Accenture Network Security and Cloud Quiz-1

Question 1

Time: 00:00:00
Which is not an objective of network security?

Identification

Identification

Authentication

Authentication

lock

lock

Access Control

Access Control

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 2

Time: 00:00:00
An algorithm in encryption is called _____________

Algorithm

Algorithm

Procedure

Procedure

Cipher

Cipher

Module

Module

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 3

Time: 00:00:00
What is ransomware?

A nickname for the types of spyware that require a password on boot

A nickname for the types of spyware that require a password on boot

Software that steals files from your computer and is used by blackmailers

Software that steals files from your computer and is used by blackmailers

A software that hijacks your computer and asks you to pay in order for it to be removed

A software that hijacks your computer and asks you to pay in order for it to be removed

viruses that infect files and won't let you open them unless you know a certain pass code

viruses that infect files and won't let you open them unless you know a certain pass code

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 4

Time: 00:00:00
Which of the following has network reliability issues?

frequency of failures

frequency of failures

recovery time after failure

recovery time after failure

catastrophe

catastrophe

All of the above

All of the above

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 5

Time: 00:00:00
A digital signature scheme consists of which of the following typical algorithms?

Key generation, Signing and Signature Verifying Algorithm

Key generation, Signing and Signature Verifying Algorithm

Signature Verifying Algorithm

Signature Verifying Algorithm

Key Generation Algorithm

Key Generation Algorithm

Signing Algorithm

Signing Algorithm

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 6

Time: 00:00:00
The type of encoding in which manipulation of bit streams without regard to what the bits mean is .....................

Destination encoding

Destination encoding

Entropy encoding

Entropy encoding

Source encoding

Source encoding

Differential encoding

Differential encoding

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 7

Time: 00:00:00
The protocol used to provide security to e-mails?

POP

POP

PGP

PGP

SNMP

SNMP

HTTP

HTTP

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 8

Time: 00:00:00
The ................... portion of LAN management software restricts access, records user activities and audit data etc.

Configuration management

Configuration management

Security management

Security management

Performance management

Performance management

None of these

None of these

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 9

Time: 00:00:00
Caesar cipher with key 3, is represented as ................

C = (p+3)mod3

C = (p+3)mod3

C = (p+26)mod3

C = (p+26)mod3

C = (p*3)mod26

C = (p*3)mod26

C = (p+3)mod26

C = (p+3)mod26

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Question 10

Time: 00:00:00
Number of rounds in Data Encryption Standard algorithm?

8 rounds

8 rounds

12 rounds

12 rounds

16 rounds

16 rounds

24 rounds

24 rounds

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

["0","40","60","80","100"]
["Need more practice!","Keep trying!","Not bad!","Good work!","Perfect!"]

Personalized Analytics only Availble for Logged in users

Analytics below shows your performance in various Mocks on PrepInsta

Your average Analytics for this Quiz

Rank

-

Percentile

0%

Get over 200+ Courses under One Subscription

mute

Don’t settle Learn from the Best with PrepInsta Prime Subscription

Learn from Top 1%

One Subscription, For Everything

The new cool way of learning and upskilling -

Limitless Learning

One Subscription access everything

Job Assistance

Get Access to PrepInsta Prime

Top Faculty

from FAANG/IITs/TOP MNC's

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.