Is Mid 2 Objective Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

IS MID 2 OBJECTIVE QUESTIONS

UNIT 3

1.In Digital Signature, there is _____ relationship between signature and message.
a) Many to one
b) One to many
c) Many to many
d) One to one

2.Which one of the following is not a public key distribution means?


a) Public-Key Certificates
b) Hashing Certificates
c) Publicly available directories
d) Public-Key authority

3.Which of the following public key distribution systems is most secure?


a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
d) Public-Key authority

4. Which systems use a timestamp?


i) Public-Key Certificates
ii) Public announcements
iii) Publicly available directories
iv) Public-Key authority
a) i) and ii)
b) iii) and iv)
c) i) and iv)
d) iv) only

5. Publicly Available directory is more secure than which other system?


a) Public-Key Certificates
b) Public announcements
c) Public-Key authority
d) None of the mentioned

6. Which of the following is not an element/field of the X.509 certificates?


a) Issuer Name
b) Serial Modifier
c) Issuer unique Identifier
d) Signature

7. The subject unique identifier of the X.509 certificates was added in which version?
a) 1
b) 2
c) 3
d) 4

8. X.509 certificate recommends which cryptographic algorithm?


a) RSA
b) DES
c) AES
d) Rabin

9. Kerberos is an authentication scheme that can be used for


a) Public key cryptography
b) Digital signature
c) Hash function
d) Single sign on

10. CMS stands for


a) cipher message syntax
b) certificate message session
c) Cryptographic message syntax
d) none of the mentioned

11. Public key encryption is advantageous over Symmetric key Cryptography because of
a) Speed
b) Space
c) Key exchange
d) Key length

12. To verify a digital signature we need the


a) Sender’s Private key
b) Sender’s Public key
c) Receiver’s Private key
d) Receiver’s Public key

13. Key used in the symmetric key cryptography is


a) Public key
b) Private key
c) Permanent key
d) Session key

14. Authentication service that can be used in windows platform is


a) DES
b) RSA
c) MD5
d) KERBEROS

15. Biometric authentication works on the basis of


a) Human characteristics
b) Passwords
c) Smart cards
d) Pin
UNIT 4

1. ____________ is the method for keeping sensitive information in email communication &
accounts secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding

2._____________ is a famous technological medium for the spread of malware, facing problems of
spam, & phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email

3.Which of them is not a proper method for email security?


a) Use Strong password
b) Use email Encryption
c) Spam filters and malware scanners
d) Click on unknown links to explore

4.Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine

5.______________ needs to be turned off in order to prevent from this attack.


a) Email scripting
b) Email attachments
c) Email services
d) Third party email programs

6._____________ is an encryption program or add-ons which provides cryptographic privacy &


authentication for email communication.
a) Powerful Good Privacy
b) Pretty Good Privacy
c) Pretty Good Encryption
d) Pretty Strong Encryption

7. PGP is abbreviated as _______________


a) Pretty Good Privacy
b) Powerful Good Privacy
c) Protocol Giving Privacy
d) Pretty Good Protocol
8.Which of them is not an example of business email security tool?
a) Microsoft Office Trust Center
b) Sendinc
c) Hushmail Business
d) Cisco Jabber

9.________________ is a free extension of browser that enables you in decrypting as well as


encrypting emails.
a) Enlocked
b) MS Outlook
c) Cisco Jabber
d) Mail envelope

10.IPsec services are available in ______ Layer.


a) Application
b) Data link
c) Network
d) Transport

11.The Authentication Header (AH) , part of IPsec, provides which of the following security
function?
a) Source authentication
b) Data Integrity
c) Data confidentiality
d) Source authentication and data integrity

12.The _____ mode of IPsec, take the whole IP packet to form secure communication between two
gateways
a) Transport
b) Tunnel
c) Either (a) or (b) d)
d) Both (a) and (b)

13.Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?


a) Secure Socket Layer Protocol
b) Secure IP Protocol
c) Secure Http Protocol
d) Transport Layer Security Protocol

14.Pretty good privacy (PGP) security system uses


a) Public key cryptosystem
b) Private key cryptosystem
c) Public & Private key cryptosystem
d) None of the mentioned

15.IPSec is designed to provide security at the _________


a) Transport layer
b) Network layer
c) Application layer
d) Session layer
16.S/MIME stands for ____________.
a. standard multipurpose internet mail extensions
b. secure multipurpose internet mail extensions
c. secure multipurpose international mail extensions
d. standard multipurpose international mail extensions

17._________ uniquely identifies the MIME entities uniquely with reference to multiple
contexts.
a. Content description
b. Content -id
c. Content type
d. Content transfer encoding

18.The processed S/MIME along with security related data is called as ________.
a. public key cryptography standard
b. private key cryptography standard
c. S/MIME
d. MIME

19.In S/MIME,MLA stands for __________.


a. mailing list agent
b. multipurpose list agent.
c. mail lock agent.
d. message link agent.

