Important Trivia Questions On Network Security!

10 Questions | Total Attempts: 13688

SettingsSettingsSettings
Please wait...
Important Trivia Questions On Network Security!

Below are Important Trivia Questions on Network Security that every network operator should be able to answer with ease. Do you think you have what it takes to do just that? Do take the quiz up and share what score you get in the comment section and read up on the topic later if you fail too many of the questions. All the best!


Questions and Answers
  • 1. 
    In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Availability

    • D. 

      Authenticity

  • 2. 
    In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Availability

    • D. 

      Authenticity

  • 3. 
    State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system.
    • A. 

      True, False

    • B. 

      False, True

    • C. 

      True, True

    • D. 

      False, False

  • 4. 
    A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Zombie

    • D. 

      Trap doors

  • 5. 
    Which of the following is independent  malicious program that need not any host program?
    • A. 

      Trap doors

    • B. 

      Trojan horse

    • C. 

      Virus

    • D. 

      Worm

  • 6. 
    ____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities
    • A. 

      Black Hats

    • B. 

      Grey Hats

    • C. 

      White Hats

    • D. 

      Red Hats

  • 7. 
    The following are the goals of network security, EXCEPT;
    • A. 

      Threat assessment.

    • B. 

      Asset Assessment

    • C. 

      Risk assessment.

    • D. 

      Asset Identification.

  • 8. 
    The goal of ______________ is to reduce the exposure of the organization to malicious code.                                                                    
    • A. 

      Access control.

    • B. 

      Anti-virus.

    • C. 

      Password.

    • D. 

      None of the above.

  • 9. 
    “  Imagine the status/service of a bank if its customers are unable to make transactions using their accounts “.This scenario refers to what goals of network security ……..                                 
    • A. 

      Confidentiality.

    • B. 

      Integrity.

    • C. 

      Availability.

    • D. 

      Authenticity

  • 10. 
    Identify which of the following is NOT a potential risk to the network security.
    • A. 

      Email Attachments.

    • B. 

      Anti-virus Protection.

    • C. 

      Blended Attacks.

    • D. 

      Renaming Documents.