- MD5 and SHA1
- Kerberos and DES
- DES or 3DES (triple DES)
- All is wrong
Multiple choice questions about network security implementation have the answer P5
Network security is extremely necessary for anyone. In this article, join the Network Administrator to learn about this topic through multiple-choice questions below.
- Question 1. Algorithm implemented in IP security mechanism (IP Sec) in Windows is used
- Question 2. Where is Windows Registry stored in Windows 98?
- Saved in Classes.dat file in Windows folder
- Saved in the "Windows System32 Config folder
- In 2 files: user.dat and system.dat in the Windows folder
- All is wrong
-
- Question 3. To make configuration changes on the registry, do the following
- Type regedit in the Run window
- Press Ctrl + Esc + r and press Enter
- A and B are correct
- All is wrong
-
- Question 4. The process of cracking a simple software product involves several steps
- 3
- 4
- 5
- 3 or 4
-
- Question 5. The two protocols used in IPSec (IPSec Protocol) include
- IP Authentication Header, TCP / IP
- TCP / IP, IP Encapsulating Security Payload
- IP Authentication Header, IP Encapsulating Security Payload
- All right
-
- Question 6. The basic differences between X.509 and Kerberos services are
- Based on symmetric encryption
- Used in mail service
- Multi-dimensional authentication
- All right
-
- Question 7. Web Server attack steps in the following order:
- Exploration, scanning, gaining access, maintaining access, removing traces
- Scan, explore, gain access, maintain access, remove traces
- Exploration, scan, maintain access, access rights, remove traces
- Gain access, maintain access, scan, probe
-
- Question 8. This phenomenon is caused by any kind of dangerous program: Losing some files, defragmenting the drive, causing harm on special days and months .
- Virus, Zombie
- Worm, Virus
- Logicbomb, Virus
- Trapdoors, Trojan
-
- Question 9. To evaluate the strength of the IDS system, the following factors are used:
- Starting, the way it is done, the expression it recognizes
- Start, monitor location, pairing or integration features
- The way it is performed, the expression it recognizes, the characteristics of the connection or integration
- All right
-
- Question 10. The two main mechanisms of IDS Trigger system to detect when an intruder attacks the network are:
- Detection of abnormal expression, incorrect usage detection
- Detecting duplication, abnormal detection
- Detect changes, detect abnormal use
- All right
-
Update 24 May 2019
Network safetytestinggood questionsinformation securitynetwork administrationhow to ensure network safety
You should read it
- Multiple choice questions about network security implementation have the answer P7
- Multiple choice questions on network security deployment have the answer P6
- Multiple choice questions about network security implementation have P2 answers
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network safety deployment have the answer P1
- Multiple choice questions on network security deployment have the answer P4
- Multiple choice questions about network security deployment have answers
- You have confidence in your knowledge of Network Administration P5
- Are you confident with your Network Administration knowledge P4
- You have confidence in your network administration knowledge P9
- You have confidence in your knowledge of Network Administration P7
- Are you confident with your Network Administration knowledge P6
Maybe you are interested
Microsoft will add a cloud-based Xbox Game Pass option How to use Xbox Game Pass for free 6 reasons why users stick with Xbox Game Pass 5 disadvantages of Xbox Game Pass to keep in mind Among Us will support Xbox in 2021, coming with a new map of Airship 9 monumental peaks in the village gamers are Guinness World Records Gamer's Edition 2019 enrollment