McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .
301. |
The DSS signature uses which hash algorithm? |
A. | md5 |
B. | sha-2 |
C. | sha-1 |
D. | does not use hash algorithm |
Answer» C. sha-1 | |
Explanation: the dss signature uses sha- 1. |
302. |
The RSA signature uses which hash algorithm? |
A. | md5 |
B. | sha-1 |
C. | md5 and sha-1 |
D. | none of the mentioned. |
Answer» C. md5 and sha-1 | |
Explanation: the md5 and sha-1 hash is concatenated together and the then encrypted with the server’s private key. |
303. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
A. | 42 bytes |
B. | 32 bytes |
C. | 36 bytes |
D. | 48 bytes |
Answer» C. 36 bytes | |
Explanation: the size is 36 bytes after md5 and sha-1 processing. |
304. |
The certificate_request massage includes two parameters, one of which is- |
A. | certificate_extension |
B. | certificate_creation |
C. | certificate_exchange |
D. | certificate_type |
Answer» D. certificate_type | |
Explanation: the certificate_request massage includes two parameters : certificate_type and certificate_authorities. |
305. |
The client_key_exchange message uses a pre master key of size – |
A. | 48 bytes |
B. | 56 bytes |
C. | 64 bytes |
D. | 32 bytes |
Answer» A. 48 bytes | |
Explanation: the client_key_exchange message uses a pre master key of size 48 bytes. |
306. |
In the handshake protocol which is the message type first sent between client and server ? |
A. | server_hello |
B. | client_hello |
C. | hello_request |
D. | certificate_request |
Answer» B. client_hello | |
Explanation: interaction between the client and server starts via the client_hello message. |
307. |
Network layer firewall works as a |
A. | frame filter |
B. | packet filter |
C. | content filter |
D. | virus filter |
Answer» B. packet filter | |
Explanation: as you know, firewalls are available as hardware appliances, as software- only, or a combination of the two. in every case, the purpose of a firewall is to isolate your trusted internal network (or your personal pc) from the dangers of unknown resources on the internet and other network connections that may be harmful. the firewall prevents unauthorized access to your internal, trusted network from outside threats. |
308. |
Network layer firewall has two sub- categories as |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» A. state full firewall and stateless firewall | |
Explanation: most network layer firewalls can operate as stateful or stateless firewalls, creating two subcategories of the standard network layer firewall. stateful firewalls have the advantage of being able to track packets over a period of time for greater analysis and accuracy — but they require more memory and operate more slowly. stateless firewalls do not analyze past traffic and can be useful for systems where speed is more important than security, or for systems that have very specific and limited needs. for example, a computer that only needs to connect to a particular backup server does not need the extra security of a stateful firewall. |
309. |
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as |
A. | chock point |
B. | meeting point |
C. | firewall point |
D. | secure point |
Answer» A. chock point | |
Explanation: a firewall can be a pc, a router, a midrange, a mainframe, a unix workstation, or a combination of these that determines which information or services can be accessed from the outside and who is permitted to use the information and services from outside. generally, a firewall is installed at the point where the secure internal network and untrusted external network meet, which is also known as a chokepoint. |
310. |
Which of the following is / are the types of firewall? |
A. | packet filtering firewall |
B. | dual homed gateway firewall |
C. | screen host firewall |
D. | dual host firewall |
Answer» A. packet filtering firewall | |
Explanation: a firewall can be a pc, a midrange, a mainframe, a unix workstation, a router, or combination of these. depending on the requirements, a firewall can consist of one or more of the following functional components: packet-filtering router |
311. |
A proxy firewall filters at |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» D. application layer | |
Explanation: the application firewall is typically built to control all network traffic on any layer up to the application layer. it is able to control applications or services specifically, unlike a stateful network |
312. |
A packet filter firewall filters at |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» C. network layer or transport layer | |
Explanation: in computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. |
313. |
What is one advantage of setting up a DMZ with two firewalls? |
A. | you can control where traffic goes in three networks |
B. | you can do stateful packet filtering |
C. | you can do load balancing |
D. | improved network performance |
Answer» C. you can do load balancing | |
Explanation: dmz stands for de-militarized zone. in a topology with a single firewall serving both internal and external users (lan and wan), it acts as a shared resource for these two zones. so load balancing can be done by adding another firewall. |
314. |
A firewall needs to be so that it can grow proportionally with the network that it protects. |
A. | robust |
B. | expansive |
C. | fast |
D. | scalable |
Answer» B. expansive | |
Explanation: the firewall has to be expansive because a network is expected to grow with time and if the firewall is unable to grow with it, the firewall won’t be able to handle the growing network traffic flow and will hence fail. |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.