We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
SRI KRISHNA POLYTECHNIC COLLEGE - COIMBATORE 641 042.
CONTINUOUS ASSESSMENT TEST- III– April- 2025
R23 Regulations Branch / Sem.: Computer Engineering /IV Max. Marks : 60 Subject : Computer Networks and Security Sub Code: 1052234110 Date / Session : 01-04-2025/ AN (9.30 to 10.30 am) Duration : 1 Hr PART A Answer ALL Questions of the following 60x1=60 1. What is a computer network? a) A collection of computers that share resources b) A group of servers connected to a single device c) A single computer connected to the internet d) A programming language 2. Which of the following is not a type of network topology? a) Star b) Ring c) Tree d) Circle 3. Which device is used to connect two or more networks together? a) Router b) Switch c) Hub d) Modem 4. In a client-server architecture, what is the role of the client? a) Provides resources b) Requests services c) Manages the server d) None of the above 5. What does LAN stand for? a) Local Area Network b) Long Area Network c) Large Area Network d) Large Application Network 6. Which of the following protocols is used for sending emails? a) HTTP b) SMTP c) FTP d) POP3 7. What is the maximum data transfer speed of an Ethernet cable? a) 1 Gbps b) 100 Mbps c) 10 Gbps d) 1000 Mbps 8. Which of the following is an example of an application layer protocol? a) TCP b) IP c) HTTP d) Ethernet 9. What is an IP address? a) A unique identifier for a computer on the network b) A protocol used for routing data c) A type of cable used in networking d) A type of security encryption 10. What does DNS stand for? a) Data Network System b) Domain Name System c) Domain Network Server d) Data Network Server 11. Which protocol is responsible for providing secure communication over a network? a) FTP b) HTTPS c) HTTP d) DNS 12. Which layer in the OSI model is responsible for routing and forwarding data? a) Application layer b) Transport layer c) Network layer d) Data link layer 13. What is a MAC address? a) A unique identifier for a network device b) A type of network cable c) A software used for data encryption d) A protocol used for data transmission
14. Which of the following is used to establish a VPN connection?
a) HTTPS b) IPsec c) FTP d) HTTP 15. What is the main purpose of NAT (Network Address Translation)? a) Convert IP addresses into MAC addresses b) Convert public IP addresses to private IP addresses c) Secure data packets d) Manage network traffic 16. Which of the following is not a type of network protocol? a) TCP b) SMTP c) DNS d) MAC 17. What is the function of a switch in a network? a) To route packets between networks b) To amplify signals c) To direct data to specific devices in a local network d) To encrypt data 18. Which of the following devices operates at the Data Link layer? a) Router b) Hub c) Switch d) Modem 19. What does the 'ping' command do in a network? a) Tests the speed of data transfer b) Verifies the connection between two devices c) Opens a communication channel d) Encrypts data 20. Which of the following is a common type of wireless network? a) Ethernet b) Wi-Fi c) Bluetooth d) Both b and c 21. What does the term "firewall" refer to in network security? a) A device that blocks physical access to a network b) A system used to protect against malware c) A system used to monitor and control incoming and outgoing network traffic d) A type of encryption algorithm 22. Which of the following is used to authenticate users in a network? a) Passwords b) Encryption c) VPN d) Proxy servers 23. What is encryption used for in network security? a) To disguise the source of the network traffic b) To prevent unauthorized access to data by converting it into a code c) To identify the source of network traffic d) To compress data for faster transmission 24. Which of the following is a type of denial-of-service (DoS) attack? a) Phishing b) Ransomware c) Flood attack d) Man-in-the-middle attack 25. Which type of attack involves intercepting and altering communication between two parties? a) Phishing b) Man-in-the-middle c) SQL Injection d) Virus 26. What is the purpose of a VPN (Virtual Private Network)? a) To provide encryption for data transfers b) To restrict access to a network c) To monitor incoming network traffic d) To compress data for faster transfers 27. What is the primary function of an intrusion detection system (IDS)? a) To detect and prevent unauthorized access to a network b) To encrypt sensitive data c) To monitor network traffic for potential security breaches d) To filter incoming packets 28. Which of the following is a common type of malware? a) Trojan horse b) Firewall c) Proxy d) Ethernet 29. What is a botnet? a) A collection of compromised computers controlled by a single entity b) A network of security devices c) A software used to encrypt data d) A type of firewall 30. Which of the following best describes "phishing"? a) A technique used to collect sensitive information by pretending to be a trustworthy entity b) A method to encrypt data during transmission c) An attack that floods a