CHAPTER 1
1.1 Multiple-Choice Questions
(MCQs)
1.
What is the primary goal of network security?
o A. Increase data speed
o B. Prevent unauthorized access
o C. Reduce network costs
o D. Improve user interface
Correct Answer: B. Prevent unauthorized
access
2. Which of the following ensures only authorized
users can access sensitive information?
o A. Integrity
o B. Confidentiality
o C. Availability
o D. Authentication
Correct Answer: B. Confidentiality
3. What method is used to ensure message
confidentiality?
o A. Hashing
o B. Digital signature
o C. Encryption
o D. Checksum
Correct Answer: C. Encryption
4. What does "integrity" in network security
ensure?
o A. Messages are not altered during
transmission
o B. Messages are encrypted
o C. Only the sender can access the message
o D. System uptime is maximized
Correct Answer: A. Messages are not
altered during transmission
5. What is used to detect message alterations?
o A. Encryption
o B. Checksum
o C. Digital certificates
o D. Firewall
Correct Answer: B. Checksum
6. Which of the following best describes non-
repudiation?
o A. Preventing denial of sending or receiving
messages
o B. Blocking unauthorized users
o C. Encrypting data to maintain secrecy
o D. Monitoring user activity
Correct Answer: A. Preventing denial of
sending or receiving messages
7. What is access control?
o A. Limiting network speed
o B. Managing permissions for network
resources
o C. Encrypting data packets
o D. Blocking all users from accessing a
network
Correct Answer: B. Managing permissions
for network resources
8. Which property ensures the availability of data?
o A. Confidentiality
o B. Authentication
o C. Integrity
o D. Availability
Correct Answer: D. Availability
9. What is a packet sniffer?
o A. A device for encrypting messages
o B. Software that captures all network packets
o C. A tool to prevent data theft
o D. A type of firewall
Correct Answer: B. Software that captures
all network packets
10. What does IP spoofing involve?
o A. Altering the destination IP address
o B. Sending messages with a fake source IP
address
o C. Encrypting IP packets
o D. Blocking IP addresses
Correct Answer: B. Sending messages with
a fake source IP address
11. What are the three components of the security
trinity?
o A. Encryption, Decryption, and Monitoring
o B. Prevention, Detection, and Response
o C. Authentication, Integrity, and
Confidentiality
o D. Access Control, Monitoring, and
Encryption
Correct Answer: B. Prevention, Detection,
and Response
12. What type of intruder intercepts messages but
does not alter them?
o A. Active intruder
o B. Passive intruder
o C. Ethical hacker
o D. Administrator
Correct Answer: B. Passive intruder
13. Which of the following is NOT a goal of network
security?
o A. Availability
o B. Integrity
o C. Cost reduction
o D. Authentication
Correct Answer: C. Cost reduction
14. What ensures the sender and receiver confirm
each other's identity?
o A. Authentication
o B. Non-repudiation
o C. Encryption
o D. Access control
Correct Answer: A. Authentication
15. What does prevention in the security trinity focus
on?
o A. Blocking unauthorized access
o B. Monitoring user activities
o C. Detecting vulnerabilities
o D. Responding to attacks
Correct Answer: A. Blocking unauthorized
access
1.2 Multiple-Choice Questions
(MCQs)
1. What does the Internet Architecture Board (IAB)
report emphasize regarding Internet security?
a) Reducing Internet speed
b) Securing the network infrastructure
c) Limiting Internet usage
d) Avoiding cryptographic algorithms
Correct Answer: b) Securing the network
infrastructure
2. What mechanism is highlighted for securing end-
user-to-end-user traffic?
a) Firewalls
b) Authentication and encryption
c) Virtual private networks
d) Packet sniffing
Correct Answer: b) Authentication and encryption
3. Which of the following is an example of a security
weakness in Internet routers?
a) Denial of service attacks
b) Eavesdropping
c) Operating system vulnerabilities
d) Packet monitoring
Correct Answer: c) Operating system
vulnerabilities
4. What does IP spoofing involve?
a) Encrypting packets
b) Sending large data packets
c) Creating packets with false IP addresses
d) Disabling firewalls
Correct Answer: c) Creating packets with false IP
addresses
5. What kind of attacks have become more
automated over time?
