Network Security

33 Questions | Total Attempts: 85

SettingsSettingsSettings
Please wait...
Network Security Quizzes & Trivia

Questions and Answers
  • 1. 
    What is a Call Back?
    • A. 

      Dialling into a network and calling someone back

    • B. 

      A term used in celluar phones

    • C. 

      Calling someone back

  • 2. 
    What would use a call back?
    • A. 

      Personal Assistants

    • B. 

      Remote Workers/Network Administratos

    • C. 

      Call centere workers

  • 3. 
    A call back can only be connected form a registerd, trusted line
    • A. 

      True

    • B. 

      False

  • 4. 
    A call back is not used anymore and has not been used in a long time
    • A. 

      True

    • B. 

      False

  • 5. 
    Where is Handshaking Used?
    • A. 

      WAN Systems

    • B. 

      LAN Systems

  • 6. 
    CHAP -  Chanllenge, Handshake, Auethentication, ________________
  • 7. 
    What does each device do to increase trust?
    • A. 

      Complete a challenge

    • B. 

      Restart System

    • C. 

      Verify Via Password

  • 8. 
    To establish the identity what does each device carry?
    • A. 

      A unique Pass and User

    • B. 

      A number

    • C. 

      Nothing

  • 9. 
    What is the major cause which prevents data being taken form diskless networks?
    • A. 

      No CD/DVD drives or usb ports

    • B. 

      Firewall

    • C. 

      Anti Virus

  • 10. 
    Can data be stolen Via Mobile storage devices in diskless networks?
    • A. 

      True

    • B. 

      False

  • 11. 
    What neccessary Precuation is taken in Diskless Networks?
    • A. 

      The BIOS is configured to prevent indivisuals from adding new devices

    • B. 

      All ports and drives on the computer are removed

  • 12. 
    Data is stolen By...
    • A. 

      Transferring data from the computer to a storage device

    • B. 

      Physical damage stealing hardrives etc

  • 13. 
    What is a back up?
    • A. 

      A way of making a copy of your data incase of data loss

    • B. 

      A program which makes a copy of your hard drive

    • C. 

      A slave drive

  • 14. 
    Why is incremental an inremental back up prefered to a full backup ?
    • A. 

      An full back up is a lenghty process, incrementa back up saves time and is easier

    • B. 

      Beacuse incremental is a more safe and secure type of back up

    • C. 

      Beacusea a full back up requires a huge amount of space

  • 15. 
    What is the difference bettween a incremental and full back up?
    • A. 

      A incremental is much better than a full back up

    • B. 

      A full back up is more secure than an incremental

    • C. 

      An incremental is much quicker beacuse it only copies data which has changed since the last backup

  • 16. 
    On most occasions a back up requires a huge amount of space?
    • A. 

      True

    • B. 

      False

  • 17. 
    What device would be most appropriate when attempting a back up?
    • A. 

      External hard drive

    • B. 

      4GB USB memory stick

    • C. 

      700mb CD

  • 18. 
    Approximately how often would a huge organisation back up their data?
    • A. 

      Every couple of days/Weekly

    • B. 

      Monthly

    • C. 

      Yearly

    • D. 

      Daily

  • 19. 
    What is audit logs?
    • A. 

      Searching systems in order to find potential threats

    • B. 

      Logging into an online account

    • C. 

      Authorised logging

  • 20. 
    Why would you use audit logs?
    • A. 

      Because it locates a threat and finds a solution

    • B. 

      Because it could help recover your system from a virus

    • C. 

      It would help with data loss

  • 21. 
    What do companies have anyway if an audit log does not help?
    • A. 

      Back up

    • B. 

      Contingency Plan

    • C. 

      IT Technician

  • 22. 
    What does VPN stand for?
    • A. 

      Vista Program Network

    • B. 

      Virtual Programming Network

    • C. 

      Virtual Private Network

  • 23. 
    What is VPN?
    • A. 

      A tunnel which allows people to access corporate networks

    • B. 

      A online MMORPG game

    • C. 

      A connection between two computers

  • 24. 
    Most schools and colleges use VPN to allow students and staff to access their home area from home
    • A. 

      True

    • B. 

      False

  • 25. 
    VPN can't create a trusted connection on a system which is not trusted?
    • A. 

      True

    • B. 

      False

  • 26. 
    What is intruder detection? 
    • A. 

      Monitoring traffic for undesirable manipulations

    • B. 

      A system which looks out and warns for possible threats

    • C. 

      Looking after a system protecting it malicious damage

  • 27. 
    Intruder systems are primarily focused on identifying possible threats?
    • A. 

      True

    • B. 

      False

  • 28. 
    The intruder detection system will not do anything to block an intrusion?
    • A. 

      True

    • B. 

      False

  • 29. 
    Why is password safety important?
    • A. 

      Because a password is what protects you system and files

    • B. 

      A password will stop people touching your computer

    • C. 

      It is not important

  • 30. 
    You should never give your password to anyone? 
    • A. 

      True

    • B. 

      False

  • 31. 
    Always reply to emails asking for your user and password?
    • A. 

      True

    • B. 

      False

  • 32. 
    What is the minimum length for a safe password?
    • A. 

      4 characters

    • B. 

      6 characters

    • C. 

      8 characters

  • 33. 
    What type of things should you not use for a password?
    • A. 

      Names, birthdays, repetition and sequences

    • B. 

      Random letters and numbers

    • C. 

      A lengthy complex variety of digits