IPSecurity Interview/Exam Question-Answer

Q.1 In tunnel mode, IPSec protects the ______.

       A. IP header

       B. Entire IP packet

       C. IP payload

       D. IP trailer

Ans : Entire IP packet


Q.2 SQL Injection is one of the techniques used get data by hackers.

       A. True

       B. False

Ans : True


Q.3 IPSec is designed to provide security at the _________.

       A. Transport layer

       B. Application layer

       A. Session layer

       B. Network layer

Ans : Network layer


Q.4 Integrity is the attributes of Security Testing?

       A. True

       B. False

Ans : False


Q.5 WPA2 is used for security in _______.

       A. Bluetooth

       B. Email

       C. Ethernet

       D. Wi-Fi

Ans : Wi-Fi


Q.6 XSS or cross-site scripting is a type of vulnerability?

       A. True

       B. False

Ans : True


Q.7 XSS or cross-site scripting is a type of vulnerability

       A. Authentication Header (AH)

       B. Internet key Exchange (IKE)

       C. Encapsulating Security Payload (ESP)

       D. All of the above

Ans : All of the above


Q.8 What are the attributes of Security Testing?

       A. Authentication

       B. Authorization

       C. Confidentiality

       D. All of the above

Ans : All of the above


Q.9 Number of attributes used in Security Testing?

       A. 7

       B. 4

       C. 3

Ans : 7


Q.10 Extensible authentication protocol is authentication framework frequently used in ______.

       A. Wired personal area network

       B. Wired local area network

       C. Wireless networks

       D. Wired metropolitan area network

Ans : Wireless networks


Q.11 An attempt to make a computer resource unavailable to its intended users is called ______.

       A. Denial-of-service attack

       B. Virus attack

       C. Worms attack

       D. Botnet process

Ans : Denial-of-service attack


Q.12 which testing helps in identifying vulnerabilities in a system.

       A. Penetration Testing

       B. Smoke Testing

       C. Unit Testing

       D. All of the above

Ans : Penetration Testing


Leave a Comment