Internet Infrastructure Security MCQ with answers-01

Posted by

The "Answers" given with the Question is "not verified". To view Verified answers click on the button below.

Internet Infrastructure SECURITY MCQ with all answers (100% free pdf download)

Internet Infrastructure: Basic security problems , Routing security ,DNS revisited ,Summary
of weaknesses of internet security ,.Link layer connectivity and TCP IP connectivity , Packet
filtering firewall ,Intrusion detection.

1. In TCP, sending and receiving data is done as
a. Stream of bytes
b. Sequence of characters
c. Lines of data
d. Packets
Answer:- b

2. TCP groups a number of bytes together into a packet called
a. Packet
b. Buffer
c. Segment
d. Stack
Answer:- c

3. Which of these is not applicable for IP protocol?
a. Is connectionless
b. Offer reliable service
c. Offer unreliable service
d. None of the mentioned
Answer:- b

4. Which of the following is a function of IP Protocol?
a. Error reporting
b. Fragmentation and Reassembly
c. Routing
d. All of the above
Answer:- d

5. Which of the following is not a layer of TCP protocol stack?
a. Application
b. Transport
c. Network
d. Presentation
Answer:- d

6. _____ is a library for formatting raw packets with arbitrary IP headers.
a. Libnet
b. HeadLib
c. IPLib
d. None of the above
Answer:- a

7. Which of the following is correct for Transmission Control Protocol?
a. Connection Oriented
b. Preserves order
c. Both A and B
d. None of the above
Answer:- c

8. Which of the following is a basic security problem?
a. Network packets pass by untrusted hosts
b. TCP state easily obtained by eavesdropping
c. Denial of service vulnerabilities
d. All of the above
Answer:- d

9. Which protocol ensures reliable delivery?
a. TCP
b. UDP
c. Both A and B
d. None of the above
Answer:- a

10. Which protocol uses window flow system?
a. UDP
b. TCP
c. FTP
d. None of the above
Answer:- b

11. Which of the following is not a routing protocol?
a. OSPF
b. BGP
c. ARP
d. MGP
Answer:- d

12. What is full form of ARP?
a. Address Resolution Protocol
b. Allied Resolution Protocol
c. Address Resolution Process
d. Address Rectification Protocol
Answer:- a

13. ROA stands for –
a. Route Organization Administration
b. Route Organization Authorization
c. Rules of Authorization
d. Rules of Administration
Answer:- b

14. The Open Shortest Path First (OSPF) protocol is an intra domain routing protocol based on ________ routing.
a. Distance vector
b. Link state
c. Path vector
d. Non-distance vector
Answer:- b

15. In OSPF, a ……… link is a network with several routers attached to it.
a. Point-to-point
b. Transient
c. Stub
d. Multipoint
Answer:- b

16. Which of the following are the solutions to network security?
i) Encryption ii) Authentication
iii) Authorization iv) Non-repudiation
a. i, ii and iii only
b. ii, iii and iv only
c. i, iii and iv only
d. All i, ii, iii and iv
Answer:- d

17. …………… is to protect data and passwords.
a. Encryption
b. Authentication
c. Authorization
d. Non-repudiation
Answer:- a

18. The following protocols and systems are commonly used to provide various degrees of security services in a computer network.
i) IP filtering
ii) Reverse Address Translation
iii) IP Security Architecture (IPsec)
iv) Firewalls
v) Socks
a. i, ii, iii and iv only
b. i, iii, iv and v only
c. ii, iii, iv and v only
d. All i, ii, iii, iv and v
Answer:- b

19. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ………………
a. Chock point
b. meeting point
c. firewall point
d. secure point
Answer:- a

20. Which of the following is/are the types of firewalls?
a. Packet Filtering Firewall
b. Dual Homed Gateway Firewall
c. Screen Host Firewall
d. All of the above
Answer:- d

21. The components of IP security includes
a. Authentication Header (AH)
b. Encapsulating Security Payload (ESP)
c. Internet Key Exchange (IKE)
d. All of the above
Answer:- d

22. ………………….. is used to carry traffic of one protocol over the network that does not support that protocol directly.
a. Tunneling
b. Transferring
c. Trafficking
d. Switching
Answer:- a

23. In ………………. Mode, the authentication header is inserted immediately after the IP header.
a. Tunnel
b. Transport
c. Authentication
d. Both A and B
Answer:- a

24. State true or false.
i) Socks are a standard for circuit-level gateways.
ii) NAT is used for the small number of hosts in a private network.
a. True, False
b. False, True
c. True, True
d. False, False
Answer:- c

25. A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet, creating a secure private connection.
a. VNP
b. VPN
c. VSN
d. VSPN
Answer:- b