Multiple Network Security Questions And Answers!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Humpz123
H
Humpz123
Community Contributor
Quizzes Created: 1 | Total Attempts: 341
Questions: 28 | Attempts: 341

SettingsSettingsSettings
Multiple Network Security Questions And Answers! - Quiz

This is a network quiz. Choose your answers from the next multiple answer questions.


Questions and Answers
  • 1. 

    Call back is?

    • A.

      Pre-configured

    • B.

      Even number

    • C.

      Odd number

    Correct Answer
    A. Pre-configured
    Explanation
    A call back refers to a pre-configured function or method that is passed as an argument to another function. It allows the receiving function to "call back" the pre-configured function at a later time. Therefore, the correct answer is "Pre-configured" as it accurately describes the nature of a call back in programming.

    Rate this question:

  • 2. 

    Where is call back used?

    • A.

      On phones

    • B.

      On dial-up systems

    • C.

      On computers

    Correct Answer
    B. On dial-up systems
    Explanation
    Call back is a feature commonly used in dial-up systems. When a user dials into a remote system, instead of establishing a direct connection, the system disconnects the call and then calls back the user at a predetermined number. This adds an extra layer of security by verifying the identity of the user before granting access to the system. Call back is not typically used on phones or computers, making dial-up systems the most appropriate option for implementing this feature.

    Rate this question:

  • 3. 

    What does call back do?

    • A.

      Dial into a network

    • B.

      Dial into a phone

    • C.

      Dial into a computer

    Correct Answer
    A. Dial into a network
    Explanation
    The call back function allows a user to dial into a network. This means that when a user initiates a call back, they are essentially requesting the network to establish a connection with their device. This can be useful in situations where the user is unable to directly connect to the network or needs to establish a secure connection. By dialing into the network, the user can access the resources and services provided by the network.

    Rate this question:

  • 4. 

    Why is a call back used?

    • A.

      Dial a network device to call back

    • B.

      To make calls

    • C.

      To send out signals

    Correct Answer
    A. Dial a network device to call back
    Explanation
    A call back is used to dial a network device and establish a connection. This can be useful in situations where a network device needs to initiate communication with another device or when a device needs to reconnect after a previous connection was lost. By using a call back, the network device can automatically dial the desired device and establish a connection without requiring manual intervention.

    Rate this question:

  • 5. 

    Where is handshaking found?

    • A.

      On phones

    • B.

      On WAN systems

    • C.

      On routers

    Correct Answer
    B. On WAN systems
    Explanation
    Handshaking is a process that establishes a connection between two devices or systems. It is commonly used in telecommunication networks to ensure proper communication and synchronization between devices. WAN systems, which stands for Wide Area Network systems, are a type of network that connects multiple local area networks (LANs) over a large geographical area. Handshaking is an essential part of establishing and maintaining connections in WAN systems, making it the correct answer.

    Rate this question:

  • 6. 

    How does handshaking work?

    • A.

      Creating Data

    • B.

      Collecting Data

    • C.

      Sending Data

    Correct Answer
    C. Sending Data
    Explanation
    Handshaking is a process in which two devices establish a communication link. It involves a series of steps to ensure that both devices are ready and able to send and receive data. Sending data is one of the key steps in handshaking. Once the devices have exchanged necessary information and agreed upon the communication parameters, they can start transmitting data. This involves the actual transfer of information from one device to another, allowing for effective communication between the devices.

    Rate this question:

  • 7. 

    What is handshaking?

    • A.

      Connection

    • B.

      An automated process

    • C.

      Type of greeting

    Correct Answer
    B. An automated process
    Explanation
    Handshaking refers to an automated process in which two devices or systems establish a connection or exchange information. It is commonly used in computer networks and communication protocols to ensure that both parties are ready and able to communicate effectively. Handshaking involves a series of predefined steps or signals that allow the devices to synchronize and establish a reliable connection. This process is essential for the successful transmission of data and communication between devices.

    Rate this question:

  • 8. 

    Why is handshaking used?

    • A.

      To connect devices

    • B.

      Connect systems over a communication channel

    • C.

