Network Security

38 Questions | Total Attempts: 86

SettingsSettingsSettings
Please wait...
Network Security Quizzes & Trivia

This quiz is to see your knowledge in Network Security


Questions and Answers
  • 1. 
    What call back used for 
    • A. 

      Internet

    • B. 

      TV

    • C. 

      Telephone

  • 2. 
    What is call back number?
    • A. 

      Pre-configured

    • B. 

      Digit

    • C. 

      Amount

  • 3. 
    Call back user cannot connect from any ----------------
    • A. 

      Location

    • B. 

      Building

    • C. 

      Country

  • 4. 
    Handshaking is the exchange of information between ----------------
    • A. 

      2 modem

    • B. 

      5 modem

    • C. 

      3 modem

  • 5. 
    Handshaking often concerns the exchange of ------------------------
    • A. 

      Message

    • B. 

      Voice

    • C. 

      Words

  • 6. 
    It is desired to keep the ______required for handshakes as short as possible,
    • A. 

      Time

    • B. 

      Distance

    • C. 

      Space

  • 7. 
    The process by which two devices initiate 
    • A. 

      Communicate

    • B. 

      Talk

    • C. 

      Listen

  • 8. 
    Diskless Computer Network is a computer network with a centralized -------------------
    • A. 

      Storage serve

    • B. 

      Telecommunication

    • C. 

      Network

  • 9. 
    Some systems also prevent
    • A. 

      Local hard drive

    • B. 

      Telephone

    • C. 

      Viruses

  • 10. 
    Backup’s files are usually store 
    • A. 

      In tv

    • B. 

      In office

    • C. 

      In disk

  • 11. 
    How can you back up files?
    • A. 

      Operating system commands

    • B. 

      Tv

    • C. 

      House

  • 12. 
    To ensure redundancy, most server systems storage is managed by
    • A. 

      Raild

    • B. 

      External hard drive

    • C. 

      Laptop

  • 13. 
    An Audit Log can be used to automatically track every action undertaken by users on _________
    • A. 

      Network

    • B. 

      Internet

    • C. 

      Password

  • 14. 
    Can Audit logs can be used as proof if an employee is not using the system as they are supposed to.
    • A. 

      True

    • B. 

      False

  • 15. 
    What is the real definition of Audit Logs?
    • A. 

      A step-by-step record by which accounting data can be traced to their source

    • B. 

      It is a application which is used to connect network

    • C. 

      It is computer

  • 16. 
     When Audit logs are useful
    • A. 

      For maintaining security and for recovering lost transactions

    • B. 

      For lost of data

    • C. 

      To fix internet connection

  • 17. 
    What does VPN stands for? 
    • A. 

      A. Virtual privet network

    • B. 

      B. Virtual personal network

    • C. 

      C. Virtual people network

  • 18. 
    VPN is a computer network that uses as a -----------------------------------------------  
    • A. 

      A. public telecommunication infrastructure

    • B. 

      B. mobile network

    • C. 

      C. IP protocol

  • 19. 
    The goal of a VPN is to provide the organization with the same -----------------------------  
    • A. 

      Capabilities

    • B. 

      Capacity

    • C. 

      Quantity

  • 20. 
    Can home workers connect directly to the corporate network via local VPN TUNNELS?
    • A. 

      True

    • B. 

      False

  • 21. 
    What is intruder detection? 
    • A. 

      Type of security management system for computers and networks

    • B. 

      Type of browser

    • C. 

      Type of network wire

  • 22. 
    Why we use intrusion detection system 
    • A. 

      To detect all types of malicious network traffic and computer usage

    • B. 

      To provide internet

    • C. 

      To help internet

  • 23. 
    What does passive system do? 
    • A. 

      It record/log the attempts for the network administrator to decide what is to be done.

    • B. 

      Help your pc

    • C. 

      Remove data in your oc;s

  • 24. 
    What is Reactive System?
    • A. 

      To protect your system

    • B. 

      To restore your system

    • C. 

      To identifying an intrusion attempt, the system to reconfigure the firewall to block the intrusion.

  • 25. 
    Which password below could be used best for password safety?
    • A. 

      Abcderg

    • B. 

      Raja

    • C. 

      IhGr8trmP

  • 26. 
    Don't pick a password that someone can easily guess if they know who you are for example
    • A. 

      Your Social Security number, birthday date , or maiden name

    • B. 

      Car

    • C. 

      People

  • 27. 
    Do pick a mixture of letters and at least one number  
    • A. 

      True

    • B. 

      False

  • 28. 
    Why you should not pick a word that can be found in the dictionary
    • A. 

      Because it is easy

    • B. 

      Programs that can rapidly try every word in the dictionary and guest your password

    • C. 

      ITS good

  • 29. 
    How many characters should be strong password should have
    • A. 

      14 characters

    • B. 

      8 characters

    • C. 

      5 characters

  • 30. 
    Strong password prevents unauthorised access to your __________.
    • A. 

      Account

    • B. 

      Building

    • C. 

      Car

  • 31. 
    Don't use a password of all the same digits or all the same letter
    • A. 

      True

    • B. 

      False

  • 32. 
    Password should be in mixed-case characters
    • A. 

      True

    • B. 

      False

  • 33. 
    What does system administrator in your pc allow you to do? 
    • A. 

      Allows you to change the setting of your system

    • B. 

      Does not do anything

    • C. 

      Allows navigate your pc

  • 34. 
    Different levels of access help to ensure that the ------------------------------------------------------------
    • A. 

      Network remains secure and that only licensed software is used on it.

    • B. 

      To protect your pc

    • C. 

      To help you keyboard

  • 35. 
    If you do not have administrator status on your pc 
    • A. 

      You will not have access to all files on that computer

    • B. 

      Help your pc

    • C. 

      It reprograms your computer

  • 36. 
    Can staff of an organisation can change the personal setting their pc for example their changing screen resolution.
    • A. 

      True

    • B. 

      False

  • 37. 
    In Windows XP Home, the Administrator (original user) account
    • A. 

      The user can only login in a 'normal' mod

    • B. 

      The user can only login as a Safe Mode.

    • C. 

      Don’t know

  • 38. 
    All subsequent administrator accounts can only login in ---------------------
    • A. 

      Safe mode

    • B. 

      Normal mode

    • C. 

      Easy mode