Professional Documents
Culture Documents
Networks Security Quiz - March 2024 With Answers
Networks Security Quiz - March 2024 With Answers
Question 1:
B). Password must contain upper case, lower case, numbers, and special characters
ANSWER: D
3: Which of the following options doesn’t belong to the category of the hacker?
ANSWER: C
4: Which of the following does not help to protect your computer from
external threats?
C). Firewall
ANSWER: A
ANSWER: D
A). DoS
B). Phishing
C). Backdoor
D). Sniffing
ANSWER: C
ANSWER: B
B). Creating a fake website that appears to be identical to the real website and
trick users to enter their login information
C). Sending someone a text message that contains a malicious link that is
disguised to look like a notification that the person has won a contest.
ANSWER: D
C). Keep all the passwords the same for your different login accounts.
ANSWER: B
10: Which of the following is the oldest hacking techniques used by hackers
to make free calls?
A). Phishing
B). Hashing
C). Phreaking
D). Cracking
ANSWER: C
ANSWER: A
C). Phishing
D). Cyberstalking
ANSWER: C
13: ___________ is the first person who was responsible for distributing
computer worms through the Internet.
ANSWER: D
A). Radius
B). VPN
C). Proxy
D). DNS
ANSWER: B
A). SAML
B). SSO
C). Kerberos
ANSWER: B
16: The encryption technique that uses one message to hide another
message is called _____ .
A). MDA
B). Hashing
C). Steganography
ANSWER: C
ANSWER: D
A). Integrity
B). Authentication
C). Confidentiality
D). Availability
ANSWER: C
19: ___________ is the term used in computer security to protect the data
from being modified by the unauthorized user.
A). Integrity
B). Authentication
C). Confidentiality
D). Availability
ANSWER: A
A). Integrity
B). Authentication
C). Confidentiality
D). Availability
ANSWER: D
Question 2:
Cryptography
We write the alphabet A through Z and then shift the letters as seen below:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
BCDEFGHIJKLMNOPQRSTUVWXYZA
In this example, we shifted the letters over by one. In general, we can shift the
letters over by n for any n.
Problem 1:
……………………………………………………………………………………
……………………………………………………………………………………
Problem 2:
……………………………………………………………………………………
……………………………………………………………………………………
Problem 3:
……………………………………………………………………………………
……………………………………………………………………………………