MCQs on Networking and Cyber Security : Free MCQ with Answers

MCQs on Networking and Cyber Security

MCQ on “Basics of networking and cyber security: networking devices and protocols, network and information security threats (like hacking, virus, worms, Trojan etc.) and prevention measures.” with answers || MCQ for Bank PO and IBPS Clerk 2023 Exam || MCQ for SSC CGL Mains Exam || All competitive exam

 

Q1: Which network security measure involves converting readable data into an unreadable format to prevent unauthorized access?

 (a) Packet filtering

(b) Access control

(c) Encryption 

(d) Firewall 

[expand title=”Answer”]Option (c) Encryption[/expand]

Q2: What is “antivirus software” used for in the context of cybersecurity?

(a) Encrypting data for secure transmission

(b) Protecting against malware and viruses

(c) Filtering unwanted emails

(d) Monitoring network traffic

[expand title=”Answer”]

Option (b) Protecting against malware and viruses

[/expand]

Q3: Which network security measure involves encrypting data transmissions to ensure confidentiality?

(a) Firewall

(b) NAT (Network Address Translation)

(c) VPN (Virtual Private Network)

(d) VLAN (Virtual Local Area Network)

[expand title=”Answer”]

Option (c) VPN (Virtual Private Network)

[/expand]

Q4: Which networking device operates at the Data Link Layer of the OSI model and forwards data based on MAC addresses?

(a) Router

(b) Hub

(c) Switch

(d) Modem

[expand title=”Answer”]

Option (c) Switch

[/expand]

Q5: Which networking protocol is commonly used for sending and receiving emails?

(a) FTP

(b) HTTP

(c) SMTP

(d) DHCP

[expand title=”Answer”]

Option (c) SMTP

[/expand]

Q6: Which network security threat involves unauthorized access to computer systems with malicious intent?

(a) Virus

(b) Worm

(c) Trojan

(d) Hacking

[expand title=”Answer”]

Option (d) Hacking

[/expand]

Q7: Which protocol is used for assigning IP addresses to devices on a network automatically?

(a) DNS

(b) DHCP

(c) SSL/TLS

(d) FTP

[expand title=”Answer”]

Option (b) DHCP

[/expand]

Q8: What is a “worm” in the context of Cyber Security?

(a) A type of computer virus

(b) A hardware component that boosts network performance

(c) A type of denial-of-service attack

(d) A self-replicating malicious program that spreads over networks

[expand title=”Answer”]

Option (d) A self-replicating malicious program that spreads over networks

[/expand]

Q9: Which network security threat involves deceptive software that appears to be legitimate but performs malicious actions?

(a) Virus

(b) Worm

(c) Trojan

(d) Hacking

[expand title=”Answer”]

Option (c) Trojan

[/expand]

Q10: Which networking protocol is used for translating human-readable domain names into IP addresses?

(a) DNS

(b) DHCP

(c) FTP

(d) SMTP

[expand title=”Answer”]

Option (a) DNS

[/expand]

Q11: Which networking device connects multiple computers in a star topology and broadcasts data to all connected devices?

(a) Hub

(b) Switch

(c) Router

(d) Modem

[expand title=”Answer”]

Option (a) Hub

[/expand]

Q12: Which network security threat involves overwhelming a system or network with a flood of incoming traffic?

(a) Hacking

(b) Virus

(c) Worm

(d) Denial-of-Service (DoS) attack

[expand title=”Answer”]

Option (d) Denial-of-Service (DoS) attack

[/expand]

Q13: What is “encryption” in the context of Cyber Security?

(a) The process of connecting multiple networks

(b) A method of protecting data by converting it into a code

(c) A type of hardware device used in network routing

(d) A form of network attack

[expand title=”Answer”]

Option (b) A method of protecting data by converting it into a code

[/expand]

Q14: What is a “packet” in the context of networking?

(a) A hardware device for connecting to the internet

(b) A form of wireless encryption

(c) A small unit of data transmitted over a network

(d) A type of antivirus software

[expand title=”Answer”]

Option (c) A small unit of data transmitted over a network

 [/expand]

Q15: Which network security threat involves malicious software that locks users out of their own systems or data until a ransom is paid?

