Multiple choice questions about network security implementation have the answer P5

  1. Question 1. Algorithm implemented in IP security mechanism (IP Sec) in Windows is used
    1. MD5 and SHA1
    2. Kerberos and DES
    3. DES or 3DES (triple DES)
    4. All is wrong
  2. Question 2. Where is Windows Registry stored in Windows 98?
    1. Saved in Classes.dat file in Windows folder
    2. Saved in the "Windows System32 Config folder
    3. In 2 files: user.dat and system.dat in the Windows folder
    4. All is wrong
  3. Question 3. To make configuration changes on the registry, do the following
    1. Type regedit in the Run window
    2. Press Ctrl + Esc + r and press Enter
    3. A and B are correct
    4. All is wrong
  4. Question 4. The process of cracking a simple software product involves several steps
    1. 3
    2. 4
    3. 5
    4. 3 or 4
  5. Question 5. The two protocols used in IPSec (IPSec Protocol) include
    1. IP Authentication Header, TCP / IP
    2. TCP / IP, IP Encapsulating Security Payload
    3. IP Authentication Header, IP Encapsulating Security Payload
    4. All right
  6. Question 6. The basic differences between X.509 and Kerberos services are
    1. Based on symmetric encryption
    2. Used in mail service
    3. Multi-dimensional authentication
    4. All right
  7. Question 7. Web Server attack steps in the following order:
    1. Exploration, scanning, gaining access, maintaining access, removing traces
    2. Scan, explore, gain access, maintain access, remove traces
    3. Exploration, scan, maintain access, access rights, remove traces
    4. Gain access, maintain access, scan, probe
  8. Question 8. This phenomenon is caused by any kind of dangerous program: Losing some files, defragmenting the drive, causing harm on special days and months .
    1. Virus, Zombie
    2. Worm, Virus
    3. Logicbomb, Virus
    4. Trapdoors, Trojan
  9. Question 9. To evaluate the strength of the IDS system, the following factors are used:
    1. Starting, the way it is done, the expression it recognizes
    2. Start, monitor location, pairing or integration features
    3. The way it is performed, the expression it recognizes, the characteristics of the connection or integration
    4. All right
  10. Question 10. The two main mechanisms of IDS Trigger system to detect when an intruder attacks the network are:
    1. Detection of abnormal expression, incorrect usage detection
    2. Detecting duplication, abnormal detection
    3. Detect changes, detect abnormal use
    4. All right
5 ★ | 1 Vote

May be interested

  • You have confidence in your knowledge of Network Administration P7Photo of You have confidence in your knowledge of Network Administration P7
    multiple choice questions about network administration give you useful knowledge about this topic. invite readers to consult and test their knowledge.
  • Test basic understanding of computersPhoto of Test basic understanding of computers
    in the age of technology 4.0 today, computers are a great tool for people in work and entertainment. you can sit next to the computer for hours to work. however, are you sure you master the basics of computers? let's try with the multiple choice questions below.
  • Test your understanding of P2 hackPhoto of Test your understanding of P2 hack
    the network administrator's quiz below will help you gain the knowledge to start your career as a hacker. the question set has only 2 answers, you just need to answer right or wrong.
  • JAVA P8 test quizPhoto of JAVA P8 test quiz
    if you are interested in learning about the java programming language, the following quiz of network administrator will provide you with a lot of useful knowledge for your learning.
  • Multiple choice questions on network security deployment have the answer P6Photo of Multiple choice questions on network security deployment have the answer P6
    in the current technology era, it is extremely necessary for anyone to be secure when accessing the network. in this test, network administrator will provide you with useful knowledge to ensure network security. invite your reference.
  • You have confidence in your Network Administration knowledge P8Photo of You have confidence in your Network Administration knowledge P8
    you love network management and want to learn about this industry. the test below will give you interesting knowledge so that you can first get familiar with this industry.