

InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
51. |
An attack in which the user receives unwanted amount of e-mails.(a) Smurfing(b) Denial of service(c) E-mail bombing(d) Ping stormI have been asked this question in an interview.The doubt is from Encryption and Viruses topic in division Information Technology of Computer Fundamentals |
Answer» Right CHOICE is (c) E-mail bombing |
|
52. |
A malicious code hidden inside a seemingly harmless piece of code.(a) Worm(b) Bomb(c) Trojan Horse(d) VirusI got this question during a job interview.Query is from Encryption and Viruses topic in section Information Technology of Computer Fundamentals |
Answer» Correct choice is (c) Trojan Horse |
|
53. |
Attack in which a user creates a packet that appears to be something else.(a) Smurfing(b) Trojan(c) E-mail bombing(d) SpoofingI have been asked this question during an online interview.Question is from Encryption and Viruses in chapter Information Technology of Computer Fundamentals |
Answer» The CORRECT ANSWER is (d) SPOOFING |
|
54. |
A technique in which a program attacks a network by exploiting IP broadcast addressing operations.(a) Smurfing(b) Denial of service(c) E-mail bombing(d) Ping stormI got this question in exam.My question is from Encryption and Viruses topic in division Information Technology of Computer Fundamentals |
Answer» The correct CHOICE is (a) Smurfing |
|
55. |
Creating a computer or paper audit that can help detect wrong doings.(a) Auditing(b) Validation(c) RSN(d) VerificationI have been asked this question in an interview for internship.Origin of the question is Encryption and Viruses in section Information Technology of Computer Fundamentals |
Answer» Correct OPTION is (a) AUDITING |
|
56. |
An indirect form of surveillance.(a) Honey pot(b) Logical(c) Security(d) IntrusionThe question was asked in an internship interview.I'd like to ask this question from Encryption and Viruses in division Information Technology of Computer Fundamentals |
Answer» The CORRECT option is (a) HONEY pot |
|
57. |
Study of creating a d using encryption and decryption techniques.(a) Cipher(b) Cryptography(c) Encryption(d) DecryptionThis question was posed to me in an online quiz.My question is taken from Encryption and Viruses topic in portion Information Technology of Computer Fundamentals |
Answer» Correct CHOICE is (b) Cryptography |
|
58. |
A unique piece of information that is used in encryption.(a) Cipher(b) Plain Text(c) Key(d) CipherThis question was addressed to me at a job interview.This interesting question is from Encryption and Viruses in division Information Technology of Computer Fundamentals |
Answer» Correct choice is (c) Key |
|
59. |
An attack in which the site is not capable of answering valid request.(a) Smurfing(b) Denial of service(c) E-mail bombing(d) Ping stormThe question was asked during an internship interview.The origin of the question is Network Security and Encryption topic in section Information Technology of Computer Fundamentals |
Answer» The correct option is (B) Denial of service |
|
60. |
A cipher in which the order is not preserved.(a) Polyalphabetic substitution based(b) Transposition-based(c) Substitution based(d) Public key basedThe question was asked in examination.I need to ask this question from Encryption and Viruses topic in division Information Technology of Computer Fundamentals |
Answer» RIGHT OPTION is (b) Transposition-based Easy EXPLANATION: In transposition-based cipher, the order of the plain text is not PRESERVED. They can be very SIMPLE to identify. |
|
61. |
Plain text is the data after encryption is performed.(a) True(b) FalseThe question was asked in an online interview.This question is from Encryption and Viruses topic in portion Information Technology of Computer Fundamentals |
Answer» The correct option is (b) FALSE |
|
62. |
A program that copies itself.(a) Worm(b) Virus(c) Trojan(d) BombI got this question in my homework.Question is taken from Network Security and Encryption topic in section Information Technology of Computer Fundamentals |
Answer» Correct answer is (a) Worm |
|
63. |
A small program that changes the way a computer operates.(a) Worm(b) Trojan(c) Bomb(d) VirusThis question was posed to me at a job interview.This interesting question is from Network Security and Encryption in section Information Technology of Computer Fundamentals |
Answer» Right choice is (d) Virus |
|
64. |
A program created by Farmer and Venema for auditing capability.(a) SAAS(b) SATAN(c) SAN(d) SATThe question was posed to me in an online quiz.I'd like to ask this question from Network Security and Encryption in chapter Information Technology of Computer Fundamentals |
Answer» Right choice is (b) SATAN |
|
65. |
A person who enjoys learning details about computers and how to enhance their capabilities.(a) Cracker(b) Hacker(c) App controller(d) Site controllerI have been asked this question in examination.My question is taken from Network Security and Encryption in section Information Technology of Computer Fundamentals |
Answer» Correct OPTION is (b) Hacker |
|
66. |
