Application Layer Computer Networks Computer Science Engineering IPSecurity OSI Model

IPSecurity Interview/Exam Question-Answer

By smart_answer13

Published on:


Q.1 In tunnel mode, IPSec protects the ______.

       A. IP header

       B. Entire IP packet

       C. IP payload

       D. IP trailer

Ans : Entire IP packet

Q.2 SQL Injection is one of the techniques used get data by hackers.

       A. True

       B. False

Ans : True

Q.3 IPSec is designed to provide security at the _________.

       A. Transport layer

       B. Application layer

       A. Session layer

       B. Network layer

Ans : Network layer

Q.4 Integrity is the attributes of Security Testing?

       A. True

       B. False

Ans : False

Q.5 WPA2 is used for security in _______.

       A. Bluetooth

       B. Email

       C. Ethernet

       D. Wi-Fi

Ans : Wi-Fi

Q.6 XSS or cross-site scripting is a type of vulnerability?

       A. True

       B. False

Ans : True

Q.7 XSS or cross-site scripting is a type of vulnerability

       A. Authentication Header (AH)

       B. Internet key Exchange (IKE)

       C. Encapsulating Security Payload (ESP)

       D. All of the above

Ans : All of the above

Q.8 What are the attributes of Security Testing?

       A. Authentication

       B. Authorization

       C. Confidentiality

       D. All of the above

Ans : All of the above

Q.9 Number of attributes used in Security Testing?

       A. 7

       B. 4

       C. 3

Ans : 7

Q.10 Extensible authentication protocol is authentication framework frequently used in ______.

       A. Wired personal area network

       B. Wired local area network

       C. Wireless networks

       D. Wired metropolitan area network

Ans : Wireless networks

Q.11 An attempt to make a computer resource unavailable to its intended users is called ______.

       A. Denial-of-service attack

       B. Virus attack

       C. Worms attack

       D. Botnet process

Ans : Denial-of-service attack

Q.12 which testing helps in identifying vulnerabilities in a system.

       A. Penetration Testing

       B. Smoke Testing

       C. Unit Testing

       D. All of the above

Ans : Penetration Testing




Related Post

Operating System Processes MCQ (Interview-Exam) Question-Answer

Q.1 To access the services of operating system, the interface is provided by the ___________.        A. API        B. Assembly instructions     ...

Operating System MCQ Question-Answer Part 4

Q.1 What is an operating system?        A. System service provider to the application programs        B. Interface between the hardware and application programs ...

AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?        A. SHA        B. Kerberos ...

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers        B. String of characters        C. ...

Leave a Comment