a) Phishing
b) Denial of service attacks
c) Cryptographic attacks
d) Network protocol breaches
Correct Answer: b) Denial of service attacks
6. Which entity tracks Internet-related
vulnerabilities?
a) Internet Governance Forum
b) CERT
c) ICANN
d) NIST
Correct Answer: b) CERT
7. What kind of incidents does CERT report?
a) Unauthorized advertisements
b) Security-related incidents
c) Hardware malfunctions
d) Internet speed drops
Correct Answer: b) Security-related incidents
8. What kind of attacks involve reading transmitted
information?
a) Denial of service
b) IP spoofing
c) Packet sniffing
d) Firewall breaches
Correct Answer: c) Packet sniffing
9. What has decreased over time regarding the
knowledge required for attacks?
a) Amount of information
b) Amount of skill
c) Complexity of software
d) Protocol length
Correct Answer: b) Amount of skill
10. What trend has coincided with the increased
complexity of Internet protocols?
a) Reduction in vulnerabilities
b) Decrease in Internet usage
c) Increase in attacks
d) Elimination of security threats
Correct Answer: c) Increase in attacks
11. Which infrastructure relies heavily on Internet
operations?
a) Banking and financial systems
b) Critical infrastructures
c) Agricultural systems
d) None of the above
Correct Answer: b) Critical infrastructures
12. Which algorithms are crucial for Internet
security?
a) Sorting algorithms
b) Cryptographic algorithms
c) Machine learning algorithms
d) None of the above
Correct Answer: b) Cryptographic algorithms
13. What should designers focus on to counter
security threats?
a) Internet-based protocols
b) Router configurations
c) Decreasing traffic speed
d) Increasing packet size
Correct Answer: a) Internet-based protocols
14. What is a common target for Internet-based
attacks?
a) Operating systems and applications
b) Hardware devices only
c) Network cables
d) Web browsers only
Correct Answer: a) Operating systems and
applications
15. What is the primary cause of the growing
Internet threat?
a) Reduced use of email
b) Increased reliance on Internet and Web
applications
c) Decrease in automation
d) Reduced skill among attackers
Correct Answer: b) Increased reliance on Internet
and Web applications
1.3 Multiple-Choice Questions
(MCQs)(1.4)
1. What is the primary purpose of the OSI security
architecture?
a) To improve network speed
b) To assess security needs and evaluate security
products
c) To develop new communication protocols
d) To simplify data transfer processes
Correct Answer: b) To assess security needs and
evaluate security products
2. Why is the OSI security architecture useful to
managers?
a) It reduces security costs
b) It organizes the task of providing security
c) It eliminates the need for security mechanisms
d) It improves network latency
Correct Answer: b) It organizes the task of
providing security
3. What does the OSI security architecture focus
on?
a) Hardware components
b) Security attacks, mechanisms, and services
c) Communication protocols
d) Network routing
Correct Answer: b) Security attacks, mechanisms,
and services
4. What is a security service?
a) A process for encrypting data
b) A service enhancing the security of data
processing systems
c) A mechanism for hardware maintenance
d) A tool for optimizing network performance
Correct Answer: b) A service enhancing the
security of data processing systems
5. What is the purpose of a security mechanism?
a) To enhance system speed
b) To detect, prevent, or recover from security
attacks
c) To organize data efficiently
d) To improve hardware compatibility
Correct Answer: b) To detect, prevent, or recover
from security attacks
6. How do security services counter attacks?
a) By reducing network usage
b) By using one or more security mechanisms
c) By increasing hardware performance
d) By optimizing software configurations
Correct Answer: b) By using one or more security
mechanisms
7. What is a security attack?
a) An attempt to improve system functionality
b) Any action compromising the security of
information
c) A method to upgrade communication protocols
d) A tool for network diagnostics
Correct Answer: b) Any action compromising the
security of information
8. Why is the OSI security architecture considered
valuable internationally?
a) It increases software development costs
b) It was developed as an international standard
c) It reduces hardware dependencies
d) It eliminates network protocols
Correct Answer: b) It was developed as an
international standard
9. How does the OSI security architecture help
vendors?
