Internet Security Important Questions and Answers
1. Which of the following are the solutions to network security?
i) Encryption
ii) Authentication
iii) Authorization
iv) Non-repudiation
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
Ans - D) All i, ii, iii and iv
2. ...............is to protect data and passwords.
A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation
Ans - A) Encryption
3. The following protocols and system are commonly used to provide
various degrees of security
services in computer network.
i) IP filtering
ii) Reverse Address Translation
iii) IP security Architecture (IPsec)
iv) Firewalls
v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
Ans- B) i, iii, iv and v only
4. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ………………
A) Chock point
B) meeting point
C) firewall point
D) secure point
Ans - A) Chock point
5. Which of the following is / are the types of firewall?
A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) All of the above
Ans- D) All of the above
6. The components of IP security includes ………………….
A) Authentication Header (AH)
B) Encapsulating Security Payload (ESP)
C) Internet key Exchange (IKE)
D) All of the above
Ans- D) All of the above
7. ...................... is used to carry traffic of one protocol over network that does not support that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching
Ans- A) Tunneling
8. In.................. Mode, the authentication header is inserted immediately after the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
Ans- A) Tunnel
9. State true or false.
i) Socks are a standard for circuit level gateways.
ii) The NAT is used for small number of the hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False
Ans- C) True, True
10. A ..................is an extension of an enterprise’s private intranet across
a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
A) VNP
B) VPN
C) VSN
D) VSPN
Ans- B) VPN
11. The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data
authentication of the partners, and integrity.
A) SSL
B) ESP
C) TSL
D) PSL
Ans- A) SSL
12. The................is used to provide integrity check, authentication and encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL
Ans- B) ESP
13. In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above
Ans- C) Both A and B
14. The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec
Ans- A) IPsec
15. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
Ans- C) SSL record protocol
16. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server.
A) 420
B) 1032
C) 443
D) 322
Ans-C) 443
17. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
Ans- A) SSL handshake protocol
18. State whether the following statement are true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and
destination server. A) True, False
B) False, True
C) True, True
D) False, False
Ans- A) True, False
19. In packet-filtering router, the following information can be external from the packet header.
i) Source IP address
ii) Destination IP address
iii) TCP/UDP source port
iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
Ans- D) All i, ii, iii, iv and v
20. .................mode is used whenever either end of a security association is gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Ans- A) Tunnel