Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

An attack in which the user receives unwanted amount of e-mails.(a) Smurfing(b) Denial of service(c) E-mail bombing(d) Ping stormI have been asked this question in an interview.The doubt is from Encryption and Viruses topic in division Information Technology of Computer Fundamentals

Answer»

Right CHOICE is (c) E-mail bombing

For EXPLANATION: In the case of denial of e-mail bombing, a user sends an excessive amount of UNWANTED e-mail to SOMEONE.

52.

A malicious code hidden inside a seemingly harmless piece of code.(a) Worm(b) Bomb(c) Trojan Horse(d) VirusI got this question during a job interview.Query is from Encryption and Viruses topic in section Information Technology of Computer Fundamentals

Answer»

Correct choice is (c) Trojan Horse

Explanation: The answer is Trojan horse. Trojan horse is a CODE that is PRESENT in a PROGRAM that appears HARMLESS.

53.

Attack in which a user creates a packet that appears to be something else.(a) Smurfing(b) Trojan(c) E-mail bombing(d) SpoofingI have been asked this question during an online interview.Question is from Encryption and Viruses in chapter Information Technology of Computer Fundamentals

Answer»

The CORRECT ANSWER is (d) SPOOFING

Explanation: The attack is a spoofing attack. It is when a user creates a packet that APPEARS to be SOMETHING else or from someone else.

54.

A technique in which a program attacks a network by exploiting IP broadcast addressing operations.(a) Smurfing(b) Denial of service(c) E-mail bombing(d) Ping stormI got this question in exam.My question is from Encryption and Viruses topic in division Information Technology of Computer Fundamentals

Answer»

The correct CHOICE is (a) Smurfing

Easiest explanation: Smurfing is a technique in which a PROGRAM ATTACKS a network by EXPLOITING IP broadcast addressing operations.

55.

Creating a computer or paper audit that can help detect wrong doings.(a) Auditing(b) Validation(c) RSN(d) VerificationI have been asked this question in an interview for internship.Origin of the question is Encryption and Viruses in section Information Technology of Computer Fundamentals

Answer»

Correct OPTION is (a) AUDITING

Easiest explanation: The ANSWER is auditing. It is done to keep an eye on wrong doings. Auditing can be USED as a deterrent.

56.

An indirect form of surveillance.(a) Honey pot(b) Logical(c) Security(d) IntrusionThe question was asked in an internship interview.I'd like to ask this question from Encryption and Viruses in division Information Technology of Computer Fundamentals

Answer»

The CORRECT option is (a) HONEY pot

The explanation is: Honey pot is an indirect FORM of SURVEILLANCE. Network personnel create a trap, watching for UNSCRUPULOUS acts.

57.

Study of creating a d using encryption and decryption techniques.(a) Cipher(b) Cryptography(c) Encryption(d) DecryptionThis question was posed to me in an online quiz.My question is taken from Encryption and Viruses topic in portion Information Technology of Computer Fundamentals

Answer»

Correct CHOICE is (b) Cryptography

Easiest explanation: It is CALLED as cryptography. It is the study of CREATING and using the encryption techniques.

58.

A unique piece of information that is used in encryption.(a) Cipher(b) Plain Text(c) Key(d) CipherThis question was addressed to me at a job interview.This interesting question is from Encryption and Viruses in division Information Technology of Computer Fundamentals

Answer»

Correct choice is (c) Key

To explain I WOULD SAY: The key is the unique piece of information.It is used to CREATE the CIPHER text and decrypt it BACK.

59.

An attack in which the site is not capable of answering valid request.(a) Smurfing(b) Denial of service(c) E-mail bombing(d) Ping stormThe question was asked during an internship interview.The origin of the question is Network Security and Encryption topic in section Information Technology of Computer Fundamentals

Answer»

The correct option is (B) Denial of service

The EXPLANATION: The answer is Denial of service. In CASE of denial of service attacks, a COMPUTER site is bombarded with a lot of MESSAGES.

60.

A cipher in which the order is not preserved.(a) Polyalphabetic substitution based(b) Transposition-based(c) Substitution based(d) Public key basedThe question was asked in examination.I need to ask this question from Encryption and Viruses topic in division Information Technology of Computer Fundamentals

Answer» RIGHT OPTION is (b) Transposition-based

Easy EXPLANATION: In transposition-based cipher, the order of the plain text is not PRESERVED. They can be very SIMPLE to identify.
61.

