تواصل معنا

كورس جافا سوينج
كورس أختبار البرمجيات
الان ومجانا لمدة شهر اللهم ارفع عنا البلاء والوباء
كورس لغة الدارت والفلتر
عن المدونة
Mohon Aktifkan Javascript!Enable JavaScript

الخميس، 23 مايو 2019

Computer Networks Questions & Answers – IPSecurity MCQ أسئله شبكات بالأجابات الجزء السادس والعشرون


Computer Networks Questions & Answers – IPSecurity



1. IPsec is designed to provide the security at the
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
Answer: b
Explanation: Network layer is used for transferring the data from transport layer to another layers.

2. In tunnel mode IPsec protects the
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned
Answer: a
Explanation: It is nothing but adding control bits to the packets.

3. Which component is included in IP security?
a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
Answer: d
Explanation: AH, ESP, IKE.

4. WPA2 is used for security in
a) Ethernet
b) Bluetooth
c) Wi-Fi
d) None of the mentioned
Answer: c
Explanation: WPA2 is best with Wi-Fi connection.

5. An attempt to make a computer resource unavailable to its intended users is called
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
Answer: a
Explanation: Denial of service attack.

6. Extensible authentication protocol is authentication framework frequently used in
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) None of the mentioned
Answer:b
Explanation:Most data transfer is with wireless networks.

7. Pretty good privacy (PGP) is used in
a) Browser security
b) Email security
c) FTP security
d) None of the mentioned
Answer: b
Explanation: PGP is at email security.

8. PGP encrypts data by using a block cipher called
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) None of the mentioned
Answer: a
Explanation: PGP encrypts data by using a block cipher called international data encryption algorithm.

9. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
Answer: c
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.


ليست هناك تعليقات:

إرسال تعليق