Network Security MCQ Quiz - Objective Question with Answer for Network Security - Download Free PDF

What key(s) are used by the sender of an encrypted message in an asymmetric-key cipher?

  1. Neither public nor private key of the receiver
  2. Public key of the receiver
  3. Public or private key of the sender
  4. Private key of the sender
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : Public key of the receiver India's Super Teachers for all govt. exams Under One Roof Demo Classes Available* Enroll For Free Now

Network Security Question 1 Detailed Solution

The correct answer is option 2.

Concept:

The two keys are called the “public key” and the “private key” of the user. The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message.

Asymmetric encryption is also called public-key encryption, but it actually relies on a key pair. Two mathematically related keys, one called the public key and another called the private key, are generated to be used together. The private key is never shared; it is kept secret and is used only by its owner. The public key is made available to anyone who wants it. Because of the time and amount of computer processing power required, it is considered mathematically infeasible for anyone to be able to use the public key to re-create the private key, so this form of encryption is considered very secure.

F1 Shraddha Harshita 21.2.2022 D2

Hence the correct answer is the p ublic key of the receiver.

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 2:

Symmetric encryption is also known as:
  1. public-key encryption
  2. asymmetric encryption
  3. conventional encryption
  4. hybrid encryption

Answer (Detailed Solution Below)

Option 3 : conventional encryption

Network Security Question 2 Detailed Solution

The correct answer is conventional encryption

Key Points

Additional Information

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 3:

Symmetric Key Cryptography uses stream cipher to encrypt the information. One of example of stream cipher:

  1. SHA
  2. RC4
  3. MD5
  4. Blowfish
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : RC4

Network Security Question 3 Detailed Solution

The correct answer is option 2.

Concept:

Symmetric Key Cryptography uses a stream cipher to encrypt the information. One example of stream cipher is RC4.

Stream cipher:

A stream cipher is an encryption technique that encrypts and decrypts a set quantity of data using a symmetric key. In contrast to an asymmetric cipher key, a symmetric cipher key is an encryption tool that may be used for both encryption and decryption.

Rivest Cipher 4:

Hence the correct answer is RC4.

Additional Information

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 4:

Keyloggers are a form of _____.
  1. Social Engineering
  2. Trojan
  3. Shoulder Surfing
  4. Spyware
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Spyware

Network Security Question 4 Detailed Solution

The correct answer is option 4.
Concept:

Keyloggers, also known as keystroke loggers, are software applications or hardware devices that record the activity (keys tapped) on a keyboard. Keyloggers are a type of spyware in which users are unaware that their actions are being recorded.

Spyware:

Spyware is a type of malicious software or malware that is installed on a computing device without the end user's knowledge.

Characteristics:

Hence the correct answer is Spyware.

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 5:

Digital signature cannot provide _______ for the message-
  1. Authentication
  2. Nonrepudiation
  3. Confidentiality
  4. Integrity
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : Confidentiality

Network Security Question 5 Detailed Solution

The correct answer is Confidentiality

Key Points Confidentiality:

Additional Information A digital signature provides three functions:

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Top Network Security MCQ Objective Questions

Network Security Question 6

In computing, ________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  1. Spyware
  2. Cookie
  3. Spam
  4. Firewall

Answer (Detailed Solution Below)

Option 4 : Firewall

Network Security Question 6 Detailed Solution

The correct answer is option 4) i.e. Firewall.

Note:

Share on Whatsapp

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 7

A computer virus is a
  1. Hardware
  2. Software
  3. Bacteria
  4. Freeware

Answer (Detailed Solution Below)

Option 2 : Software

Network Security Question 7 Detailed Solution

The correct answer is Software.

Share on Whatsapp

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 8

Which type of virus attaches with EXE files and the resulting infected EXE file attacks other EXE files and infects them ?

  1. Parasitic virus
  2. Boot Sector Virus
  3. Stealth Virus
  4. Memory Resident Virus

Answer (Detailed Solution Below)

Option 1 : Parasitic virus

Network Security Question 8 Detailed Solution

The type of virus that attaches to EXE files and infects other EXE files is a type of Parasitic virus, also known as an executable virus or file infecting virus.

Boot sector viruses infect the boot sector of storage devices such as hard drives and floppy disks.

Stealth viruses use various techniques to hide themselves from detection by antivirus software and other system tools.

Memory resident viruses, as the name suggests, reside in a computer's memory and can infect other files that are loaded into memory. However, they do not typically infect EXE files specifically.

Hence, the correct answer is option 1.

Share on Whatsapp

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 9

What is the term for a cyber-security attack that targets multiple interconnected devices simultaneously to create a large- scale attack network?

  1. DDoS attack
  2. Botnet attack
  3. Zero-day attack
  4. Spear phishing attack

Answer (Detailed Solution Below)

Option 2 : Botnet attack

Network Security Question 9 Detailed Solution

The correct answer is Botnet attack.

Key Points

Additional Information

Here are some ways to protect yourself from botnet attacks:

Share on Whatsapp

India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Trusted by 6.1 Crore+ Students

Network Security Question 10

Which of the following is an attack in which the user receives the unwanted amount of e-mails?
  1. Email bomb
  2. Ping storm
  3. Spoofing
  4. Smurfing

Answer (Detailed Solution Below)

Option 1 : Email bomb

Network Security Question 10 Detailed Solution

Important Points

It is an attack on your inbox that involves sending massive amounts of emails to your address. Sometimes these messages are complete gibberish, but more often they’ll be confirmation emails for newsletters and subscriptions.

Additional Information

Spoofing

It is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

Smurf Attack

It is a form of a DDoS attack that causes packet flood on the victim by exploiting/abusing ICMP protocol. When deployed, large packets are created using a technique called “spoofing”. The phony source address that is now attached to these packets becomes the victim, as their IP is flooded with traffic. The small ICMP packet generated by the tool causes big trouble for a victim, hence the name Smurf.

Ping storm

It is a condition in which the Internet ping program is used to send a flood of packets to a server to test its ability to handle a high amount of traffic or, maliciously, to make the server inoperable

Hence Option 1 is correct