Visit: The New Homepage

Visit: The New Homepage
Kindly click the image for the updated Notes Online

Thursday, April 3, 2014

Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls - MCQs

Posted by Unknown at 3:12 PM
Hits:
MCQs for Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls

Topic Outline

  • IPSecurity  (lPSec)
    • Two Modes
    • Two Security Protocols
    • Security Association
    • Internet Key Exchange (IKE)
    • Virtual Private Network
  • SSL 
    • SSL Services
    • Security Parameters
    • Sessions and Connections
    • Four Protocols
    • Transport Layer Security
  • PGP
  • FIREWALLS
    • Packet-Filter Firewall
    • Proxy Firewall

Begin and Good luck!

1. _________ operates in the transport mode or the tunnel mode.

  • A)            IPSec
  • B)            SSL
  • C)            PGP
  • D)            none of the above

2. IKE creates SAs for _____.

  • A)            SSL
  • B)            PGP
  • C)            IPSec
  • D)            VP

3. ______ provides either authentication or encryption, or both, for packets at the IP level.

  • A)            AH
  • B)            ESP
  • C)            PGP
  • D)            SSL

4. One security protocol for the e-mail system is _________.

  • A)            IPSec
  • B)            SSL
  • C)            PGP
  • D)            none of the above

5. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

  • A)            SSL
  • B)            TLS
  • C)            either (a) or (b)
  • D)            both (a) and (b)

6. IKE is a complex protocol based on ______ other protocols.

  • A)            two
  • B)            three
  • C)            four
  • D)            five

7. IPSec defines two protocols: _______ and ________.

  • A)            AH; SSL
  • B)            PGP; ESP
  • C)            AH; ESP
  • D)            all of the above

8. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

  • A)            transport
  • B)            tunnel
  • C)            either (a) or (b)
  • D)            neither (a) nor (b)

9. ______ is the protocol designed to create security associations, both inbound and outbound.

  • A)            SA
  • B)            CA
  • C)            KDC
  • D)            IKE

10. A _______network is used inside an organization.

  • A)            private
  • B)            public
  • C)            semi-private
  • D)            semi-public

11. SSL provides _________.

  • A)             message integrity
  • B)             confidentiality
  • C)             compression
  • D)             all of the above

12. The Internet authorities have reserved addresses for _______.

  • A)             intranets
  • B)             internets
  • C)             extranets
  • D)             none of the above

13. An _________ is a network that allows authorized access from outside users.

  • A)             intranet
  • B)             internet
  • C)             extranet
  • D)             none of the above

14. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

  • A)             IPSec
  • B)             SSL
  • C)             PGP
  • D)             none of the above

15. IKE uses _______.

  • A)             Oakley
  • B)             SKEME
  • C)             ISAKMP
  • D)             all of the above

16. IPSec uses a set of SAs called the ________.

  • A)             SAD
  • B)             SAB
  • C)             SADB
  • D)             none of the above

17. An ________ is a private network that uses the Internet model.

  • A)             intranet
  • B)             internet
  • C)             extranet
  • D)             none of the above

18. ______ is actually an IETF version of _____.

  • A)             TLS; TSS
  • B)             SSL; TLS
  • C)             TLS; SSL
  • D)             SSL; SLT

19. In ______, there is a single path from the fully trusted authority to any certificate.

  • A)             X509
  • B)             PGP
  • C)             KDC
  • D)             none of the above

20. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

  • A)             list of protocols
  • B)             cipher suite
  • C)             list of keys
  • D)             none of the above

21. A ______ provides privacy for LANs that must communicate through the global Internet.

  • A)             VPP
  • B)             VNP
  • C)             VNN
  • D)             VPN

22. _______ uses the idea of certificate trust levels.

  • A)             X509
  • B)             PGP
  • C)             KDC
  • D)             none of the above

23. IPSec in the ______ mode does not protect the IP header.

  • A)             transport
  • B)             tunnel
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

24. ________ provides privacy, integrity, and authentication in e-mail.

  • A)             IPSec
  • B)             SSL
  • C)             PGP
  • D)             none of the above

25. In _____, there can be multiple paths from fully or partially trusted authorities.

  • A)             X509
  • B)             PGP
  • C)             KDC
  • D)             none of the above

26. ______ provides authentication at the IP level.

  • A)             AH
  • B)             ESP
  • C)             PGP
  • D)             SSL

27. In _______, the cryptographic algorithms and secrets are sent with the message.

  • A)             IPSec
  • B)             SSL
  • C)             TLS
  • D)             PGP

28. ______ is designed to provide security and compression services to data generated from the application layer.

  • A)             SSL
  • B)             TLS
  • C)             either (a) or (b)
  • D)             both (a) and (b)

29. _______ provide security at the transport layer.

  • A)             SSL
  • B)             TLS
  • C)             either (a) or (b)
  • D)             both (a) and (b)

30. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

  • A)             transport
  • B)             tunnel
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

31. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

  • A)             transport
  • B)             tunnel
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

32. ______ was invented by Phil Zimmerman.

  • A)             IPSec
  • B)             SSL
  • C)             PGP
  • D)             none of the above

33. A _______ layer security protocol provides end-to-end security services for applications.

  • A)             data link
  • B)             network
  • C)             transport
  • D)             none of the above

34. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

  • A)             secret
  • B)             public
  • C)             either (a) or (b)
  • D)             both (a) and (b)

Back to Homepage

Note: Check your works. Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls - MCQs Answers


credit: Behrouz A. Forouzan©2013 www.FroydWess.com
Share Note :
Welcome to Online-Notes

1 comment:


  1. Great job for publishing such a beneficial web site. Your web log isn’t only useful but it is additionally really creative too. There tend to be not many people who can certainly write not so simple posts that artistically. Continue the nice writing
    read review

    ReplyDelete

 

© 2013 - 2014. All Rights Reserved | Online Notes and Lectures | Customized by MovieOnMovie

Home | | | Top