In: Computer Science
Question1) MCQs
LOGGING |
NETWORK |
SECURITY |
CARRIED |
IDENTIFIED |
ENCRYPTED |
PROTECTED |
SAVED |
PASSWORD |
UNAUTHORISED |
SECURE |
CHARACTERS |
MISTAKES |
ID |
TRANSMISSION |
GUESSED |
ADMINISTRATOR |
PROCEDURE |
FREQUENTLY |
PROCEDURE |
When connecting to a _______________ a certain level of access is granted. This is done during a process of logging on. Logon is the _______________ used to get access to the network. The user is _______________ by means of a user ID and a password. The user _______________ usually conforms to limited length such as eight _______________ and then the _______________ must contain at least one digit. The password is an important _______________ measure and must not be readily available or easily _______________ by others (such as a nickname).
The network must also keep passwords _______________. The password file should be _______________ from unauthorised access and _______________. Network systems may require users to _______________ change their passwords as a security measure. After logging on the user is given access to only those features authorised by the network _______________. The logon _______________ usually allows the user two or three attempts to enter the correct user ID and password. _______________ can occur in typing or in the data _______________. The correct procedure of logging off should always be _______________. This ensures all data is correctly _______________ and programs are closed in the correct manner. _______________ off also reduces the risk of _______________ persons accessing the network
Questions:-
1) Which of the following is the maximum number of electrical
signals transmitted in one second?
Answer: - a)Baud rate
2)Which of the following is a network access method used in star
or bus topologies?
Answer: - d)Ethernet
3)Which of the following is not performed using the NOS?
Answer: -c)Installing software
4)When connecting to a NETWORK a certain level of
access is granted. This is done during a
process of logging on. Logon is the SECURE used to
get access to the network. The user is
IDENTIFIED by
means of a user ID and a password. The user ID usually
conforms to limited length such as eight CHARACTERS and
then the PASSWORD
must
contain at least one digit. The password is an important
SECURITY
measure and must not
be readily available or easily GUESSED by
others (such as a nickname).
The network must also keep passwords ENCRYPTED. The
password file should be
PROTECTED from
unauthorised access and TRANSMISSION. Network systems
may
require users to FREQUENTLY change their
passwords as a security measure. After logging on
the user is given access to only those features authorised by the
network ADMINISTRATOR. The
logon PROCEDURE
usually allows the user two or three attempts to enter the correct
user ID
and password. MISTAKES can
occur in typing or in the data SAVED.
The
correct procedure of logging off should always be CARRIED. This
ensures all data is
correctly PROCEDURE and
programs are closed in the correct manner. LOGGING
off also reduces the risk of UNAUTHORISED
persons accessing the network.