(a) Phishing

(b) Ransomware

(c) Spyware

(d) Malware

[expand title=”Answer”]

Option (b) Ransomware

[/expand]

Q16: Which networking device operates at the Physical Layer of the OSI model and connects devices within the same network segment?

(a) Hub

(b) Router

(c) Switch

(d) Modem

[expand title=”Answer”]

Option (a) Hub

[/expand]

Q17: What does “WPA” stand for in the context of wireless network security?

(a) Wireless Protocol Association

(b) Wi-Fi Protected Access

(c) Web Page Authentication

(d) Wireless Privacy Algorithm

[expand title=”Answer”]

Option (b) Wi-Fi Protected Access

[/expand]

Q18: Which network security threat involves intercepting and capturing data as it travels between two parties?

(a) Spoofing

(b) Eavesdropping

(c) Hacking

(d) Phishing

[expand title=”Answer”]

Option (b) Eavesdropping

[/expand]

Q19: Which network protocol is used for secure remote access to a network, often used for accessing work networks from home?

(a) SMTP

(b) FTP

(c) SSL/TLS

(d) VPN (Virtual Private Network)

[expand title=”Answer”]

Option (d) VPN (Virtual Private Network)

[/expand]

Q20: What is “spyware” in the context of Cyber Security?

(a) A type of computer virus

(b) Malicious software that tracks user activities without consent

(c) A hardware device used for network monitoring

(d) A type of network protocol

[expand title=”Answer”]

Option (b) Malicious software that tracks user activities without consent

[/expand]

Q21: Which network security threat involves creating a fake copy of a legitimate website to deceive users?

(a) Hacking

(b) Spoofing

(c) Phishing

(d) Worm

[expand title=”Answer”]

Option (c) Phishing

[/expand]

Q22: What is the purpose of a “proxy server” in the context of networking?

(a) Blocking all network traffic

(b) Encrypting data packets

(c) Speeding up internet connections

(d) Acting as an intermediary between a user and the internet

[expand title=”Answer”]

Option (d) Acting as an intermediary between a user and the internet

[/expand]

Q23: Which network protocol is used for transferring files between a local computer and a remote server?

(a) DNS

(b) DHCP

(c) FTP

(d) SMTP

[expand title=”Answer”]

Option (c) FTP

[/expand]

Q24: What is “social engineering” in the context of Cyber Security?

(a) A type of encryption technique

(b) The practice of securing social media accounts

(c) Manipulating people into revealing confidential information or performing actions

(d) Developing secure networks

[expand title=”Answer”]

Option (c) Manipulating people into revealing confidential information or performing actions

[/expand]

Q25: Which network security threat involves sending a large volume of email traffic to overwhelm a recipient’s inbox?

(a) Malware

(b) Phishing

(c) Spam

(d) Eavesdropping

[expand title=”Answer”]

Option (c) Spam

[/expand]

Q26: Which network protocol is used for converting IP addresses to MAC addresses on a local network?

(a) DNS

(b) ARP

(c) HTTP

(d) SMTP

[expand title=”Answer”]

Option (b) ARP

[/expand]

Q27: What is a “pharming” attack in the context of network security?

(a) Intercepting wireless signals

(b) Redirecting users to a fake website without their knowledge

(c) Sending malicious emails

(d) Cracking encrypted passwords

[expand title=”Answer”]

Option (b) Redirecting users to a fake website without their knowledge

[/expand]

Q28: Which network security threat involves capturing and analyzing network traffic to obtain sensitive information?

(a) Sniffing

(b) Spoofing

(c) Ransomware

(d) Eavesdropping

[expand title=”Answer”]

Option (a) Sniffing

[/expand]

Q29: What is “data encryption” used for in the context of network security?

(a) Blocking network traffic

(b) Monitoring network activities

(c) Protecting data by converting it into a secure code

(d) Sending bulk emails

[expand title=”Answer”]

Option (c) Protecting data by converting it into a secure code

[/expand]

Q30: Which network protocol is used for secure remote login to a server over an encrypted channel?

