0% found this document useful (0 votes)
15 views4 pages

Sever Mode Security

The document consists of a test on computer security and system monitoring, featuring multiple-choice questions, matching exercises, and short answer prompts. It covers topics such as domain names, types of security, encryption methods, and the role of firewalls. The test is designed to assess knowledge in cybersecurity principles and practices.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

Sever Mode Security

The document consists of a test on computer security and system monitoring, featuring multiple-choice questions, matching exercises, and short answer prompts. It covers topics such as domain names, types of security, encryption methods, and the role of firewalls. The test is designed to assess knowledge in cybersecurity principles and practices.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

70|

Name: _____________________________________ ID______ Admission


Section

Part I: Multiple Choice


1. Which one of the following is the appropriate domain name?
A. www.google.com B. www.facebook.com C. ict.local D. all
2. ______is securing information from unauthorized access, modification &
deletion?
A. Computer security B. Cyber security C. Information
security D. None
3. _____ is ensuring that information is available only to the intended
audience.
A. Availability B. Confidentiality C. Integrity D.
Authorization
4. one of the following is different from the other
A. Availability B. Confidentiality C. Integrity D.
Authentication
5. Which of the following is objects of Active directory?
A. Users B. Computers C. Groups D. Contacts E.
All
6. ____ is a computer operating system that is designed for network use.
A. Windows 2003 B. Windows 2008 C. NOS D. ALL are
Correct Answers
7. _____used to denote a specific department, team functions etc.
A. Active Directory B. Groups C. Organizational Unit D.
Domain
8. from the following one is not computer security threats?
A. Virus B. Firewall C. Attacker D. Phishing
E. None
9. __________is a type of server that is used to store websites for accessing
over the internet?

System Monitoring and Computer Security |


Tuesday, April 8, 2025
70|

A. Web Server
B. File Server C. Mail
Server D. Application Server
10. ________
is a malicious program which is loaded into the user’s computer
without user’s knowledge.
A. Computer Virus B. Phishing C. Social Engineering D.
Hacker
11. ________ is a command that is specifically used to install active
directory.
A. gpupdate /force B. DCPROMO C. Dxdiag D. msinfo
12. The Most Secure computer is not connected to the internet and have
shielded from any interference. A. True B. False C.
A&B

13. _______are network devices that is used to identify and report on unwanted
traffic in a network.

A. Passive B. Active devices D. Intrusion machines


Devices C. Firewalls detection E. A & D are right.

14. Which of the following protocols are helpful for secure data
transmission?
A. IP Sec B. PPTP C. SSH D. SSL E. All
are correct
15. __________ is a trustworthy person or business that attempts to steal sensitive
financial or personal information through fake email or instant messages.
A. Computer virus B. rootkit C. Phishing D. keyloggers E.
All

System Monitoring and Computer Security |


Tuesday, April 8, 2025
70|

16. To encrypt plain


text using Caesar ciphering we use ___________
A. € (m)= (m+3) mod 26 B. ∂(s) = (s-3) mod 26 C. € (m)=
(am+b) mod 26
17.When we encrypt the message “Good Luck “using Caesar ciphering what could
be the cipher text
A. JRRG OXFM B. JRRH OXFL C. JRRG OXFN D. KRRG OXFM
18. The first layer of security management is _________________
A. Authentication B. Physical access C. Authorization D. None
19. The most common methods used to authenticate users______________
A. User name B. Password C. biometrics D. Kerberos
E. A & B
20. Which of the following is different?
A. TCP B. UDP C. SSH D. IPsec E. PPTP
21. Mr. Alemu is a finance head in XYZ Company and he uses laptop given
by the organization, He wants to protect his data from unauthorized
users. Which could be good option for him?
A. Good Password B. Hide C. Encrypt D. All
22.

Part II: Matching

System Monitoring and Computer Security |


Tuesday, April 8, 2025
70|

1. Encryption A. The process by which plaintext is converted into


2. Decryption cipher text
3. Plain text C. The original Intelligible Message
4. Cipher text D. is the scrambled message produced as out put
5. Secrete key B. Recovering plaintext from the cipher
6. Authorization G. verifying user identity
7. Authentication E. Used to set some or all of the various
8. Firewall parameters used by the encryption algorithm
9. Active devices F. granting access for information
10. Passive devices H. Packet filtering
I. block the excess traffic
J. identify and report on unwanted traffic

Part III: Write Short and Brief Answer

1. What is computer security?


2. What is the main purpose of using firewall in network?
3. What is cryptography?
4. Write the Ingredients of cryptography?
5. The difference between authentication and authorization?
6. Write the elements of computer security?
7. Write the advantages and disadvantages of Server?
8. Encrypt the message “I LOVE MATH “using Caesar ciphering and
show all the necessary steps.
9. List some computer security threats?
10. Write the factors to secure your internet connection?

System Monitoring and Computer Security |


Tuesday, April 8, 2025

You might also like