Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Unit-IV MCQs

1. .............. ensures integrity and security of data that are passing over network. *
a. Firewall
b. Antivirus
c. Pentesting tools
d. Network security protocol

Ans: d

2.Which of following is not a strong security protocol *


a. HTTPS
b. SSL
c. SMTP
d. SFTP

Ans: C

3.In SSL what is used for authenticating a message *


a. Message access code
b. Message authentication code
c. Machine authentication code
d. Machine access code

Ans:b
4. ...............is used for encrypting data at network level. *
a. IPsec
b. HTTPS
c. SMTP
d. S/MIME

Ans:a

5.Why did SSL certificate require in HTTP. *


a. For making security weak
b. For encrypting data sent over HTTP protocol
c. Both a & b
d. None of above

Ans : b
6.Size of IP address in IPV6 is *
a. 4 bytes
b. 128 bytes
c. 8 bytes
d. 100 bytes

Ans : b
7.Header length of IPV6 datagram is *
a. 10 bytes
b. 25 bytes
c. 30 bytes
d. 40 bytes

Ans: d
8.IPV6 doesn't use ...........type of address
a. Broadcast
b. Multicast
c. Anycast
d. Unicast

Ans: a
9.The ........ field determines lifetime of IPV6 datagram *
a. Hop limit
b. TTL
c. Next header
d. Type of traffic

Ans: a
10.In tunnel mode IPsec protect s the *
a. Entire IP packet
b. IP header
c. IP payload
d. IP trailer

Ans: a

11.PGP is used in *
a. Browser security
b. Email security
c. FTP security
d. WiFi security

Ans: b
12............ provides either authentication or encryption or both for packets at IP level *
a. AH
b. ESP
c. PGP
d. SSL

Ans: b
13.Typically ..........can receive application data from any application layer protocol . *
a. SSL
b. TLS
c. Both a & b
d. None of above

Ans : c
14.SSL provides *
a. Message integrity
b. Message Confidentiality
c. Message compression
d. All of above

Ans: d
15.The internet authorities have reserved addresses for *
a. Intranets
b. Internets
c. Extranets
d. None of above

Ans:d
16.IKE uses *
a. Oakkey
b. SKEME
c. ISAKMP
d. All

Ans: d
17.An ................is a private network that uses internet model. *
a. Intranet
b. Internet
c. Extranet
d. None

Ans: a
18. Which of the following is not a secured mail transferring methodology?
a) POP3
b) SSMTP
c) Mail using PGP
d) S/MIME

Ans:a

19. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
a) True
b) False

Ans:a
20. ______ was invented by Phil Zimmerman.

A) IPSec

B) SSL

C) PGP

D) none of the above

Ans:c

21.In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

A) secret

B) public

C) either (a) or (b)

D) both (a) and (b)

Ans: b

22. _________ is a collection of protocols designed by the IETF (Internet Engineering Task
Force) to provide security for a packet at the network level.

A) IPSec

B) SSL

C) PGP

D) none of the above

Ans : a

23.In ______, there is a single path from the fully trusted authority to any certificate.

A) X.509

B) PGP

C) KDC

D) none of the above

Ans: a

24. IKE is a complex protocol based on ______ other protocols.

A) two

B) three
C) four

D) five

Ans : b

25.The combination of key exchange, hash, and encryption algorithms defines a ________
for each SSL session.

A) list of protocols

B) cipher suite

C) list of keys

D) none of the above

Ans: b

You might also like