(a) HTTP

(b) SSH (Secure Shell)

(c) FTP

(d) SNMP (Simple Network Management Protocol)

[expand title=”Answer”]

Option (b) SSH (Secure Shell)

[/expand]

Q31: Which network security threat involves making a network or website unavailable by overwhelming it with traffic from multiple sources?

(a) Phishing

(b) Spam

(c) Denial-of-Service (DoS) attack

(d) Worm

[expand title=”Answer”]

Option (c) Denial-of-Service (DoS) attack

[/expand]

Q32: Which network security measure involves hiding internal IP addresses from external networks?

(a) Encryption

(b) NAT (Network Address Translation)

(c) VLAN (Virtual Local Area Network)

(d) VPN (Virtual Private Network)

[expand title=”Answer”]

Option (b) NAT (Network Address Translation)

[/expand]

Q33: Which network security threat involves unauthorized access to sensitive information by intercepting wireless signals?

(a) Hacking

(b) Eavesdropping

(c) Ransomware

(d) Phishing

[expand title=”Answer”]

Option (b) Eavesdropping

[/expand]

Q34: What does “SSID” stand for in the context of wireless networks?

 (a) Secure Server Identification

(b) Service Set Identifier

(c) System Security Identification

(d) Shared Server Indicator

[expand title=”Answer”]

Option (b) Service Set Identifier

[/expand]

Q35: Which network protocol is used for secure transfer of files over a network, often used for downloading software updates?

(a) HTTP

(b) FTP

(c) SSH

(d) SMTP

[expand title=”Answer”]

Option (b) FTP

[/expand]

Q36: What is a “data breach” in the context of network security?

(a) A sudden loss of network connectivity

(b) Unauthorized access to confidential information

(c) A type of denial-of-service attack

(d) A method of encrypting data

[expand title=”Answer”]

Option (b) Unauthorized access to confidential information

[/expand]

Q37: Which network security threat involves disguising malicious software as a legitimate application?

(a) Virus

(b) Worm

(c) Trojan

(d) Hacking

[expand title=”Answer”]

Option (c) Trojan

[/expand]

Q38: Which network protocol is used for converting domain names into IP addresses and vice versa?

(a) DHCP

(b) DNS

(c) ARP

(d) SMTP

[expand title=”Answer”]

Option (b) DNS

[/expand]

Q39: What is “data backup” used for in the context of network security?

(a) Intercepting network traffic

(b) Storing copies of important data to prevent loss

(c) Preventing unauthorized access

(d) Blocking spam emails

[expand title=”Answer”]Option (b) Storing copies of important data to prevent loss

[/expand]

Q40: Which network security measure involves creating a secure connection between a user’s device and a network?

(a) Firewall

(b) Encryption

(c) Antivirus software

(d) Router

[expand title=”Answer”]

Option (b) Encryption

[/expand]

Q41: What is a “bot” in the context of Cyber Security?

(a) A type of hardware device

(b) A type of email attachment

(c) A self-replicating malicious program

(d) A compromised computer controlled by a cybercriminal

[expand title=”Answer”]

Option (d) A compromised computer controlled by a cybercriminal

[/expand]

Q42: Which network security threat involves impersonating a legitimate entity to gain unauthorized access or deceive users?

(a) Spoofing

(b) Phishing

(c) Ransomware

(d) Spamming

[expand title=”Answer”]

Option (a) Spoofing

[/expand]

Q43: Which network protocol is used for remotely managing and monitoring network devices?

(a) DNS

(b) FTP

(c) SNMP

(d) SMTP

[expand title=”Answer”]

Option (c) SNMP

[/expand]

Q44: Which network security threat involves a malicious program that self-replicates and spreads across networks without human intervention?

(a) Virus

(b) Worm

(c) Trojan

(d) Spyware

[expand title=”Answer”]

Option (b) Worm

[/expand]

Q45: Which network protocol is used for remotely accessing and managing servers and network devices using a command-line interface?