network with traffic d) A tool to detect and block malware 31. Which security protocol is commonly used to secure emails? a) SSL/TLS b) HTTP c) SMTP d) IMAP 32. What is the purpose of multi-factor authentication (MFA)? a) To prevent brute force attacks b) To provide multiple layers of security by requiring more than one form of authentication c) To encrypt passwords d) To block malware 33. Which type of attack involves inserting malicious code into a web application database? a) SQL Injection b)DDoS attack c)Man-in-the-middle attack d) Cross-site scripting (XSS) 34. What does SSL stand for? a) Secure Server Layer b) Secure Sockets Layer c) Secure System Layer d) Simple Security Layer 35. Which of the following is a type of social engineering attack? a) Phishing b) SQL Injection c) Denial of Service (DoS) d) Worms 36. Which of the following is the main goal of a ransomware attack? a) To collect personal information b) To disrupt network services c) To encrypt data and demand a ransom for decryption d) To perform a DoS attack 37. What is the main function of antivirus software? a) To prevent unauthorized network access b) To scan and remove malicious software from a system c) To encrypt sensitive files d) To manage network traffic 38. What does a digital signature provide in the context of network security? a) Data compression b) Authentication of the sender and integrity of the message c) Encryption of data during transfer d) Prevention of unauthorized access 39. Which of the following is NOT a method of data encryption? a) AES b) RSA c) TLS d) DDoS 40. Which of the following is a key component of a public-key infrastructure (PKI)? a) Private key b) Firewall c) Antivirus software d) Router 41. What does the term "zero-day attack" refer to? a) An attack that occurs after a security patch has been released b) An attack exploiting a previously unknown vulnerability c) An attack targeting network hardware d) An attack where no data is stolen 42. Which of the following is an example of a security breach in which an attacker impersonates a trusted entity? a) Man-in-the-middle attack b) Phishing c) SQL Injection d) Trojan horse 43. What is a VPN tunnel? a) A path that encrypts and transmits data between two points securely b) A firewall rule c) A type of encryption algorithm d) A routing protocol 44. Which of the following best describes a "Trojan horse"? a) A type of antivirus software b) A malicious program disguised as legitimate software c) A type of encryption method d) A social engineering attack 45. What is the main goal of a denial-of-service (DoS) attack? a) To steal sensitive data b) To disable or disrupt a service c) To spread malware d) To create a backdoor 46. Which of the following is NOT a common firewall technique? a) Packet filtering b) Proxy server c) VPN encryption d) Stateful inspection 47. Which of the following attacks can be mitigated using a strong password policy? a) Brute force attacks b) Phishing c) Denial of Service d) SQL Injection 48. What is the purpose of hashing in network security? a) To compress data b) To encrypt data c) To create a unique identifier for data d) To convert data into a readable format 49. Which of the following is the best way to protect against man-in-the-middle attacks? a) Use strong passwords b) Use encryption (SSL/TLS) c) Install antivirus software d) Update your firewall regularly 50. What does the acronym DDoS stand for? a) Distributed Denial of Service b) Data Detection of Service c) Denial of Data Service d) Digital Denial of Service 51. Which protocol is used to secure web communication? a) FTP b) HTTPS c) SMTP d) IMAP 52. What is an example of an authentication factor? a) Password b) IP address c) SSL certificate d) Firewall 53. Which of the following is a type of public key encryption algorithm? a) AES b) RSA c) DES d) XOR 54. Which of the following methods is used to verify the identity of a user? a) Authorization b) Encryption c) Authentication d) Decryption 55. What is the primary purpose of a proxy server? a) To encrypt data b) To route network traffic c) To filter or monitor network traffic d) To perform packet switching 56. Which of the following is NOT a benefit of using a VPN? a) Enhanced security b) Hiding your IP address c) Better network performance d) Access to restricted content 57. What does "two-factor authentication" require? a) A username and password b) A password and an additional authentication method (e.g., SMS or app) c) A public key and a private key d) A secure connection 58. Which of the following is an example of an attack targeting the application layer of the OSI model? a) DDoS b) SQL Injection c) Packet sniffing d) Routing table attack 59. What is the main advantage of using asymmetric encryption? a) It uses a single key for encryption and decryption b) It is faster than symmetric encryption c) It uses two keys, improving security d) It is more resistant to brute force attacks 60. Which of the following tools is commonly used for network penetration testing? a) Wireshark b) Kali Linux c) Nmap d) All of the above