Important Trivia Questions On Network Security!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Syamaz
S
Syamaz
Community Contributor
Quizzes Created: 2 | Total Attempts: 18,043
Questions: 10 | Attempts: 17,876

SettingsSettingsSettings
Important Trivia Questions On Network Security! - Quiz

Do you wish to learn more about Network security? Below are Important Trivia Questions on Network Security that every network operator should be able to answer with ease. Network security refers to processes and practices designed to protect the data in the computer system. The questions in our quiz are carefully curated to help you understand the concepts in-depth. We're sure that you'll learn something new! Remember to share the quiz with people who would love to know more about the concept. Keep learning!


Questions and Answers
  • 1. 

    In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Authenticity

    Correct Answer
    B. Integrity
    Explanation
    Integrity means that computer system assets can be modified only by authorized parties. This refers to the concept of maintaining the accuracy, consistency, and trustworthiness of data and information. It ensures that unauthorized modifications or alterations to the system or its data are prevented, and only authorized changes are allowed.

    Rate this question:

  • 2. 

    In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Authenticity

    Correct Answer
    A. Confidentiality
    Explanation
    Confidentiality in computer security refers to the protection of information in a computer system, ensuring that it can only be accessed by authorized parties for reading. This means that sensitive data is kept private and secure, preventing unauthorized individuals from gaining access to it.

    Rate this question:

  • 3. 

    State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system.

    • A.

      True, False

    • B.

      False, True

    • C.

      True, True

    • D.

      False, False

    Correct Answer
    C. True, True
    Explanation
    A worm is a type of malicious software that can replicate itself and spread to other systems. It can do this by either mailing a copy of itself to other systems (as stated in option i) or by executing a copy of itself on another system (as stated in option ii). Therefore, both statements are true and the correct answer is "True, True".

    Rate this question:

  • 4. 

    A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.

    • A.

      Worm

    • B.

      Virus

    • C.

      Zombie

    • D.

      Trap doors

    Correct Answer
    B. Virus
    Explanation
    A virus is a program that can infect other programs by modifying them, including a copy of the virus program. This copy can then go on to infect other programs, spreading the virus further.

    Rate this question:

  • 5. 

    Which of the following is independent  malicious program that need not any host program?

    • A.

      Trap doors

    • B.

      Trojan horse

    • C.

      Virus

    • D.

      Worm

    Correct Answer
    D. Worm
    Explanation
    A worm is an independent malicious program that does not require a host program to spread and replicate itself. Unlike viruses, which need a host file or program to attach to, worms can self-replicate and spread across computer networks without any assistance. They often exploit vulnerabilities in operating systems or network protocols to propagate and can cause significant damage by consuming network bandwidth, overloading servers, and stealing sensitive information. Therefore, a worm is the correct answer as it is a standalone malicious program that can operate independently.

    Rate this question:

  • 6. 

    ____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities;

    • A.

      Black Hats

    • B.

      Grey Hats

    • C.

      White Hats

    • D.

      Red Hats

    Correct Answer
    A. Black Hats
    Explanation
    Black Hats are used to describe hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities. They engage in activities such as hacking into computer systems, stealing sensitive information, spreading malware, and causing damage to networks or websites. These individuals operate outside the boundaries of the law and often seek personal gain or to cause harm to others.

    Rate this question:

  • 7. 

    The following are the goals of network security, EXCEPT;

    • A.

      Threat assessment

    • B.

      Asset Assessment

    • C.

      Risk assessment

    • D.

      Asset Identification

    Correct Answer
    B. Asset Assessment
    Explanation
    The goals of network security include threat assessment, risk assessment, and asset identification. Asset assessment, however, is not a goal of network security. Asset assessment typically refers to the process of evaluating the value and importance of an organization's assets, which may be part of overall risk management but is not specifically related to network security.

    Rate this question:

  • 8. 

    The goal of ______________ is to reduce the exposure of the organization to malicious code.                                                                    

    • A.

      Access control

    • B.

      Anti-virus

    • C.

      Password

    • D.

      None of the above

    Correct Answer
    B. Anti-virus
    Explanation
    The goal of using anti-virus software is to reduce the exposure of the organization to malicious code. Anti-virus software helps to detect, prevent, and remove malware such as viruses, worms, and Trojan horses from infecting computer systems. By regularly scanning and monitoring the organization's systems, anti-virus software can identify and eliminate any malicious code that may pose a threat to the organization's security. This helps to protect sensitive data, prevent system crashes, and minimize the potential damage caused by malicious attacks.

    Rate this question:

  • 9. 

    “Imagine the status/service of a bank if its customers are unable to make transactions using their accounts." This scenario refers to what goals of network security ……..                                 

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability.

    • D.

      Authenticity

    Correct Answer
    C. Availability.
    Explanation
    This scenario refers to the goal of network security called availability. The ability of customers to make transactions using their accounts is a key aspect of the bank's service and status. If customers are unable to access their accounts and make transactions, it can severely impact the availability of the bank's services. Therefore, ensuring the availability of the network and systems is crucial for maintaining the bank's reputation and customer satisfaction.

    Rate this question:

  • 10. 

    Identify which of the following is NOT a potential risk to the network security.

    • A.

      Email Attachments.

    • B.

      Anti-virus Protection.

    • C.

      Blended Attacks.

    • D.

      Renaming Documents.

    Correct Answer
    B. Anti-virus Protection.
    Explanation
    Anti-virus protection is not a potential risk to network security because it is a security measure implemented to detect and remove viruses, malware, and other malicious software that can compromise the network. It helps to prevent unauthorized access, data breaches, and system damage. Therefore, it is not considered a risk, but rather a protective measure.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 24, 2018
    Quiz Created by
    Syamaz
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.