Internet Infrastructure Security MCQ with answers-02

Posted by

Internet Infrastructure SECURITY MCQ with all answers (100% free pdf download)

Internet Infrastructure: Basic security problems , Routing security ,DNS revisited ,Summary
of weaknesses of internet security ,.Link layer connectivity and TCP IP connectivity , Packet
filtering firewall ,Intrusion detection.

26. The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.
a. SSL
b. ESP
c. TSL
d. PSL
Answer:- a

27. The ……………. is used to provide integrity check, authentication and encryption to IP datagram.
a. SSL
b. ESP
c. TSL
d. PSL
Answer:- b

28. In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
a. Tunneling
b. Encapsulation
c. Both A and B
d. None of the above
Answer:- c

29. The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level.
a. IPsec
b. Netsec
c. Packetsec
d. Protocolsec
Answer:- a

30. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication ombinations called the ……………….
a. SSL handshake protocol
b. SSL authentication protocol
c. SSL record protocol
d. SSL cipher protocol
Answer:- c

31. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server.
a. 420
b. 1032
c. 443
d. 322
Answer:- c

32. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the …………………
a. SSL handshake protocol
b. SSL authentication protocol
c. SSL record protocol
d. SSL cipher protocol
Answer:- a

33. State whether the following statement are true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and destination server.
a. True, False
b. False, True
c. True, True
d. False, False
Answer:- a

34. In packet-filtering router, the following information can be external from the packet header.
i) Source IP address
ii) Destination IP address
iii) TCP/UDP source port
iv) ICMP message type
v) TCP/UDP destination port
a. i, ii, iii and iv only
b. i, iii, iv and v only
c. ii, iii, iv and v only
d. All i, ii, iii, iv and v
Answer:- d

35. . …………….. mode is used whenever either end of a security association is gateway.
a. Tunnel
b. Encapsulating
c. Transport
d. Gateway
Answer:- a

36. IPSec is designed to provide security at the _________
a. transport layer
b. network layer
c. application layer
d. session layer
Answer: b

37. In tunnel mode, IPSec protects the ______
a. Entire IP packet
b. IP header
c. IP payload
d. IP trailer
Answer: a

38. Network layer firewall works as a ________
a. frame filter
b. packet filter
c. signal filter
d. content filter
Answer: b

39. Network layer firewall has two subcategories called ____________
a. stateful firewall and stateless firewall
b. bit oriented firewall and byte oriented firewall
c. frame firewall and packet firewall
d. network firewall and data firewall
Answer: a

40. WPA2 is used for security in _______
a. ethernet
b. bluetooth
c. wi-fi
d. e-mail
Answer: c

41. An attempt to make a computer resource unavailable to its intended users is called ______
a. denial-of-service attack
b. virus attack
c. worms attack
d. botnet process
Answer: a

42. Extensible authentication protocol is authentication framework frequently used in ______
a. wired personal area network
b. wireless networks
c. wired local area network
d. wired metropolitan area network
Answer: b

43. Pretty good privacy (PGP) is used in ______
a. browser security
b. email security
c. FTP security
d. wifi security
Answer: b

44. PGP encrypts data by using a block cipher called ______
a. international data encryption algorithm
b. private data encryption algorithm
c. internet data encryption algorithm
d. local data encryption algorithm
Answer: a

45. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________
a. DNS lookup
b. DNS hijacking
c. DNS spoofing
d. DNS authorizing
Answer: c

46. Network layer firewall works as a __________
a. Frame filter
b. Packet filter
c. Content filter
d. Virus filter
Answer: b

47. Network layer firewall has two subcategories as _________
a. State full firewall and stateless firewall
b. Bit oriented firewall and byte oriented firewall
c. Frame firewall and packet firewall
d. Network layer firewall and session layer firewall
Answer: a

48. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as __________
a. Chock point
b. Meeting point
c. Firewall point
d. Secure point
Answer: a

49. Which of the following is / are the types of firewall?
a. Packet Filtering Firewall
b. Dual Homed Gateway Firewall
c. Screen Host Firewall
d. Dual Host Firewall
Answer: a

50. A proxy firewall filters at _________
a. Physical layer
b. Data link layer
c. Network layer
d. Application layer
Answer: d