Unit 5 - Practice Quiz

CSE111 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following best describes a Computer Network?

A. A collection of computers connected to share resources
B. A storage device used for backup
C. A single computer processing data
D. A software used to browse the internet

2 Which network type typically covers a small geographic area like a single room or a building?

A. VPN (Virtual Private Network)
B. WAN (Wide Area Network)
C. MAN (Metropolitan Area Network)
D. LAN (Local Area Network)

3 The Internet is the largest example of which type of network?

A. PAN
B. WAN
C. LAN
D. MAN

4 Which network topology connects all devices to a single central cable called the backbone?

A. Ring Topology
B. Bus Topology
C. Mesh Topology
D. Star Topology

5 In which topology are all computers connected to a central device like a hub or a switch?

A. Mesh
B. Bus
C. Star
D. Ring

6 Which network topology provides the highest level of redundancy and reliability by connecting every device to every other device?

A. Bus
B. Mesh
C. Star
D. Tree

7 What is the primary function of a Router?

A. To connect devices within a single LAN
B. To power the computer system
C. To modulate and demodulate signals
D. To direct data packets between different networks

8 Which device is used to convert digital signals from a computer into analog signals for transmission over telephone lines?

A. Router
B. Hub
C. Switch
D. Modem

9 Which networking device is known as a 'dumb' device because it broadcasts data to all connected ports?

A. Firewall
B. Router
C. Switch
D. Hub

10 How does a Switch differ from a Hub?

A. A switch is wireless only
B. A switch connects different networks like the internet
C. A switch cannot connect multiple computers
D. A switch sends data only to the specific destination device

11 Which device allows wireless devices to connect to a wired network?

A. Server
B. Network Interface Card (NIC)
C. Access Point (AP)
D. Modem

12 In the Client-Server model, what is the role of the 'Client'?

A. To route traffic between networks
B. To request services or resources
C. To store all the data and manage permissions
D. To provide security against viruses

13 Which of the following is a characteristic of a Server?

A. It provides resources and services to clients
B. It usually has lower processing power than a client
C. It requests data from other computers
D. It is only used for gaming

14 What is 'Malware' short for?

A. Malicious Hardware
B. Malicious Software
C. Manual Software
D. Malfunction Software

15 Which type of malware attaches itself to a legitimate program and requires human action to spread?

A. Adware
B. Worm
C. Virus
D. Botnet

16 Which malware is self-replicating and spreads across networks without requiring a host file or user interaction?

A. Spyware
B. Virus
C. Trojan Horse
D. Worm

17 What is a Trojan Horse in the context of computing?

A. A fast network cable
B. Malware disguised as legitimate software
C. A hardware device for racing
D. A type of antivirus

18 Which type of malware encrypts a user's files and demands payment for the decryption key?

A. Ransomware
B. Adware
C. Spyware
D. Worm

19 Software that secretly monitors user activity and collects information without their knowledge is called:

A. Freeware
B. Firmware
C. Spyware
D. Firewall

20 What is Phishing?

A. Connecting to a Wi-Fi network
B. Scanning a hard drive for errors
C. Sending fraudulent emails to trick users into revealing sensitive info
D. Installing a firewall

21 Which attack method involves trying every possible combination of characters to guess a password?

A. Brute Force Attack
B. SQL Injection
C. Dictionary Attack
D. Phishing

22 What does MFA stand for in computer security?

A. Multiple File Access
B. Multi-Factor Authentication
C. Master File Allocation
D. Main Factor Authorization

23 Which of the following is an example of 'Something you are' in Multi-Factor Authentication?

A. Smart Card
B. Fingerprint
C. Password
D. PIN code

24 Which user account type typically has full control over the computer, including installing software and changing settings?

A. Administrator
B. Standard User
C. Limited User
D. Guest

25 What is a primary limitation of a Guest account?

A. It cannot install software or change system settings
B. It has unlimited internet speed
C. It does not require a monitor
D. It can access all files on the hard drive

26 What is a Firewall?

A. A tool to clean computer fans
B. A security system that monitors and controls network traffic
C. A physical wall in a server room
D. A type of virus that burns hardware

27 Which network topology connects devices in a closed loop?

A. Bus
B. Ring
C. Tree
D. Star

28 Which device operates at the Data Link Layer and uses MAC addresses?

A. Cable
B. Hub
C. Repeater
D. Switch

29 Bluetooth is an example of which type of network?

A. LAN
B. MAN
C. WAN
D. PAN (Personal Area Network)

30 In a network, what does the term 'Node' refer to?

A. Only the server
B. The speed of the internet
C. Any device connected to the network
D. The network cable

31 What is the main disadvantage of a Hub compared to a Switch?

A. Hubs require special cables
B. Hubs are difficult to install
C. Hubs are more expensive
D. Hubs generate unnecessary network traffic

32 Which form of malware captures keystrokes to steal passwords?

A. Adware
B. Keylogger
C. Logic Bomb
D. Ransomware

33 What is the 'Dictionary Attack' method of password cracking?

A. Guessing based on user's birthday
B. Encrypting the password file
C. Using a pre-defined list of common words and passwords
D. Asking the user for the password

34 Which account type allows a user to use the computer for daily tasks but prevents accidental system damage?

A. Standard User
B. Administrator
C. Hacker
D. Root

35 What is 'Spear Phishing'?

A. Sending spam to random people
B. Hacking a website
C. Fishing for underwater cables
D. A phishing attack targeting a specific individual or organization

36 Which authentication factor falls under 'Something you have'?

A. Retina Scan
B. Password
C. Voice recognition
D. Security Token or Smartphone

37 Which network topology is a combination of two or more different topologies?

A. Hybrid
B. Bus
C. Ring
D. Star

38 Which device is considered the 'gateway' to the internet for a home network?

A. Hub
B. Printer
C. Router
D. Switch

39 A 'Botnet' is usually created using which type of malware?

A. Ransomware
B. Adware
C. Trojan/Worm
D. Spyware

40 The physical arrangement of devices in a network is known as:

A. Network Topology
B. Network Class
C. Network Architecture
D. Network Protocol

41 Which of the following is NOT a type of computer network?

A. LAN
B. WAN
C. FAN (Fan Area Network)
D. MAN

42 What is the main purpose of a firewall blocking 'Incoming' traffic?

A. To stop employees from using Facebook
B. To save electricity
C. To speed up the internet
D. To prevent unauthorized access from the internet

43 In a Tree Topology, the network is arranged in what kind of structure?

A. Hierarchical
B. Circular
C. Linear
D. Random

44 Which of the following is a strong password practice?

A. Using 'password123'
B. Using the same password for all sites
C. Using a mix of letters, numbers, and symbols
D. Writing it on a sticky note on the monitor

45 Adware is primarily designed to:

A. Destroy hardware
B. Replicate itself to other networks
C. Display unwanted advertisements
D. Encrypt files

46 Which privileges should be granted to a normal employee to ensure security (Principle of Least Privilege)?

A. Administrator
B. Standard User
C. Guest
D. Root

47 A 'man-in-the-middle' attack is a threat where:

A. An attacker intercepts communication between two parties
B. A hacker physically sits between two computers
C. A virus deletes the operating system
D. The server shuts down

48 Which device enables a computer to connect to a telephone line for dial-up internet?

A. Router
B. Access Point
C. Switch
D. Modem

49 What is the best way to protect against data loss from Ransomware?

A. Installing a faster processor
B. Regular offline backups
C. Using Incognito mode
D. Using a strong password

50 In a Star topology, if the central Hub fails, what happens?

A. Data finds another path
B. The computers communicate directly
C. The entire network fails
D. Only one computer fails