Multiple choice questions about network security implementation have the answer P5

Network security is extremely necessary for anyone. In this article, join the Network Administrator to learn about this topic through multiple-choice questions below.

  1. Question 1. Algorithm implemented in IP security mechanism (IP Sec) in Windows is used
    1. MD5 and SHA1
    2. Kerberos and DES
    3. DES or 3DES (triple DES)
    4. All is wrong
  2. Question 2. Where is Windows Registry stored in Windows 98?
    1. Saved in Classes.dat file in Windows folder
    2. Saved in the "Windows System32 Config folder
    3. In 2 files: user.dat and system.dat in the Windows folder
    4. All is wrong
  3. Question 3. To make configuration changes on the registry, do the following
    1. Type regedit in the Run window
    2. Press Ctrl + Esc + r and press Enter
    3. A and B are correct
    4. All is wrong
  4. Question 4. The process of cracking a simple software product involves several steps
    1. 3
    2. 4
    3. 5
    4. 3 or 4
  5. Question 5. The two protocols used in IPSec (IPSec Protocol) include
    1. IP Authentication Header, TCP / IP
    2. TCP / IP, IP Encapsulating Security Payload
    3. IP Authentication Header, IP Encapsulating Security Payload
    4. All right
  6. Question 6. The basic differences between X.509 and Kerberos services are
    1. Based on symmetric encryption
    2. Used in mail service
    3. Multi-dimensional authentication
    4. All right
  7. Question 7. Web Server attack steps in the following order:
    1. Exploration, scanning, gaining access, maintaining access, removing traces
    2. Scan, explore, gain access, maintain access, remove traces
    3. Exploration, scan, maintain access, access rights, remove traces
    4. Gain access, maintain access, scan, probe
  8. Question 8. This phenomenon is caused by any kind of dangerous program: Losing some files, defragmenting the drive, causing harm on special days and months .
    1. Virus, Zombie
    2. Worm, Virus
    3. Logicbomb, Virus
    4. Trapdoors, Trojan
  9. Question 9. To evaluate the strength of the IDS system, the following factors are used:
    1. Starting, the way it is done, the expression it recognizes
    2. Start, monitor location, pairing or integration features
    3. The way it is performed, the expression it recognizes, the characteristics of the connection or integration
    4. All right
  10. Question 10. The two main mechanisms of IDS Trigger system to detect when an intruder attacks the network are:
    1. Detection of abnormal expression, incorrect usage detection
    2. Detecting duplication, abnormal detection
    3. Detect changes, detect abnormal use
    4. All right
Update 24 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile