Search Header Logo

BCP221 Network Security Quiz

Authored by Roweza Valencia

Computers

University

BCP221 Network Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'C' in the CIA Triad stand for?

Connection
Confidentiality
Cryptography
Certification

Answer explanation

Confidentiality ensures that only authorized people can read the data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the CIA Triad ensures that data hasn't been changed during transit?

Confidentiality
Integrity
Availability
Authorization

Answer explanation

Integrity guarantees that the data received is exactly the data that was sent, without modification.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'Availability' mean in the context of the CIA Triad?

The source code is open to the public.
The service is up and running when needed.
The network is free to use.
Passwords are easy to remember.

Answer explanation

Availability ensures that systems and data are accessible to authorized users when they need them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves someone passively 'listening' to your socket data on the network?

Eavesdropping (Packet Sniffing)
Denial of Service (DoS)
SQL Injection
Phishing

Answer explanation

Eavesdropping involves capturing packets on a network using a sniffer, violating Confidentiality.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a 'Man-in-the-Middle' (MITM) attack?

A server crashing due to overload.
An attacker intercepting and altering communication between client and server.
A user forgetting their password.
A virus deleting files.

Answer explanation

In a MITM attack, the attacker sits between the two parties, compromising both Confidentiality and Integrity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack aims to crash a server by flooding it with too many requests?

Eavesdropping
MITM
DoS (Denial of Service)
Ransomware

Answer explanation

A DoS attack targets the Availability of a system by overwhelming its resources.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is using standard Python sockets considered vulnerable by default?

They use too much CPU.
They transmit data in Plaintext.
They only work on local networks.
They automatically share passwords.

Answer explanation

Standard sockets do not encrypt data. Anyone with a network sniffer can read Plaintext transmissions.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?