a) It improves product speed
b) It helps develop security features for products and
services
c) It reduces production costs
d) It optimizes data storage solutions
Correct Answer: b) It helps develop security
features for products and services
10. What does the OSI security architecture provide
to learners?
a) A detailed hardware blueprint
b) An abstract overview of security concepts
c) A list of specific security tools
d) A guide for network installation
Correct Answer: b) An abstract overview of
security concepts
1.3.1 Combined MCQs on Network Security
Topics
1.10 Authorization
1. What does authorization ensure in network
security?
o A) Users are authenticated
o B) Users can access resources they are
authorized for
o C) Users' passwords are encrypted
o D) Systems are backed up regularly
Correct Answer: B
2. Which access level would a manager typically
have in a system?
o A) View-only access
o B) Edit or delete permissions
o C) No access
o D) Public access Correct Answer: B
What is a key feature of authorization?
A) It grants access based on roles and permissions
B) It verifies user credentials
C) It encrypts data in transit
D) It provides system updates Correct Answer: A
3. How does authorization differ from
authentication?
o A) Authorization verifies identity, authentication
grants permissions
o B) Authorization grants permissions,
authentication verifies identity
o C) Both perform the same function
o D) Authorization involves password protection
Correct Answer: B
4. Why is authorization important in network
security?
o A) It enhances user interface design
o B) It prevents unauthorized access and ensures
role-specific actions
o C) It improves internet speed
o D) It enables hardware encryption Correct
Answer: B
1.11 Cryptographic Keys
6. What is the primary purpose of a cryptographic
key?
o A) Encrypt and decrypt data
o B) Speed up data transfer
o C) Store user credentials
o D) Monitor network traffic Correct Answer: A
What type of key is used in symmetric encryption?
A) Public and private keys
B) A single shared key
C) A digital signature
D) Multiple random keys Correct Answer: B
7. Which key type is used for secure communication
without sharing a private key?
o A) Symmetric key
o B) Asymmetric key
o C) Digital key
o D) Encryption key Correct Answer: B
8. What is the advantage of asymmetric encryption
over symmetric encryption?
o A) Faster encryption process
o B) No need to share private keys
o C) Reduced computational power
o D) It doesn’t require algorithms Correct Answer:
B
9. What does key management ensure in
cryptography?
o A) Secure creation, sharing, and deletion of keys
o B) Faster processing of encrypted data
o C) Backups of encryption algorithms
o D) Remote access to encrypted data Correct
Answer: A
1.12 Viruses
11. What is a computer virus?
o A) A program that encrypts data
o B) A program that modifies and infects other
programs
o C) A firewall tool
o D) A hardware security measure Correct Answer:
B
12. In which phase does a virus replicate itself into
other programs?
o A) Dormant phase
o B) Propagation phase
o C) Triggering phase
o D) Execution phase Correct Answer: B
13. What happens during the execution phase of a
virus?
o A) The virus becomes idle
o B) The virus deletes itself
o C) The virus performs its intended function
o D) The virus scans for antivirus software Correct
Answer: C
14. Which type of virus hides itself from antivirus
software?
o A) Boot sector virus
o B) Stealth virus
o C) Polymorphic virus
o D) Parasitic virus Correct Answer: B
15. What is a key feature of a polymorphic virus?
o A) It infects the boot sector
o B) It rewrites its code with each replication
o C) It hides in memory
o D) It targets specific operating systems Correct
Answer: B
1.13 Worms
16. What distinguishes a worm from a virus?
o A) Worms do not replicate
o B) Worms spread without human intervention
o C) Worms require executable files to attach
o D) Worms are only found in email attachments
Correct Answer: B
17. How does a network worm propagate?
o A) By logging into remote systems and copying
itself
o B) By requiring manual execution
o C) By attaching to executable files
o D) By encrypting network traffic Correct Answer:
A
18. Which is an example of a worm’s propagation
method?
o A) Using remote login capabilities
o B) Modifying antivirus software
o C) Scanning for unused ports
o D) Encrypting local files Correct Answer: A
19. What is the primary threat posed by worms?
o A) They slow down internet speed
o B) They spread rapidly and cause network
disruption
o C) They delete antivirus programs
o D) They require user authentication to activate
Correct Answer: B
20. What is a characteristic of email-based worms?
o A) They require manual forwarding
o B) They use email to propagate automatically
o C) They attach to boot sectors
o D) They do not replicate Correct Answer: B
1.14 Trojan Horses
21. What is a Trojan horse in network security?
o A) A program that encrypts files
o B) A seemingly useful program containing hidden
malicious code
o C) A worm variant
o D) A hardware-based security measure Correct
Answer: B
What is a common goal of Trojan horse programs?
