Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

In IPsec, what is the purpose of the

1. 1. IPsec H, KaT tter FBAH (SPI) HT


Security Parameter Index (SPI)?
To uniquely identify a Security
Association

(B) To encrypt data packets (B) }a1 toc ufgh HTA f


(C) To authenticate users
(D) To manage encryption keys
2. What is the function of the Security 2. IPsec RHT LHIHUTT SAH (SAD) I
Association Database (SAD) in
IPsec?

(A) To store security policiesV


(B) To manage encryption keys
( To authenticate users (C) 34aTofsi yaforT at> fee
(D) To encrypt data traffic

3. Which key management protocol is 3.

used for manual keying in IPsec?

(A) Internet Key Exchange (IKE) V (A) scrtt sit caHa (IKE)
(E) Simple Key Exchange Protocol (B) YT LAHÀs vicioct (SKEP)
(SKEP)
(C) b r
(C) Kerberos
(D) MR IT (SSH)
(D) Secure Shell (SSH)
4. What does KMP stand for in the 4. IPsec o H KMP I GT 3H ?

context of IPsec?

(X) Key Management Protocol (B) t HfaaU tiotet


(B) Key Mapping Protocol
(C) Key Migration Protocol
(D) Key Monitoring Protocol
0628001\DI2024 [3] P.T.O.
0629601D
2024 8. 7. (6.) 5
(K) (B) IPsec?
Security What (D) (C) Diffie-Hellman
C) A) A)
(B) exchange? In (D) (e) (A)
anti-replay
(B)protection? Which Phase(D) Phase
4 (C) Phase 2material?
(Aexchanging
3 (e)Phase for
) 1 channel
Exchange Which
I To
To To To To To To IPsec,
is Internet (ESP)
Authentication
Encapsulating Security
authenticate
enrrpt storemanage establishencrypt
Policy the authenticate
negotiate IPsec
what phase
(IKE)
security prirmary Key
data Association
encryption Database data is component
a
encryption establishes of
secure Exchange
the
traffic users packets users SecurityHeader
policies function Internet
Key
purpose
keys tunnel (SA)
(SPD) (AH)
/ keys (IKE) Payioad provides a
of keyin9 secure
V of
in a a V
(4J

8. 7. 6. 5

8? (D) (B) (A) RU


(D) 4 (C) UT
3R92(B) aU
(A) 1

3T HTUozUT RaT

Gt HU
}ST (SA)
CGHa
(AH)
(IKE)

0628001\DI2024 11. 10. 9

(D) ( (B) protocols?


(A) ToTransport Secure What ( (B) using What Security
(B) Phase
(A) Exchange
Phase(C) 3As50ciations?11Psec Which
(A)
(D) Protectioncommunications?
Phase )4
network Internet
Tooverthe Tocommunication
layer To Reduced
eavesdropping Enhanced
tamperingand Simplified Phase
is IPsec is
authenticate secure encrypt Socket phase
provide the the 2
Layer (kE)
securingror /
web data primarynetwork keynetwork nain
Layer Internet
Key of
Security managerment established
secure
users
Communication at advantage
latency performance
the (SSL)purpose
in network against network
a email (TLS)
local and the
of of
[5]

(D) 1
aRUT(D) 4 RUT(C) 3 aRUT(B) 2 (A) UT

fe 4
cas
fata

P.T.O.
12. Which of the following is NOT .r What is the primary function of SSL

a requirement for Secure and TLS?

Communication over the internet?


(A) Encrypting data at rest
(A) WHToazU
(A) Authentication
Authenticating users
(B) tUGI
(B) Confidentiality (B) 34qTbfsd gHTUrT HRI
(C) Providing secure communication,/
(6) Scalability (C) Ayfuat
channels