(a) HTTP

(b) SSH

(c) FTP

(d) SMTP

[expand title=”Answer”]

Option (b) SSH

[/expand]

Q46: Which networking device operates at the Session Layer of the OSI model and provides network services like authentication and authorization?

(a) Hub

(b) Router

(c) Switch

(d) Proxy server

[expand title=”Answer”]

Option (d) Proxy server

[/expand]

Q47: Which network security measure involves monitoring network traffic for suspicious or unauthorized activity?

(a) Encryption

(b) Firewall

(c) Router

(d) Hub

[expand title=”Answer”]

Option (b) Firewall

[/expand]

Q48: Which network protocol is used for securely transferring files over the internet, often used for downloading software updates?

(a) HTTP

(b) FTPS (FTP Secure)

(c) Telnet

(d) SNMP

[expand title=”Answer”]

Option (b) FTPS (FTP Secure)

[/expand]

Q49: Which network security threat involves redirecting network traffic to a malicious server without the user’s knowledge?

(a) Hacking

(b) Spoofing

(c) Eavesdropping

(d) Phishing

[expand title=”Answer”]

Option (b) Spoofing

[/expand]

Q50: What is “patch management” in the context of network security?

(a) Securing physical access to network devices

(b) Encrypting data transmissions

(c) Updating software and systems to fix security vulnerabilities

(d) Monitoring network traffic

[expand title=”Answer”]

Option (c) Updating software and systems to fix security vulnerabilities

[/expand]

Q51: Which network security threat involves malicious software that captures sensitive data such as login credentials?

(a) Ransomware

(b) Spyware

(c) Trojan

(d) Worm

[expand title=”Answer”]

Option (b) Spyware

[/expand]

Q52: Which network protocol is used for remotely managing and configuring network devices, often used for routers and switches?

(a) DNS

(b) FTP

(c) SNMP (Simple Network Management Protocol)

(d) SMTP

[expand title=”Answer”]

Option (c) SNMP (Simple Network Management Protocol)

[/expand]

Q53: Which network security threat involves a targeted attack where an attacker gains access to a system by exploiting a known vulnerability?

(a) Virus

(b) Worm

(c) Zero-day exploit

(d) Hacking

[expand title=”Answer”]

Option (c) Zero-day exploit

 [/expand]

Q54: What is “intrusion detection” used for in the context of network security?

(a) Analyzing network traffic for sensitive data

(b) Monitoring user activities on social media

(c) Detecting and responding to unauthorized access or suspicious activities

(d) Encrypting data transmissions

[expand title=”Answer”]

Option (c) Detecting and responding to unauthorized access or suspicious activities

[/expand]

Q55: Which network protocol is used for remote file access and management over a secure connection?

(a) SSH (Secure Shell)

(b) SMTP

(c) SNMP (Simple Network Management Protocol)

(d) DNS

[expand title=”Answer”]

Option (a) SSH (Secure Shell)

[/expand]

Q56: What is “incident response” used for in the context of network security?

(a) Blocking network traffic

(b) Preventing unauthorized access to network devices

(c) Developing encryption algorithms

(d) Managing and mitigating the aftermath of a security breach

[expand title=”Answer”]

Option (d) Managing and mitigating the aftermath of a security breach

[/expand]

Q57: Which network protocol is used for sending and receiving email messages?

(a) HTTP

(b) SMTP

(c) DNS

(d) FTP

[expand title=”Answer”]

Option (b) SMTP

[/expand]

Q58: Which network security threat involves tricking users into downloading and executing malicious software?

(a) Hacking

(b) Phishing

(c) Ransomware

(d) Drive-by download

[expand title=”Answer”]

Option (d) Drive-by download

[/expand]

Q59: Which network protocol is used for securely transferring files between a local computer and a remote server using encryption?

(a) FTPS (FTP Secure)

(b) HTTP

(c) SMTP

(d) SNMP

[expand title=”Answer”]

Option (a) FTPS (FTP Secure)

[/expand]

Q60: What is a “security token” in the context of network security?

