1. The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.
A) SSL
B) ESP
C) TSL
D) PSL
2. The ……………. is used to provide integrity check, authentication and encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL
3. In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above
4. The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec
5. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
6. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server.
A) 420
B) 1032
C) 443
D) 322
7. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
8. State whether the following statement are true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and destination server.
A) True, False
B) False, True
C) True, True
D) False, False
9. In packet-filtering router, the following information can be external from the packet header.
i) Source IP address ii) Destination IP address
iii) TCP/UDP source port iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
10. …………….. mode is used whenever either end of a security association is gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Answers:
1. A) SSL 2. B) ESP 3. C) Both A and B 4. A) IPsec 5. C) SSL record protocol | 6. C) 443 7. A) SSL hand... protocol 8. A) True, False 9. D) All i, ii, iii, iv and v 10. A) Tunnel |
You may also wanted to view the following related posts
- Solved MCQ of Computer Security set -1
- Solved MCQ of Internet Security set-1
- Solved MCQ of Computer networking set-1
- MCQ of Computer Networking with answer set-2
- Solved MCQ of Computer networking set-3
- MCQ of Computer Networking with answer set-4
You can view the following other posts
- Solved MCQ of Database Management System (DBMS) Set - 3
- Solved MCQ of System Analysis and Design Set-3
- Solved MCQ of Data Structure Set - 2
- Solved MCQ of Java for Java Proficiency test set-3
- MCQ of C++ with answer Set-2
- MCQ of Computer Networking with answer set-4
0 التعليقات :
إرسال تعليق