(D) Integrity (D) 3GsGI


(D) Managing network traffic
13. Which cryptographic protocol is 13. fctuftbs gtetii qiut tur
16. Which protocol is commonly used for
the predecessor of Transport Layer
fraziRa (TLS) yddii 8? securing email communication?
Security (TLS)?
(A) Secure Socket Layer (sSL)V (A) SSL (A) eHeHLT
(A) fTar Tbc tur (SSL)
(B) Simple Mail Transfer Protocol ) TLS (B) uaUT
(B) fiuGT t ziER stcoia (SMTP)
(SMTP) (C) HTTPS (C) vadau
() Internet Protocol Security (C) $ t sieoic rT (IPsec) (D) s d v
(D) FTPS
(IPsec)
(D) i_T -isc ticiciT (PPP) 17. What cryptographic algorithm is
(D) Point-to Point Protocol (PPP)
commonly used in SSL and TLS for
(14. Which layer of the OSI model do SSL
key exchange and encryption?
and TLS operate on?
AES (A) vsuH
(A) Network Layer (A) a6 tur
(B) Transport Layer (B) RSA V
(B) qraET RI (B) 3TRUHU

(C) Session Layer (C) DES


(C) HE qRd (C) Stsu
(D) Application Layer (D) eriy tr (D) SHA
(D) HeUe
0628001\DI2024 [6] 0628001\DI2024 [7] P.T.O.
18. Which of the following is NOT a 22. Which organization developed the
security feature provided by SSL and
Secure Electronic Transaction (SET)
TLS? (SET) atsta facsfra fasur?
protocol?
(A) Authentication (A) HTUftazu
X) Internet Engineering Task Force (A) $tE $trufi TRS OrÁ (IETF)
() Data compression
(B) Sa1 ET
(IETF) (B) d aiss da bnfan (W3C)
(C) Integrity protection (C) 3rGSAI 0RAUT
(B) World Wide Web Consortium
(D) Confidentiality (D) hutaT
19. What is the primary role of the SSL (C) Visa and Mastercard
(D) International Organization for
(D) 3-Ru
Handshake Protocol?

(A) Establishing asecure connection / Standardization (1SO) (316U&30)


(B) Encrypting data transmission 23. In the context of SSL/TLS, what is a 23. UIUFUGI/IUeILH izaf , fftbib 3ret
Authenticating the server Certificate Authority (CA) responsible
(D) Managing encryption keys for?
20. Which version of SSL introduced
(A) Encrypting data transmission
significant security vulnerabilities (B) 34aTaafsi st yHfUrA 7AI
() Authentication users
leadingto its depreciation?
(A) SSL 1.0 (A) eHHT 1.0 (C) Issuing digital certificates
(b SSL 2.0 (B) =UHUCT 2.0 (D) Managing encryption keys
(C) sSL 3.0 (C) UHLCT 3.0 24. Which cryptographic protocol is
(D) SSL 4.0 (D) UUIUT 4.0
commonly used for securing web
21. What is the primary purpose of 21. grfia eaçi-ds dadT ( ) i browsing sessions?
Secure Electronic Transaction (SET)?
(A) HTTP (A) vatt
() Secure online shopping (A) grfa S0THGI^T V00n
(B) Secure file transfer (B) SMTP (B) HeH
(B) tA SI^CT RIH0GRUL
(C) Secure email communication (C) FTP (C) usdt

(D) Secure social media interaction (5 HTTPS (D) eadttt


0628001\DI2024 P.I.O.
[8] 0628001\DI2024 [9)
25. What goes HTTPS stand for? 25. HTTPS Nsí? What secunty measures deos SS
Hypertext Transfer Protocol TLSprovide against
eavesdropping?
Secure (A) Data encryption v
(B) Hypertext Transmission Protocol User authentication
(B) u N ywotVI
Secure (C) Acess control
(C) Hypertext Transfer Protocol (D) Intrusion detecton (D) qrto 41 -1
Standard 29, What is the purpose of the Recond

(D) Hypertext Transmission Protocol Protocol in SSL/TLS?

