Search Header Logo

Network Defence

Authored by praveen s

Computers

University

Used 5+ times

Network Defence
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

what is encryption in the context of network security?

Authenticating users based on their unique characteristics

Hiding the true source of network traffic

Scanning network traffic of malicious patterns

Converting plaintext data into cipertext to prevent unauthorized access

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is NOT a security service defined in OSI security architecture?

Confidentiality

Integrity

Availability

Compression

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In a Caesar cipher, if the key is 3, what is the cipher text of "CYBER"?

KHOOR

FBEHU

GDKKN

JGNNQ

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In the symmetric cipher model, which key is used for decryption?

Same key as encryption

No key is used

Public key

A different key from encryption

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of these is NOT a substitution cipher?

Playfair Cipher

Vigenère Cipher

Rail Fence Cipher

Hill Cipher

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Simplified DES (SDES) operates on a block size of:

12 bits

8 bits

14 bits

4 bits

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

what is the purpose of access control mechanisms in network security?

To prevent unauthorized users from accessing sensitive resources

To increase network speed and reduce latency

To monitor network traffic for performance optimization

To create backups of user data automatically

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers