This is the MCQs in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.
Topic Outline
- IPSecurity (lPSec)
- Two Modes
- Two Security Protocols
- Security Association
- Internet Key Exchange (IKE)
- Virtual Private Network
- SSL
- SSL Services
- Security Parameters
- Sessions and Connections
- Four Protocols
- Transport Layer Security
- PGP
- FIREWALLS
- Packet-Filter Firewall
- Proxy Firewall
Begin and Good luck!
Choose the letter of the best answer in each questions.
1. _________ operates in the transport mode or the tunnel mode.
- A) IPSec
- B) SSL
- C) PGP
- D) none of the above
2. IKE creates SAs for _____.
- A) SSL
- B) PGP
- C) IPSec
- D) VP
3. ______ provides either authentication or encryption, or both, for packets at the IP level.
- A) AH
- B) ESP
- C) PGP
- D) SSL
4. One security protocol for the e-mail system is _________.
- A) IPSec
- B) SSL
- C) PGP
- D) none of the above
5. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.
- A) SSL
- B) TLS
- C) either (a) or (b)
- D) both (a) and (b)
6. IKE is a complex protocol based on ______ other protocols.
- A) two
- B) three
- C) four
- D) five
7. IPSec defines two protocols: _______ and ________.
- A) AH; SSL
- B) PGP; ESP
- C) AH; ESP
- D) all of the above
8. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.
- A) transport
- B) tunnel
- C) either (a) or (b)
- D) neither (a) nor (b)
9. ______ is the protocol designed to create security associations, both inbound and outbound.
- A) SA
- B) CA
- C) KDC
- D) IKE
10. A _______network is used inside an organization.
- A) private
- B) public
- C) semi-private
- D) semi-public
11. SSL provides _________.
- A) message integrity
- B) confidentiality
- C) compression
- D) all of the above
12. The Internet authorities have reserved addresses for _______.
- A) intranets
- B) internets
- C) extranets
- D) none of the above
13. An _________ is a network that allows authorized access from outside users.
- A) intranet
- B) internet
- C) extranet
- D) none of the above
14. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
- A) IPSec
- B) SSL
- C) PGP
- D) none of the above
15. IKE uses _______.
- A) Oakley
- B) SKEME
- C) ISAKMP
- D) all of the above
16. IPSec uses a set of SAs called the ________.
- A) SAD
- B) SAB
- C) SADB
- D) none of the above
17. An ________ is a private network that uses the Internet model.
- A) intranet
- B) internet
- C) extranet
- D) none of the above
18. ______ is actually an IETF version of _____.
- A) TLS; TSS
- B) SSL; TLS
- C) TLS; SSL
- D) SSL; SLT
19. In ______, there is a single path from the fully trusted authority to any certificate.
- A) X509
- B) PGP
- C) KDC
- D) none of the above
20. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
- A) list of protocols
- B) cipher suite
- C) list of keys
- D) none of the above
21. A ______ provides privacy for LANs that must communicate through the global Internet.
- A) VPP
- B) VNP
- C) VNN
- D) VPN
22. _______ uses the idea of certificate trust levels.
- A) X509
- B) PGP
- C) KDC
- D) none of the above
23. IPSec in the ______ mode does not protect the IP header.
- A) transport
- B) tunnel
- C) either (a) or (b)
- D) neither (a) nor (b)
24. ________ provides privacy, integrity, and authentication in e-mail.
- A) IPSec
- B) SSL
- C) PGP
- D) none of the above
25. In _____, there can be multiple paths from fully or partially trusted authorities.
- A) X509
- B) PGP
- C) KDC
- D) none of the above
26. ______ provides authentication at the IP level.
- A) AH
- B) ESP
- C) PGP
- D) SSL
27. In _______, the cryptographic algorithms and secrets are sent with the message.
- A) IPSec
- B) SSL
- C) TLS
- D) PGP
28. ______ is designed to provide security and compression services to data generated from the application layer.
- A) SSL
- B) TLS
- C) either (a) or (b)
- D) both (a) and (b)
29. _______ provide security at the transport layer.
- A) SSL
- B) TLS
- C) either (a) or (b)
- D) both (a) and (b)
30. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
- A) transport
- B) tunnel
- C) either (a) or (b)
- D) neither (a) nor (b)
31. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
- A) transport
- B) tunnel
- C) either (a) or (b)
- D) neither (a) nor (b)
32. ______ was invented by Phil Zimmerman.
- A) IPSec
- B) SSL
- C) PGP
- D) none of the above
33. A _______ layer security protocol provides end-to-end security services for applications.
- A) data link
- B) network
- C) transport
- D) none of the above
34. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
- A) secret
- B) public
- C) either (a) or (b)
- D) both (a) and (b)
Post a Comment