Standard (A) TO establish a secure


connection
26. Which Component of SSUTLS (B) To exchange cryptography keys
responsible for negotiating () To encrypt and authenticate (8) fhtutts 1 A-A

encryption algorithms and data

(D) To handle alters and error


exchanging cryptographic keys?
message
( Handshake Protocol
30. In the context of SSL/TLS, what is a
(B) Record Protocol (B) froi[ tetYia
cipher suite?
(C) Change Cipher Spece Protocol
(A) A set of cryptographic V
(D) Alter Protocol (D) 3-c sia
algorithms and keys sizes used
27. Which version of TLS addressed 27. GieriUH fH HOU HeHCT 3.0
for encryption
vulnerabilities found in SSL: 3.0 and
(B) A protocol for secure key ex
its predecessors?
change
(A) TLS 1.0 (A) ieceT 1.0
(C) An encryption key used for data
(B) TLS 1.1 (B) ueUH 1.1 transmission

(C) TLS 1.2 (C) eeteT 1.2 A digital certificate issued by a


) TLS 1.3 (D) uee 1.3 Certificate Authority
06280071DI2024 [10] 0628001\DI2024 [11] P.T.O.
24. Which version of SNMP introduced
31. SNMP
stand for in
(31) What does SNMP the Community-Based Security
computer networking?
(A) KGT tea fR MTNTc Model?
A) Simple Network Contormet (A) UHUTUHdt 1
(A) SNMPv1
(Gecure Network Management (B) LHLAutat 2 f
( ) SNMPV2c
Protocol
Network (C) a f t a á ggtr tiaoG (C) SNMPV2u (C) HeUHÝdt 2 4
(C) Systematic
Management Protocol
(D) SNMPv3 (D) CHLu-t 3
(D) Secure Network Monitoring
35. What is the primary disadvantage of 35. R HTHT À SNMPv1 I AfH
Protocol
NOT a 32. fefrg aHHH 3fbdaR SNMPv1 in terms of security?
32. Which of the following is
component of the SNMP architecture?
(A) Lack of authentication (A) YAOftcroj 1 3T4TA
(A) Network Management System
(NMS)
(A) ca yIUH gUNt (NMS) Limited MIB support (B) Aa MIB HA
() Managed Device (B) Hafua fsAi_H (C) Unreliable communication (C) 3#fdHs jR
Information base
(C) Management (D) ifc fa-arg
(D) Complex configuration
(MIB) (C) qH HOI 3TETR (MIB)

(D) Transmission Control Protocol 36. Which SNMP version introduced the 36. foH SNMP #oRU MIB UÈÌT#
(D) çrHfA GT Ttct (TCP)
(TCP) concept of SNMP Views to restrict
33. HUAUH as y¢UH gujtt (-HUH)
33. What is the primary function of the
access to certain portions of the
Network Management System (NMS)
MIB?
in SNMP?
(A) UHETUHúta 1
SNMPV1
(A) To store network data
net (B) SNMPv2c
(B) CHUAUta 2
(B) To monitor and manage
work devices v (C) SNMP IT HatRa fe
(C) SNMPv2u (C) EHUTrtat 2
( ) To transmit SNMP traps
(D) SNMPV3 (D) HLUHa 3
(D) To compile MIB definitions
0628001 DI2024 [13] P.T.O.
0628001\D\2024 (12]
A) What is the pimary function of
37, SNM1 40. HE=A vAua qut 3UTR (CRTS)
the Management Information Base
(MIB) in SNMP?

(AY TO manage network interfaces


) To store SNMP traps

(C) To deine the structure of


SeeeTaning
managed objects
ncse s a y
(D) To encrypt SNMP messages (D) SNMP H29 Dt fee
38. Whic orotocol is commonly used for 38. A1. Which version of SNMP introduced
41. SNMP > fbH oRU 3uaiasf
the User-Based Security Model TENfRT YRT HÍST (USM) T fbur?
(USM)?
(A) CHeLa 1
(A) SNMPv1
(A)
3) UDP (B) ULAQa 2 t
(B) SNMPv2c
(8) g
( SNMPV2u (C) HLGUHat 24
(C) 3ISigs
(D) SNMPV3 (D) HeTHat 3
(D) IPsec (D) ZzS
42. What is the purpose of the SNMP
39. Which SNMP version introduced the 39. fH SNMP ogU G fRTu
trap in network management?

concept of SNMP Inform messages (A) To request information from a


managed device
for reliable delivery of traps?
(B) To initiate a configuration
(A) SNMPv1 (A) EHUHLHúa 1
change on a managed device

