Computer Networks Questions & Answers – Security
In The Internet
1. IPSec is designed to provide the
security at the
a) transport layer
b) network layer
c) application layer
d) session layer
a) transport layer
b) network layer
c) application layer
d) session layer
Answer: b
Explanation: None.
Explanation: None.
2. In tunnel mode IPsec protects the
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned
Answer: a
Explanation: None.
Explanation: None.
3. Network layer firewall works as a
a) frame filter
b) packet filter
c) both frame filter and packet filter
d) none of the mentioned
a) frame filter
b) packet filter
c) both frame filter and packet filter
d) none of the mentioned
Answer: b
Explanation: None.
Explanation: None.
4. Network layer firewall has two
sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
5. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
Answer: c
Explanation: None.
Explanation: None.
6. An attempt to make a computer
resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
Answer: a
Explanation: None.
Explanation: None.
7. Extensible authentication
protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned
Answer: b
Explanation: None.
Explanation: None.
8. Pretty good privacy (PGP) is used
in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
a) browser security
b) email security
c) FTP security
d) none of the mentioned
Answer: b
Explanation: None.
Explanation: None.
9. PGP encrypts data by using a
block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
10. When a DNS server accepts and
uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
ليست هناك تعليقات:
إرسال تعليق