Plain text is the data after encryption is performed.(a) True(b) FalseThe question was asked in an online interview.This question is from Encryption and Viruses topic in portion Information Technology of Computer Fundamentals

Answer»

The correct option is (b) FALSE

The best explanation: The statement is false. CIPHER is the ALGORITHM USED in encryption.Ciphertext is the data after encryption is performed.

62.

A program that copies itself.(a) Worm(b) Virus(c) Trojan(d) BombI got this question in my homework.Question is taken from Network Security and Encryption topic in section Information Technology of Computer Fundamentals

Answer»

Correct answer is (a) Worm

Best EXPLANATION: A worm copies itself from one system to ANOTHER over a network without the assistance of HUMAN.

63.

A small program that changes the way a computer operates.(a) Worm(b) Trojan(c) Bomb(d) VirusThis question was posed to me at a job interview.This interesting question is from Network Security and Encryption in section Information Technology of Computer Fundamentals

Answer»

Right choice is (d) Virus

For explanation I WOULD say: The program is CALLED virus. It alters the way that the computer operates. It often does DAMAGES like deleting and CORRUPTING files and data.

64.

A program created by Farmer and Venema for auditing capability.(a) SAAS(b) SATAN(c) SAN(d) SATThe question was posed to me in an online quiz.I'd like to ask this question from Network Security and Encryption in chapter Information Technology of Computer Fundamentals

Answer»

Right choice is (b) SATAN

Easiest explanation: SATAN is the SECURITY ANALYSIS tool for AUDITING networks. It is CREATED by farmer and venema.

65.

A person who enjoys learning details about computers and how to enhance their capabilities.(a) Cracker(b) Hacker(c) App controller(d) Site controllerI have been asked this question in examination.My question is taken from Network Security and Encryption in section Information Technology of Computer Fundamentals

Answer»

Correct OPTION is (b) Hacker

Explanation: The PERSON is CALLED hacker. A person who ENJOYS learning the details of COMPUTER systems and how to stretch their capabilities is called hacker.

66.

The protocol designed to make the security of wireless LAN as good as that of wired LAN.(a) WTLS(b) WEP(c) RSN(d) WPThis question was posed to me by my college director while I was bunking the class.The doubt is from Network Security and Encryption in portion Information Technology of Computer Fundamentals

Answer»

Correct choice is (b) WEP

To explain: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol DESIGNED to make the SECURITY of wireless LAN as GOOD as that of wired LAN.

67.

WTLS stands for?(a) Wireless Transport Security Layer(b) Wireless Transfer System Layer(c) Wireless Transfer Security Layer(d) Wireless Transport System LayerThe question was asked in my homework.Question is taken from Network Security and Encryption topic in section Information Technology of Computer Fundamentals

Answer»

The correct CHOICE is (a) Wireless Transport Security LAYER

For explanation I would say: WTLS is Wireless Transport Security Layer. It PROVIDES security between the mobile device and the WAP gateway to internet.

68.

A process of making the encrypted text readable again.(a) Decryption(b) Encryption(c) Network Security(d) Information HidingThis question was posed to me during an interview.This question is from Network Security and Encryption in division Information Technology of Computer Fundamentals

Answer»

Correct CHOICE is (a) Decryption

The BEST I can explain: The reverse PROCESS is CALLED decryption. It is the process of MAKING the information readable again.

69.

An algorithm used in encryption is referred to as cipher.(a) True(b) FalseThis question was posed to me in quiz.The doubt is from Network Security and Encryption topic in portion Information Technology of Computer Fundamentals

Answer»

Right answer is (a) True

The best explanation: The STATEMENT is true. Cipher is the algorithm used in ENCRYPTION. Encryption is making READABLE TEXT as unreadable to keep it secured.

70.