(a) A hardware device used for network routing

(b) A form of wireless encryption

(c) A small electronic device used for two-factor authentication

(d) A type of network protocol

[expand title=”Answer”]

Option (c) A small electronic device used for two-factor authentication

[/expand]

Q61: Which network protocol is used for retrieving emails from a mail server to a local client while keeping the emails on the server?

(a) IMAP (Internet Message Access Protocol)

(b) POP3 (Post Office Protocol version 3)

(c) SMTP

(d) FTP

[expand title=”Answer”]

Option (a) IMAP (Internet Message Access Protocol)

[/expand]

Q62: Which network security threat involves altering or replacing legitimate website content to deceive users?

(a) Hacking

(b) Phishing

(c) Spoofing

(d) Defacement

[expand title=”Answer”]

Option (d) Defacement

[/expand]

Q63: Which network protocol is used for secure login to a remote server over an encrypted connection?

(a) HTTP

(b) HTTPS

(c) FTP

(d) SMTP

[expand title=”Answer”]

Option (b) HTTPS

[/expand]

Q64: Which network security measure involves monitoring and controlling the data flow between networks to prevent unauthorized access?

(a) NAT (Network Address Translation)

(b) Packet filtering

(c) Access control

(d) VLAN (Virtual Local Area Network)

[expand title=”Answer”]

Option (b) Packet filtering

[/expand]

Q65: Which network protocol is used for resolving domain names to IP addresses?

(a) SMTP

(b) SNMP (Simple Network Management Protocol)

(c) DNS

(d) HTTP

[expand title=”Answer”]

[expand title=”Answer”]Text[/expand]

[/expand]

Q66: Which network security measure involves monitoring and recording user activities on a network?

(a) VPN (Virtual Private Network)

(b) Firewall

(c) Audit logging

(d) Encryption

[expand title=”Answer”]Option (c) Audit logging[/expand]

Q67: Which network protocol is used for transferring files between computers over the internet, often used for uploading website content?

(a) SSH (Secure Shell)

(b) HTTP

(c) FTP

(d) DNS

[expand title=”Answer”]

Option (c) FTP

[/expand]

Q68: Which network protocol is used for securely transmitting web content, indicated by “https://” in the URL?

(a) HTTP

(b) HTTPS

(c) FTP

(d) SMTP

[expand title=”Answer”]

Option (b) HTTPS

[/expand]

Q69: Which network security measure involves restricting access to certain websites or online services?

(a) Encryption

(b) Firewall

(c) Content filtering

(d) NAT (Network Address Translation)

[expand title=”Answer”]

Option (c) Content filtering

[/expand]

Q70: Which network protocol is used for securely transferring files between a local computer and a remote server, often used for backups?

(a) HTTPS

(b) SMTP

(c) FTPS (FTP Secure)

(d) SNMP

[expand title=”Answer”]

Option (c) FTPS (FTP Secure)

[/expand]

Q71: Which network protocol is used for remote management of network devices and monitoring their status?

(a) DNS

(b) SNMP (Simple Network Management Protocol)

(c) FTP

(d) SSH (Secure Shell)

[expand title=”Answer”]

Option (b) SNMP (Simple Network Management Protocol)

[/expand]

Q72: Which network security measure involves using hardware and software to inspect and filter network traffic for potential threats?

(a) Encryption

(b) Firewall

(c) NAT (Network Address Translation)

(d) Access control

[expand title=”Answer”]

Option (b) Firewall

[/expand]

Q73: Which network protocol is used for remotely accessing and managing network devices, often used for command-line interface management?

(a) HTTPS

(b) FTP

(c) SSH (Secure Shell)

(d) DNS

[expand title=”Answer”]

Option (c) SSH (Secure Shell)

[/expand]

Q74: Which network security threat involves malicious software that blocks access to a system or data until a ransom is paid?

(a) Virus

(b) Worm

(c) Ransomware

(d) Trojan

[expand title=”Answer”]

Option (c) Ransomware

[/expand]

Q75: Which network protocol is used for securely transferring hypertext documents over the internet?

