310+ Computer Architecture and Organization Solved MCQs

301.

The DSS signature uses which hash algorithm?

A. md5
B. sha-2
C. sha-1
D. does not use hash algorithm
Answer» C. sha-1
Explanation: the dss signature uses sha- 1.
302.

The RSA signature uses which hash algorithm?

A. md5
B. sha-1
C. md5 and sha-1
D. none of the mentioned.
Answer» C. md5 and sha-1
Explanation: the md5 and sha-1 hash is concatenated together and the then encrypted with the server’s private key.
303.

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 bytes
Answer» C. 36 bytes
Explanation: the size is 36 bytes after md5 and sha-1 processing.
304.

The certificate_request massage includes two parameters, one of which is-

A. certificate_extension
B. certificate_creation
C. certificate_exchange
D. certificate_type
Answer» D. certificate_type
Explanation: the certificate_request massage includes two parameters : certificate_type and certificate_authorities.
305.

The client_key_exchange message uses a pre master key of size –

A. 48 bytes
B. 56 bytes
C. 64 bytes
D. 32 bytes
Answer» A. 48 bytes
Explanation: the client_key_exchange message uses a pre master key of size 48 bytes.
306.

In the handshake protocol which is the message type first sent between client and server ?

A. server_hello
B. client_hello
C. hello_request
D. certificate_request
Answer» B. client_hello
Explanation: interaction between the client and server starts via the client_hello message.
307.

Network layer firewall works as a

A. frame filter
B. packet filter
C. content filter
D. virus filter
Answer» B. packet filter
Explanation: as you know, firewalls are available as hardware appliances, as software- only, or a combination of the two. in every case, the purpose of a firewall is to isolate your trusted internal network (or your personal pc) from the dangers of unknown resources on the internet and other network connections that may be harmful. the firewall prevents unauthorized access to your internal, trusted network from outside threats.
308.

Network layer firewall has two sub- categories as                    

A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» A. state full firewall and stateless firewall
Explanation: most network layer firewalls can operate as stateful or stateless firewalls, creating two subcategories of the standard network layer firewall. stateful firewalls have the advantage of being able to track packets over a period of time for greater analysis and accuracy — but they require more memory and operate more slowly. stateless firewalls do not analyze past traffic and can be useful for systems where speed is more important than security, or for systems that have very specific and limited needs. for example, a computer that only needs to connect to a particular backup server does not need the extra security of a stateful firewall.
309.

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

A. chock point
B. meeting point
C. firewall point
D. secure point
Answer» A. chock point
Explanation: a firewall can be a pc, a router, a midrange, a mainframe, a unix workstation, or a combination of these that determines which information or services can be accessed from the outside and who is permitted to use the information and services from outside. generally, a firewall is installed at the point where the secure internal network and untrusted external network meet, which is also known as a chokepoint.
310.

Which of the following is / are the types of firewall?

A. packet filtering firewall
B. dual homed gateway firewall
C. screen host firewall
D. dual host firewall
Answer» A. packet filtering firewall
Explanation: a firewall can be a pc, a midrange, a mainframe, a unix workstation, a router, or combination of these. depending on the requirements, a firewall can consist of one or more of the following functional components: packet-filtering router
311.

A proxy firewall filters at                    

A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» D. application layer
Explanation: the application firewall is typically built to control all network traffic on any layer up to the application layer. it is able to control applications or services specifically, unlike a stateful network
312.

A packet filter firewall filters at

A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Answer» C. network layer or transport layer
Explanation: in computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
313.

What is one advantage of setting up a DMZ with two firewalls?

A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. improved network performance
Answer» C. you can do load balancing
Explanation: dmz stands for de-militarized zone. in a topology with a single firewall serving both internal and external users (lan and wan), it acts as a shared resource for these two zones. so load balancing can be done by adding another firewall.
314.

A firewall needs to be                      so that it can grow proportionally with the network that it protects.

A. robust
B. expansive
C. fast
D. scalable
Answer» B. expansive
Explanation: the firewall has to be expansive because a network is expected to grow with time and if the firewall is unable to grow with it, the firewall won’t be able to handle the growing network traffic flow and will hence fail.
Tags
  • Question and answers in Computer Architecture and Organization,
  • Computer Architecture and Organization multiple choice questions and answers,
  • Computer Architecture and Organization Important MCQs,
  • Solved MCQs for Computer Architecture and Organization,
  • Computer Architecture and Organization MCQs with answers PDF download