Joa It Post Code - 965 Internet Security Important Questions and Answers

POOJA GUPTA
0

 

Joa It Post Code - 965 Internet Security Important Questions and Answers

Internet Security Important Questions and Answers


1. Which of the following are the solutions to network security?

i) Encryption

ii) Authentication

iii) Authorization

iv) Non-repudiation

A) i, ii and iii only

B) ii, iii and iv only

C) i, iii and iv only

D) All i, ii, iii and iv

Ans - D) All i, ii, iii and iv


2. ...............is to protect data and passwords. 

A) Encryption

B) Authentication

C) Authorization

D) Non-repudiation

Ans - A) Encryption


3. The following protocols and system are commonly used to provide

various degrees of security

services in computer network.

i) IP filtering

ii) Reverse Address Translation

iii) IP security Architecture (IPsec)

iv) Firewalls

v) Socks

A) i, ii, iii and iv only

B) i, iii, iv and v only

C) ii, iii, iv and v only

D) All i, ii, iii, iv and v

Ans- B) i, iii, iv and v only


4. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ………………

A) Chock point

B) meeting point

C) firewall point

D) secure point

Ans - A) Chock point


5. Which of the following is / are the types of firewall?

A) Packet Filtering Firewall

B) Dual Homed Gateway Firewall

C) Screen Host Firewall

D) All of the above

Ans- D) All of the above


6. The components of IP security includes …………………. 

A) Authentication Header (AH)

B) Encapsulating Security Payload (ESP)

C) Internet key Exchange (IKE)

D) All of the above

Ans- D) All of the above


7. ...................... is used to carry traffic of one protocol over network that does not support that protocol directly. 

A) Tunneling

B) Transferring

C) Trafficking

D) Switching

Ans- A) Tunneling


8. In.................. Mode, the authentication header is inserted immediately after the IP header. 

A) Tunnel

B) Transport

C) Authentication

D) Both A and B

Ans- A) Tunnel


9. State true or false.

i) Socks are a standard for circuit level gateways.

ii) The NAT is used for small number of the hosts in a private network. 

A) True, False

B) False, True

C) True, True

D) False, False

Ans- C) True, True


10. A ..................is an extension of an enterprise’s private intranet across

a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. 

A) VNP

B) VPN

C) VSN

D) VSPN

Ans- B) VPN


11. The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data

authentication of the partners, and integrity. 

A) SSL

B) ESP

C) TSL

D) PSL

Ans- A) SSL


12. The................is used to provide integrity check, authentication and encryption to IP datagram. 

A) SSL

B) ESP

C) TSL

D) PSL

Ans- B) ESP


13. In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. 

A) Tunneling

B) Encapsulation

C) Both A and B

D) None of the above

Ans- C) Both A and B


14. The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. 

A) IPsec

B) Netsec

C) Packetsec

D) Protocolsec

Ans- A) IPsec


15. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. 

A) SSL handshake protocol

B) SSL authentication protocol

C) SSL record protocol

D) SSL cipher protocol

Ans- C) SSL record protocol


16. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. 

A) 420

B) 1032

C) 443

D) 322

Ans-C) 443


17. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the …………………

A) SSL handshake protocol

B) SSL authentication protocol

C) SSL record protocol

D) SSL cipher protocol

Ans- A) SSL handshake protocol


18. State whether the following statement are true.

i) An application-level gateway is often referred to as a proxy.

ii) In proxy, a direct connection is established between the client and

destination server. A) True, False

B) False, True

C) True, True

D) False, False

Ans- A) True, False


19. In packet-filtering router, the following information can be external from the packet header.

i) Source IP address

ii) Destination IP address

iii) TCP/UDP source port

iv) ICMP message type

v) TCP/UDP destination port

A) i, ii, iii and iv only

B) i, iii, iv and v only

C) ii, iii, iv and v only

D) All i, ii, iii, iv and v

Ans- D) All i, ii, iii, iv and v


20. .................mode is used whenever either end of a security association is gateway. 

A) Tunnel

B) Encapsulating

C) Transport

D) Gateway

Ans- A) Tunnel



Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.
Post a Comment (0)
To Top