Sample questions

Q1. Spoofing is a type of:

  1. Vulnerability
  2. Masquerading
  3. Protocol
  4. Layer in a TCP/IP model

Q2. An attack is a:

  1. Threat
  2. Vulnerability
  3. Technique
  4. Protocol

Q3. Transport layer security and secure sockets layer are not:

  1. Protocols
  2. Cryptographic algorithms
  3. Vulnerabilities
  4. Use encryption

Q4. Replay attacks are used to:

  1. Gain unauthorized access to the application systems
  2. Resolve domain names
  3. Break cryptographic keys
  4. Setup secure connections

Q5. Internet Protocol (IP) operates in:

  1. Physical layer
  2. Network layer
  3. Application layer
  4. Communication layer

Q6. Border Gateway Protocol is a:

  1. Physical layer protocol
  2. Address Resolution Protocol
  3. Routing Protocol
  4. LAN technology

Q7. Multi Protocol Label Switching (MPLS) is often referred to as:

  1. Application Layer Protocol
  2. Layer 2.5 protocol
  3. Layer 3 protocol
  4. Layer 3.5 protocol

Q8. IPsec is a set of protocols that are used to secure Internet communications. Which of the following is not a key function of the protocol?

  1. Authentication
  2. Encryption
  3. Key exchange
  4. Key modification
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.133.233