Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
A. SHA
B. Kerberos V5
C. Both SHA and MD5
D. MD5
Ans : Both SHA and MD5
Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
A. ESP transport mode
B. AH transport mode
C. AH tunnel mode
D. ESP tunnel mode
Ans : ESP transport mode
Buy Now
boAt Airdopes 413ANC True Wireless in Ear Earbuds with Active Noise Cancellation, 2 Mics ENx Tech, Signature Sound, Touch Gesture, 20 Hours Playback, ASAP Charge & Ambient Mode(Carbon Black)
Q.3 ______ provides authentication at the IP level.
A. ESP
B. AH
C. SSL
D. PGP
Ans : AH
Q.4 Which two types of IPsec can be used to secure communications between two LANs?
A. ESP tunnel mode
B. AH tunnel mode
C. ESP transport mode
D. Both AH tunnel mode and ESP tunnel mode
Ans : Both AH tunnel mode and ESP tunnel mode
Q.5 IP Security operates in which layer of the OSI model?
A. Transport
B. Network
C. Physical
D. Application
Ans : Network
Q.6 IPsec defines two protocols: _______ and ________.
A. PGP; ESP
B. AH; SSL
A. PGP; SSL
B. AH; ESP
Ans : AH; ESP
Q.7 In computer security _______ means that computer system assets can be modified only by authorized parities.
A. integrity
B. confidentiality
C. authenticity
D. availability
Ans : integrity
Q.8 ESP does not provide ________.
A. data integrity
B. source authentication
C. error control
D. privacy
Ans : error control
Q.9 Which of the following organizations is primarily concerned with military encryption systems?
A. NIST
B. NSA
C. ITU
D. IEEE
Ans : NSA
Q.10 In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.
A. integrity
B. confidentiality
C. authenticity
D. availability
Ans : confidentiality