Computer Networks MCQs with answers Page - 112

Here, you will find a collection of MCQ questions on Computer Networks. Go through these questions to enhance your preparation for upcoming examinations and interviews.

To check the correct answer, simply click the View Answer button provided for each question.

Have your own questions to contribute? Click the button below to share your MCQs with others!

+ Add Question

A

Admin • 828.03K Points
Coach

Q. Which tool is commonly used for penetration testing?

  • (A) Wireshark
  • (B) Nmap
  • (C) Metasploit
  • (D) Traceroute

A

Admin • 828.03K Points
Coach

Q. Which authentication method uses two or more verification factors?

  • (A) Single sign-on
  • (B) Multi-factor authentication
  • (C) Biometric login
  • (D) Password-based login

A

Admin • 828.03K Points
Coach

Q. Which type of malware encrypts files and demands payment?

  • (A) Trojan
  • (B) Ransomware
  • (C) Worm
  • (D) Spyware

A

Admin • 828.03K Points
Coach

Q. Which security principle ensures that only authorized users can access resources?

  • (A) Confidentiality
  • (B) Integrity
  • (C) Availability
  • (D) Non-repudiation

A

Admin • 828.03K Points
Coach

Q. Which algorithm is symmetric encryption?

  • (A) RSA
  • (B) ECC
  • (C) AES
  • (D) DSA

A

Admin • 828.03K Points
Coach

Q. Which device detects malicious traffic but does not block it?

  • (A) Firewall
  • (B) IDS
  • (C) IPS
  • (D) Router

A

Admin • 828.03K Points
Coach

Q. Which hashing algorithm is most widely used for password storage?

  • (A) SHA-256
  • (B) MD5
  • (C) SHA-1
  • (D) CRC32

A

Admin • 828.03K Points
Coach

Q. Which of the following is a phishing attack?

  • (A) Fake login page to steal credentials
  • (B) Flooding a server with traffic
  • (C) Exploit buffer overflow
  • (D) Scanning open ports

A

Admin • 828.03K Points
Coach

Q. Which of the following is an example of a social engineering attack?

  • (A) Man-in-the-middle
  • (B) Phishing
  • (C) SQL Injection
  • (D) DDoS

A

Admin • 828.03K Points
Coach

Q. Which security concept ensures data is not altered during transmission?

  • (A) Confidentiality
  • (B) Integrity
  • (C) Availability
  • (D) Authentication

Add MCQ in this Category

If you want to share an MCQ question in this category, it's a great idea! It will be helpful for many other students using this website.

Share Your MCQ