0% found this document useful (0 votes)
3K views11 pages

MCQ Questions For BCA 6 Semester

This document contains 25 multiple choice questions about computer network security for a 6th semester BCA exam. The questions cover topics like introduction to computer networks, network security, Kerberos authentication, X.509 certificates, and the IPsec architecture. Specifically, there are questions about network security management, the roles of network administrators, encryption, data integrity, authentication, non-repudiation, security attacks, and the protocols and services used in the IPsec architecture like ESP and AH.

Uploaded by

Sarang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views11 pages

MCQ Questions For BCA 6 Semester

This document contains 25 multiple choice questions about computer network security for a 6th semester BCA exam. The questions cover topics like introduction to computer networks, network security, Kerberos authentication, X.509 certificates, and the IPsec architecture. Specifically, there are questions about network security management, the roles of network administrators, encryption, data integrity, authentication, non-repudiation, security attacks, and the protocols and services used in the IPsec architecture like ESP and AH.

Uploaded by

Sarang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Knowachiever - Always be ahead with us.

MCQ Questions for BCA 6 Semester

Knowachiever

https://knowachiever.in/
Knowachiever - Always be ahead with us.

BCA MCQ Questions For 6 Semester


Students

Computer Network Security

Introduction to Computer Network (Unit 1)

1 What consists of steps done by the company or certain organizations


to monitor and prevent illegal access from outside intruders?
Ans. Computer network security
2 What are different requirements based on the size of the computer
network?
Ans. Varying approaches to computer network security management
3 What type of office requires simple network security?
Ans. Home office
4 Who oversees access to the data and software on the network?
Ans. The network Administrator
5 What does the network administrator oversee access to the data and
software on the network?
Ans. A network administrator assigns the user ID and password to the
authorized person
6 What are the desirable properties to establish secure communication
Computer Network Introduction to Computer Network Unit 1 5 Privacy
Privacy?
Ans. Aspects of Network Security Following
7 What should the sent message be sent exclusively to?
Ans. The designated receiver
8 What is a necessity to encrypt the transmission so that the message
cannot be intercepted?
Ans. Only the sender and receiver should interpret the transmitted message
as eavesdroppers can intercept the communication
9 What is a necessity to do so that the message cannot be intercepted?
Ans. Encrypt the transmission
10 What is secrecy often employed?
Ans. To establish secure communication
11 What type of data integrity means that the data must arrive at the
recipient exactly as delivered?
Ans. Message Integrity

https://knowachiever.in/
Knowachiever - Always be ahead with us.

12 What does Message Integrity mean that the data must arrive at the
recipient exactly as delivered? No modifications in the data content
during transmission
13 What means that the data must arrive at the recipient exactly as
delivered?
Ans. Data integrity
14 What must the data integrity be protected for?
Ans. Secure transmission
15 What means that the recipient is confident of the sender s identity?
Ans. Endpoint authentication Authentication
16 Who delivered the message?
Ans. Impostor
17 What implies that the receiver must show that the received message
has originated from a specific sender?
Ans. NonRepudiation
18 What does NonRepudiation mean that the receiver must show that the
received message originated from a specific sender?
Ans. The sender shall not deny sending a communication that he or she sent
19 Who must show that the received message originated from a specific
sender?
Ans. The receiver
20 What does the bank have a piece of evidence that the customer has
requested for the transaction?
Ans. If a client submits a request to transfer the money from one account to
another account
21 What are unlawful acts against private, corporate or governmental IT
assets?
Ans. Attack Network security assaults
22 What are networks exposed to as more companies enable employees
to access data from mobile devices?
Ans. Data theft or total loss of the data or network
23 What does a network attack attempt to obtain unauthorized access to
an organization s network to do?
Ans. Steal data
24 What is the primary type of network attacks?
Ans. When sensitive information is filtered and watched
25 Who obtains access to a network and monitor or steal critical
information without making any modification to the data?
Ans. Passive Attackers
26 What type of attack is when information is changed by a hacker or
deleted entirely?
Ans. Active
27 What does Active Attackers do?
https://knowachiever.in/
Knowachiever - Always be ahead with us.

