Multiple choice questions about network security implementation have the answer P5
Network security is extremely necessary for anyone. In this article, join the Network Administrator to learn about this topic through multiple-choice questions below.
- Question 1. Algorithm implemented in IP security mechanism (IP Sec) in Windows is used
- MD5 and SHA1
- Kerberos and DES
- DES or 3DES (triple DES)
- All is wrong
-
- Question 2. Where is Windows Registry stored in Windows 98?
- Saved in Classes.dat file in Windows folder
- Saved in the "Windows System32 Config folder
- In 2 files: user.dat and system.dat in the Windows folder
- All is wrong
-
- Question 3. To make configuration changes on the registry, do the following
- Type regedit in the Run window
- Press Ctrl + Esc + r and press Enter
- A and B are correct
- All is wrong
-
- Question 4. The process of cracking a simple software product involves several steps
- 3
- 4
- 5
- 3 or 4
-
- Question 5. The two protocols used in IPSec (IPSec Protocol) include
- IP Authentication Header, TCP / IP
- TCP / IP, IP Encapsulating Security Payload
- IP Authentication Header, IP Encapsulating Security Payload
- All right
-
- Question 6. The basic differences between X.509 and Kerberos services are
- Based on symmetric encryption
- Used in mail service
- Multi-dimensional authentication
- All right
-
- Question 7. Web Server attack steps in the following order:
- Exploration, scanning, gaining access, maintaining access, removing traces
- Scan, explore, gain access, maintain access, remove traces
- Exploration, scan, maintain access, access rights, remove traces
- Gain access, maintain access, scan, probe
-
- Question 8. This phenomenon is caused by any kind of dangerous program: Losing some files, defragmenting the drive, causing harm on special days and months .
- Virus, Zombie
- Worm, Virus
- Logicbomb, Virus
- Trapdoors, Trojan
-
- Question 9. To evaluate the strength of the IDS system, the following factors are used:
- Starting, the way it is done, the expression it recognizes
- Start, monitor location, pairing or integration features
- The way it is performed, the expression it recognizes, the characteristics of the connection or integration
- All right
-
- Question 10. The two main mechanisms of IDS Trigger system to detect when an intruder attacks the network are:
- Detection of abnormal expression, incorrect usage detection
- Detecting duplication, abnormal detection
- Detect changes, detect abnormal use
- All right
-
5 ★ | 1 Vote
You should read it
- Multiple choice questions about network security implementation have the answer P7
- Multiple choice questions on network security deployment have the answer P6
- Multiple choice questions about network security implementation have P2 answers
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
- You have confidence in your knowledge of Network Administration P7
- Are you confident with your Network Administration knowledge P6
Maybe you are interested
Learn about Phind: The app that answers questions about coding with the power of AI
24 basic level C++ programming interview questions and answers
20 intermediate level C++ programming interview questions and answers
15 expert-level C++ programming interview questions and answers
Answering questions about the reasons for using a keyboard wrist rest
How to add branches or nested questions in Google Forms