Network security in an important chapter from latest bank exam jobs point of view. Today we are sharing quiz and study notes related to this chapter. These study notes is useful for IBPS SO Exam computer notes for specialist officer exam.
Network Security - Computer Awareness Quiz and Study Notes
Q1. An error in computer program is called:
a) Hacking
b) Virus
c) Bug
d) None of These
Q2. ______was the first technique that posed a serious threat to virus scanners:
a) Vulnerability Code
b) Polymorphic Code
c) Antimorphic Code
d) None of These
Q3. A/an ______ is a system susceptibility or flaw:
a) Error
b) Vulnerability
c) Virus
d) None of These
Q4. _______vulnerability is one for which at least one working attack exists:
a) Democratic
b) Exploitable
c) Dominative
d) None of These
Q5. CVE stands for:
a) Common Vulnerabilities Exposures
b) Cyber Vulnerabilities Exposures
c) Cycolic Vulnerabilities Exposures
d) None of These
Q6. _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication measures without express authorization of the owner of the system, server or network:
a) Hacking
b) Cracking
c) Viruses
d) None of These
Q7. ISP refers to:
a) Information Security Policy
b) Internet Security Policy
c) Internal Security Policy
d) None of These
Q8. _____is a computer program that is loaded into a computer without the owner's knowledge:
a) Hack Material
b) Viruses
c) Both of Above
d) None of These
Q9. Which among the following is correct regarding the Boot Sector Viruses:
a) These viruses are resides in the boot sector of a floppy or hard disk.
b) Such viruses are activated every time a computer boots from an infected disk
c) Virus remains in memory until an uninfected floppy disk is inserted into the floppy drive
d) All of the Above
e) None of These
Q10. _______viruses infect executable program files:
a) File Infector Viruses
b) Macro Viruses
c) Multi Partite Viruses
d) None of These
Q11. _____ infections have cost more money and taken more time to repair than any other virus type:
a) File Infector Viruses
b) Multi Partite Viruses
c) Macro Viruses
d) None of These
Q12. _____was virus first appeared on Friday, March 26, 1999 and spread all over the world faster than any virus seen before:
a) 9 Melissa
b) 10 Melissa
c) 99 Melissa
d) None of These
Q13. 9 Melissa was a _____macro virus:
a) Microsoft Word
b) Microsoft Excel
c) Internet
d) Microsoft Power Point
e) None of These
Q14. A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program:
a) Trojan Horses
b) Worms
c) Macro Viruses
d) None of These
Q15. Which among the following is correct about the Antivirus Programs:
a) They contain a database of signatures for all known viruses and worms
b) The software searches a computer for the presence of these signatures
c) Both of Above
d) None of These
IBPS SPECIALIST OFFICER Computer Quiz IT 135
SQL Queries Study Material for IBPS IT Officer
IBPS PO/SO/Clerk Notes - SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC)
IBPS PO/SO/Clerk Computer Notes : NETWORK TOPOLOGIES
Computer Glossary : IBPS PO/SO Exam Special Computer Notes
IBPS SO (Specialist Officer) IT-Notes Study Capsule 2
IBPS SO (Specialist Officer) IT-Notes Study Capsule 1
Computer Knowledge Questions Answers - Download PDF
IBPS COMPUTER KNOWLEDGE STUDY NOTES FREE DOWNLOAD PDF
Computer for IBPS IT officer exams pdf
Computer - Some Important Abbreviations
Computer Knowledge Full Forms for Bank exams and clerical and other exams SSC
IBPS IT Officer Exam Study Material: OSI Layer
IBPS IT Officer- Computer Study Notes Network TCP IT Protocol
IBPS IT Officer Study Material: Relational Data Models
IBPS IT Officer Study Material: DBMS Study Notes Part - I
Computer Notes- Networking and Internet for IBPS Bank Exam
IBPS PO COMPUTER AWARENESS CAPSULE - Computer Knowledge Section Study Material for IBPS Exams
Codd Rules:IBPS IT Officer Exam Notes
Computer Knowledge MCQs pdf for IBPS Bank Exam
Computer Network Security Notes for Bank Exam
Computer Network security is a specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work.
A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.
