Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
276. |
Which of the following is not a secured mail transferring methodology? |
A. | pop3 |
B. | ssmtp |
C. | mail using pgp |
D. | s/mime |
Answer» A. pop3 |
277. |
__________ is used for encrypting data at network level. |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
278. |
S/MIME is abbreviated as __________________ |
A. | secure/multimedia internet mailing extensions |
B. | secure/multipurpose internet mailing extensions |
C. | secure/multimedia internet mail extensions |
D. | secure/multipurpose internet mail extensions |
Answer» D. secure/multipurpose internet mail extensions |
279. |
PGP encrypts data by using a block cipher called ______ |
A. | international data encryption algorithm |
B. | private data encryption algorithm |
C. | internet data encryption algorithm |
D. | local data encryption algorithm |
Answer» A. international data encryption algorithm |
280. |
When were VPNs introduced into the commercial world? |
A. | early 80’s |
B. | late 80’s |
C. | early 90’s |
D. | late 90’s |
Answer» D. late 90’s |
281. |
What protocol is NOT used in the operation of a VPN? |
A. | pptp |
B. | ipsec |
C. | ymum |
D. | l2tp |
Answer» C. ymum |
282. |
Which of the following statements is NOT true concerning VPNs? |
A. | financially rewarding compared to leased lines |
B. | allows remote workers to access corporate data |
C. | allows lan-to-lan connectivity over public networks |
D. | is the backbone of the internet |
Answer» D. is the backbone of the internet |
283. |
Traffic in a VPN is NOT ____________ |
A. | invisible from public networks |
B. | logically separated from other traffic |
C. | accessible from unauthorized public networks |
D. | restricted to a single protocol in ipsec |
Answer» C. accessible from unauthorized public networks |
284. |
Which layer 3 protocols can be transmitted over an L2TP VPN? |
A. | only ip |
B. | only ipx |
C. | only icmp |
D. | ip and ipx |
Answer» D. ip and ipx |
285. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards? |
A. | ipsec |
B. | pptp |
C. | ppp |
D. | l2tp |
Answer» A. ipsec |
286. |
L2F was developed by which company? |
A. | microsoft |
B. | cisco |
C. | blizzard entertainment |
D. | ietf |
Answer» B. cisco |
287. |
Which layer of the OSI reference model does PPTP work at? |
A. | layer 1 |
B. | layer 2 |
C. | layer 3 |
D. | layer 4 |
Answer» B. layer 2 |
288. |
Which layer of the OSI reference model does IPsec work at? |
A. | layer 1 |
B. | layer 2 |
C. | layer 3 |
D. | layer 4 |
Answer» C. layer 3 |
289. |
Firewalls can be of _______ kinds. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 |
290. |
_________________ is the kind of firewall is connected between the device and the network connecting to internet. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» A. hardware firewall |
291. |
_________ is software that is installed using an internet connection or they come by-default with operating systems. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» B. software firewall |
292. |
Which of the following is not a software firewall? |
A. | windows firewall |
B. | outpost firewall pro |
C. | endian firewall |
D. | linksys firewall |
Answer» D. linksys firewall |
293. |
Firewall examines each ____________ that are entering or leaving the internal network. |
A. | emails users |
B. | updates |
C. | connections |
D. | data packets |
Answer» D. data packets |
294. |
A firewall protects which of the following attacks? |
A. | phishing |
B. | dumpster diving |
C. | denial of service (dos) |
D. | shoulder surfing |
Answer» C. denial of service (dos) |
295. |
There are ______ types of firewall. |
A. | 5 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» B. 4 |
296. |
Packet filtering firewalls are deployed on ________ |
A. | routers |
B. | switches |
C. | hubs |
D. | repeaters |
Answer» A. routers |
297. |
In the ______________ layer of OSI model, packet filtering firewalls are implemented. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» D. network layer |
298. |
The __________ defines the packet filtering firewall rules. |
A. | access control list |
B. | protocols |
C. | policies |
D. | ports |
Answer» A. access control list |
299. |
ACL stands for _____________ |
A. | access condition list |
B. | anti-control list |
C. | access control logs |
D. | access control list |
Answer» D. access control list |
300. |
When a packet does not fulfil the ACL criteria, the packet is _________ |
A. | resend |
B. | dropped |
C. | destroyed |
D. | acknowledged as received |
Answer» B. dropped |
We want to make our service better for you. Please take a moment to fill out our survey.
Take Survey