(B) CHELAa 2 (C) To notify the SNMP manager of


(B) SNMPv2cy
signifñcant events
(C) SNMPV2u (C) =HUTeHÝat 24
To authenticate users accessing (D) MIB # TÉH A 344TTDAfa
(D) SNMPV3 (D) EHUAL-ñá 3 the MIB
C6290011D2024 [14] 0628001\DI2024 [15) PT.O.
43. Which protocol is commonly used to A7. What is the purp0se of the SNMp
43. SNMPv3 i}ud at ttt 47. ds g£ua
transport SNMPV3 massage securely agent in network management?
(A) TCP (A) To manage network devices
(A) drtý
(B) UDp To authenticate SNMP managers (B) SNMP 9a-lo THTUG GÀ fD
(B) qs (C) SNMP SAIT JAE HÀ fU
(Q SSH (C) UHUT (C) To generate SNMP traps
(D) TLS (D) theeuH (D) To compile MIB definitions
44. Which SNMP version provides
AR Which SNMP version uses
community
support for cryptographic security
strings for authentication 2
features such as encryption and
(A) SNMPv1 V (A) vHeHeia 1
authentication?
(A) UHEeûa 1 (B) SNMPV2c
SNMPV1 (B) HUeAat 2
(B) HHLHd 2 t (C) SNMPV2u
(B) SNMPV2c (C) eHUUYÝGT 24
(C) SNMPV2u (C) HUUH0a 24 SNMPV3 (D) LHeUHga 3
(D) SNMPV3 V (D) CHUTeHûâ 3 49. Which SNMP version is recommended
45. What is the primary function of the 45. SNMPV3 USM (3qbaf-3TETTIRA RaT for use in modern network

SNMPV3 USM (User Based Security management environment?


Model)? (A) SNMPv1 (A) HeHUHúa 1
(A) To provide community-based (B) SNMPv2c
a fE (B) HLLad 2
security (B) SNMP 9
(C) SNMPV2u (C) vHUTeAÚat 24
(B) To encrypt SNMP messages gefUrT H fu
(C) SNMP IZYÌ ( SNMPV3 (D) HUeAÚâ 3
(C) To authenticate SNMP message
(D) SNMP UJaeb fu 50. What term describes individuals who
CP) To manage SNMP views
SNMPv2 dT attempt to gain unauthorized access
46. Which of the following is NOT a 46. SNMPv1
benefit of using SNMPV3 or SNMPv2? to computer systems?

(A) Stronger security features (A) Administrators (A) 9RH


(B) Improved error handiing Intruders
(B) EGR af tsf (B) grtfsu
(C) Enhanced MIB support (C) 34 MIB HHe (C) Users (C) 34ebrf
( Better performance (D) dER AYfA
(D) Developers (D) }acyf
0628001\DI2024 (16] 0628001\DI2024 [17] P.T.O.
54. What does "CIA" stand for in the
context of network security?
(A) Confidentiality,
Integrity,
Authentication (A) htu, TASTI, HTURU
() Confidentiality, Integrity, (B) yfiudt, JGSdI, 34CAAI
Availability 3ATYAI,
(C) I^aR
(C) Cybersecurity, Information
B)
ravss Assurance, Authorization
(D) Cryptography, Intrusion
era Detection, Access control
(D) - a a 55. Which cryptographic concept refers
to the process of converting plaintext
2 ic f re ilcwrg is NOT 2 52. a
into ciphertext?
rar serricevcedby retwcrK
(A) Decryption (A) sfq
cecrt erarisrs? (B) Authentication (B) HTUoru
A, Cerfcertaity (8 Encryption (C) efogA
(D) Digital signature (D) sfca IGR
ALtrertcatcn (B) R
56. What is plaintext in the context of
(eria cf Service (DoS) (C) R(DoS)
cryptography?
D) Aveilability (D) 3uuA
(A) Secret message
(B) efos TàT
52, Which model provides a frameork (B) Encrypted message
(C) yG HYT
(G) Original message
for understanding and implemnenting (D) #CYT
D) Hashed message
network security policies and
57. Which component is required for both
mecranisrns? encryption and decryption processes
(A) OSI EZ
in symmetric cryptography?
(A) 0SI modei (A) HIáfHo q
(B) TCP/IP sa (A) Publickey
(B) TCP/IP mode! (b Private key (B) A oot
(cIA model (C) Hash function (C) bTT

