1.  The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.
A) SSL
B) ESP
C) TSL
D) PSL

2. The ……………. is used to provide integrity check, authentication and encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL


3. In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above

4. The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec

 5. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol

6. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server.
A) 420
B) 1032
C) 443
D) 322

7. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol

8. State whether the following statement are true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and destination server.
A) True, False
B) False, True
C) True, True
D) False, False

9. In packet-filtering router, the following information can be external from the packet header.
i) Source IP address                                        ii) Destination IP address
iii) TCP/UDP source port                                               iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v

10. …………….. mode is used whenever either end of a security association is gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Answers:
1.       A) SSL
2.       B) ESP
3.       C) Both A and B
4.       A) IPsec
5.       C) SSL record protocol
6.       C) 443
7.       A) SSL hand... protocol
8.       A) True, False
9.       D) All i, ii, iii, iv and v
10.   A) Tunnel


You may also wanted to view the following related posts

For other more Multiple Choice Questions (MCQs): Click Here

إرسال تعليق

 
Top