A) Data encryption
B) Data destruction or unauthorized access
C) Network monitoring
D) Secure communication Correct Answer: B
22. How does a Trojan horse typically operate?
o A) It scans for open ports
o B) It disguises itself as legitimate software
o C) It encrypts all system files
o D) It sends spam emails Correct Answer: B
23. What is a key feature of a Trojan horse?
o A) It replicates itself like a worm
o B) It relies on user interaction to execute
malicious code
o C) It encrypts network traffic
o D) It hides in the boot sector Correct Answer: B
24. What risk does a Trojan horse pose?
o A) Slow internet speed
o B) Unauthorized access and data destruction
o C) Overwriting antivirus programs
o D) Disabling firewalls Correct Answer: B
1.15 Multilevel Model of Security
26. What is the purpose of the multilevel model of
security?
o A) To enhance system speed
o B) To control access to information based on
sensitivity levels
o C) To encrypt all system data
o D) To prevent malware infections Correct
Answer: B
27. Which access control mechanism is based on roles
within an organization?
o A) Mandatory Access Control (MAC)
o B) Discretionary Access Control (DAC)
o C) Role-Based Access Control (RBAC)
o D) Layered Defense Correct Answer: C
28. What is the most sensitive level of data
classification?
o A) Public
o B) Confidential
o C) Secret
o D) Top Secret Correct Answer: D
29. What does the layered defense approach involve?
o A) Single-level encryption
o B) Implementing security at multiple layers
o C) Sharing access across all users
o D) Encrypting passwords only Correct Answer: B
30. Why is auditing and monitoring important in
multilevel security?
o A) It prevents system updates
o B) It tracks data access and detects breaches
o C) It speeds up system performance
o D) It eliminates user errors Correct Answer: B
1.16 Legal Issues
31. What does GDPR regulate?
o A) Financial transactions
o B) Personal data protection in the EU
o C) Network hardware maintenance
o D) Malware distribution Correct Answer: B
32. Which law focuses on healthcare data security in
the US?
o A) GDPR
o B) HIPAA
o C) CFAA
o D) DMCA Correct Answer: B
33. What does the CFAA criminalize?
o A) Sharing public data
o B) Unauthorized computer access
o C) Installing antivirus software
o D) Data encryption Correct Answer: B
34. What is required for ethical hacking?
o A) An open network
o B) Legal permission
o C) Encrypted credentials
o D) High-speed internet Correct Answer: B
35. What is the primary purpose of compliance
requirements?
o A) To simplify user access
o B) To ensure data security and legal adherence
o C) To reduce system costs
o D) To prevent hardware failure Correct Answer:
B
1.3.2 10 Multiple-Choice Questions (MCQs)
1. What does X.800 define as a security service?
a) A mechanism for encrypting data
b) A service provided by a protocol layer ensuring
adequate system security
c) A software tool for data compression
d) A service for increasing network speed
Correct Answer: b) A service provided by a
protocol layer ensuring adequate system security
2. What is the primary concern of the
authentication service?
a) Protecting against passive attacks
b) Ensuring a communication is authentic
c) Preventing unauthorized data duplication
d) Increasing connection speed
Correct Answer: b) Ensuring a communication is
authentic
3. Which authentication service corroborates the
source of a data unit?
a) Peer entity authentication
b) Data origin authentication
c) Access control authentication
d) Traffic flow confidentiality
Correct Answer: b) Data origin authentication
4. What does peer entity authentication aim to
prevent?