(D) ARPANET model (D) ARPANET SR (D) Digital signature (D) sfcT BIGR
0628001D 2024 0628001\DI2024 [19] P.T.O.
[18]
S8À nasymmetric cryptography, what is 9)In asymmetric cryptography, what is
the purpOse of the public key? the purpose of the private key?
( To encrypt data
(A) To encrypt data V
(B) To decrypt data
( To decrypt data (B) tr ffhc rt fe (C) To generate digital signatures
(C) To generate digital signatures (C)
(D) To Verify digital signatures (D) A AR
(D) To verity digital signatures
63. What does the term "cryptanalysis"
59. Which cryptographic mechanism
refer to?
is primarily used for ensuring data
(A) The process of encrypting
integrity and authenticity? plaintext
(A) Encryption (B) The process of decrypting
(A) efoyA
(B) Decryption ciphertext
(B) sfy
(C) Digital signatures
( The study of cryptographic
(C) sCT 3R
( Hash functions algorithms and breaking them
(D) b
(D) The study of digital signatures
60. What does decryption refer to in the 64. Which cryptographic technique
context of cryptography? is used to verify the integrity of
(% Converting ciphertext into a message without revealing its
plaintext contents?

(B) Converting plaintext into (A) Encryption (A) ef-cq


ciphertext (B) Decryption (B) 3qTH
(C) fsfscT ZIAR 34I DI
(C) Generating digital signatures (C) digital signatures (C) sfcT EIIR
) Hash functions (D) baTA
(D) Verifying digital signatures
65. What is the purpose of authentication
61. What cryptographic technique is
in network security?
used to authenticate the sender of
(A) To ensure data confidentiality (B) 34TbaÍsd frREH ygUlT
a message and ensure its integrity?
(b) To Vverify the identity of users or
Encryption (A) efyA systems
(B) Decryption (B) s y (C) To encrypt data during
(C) Digital signatures (C) fsfsCT EAAR transmission

(D) Hash functions (D) bH (D) To sign digital certificates


0628001\DI2024 [20] 0628001\DI2024 [21] P.T.O.
66. Which cryptographic mechanism 66. s 10. In the context of network security.
uses a pair of keys for encryption what is the purpose of encryption?
and decryption? (AY To yerify the integrity of data
(A) Symmetric cryptography (A) HHfa faurât (B) To authenticate users
(B) Asymmetric cryptography (B) 3F=faa facturót
(C) Hash functions (C) }T baA (s To ensure confidentiality of data
(D) Digital signatures (D) sfoca KIGR (D) To prevent denial of service fe
67. What does the term "cipher text" attacks
refer to in cryptography?
71. What is the primary function of
(A) Original message (A) HT FZYT Kerberos in network security?
(b Encrypted message (B) t f s H2I
(C) Decrypted message
(A) Encryption (A efg
(C) fsfsds H{T
(D) Hashed message (B) Authentication V (B) gHTufrozUj
(D) I
68. Which cryptographic concept involves 68. fb fyftbas 3aUrU r-3AT•R (C) Authorization (C) fuRUT
the use of mathematical functions
p) Key Exchange (D) got f-44
to create a fixed-size output from
72, Which protocol is commonly used for
variable-size input?
(A) egy secure email communication?
(A) Encryption
(B) Decryption (B) fqT POP (A) t g
( Hash functions (C) }bTT (B) SMTP (B) CRt
(D) Digital signatures (D) fscT BHIAR (G) S/MIME V (C) UHHI^H
69. What does the term "key" represent (D) FTP (D) Usgt
in cryptography? 73. What cryptographic algorithm is
(A) The plaintext message
used in Pretty Good Privacy (PGP)?
(B) The encrypted message (B) hts }T
(A) AES (A) eguH
( Asecret value used in encryption
(t RSA (B) 34TRUHr
and decryption
(C) DES (C) stsUH
(D) A digital signature
(D) v sisicG tIAR (D) SHA (D) Heae
0628001\DI2024 (22] 0628001\DI2024 [23] P.T.O.
7 What is the purpose of a Certificate
74. Which of the following is NOT a 74. AraftRa 77. X.509 f o FuRC (CA) 1JETA
component of the X.509 standard? Authority (CA) in X.5092
(A) Certifhcate Authority (CA) (X To issue certificates
(B) Certificate Revocation List (A) W4Toya gudU (Te) (B) To manage encryption keys
fe
(CRL) (C) To authenticate users
(B) W4TUa ErtdRU t (CRL)
(C) Certificate Signing Request (D) To handle email
encryption
(CSR) (C) WHTUyA RAIAR 34RIT (CSR) 78. Which authentication service
( Simple Mail Transfer. Protocol
(D) iyT t ziHT teier (SMTP) provides a centralized database of
(SMTP) user credentials?
75., What does S/MIME stand for in the (A) Kerberos (A) bttT
context of network security? (B) X.509 (B) . 509
(A) Secure/Multipurpose t
Internet
( Directory Authentication
Mail Extensions
Service
(B) Secure/Media Internet Mail
(D) S/MIME (D) HHI54
Encryption 79. What does PGP stand for in network
(0 Simple Mail Interception and
security?
Encryption
( Pretty Good Protocol
(D) Secure/Multi-layered Internet (B) fa etoir
(B) Public Guardian Protocol
Mail Encryption
(C) Pretty Good Privacy
76. In Kerberos, what is the function of
(D) Public Guardian Privacy
the Key Distribution Center (KDC)? 80. Which of the following is NOT true 80. X.509 yHIUJYa aR A ÷ +
Generates public-private key about X.509 certificates?

