Professional Documents
Culture Documents
Unit-IV MCQ
Unit-IV MCQ
1. .............. ensures integrity and security of data that are passing over network. *
a. Firewall
b. Antivirus
c. Pentesting tools
d. Network security protocol
Ans: d
Ans: C
Ans:b
4. ...............is used for encrypting data at network level. *
a. IPsec
b. HTTPS
c. SMTP
d. S/MIME
Ans:a
Ans : b
6.Size of IP address in IPV6 is *
a. 4 bytes
b. 128 bytes
c. 8 bytes
d. 100 bytes
Ans : b
7.Header length of IPV6 datagram is *
a. 10 bytes
b. 25 bytes
c. 30 bytes
d. 40 bytes
Ans: d
8.IPV6 doesn't use ...........type of address
a. Broadcast
b. Multicast
c. Anycast
d. Unicast
Ans: a
9.The ........ field determines lifetime of IPV6 datagram *
a. Hop limit
b. TTL
c. Next header
d. Type of traffic
Ans: a
10.In tunnel mode IPsec protect s the *
a. Entire IP packet
b. IP header
c. IP payload
d. IP trailer
Ans: a
11.PGP is used in *
a. Browser security
b. Email security
c. FTP security
d. WiFi security
Ans: b
12............ provides either authentication or encryption or both for packets at IP level *
a. AH
b. ESP
c. PGP
d. SSL
Ans: b
13.Typically ..........can receive application data from any application layer protocol . *
a. SSL
b. TLS
c. Both a & b
d. None of above
Ans : c
14.SSL provides *
a. Message integrity
b. Message Confidentiality
c. Message compression
d. All of above
Ans: d
15.The internet authorities have reserved addresses for *
a. Intranets
b. Internets
c. Extranets
d. None of above
Ans:d
16.IKE uses *
a. Oakkey
b. SKEME
c. ISAKMP
d. All
Ans: d
17.An ................is a private network that uses internet model. *
a. Intranet
b. Internet
c. Extranet
d. None
Ans: a
18. Which of the following is not a secured mail transferring methodology?
a) POP3
b) SSMTP
c) Mail using PGP
d) S/MIME
Ans:a
19. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
a) True
b) False
Ans:a
20. ______ was invented by Phil Zimmerman.
A) IPSec
B) SSL
C) PGP
Ans:c
21.In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
A) secret
B) public
Ans: b
22. _________ is a collection of protocols designed by the IETF (Internet Engineering Task
Force) to provide security for a packet at the network level.
A) IPSec
B) SSL
C) PGP
Ans : a
23.In ______, there is a single path from the fully trusted authority to any certificate.
A) X.509
B) PGP
C) KDC
Ans: a
A) two
B) three
C) four
D) five
Ans : b
25.The combination of key exchange, hash, and encryption algorithms defines a ________
for each SSL session.
A) list of protocols
B) cipher suite
C) list of keys
Ans: b