Network Security

33 Questions | Attempts: 113
Share

SettingsSettingsSettings
Network Security Quizzes & Trivia

.


Questions and Answers
  • 1. 

    What is a Call Back?

    • A.

      Dialling into a network and calling someone back

    • B.

      A term used in celluar phones

    • C.

      Calling someone back

    Correct Answer
    A. Dialling into a network and calling someone back
  • 2. 

    What would use a call back?

    • A.

      Personal Assistants

    • B.

      Remote Workers/Network Administratos

    • C.

      Call centere workers

    Correct Answer
    B. Remote Workers/Network Administratos
  • 3. 

    A call back can only be connected form a registered, trusted line.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 4. 

    A call back is not used anymore and has not been used in a long time.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 5. 

    Where is Handshaking Used?

    • A.

      WAN Systems

    • B.

      LAN Systems

    Correct Answer
    A. WAN Systems
  • 6. 

    CHAP -  Chanllenge, Handshake, Auethentication, ________________

    Correct Answer
    PC
    Primary
    Possibility
    Protocol
  • 7. 

    What does each device do to increase trust?

    • A.

      Complete a challenge

    • B.

      Restart System

    • C.

      Verify Via Password

    Correct Answer
    A. Complete a challenge
  • 8. 

    To establish the identity what does each device carry?

    • A.

      A unique Pass and User

    • B.

      A number

    • C.

      Nothing

    Correct Answer
    A. A unique Pass and User
  • 9. 

    What is the major cause which prevents data being taken form diskless networks?

    • A.

      No CD/DVD drives or usb ports

    • B.

      Firewall

    • C.

      Anti Virus

    Correct Answer
    A. No CD/DVD drives or usb ports
  • 10. 

    Can data be stolen Via Mobile storage devices in diskless networks?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 11. 

    What neccessary Precuation is taken in Diskless Networks?

    • A.

      The BIOS is configured to prevent indivisuals from adding new devices

    • B.

      All ports and drives on the computer are removed

    Correct Answer
    A. The BIOS is configured to prevent indivisuals from adding new devices
  • 12. 

    Data is stolen By...

    • A.

      Transferring data from the computer to a storage device

    • B.

      Physical damage stealing hardrives etc

    Correct Answer
    A. Transferring data from the computer to a storage device
  • 13. 

    What is a back up?

    • A.

      A way of making a copy of your data incase of data loss

    • B.

      A program which makes a copy of your hard drive

    • C.

      A slave drive

    Correct Answer
    A. A way of making a copy of your data incase of data loss
  • 14. 

    Why is incremental an inremental back up prefered to a full backup ?

    • A.

      An full back up is a lenghty process, incrementa back up saves time and is easier

    • B.

      Beacuse incremental is a more safe and secure type of back up

    • C.

      Beacusea a full back up requires a huge amount of space

    Correct Answer
    A. An full back up is a lenghty process, incrementa back up saves time and is easier
  • 15. 

    What is the difference bettween a incremental and full back up?

    • A.

      A incremental is much better than a full back up

    • B.

      A full back up is more secure than an incremental

    • C.

      An incremental is much quicker beacuse it only copies data which has changed since the last backup

    Correct Answer
    C. An incremental is much quicker beacuse it only copies data which has changed since the last backup
  • 16. 

    On most occasions a back up requires a huge amount of space?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 17. 

    What device would be most appropriate when attempting a back up?

    • A.

      External hard drive

    • B.

      4GB USB memory stick

    • C.

      700mb CD

    Correct Answer
    A. External hard drive
  • 18. 

    Approximately how often would a huge organisation back up their data?

    • A.

      Every couple of days/Weekly

    • B.

      Monthly

    • C.

      Yearly

    • D.

      Daily

    Correct Answer
    D. Daily
  • 19. 

    What is audit logs?

    • A.

      Searching systems in order to find potential threats

    • B.

      Logging into an online account

    • C.

      Authorised logging

    Correct Answer
    A. Searching systems in order to find potential threats
  • 20. 

    Why would you use audit logs?

    • A.

      Because it locates a threat and finds a solution

    • B.

      Because it could help recover your system from a virus

    • C.

      It would help with data loss

    Correct Answer
    A. Because it locates a threat and finds a solution
  • 21. 

    What do companies have anyway if an audit log does not help?

    • A.

      Back up

    • B.

      Contingency Plan

    • C.

      IT Technician

    Correct Answer
    B. Contingency Plan
  • 22. 

    What does VPN stand for?

    • A.

      Vista Program Network

    • B.

      Virtual Programming Network

    • C.

      Virtual Private Network

    Correct Answer
    C. Virtual Private Network
  • 23. 

    What is VPN?

    • A.

      A tunnel which allows people to access corporate networks

    • B.

      A online MMORPG game

    • C.

      A connection between two computers

    Correct Answer
    A. A tunnel which allows people to access corporate networks
  • 24. 

    Most schools and colleges use VPN to allow students and staff to access their home area from home

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 25. 

    VPN can't create a trusted connection on a system which is not trusted?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 26. 

    What is intruder detection? 

    • A.

      Monitoring traffic for undesirable manipulations

    • B.

      A system which looks out and warns for possible threats

    • C.

      Looking after a system protecting it malicious damage

    Correct Answer
    A. Monitoring traffic for undesirable manipulations
  • 27. 

    Intruder systems are primarily focused on identifying possible threats?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 28. 

    The intruder detection system will not do anything to block an intrusion?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 29. 

    Why is password safety important?

    • A.

      Because a password is what protects you system and files

    • B.

      A password will stop people touching your computer

    • C.

      It is not important

    Correct Answer
    A. Because a password is what protects you system and files
  • 30. 

    You should never give your password to anyone? 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 31. 

    Always reply to emails asking for your user and password?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 32. 

    What is the minimum length for a safe password?

    • A.

      4 characters

    • B.

      6 characters

    • C.

      8 characters

    Correct Answer
    C. 8 characters
  • 33. 

    What type of things should you not use for a password?

    • A.

      Names, birthdays, repetition and sequences

    • B.

      Random letters and numbers

    • C.

      A lengthy complex variety of digits

    Correct Answer
    A. Names, birthdays, repetition and sequences

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 01, 2020
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 31, 2011
    Quiz Created by
    Ghost101
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.