Q.1 In tunnel mode, IPSec protects the ______.
A. IP header
B. Entire IP packet
C. IP payload
D. IP trailer
Ans : Entire IP packet
Q.2 SQL Injection is one of the techniques used get data by hackers.
A. True
B. False
Ans : True
Q.3 IPSec is designed to provide security at the _________.
A. Transport layer
B. Application layer
A. Session layer
B. Network layer
Ans : Network layer
Q.4 Integrity is the attributes of Security Testing?
A. True
B. False
Ans : False
Q.5 WPA2 is used for security in _______.
A. Bluetooth
B. Email
C. Ethernet
D. Wi-Fi
Ans : Wi-Fi
Q.6 XSS or cross-site scripting is a type of vulnerability?
A. True
B. False
Ans : True
Q.7 XSS or cross-site scripting is a type of vulnerability
A. Authentication Header (AH)
B. Internet key Exchange (IKE)
C. Encapsulating Security Payload (ESP)
D. All of the above
Ans : All of the above
Q.8 What are the attributes of Security Testing?
A. Authentication
B. Authorization
C. Confidentiality
D. All of the above
Ans : All of the above
Q.9 Number of attributes used in Security Testing?
A. 7
B. 4
C. 3
Ans : 7
Q.10 Extensible authentication protocol is authentication framework frequently used in ______.
A. Wired personal area network
B. Wired local area network
C. Wireless networks
D. Wired metropolitan area network
Ans : Wireless networks
Q.11 An attempt to make a computer resource unavailable to its intended users is called ______.
A. Denial-of-service attack
B. Virus attack
C. Worms attack
D. Botnet process
Ans : Denial-of-service attack
Q.12 which testing helps in identifying vulnerabilities in a system.
A. Penetration Testing
B. Smoke Testing
C. Unit Testing
D. All of the above
Ans : Penetration Testing