Multiple choice questions on network security implementation have P3 answers

What do you know about network security deployment? If you are a person who is studying and working on information technology, you probably can't ignore the very interesting knowledge that the Network Administrator wants to share below.
  1. Question 1. Which of the following Firewall types allows operating in the session layer of the OSI model
    1. Packet filtering firewall
    2. Circuit level firewall
    3. Application level firewall
    4. Stateful multilayer inspection firewall
  2. Question 2. Which WAN protocols can be configured on an asynchronous serial connection
    1. PPP
    2. ATM
    3. HDLC
    4. SDLC
    ATM is also a correct answer
  3. Question 3. When hiring a VPN solution, what kind of attacks do you need to consider?
    1. Denial of Service (DoS) attacks, Internet Viruses .
    2. Distributed Denial of Service (DDoS) attacks
    3. Data confidentiality, IP Spoofing
    4. Network mapping, Internet Viruses
  4. Question 4. The following statements are true
    1. Fire Wall is a defensive belt for computers or systems before attacks
    2. Is a blocking point of the control and monitoring process
    3. A software or armature capable of preventing attacks from inside and outside into the system
    4. Is a solution that helps the system detect and prevent unauthorized access
  5. Question 5. Secure email is to ensure
    1. Confidentiality, Confidence, Integrity (integrity), Initial non-repudiation (origin)
    2. Confirmation, Integrity (integrity) message
    3. Non-repudiation of origin, sustainability, stability when sending and receiving
    4. All right
  6. Question 6. The protocols to secure email are
    1. GPG, S / MINE
    2. SHA-1, S / MINE
    3. CAST-128 / IDEA / 3DES
    4. Keboros, X.509
  7. Question 7. The digital signature uses the following algorithm
    1. RSA, MD5
    2. RSA, MD5, Keboros
    3. MD5, SHA, RSA
    4. Do not use any of the above algorithms
  8. Question 8. Electronic signature is
    1. A string that has been encoded in the hashing algorithm and attached to the original text before being sent
    2. A short piece of data attached to the original document to authenticate the author of the document and help the recipient check the integrity of the original text
    3. a and b are both correct
    4. All are wrong
  9. Question 9. Encryption steps of electronic signature
    1. Use a hashing algorithm to change the message to be sent, Use the sender's private key to encrypt the digest message obtained in the previous step, then include the digital signature in the original message.
    2. Using a hashing algorithm to change the message to be sent, use the sender's private key to encrypt the digest message obtained in the previous step, then include the digital signature in the original message and compress the sent data.
    3. Only use the hashing algorithm to change the message to be sent and use the sender's private key to encrypt the digest message obtained in the previous step.
    4. All right
  10. Question 10. The electronic signature check
    1. 1. Using the sender's public key (this key is informed to everyone) to decrypt the digital signature of the message,

      2. Use algorithm (MD5 or SHA) hash message attached, Compare the results obtained in steps 1 and 2.

      3. If overlapping, we conclude this message has not been changed during transmission and this message is from the sender.
    2. 1. Using the sender's public key (this key is informed to everyone) to decrypt the digital signature of the message,

      2. Use algorithm (MD5 or SHA) hash message attached, Compare the results obtained in steps 1 and 2.

      3. Remove the data and send it
    3. No answer right
4 ★ | 1 Vote