pairs (A) The contain a public key


(B) The are signed by a Certificate
(B) Stores pasSwords in plaintext (B) VHIU4A uorU( )RI
Authority (C.A.)
(C) Issues ticket-granting tickets
(C) They can be decrypted by
(TGTS) (C) fcactard fz (TGT) I GRaI anyone
(D) Encrypts session keys
C0) They have an expiration data
0628001\DI2024 [24] 0628001\DI2024 P.T.O.
[25]
Ì g5. Which prot0Col is Commonly used for
81. What is the primary role of a digital 81. X.509 fur zià t aC WHUJ4A
certificate in the X.509 infrastructure? secure remote authentication within
a network using tickets?
(A) Encrypt data
(A) HTTPS (A) cataüua
( Authenticate users (B) 344bsfsi a gnfor b
(C) Store private keys
(B sSH (B) HLUa
(C) afaui tk t
(C) Kerberos (C) bi
(D) Manage network traffic
(D) SNMP (D) ALHUnt
82.)Which encryption algorithm 82. s4 }Y0 Hfr adfus/MIME
86. What type of cryptography is 86. i¥t TS HISAî (PGP) À Y fbH
commonly used in S/MIME for
primarily used in PrettyGood Privacy
securing email messages? 34uT fuT II ?
(PGP)?
(A) AES (A) -fid-gt
(A) vsUH (A) Symmetric-key
() RSA (B) 3RUHe
() Asymmetric-key
(B) 37T=fA-FÁ
(C) Triple DES (c) feH (C) Hybrid (C) BI_fas
(D) Blowfish (D) fgT (D) Quantum (D) aicA

83. What is the primary purpose of the 83. bRr gHg fdGRU (osÍ) I 87. What component of Kerberos is
Key Distribution Center (KDC) in responsible for authenticating users fore Kerberos H ãf R ?
Kerberos? and services?
(A) qHds r fe (A) WHTUTtbU Hér (AS)
(A) To store passwords (A) Authentication Server (AS)
(B) fa d fee (B) fcoc uif Hr (TGS)
(B) Ticket Granting Server (TGS)
( To issue tickets
(C) Ticket-Granting Ticket (TGT) (C) feac-uif fct (TGT)
(G) To manage encryption keys
(D) 34uuoafsd enfora aRt> fe (6) Key Distribution Center (KDC) (D) afaary bz (KDC)
(D) To authenticate users
88. What does the acronym TGT stand
84. In X.509, what is the function of the 84. X.509 À, THIUUa fRlRU Yt (CRL) for in the Kerberos authentication
Certificate Revocation List (CRL)?
protocol? (A) foc acI fcoc
( It lists all the valid certificates
(Ð Ticket-Granting Ticket
(B) It verifies the authenticity of
certificates
(B) Token Generation Token