(a) FTP

(b) HTTP

(c) SNMP (Simple Network Management Protocol)

(d) SMTP

[expand title=”Answer”]

Option (b) HTTP

[/expand]

Q76: Which network protocol is used for securely transferring files between a local computer and a remote server using encryption, often used for automated backups?

(a) SSH (Secure Shell)

(b) HTTPS

(c) FTPS (FTP Secure)

(d) SNMP (Simple Network Management Protocol)

[expand title=”Answer”]

Option (c) FTPS (FTP Secure)

[/expand]

Q77: Which network security threat involves sending unsolicited emails with malicious intent, often containing links to malware or phishing sites?

(a) Eavesdropping

(b) Phishing

(c) Spam

(d) Hacking

[expand title=”Answer”]

Option (c) Spam

[/expand]

Q78: Which network security measure involves using hardware and software to detect and prevent unauthorized access and attacks on a network?

(a) Firewall

(b) VPN (Virtual Private Network)

(c) Packet filtering

(d) VLAN (Virtual Local Area Network)

[expand title=”Answer”]

Option (a) Firewall

[/expand]

Q79: What is “phishing” in the context of network security?

(a) Intercepting wireless signals

(b) A type of firewall

(c) Spreading malicious software through emails

(d) Creating secure passwords

[expand title=”Answer”]

Option (c) Spreading malicious software through emails

[/expand]

Q80: Which network protocol is used for securely transmitting data between a web browser and a web server?

(a) HTTP

(b) HTTPS

(c) FTP

(d) SMTP

[expand title=”Answer”]

Option (b) HTTPS

[/expand]

Q81: Which network security measure involves hiding internal IP addresses from external networks?

(a) Encryption

(b) NAT (Network Address Translation)

(c) VLAN (Virtual Local Area Network)

(d) VPN (Virtual Private Network)

[expand title=”Answer”]

Option (b) NAT (Network Address Translation)

[/expand]

Q82: Which network protocol is used for transferring files between a local computer and a remote server?

(a) HTTPS

(b) FTP

(c) SMTP

(d) SNMP (Simple Network Management Protocol)

[expand title=”Answer”]

Option (b) FTP

[/expand]

Q83: Which network protocol is used for translating domain names into IP addresses and vice versa?

(a) DHCP (Dynamic Host Configuration Protocol)

(b) DNS (Domain Name System)

(c) FTP (File Transfer Protocol)

(d) HTTP (Hypertext Transfer Protocol)

[expand title=”Answer”]

Option (b) DNS (Domain Name System)

[/expand]

Q84: Which network protocol is used for remotely managing and monitoring network devices, often used for routers and switches?

(a) DNS (Domain Name System)

(b) FTP (File Transfer Protocol)

(c) SNMP (Simple Network Management Protocol)

(d) SMTP (Simple Mail Transfer Protocol)

[expand title=”Answer”]

Option (c) SNMP (Simple Network Management Protocol)[/expand]

Q85: Which network security threat involves malicious software that replicates and spreads over a network, often using vulnerabilities?

(a) Virus

(b) Worm

(c) Trojan

(d) Phishing

[expand title=”Answer”]

Option (b) Worm

[/expand]

Q86: Which network protocol is used for securely transferring files between computers, often used for uploading website content?

(a) HTTP (Hypertext Transfer Protocol)

(b) FTP (File Transfer Protocol)

(c) SMTP (Simple Mail Transfer Protocol)

(d) SNMP (Simple Network Management Protocol)

[expand title=”Answer”]

Option (b) FTP (File Transfer Protocol)

[/expand]

Q87: What does “LAN” stand for in the context of networking?

(a) Local Area Network

(b) Long Area Network

(c) Large Area Network

(d) Linked Area Network

[expand title=”Answer”]

Option (a) Local Area Network

[/expand]

Q88: Which networking device connects multiple networks together and routes data between them?

(a) Hub

(b) Modem

(c) Router

(d) Switch

[expand title=”Answer”]

Option (c) Router

[/expand]

Q89: What is “phishing” in the context of network and information security?

