Multiple choice questions about network security implementation have P2 answers

Security of information and network security is essential in today's 4.0 technology era. To help readers have more useful knowledge on this topic, the quiz below Network administrators will send you interesting questions.
  1. Question 1. Required to ensure symmetric encryption is used
    1. There is good encryption algorithm, there is a secret key known by recipient / sender and secret channel for key distribution
    2. There is an appropriate transmission channel and a secret key known by the sender / sender
    3. There is a good encryption algorithm and a secret key known by the sender / sender
    4. All right
  2. Question 2. Which of the following algorithms is symmetric encryption algorithm?
    1. Triple-DES, RC4, RC5, Blowfish
    2. Triple-DES, RC4, RC5, IDEA
    3. RC4, RC5, IDEA, Blowfish
    4. IDEA, Blowfish, AES, Elliptic Cure
  3. Question 3. Which of the following statements is true?
    1. Most symmetric encryption algorithms are based on Feistel algorithm structure
    2. When attacking the message, the decoding time is proportional to the key size
    3. Most block cipher algorithms are symmetrical
    4. All right
  4. Question 4. SSL security mechanism works on the floor
    1. Network, Transport
    2. Network, Session
    3. Application, Session
    4. All is wrong
  5. Question 5. Keberos is a trust service
    1. Authentication on the Web
    2. X.509 authentication
    3. Authentication on Server
    4. Authentication on workstations together
  6. Question 6. PGP is a protocol for authentication
    1. Permissions posted to the Windows server system
    2. Security for email
    3. Perform message encryption according to RSA algorithm
    4. Address of the workstation when connecting to the Internet
  7. Question 7. Security tool / mechanism for wireless network is
    1. SSL
    2. TSL
    3. PGP protocol
    4. WEP
  8. Question 8. Which floor and OSL SSL and SSL protocols work
    1. Network
    2. Sesion
    3. Transport
    4. From Trasport floor upwards
  9. Question 9. SSL protocol used for
    1. Provides security for data circulated on HTTP services
    2. Provide security for email
    3. Provide security for the Web
    4. Provides security for user authentication on operating systems on Windows Platform
  10. Question 10. The following forms, which are viruses
    1. sealth, memory residence, macro, polymorphism, file
    2. stealth, memory resident, macro, bisexual, file
    3. parasitic virus, file, boot secctor, stealth, memory resident, macro
    4. parasitic virus, memory resident, boot secctor, Stealth, polymorphism, macro
  11. Question 11. Macro virus can only attack files
    1. MS.Exel, MX Word, MS.Outlook Mail
    2. MS.Exel, MX Word, MS.Power Point
    3. MS.Exel, MX Word, Yahoo Mail
    4. All file types
  12. Question 12. Which Internet security protocols such as SSL, TLS and SSH work on the OSI model?
    1. Network layer
    2. Transport floor
    3. From the Transport floor up to the 7th floor
    4. Session level
  13. Question 13. The popular attack technique on the Web is
    1. Possession of the session
    2. Buffer overflow
    3. Denial of service (DoS)
    4. Insert SQL query
  14. Question 14. The security holes on the system are caused by
    1. Service provided
    2. The operating system itself
    3. Man-made
    4. All right
  15. Question 15. Indicate which sentence is correct in the following sentences
    1. All firewalls have the same attribute that allows to distinguish or treat the ability to refuse or access based on the source address
    2. The main function of the Firewall is to control the flow of information between the protected network and the Internet through established access policies.
    3. Firewall systems often include both hardware and software
    4. All right
4.5 ★ | 2 Vote