Unit 5 - Practice Quiz

CSE111

1 Which of the following best describes a Computer Network?

A. A single computer processing data
B. A collection of computers connected to share resources
C. A software used to browse the internet
D. A storage device used for backup

2 Which network type typically covers a small geographic area like a single room or a building?

A. WAN (Wide Area Network)
B. MAN (Metropolitan Area Network)
C. LAN (Local Area Network)
D. VPN (Virtual Private Network)

3 The Internet is the largest example of which type of network?

A. LAN
B. PAN
C. WAN
D. MAN

4 Which network topology connects all devices to a single central cable called the backbone?

A. Star Topology
B. Bus Topology
C. Ring Topology
D. Mesh Topology

5 In which topology are all computers connected to a central device like a hub or a switch?

A. Bus
B. Ring
C. Star
D. Mesh

6 Which network topology provides the highest level of redundancy and reliability by connecting every device to every other device?

A. Star
B. Tree
C. Mesh
D. Bus

7 What is the primary function of a Router?

A. To connect devices within a single LAN
B. To modulate and demodulate signals
C. To direct data packets between different networks
D. To power the computer system

8 Which device is used to convert digital signals from a computer into analog signals for transmission over telephone lines?

A. Switch
B. Router
C. Modem
D. Hub

9 Which networking device is known as a 'dumb' device because it broadcasts data to all connected ports?

A. Router
B. Switch
C. Hub
D. Firewall

10 How does a Switch differ from a Hub?

A. A switch is wireless only
B. A switch sends data only to the specific destination device
C. A switch connects different networks like the internet
D. A switch cannot connect multiple computers

11 Which device allows wireless devices to connect to a wired network?

A. Modem
B. Access Point (AP)
C. Network Interface Card (NIC)
D. Server

12 In the Client-Server model, what is the role of the 'Client'?

A. To store all the data and manage permissions
B. To request services or resources
C. To route traffic between networks
D. To provide security against viruses

13 Which of the following is a characteristic of a Server?

A. It usually has lower processing power than a client
B. It requests data from other computers
C. It provides resources and services to clients
D. It is only used for gaming

14 What is 'Malware' short for?

A. Malfunction Software
B. Malicious Hardware
C. Malicious Software
D. Manual Software

15 Which type of malware attaches itself to a legitimate program and requires human action to spread?

A. Worm
B. Virus
C. Adware
D. Botnet

16 Which malware is self-replicating and spreads across networks without requiring a host file or user interaction?

A. Virus
B. Trojan Horse
C. Worm
D. Spyware

17 What is a Trojan Horse in the context of computing?

A. A hardware device for racing
B. Malware disguised as legitimate software
C. A type of antivirus
D. A fast network cable

18 Which type of malware encrypts a user's files and demands payment for the decryption key?

A. Spyware
B. Ransomware
C. Adware
D. Worm

19 Software that secretly monitors user activity and collects information without their knowledge is called:

A. Spyware
B. Firewall
C. Firmware
D. Freeware

20 What is Phishing?

A. Scanning a hard drive for errors
B. Connecting to a Wi-Fi network
C. Sending fraudulent emails to trick users into revealing sensitive info
D. Installing a firewall

21 Which attack method involves trying every possible combination of characters to guess a password?

A. Phishing
B. Dictionary Attack
C. Brute Force Attack
D. SQL Injection

22 What does MFA stand for in computer security?

A. Multiple File Access
B. Main Factor Authorization
C. Multi-Factor Authentication
D. Master File Allocation

23 Which of the following is an example of 'Something you are' in Multi-Factor Authentication?

A. Password
B. Smart Card
C. Fingerprint
D. PIN code

24 Which user account type typically has full control over the computer, including installing software and changing settings?

A. Guest
B. Standard User
C. Administrator
D. Limited User

25 What is a primary limitation of a Guest account?

A. It has unlimited internet speed
B. It cannot install software or change system settings
C. It can access all files on the hard drive
D. It does not require a monitor

26 What is a Firewall?

A. A physical wall in a server room
B. A security system that monitors and controls network traffic
C. A type of virus that burns hardware
D. A tool to clean computer fans

27 Which network topology connects devices in a closed loop?

A. Bus
B. Ring
C. Star
D. Tree

28 Which device operates at the Data Link Layer and uses MAC addresses?

A. Hub
B. Switch
C. Repeater
D. Cable

29 Bluetooth is an example of which type of network?

A. WAN
B. LAN
C. PAN (Personal Area Network)
D. MAN

30 In a network, what does the term 'Node' refer to?

A. Only the server
B. The network cable
C. Any device connected to the network
D. The speed of the internet

31 What is the main disadvantage of a Hub compared to a Switch?

A. Hubs are more expensive
B. Hubs generate unnecessary network traffic
C. Hubs are difficult to install
D. Hubs require special cables

32 Which form of malware captures keystrokes to steal passwords?

A. Keylogger
B. Adware
C. Ransomware
D. Logic Bomb

33 What is the 'Dictionary Attack' method of password cracking?

A. Guessing based on user's birthday
B. Using a pre-defined list of common words and passwords
C. Encrypting the password file
D. Asking the user for the password

34 Which account type allows a user to use the computer for daily tasks but prevents accidental system damage?

A. Administrator
B. Standard User
C. Hacker
D. Root

35 What is 'Spear Phishing'?

A. Fishing for underwater cables
B. A phishing attack targeting a specific individual or organization
C. Sending spam to random people
D. Hacking a website

36 Which authentication factor falls under 'Something you have'?

A. Password
B. Retina Scan
C. Security Token or Smartphone
D. Voice recognition

37 Which network topology is a combination of two or more different topologies?

A. Star
B. Bus
C. Hybrid
D. Ring

38 Which device is considered the 'gateway' to the internet for a home network?

A. Switch
B. Router
C. Hub
D. Printer

39 A 'Botnet' is usually created using which type of malware?

A. Trojan/Worm
B. Adware
C. Spyware
D. Ransomware

40 The physical arrangement of devices in a network is known as:

A. Network Protocol
B. Network Architecture
C. Network Topology
D. Network Class

41 Which of the following is NOT a type of computer network?

A. LAN
B. WAN
C. FAN (Fan Area Network)
D. MAN

42 What is the main purpose of a firewall blocking 'Incoming' traffic?

A. To stop employees from using Facebook
B. To prevent unauthorized access from the internet
C. To speed up the internet
D. To save electricity

43 In a Tree Topology, the network is arranged in what kind of structure?

A. Circular
B. Hierarchical
C. Linear
D. Random

44 Which of the following is a strong password practice?

A. Using 'password123'
B. Using the same password for all sites
C. Using a mix of letters, numbers, and symbols
D. Writing it on a sticky note on the monitor

45 Adware is primarily designed to:

A. Destroy hardware
B. Encrypt files
C. Display unwanted advertisements
D. Replicate itself to other networks

46 Which privileges should be granted to a normal employee to ensure security (Principle of Least Privilege)?

A. Administrator
B. Standard User
C. Guest
D. Root

47 A 'man-in-the-middle' attack is a threat where:

A. A hacker physically sits between two computers
B. An attacker intercepts communication between two parties
C. The server shuts down
D. A virus deletes the operating system

48 Which device enables a computer to connect to a telephone line for dial-up internet?

A. Router
B. Modem
C. Switch
D. Access Point

49 What is the best way to protect against data loss from Ransomware?

A. Using a strong password
B. Regular offline backups
C. Using Incognito mode
D. Installing a faster processor

50 In a Star topology, if the central Hub fails, what happens?

A. Only one computer fails
B. The entire network fails
C. Data finds another path
D. The computers communicate directly