Computer Networks Questions & Answers – IPSecurity
1. IPsec is designed to provide the
security at the
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
Answer: b
Explanation: Network layer is used for transferring the data from transport layer to another layers.
Explanation: Network layer is used for transferring the data from transport layer to another layers.
2. In tunnel mode IPsec protects the
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned
Answer: a
Explanation: It is nothing but adding control bits to the packets.
Explanation: It is nothing but adding control bits to the packets.
3. Which component is included in IP
security?
a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
Answer: d
Explanation: AH, ESP, IKE.
Explanation: AH, ESP, IKE.
4. WPA2 is used for security in
a) Ethernet
b) Bluetooth
c) Wi-Fi
d) None of the mentioned
a) Ethernet
b) Bluetooth
c) Wi-Fi
d) None of the mentioned
Answer: c
Explanation: WPA2 is best with Wi-Fi connection.
Explanation: WPA2 is best with Wi-Fi connection.
5. An attempt to make a computer
resource unavailable to its intended users is called
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
Answer: a
Explanation: Denial of service attack.
Explanation: Denial of service attack.
6. Extensible authentication
protocol is authentication framework frequently used in
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) None of the mentioned
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) None of the mentioned
Answer:b
Explanation:Most data transfer is with wireless networks.
Explanation:Most data transfer is with wireless networks.
7. Pretty good privacy (PGP) is used
in
a) Browser security
b) Email security
c) FTP security
d) None of the mentioned
a) Browser security
b) Email security
c) FTP security
d) None of the mentioned
Answer: b
Explanation: PGP is at email security.
Explanation: PGP is at email security.
8. PGP encrypts data by using a
block cipher called
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) None of the mentioned
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) None of the mentioned
Answer: a
Explanation: PGP encrypts data by using a block cipher called international data encryption algorithm.
Explanation: PGP encrypts data by using a block cipher called international data encryption algorithm.
9. When a DNS server accepts and
uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
Answer: c
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.
ليست هناك تعليقات:
إرسال تعليق