Top 100+ Computer Security Multiple Choice Questions & Answers - 2

Question: 6

Malicious access are unauthorized

(A) Destruction of data

(B) Modification of data

(C) Reading of data

(D) All of these

Ans: C

Reading of data

Question: 7

Encrypted passwords are used for

(A) Security purpose

(B) Passwords list secret

(C) Faster execution

(D) Both (a) and (b)

Ans: D

Both (a) and (b)

Question: 8

A firewall

(A) Separates a network into multiple domains

(B) May need to allow http to pass

(C) Limits network access between the two security domains and maintains and logs all connections

(D) is a computer or router that sits between the trusted and untrusted

Ans: A

Separates a network into multiple domains

Question: 9

Link encryption

(A) Is used only to detect errors

(B) Cannot be used in a large network

(C) Is less secure than end-to-end encryption

(D) Is more secure than end-to-end encryption

Ans: C

Is less secure than end-to-end encryption

Question: 10

A high paging rate

(A) Always creates a slow system

(B) Is a symptom of too much processor activity

(C) Keeps the system running well

(D) May also cause a high I/O rate

Ans: D

May also cause a high I/O rate

Related Questions