Is Mid 2 Objective Questions
Is Mid 2 Objective Questions
Is Mid 2 Objective Questions
UNIT 3
1.In Digital Signature, there is _____ relationship between signature and message.
a) Many to one
b) One to many
c) Many to many
d) One to one
7. The subject unique identifier of the X.509 certificates was added in which version?
a) 1
b) 2
c) 3
d) 4
11. Public key encryption is advantageous over Symmetric key Cryptography because of
a) Speed
b) Space
c) Key exchange
d) Key length
1. ____________ is the method for keeping sensitive information in email communication &
accounts secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding
2._____________ is a famous technological medium for the spread of malware, facing problems of
spam, & phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email
4.Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine
11.The Authentication Header (AH) , part of IPsec, provides which of the following security
function?
a) Source authentication
b) Data Integrity
c) Data confidentiality
d) Source authentication and data integrity
12.The _____ mode of IPsec, take the whole IP packet to form secure communication between two
gateways
a) Transport
b) Tunnel
c) Either (a) or (b) d)
d) Both (a) and (b)
17._________ uniquely identifies the MIME entities uniquely with reference to multiple
contexts.
a. Content description
b. Content -id
c. Content type
d. Content transfer encoding
18.The processed S/MIME along with security related data is called as ________.
a. public key cryptography standard
b. private key cryptography standard
c. S/MIME
d. MIME
23. An attempt to make a computer resource unavailable to its intended users is called ______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
24. Extensible authentication protocol is authentication framework frequently used in ______
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) Wired metropolitan area network
27. When a DNS server accepts and uses incorrect information from a host that has no authority
giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
29. The _______ Is a collection of protocols designed by Internet Engineering Task Force(IETF)
to provide security for a packet at the Network level.
a) IPsec
b) Netsec
c) Packetsec
d) Protocolsec
30. A ..................is an extension of an enterprise’s private intranet across a public Network such as
the Internet across a public Network such as the Internet, creating a secure private connection
a) VNP
b) VPN
c) VSN
d) VSPN
UNIT 5
1. Which one of the following is not a higher layer SSL protocol?
a) Alert Protocol
b) Handshake Protocol
c) Alarm Protocol
d) Change Cipher Spec Protocol
2. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________
bytes.
a) 216
b) 232
c) 214
d) 212
3. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in
SSLv3 whereas ________ in HMAC.
a) NANDed, XORed
b) Concatenated, XORed
c) XORed, NANDed
d) XORed, Concatenated
4. Which protocol is used to convey SSL related alerts to the peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
5. In the SSLv3 the padding bits are ____________ with the secret key.
a) Padded
b) XORed
c) Concatenated
d) ANDed
7._________________ is the kind of firewall is connected between the device and the network
connecting to internet.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
8._________ is software that is installed using internet connection or they come by-default with
operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
10. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets
13. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
15. Circuit-level gateway firewalls are installed in _______ layer of OSI model.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
16. Which of the following is a disadvantage of Circuit-level gateway firewalls?
a) They’re expensive
b) They’re complex in architecture
c) They do not filter individual packets
d) They’re complex to setup
18. Application level gateway firewalls protect the network for specific _____________
a) application layer protocol
b) session layer protocol
c) botnet attacks
d) network layer protocol
21. Which one of the following can be considered as the class of computer threats?
a) DOS attack
b) Phishing
c) Soliciting
d) Both A and C
22. Which of the following usually observe each activity on the internet of the victim, gather all
information in the background, and send it to someone else?
a) Malware
b) Spyware
c) Soliciting
d) Adware
23. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
a) Malware
b) Anti Virus
c) Spyware
d) Adware
24. Which of the following is not a software firewall?
a) Windows Firewall
b) Outpost Firewall Pro
c) Endian Firewall
d) Linksys Firewall
26. _________ is software that is installed using an internet connection or they come by-default with
operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall