Multiple choice questions about network security implementation have P2 answers
- Question 1. Required to ensure symmetric encryption is used
- There is good encryption algorithm, there is a secret key known by recipient / sender and secret channel for key distribution
- There is an appropriate transmission channel and a secret key known by the sender / sender
- There is a good encryption algorithm and a secret key known by the sender / sender
- All right
-
- Question 2. Which of the following algorithms is symmetric encryption algorithm?
- Triple-DES, RC4, RC5, Blowfish
- Triple-DES, RC4, RC5, IDEA
- RC4, RC5, IDEA, Blowfish
- IDEA, Blowfish, AES, Elliptic Cure
-
- Question 3. Which of the following statements is true?
- Most symmetric encryption algorithms are based on Feistel algorithm structure
- When attacking the message, the decoding time is proportional to the key size
- Most block cipher algorithms are symmetrical
- All right
-
- Question 4. SSL security mechanism works on the floor
- Network, Transport
- Network, Session
- Application, Session
- All is wrong
-
- Question 5. Keberos is a trust service
- Authentication on the Web
- X.509 authentication
- Authentication on Server
- Authentication on workstations together
-
- Question 6. PGP is a protocol for authentication
- Permissions posted to the Windows server system
- Security for email
- Perform message encryption according to RSA algorithm
- Address of the workstation when connecting to the Internet
-
- Question 7. Security tool / mechanism for wireless network is
- SSL
- TSL
- PGP protocol
- WEP
-
- Question 8. Which floor and OSL SSL and SSL protocols work
- Network
- Sesion
- Transport
- From Trasport floor upwards
-
- Question 9. SSL protocol used for
- Provides security for data circulated on HTTP services
- Provide security for email
- Provide security for the Web
- Provides security for user authentication on operating systems on Windows Platform
-
- Question 10. The following forms, which are viruses
- sealth, memory residence, macro, polymorphism, file
- stealth, memory resident, macro, bisexual, file
- parasitic virus, file, boot secctor, stealth, memory resident, macro
- parasitic virus, memory resident, boot secctor, Stealth, polymorphism, macro
-
- Question 11. Macro virus can only attack files
- MS.Exel, MX Word, MS.Outlook Mail
- MS.Exel, MX Word, MS.Power Point
- MS.Exel, MX Word, Yahoo Mail
- All file types
-
- Question 12. Which Internet security protocols such as SSL, TLS and SSH work on the OSI model?
- Network layer
- Transport floor
- From the Transport floor up to the 7th floor
- Session level
-
- Question 13. The popular attack technique on the Web is
- Possession of the session
- Buffer overflow
- Denial of service (DoS)
- Insert SQL query
-
- Question 14. The security holes on the system are caused by
- Service provided
- The operating system itself
- Man-made
- All right
-
- Question 15. Indicate which sentence is correct in the following sentences
- All firewalls have the same attribute that allows to distinguish or treat the ability to refuse or access based on the source address
- The main function of the Firewall is to control the flow of information between the protected network and the Internet through established access policies.
- Firewall systems often include both hardware and software
- All right
-
4.5 ★ | 2 Vote
You should read it
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5