a) Data modification
b) Masquerading or unauthorized replay of
connections
c) Message duplication
d) Traffic flow analysis
Correct Answer: b) Masquerading or unauthorized
replay of connections
5. What is the main goal of access control?
a) To identify traffic flow patterns
b) To limit and control access to host systems and
applications
c) To encrypt transmitted data
d) To ensure message non-repudiation
Correct Answer: b) To limit and control access to
host systems and applications
6. What does data confidentiality primarily protect
against?
a) Passive attacks
b) Active attacks
c) Unauthorized message modification
d) Replay attacks
Correct Answer: a) Passive attacks
7. Which aspect of confidentiality protects traffic
flow from analysis?
a) Message encryption
b) Traffic flow confidentiality
c) Peer entity authentication
d) Connection-oriented integrity
Correct Answer: b) Traffic flow confidentiality
8. What is covered under a connection-oriented
integrity service?
a) Message duplication, insertion, modification,
reordering, or replay
b) Passive attacks
c) Unauthorized data access
d) Source and destination analysis
Correct Answer: a) Message duplication, insertion,
modification, reordering, or replay
9. What is the purpose of non-repudiation?
a) To prevent data duplication
b) To prove the sender or receiver of a message
cannot deny its transmission
c) To analyze traffic flow patterns
d) To enhance connection speed
Correct Answer: b) To prove the sender or receiver
of a message cannot deny its transmission
10. What type of integrity service deals with
individual messages only?
a) Connection-oriented integrity
b) Connectionless integrity
c) Data origin authentication
d) Traffic flow confidentiality
Correct Answer: b) Connectionless integrity
1.3.3 10 Multiple-Choice Questions (MCQs)
1. What is a security attack?
a) A way to secure data
b) An attempt to harm, steal, or disrupt data or
services without permission
c) A protocol for system encryption
d) A method to improve network speed
Correct Answer: b) An attempt to harm, steal, or
disrupt data or services without permission
2. Which type of attack involves eavesdropping
without altering the system resources?
a) Active attack
b) Passive attack
c) Denial of service
d) Masquerade
Correct Answer: b) Passive attack
3. What are the two types of passive attacks?
a) Masquerade and replay
b) Release of message contents and traffic analysis
c) Modification of messages and denial of service
d) Traffic analysis and replay
Correct Answer: b) Release of message contents
and traffic analysis
4. Which technique is commonly used to prevent
passive attacks?
a) Authentication
b) Encryption
c) Masquerading
d) Replay protection
Correct Answer: b) Encryption
5. What is the main goal of a traffic analysis attack?
a) To alter the message contents
b) To gather information about message patterns and
communication details
c) To disable network functionality
d) To impersonate another entity
Correct Answer: b) To gather information about
message patterns and communication details
6. What differentiates active attacks from passive
attacks?
a) Active attacks involve altering system resources
or operations.
b) Active attacks are harder to detect.
c) Passive attacks involve modification of data.
d) Passive attacks are more harmful.
Correct Answer: a) Active attacks involve altering
system resources or operations.
7. Which attack involves impersonating another
entity?
a) Replay
b) Masquerade
c) Denial of service
d) Traffic analysis
Correct Answer: b) Masquerade
8. What does a replay attack involve?
a) Altering a message
b) Capturing and retransmitting a message
c) Blocking communication
d) Observing message patterns
Correct Answer: b) Capturing and retransmitting a
message
9. What happens in a modification of messages
attack?
a) Messages are captured and retransmitted.
b) Messages are altered, delayed, or reordered to
produce unauthorized effects.
c) Messages are encrypted to prevent interception.
d) Communication is disrupted by traffic analysis.
Correct Answer: b) Messages are altered, delayed,
or reordered to produce unauthorized effects.
