1. Which of the following are the solutions to network security?
i) Encryption ii) Authentication
iii) Authorization iv) Non-repudiation
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
2. …………… is to protect data and passwords.
A) Encryption
B) Authentication
C) Authorization
3. The following protocols and system are commonly used to provide various degrees of security services in computer network.
i) IP filtering ii) Reverse Address Translation
iii) IP security Architecture (IPsec) iv) Firewalls v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
4. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ………………
A) Chock point
B) meeting point
C) firewall point
D) secure point
5. Which of the following is / are the types of firewall?
A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) All of the above
6. The components of IP security includes ………………….
A) Authentication Header (AH)
B) Encapsulating Security Payload (ESP)
C) Internet key Exchange (IKE)
D) All of the above
7. ………………….. is used to carry traffic of one protocol over network that does not support that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching
8. In ………………. Mode, the authentication header is inserted immediately after the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
9. State true or false.
i) Socks are a standard for circuit level gateways.
ii) The NAT is used for small number of the hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False
10. A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
A) VNP
B) VPN
C) VSN
D) VSPN
Answers:
1. D) All i, ii, iii and iv 2. A) Encryption 3. B) i, iii, iv and v only 4. A) Chock point 5. D) All of the above | 6. D) All of the above 7. A) Tunneling 8. A) Tunnel 9. C) True, True 10. B) VPN |
You may also wanted to view the following related posts
- Solved MCQ of Computer Security set -1
- MCQ of Internet Security with answer set-2
- Solved MCQ of Computer networking set-1
- MCQ of Computer Networking with answer set-2
- Solved MCQ of Computer networking set-3
- MCQ of Computer Networking with answer set-4
You can view the following other posts
- Solved MCQ of Database Management System (DBMS) Set - 3
- Solved MCQ of System Analysis and Design Set-3
- Solved MCQ of Data Structure Set - 2
- Solved MCQ of Java for Java Proficiency test set-3
- MCQ of C++ with answer Set-2
- MCQ of Computer Networking with answer set-4
For other more MCQs: Click Here
ليست هناك تعليقات:
إرسال تعليق