The process of transforming plain text into unreadable text.(a) Decryption(b) Encryption(c) Network Security(d) Information HidingI have been asked this question in an interview.I'm obligated to ask this question of Network Security and Encryption in portion Information Technology of Computer Fundamentals

Answer»

Right choice is (b) Encryption

The EXPLANATION is: Encryption is the process of transforming readable text i.e. plain text to make it unreadable to anyone except those possessing SPECIAL KNOWLEDGE, usually referred to as a KEY.

71.

Security features that control that can access resources in the OS.(a) Authentication(b) Identification(c) Validation(d) Access controlI had been asked this question in an interview for job.My question comes from Network Security topic in portion Information Technology of Computer Fundamentals

Answer»

Right answer is (d) ACCESS control

The explanation: Access control REFERS to the SECURITY features. Applications call access control to provide resources.

72.

The information that gets transformed in encryption is ____________(a) Plain text(b) Parallel text(c) Encrypted text(d) Decrypted textThis question was addressed to me in a job interview.Asked question is from Network Security topic in division Information Technology of Computer Fundamentals

Answer»

The correct choice is (a) Plain text

Explanation: The text that gets transformed is CALLED plain text. The ALGORITHM used is called CIPHER.

73.

An algorithm in encryption is called _____________(a) Algorithm(b) Procedure(c) Cipher(d) ModuleI have been asked this question in my homework.This is a very interesting question from Network Security in section Information Technology of Computer Fundamentals

Answer»

The CORRECT option is (C) Cipher

To elaborate: An algorithm USED in ENCRYPTION is REFERRED to as a cipher. cipher is an algorithm for performing encryption or decry

74.

CHAP stands for?(a) Challenge Handshake authentication protocol(b) Challenge Hardware authentication protocol(c) Circuit Hardware authentication protocol(d) Circuit Handshake authentication protocolThis question was posed to me in a national level competition.I need to ask this question from Network Security in portion Information Technology of Computer Fundamentals

Answer»

The correct answer is (a) CHALLENGE HANDSHAKE authentication protocol

Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses TELNET, HTTP.

75.

A concern of authentication that deals with user rights.(a) General access(b) Functional authentication(c) Functional authorization(d) Auto verificationThe question was asked during an online exam.The origin of the question is Network Security in division Information Technology of Computer Fundamentals

Answer»

Correct OPTION is (c) Functional authorization

For explanation I would say: Functional authorization is CONCERNED with individual user rights. Authorization is the function of SPECIFYING access rights to RESOURCES RELATED to information security.

76.

The process of verifying the identity of a user.(a) Authentication(b) Identification(c) Validation(d) VerificationI have been asked this question in exam.My question comes from Network Security topic in division Information Technology of Computer Fundamentals

Answer»

The correct answer is (a) AUTHENTICATION

Explanation: It is CALLED an authentication. It is TYPICALLY based on passwords, SMART CARD, fingerprint, etc.

77.

Which of these is a part of network identification?(a) UserID(b) Password(c) OTP(d) fingerprintI got this question during a job interview.The origin of the question is Network Security in division Information Technology of Computer Fundamentals

Answer»

The correct choice is (a) UserID

The explanation is: The answer is UserID. UserID is a PART of IDENTIFICATION. UserID can be a combination of USERNAME, user student NUMBER etc.

78.

Which is not an objective of network security?(a) Identification(b) Authentication(c) Access control(d) LockThe question was posed to me in exam.I'm obligated to ask this question of Network Security topic in section Information Technology of Computer Fundamentals

Answer»

The correct option is (d) LOCK

To elaborate: The Identification, AUTHENTICATION and ACCESS control are the OBJECTIVES of NETWORK security. There is no such thing called lock.

79.

Network Security provides authentication and access control for resources.(a) True(b) FalseI have been asked this question in unit test.My question comes from Network Security topic in portion Information Technology of Computer Fundamentals

Answer»

Correct OPTION is (a) TRUE

To EXPLAIN: The statement is true. AFS is an EXAMPLE. It helps US protect vital information.

80.

The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.(a) Artificial Intelligence(b) ML(c) Network Security(d) ITThis question was addressed to me by my college professor while I was bunking the class.This is a very interesting question from Network Security topic in chapter Information Technology of Computer Fundamentals

Answer»

Correct option is (c) NETWORK Security

Explanation: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and COMMUNICATIONS among BUSINESS and GOVERNMENT agencies ETC.