20.The cryptography algorithms used in S/MIME are _________.


a. IDEA.
b. RC4.
c. RSA,DES-3
d. RC5

21. In tunnel mode, IPSec protects the ______


a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer

22. WPA2 is used for security in _______


a) Ethernet
b) Bluetooth
c) Wi-Fi
d) Email

23. An attempt to make a computer resource unavailable to its intended users is called ______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
24. Extensible authentication protocol is authentication framework frequently used in ______
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) Wired metropolitan area network

25. Pretty good privacy (PGP) is used in ______


a) Browser security
b) Email security
c) FTP security
d) WiFi security

26. PGP encrypts data by using a block cipher called ______


a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) Local data encryption algorithm

27. When a DNS server accepts and uses incorrect information from a host that has no authority
giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing

28. __________mode is used whenever either end of a security association is gateway.


a) Tunnel
b) Encapsulating
c) Transport
d) Gateway

29. The _______ Is a collection of protocols designed by Internet Engineering Task Force(IETF)
to provide security for a packet at the Network level.
a) IPsec
b) Netsec
c) Packetsec
d) Protocolsec

30. A ..................is an extension of an enterprise’s private intranet across a public Network such as
the Internet across a public Network such as the Internet, creating a secure private connection
a) VNP
b) VPN
c) VSN
d) VSPN
UNIT 5
1. Which one of the following is not a higher layer SSL protocol?
a) Alert Protocol
b) Handshake Protocol
c) Alarm Protocol
d) Change Cipher Spec Protocol

2. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________
bytes.
a) 216
b) 232
c) 214
d) 212

3. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in
SSLv3 whereas ________ in HMAC.
a) NANDed, XORed
b) Concatenated, XORed
c) XORed, NANDed
d) XORed, Concatenated

4. Which protocol is used to convey SSL related alerts to the peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol

5. In the SSLv3 the padding bits are ____________ with the secret key.
a) Padded
b) XORed
c) Concatenated
d) ANDed

6. In TLS padding cann be upto a maximum of –


a) 79 bytes
b) 127 bytes
c) 255 bytes
d) 511 bytes

7._________________ is the kind of firewall is connected between the device and the network
connecting to internet.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
8._________ is software that is installed using internet connection or they come by-default with
operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall

9. Which of the following is not a software firewall?


a) Windows Firewall
b) Outpost Firewall Pro
c) Endian Firewall
d) Linksys Firewall

10. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets

11. A firewall protects which of the following attacks?


a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing

12. Packet filtering firewalls are deployed on ________


a) routers
b) switches
c) hubs
d) repeaters

13. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer

14. The __________ defines the packet filtering firewall rules.


a) Access Control List
b) Protocols
c) Policies
d) Ports

15. Circuit-level gateway firewalls are installed in _______ layer of OSI model.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
16. Which of the following is a disadvantage of Circuit-level gateway firewalls?
a) They’re expensive
b) They’re complex in architecture
c) They do not filter individual packets
d) They’re complex to setup

17.____________ gateway firewalls are deployed in application-layer of OSI model.


a) Packet Filtering Firewalls
b) Circuit Level Gateway Firewalls
c) Application-level Gateway Firewalls
d) Stateful Multilayer Inspection Firewalls

18. Application level gateway firewalls protect the network for specific _____________
a) application layer protocol
b) session layer protocol
c) botnet attacks
d) network layer protocol

19.___________ firewalls are a combination of other three types of firewalls.


a) Packet Filtering
b) Circuit Level Gateway
c) Application-level Gateway
d) Stateful Multi layer Inspection

20. Packet filtering firewalls are also called ____________


a) first generation firewalls
b) second generation firewalls
c) third generation firewalls
d) fourth generation firewalls

21. Which one of the following can be considered as the class of computer threats?
a) DOS attack
b) Phishing
c) Soliciting
d) Both A and C

22. Which of the following usually observe each activity on the internet of the victim, gather all
information in the background, and send it to someone else?
a) Malware
b) Spyware
c) Soliciting
d) Adware

23. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
a) Malware
b) Anti Virus
c) Spyware
d) Adware
24. Which of the following is not a software firewall?
a) Windows Firewall
b) Outpost Firewall Pro
c) Endian Firewall
d) Linksys Firewall

25. Firewalls can be of _______ kinds.


a) 1
b) 2
c) 3
d) 4

26. _________ is software that is installed using an internet connection or they come by-default with
operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall

27. A firewall protects which of the following attacks?


a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing

28. Packet filtering firewalls are deployed on ________


a) routers
b) switches
c) hubs
d) repeaters

29. ACL stands for _____________


a) Access Condition List
b) Anti-Control List
c) Access Control Logs
d) Access Control List

30. One advantage of Packet Filtering firewall is __________


a) more efficient
b) less complex
c) less costly
d) very fast

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy