MCQs in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls

MCQs in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls from the book Data Communications and Networking 4th Edition by Behrouz A. Forouzan. Reviewer in Electronics Systems and Technologies (Communications Engineering).

MCQs for Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls

This is the MCQs in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.

Topic Outline

  • IPSecurity  (lPSec)
    • Two Modes
    • Two Security Protocols
    • Security Association
    • Internet Key Exchange (IKE)
    • Virtual Private Network
  • SSL 
    • SSL Services
    • Security Parameters
    • Sessions and Connections
    • Four Protocols
    • Transport Layer Security
  • PGP
  • FIREWALLS
    • Packet-Filter Firewall
    • Proxy Firewall

Begin and Good luck!

Choose the letter of the best answer in each questions.

1. _________ operates in the transport mode or the tunnel mode.

  • A)            IPSec
  • B)            SSL
  • C)            PGP
  • D)            none of the above

2. IKE creates SAs for _____.

  • A)            SSL
  • B)            PGP
  • C)            IPSec
  • D)            VP

3. ______ provides either authentication or encryption, or both, for packets at the IP level.

  • A)            AH
  • B)            ESP
  • C)            PGP
  • D)            SSL

4. One security protocol for the e-mail system is _________.

  • A)            IPSec
  • B)            SSL
  • C)            PGP
  • D)            none of the above

5. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

  • A)            SSL
  • B)            TLS
  • C)            either (a) or (b)
  • D)            both (a) and (b)

6. IKE is a complex protocol based on ______ other protocols.

  • A)            two
  • B)            three
  • C)            four
  • D)            five

7. IPSec defines two protocols: _______ and ________.

  • A)            AH; SSL
  • B)            PGP; ESP
  • C)            AH; ESP
  • D)            all of the above

8. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

  • A)            transport
  • B)            tunnel
  • C)            either (a) or (b)
  • D)            neither (a) nor (b)

9. ______ is the protocol designed to create security associations, both inbound and outbound.

  • A)            SA
  • B)            CA
  • C)            KDC
  • D)            IKE

10. A _______network is used inside an organization.

  • A)            private
  • B)            public
  • C)            semi-private
  • D)            semi-public

11. SSL provides _________.

  • A)             message integrity
  • B)             confidentiality
  • C)             compression
  • D)             all of the above

12. The Internet authorities have reserved addresses for _______.

  • A)             intranets
  • B)             internets
  • C)             extranets
  • D)             none of the above

13. An _________ is a network that allows authorized access from outside users.

  • A)             intranet
  • B)             internet
  • C)             extranet
  • D)             none of the above

14. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

  • A)             IPSec
  • B)             SSL
  • C)             PGP
  • D)             none of the above

15. IKE uses _______.

  • A)             Oakley
  • B)             SKEME
  • C)             ISAKMP
  • D)             all of the above

16. IPSec uses a set of SAs called the ________.

  • A)             SAD
  • B)             SAB
  • C)             SADB
  • D)             none of the above

17. An ________ is a private network that uses the Internet model.

  • A)             intranet
  • B)             internet
  • C)             extranet
  • D)             none of the above

18. ______ is actually an IETF version of _____.

  • A)             TLS; TSS
  • B)             SSL; TLS
  • C)             TLS; SSL
  • D)             SSL; SLT

19. In ______, there is a single path from the fully trusted authority to any certificate.

  • A)             X509
  • B)             PGP
  • C)             KDC
  • D)             none of the above

20. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

  • A)             list of protocols
  • B)             cipher suite
  • C)             list of keys
  • D)             none of the above

21. A ______ provides privacy for LANs that must communicate through the global Internet.

  • A)             VPP
  • B)             VNP
  • C)             VNN
  • D)             VPN

22. _______ uses the idea of certificate trust levels.

  • A)             X509
  • B)             PGP
  • C)             KDC
  • D)             none of the above

23. IPSec in the ______ mode does not protect the IP header.

  • A)             transport
  • B)             tunnel
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

24. ________ provides privacy, integrity, and authentication in e-mail.

  • A)             IPSec
  • B)             SSL
  • C)             PGP
  • D)             none of the above

25. In _____, there can be multiple paths from fully or partially trusted authorities.

  • A)             X509
  • B)             PGP
  • C)             KDC
  • D)             none of the above

26. ______ provides authentication at the IP level.

  • A)             AH
  • B)             ESP
  • C)             PGP
  • D)             SSL

27. In _______, the cryptographic algorithms and secrets are sent with the message.

  • A)             IPSec
  • B)             SSL
  • C)             TLS
  • D)             PGP

28. ______ is designed to provide security and compression services to data generated from the application layer.

  • A)             SSL
  • B)             TLS
  • C)             either (a) or (b)
  • D)             both (a) and (b)

29. _______ provide security at the transport layer.

  • A)             SSL
  • B)             TLS
  • C)             either (a) or (b)
  • D)             both (a) and (b)

30. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

  • A)             transport
  • B)             tunnel
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

31. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

  • A)             transport
  • B)             tunnel
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

32. ______ was invented by Phil Zimmerman.

  • A)             IPSec
  • B)             SSL
  • C)             PGP
  • D)             none of the above

33. A _______ layer security protocol provides end-to-end security services for applications.

  • A)             data link
  • B)             network
  • C)             transport
  • D)             none of the above

34. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

  • A)             secret
  • B)             public
  • C)             either (a) or (b)
  • D)             both (a) and (b)

Check your work.

Complete List of Chapter Quiz in Data Communications and Networking

Download File in PDF


credit: Behrouz A. Forouzan© 2014 www.PinoyBIX.org

Search! Type it and Hit Enter


We educate thousands of students a week in preparation for their licensure examinations. We provide professionals with materials for their lectures and practice exams. To help us go forward with the same spirit, contribution from your side will highly appreciated. Thank you in advance.


Labels:

Post a Comment

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget
Real Time Web Analytics