0% found this document useful (0 votes)
25 views4 pages

CNS Iv MCQ

Uploaded by

tckgaming38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

CNS Iv MCQ

Uploaded by

tckgaming38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

SRI KRISHNA POLYTECHNIC COLLEGE - COIMBATORE 641 042.

CONTINUOUS ASSESSMENT TEST- III– April- 2025


R23 Regulations
Branch / Sem.: Computer Engineering /IV Max. Marks : 60
Subject : Computer Networks and Security Sub Code: 1052234110
Date / Session : 01-04-2025/ AN (9.30 to 10.30 am) Duration : 1 Hr
PART A
Answer ALL Questions of the following 60x1=60
1. What is a computer network?
a) A collection of computers that share resources b) A group of servers connected to a
single device
c) A single computer connected to the internet d) A programming language
2. Which of the following is not a type of network topology?
a) Star b) Ring c) Tree d) Circle
3. Which device is used to connect two or more networks together?
a) Router b) Switch c) Hub d) Modem
4. In a client-server architecture, what is the role of the client?
a) Provides resources b) Requests services c) Manages the server d) None of the
above
5. What does LAN stand for?
a) Local Area Network b) Long Area Network
c) Large Area Network d) Large Application Network
6. Which of the following protocols is used for sending emails?
a) HTTP b) SMTP c) FTP d) POP3
7. What is the maximum data transfer speed of an Ethernet cable?
a) 1 Gbps b) 100 Mbps c) 10 Gbps d) 1000 Mbps
8. Which of the following is an example of an application layer protocol?
a) TCP b) IP c) HTTP d) Ethernet
9. What is an IP address?
a) A unique identifier for a computer on the network b) A protocol used for routing
data
c) A type of cable used in networking d) A type of security encryption
10. What does DNS stand for?
a) Data Network System b) Domain Name System
c) Domain Network Server d) Data Network Server
11. Which protocol is responsible for providing secure communication over a
network?
a) FTP b) HTTPS c) HTTP d) DNS
12. Which layer in the OSI model is responsible for routing and forwarding data?
a) Application layer b) Transport layer c) Network layer d) Data link layer
13. What is a MAC address?
a) A unique identifier for a network device b) A type of network cable
c) A software used for data encryption d) A protocol used for data transmission

