Multiple choice questions about network security implementation have the answer P5
- Question 1. Algorithm implemented in IP security mechanism (IP Sec) in Windows is used
- MD5 and SHA1
- Kerberos and DES
- DES or 3DES (triple DES)
- All is wrong
-
- Question 2. Where is Windows Registry stored in Windows 98?
- Saved in Classes.dat file in Windows folder
- Saved in the "Windows System32 Config folder
- In 2 files: user.dat and system.dat in the Windows folder
- All is wrong
-
- Question 3. To make configuration changes on the registry, do the following
- Type regedit in the Run window
- Press Ctrl + Esc + r and press Enter
- A and B are correct
- All is wrong
-
- Question 4. The process of cracking a simple software product involves several steps
- 3
- 4
- 5
- 3 or 4
-
- Question 5. The two protocols used in IPSec (IPSec Protocol) include
- IP Authentication Header, TCP / IP
- TCP / IP, IP Encapsulating Security Payload
- IP Authentication Header, IP Encapsulating Security Payload
- All right
-
- Question 6. The basic differences between X.509 and Kerberos services are
- Based on symmetric encryption
- Used in mail service
- Multi-dimensional authentication
- All right
-
- Question 7. Web Server attack steps in the following order:
- Exploration, scanning, gaining access, maintaining access, removing traces
- Scan, explore, gain access, maintain access, remove traces
- Exploration, scan, maintain access, access rights, remove traces
- Gain access, maintain access, scan, probe
-
- Question 8. This phenomenon is caused by any kind of dangerous program: Losing some files, defragmenting the drive, causing harm on special days and months .
- Virus, Zombie
- Worm, Virus
- Logicbomb, Virus
- Trapdoors, Trojan
-
- Question 9. To evaluate the strength of the IDS system, the following factors are used:
- Starting, the way it is done, the expression it recognizes
- Start, monitor location, pairing or integration features
- The way it is performed, the expression it recognizes, the characteristics of the connection or integration
- All right
-
- Question 10. The two main mechanisms of IDS Trigger system to detect when an intruder attacks the network are:
- Detection of abnormal expression, incorrect usage detection
- Detecting duplication, abnormal detection
- Detect changes, detect abnormal use
- All right
-
5 ★ | 1 Vote
You should read it
- Multiple choice questions about network security implementation have P2 answers
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5