      To connect to networks

    Correct Answer
    B. Connect systems over a communication channel
    Explanation
    Handshaking is used to establish a connection between systems over a communication channel. It allows devices to exchange information and negotiate the terms of their communication. During handshaking, systems send and receive signals to confirm their readiness and compatibility for data transmission. This process ensures that both systems are synchronized and ready to exchange data effectively. Handshaking is essential for reliable communication between devices and is commonly used in various networking protocols and interfaces.

    Rate this question:

  • 9. 

    Where are Diskless Networks located?

    • A.

      Office computers

    • B.

      Home computers

    • C.

      Server computers

    Correct Answer
    C. Server computers
    Explanation
    Diskless networks are located on server computers. In a diskless network, the client computers do not have their own local storage devices such as hard drives or solid-state drives. Instead, they rely on a central server to provide them with the necessary operating system and software applications. The server stores all the data and programs, which are accessed by the client computers over the network. This setup allows for centralized management, easier software updates, and reduced hardware costs for the client computers.

    Rate this question:

  • 10. 

    How does Diskless Networks work?

    • A.

      The server works on collecting and storing information

    • B.

      The server serves requests from both the client computer operating systems

    • C.

      The server automatically request and saves data

    Correct Answer
    B. The server serves requests from both the client computer operating systems
    Explanation
    Diskless networks work by having a server that serves requests from both the client computer operating systems. This means that the server is responsible for handling and fulfilling requests from the client computers, whether it is retrieving data or performing other tasks. The server acts as a central hub that manages and coordinates the operations of the client computers, allowing them to operate without the need for local storage devices such as hard drives. This centralized approach offers benefits such as easier management and maintenance of the network, as well as improved security and data integrity.

    Rate this question:

  • 11. 

    Why is the purpose of Diskless Networks?

    • A.

      To work wirelessly with the clients computer

    • B.

      To run computers without disks

    • C.

      Taking control of the clients computer and running it from the server

    Correct Answer
    C. Taking control of the clients computer and running it from the server
    Explanation
    The purpose of Diskless Networks is to take control of the clients' computer and run it from the server. In a diskless network setup, the client computers do not have their own hard disks and instead rely on the server for storage and processing power. This allows for centralized management and control of the client computers, making it easier to deploy updates, manage software, and ensure security.

    Rate this question:

  • 12. 

    What is Diskless Networks?

    • A.

      A computer network with a centralized storage server

    • B.

      A computer network that works wirelessly

    • C.

      A computer network that operates on its own

    Correct Answer
    A. A computer network with a centralized storage server
    Explanation
    Diskless Networks refer to computer networks that do not have local storage on individual computers or devices. Instead, these networks rely on a centralized storage server to store and manage data. This allows for easier management and maintenance of the network, as well as improved security and data backup capabilities. By eliminating the need for local storage, diskless networks can also reduce costs and simplify the deployment of new devices on the network.

    Rate this question:

  • 13. 

    What are Backups – Frequency and types?

    • A.

      A complicated backup system set up on servers

    • B.

      A simple backup system used to save data

    • C.

      A backup system that collects data from PCs and saves it

    Correct Answer
    A. A complicated backup system set up on servers
    Explanation
    The correct answer is "A complicated backup system set up on servers." This suggests that backups are not simple or basic, but rather involve a complex system that is implemented on servers. This implies that the backup process is extensive and comprehensive, ensuring that data is properly protected and preserved.

    Rate this question:

  • 14. 

    Why are the purposes of Backups – Frequency and types?

    • A.

      To collect and save all data from systems and store it in servers

    • B.

      To copy only new data from a system and store it in the server

    • C.

      To copy and delete all the unwanted data from systems

    Correct Answer
    B. To copy only new data from a system and store it in the server
    Explanation
    Backups are created to ensure that data is protected and can be recovered in case of any data loss or system failure. The purpose of backups is to copy only new data from a system and store it in the server. This approach is known as incremental backup, where only the changes made since the last backup are saved. It helps to optimize storage space and reduce the time required for backup operations. By copying only new data, backups can be performed more frequently, ensuring that the most up-to-date information is always available for recovery.

    Rate this question:

  • 15. 

    What are backups – media to use?

    • A.

      Connect systems over a communication channel

    • B.

      The type of device you are backing up you files to

    • C.

      Names of the devices you are backing up the files on

    Correct Answer
    B. The type of device you are backing up you files to
    Explanation
    The correct answer is the type of device you are backing up your files to. This answer explains that backups refer to the media or device that is used to store or save copies of files. It implies that backups can be made to various devices such as external hard drives, cloud storage, or even tapes.