Ans. Change data


28 What is a mechanism meant to detect, prevent, or recover from a
security attack?
Ans. Security Mechanism and service Security Mechanism
29 What is a service that increases the security of data processing
systems?
Ans. Security Service

Network Security (Unit 2)

1 What secures your network and data against breaches, attacks and
other threats?
Ans. Network Security
2 What is Network Security a wide and encompassing word that
encompasses about network use, accessibility, and overall threat prevention?

Ans. Hardware and software solutions and procedures or rules and


configurations
3 What type of security endpoint does Network Security include?
Ans. Network analytics
4 What is a wide and encompassing word that includes access control,
virus and antivirus software, application security, network analytics, forms
of networkrelated security end
Ans. Security
5 What does this paper explain how to increase the security of a network?
Ans. Authentication apps
6 What does Kerberos provide?
Ans. A centralized authentication server
7 What does Kerberos make no use of?
Ans. Publickey encryption
8 What is Authentication server and Database used for in Kerberos?
Ans. Client authentication
9 What is Kerberos' third party server known as?
Ans. Key Distribution Center KDC
10 What is each User and service on the network?
Ans. A principle
11 What is the primary component of Kerberos?
Ans. Authentication Server
12 What database validates access permissions of users in?
Ans. Database
13 What is the name of the server that issues access permissions in
Database?
Ans. Ticket Granting Server TGS
https://knowachiever.in/
Knowachiever - Always be ahead with us.

14 What is the Overview of Step1 User login and request services on the
host?
Ans. Ticket for the Server Kerberos
15 What does the User ask for?
Ans. Ticketgranting service
16 What validates the User's access right using Database?
Ans. Step2 Authentication Server
17 How are results encrypted?
Ans. Password of the User
18 Step3 The message decryption is done using what?
Ans. The password
19 What does the Ticket contain?
Ans. Authenticators
20 What is the name of the server that validates the User's access right?

Ans. Ticket Granting Server


21 What does Step5 Ticket Granting Server do?
Ans. The User transmits the Ticket and Authenticator to the Server
22 What is a digital certificate that provides information about the identity
to which a certificate is issued and the identity that issued it?
Ans. X.509 certificate
23 What does an X.509 certificate provide?
Ans. An X.509 certificate provides information about the identity to which a
certificate is issued and the identity that issued it
24 What does the X.509 version provide the certificate with?
Ans. Serial number

IP Security Architecture(Unit 3)
1 IPsec provides cryptographic protection for IP datagrams in which
packets?
Ans. IPv4 and IPv6 network packets
2 What is replay protection?
Ans. Partial sequence integrity
3 What is partial sequence integrity also known as?
Ans. Replay protection
4 IPsec is performed what?
Ans. Inside the IP module
5 What is a cryptographic protection for IP datagrams in IPv4 and IPv6
network packets?
Ans. IPsec
6 What architecture employs two protocols to protect the traffic or data
flow?
Ans. IPSec IP Security architecture
https://knowachiever.in/
Knowachiever - Always be ahead with us.