(a) A type of malware that self-replicates

(b) A method of stealing sensitive information by posing as a legitimate entity

(c) A hardware device used to amplify network signals

(d) A type of computer worm

[expand title=”Answer”]

Option (b) A method of stealing sensitive information by posing as a legitimate entity

[/expand]

Q90: What is a “DMZ” (Demilitarized Zone) in the context of network security?

(a) A type of firewall

(b) A secure area where critical network resources are located

(c) A public wireless hotspot

(d) An area with no network connectivity

[expand title=”Answer”]

Option (b) A secure area where critical network resources are located

[/expand]

Q91: Which networking protocol ensures secure and encrypted data transmission over the internet?

(a) HTTP

(b) FTP

(c) SSL/TLS

(d) SMTP

[expand title=”Answer”]

Option (c) SSL/TLS

[/expand]

Q92: Which network security measure involves using a list of authorized users to control access to resources?

(a) Encryption

(b) VLAN (Virtual Local Area Network)

(c) Access control list (ACL)

(d) Firewall

[expand title=”Answer”]

Option (c) Access control list (ACL)

[/expand]

Q93: Which network protocol is used for secure web browsing and is indicated by “https://” in the URL?

(a) HTTP

(b) FTP

(c) SMTP

(d) SSL/TLS

[expand title=”Answer”]

Option (d) SSL/TLS

[/expand]

Q94: Which networking device operates at the Presentation Layer of the OSI model and translates data between different formats or encodings?

(a) Hub

(b) Switch

(c) Router

(d) Gateway

[expand title=”Answer”]

Option (d) Gateway

[/expand]

Q95: Which network security threat involves exploiting a software vulnerability to gain unauthorized access to a system or network?

(a) Virus

(b) Phishing

(c) Hacking

(d) Eavesdropping

[expand title=”Answer”]

Option (c) Hacking

[/expand]

Q96: Which network protocol is used for sending and receiving emails, often used for retrieving messages from a mail server to a local client?

(a) SMTP

(b) IMAP (Internet Message Access Protocol)

(c) FTP

(d) SNMP (Simple Network Management Protocol)

[expand title=”Answer”]

Option (b) IMAP (Internet Message Access Protocol)

[/expand]

Q97: Which networking device operates at the Network Layer of the OSI model and makes decisions about routing data between different networks?

(a) Hub

(b) Switch

(c) Router

(d) Modem

[expand title=”Answer”]

Option (c) Router

[/expand]

Q98: Which network security measure involves separating a network into smaller segments to reduce broadcast traffic and enhance security?

(a) VLAN (Virtual Local Area Network)

(b) Encryption

(c) Firewall

(d) Hub

[expand title=”Answer”]

Option (a) VLAN (Virtual Local Area Network)

[/expand]

Q99: Which network security threat involves exploiting vulnerabilities in software or hardware to gain unauthorized access or control of a system?

(a) Virus

(b) Exploit

(c) Phishing

(d) Worm

[expand title=”Answer”]

Option (b) Exploit

[/expand]

Q100: Which network security measure involves changing the original form of data to a non-readable format using a specific algorithm?

(a) Firewall

(b) NAT (Network Address Translation)

(c) Encryption

(d) VLAN (Virtual Local Area Network)

[expand title=”Answer”]

Option (c) Encryption

[/expand]

Download Free MCQ
Test Series
TopicMCQ
Computer Basic MCQ Set 1Computer BasicsClick Here
Computer Basic MCQ Set 2SoftwareClick Here
Computer Basic MCQ Set 3Working with Internet and e-mailsClick Here
Computer Basic MCQ Set 4Basics of networking and cyber securityClick Here
Computer Basic MCQ Set 5Keyboard shortcutsClick Here

Top 50 Networking and Cyber Security MCQ : Free MCQ and Answers || MCQ for Bank PO and IBPS Clerk 2023 Exam || MCQ for SSC CGL Mains Exam || All competitive exam

Leave a Comment