Many network security threats today are spread over the Internet. The most common include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Issues in Network Security:
Authentication: Process of verifying identity of a user
Integrity: Data that arrives is the same as that is sent
Confidentiality: Sensitive information should not be visible to eavesdropper – use encryption
Non – Repudiation: Assurance that any transaction that takes place can subsequently be proved to have taken place
Authorization: Assigning access rights to users
How Does Network Security Work?
Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats.
A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.
Network security components often include:
Anti-virus and anti-spyware
Firewall, to block unauthorized access to your network
Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
Virtual Private Networks (VPNs), to provide secure remote access
Computer Networking for banking exams- ibps exams-sbi po
Normal
0
false
false
false
EN-US
X-NONE
X-NONE
MicrosoftInternetExplorer4
Computer networking is an important section in many govt. exams like IBPS PO, IBPS SO, IBPS Clerical Exam, SBI PO, SBI clerical and others. It becomes very significant to have knowledge of computer networking for Bank Exams.
What is a Computer Network?
Network Topologies Study Notes for bank Exam Simple, simple , a NETWORK by connecting two or more computers. These connections or arrangements are called Computer Networks. These computers in the Computer Network may attached with cables, telephone lines, radio waves, satellites or infrared light,beams, wireless etc.
A Computer Network is a collection of Computers and Devices which are connected via communicating devices and transmission media to enable transmission of meaningful data and information between them.
. What Are Networks Used For?
A simplified but worthwhile description of the uses of computer networks might be as follows:
Sharing of hardware: For example, several PCs might be networked together in a wired or wireless local area network (LAN) to share a printer.·
Sharing of information: Distributed databases, e-mail, the World Wide Web and so on are examples of this. Here the sharing involves both LANs and wide area networks (WANs), especially the latter.·
OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create willinteroperate, and to facilitate clear comparisons among communications tools. Most vendors involved in telecommunications make an attempt to describe their products and services in relation to the OSI model. And although useful for guiding discussion and evaluation, OSI is rarely actually implemented, as few network products or standard tools keep all related functions together in well-defined layers as related to the model. The TCP/IP protocols, which define the Internet, do not map cleanly to the OSI model.
2. Overview of the Layers
The layers collectively are often referred to as the protocol stack.
The Open Systems Interconnect (OSI) model has seven layers. This article describes and explains them, beginning with the 'lowest' in the hierarchy (the physical) and proceeding to the 'highest' (the application). The layers are stacked this way:
Application
Presentation
Session
Transport
Network
Data Link
Physical
a. Physical Layer
This is concerned with the nature of the physical media (metal or optical cable, free-space microwave, etc.) used to send signals, the nature of the signals themselves, and so on.·
There is also the question of signal form; the signals themselves may be in the form of pure 0-1 bits, or may be in the form of certain frequencies. In· addition there are questions concerning how a receiver distinguishes two bits which are adjacent in time.
A major issue is the form of the medium, both in terms of the materials it uses and its topology. A basic wired Ethernet, for example, consists of cable conducting electrical signals; the connections could also be wireless. More complicated networks, including Ethernets, may consist of more than one cable, with all of them connected via a hub. The latter has become common even at the household level.·
b. Data Link Layer
For example, in an Ethernet, this layer is concerned with ensuring that two network stations connected to the same cable do not try to access the line at the same time. For this· reason the Ethernet operation is an example of what is called a Medium Access Control (MAC) Protocol.
Here is an overview of how the Ethernet MAC protocol works, using a “listen before talk” approach. When a network node has a message ready to send, it fir·st senses the cable to see if any node is currently sending. If so, it generates a random backoff time, waiting this amount of time before trying again. If the node does not “hear” any other node sending, it will go ahead and send.
There is a small chance that another node actually had been sending but due to signal propagation delay the transmission had not yet reached the first node. In that case a collision will occur, destroying both messages. Both nodes will sense the collision, and again wait random amounts of time before trying again.·
This layer also does the setting up of frames of bits (i.e. sets of consecutive bits sent along the wire), which not only include the message itself but also information such as (say, in the Ethernet case) the Ethernet ID number of the destination machine.·
Messages may be broken up into pieces before being sent. This may be handled at the transport level (see below), but may also be done at the data link level·
c. Network Layer
This is the routing layer. Questions addressed in this layer include: If in our example above<span style="mso-char-type: symbol; mso-symbol