(C) It lists revoked certificates (C) Ticket Generation Token


(D) cho-uifi fa
(D) It encrypts communication (D) Token-Granting Ticket
0628001\DI2024 0628001\DI2024 [27] P.T.0.
[26]
89. Which of
the following is 89. 93, In lPsec, which protocol provides 93. IPsec , st n aetsf fur ik
encryption and
disadvantage of using a directory authentlcation
services?
service tor authentication? (A) wroto (AH)
(A) Authentication Header (AH)
(A) Centralized management (B) A trete (ESP) c-rbfete
(B) fausear s V5 fag (B) Encapsulating Security Payload
(8) Single point of failure (ESP) V
(C) Enhanced security (C) Internet Key Exchange (IKE) (C) jertc 6si vTt (IKE)
(D) Rapid scalability (D) a 4IT-Aut (D) rrcr tàc ctuR (SSL)
(o) Secure Socket Layer (SSL)
90. What does S/MIME provide in emal (o4.) What does ESP stand for in the 94. IPsec af ÷ ESP 61 J 3 ?
communication ?
(A) Honaszuj 3ik 3rsAI context of IPsec?
(A) efaoE AT Tes
( ) Authentication and integrity (A) Encrypted Security Payload
(B) Compression and encryption (B) Encapsulated Security Protocol
(B) $9dts fraaifà tetater
(C) Digital signatures and
( Encapsulating Security Payload
encryption (D) Enhanced Security Protocol (D) JAA rAr tetir
(D) 5^CT RH0GRU RaT
(D) File transfer security 95. Which IPsec component provides 95. oH I IPsec Tco Ìqirut, 3r5I 3R
91. What is the primary purpose of the 91. IPsec À gHunRU (AH) I SIUAT
confidentiality, integrity, and optional
Authentication Header (AH) in IPsec. authentication?
(A) wHTUfrszur t
(A) Providing confidentiality (A) Authentication Header (AH)
() Ensuring data integrity and
(¾) Encapsulating Security Payload (B) year tets (ESP) ) dyce
authentication ESP

(C) Encrypting data traffic (C) Security Association (SA)


(C) Kai T (SA)
(D) Key Management Protocol
(D) Managing encryption keys
gHojsr ts (KMP) (D) s sar¬ stcaot (KMP)
92. Which of the following is NOT a 92. afaifra st
96. What is the purpose of a Security 96. IPsec LS RaI ÝT (SA) 6 JEY RAI
function of the Authentication
Association (SA) in IPsec?
Header (AH)?
(A) 34SAI HRAUT (A) To manage encryption keys
(A) Integrity protection
(B) hqtua (B) To encrypt data traffic
(B) Confidentiality
(C) HIUbzu (C) To establish a secure tunnel
(C) Authentication
() To authenticate users
() Replay protection (D) R reT
0628d011DI2024 [28 ) 0628001\DI2024 (29 ] P.T.O.
8001\DI2024 Which
100. Which99. 98. 97.
SSH(D) deployments?
IKEV(C) SNMP is Phase9)4Phase(C) 3Phase(B) negotiation (IKE)
2Phase()1 Exchange context ofWhat (A) Which
sSL/TLS
(B) (0 (D) (C) (B) (5 (D) (9 (B) Security
commonly
Interlink IntrusionInternet
Integrated (ESP)
Encapsulating Internet IPSec
Authentication
does protocol
management
protocolkey phase
IPsec? Associations
of IKE Security
used security Key Key Key Key is
of Key used
Exchange Exchange
Encryption stand ExchangeProtocol
in involves
Internet Encryption SecurityHeader in for
parameters?
IPsec for IPsec?
negotiating
in Payload (AH) (IKE) (ISSP)
VPN the Key the
(301
V
100. IPsec98.
IPsec97.
UHeHLT(D) 3fàs
(CHETe4
EHEea/TUH
) (B) (A) IPsec (rU
D) 4 RU
(C) 3 RUT(B) 2 RUf(A) 1 faf4a
$RÍio(D) (D) (C) (B) IPsec(at
A)
VPN THTU0ozUr
raT SE
qRMU ets
s t
(ESP) (AH) Às
sietstr
3THdR À (IKE)
(ISSP)
R
fH

You might also like