    Rate this question:

  • 16. 

    Why are the purposes of backups – media to use?

    • A.

      To use them to back up you files safely do that they are not lost

    • B.

      Help you to decide which files should be backed up

    • C.

      Used to update data that has beed backed up

    Correct Answer
    A. To use them to back up you files safely do that they are not lost
    Explanation
    The purpose of backups is to use them as a means to safely back up your files so that they are not lost. Backups serve as a form of protection against data loss, ensuring that important files are stored in a secure location. By regularly creating backups, you can prevent the risk of losing valuable information due to hardware failure, accidental deletion, or other unforeseen events.

    Rate this question:

  • 17. 

    What are Audit Logs?

    • A.

      Files that are used to store unwanted data from the database

    • B.

      Files that are used to store access data from the database

    • C.

      Audit logs are files containing a summary of major changes in the database

    Correct Answer
    C. Audit logs are files containing a summary of major changes in the database
    Explanation
    Audit logs are files that store a summary of major changes in the database. These logs provide a record of activities such as modifications, deletions, or additions to the database. By reviewing the audit logs, administrators can track and monitor any unauthorized or suspicious activities, ensuring data integrity and security. Additionally, audit logs can be used for compliance purposes, as they provide a historical trail of actions taken in the database, which can be useful for investigations or audits.

    Rate this question:

  • 18. 

    Why is the purpose of Audit Logs?

    • A.

      To alert the users of any deleted information within the database

    • B.

      To keep all the information on any new major updates that have taken place within a database

    • C.

      To update the users of changes within the database

    Correct Answer
    B. To keep all the information on any new major updates that have taken place within a database
    Explanation
    The purpose of Audit Logs is to keep track of any new major updates that have occurred within a database. It allows users to have a record of all the changes made, providing transparency and accountability. This helps in identifying any unauthorized or suspicious activities, ensuring data integrity and security. Audit Logs also serve as a valuable resource for troubleshooting and investigating any issues that may arise within the database.

    Rate this question:

  • 19. 

    What is VPN?

    • A.

      Virtual protection network

    • B.

      Visual preventing network

    • C.

      A virtual private network

    Correct Answer
    C. A virtual private network
    Explanation
    A virtual private network (VPN) is a technology that allows users to create a secure and encrypted connection over a public network, such as the internet. It enables users to access and transmit data privately and securely, even when connected to an untrusted network. VPNs are commonly used by individuals and organizations to protect their online privacy, bypass censorship and geolocation restrictions, and secure their sensitive data from unauthorized access.

    Rate this question:

  • 20. 

    What is the purpose VPN?

    • A.

      Uses the Internet to provide remote offices with secure access to their organization's network

    • B.

      Help to connect long distance wireless networks

    • C.

      Connects the internet to local areas

    Correct Answer
    A. Uses the Internet to provide remote offices with secure access to their organization's network
    Explanation
    A VPN, or Virtual Private Network, is designed to provide secure access to an organization's network for remote offices. It achieves this by utilizing the Internet as a medium for connecting remote locations securely. This allows employees or users in different locations to access the organization's network resources and information in a secure manner, ensuring confidentiality and data protection. VPNs are commonly used to establish secure connections over public networks, such as the Internet, and enable remote workers to access company resources as if they were physically present in the office.

    Rate this question:

  • 21. 

    What is Intruder detection?

    • A.

      Alerting the user when there are intruders

    • B.

      Intruder detection is the art of detecting intruders behind attacks

    • C.

      Detecting thieves

    Correct Answer
    B. Intruder detection is the art of detecting intruders behind attacks
    Explanation
    Intruder detection refers to the process of identifying and detecting individuals who are attempting unauthorized access or malicious activities within a system or network. It involves monitoring and analyzing various indicators and patterns to identify potential intrusions or attacks. By detecting these intruders, organizations can take appropriate actions to prevent further damage and protect their systems and data from potential threats.

    Rate this question:

  • 22. 

    Why is the purpose of Intruder detection?

    • A.

      To stop thieves from stealing your goods.

    • B.

      To stop thieves from entering you house

    • C.

