0% found this document useful (0 votes)
18 views2 pages

audit quiz

Uploaded by

sebycruz16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

audit quiz

Uploaded by

sebycruz16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Multiple Choice Questions 9.

What type of malware spreads through a


1. What is the central component in a Star computer's memory?
Topology network? A. Virus
A. A hub B. Worm
B. A switch C. Trojan Horse
C. A router D. Logic Bomb
D. A bridge 10. What is a hidden entrance into a system
2. In a Hierarchical topology, which type of that bypasses security checks called?
computer controls smaller ones? A. Virus
A. Slave B. Worm
B. Client C. Trojan Horse
C. Master D. Backdoor
D. Node 11. It is a private network within a public
3. What is the main characteristic of a Ring network.
Topology? A. Extranets
A. Centralized control B. Virtual Private Networks
B. Peer-to-peer communication C. Network News Transfer Protocol
C. Hierarchical structure D. Internet Addresses
D. Bus-based transmission 12. This is a password-controlled network for
4. In a Bus Topology, how are devices private users rather than the general public.
connected? A. Extranets
A. To a central hub B. Virtual Private Networks
B. To each other in a ring C. Network News Transfer Protocol
C. To a single cable D. Internet Addresses
D. In a hierarchical structure 13. The three types of addresses for
5. What is the primary advantage of a Client- communications.
Server model? A. E-mail address, URL address, IP address
A. Centralized control B. E-mail address, Web address, URL
B. Reduced network traffic address
C. Increased complexity C. Domain address, Web address, URL
D. Lower security address
6. What is the process of managing network D. Domain address, E-mail address, URL
communication called? address
A. Network Control 14. Individual computers attached to a network
B. Data Transmission – currently represented by a 32-bit data packet.
C. Network Topology A. E-mail address
D. Network Protocol B. Protocols
7. What technique is used to avoid data C. IP address
collisions in a network? D. URL address
A. Polling 15. The most popular protocol for transmitting
B. Token Passing e-mail messages.
C. Carrier Sensing A. Security Protocols
D. All of the above B. Network News Transfer Protocol
8. What is a harmful program that can damage C. Internet Protocols
a computer called? D. Simple network mail protocol
A. Worm 16. Messages are divided into small packets for
B. Virus transmission.
C. Trojan Horse A. File transfer protocols
D. Backdoor B. Packet switching
C. Weak backup procedures
D. Risk of virus infection
17. Rules and standards governing the design ANWER KEYS:
of hardware and software that permit users of
networks. Multiple Choice Questions
A. Protocols 1. A
B. Internet protocols 2. C
C. Security protocols 3. B
D. Mail protocols 4. C
18. Basic protocol that permits communication 5. A.
between Internet sites. 6. D
A. Protocols 7. D
B. Internet protocols 8. B
C. Security protocols 9. B
D. Mail protocols 10. D
19. A document format used to produce Web 11. B
pages. 12. A
A. HTTP 13. A
B. HTML 14. C
C. HTTP-NG 15. D
D. HTTP-LG 16. B
20. Controls Web browsers that access the 17. A
Web. 18. B
A. HTTP 19. B
B. HTML 20. A
C. HTTP-NG
D. HTTP-LG Identification Questions
1. Star Topology
2. Token Passing
Identification Questions 3. Trojan Horse
1. A type of network topology where devices 4. Worm
are connected to a central hub. 5. Logic bomb
2. A technique where a special signal is passed 6. Hypertext transport protocol-next
around a network to control data transmission. generation
3. A harmful program that pretends to be 7. Security sockets layer
legitimate software but contains malicious 8. Wide Area Networks
code. 9. Open system interface
4. A software that replicates itself and spreads 10. Privacy enhanced mail
through a network.
5. A type of malware that activates under
specific conditions.
6. HTTP-NG
7. SSL
8. WAN
9. OSI
10. PEM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy