Computer Fundamentals Questions and Answers
Computer Fundamentals Questions and Answers
Answer: c
Explanation: Network security covers a variety of computer networks,
both private and public. Everyday jobs like conducting transactions and
communications among business and government agencies etc.
Answer: a
Explanation: The statement is true. AFS is an example. It helps us
protect vital information.
Answer: d
Explanation: The Identification, Authentication and Access control are
the objectives of network security. There is no such thing called lock.
4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
Answer: a
Explanation: The answer is UserID. UserID is a part of identification.
UserID can be a combination of username, user student number
Answer: a
Explanation: It is called an authentication. It is typically based on
passwords, smart card, fingerprint, etc.
Answer: c
Explanation: Functional authorization is concerned with individual user
rights. Authorization is the function of specifying access rights to
resources related to information security.
Answer: a
Explanation: CHAP stands for Challenge Handshake authentication
protocol. Features of CHAP: plaintext, memorized token. Protocol uses
Telnet, HTTP.
8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
Answer: d
Explanation: Access control refers to the security features. Applications
call access control to provide resources.
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher.
cipher is an algorithm for performing encryption or decryption
10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
Answer: a
Explanation: The text that gets transformed is called plain text. The
algorithm used is called cipher.