mohammed alkharroubi mohammed alkharroubi Author
Title: Solved MCQ of Internet Security set-1
Author: mohammed alkharroubi
Rating 5 of 5 Des:
1. Which of the following are the solutions to network security? i) Encryption                                       ii) Authentication iii)...

1. Which of the following are the solutions to network security?
i) Encryption                                       ii) Authentication
iii) Authorization                               iv) Non-repudiation
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv

2. …………… is to protect data and passwords.
A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation


3. The following protocols and system are commonly used to provide various degrees of security services in computer network.
i) IP filtering                                                        ii) Reverse Address Translation
iii) IP security Architecture (IPsec)            iv) Firewalls                        v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v

4. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ………………
A) Chock point
B) meeting point
C) firewall point
D) secure point

5. Which of the following is / are the types of firewall?
A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) All of the above

6. The components of IP security includes ………………….
A) Authentication Header (AH)
B) Encapsulating Security Payload (ESP)
C) Internet key Exchange (IKE)
D) All of the above

7. ………………….. is used to carry traffic of one protocol over network that does not support that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching

8. In ………………. Mode, the authentication header is inserted immediately after the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B

9. State true or false.
i) Socks are a standard for circuit level gateways.
ii) The NAT is used for small number of the hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False

10. A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
A) VNP
B) VPN
C) VSN
D) VSPN
Answers:
1.       D) All i, ii, iii and iv
2.       A) Encryption
3.       B) i, iii, iv and v only
4.       A) Chock point
5.       D) All of the above
6.       D) All of the above
7.       A) Tunneling
8.       A) Tunnel
9.       C) True, True
10.   B) VPN


You may also wanted to view the following related posts

For other more MCQs: Click Here

Advertisement

Post a Comment

 
Top