Bca 6th Sem Internal Exam Network Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lovely Amit
L
Lovely Amit
Community Contributor
Quizzes Created: 3 | Total Attempts: 583
Questions: 15 | Attempts: 189

SettingsSettingsSettings
Bca 6th Sem Internal Exam Network Security - Quiz


Questions and Answers
  • 1. 

    In the SSLv3 the padding bits are ____________ with the secret key.

    • A.

      Padded

    • B.

      XORed

    • C.

      Concatenated

    • D.

      ANDed

    Correct Answer
    A. Padded
    Explanation
    In SSLv3, the padding bits are added to the secret key. Padding is a technique used to ensure that the length of the data being encrypted is a multiple of the block size. By padding the data with additional bits, the secret key is combined with these extra bits to ensure that the length requirement is met. This helps to maintain the security and integrity of the encryption process.

    Rate this question:

  • 2. 

    Which of the following is not a valid input to the PRF in SSLv3?

    • A.

      Secret value

    • B.

      Identifying label

    • C.

      Initialization vector

    • D.

      Secret value

    Correct Answer
    A. Secret value
    Explanation
    The secret value is not a valid input to the PRF in SSLv3 because the PRF (Pseudo-Random Function) in SSLv3 does not take a secret value as an input. The PRF in SSLv3 is used to derive key material from the pre-master secret, which is a combination of the client and server random values. The secret value is not part of this process and therefore cannot be a valid input to the PRF in SSLv3.

    Rate this question:

  • 3. 

    Which of the following alert codes is not supported by SSLv3?

    • A.

      Record_overflow

    • B.

      No_certificate

    • C.

      Internal_error

    • D.

      Decode_error

    Correct Answer
    A. Record_overflow
    Explanation
    The alert code "record_overflow" is not supported by SSLv3. This means that when a record overflow occurs, SSLv3 does not have a specific alert code to handle this situation.

    Rate this question:

  • 4. 

    We encounter the record_overflow error when the payload length exceeds –

    • A.

      214 + 1024

    • B.

      216 + 1024

    • C.

      214 + 2048

    • D.

      216 + 2048

    Correct Answer
    A. 214 + 1024
  • 5. 

    URL stands for –

    • A.

      Universal Remote Locator

    • B.

      Universal Resource Language

    • C.

      Uniform Resource Locator

    • D.

      Uniform Resource Language

    Correct Answer
    A. Universal Remote Locator
  • 6. 

    _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

    • A.

      Network Security

    • B.

      Information Security

    • C.

      Information Security

    • D.

      Physical Security

    Correct Answer
    A. Network Security
    Explanation
    The given correct answer for this question is "Information Security." Information security refers to the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure, or destruction. It involves implementing measures such as encryption, access controls, and firewalls to safeguard sensitive data and prevent it from falling into the wrong hands. Network security, on the other hand, specifically focuses on securing computer networks and the data transmitted through them. While network security is a component of information security, the broader concept encompasses all aspects of protecting valuable information.

    Rate this question:

  • 7. 

    From the options below, which of them is not a threat to information security?

    • A.

      Disaster

    • B.

      Eavesdropping

    • C.

      Information leakage

    • D.

      Unchanged default password

    Correct Answer
    A. Disaster
    Explanation
    A disaster, such as a natural calamity or a physical damage to infrastructure, is not a threat to information security. While it may cause temporary disruption or loss of access to information, it does not directly compromise the confidentiality, integrity, or availability of data. On the other hand, eavesdropping, information leakage, and unchanged default passwords are all potential threats that can lead to unauthorized access, data breaches, or information disclosure.

    Rate this question:

  • 8. 

    The full form of EDR is _______

    • A.

      Endpoint Detection and recovery

    • B.

      Early detection and response

    • C.

      Endpoint Detection and response

    • D.

