Multiple choice questions about network security implementation have P2 answers
- Question 1. Required to ensure symmetric encryption is used
- There is good encryption algorithm, there is a secret key known by recipient / sender and secret channel for key distribution
- There is an appropriate transmission channel and a secret key known by the sender / sender
- There is a good encryption algorithm and a secret key known by the sender / sender
- All right
-
- Question 2. Which of the following algorithms is symmetric encryption algorithm?
- Triple-DES, RC4, RC5, Blowfish
- Triple-DES, RC4, RC5, IDEA
- RC4, RC5, IDEA, Blowfish
- IDEA, Blowfish, AES, Elliptic Cure
-
- Question 3. Which of the following statements is true?
- Most symmetric encryption algorithms are based on Feistel algorithm structure
- When attacking the message, the decoding time is proportional to the key size
- Most block cipher algorithms are symmetrical
- All right
-
- Question 4. SSL security mechanism works on the floor
- Network, Transport
- Network, Session
- Application, Session
- All is wrong
-
- Question 5. Keberos is a trust service
- Authentication on the Web
- X.509 authentication
- Authentication on Server
- Authentication on workstations together
-
- Question 6. PGP is a protocol for authentication
- Permissions posted to the Windows server system
- Security for email
- Perform message encryption according to RSA algorithm
- Address of the workstation when connecting to the Internet
-
- Question 7. Security tool / mechanism for wireless network is
- SSL
- TSL
- PGP protocol
- WEP
-
- Question 8. Which floor and OSL SSL and SSL protocols work
- Network
- Sesion
- Transport
- From Trasport floor upwards
-
- Question 9. SSL protocol used for
- Provides security for data circulated on HTTP services
- Provide security for email
- Provide security for the Web
- Provides security for user authentication on operating systems on Windows Platform
-
- Question 10. The following forms, which are viruses
- sealth, memory residence, macro, polymorphism, file
- stealth, memory resident, macro, bisexual, file
- parasitic virus, file, boot secctor, stealth, memory resident, macro
- parasitic virus, memory resident, boot secctor, Stealth, polymorphism, macro
-
- Question 11. Macro virus can only attack files
- MS.Exel, MX Word, MS.Outlook Mail
- MS.Exel, MX Word, MS.Power Point
- MS.Exel, MX Word, Yahoo Mail
- All file types
-
- Question 12. Which Internet security protocols such as SSL, TLS and SSH work on the OSI model?
- Network layer
- Transport floor
- From the Transport floor up to the 7th floor
- Session level
-
- Question 13. The popular attack technique on the Web is
- Possession of the session
- Buffer overflow
- Denial of service (DoS)
- Insert SQL query
-
- Question 14. The security holes on the system are caused by
- Service provided
- The operating system itself
- Man-made
- All right
-
- Question 15. Indicate which sentence is correct in the following sentences
- All firewalls have the same attribute that allows to distinguish or treat the ability to refuse or access based on the source address
- The main function of the Firewall is to control the flow of information between the protected network and the Internet through established access policies.
- Firewall systems often include both hardware and software
- All right
-
4.5 ★ | 2 Vote
You should read it
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
May be interested
- Multiple choice questions on network security implementation have P3 answerswhat do you know about network security deployment? if you are a person who is studying and working on information technology, you probably can't ignore the very interesting knowledge that the network administrator wants to share below.
- What do you know about P17 software technologyin the quiz below, the network administrator will send you the topic of software technology. for those who are working on the software, certainly will not ignore our series of tests.
- Test of database security P10database is a data collection organized in a structured way related to each other and stored in a computer. the database is designed and built to allow users to store data, retrieve information or update data. here, please read more about this topic through our quiz below.
- Multiple choice questions on network security deployment have the answer P4please read our knowledge and interesting multiple choice questions about our network security deployment below. the question set will have 10 sentences to try.
- What do you know about P18 software technologyplease read the test questions on software technology that network administrator has compiled and edited below. hope with these questions will give you more useful knowledge.
- What test you know about operating system P6the operating system is an important and necessary software for any mobile device or laptop. to help readers find out more about this topic, the quiz below network administrators have compiled and sent you.