DD Assignment 2
DD Assignment 2
15. What is the term for unauthorized access to a computer system or network?
a) Sniffing
b) Encryption
c) Intrusion
d) Authentication
Ans=c
16. An intruder who breaks into a system for personal gain or malicious purposes is
called a:
a) Script kiddie
b) Black hat hacker
c) White hat hacker
d) Grey hat hacker
Ans=b
19. Which of the following is NOT a type of intrusion detection system (IDS)?
a) Network-based IDS (NIDS)
b) Host-based IDS (HIDS)
c) Behavior-based IDS
d) Signature-based IDS
Ans=c
22. Strong passwords are essential for network security because they:
a) Automatically update software
b) Are easy to remember
c) Make brute-force attacks more difficult
d) Encrypt all data on the network
Ans=c
25. What is the process of regaining control of a system after a security breach?
a) Vulnerability assessment
b) Incident response
c) Penetration testing
d) Security patching
Ans=b
Virus mcq
Q2. Which virus attaches with EXE files and the resulting infected EXE file attacks other EXE
files and infects them?
A. Parasitic virus
B. Boot Sector Virus
C. Memory Resident Virus
D. None of Above
Ans: A
Q4. Which of the following mechanism is used by computer virus worm to duplicate itself?
A. Spawn
B. Swap
C. Increase
D. Increment
Ans: A
16. Which of the below-mentioned reasons do not satisfy the reason why people create a
computer virus?
A Protection
B Identity theft
C Pranks
D Research purpose
Ans=A
3. A virus that remains active in memory and infects other programs as they are loaded is
called a:
a) File infector virus
b) Resident virus
c) Macro virus
d) Overwrite virus
Ans=b
4. A virus that infects both program files and the boot sector is known as a:
a) Polymorphic virus
b) Direct action virus
c) Multipartite virus
d) Space-filler virus
Ans=c
5. Viruses that constantly change their code structure to evade detection are classified as:
a) File infector virus
b) Overwrite virus
c) Polymorphic virus
d) Macro virus (Macros are not viruses themselves)
Ans=c
6. A virus that directly infects a program and overwrites existing code is called a:
a) Resident virus
b) Overwrite virus
c) Space-filler virus
d) Multipartite virus
Ans=b
7. Viruses that fill unused space in files with junk data are categorized as:
a) Polymorphic virus
b) Space-filler virus
c) Direct action virus
d) File infector virus
Ans=c
8. A virus that specifically targets and infects macro code within documents is known as a:
a) File infector virus
b) Resident virus
c) Macro virus
d) Boot sector virus
Ans=c
9. Viruses that hide system processes and grant unauthorized access are classified as:
a) Polymorphic virus
b) File infector virus
c) Macro virus
d) Rootkit virus
Ans=d
10.Which of the following statements about viruses is FALSE?
a) Viruses can steal sensitive data.
b) Viruses can corrupt or delete files.
c) Viruses can cause system crashes.
d) Viruses can install legitimate software. (Viruses typically install malicious software)
Ans=d
11.Virus cannot spread through
A.USB
B.Email
C.Downloads
D.Uploads
Ans=D
Firewall mcq
1. Network layer firewall works as a __________
a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
Ans=b
3. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
Ans=a
4. Which of the following is / are the types of firewall?
a) Packet Filtering Firewall
b) Dual Homed Gateway Firewall
c) Screen Host Firewall
d) Dual Host Firewall
Ans=a
8. What tells a firewall how to reassemble a data stream that has been divided into packets?
a) The source routing feature
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
Ans=a
10. A firewall needs to be __________ so that it can grow proportionally with the network
that it protects.
a) Robust
b) Expansive
c) Fast
d) Scalable
Ans=b
11. Circuit-level gateway firewalls are installed in _______ layer of OSI model.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
Ans=b
12. Which of these comes under the advantage of Circuit-level gateway firewalls?
a) They maintain anonymity and also inexpensive
b) They are light-weight
c) They’re expensive yet efficient
d) They preserve IP address privacy yet expensive
Ans=a
15. Application level gateway firewalls protect the network for specific _____________
a) application layer protocol
b) session layer protocol
c) botnet attacks
d) network layer protocol
Ans=a
17. Stateful Multilayer Inspection firewall cannot perform which of the following?
a) Filter network layer packets
b) Check for legitimate session
c) Scans for illicit data packets at the presentation layer
d) Evaluate packets at application lager
Ans=c
6. In Network Management System, the division that is responsible for controlling access to
network based on a predefined policy is called _________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
Ans=d
8. Control of the users’ access to network resources through charges is the main
responsibility of ________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
Ans=c
9. SNMP is the framework for managing devices in an internet using the ______
a) TCP/IP protocol
b) UDP
c) SMTP
d) None
Ans=a
14. In SNMP, what component monitors and analyzes information gathered from agents?
a) NMS (Network Management Station)
b) Agent
c) Trap
d) Community String
Ans=a
16.SNMP uses which protocol for communication between NMS and agents?
a) UDP (User Datagram Protocol)
b) TCP (Transmission Control Protocol)
c) IP (Internet Protocol)
d) HTTP (Hypertext Transfer Protocol)
Ans=a
24.SNMP is a crucial tool for network administrators. What is one of the primary tasks it
helps with?
a) Downloading software updates
b) Sharing files between devices
c) Monitoring network device performance and health
d) Setting up new user accounts
Ans=c
……………………………………….…………………*****************………………………………………………………………