Multiple choice questions about network security implementation have P2 answers
Security of information and network security is essential in today's 4.0 technology era. To help readers have more useful knowledge on this topic, the quiz below Network administrators will send you interesting questions.
- Question 1. Required to ensure symmetric encryption is used
- There is good encryption algorithm, there is a secret key known by recipient / sender and secret channel for key distribution
- There is an appropriate transmission channel and a secret key known by the sender / sender
- There is a good encryption algorithm and a secret key known by the sender / sender
- All right
-
- Question 2. Which of the following algorithms is symmetric encryption algorithm?
- Triple-DES, RC4, RC5, Blowfish
- Triple-DES, RC4, RC5, IDEA
- RC4, RC5, IDEA, Blowfish
- IDEA, Blowfish, AES, Elliptic Cure
-
- Question 3. Which of the following statements is true?
- Most symmetric encryption algorithms are based on Feistel algorithm structure
- When attacking the message, the decoding time is proportional to the key size
- Most block cipher algorithms are symmetrical
- All right
-
- Question 4. SSL security mechanism works on the floor
- Network, Transport
- Network, Session
- Application, Session
- All is wrong
-
- Question 5. Keberos is a trust service
- Authentication on the Web
- X.509 authentication
- Authentication on Server
- Authentication on workstations together
-
- Question 6. PGP is a protocol for authentication
- Permissions posted to the Windows server system
- Security for email
- Perform message encryption according to RSA algorithm
- Address of the workstation when connecting to the Internet
-
- Question 7. Security tool / mechanism for wireless network is
- SSL
- TSL
- PGP protocol
- WEP
-
- Question 8. Which floor and OSL SSL and SSL protocols work
- Network
- Sesion
- Transport
- From Trasport floor upwards
-
- Question 9. SSL protocol used for
- Provides security for data circulated on HTTP services
- Provide security for email
- Provide security for the Web
- Provides security for user authentication on operating systems on Windows Platform
-
- Question 10. The following forms, which are viruses
- sealth, memory residence, macro, polymorphism, file
- stealth, memory resident, macro, bisexual, file
- parasitic virus, file, boot secctor, stealth, memory resident, macro
- parasitic virus, memory resident, boot secctor, Stealth, polymorphism, macro
-
- Question 11. Macro virus can only attack files
- MS.Exel, MX Word, MS.Outlook Mail
- MS.Exel, MX Word, MS.Power Point
- MS.Exel, MX Word, Yahoo Mail
- All file types
-
- Question 12. Which Internet security protocols such as SSL, TLS and SSH work on the OSI model?
- Network layer
- Transport floor
- From the Transport floor up to the 7th floor
- Session level
-
- Question 13. The popular attack technique on the Web is
- Possession of the session
- Buffer overflow
- Denial of service (DoS)
- Insert SQL query
-
- Question 14. The security holes on the system are caused by
- Service provided
- The operating system itself
- Man-made
- All right
-
- Question 15. Indicate which sentence is correct in the following sentences
- All firewalls have the same attribute that allows to distinguish or treat the ability to refuse or access based on the source address
- The main function of the Firewall is to control the flow of information between the protected network and the Internet through established access policies.
- Firewall systems often include both hardware and software
- All right
-
4.5 ★ | 2 Vote
You should read it
- Multiple choice questions about network security implementation have the answer P7
- Multiple choice questions on network security deployment have the answer P6
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions about network security implementation have the answer P5
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
- You have confidence in your knowledge of Network Administration P7
- Are you confident with your Network Administration knowledge P6
Maybe you are interested
Learn about Phind: The app that answers questions about coding with the power of AI
24 basic level C++ programming interview questions and answers
20 intermediate level C++ programming interview questions and answers
15 expert-level C++ programming interview questions and answers
Answering questions about the reasons for using a keyboard wrist rest
How to add branches or nested questions in Google Forms