MCQ of Internet Security with answer set-2

1.  The primary goal
of the ………………….. protocol is to provide a private channel between communicating
application, which ensures privacy of data authentication of the partners, and
integrity.
A) SSL
B) ESP
C) TSL
D) PSL
2. The ……………. is used to provide integrity check,
authentication and encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL

3. In ……………………. mode, a common technique in packet-switched
networks consists of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above
4. The …………………………. Is a collection of protocols designed by
Internet Engineering Task Force(IETF) to provide security for a packet at the
Network level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec
 5. At the lower layer
of SSL, a protocol for transferring data using a variety of predefined cipher
and authentication combinations called the ……………….
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
6. While initiating SSL session, the client code recognizes
the SSL request and establishes a connection through TCP Part …………….. to the
SSL code on the server.
A) 420
B) 1032
C) 443
D) 322
7. On the upper layer of SSL, a protocol for initial
authentication and transfer of encryption keys, called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
8. State whether the following statement are true.
i) An application-level gateway is often referred to as a
proxy.
ii) In proxy, a direct connection is established between the
client and destination server.
A) True, False
B) False, True
C) True, True
D) False, False
9. In packet-filtering router, the following information can
be external from the packet header.
i) Source IP address                                        ii)
Destination IP address
iii) TCP/UDP source port                                               iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
10. …………….. mode is used whenever either end of a security
association is gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Answers:
1.      
A) SSL
2.      
B) ESP
3.      
C) Both A and B
4.      
A) IPsec
5.      
C) SSL record protocol
6.      
C) 443
7.      
A) SSL hand… protocol
8.      
A) True, False
9.      
D) All i, ii, iii, iv and v
10.  
A) Tunnel

For other more Multiple Choice Questions (MCQs): Click Here