CNS Mid Imp

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

1.

Wi-Fi stands for- [


]
a) Wireless Fidelity b) Wireless LAN c) Wireless FLAN d) None of the mentioned

2. SSID stands for – [ ]


a) Secure Service Identifier b) Secure Set Independent Device
c) Secure Set Identifier d) Service Set Independent Device

3. Mobile Device security falls under 3 categories. Which of these is not a valid Mobile
Device security category? [ ]
a) Barrier security b) Traffic security c) Device security d) All of the above

4. Which one of the following is not a higher –layer SSL protocol? [ ]

a) Alert Protocol b) Handshake Protocol


c) Alarm Protocol d) Change Cipher Spec Protocol

5. Which protocol is used for the purpose of copying the pending state into
the current State [
] a) Alert Protocol b) Handshake ProtocoL
c) Upper-Layer Protocol d) Change Cipher Spec Protocol

6. “A user intending to connect to one LAN may unintentionally lock onto a wireless access
point from the neighboring network.” Which type of Wireless network threat would you
classify this under? [
] a) Malicious Threat b) Network Injection
c) Denial Of Service d) Accidental Association

7. Which 2 protocols are used in the Transport layer of the TCP/IP model? [
] a) UDP and HTTP b) TCP and UDP c) HTTP and TCP d) ICMP and HTTP

8. _______________ is the central node of 802.11 wireless operations [


]
a) WPA b) Access Point c) WAP d) Access Port

9. Mobile security is also known as ___________ [


]
a) OS Security b) Wireless security c) Cloud security d) Database security

10. Which of the following is not an element/field of the X.509 certificates? [


]
a) Issuer Name b) Serial Modifier c) Issuer unique Identifier d) Signature
11. WPA stands for _______________

12. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and
invokes SSL.

13. HTTPS stands for ______________

14. In the handshake protocol _________________message type first sent between client
and server .

15. ____________, ____________services provided by preety good privacy.

16.Use of SSH protocol is ________________________

17. Components of IP security____________________________________________

18. In transport layer which protocols provides security______________________

19. S/MIME Stands for ___________________________

20.IKE Stands for . _____________________________________________

You might also like