      Endless Detection and Recovery

    Correct Answer
    A. Endpoint Detection and recovery
    Explanation
    EDR stands for Endpoint Detection and Response. This term refers to a cybersecurity solution that focuses on detecting and responding to advanced threats and attacks on endpoints, such as computers, servers, and mobile devices, within a network. EDR systems continuously monitor and analyze endpoint activities, collect data, and use advanced techniques to detect and respond to suspicious behavior, malware, and other security incidents. By providing real-time visibility and response capabilities, EDR helps organizations improve their security posture and mitigate potential risks.

    Rate this question:

  • 9. 

    Possible threat to any information cannot be ________________

    • A.

      Reduced

    • B.

      Transferred

    • C.

      Protected

    • D.

      Ignored

    Correct Answer
    A. Reduced
    Explanation
    The correct answer is "reduced" because reducing the threat to any information means taking measures to minimize the likelihood or impact of potential risks or dangers. This can involve implementing security measures, such as encryption or firewalls, conducting regular backups, or implementing access controls, to decrease the vulnerability and potential harm to the information.

    Rate this question:

  • 10. 

    How many basic processes or steps are there in ethical hacking?

    • A.

      4

    • B.

      5

    • C.

      6

    • D.

      7

    Correct Answer
    A. 4
    Explanation
    There are four basic processes or steps in ethical hacking. These steps include reconnaissance, scanning, gaining access, and maintaining access. During reconnaissance, the hacker gathers information about the target system. Scanning involves identifying vulnerabilities and weaknesses in the system. Gaining access refers to the process of exploiting these vulnerabilities to gain unauthorized access. Finally, maintaining access involves ensuring continued access to the system for further exploitation or data gathering.

    Rate this question:

  • 11. 

    There are ______ subtypes of reconnaissance.

    • A.

      2

    • B.

      3

    • C.

      4

    • D.

      5

    Correct Answer
    A. 2
    Explanation
    There are two subtypes of reconnaissance.

    Rate this question:

  • 12. 

    To Hide Information Inside A Picture, What Technology Is Used?

    • A.

      Rootkits

    • B.

      Bitmapping

    • C.

      Steganography

    • D.

      Image Rendering

    Correct Answer
    A. Rootkits
  • 13. 

    What Is The Sequence Of A TCP Connection?

    • A.

      SYN-ACK-FIN

    • B.

      SYN-SYN ACK-ACK

    • C.

      SYN-ACK

    • D.

      SYN-SYN-ACK

    Correct Answer
    A. SYN-ACK-FIN
    Explanation
    The correct answer is SYN-ACK-FIN. In a TCP connection, the sequence starts with the SYN (synchronize) packet sent by the client to initiate the connection. The server responds with the SYN-ACK (synchronize-acknowledge) packet to acknowledge the request. Finally, the client sends the FIN (finish) packet to terminate the connection. Therefore, the correct sequence is SYN-ACK-FIN.

    Rate this question:

  • 14. 

    The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?

    • A.

      Availability

    • B.

      Confidentiality

    • C.

      Integrity

    • D.

      Authentication

    Correct Answer
    A. Availability
    Explanation
    The first phase of hacking an IT system is compromising the foundation of security, which is availability. Availability refers to the accessibility and functionality of the system, ensuring that authorized users can access the system and its resources whenever needed. By compromising availability, hackers can disrupt or deny access to the system, causing service interruptions or downtime. This can be achieved through various means such as Distributed Denial of Service (DDoS) attacks, network congestion, or exploiting vulnerabilities in the system's infrastructure.

    Rate this question:

  • 15. 

    What Port Does Telnet Use?

    • A.

      22

    • B.

      80

    • C.

      20

    • D.

      23

    Correct Answer
    A. 22
    Explanation
    Telnet is a network protocol used to establish remote command-line sessions with other computers. It operates on port 23 by default. However, the given correct answer is incorrect. Port 22 is actually used by the SSH (Secure Shell) protocol, which is a secure alternative to Telnet. Port 80 is used by the HTTP (Hypertext Transfer Protocol) for web traffic, and port 20 is used by the FTP (File Transfer Protocol) for data transfer.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 12, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 19, 2020
    Quiz Created by
    Lovely Amit
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.