction
C) invisibility
D) includuction
204—…………..is a way of intrusion.
A) Illegal access to system resources, whether physical components or files and databases.
B) Trying to get more powers than allowed.
C) Use viruses, trojans and worms to destroy the system.
D) all of the above.
205-- Interlocutors harm the system by preventing and blocking system services from users is …………
A)denial of service attack.
B)dental analysis
C)deploma triangle
D)attack.
206--…………is a danger of intruders.
A) Loss of personal information which is often not noticed by the victim of the theft of that information.
B) Losing or modifying vital data such as your bank accounts, credit card numbers, or even a password.
C) Intruders may cause errors in the services that a system provides to its users or completely destroy the system.
D) all of the above
207-- Intruders can use your device to gain access to other devices or systems in which your device appears as if it is the intruder is called ……………
A)two level hacking
B)three level hacking
C)four level hacking
D)none of the above
208—…………..is how to spot intruders.
A) The time of last entry to the system.
B) Number of times entering a wrong password to enter the system.
C) The number of times the same command is executed.
D) all of the above.
209—types of intruders …………
A)internal
B)external
C)a&b
D) none of the above
210--……………. Is how to spot intruders.
A)client based IDs
B)network based IDs
C)hybrid IDs
D) all of the above
211—Hybrid IDs is a combined system from ………….
A)client based IDs
B)network based IDs
C)a&b
D)none of the above
212—network based IDs is a system protecting ……………..
A)the whole network
B)the client
C)the server
D)none of the above
213—client based IDs is a system protecting ……………..
A)one device
B) no devices
C)the network
D)none of the above
214-- To manage this system an intruder detection management system is used named ……………..
A) IDs management system.
B) cd manger
C) client id
D)none of the above
215-- Major parts of intruder detection systems…………………..
A) sensors
B) analyzer
C) user interface
D) all of the above
216—detection methods of intruders …………………
A) misuse
B) Anomaly
C)a&b
D)none of the above
217—advantages of misuse method is ……………….
A) simple and effective
B) easy in administration
C) a&b
D) none of the above
218— detects new attacks is an advantage of ……………
A) anomaly method
B)misuse method
C)all of the above
D)none of the above
219—produsing a higher number of false alarms ……………….
A)anomaly method
B)misuse method
C)alegran method
D)none of the above
220—network based IDs is …………………. Accurate than host based IDs
A)less
B)more
C)same
D)none of the above
221………… are programs that are downloaded on physical components that used as a barrier between Intranet LAN and external networks (e.g. Internet) for protection Intranet or isolate it from any external attack.
A) Viruses.
B) Firewalls.
C) Encryption.
D) Intruders.
222.Firewalls allow network manager to control network access using Different methods such as .……………
A) usernames
B) passwords.
C) IP addresses.
D) All of the above.
223.Firewalls use the technique of Proxying mediation where a special program placed on a single server called Proxy that does a number of functions such as ….…
A) Preventing access to unwanted sites.
B) Speed up online browsers by storing pages that are frequently visited in cash memory.
C) Virus protection and extraneous software.
D) All of the above.
224. It’s not a Sample firewall rule and format…..
A) Source Address.
B) Destination Address.
C) Service (HTTP,SMTP,FTP)
D) Intrusion Detection Systems
225.Suitable places for laying fire walls are ……...
A) Between your network and other external networks.
B) At the Gateway (portal) of one of the important sub-networks in your own network.
C) A& B.
D) None of the above.
226- One of Firewall types is?
A.) Mac layer firewall
B) Microsoft
C)None of above
227- Places to put firewall:
A) end user machine
B) sub network's gateway
C) between private network's and outside network's
D) all of the above
228.One of problems of using firewall?
A) bottleneck on network's.
B) end user.
C)static filtering.
229- Which of the following is / are the types of firewall?
A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) Dual Host Firewall
230 - A proxy firewall filters at _________
A) Physical layer
B) Data link layer
C) Network layer
D) Application layer
231- A packet filter firewall filters at __________
A) Physical layer
B) Data link layer
C) Network layer or Transport layer
D) Application layer
232- A firewall is installed at the point where the secure internal network and entrusted external network meet which is also known as __________
A) Chock point
B) Meeting point
C) Firewall point
D) Secure point
233-what is the true feature of using NAT router.
A) high cost
B) easy to implement
C) doesn't require a lot of work from the user
D) all of the above
234- Which command would you place on interface connected to the Internet?
A- ip nat inside
B- ip nat outside
c- ip outside global
d-ip inside local
235 -Which command will show you all the translations active on your router?
A. Show ip nat translations
B. Show ip nat statistics
C. Debug ip nat
D. Clear ip nat translations *
236- Which command would you place on interface on a private network?
A. Ip nat inside
B. Ip nat outside
C. Ip outside global
D. Ip inside local
237- Port Address Translation is also termed what?
A. NAT Fast
B. NAT Static
C. NAT Overload
D. Overloading Static
238- Which are considered the methods of NAT? 1. StaƟc 2. IP NAT pool 3. Dynamic 4. NAT double-translation 5. Overload
A. 1 and 6
B. 3 only
C. 1, 3 and 5
D. All of the above
239- Which command will allow you to see real-time translations on your router?
A. Show ip nat translations
B. Show ip nat statistics
C. Debug ip nat
D. Clear ip nat translations *
240- Which of the following is considered to be the address before translation?
A. Inside local
B. Outside local
C. Inside global
D. Outside global
{"name":"Computer and Network Security", "url":"https://www.supersurvey.com/QPREVIEW","txt":"Test your knowledge on Computer and Network Security with this comprehensive quiz featuring 240 insightful questions. This quiz covers fundamental concepts, network types, protocols, and the benefits of networking.Join us to enhance your understanding and evaluate your skills with topics such as:Network TopologiesClient-Server ModelsDifferent Types of Networks (LAN, WAN, PAN)Communication Protocols","img":"https:/images/course7.png"}
More Quizzes
Networking
5219
CISCO Certified CCNA Exam by Gaurav Sharma
301531
Connecting to the Internet
5298
Cryptography and Network Security
1050
Modul 1
1658227
Cryptography and Security Fundamentals Quiz
6329
CAS-002 First 50
50250
Security Malware
105126
Security Plus
191026
Security Plus 10q Part 2
10527
Test 2 Part 1(revisit)
1587
Cybersecurity Knowledge Challenge
1058