7 What two protocols are used to protect the traffic or data flow?
Ans. ESP Encapsulation Security Payload and AH Authentication Header
Authentication Header
8 What does IPSec Architecture contain?
Ans. Protocols, algorithms, DOI, and Key Management
9 What are the three major services of IP Security architecture?
Ans. Confidentiality Authentication Integirity IP Security Architecture IP
Security Architecture
10 What includes the broad ideas, terminology, protocols, algorithms and
security requirements of IP Security technology?
Ans. Architecture Architecture or IP Security Architecture
11 What gives the secrecy service?
Ans. ESP Protocol ESP Encapsulation Security Payload
12 What is ESP Encapsulation Security Payload implemented in either two
ways?
Ans. ESP with optional Authentication
13 What is ESP with?
Ans. Authentication
14 What is the IP Security Parameter Index SPI used in?
Ans. Security Association
15 What is the Sequence Number used to provide to the connection built
between the Client and Server?
Ans. Unique number
16 What is allotted to every packet so that at the receiver side, packages
can be arranged properly?
Ans. Sequence Number Unique Sequence numbers
17 What is the name of the data that is used in IPv4 and IPv6 network
packets?
Ans. Payload Data
18 What does the Payload data mean?
Ans. Accurate data or the actual message
19 What format is the Payload data in?
Ans. Encrypted format
20 What is the size of the extra bits of space in the original message?
Ans. Padding Extra bits of space added to the original message to maintain
confidentiality
21 What is the size of extra bits of space added to the original message?

Ans. Padding length


22 What signifies the next payload or following accurate data?
Ans. Next Header Next header
23 What format is Authentication Data optional?
Ans. ESP protocol packet format
https://knowachiever.in/
Knowachiever - Always be ahead with us.

24 What is the document that describes various encryption methods used


for Encapsulation Security Payload?
Ans. Encryption algorithm
25 What does AH Protocol AH Authentication Header Protocol provide?
Ans. Authentication and Integrity
26 Authentication Header Protocol provides both Authentication and what
service?
Ans. Integrity
27 What is an Authentication Header?
Ans. IP Security Architectureunit 3 i IP Security Architecture Unit 3 7
28 What is a protocol within the Internet Protocol Security IPSec suite?
Authentication Headers
29 What does an Authentication Header consist of when a datagram is
transmitted via the internet?
Ans. A prefix characterizing and identifying the packet being sent
30 What is a part of the Internet Protocol Security IPsec collection of
protocols that encrypt and authenticate packets of data?
Ans. Encapsulating Security Payload ESP

Web Security (Unit 4)

1 What does web security refer to?


Ans. Preventive measures and processes
2 What is Web security essential to?
Ans. Business continuity
3 What is Web security also known as?
Ans. Cybersecurity
4 What does Cybersecurity mean?
Ans. Detecting, preventing, and responding to cyberattacks
5 What is a security protocol that offers privacy, authentication, and
integrity to Internet communications?
Ans. Secure Sockets Layer SSL SSL
6 When did Netscape create SSL?
Ans. 1995
7 What is the precursor of the current TLS encryption used today?
Ans. SSL
8 What does a website that uses SSL TLS have in its URL instead of HTTP?

Ans. HTTPS
9 What was SSL later developed into?
Ans. Transport Layer Security TLS
10 What does SSL TLS do to guarantee a high degree of privacy?
Ans. SSL encrypts data that is transferred across the web
https://knowachiever.in/
Knowachiever - Always be ahead with us.

11 What does SSL TLS mean?


Ans. Anyone who tries to intercept this data will only see a messy
combination of virtually complex characters to decipher
12 What does SSL begin an authentication procedure called to confirm
that both devices are actually who they claim to be?
Ans. A handshake between two communicating devices
13 What does SSL digitally sign data?
Ans. To guarantee data integrity
14 How many versions of SSL are more secure than the last?
Ans. Several
15 When was SSL upgraded to become TLS?
Ans. 1999
16 Where was material on the Web delivered?
Ans. In plaintext
17 What happened to a customer if they visited a shopping website,
placed a purchase, and put their credit card number on the page?
Ans. Intercepted the transmission
18 What happens if a customer visited a shopping website, placed a
purchase, and put their credit card number on the page?
Ans. Unconcealed
19 What was designed to protect user privacy by encrypting all data that
passes between a user and a web server?
Ans. SSL
20 What does SSL assure anyone who intercepts the data can only see?
Ans. Jumbled mass of characters
22 Where is the consumer's credit card number now accessible?
Ans. The shopping website where they submitted it
23 What does SSL stop attackers from interfering with data in transit?
Ans. Tamperproof seal on a medication container
24 What is a widely used protection technology designed to improve
privacy and data security for communications over the Internet?
Ans. Transport Layer Security
25 What is a typical approach for developing secure online apps?
Ans. Implementing TLS
26 What is a key use case of TLS?
Ans. Encrypting the communication between online applications and servers
27 What can TLS encrypt other communications such as email, texting,
and voice over?
Ans. IP VoIP VoIP
28 What is the importance of TLS?
Ans. Web application security
29 When was the first version of TLS released?
Ans. 1999
https://knowachiever.in/
Knowachiever - Always be ahead with us.