10. What is the goal of a denial-of-service (DoS)
attack?
a) To gather sensitive information
b) To prevent or inhibit normal use of
communication facilities
c) To impersonate another user
d) To analyze traffic flow patterns
Correct Answer: b) To prevent or inhibit normal
use of communication facilities
1.3.4 Multiple Choice Questions (MCQs)
1. What is the purpose of encipherment in security
mechanisms?
a) To ensure data integrity
b) To prevent traffic analysis
c) To provide confidentiality
d) To control access
Correct Answer: c) To provide confidentiality
2. Which technique is used in encipherment?
a) Cryptography
b) Hashing
c) Notarization
d) Authentication exchange
Correct Answer: a) Cryptography
3. What is the role of a digital signature?
a) To encrypt data
b) To electronically sign and verify data
c) To detect security events
d) To prevent data loss
Correct Answer: b) To electronically sign and
verify data
4. What does traffic padding help prevent?
a) Denial of service
b) Data modification
c) Traffic analysis
d) Unauthorized access
Correct Answer: c) Traffic analysis
5. What is the function of routing control?
a) To monitor data flow
b) To select a secured route for data transfer
c) To encrypt transmitted data
d) To audit security events
Correct Answer: b) To select a secured route for
data transfer
6. Which of the following is an example of a
pervasive security mechanism?
a) Encipherment
b) Event detection
c) Digital signature
d) Traffic padding
Correct Answer: b) Event detection
7. What does access control ensure?
a) That only authorized users can access data or
resources
b) That data is encrypted
c) That traffic is monitored
d) That events are detected
Correct Answer: a) That only authorized users
can access data or resources
8. What is trusted functionality in security
mechanisms?
a) Functions perceived to be correct with respect to
criteria
b) Mechanisms to control traffic
c) A method of data integrity
d) Digital verification of a message
Correct Answer: a) Functions perceived to be
correct with respect to criteria
9. What is the purpose of a security audit trail?
a) To encrypt data
b) To collect data for security audits
c) To detect unauthorized access
d) To manage traffic routing
Correct Answer: b) To collect data for security
audits
10. What is the role of security recovery?
a) To detect unauthorized events
b) To handle events and take recovery actions
c) To encrypt sensitive data
d) To provide secure routing
Correct Answer: b) To handle events and take
recovery actions
1.3.5 Multiple Choice Questions (MCQs)
1. What does the term "principals" refer to in the
network security model?
o A) The algorithms used for encryption
o B) Communication nodes like sender and
receiver
o C) Trusted third parties
o D) The physical transmission medium
Correct Answer: B) Communication nodes like
sender and receiver
2. Which component in the network security model
ensures the original message can be retrieved
securely?
o A) Logical information channel
o B) Secret information
o C) Secure message
o D) Security-related transformation
Correct Answer: C) Secure message
3. What is the primary function of a trusted third
party in network security?
o A) Encrypt messages for secure transmission
o B) Transmit secret information and settle
disputes
o C) Create logical information channels
o D) Protect communication nodes from attacks
Correct Answer: B) Transmit secret information
and settle disputes
4. Which challenge in network security arises due to
employees using their personal devices for work
purposes?
o A) Insider Threat
o B) Mobility
o C) Password Management
o D) Privacy Laws
Correct Answer: B) Mobility
5. What is a Distributed Denial of Service (DDoS)
attack primarily aimed at?
o A) Altering message contents
o B) Overloading servers to disrupt normal
operations
o C) Intercepting secure information
o D) Stealing employee credentials
Correct Answer: B) Overloading servers to
disrupt normal operations
6. What is an example of security-related
transformation in the network security model?
o A) Establishing a logical channel
o B) Encrypting a message
o C) Using stronger passwords
o D) Employing a trusted third party
Correct Answer: B) Encrypting a message
7. Which challenge involves balancing privacy with
the need to gather information for addressing
breaches?
o A) Internet
o B) Privacy Laws
o C) Insider Threat
o D) Password Management
Correct Answer: B) Privacy Laws
8. What is the main purpose of a logical information
channel in the network security model?
o A) Encrypting messages
o B) Defining a route through the network
o C) Managing password policies
o D) Monitoring network activity
Correct Answer: B) Defining a route through the
network
9. Which of the following is an example of secret
information in the network security model?
o A) Encryption algorithm
o B) Key used for encryption and decryption
o C) Secure message
o D) Communication protocol
Correct Answer: B) Key used for encryption and
decryption
10. What does the security-related transformation in
the model primarily aim to protect against?
