Security In The Internet
1. IPSec is designed
to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer
a) transport layer
b) network layer
c) application layer
d) session layer
Answer:b
Explanation:None.
Explanation:None.
2. In tunnel mode
IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned
Answer:a
Explanation:None.
Explanation:None.
3. Network layer
firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned
Answer:b
Explanation:None.
Explanation:None.
4. Network layer
firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned
Answer:a
Explanation:None.
Explanation:None.
5. WPA2 is used for
security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
Answer:c
Explanation:None.
Explanation:None.
6. An attempt to make
a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
Answer:a
Explanation:None.
Explanation:None.
7.
Extensible authentication protocol is authentication framework
frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned
Answer:b
Explanation:None.
Explanation:None.
8. Pretty good privacy
(PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
a) browser security
b) email security
c) FTP security
d) none of the mentioned
Answer:b
Explanation:None.
Explanation:None.
9. PGP encrypts data
by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
10. When a DNS server
accepts and uses incorrect information from a host that has no authority giving
that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
Answer:c
Explanation:None.
Explanation:None.
All the best for your exams @Mission IT SO 2016
No comments:
Post a Comment