30 In what year was TLS 1.3 published?


Ans. 2018
31 What is the most recent version of TLS?
Ans. TLS 1.3
Network Management System (Unit 5)

1 What is a computer networking system strategy to ensure the security


of its organization assets, software and hardware resources?
Ans. Network security
2 What does the word network security stress on?
Ans. Monitoring and regulating of unauthorized access, abuse and any
undesired change in the networking system
3 What is the most frequent authentication procedure performed
worldwide?
Ans. Assign an exclusive user ID and password to the user
4 How many devices does Simple Network Management Protocol SNMP
have?
Ans. 1000 devices
5 What is an application layer protocol that uses UDP port number 161
162?
Ans. Simple Network Management Protocol SNMP
6 What is the name of the application layer protocol used by Simple
Network Management Protocol SNMP?
Ans. UDP port number 161 162
7 What is used to monitor the network, identify network issues, and
sometimes even set up distant devices?
Ans. SNMP
8 What is SNMP Manager?
Ans. Centralized system
9 What is a software management software module placed on a
controlled device?
Ans. Network Management Station NMS 2.SNMP agent
10 What are managed devices?
Ans. PC, routers, switches, servers
11 What is a structured hierarchically structured information about
resources that are to be managed?
Ans. Management Information Base MIB
12 What is the information about resources that are to be managed?
Ans. Structured hierarchically
13 What is the SNMP information base MIB?
Ans. Objects instances
14 What is the name of SNMP management that sends the message to
request data from the SNMP agent?
https://knowachiever.in/
Knowachiever - Always be ahead with us.

Ans. GetRequest
15 How is GetRequest SNMP management used?
Ans. Retrieve data
16 Who can request data continuously until no more data is left?
Ans. SNMP agents
17 What does the SNMP agent respond to?
Ans. Response message
18 How can a message be delivered to a SNMP agent?
Ans. To determine what data is available on an SNMP agent
19 What can the SNMP manager do in this approach?
Ans. Gain knowledge of all the accessible data on the SNMP agent
20 What is used to obtain big data at once by the SNMP manager from the
SNMP agent?
Ans. GetBulkRequest
21 In what document is the InformRequest introduced?
Ans. SNMPv2c
22 What is SetRequest used by the SNMP manager to do?
Ans. Set the value of an object instance on the SNMP agent
23 What is a message sent by?
Ans. An agent
24 When sent in response to what message, it will include the data sought?

Ans. Get messages


25 When sent in response to Get messages, it will contain the newly set
value as confirmation that the value has been set?
Ans. Set
26 Who requests a trap message from a SNMP agent?
Ans. The management
27 When is the message sent by the agent issued?
Ans. When a problem has occurred
28 What is SNMPv2c used to detect?
Ans. If the trap message has been received by the management or not
29 What can the agents be programmed to do until it receives an Inform
message?
Ans. Set trap continually
30 What does SNMPv2c include?
Ans. An acknowledgement that the trap doesn t offer
31 What determines the kind of security algorithm applied on SNMP
packets?
Ans. SNMP security tiers
32 What is the name of the security tiers used on SNMP packets?
Ans. SNMPv3
33 What is the security level of SNMP packets?
https://knowachiever.in/
Knowachiever - Always be ahead with us.

Ans. Community string


34 What is the security level authentication?
Ans. HMAC with Md5

https://knowachiever.in/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy