Test Series - computer fundamental

Test Number 92/95

Q: The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
A. Artificial Intelligence
B. ML
C. Network Security
D. IT
Solution: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and communications among business and government agencies etc.
Q: Network Security provides authentication and access control for resources.
A. True
B. False
C. none
D. .
Solution: The statement is true. AFS is an example. It helps us protect vital information.
Q: Which is not an objective of network security?
A. Identification
B. Authentication
C. Access control
D. Lock
Solution: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.
Q: Which of these is a part of network identification?
A. UserID
B. Password
C. OTP
D. fingerprint
Solution: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.
Q: The process of verifying the identity of a user.
A. Authentication
B. Identification
C. Validation
D. Verification
Solution: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.
Q: A concern of authentication that deals with user rights.
A. General access
B. Functional authentication
C. Functional authorization
D. Auto verification
Solution: Functional authorization is concerned with individual user rights. Authorization is the function of specifying access rights to resources related to information security.
Q: CHAP stands for?
A. Challenge Handshake authentication protocol
B. Challenge Hardware authentication protocol
C. Circuit Hardware authentication protocol
D. Circuit Handshake authentication protocol
Solution: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.
Q: Security features that control that can access resources in the OS.
A. Authentication
B. Identification
C. Validation
D. Access control
Solution: Access control refers to the security features. Applications call access control to provide resources.
Q: An algorithm in encryption is called _____________
A. Algorithm
B. Procedure
C. Cipher
D. Module
Solution: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for performing encryption or decryption
Q: The information that gets transformed in encryption is ____________
A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Solution: The text that gets transformed is called plain text. The algorithm used is called cipher.
Q: The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
A. Artificial Intelligence
B. ML
C. Network Security
D. IT
Solution: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and communications among business and government agencies etc.
Q: Network Security provides authentication and access control for resources.
A. True
B. False
C. none
D. .
Solution: The statement is true. AFS is an example. It helps us protect vital information.
Q: Which is not an objective of network security?
A. Identification
B. Authentication
C. Access control
D. Lock
Solution: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.
Q: Which of these is a part of network identification?
A. UserID
B. Password
C. OTP
D. fingerprint
Solution: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.
Q: The process of verifying the identity of a user.
A. Authentication
B. Identification
C. Validation
D. Verification
Solution: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.
Q: A concern of authentication that deals with user rights.
A. General access
B. Functional authentication
C. Functional authorization
D. Auto verification
Solution: Functional authorization is concerned with individual user rights. Authorization is the function of specifying access rights to resources related to information security.
Q: CHAP stands for?
A. Challenge Handshake authentication protocol
B. Challenge Hardware authentication protocol
C. Circuit Hardware authentication protocol
D. Circuit Handshake authentication protocol
Solution: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.
Q: Security features that control that can access resources in the OS.
A. Authentication
B. Identification
C. Validation
D. Access control
Solution: Access control refers to the security features. Applications call access control to provide resources.
Q: An algorithm in encryption is called _____________
A. Algorithm
B. Procedure
C. Cipher
D. Module
Solution: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for performing encryption or decryption
Q: The information that gets transformed in encryption is ____________
A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Solution: The text that gets transformed is called plain text. The algorithm used is called cipher.

You Have Score    /20