0% found this document useful (0 votes)
527 views

Computer Fundamentals Questions and Answers

This document contains 10 multiple choice questions and explanations about network security fundamentals. Network security covers both private and public computer networks used for everyday jobs like business transactions. It provides authentication and access control to protect vital information. Identification, authentication, and access control are objectives of network security, while "lock" is not. User ID is part of identification. Authentication verifies a user's identity using methods like passwords, smart cards, or fingerprints. Functional authorization deals with individual user rights. CHAP stands for Challenge Handshake Authentication Protocol. Access control refers to security features that control resource access in operating systems. Encryption algorithms are called ciphers, and the original unencrypted text is called plaintext.

Uploaded by

L Revathi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
527 views

Computer Fundamentals Questions and Answers

This document contains 10 multiple choice questions and explanations about network security fundamentals. Network security covers both private and public computer networks used for everyday jobs like business transactions. It provides authentication and access control to protect vital information. Identification, authentication, and access control are objectives of network security, while "lock" is not. User ID is part of identification. Authentication verifies a user's identity using methods like passwords, smart cards, or fingerprints. Functional authorization deals with individual user rights. CHAP stands for Challenge Handshake Authentication Protocol. Access control refers to security features that control resource access in operating systems. Encryption algorithms are called ciphers, and the original unencrypted text is called plaintext.

Uploaded by

L Revathi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Computer Fundamentals Questions and

Answers – Network Security


1. The field that covers a variety of computer networks, both public
and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT

Answer: c
Explanation: Network security covers a variety of computer networks,
both private and public. Everyday jobs like conducting transactions and
communications among business and government agencies etc.

2. Network Security provides authentication and access control for


resources.
a) True
b) False

Answer: a
Explanation: The statement is true. AFS is an example. It helps us
protect vital information.

3. Which is not an objective of network security?


a) Identification
b) Authentication
c) Access control
d) Lock

Answer: d
Explanation: The Identification, Authentication and Access control are
the objectives of network security. There is no such thing called lock.
4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
Answer: a
Explanation: The answer is UserID. UserID is a part of identification.
UserID can be a combination of username, user student number 

5. The process of verifying the identity of a user.


a) Authentication
b) Identification
c) Validation
d) Verification

Answer: a
Explanation: It is called an authentication. It is typically based on
passwords, smart card, fingerprint, etc.

6. A concern of authentication that deals with user rights.


a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification

Answer: c
Explanation: Functional authorization is concerned with individual user
rights. Authorization is the function of specifying access rights to
resources related to information security.

7. CHAP stands for?


a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol

Answer: a
Explanation: CHAP stands for Challenge Handshake authentication
protocol. Features of CHAP: plaintext, memorized token. Protocol uses
Telnet, HTTP.

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control

Answer: d
Explanation: Access control refers to the security features. Applications
call access control to provide resources.

9. An algorithm in encryption is called _____________


a) Algorithm
b) Procedure
c) Cipher
d) Module

Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher.
cipher is an algorithm for performing encryption or decryption
10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text

Answer: a
Explanation: The text that gets transformed is called plain text. The
algorithm used is called cipher.

You might also like