Information Cyber Security (ICS) Solved MCQs

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide

276.

Which of the following is not a secured mail transferring methodology?

A. pop3
B. ssmtp
C. mail using pgp
D. s/mime
Answer» A. pop3
277.

__________ is used for encrypting data at network level.

A. ipsec
B. https
C. smtp
D. s/mime
Answer» A. ipsec
278.

S/MIME is abbreviated as __________________

A. secure/multimedia internet mailing extensions
B. secure/multipurpose internet mailing extensions
C. secure/multimedia internet mail extensions
D. secure/multipurpose internet mail extensions
Answer» D. secure/multipurpose internet mail extensions
279.

PGP encrypts data by using a block cipher called ______

A. international data encryption algorithm
B. private data encryption algorithm
C. internet data encryption algorithm
D. local data encryption algorithm
Answer» A. international data encryption algorithm
280.

When were VPNs introduced into the commercial world?

A. early 80’s
B. late 80’s
C. early 90’s
D. late 90’s
Answer» D. late 90’s
281.

What protocol is NOT used in the operation of a VPN?

A. pptp
B. ipsec
C. ymum
D. l2tp
Answer» C. ymum
282.

Which of the following statements is NOT true concerning VPNs?

A. financially rewarding compared to leased lines
B. allows remote workers to access corporate data
C. allows lan-to-lan connectivity over public networks
D. is the backbone of the internet
Answer» D. is the backbone of the internet
283.

Traffic in a VPN is NOT ____________

A. invisible from public networks
B. logically separated from other traffic
C. accessible from unauthorized public networks
D. restricted to a single protocol in ipsec
Answer» C. accessible from unauthorized public networks
284.

Which layer 3 protocols can be transmitted over an L2TP VPN?

A. only ip
B. only ipx
C. only icmp
D. ip and ipx
Answer» D. ip and ipx
285.

ESP (Encapsulating Security Protocol) is defined in which of the following standards?

A. ipsec
B. pptp
C. ppp
D. l2tp
Answer» A. ipsec
286.

L2F was developed by which company?

A. microsoft
B. cisco
C. blizzard entertainment
D. ietf
Answer» B. cisco
287.

Which layer of the OSI reference model does PPTP work at?

A. layer 1
B. layer 2
C. layer 3
D. layer 4
Answer» B. layer 2
288.

Which layer of the OSI reference model does IPsec work at?

A. layer 1
B. layer 2
C. layer 3
D. layer 4
Answer» C. layer 3
289.

Firewalls can be of _______ kinds.

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
290.

_________________ is the kind of firewall is connected between the device and the network connecting to internet.

A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall
Answer» A. hardware firewall
291.

_________ is software that is installed using an internet connection or they come by-default with operating systems.

A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall
Answer» B. software firewall
292.

Which of the following is not a software firewall?

A. windows firewall
B. outpost firewall pro
C. endian firewall
D. linksys firewall
Answer» D. linksys firewall
293.

Firewall examines each ____________ that are entering or leaving the internal network.

A. emails users
B. updates
C. connections
D. data packets
Answer» D. data packets
294.

A firewall protects which of the following attacks?

A. phishing
B. dumpster diving
C. denial of service (dos)
D. shoulder surfing
Answer» C. denial of service (dos)
295.

There are ______ types of firewall.

A. 5
B. 4
C. 3
D. 2
Answer» B. 4
296.

Packet filtering firewalls are deployed on ________

A. routers
B. switches
C. hubs
D. repeaters
Answer» A. routers
297.

In the ______________ layer of OSI model, packet filtering firewalls are implemented.

A. application layer
B. session layer
C. presentation layer
D. network layer
Answer» D. network layer
298.

The __________ defines the packet filtering firewall rules.

A. access control list
B. protocols
C. policies
D. ports
Answer» A. access control list
299.

ACL stands for _____________

A. access condition list
B. anti-control list
C. access control logs
D. access control list
Answer» D. access control list
300.

When a packet does not fulfil the ACL criteria, the packet is _________

A. resend
B. dropped
C. destroyed
D. acknowledged as received
Answer» B. dropped
Tags
Question and answers in Information Cyber Security (ICS), Information Cyber Security (ICS) multiple choice questions and answers, Information Cyber Security (ICS) Important MCQs, Solved MCQs for Information Cyber Security (ICS), Information Cyber Security (ICS) MCQs with answers PDF download

Help us improve!

We want to make our service better for you. Please take a moment to fill out our survey.

Take Survey