Multiple Network Security Questions And Answers!

28 Questions | Total Attempts: 143

SettingsSettingsSettings
Please wait...
Network Security Quizzes & Trivia

This is a network quiz. Choose your answers from the next multiple answer questions.


Questions and Answers
  • 1. 
    Call back is?
    • A. 

      Pre-configured

    • B. 

      Even number

    • C. 

      Odd number

  • 2. 
    Where is call back used?
    • A. 

      On phones

    • B. 

      On dial-up systems

    • C. 

      On computers

  • 3. 
    What does call back do?
    • A. 

      Dial into a network

    • B. 

      Dial into a phone

    • C. 

      Dial into a computer

  • 4. 
    Why is a call back used?
    • A. 

      Dial a network device to call back

    • B. 

      To make calls

    • C. 

      To send out signals

  • 5. 
    Where is handshaking found?
    • A. 

      On phones

    • B. 

      On WAN systems

    • C. 

      On routers

  • 6. 
    How does handshaking work?
    • A. 

      Creating Data

    • B. 

      Collecting Data

    • C. 

      Sending Data

  • 7. 
    What is handshaking?
    • A. 

      Connection

    • B. 

      An automated process

    • C. 

      Type of greeting

  • 8. 
    Why is handshaking used?
    • A. 

      To connect devices

    • B. 

      Connect systems over a communication channel

    • C. 

      To connect to networks

  • 9. 
    Where are Diskless Networks located?
    • A. 

      Office computers

    • B. 

      Home computers

    • C. 

      Server computers

  • 10. 
    How does Diskless Networks work?
    • A. 

      The server works on collecting and storing information

    • B. 

      The server serves requests from both the client computer operating systems

    • C. 

      The server automatically request and saves data

  • 11. 
    Why is the purpose of Diskless Networks?
    • A. 

      To work wirelessly with the clients computer

    • B. 

      To run computers without disks

    • C. 

      Taking control of the clients computer and running it from the server

  • 12. 
    What is Diskless Networks?
    • A. 

      A computer network with a centralized storage server

    • B. 

      A computer network that works wirelessly

    • C. 

      A computer network that operates on its own

  • 13. 
    What are Backups – Frequency and types?
    • A. 

      A complicated backup system set up on servers

    • B. 

      A simple backup system used to save data

    • C. 

      A backup system that collects data from PCs and saves it

  • 14. 
    Why are the purposes of Backups – Frequency and types?
    • A. 

      To collect and save all data from systems and store it in servers

    • B. 

      To copy only new data from a system and store it in the server

    • C. 

      To copy and delete all the unwanted data from systems

  • 15. 
    What are backups – media to use?
    • A. 

      Connect systems over a communication channel

    • B. 

      The type of device you are backing up you files to

    • C. 

      Names of the devices you are backing up the files on

  • 16. 
    Why are the purposes of backups – media to use?
    • A. 

      To use them to back up you files safely do that they are not lost

    • B. 

      Help you to decide which files should be backed up

    • C. 

      Used to update data that has beed backed up

  • 17. 
    What are Audit Logs?
    • A. 

      Files that are used to store unwanted data from the database

    • B. 

      Files that are used to store access data from the database

    • C. 

      Audit logs are files containing a summary of major changes in the database

  • 18. 
    Why is the purpose of Audit Logs?
    • A. 

      To alert the users of any deleted information within the database

    • B. 

      To keep all the information on any new major updates that have taken place within a database

    • C. 

      To update the users of changes within the database

  • 19. 
    What is VPN?
    • A. 

      Virtual protection network

    • B. 

      Visual preventing network

    • C. 

      A virtual private network

  • 20. 
    What is the purpose VPN?
    • A. 

      Uses the Internet to provide remote offices with secure access to their organization's network

    • B. 

      Help to connect long distance wireless networks

    • C. 

      Connects the internet to local areas

  • 21. 
    What is Intruder detection?
    • A. 

      Alerting the user when there are intruders

    • B. 

      Intruder detection is the art of detecting intruders behind attacks

    • C. 

      Detecting thieves

  • 22. 
    Why is the purpose of Intruder detection?
    • A. 

      To stop thieves from stealing your goods.

    • B. 

      To stop thieves from entering you house

    • C. 

      Intruder detection tries to identify the person behind an attack by analyzing their computational behaviour

  • 23. 
    What is Passwords – safety?
    • A. 

      Having a password that is strong

    • B. 

      Creating a password with 8 characters with at least 1 number in both upper & lowercase

    • C. 

      Creating a password to stop people from using your PC

  • 24. 
    Why is the purpose of Passwords – safety?
    • A. 

      To make you password more secure so that it will be harder to hard or decrypt for hackers

    • B. 

      To protect computers from hackers

    • C. 

      To help you to stop hacking on your computer

  • 25. 
     What are Passwords – strengths?
    • A. 

      To show the user if their password is long enough

    • B. 

      The strengths of your password is measured as Weak, Medium or Strong

    • C. 

      To help the user to choose the Wright type of password

  • 26. 
    Why are the purposes of Passwords – strengths?
    • A. 

      To make the password strong so that it will be harder for hackers to decrypt it

    • B. 

      To show the user how strong their password is so that they know it will be strong enough to protect their private data and information

    • C. 

      To stop hacking from hackers

  • 27. 
     What are Levels of access, data, and system?
    • A. 

      Not giving any rights to the user

    • B. 

      Giving all the power to the user

    • C. 

      How much rights the administrator has and how much rights the user have

  • 28. 
    What is the purpose of Levels of access, data, system?
    • A. 

      To restrict the user from deleting files

    • B. 

      To stop user from having too much control over their accounts e.g. changing screen resolution

    • C. 

      To allow the user to do anything they want