14. Which of the following is used to establish a VPN connection?


a) HTTPS b) IPsec c) FTP d) HTTP
15. What is the main purpose of NAT (Network Address Translation)?
a) Convert IP addresses into MAC addresses b) Convert public IP addresses to
private IP addresses
c) Secure data packets d) Manage network traffic
16. Which of the following is not a type of network protocol?
a) TCP b) SMTP c) DNS d) MAC
17. What is the function of a switch in a network?
a) To route packets between networks b) To amplify signals
c) To direct data to specific devices in a local network d) To encrypt data
18. Which of the following devices operates at the Data Link layer?
a) Router b) Hub c) Switch d) Modem
19. What does the 'ping' command do in a network?
a) Tests the speed of data transfer b) Verifies the connection between two devices
c) Opens a communication channel d) Encrypts data
20. Which of the following is a common type of wireless network?
a) Ethernet b) Wi-Fi c) Bluetooth d) Both b and c
21. What does the term "firewall" refer to in network security?
a) A device that blocks physical access to a network
b) A system used to protect against malware
c) A system used to monitor and control incoming and outgoing network traffic
d) A type of encryption algorithm
22. Which of the following is used to authenticate users in a network?
a) Passwords b) Encryption c) VPN d) Proxy servers
23. What is encryption used for in network security?
a) To disguise the source of the network traffic b) To prevent unauthorized access to
data by converting it into a code
c) To identify the source of network traffic d) To compress data for faster
transmission
24. Which of the following is a type of denial-of-service (DoS) attack?
a) Phishing b) Ransomware c) Flood attack d) Man-in-the-middle attack
25. Which type of attack involves intercepting and altering communication between
two parties?
a) Phishing b) Man-in-the-middle c) SQL Injection d) Virus
26. What is the purpose of a VPN (Virtual Private Network)?
a) To provide encryption for data transfers b) To restrict access to a network
c) To monitor incoming network traffic d) To compress data for faster transfers
27. What is the primary function of an intrusion detection system (IDS)?
a) To detect and prevent unauthorized access to a network b) To encrypt sensitive data
c) To monitor network traffic for potential security breaches d) To filter incoming
packets
28. Which of the following is a common type of malware?
a) Trojan horse b) Firewall c) Proxy d) Ethernet
29. What is a botnet?
a) A collection of compromised computers controlled by a single entity
b) A network of security devices
c) A software used to encrypt data d) A type of firewall
30. Which of the following best describes "phishing"?
a) A technique used to collect sensitive information by pretending to be a trustworthy
entity b) A method to encrypt data during transmission
c) An attack that floods a network with traffic d) A tool to detect and block malware
31. Which security protocol is commonly used to secure emails?
a) SSL/TLS b) HTTP c) SMTP d) IMAP
32. What is the purpose of multi-factor authentication (MFA)?
a) To prevent brute force attacks
b) To provide multiple layers of security by requiring more than one form of
authentication
c) To encrypt passwords d) To block malware
33. Which type of attack involves inserting malicious code into a web application
database?
a) SQL Injection b)DDoS attack
c)Man-in-the-middle attack d) Cross-site scripting (XSS)
34. What does SSL stand for?
a) Secure Server Layer b) Secure Sockets Layer
c) Secure System Layer d) Simple Security Layer
35. Which of the following is a type of social engineering attack?
a) Phishing b) SQL Injection c) Denial of Service (DoS) d) Worms
36. Which of the following is the main goal of a ransomware attack?
a) To collect personal information b) To disrupt network services
c) To encrypt data and demand a ransom for decryption d) To perform a DoS attack
37. What is the main function of antivirus software?
a) To prevent unauthorized network access b) To scan and remove malicious software
from a system
c) To encrypt sensitive files d) To manage network traffic
38. What does a digital signature provide in the context of network security?
a) Data compression b) Authentication of the sender and integrity of the message
c) Encryption of data during transfer d) Prevention of unauthorized access
39. Which of the following is NOT a method of data encryption?
a) AES b) RSA c) TLS d) DDoS
40. Which of the following is a key component of a public-key infrastructure (PKI)?
a) Private key b) Firewall c) Antivirus software d) Router
41. What does the term "zero-day attack" refer to?
a) An attack that occurs after a security patch has been released
b) An attack exploiting a previously unknown vulnerability
c) An attack targeting network hardware d) An attack where no data is stolen
42. Which of the following is an example of a security breach in which an attacker
impersonates a trusted entity?
a) Man-in-the-middle attack b) Phishing c) SQL Injection d) Trojan horse
43. What is a VPN tunnel?
a) A path that encrypts and transmits data between two points securely
b) A firewall rule c) A type of encryption algorithm d) A routing protocol
44. Which of the following best describes a "Trojan horse"?
a) A type of antivirus software b) A malicious program disguised as legitimate
software
c) A type of encryption method d) A social engineering attack
45. What is the main goal of a denial-of-service (DoS) attack?
a) To steal sensitive data b) To disable or disrupt a service
c) To spread malware d) To create a backdoor
46. Which of the following is NOT a common firewall technique?
a) Packet filtering b) Proxy server c) VPN encryption d) Stateful inspection
47. Which of the following attacks can be mitigated using a strong password policy?
a) Brute force attacks b) Phishing c) Denial of Service d) SQL Injection
48. What is the purpose of hashing in network security?
a) To compress data b) To encrypt data
c) To create a unique identifier for data d) To convert data into a readable format
49. Which of the following is the best way to protect against man-in-the-middle
attacks?
a) Use strong passwords b) Use encryption (SSL/TLS) c) Install antivirus software
d) Update your firewall regularly
50. What does the acronym DDoS stand for?
a) Distributed Denial of Service b) Data Detection of Service
c) Denial of Data Service d) Digital Denial of Service
51. Which protocol is used to secure web communication?
a) FTP b) HTTPS c) SMTP d) IMAP
52. What is an example of an authentication factor?
a) Password b) IP address c) SSL certificate d) Firewall
53. Which of the following is a type of public key encryption algorithm?
a) AES b) RSA c) DES d) XOR
54. Which of the following methods is used to verify the identity of a user?
a) Authorization b) Encryption c) Authentication d) Decryption
55. What is the primary purpose of a proxy server?
a) To encrypt data b) To route network traffic
c) To filter or monitor network traffic d) To perform packet switching
56. Which of the following is NOT a benefit of using a VPN?
a) Enhanced security b) Hiding your IP address
c) Better network performance d) Access to restricted content
57. What does "two-factor authentication" require?
a) A username and password
b) A password and an additional authentication method (e.g., SMS or app)
c) A public key and a private key d) A secure connection
58. Which of the following is an example of an attack targeting the application layer
of the OSI model?
a) DDoS b) SQL Injection c) Packet sniffing d) Routing table attack
59. What is the main advantage of using asymmetric encryption?
a) It uses a single key for encryption and decryption b) It is faster than symmetric
encryption
c) It uses two keys, improving security d) It is more resistant to brute force attacks
60. Which of the following tools is commonly used for network penetration testing?
a) Wireshark b) Kali Linux c) Nmap d) All of the above

Prepared By HoD

(P.VIGNESWARI) (P.VIGNESWARI)

You might also like