o A) Distributed Denial of Service attacks
o B) Insider threats
o C) Unauthorized access by opponents
o D) Internet disruptions
Correct Answer: C) Unauthorized access by
opponents
1.3.6 Multiple Choice Questions (MCQs)
1. What is the primary purpose of authorization?
o A) To verify a user's identity
o B) To grant specific permissions to access
resources
o C) To encrypt sensitive data
o D) To log user activities
Answer: B) To grant specific permissions to
access resources
2. What must occur before authorization?
o A) Data encryption
o B) User authentication
o C) Role assignment
o D) Data transmission
Answer: B) User authentication
3. Which of the following best describes role-based
access control in authorization?
o A) Access is granted based on a user’s role
o B) Access is granted after encryption
o C) Access is granted to all users equally
o D) Access is denied to all users
Answer: A) Access is granted based on a user’s
role
4. What is an example of authorization in practice?
o A) A user logging into a system
o B) A regular employee viewing files while a
manager edits them
o C) Encrypting sensitive files
o D) Sending a secure email
Answer: B) A regular employee viewing files
while a manager edits them
5. How does authorization protect sensitive data?
o A) By ensuring only authorized users can access
it
o B) By encrypting the data before access
o C) By creating backup copies of the data
o D) By monitoring user activities
Answer: A) By ensuring only authorized users
can access it
6. What action can authorization restrict?
o A) Viewing files
o B) Editing files
o C) Deleting files
o D) All of the above
Answer: D) All of the above
7. What improves system security through
authorization?
o A) Granting all users the same permissions
o B) Restricting access and actions based on roles
o C) Allowing anonymous access
o D) Avoiding authentication checks
Answer: B) Restricting access and actions based
on roles
8. Why is defining user actions important in
authorization?
o A) To ensure users can perform only relevant
tasks
o B) To make all resources publicly accessible
o C) To allow users to bypass authentication
o D) To avoid role-based control
Answer: A) To ensure users can perform only
relevant tasks
9. What happens if authorization is not
implemented correctly?
o A) Sensitive data may be accessed by
unauthorized users
o B) User roles are strictly enforced
o C) Encryption becomes unnecessary
o D) Access is automatically denied to all users
Answer: A) Sensitive data may be accessed by
unauthorized users
10. Which process decides whether a user can delete
files?
o A) Authentication
o B) Authorization
o C) Encryption
o D) Event logging
Answer: B) Authorization
1.3.7 Multiple Choice Questions (MCQs)
1. What is the primary role of keys in network
security?
a) Generating random data
b) Securing data and communications
c) Managing network traffic
d) Identifying users
Answer: b) Securing data and communications
2. Which process uses a key to transform plaintext
into ciphertext?
a) Decryption
b) Hashing
c) Encryption
d) Authentication
Answer: c) Encryption
3. What type of key is used in symmetric key
cryptography?
a) Public key
b) Private key
c) Same key for encryption and decryption
d) No key required
Answer: c) Same key for encryption and
decryption
4. In asymmetric cryptography, what is the private
key used for?
a) Encrypting data
b) Decrypting data
c) Generating hashes
d) Sharing keys securely
Answer: b) Decrypting data
5. What is the main disadvantage of symmetric key
cryptography?
a) Slow processing
b) Key sharing risk
c) High computational power requirement
d) Lack of encryption
Answer: b) Key sharing risk
6. Which key type allows public sharing for
encryption?
a) Symmetric key
b) Asymmetric private key
c) Asymmetric public key
d) No key required
Answer: c) Asymmetric public key
7. What does key management NOT involve?
a) Creating keys
b) Deleting keys
c) Sharing keys securely
d) Modifying cryptographic algorithms
Answer: d) Modifying cryptographic algorithms
8. What is a major advantage of symmetric key
encryption?
a) Higher security than asymmetric encryption
b) Faster encryption and decryption
c) No need to share the key
d) Reduced vulnerability to interception
Answer: b) Faster encryption and decryption
9. Which type of cryptography ensures secure
communication without sharing the private key?
a) Symmetric cryptography
b) Asymmetric cryptography
c) Hashing algorithms
d) Steganography
Answer: b) Asymmetric cryptography
10. What is a disadvantage of asymmetric
encryption?
a) Lack of authentication
b) High computational power requirement
c) Requires secret key sharing
d) No data integrity verification
Answer: b) High computational power
requirement