      Intruder detection tries to identify the person behind an attack by analyzing their computational behaviour

    Correct Answer
    C. Intruder detection tries to identify the person behind an attack by analyzing their computational behaviour
    Explanation
    The purpose of intruder detection is to identify the person behind an attack by analyzing their computational behavior. This means that it focuses on detecting and analyzing the actions and patterns of potential intruders in order to identify and prevent any malicious activity. By understanding the behavior of attackers, organizations can take appropriate measures to protect their systems and data from unauthorized access or damage.

    Rate this question:

  • 23. 

    What is Passwords – safety?

    • A.

      Having a password that is strong

    • B.

      Creating a password with 8 characters with at least 1 number in both upper & lowercase

    • C.

      Creating a password to stop people from using your PC

    Correct Answer
    B. Creating a password with 8 characters with at least 1 number in both upper & lowercase
    Explanation
    Creating a password with 8 characters with at least 1 number in both upper and lowercase is considered safe because it increases the complexity of the password, making it harder for hackers to guess or crack. The combination of upper and lowercase letters along with numbers adds variety and makes the password less predictable. This helps to protect personal information and prevent unauthorized access to devices or accounts.

    Rate this question:

  • 24. 

    Why is the purpose of Passwords – safety?

    • A.

      To make you password more secure so that it will be harder to hard or decrypt for hackers

    • B.

      To protect computers from hackers

    • C.

      To help you to stop hacking on your computer

    Correct Answer
    A. To make you password more secure so that it will be harder to hard or decrypt for hackers
    Explanation
    Passwords are used for safety purposes in order to make them more secure and difficult for hackers to crack or decrypt. By creating strong and complex passwords, it becomes harder for hackers to gain unauthorized access to personal accounts or sensitive information. This helps in protecting individuals and their computers from potential hacking attempts.

    Rate this question:

  • 25. 

     What are Passwords – strengths?

    • A.

      To show the user if their password is long enough

    • B.

      The strengths of your password is measured as Weak, Medium or Strong

    • C.

      To help the user to choose the Wright type of password

    Correct Answer
    B. The strengths of your password is measured as Weak, Medium or Strong
    Explanation
    The given answer explains that passwords are measured in terms of their strength, which can be categorized as weak, medium, or strong. This measurement helps users understand the level of security their password provides. The purpose of this is to assist users in selecting the appropriate type of password to enhance their account security.

    Rate this question:

  • 26. 

    Why are the purposes of Passwords – strengths?

    • A.

      To make the password strong so that it will be harder for hackers to decrypt it

    • B.

      To show the user how strong their password is so that they know it will be strong enough to protect their private data and information

    • C.

      To stop hacking from hackers

    Correct Answer
    B. To show the user how strong their password is so that they know it will be strong enough to protect their private data and information
    Explanation
    The purpose of passwords is to show the user how strong their password is so that they know it will be strong enough to protect their private data and information. This is important because a strong password is harder for hackers to decrypt, increasing the security of the user's data. By displaying the strength of the password, users can assess whether their chosen password meets the necessary criteria for protecting their sensitive information.

    Rate this question:

  • 27. 

     What are Levels of access, data, and system?

    • A.

      Not giving any rights to the user

    • B.

      Giving all the power to the user

    • C.

      How much rights the administrator has and how much rights the user have

    Correct Answer
    C. How much rights the administrator has and how much rights the user have
    Explanation
    The correct answer is "How much rights the administrator has and how much rights the user have." This answer accurately explains that levels of access, data, and system refer to the extent of rights and privileges granted to the administrator and the user. It implies that the levels determine the amount of control and authority each party has over the system and its data.

    Rate this question:

  • 28. 

    What is the purpose of Levels of access, data, system?

    • A.

      To restrict the user from deleting files

    • B.

      To stop user from having too much control over their accounts e.g. changing screen resolution

    • C.

      To allow the user to do anything they want

    Correct Answer
    B. To stop user from having too much control over their accounts e.g. changing screen resolution
    Explanation
    The purpose of levels of access, data, system is to stop the user from having too much control over their accounts, such as changing screen resolution. It is designed to limit the user's privileges and prevent them from making unauthorized changes or accessing sensitive information. By implementing levels of access, data, system, organizations can maintain security and ensure that users only have the necessary permissions to perform their tasks without compromising the system's integrity.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 07, 2011
    Quiz Created by
    Humpz123
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.