The protocol designed to make the security of wireless LAN as good as that of wired LAN.(a) WTLS(b) WEP(c) RSN(d) WPThis question was posed to me by my college director while I was bunking the class.The doubt is from Network Security and Encryption in portion Information Technology of Computer Fundamentals |
Answer» Correct choice is (b) WEP |
|
67. |
WTLS stands for?(a) Wireless Transport Security Layer(b) Wireless Transfer System Layer(c) Wireless Transfer Security Layer(d) Wireless Transport System LayerThe question was asked in my homework.Question is taken from Network Security and Encryption topic in section Information Technology of Computer Fundamentals |
Answer» The correct CHOICE is (a) Wireless Transport Security LAYER |
|
68. |
A process of making the encrypted text readable again.(a) Decryption(b) Encryption(c) Network Security(d) Information HidingThis question was posed to me during an interview.This question is from Network Security and Encryption in division Information Technology of Computer Fundamentals |
Answer» Correct CHOICE is (a) Decryption |
|
69. |
An algorithm used in encryption is referred to as cipher.(a) True(b) FalseThis question was posed to me in quiz.The doubt is from Network Security and Encryption topic in portion Information Technology of Computer Fundamentals |
Answer» Right answer is (a) True |
|
70. |
The process of transforming plain text into unreadable text.(a) Decryption(b) Encryption(c) Network Security(d) Information HidingI have been asked this question in an interview.I'm obligated to ask this question of Network Security and Encryption in portion Information Technology of Computer Fundamentals |
Answer» Right choice is (b) Encryption |
|
71. |
Security features that control that can access resources in the OS.(a) Authentication(b) Identification(c) Validation(d) Access controlI had been asked this question in an interview for job.My question comes from Network Security topic in portion Information Technology of Computer Fundamentals |
Answer» Right answer is (d) ACCESS control |
|
72. |
The information that gets transformed in encryption is ____________(a) Plain text(b) Parallel text(c) Encrypted text(d) Decrypted textThis question was addressed to me in a job interview.Asked question is from Network Security topic in division Information Technology of Computer Fundamentals |
Answer» The correct choice is (a) Plain text |
|
73. |
An algorithm in encryption is called _____________(a) Algorithm(b) Procedure(c) Cipher(d) ModuleI have been asked this question in my homework.This is a very interesting question from Network Security in section Information Technology of Computer Fundamentals |
Answer» The CORRECT option is (C) Cipher |
|
74. |
CHAP stands for?(a) Challenge Handshake authentication protocol(b) Challenge Hardware authentication protocol(c) Circuit Hardware authentication protocol(d) Circuit Handshake authentication protocolThis question was posed to me in a national level competition.I need to ask this question from Network Security in portion Information Technology of Computer Fundamentals |
Answer» The correct answer is (a) CHALLENGE HANDSHAKE authentication protocol |
|
75. |
A concern of authentication that deals with user rights.(a) General access(b) Functional authentication(c) Functional authorization(d) Auto verificationThe question was asked during an online exam.The origin of the question is Network Security in division Information Technology of Computer Fundamentals |
Answer» Correct OPTION is (c) Functional authorization |
|
76. |
The process of verifying the identity of a user.(a) Authentication(b) Identification(c) Validation(d) VerificationI have been asked this question in exam.My question comes from Network Security topic in division Information Technology of Computer Fundamentals |
Answer» The correct answer is (a) AUTHENTICATION |
|
77. |
Which of these is a part of network identification?(a) UserID(b) Password(c) OTP(d) fingerprintI got this question during a job interview.The origin of the question is Network Security in division Information Technology of Computer Fundamentals |
Answer» The correct choice is (a) UserID |
|
78. |
Which is not an objective of network security?(a) Identification(b) Authentication(c) Access control(d) LockThe question was posed to me in exam.I'm obligated to ask this question of Network Security topic in section Information Technology of Computer Fundamentals |
Answer» The correct option is (d) LOCK |
|
79. |
Network Security provides authentication and access control for resources.(a) True(b) FalseI have been asked this question in unit test.My question comes from Network Security topic in portion Information Technology of Computer Fundamentals |
Answer» Correct OPTION is (a) TRUE |
|
80. |
The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.(a) Artificial Intelligence(b) ML(c) Network Security(d) ITThis question was addressed to me by my college professor while I was bunking the class.This is a very interesting question from Network Security topic in chapter Information Technology of Computer Fundamentals |
Answer» Correct option is (c) NETWORK Security |
|