Practice Test: Question Set - 05
1. Which of the statements are not true to classify VPN systems?
- (A) Protocols
used for tunneling the traffic
- (B) Whether
VPNs are providing site-to-site or remote access connection
- (C) Securing
the network from bots and malwares
- (D) Levels
of security provided for sending and receiving data privately
2. There are ________ types of VPN protocols.
- (A) 3
- (B) 4
- (C) 5
- (D) 6
3. Conversion of plain text into Cipher text is called as________.
- (A) Encryption
- (B) Decryption
- (C) Hidden
Text
- (D) None
of above
4. ________ provides privacy, integrity, and authentication in e-mail.
- (A) IPSec
- (B) SSL
- (C) PGP
- (D) None
of the above
5. The DSS signature uses which hash algorithm?
- (A) MD5
- (B) SHA-2
- (C) SHA-1
- (D) Does
not use hash algorithm
6. A hacker guessing suggested password to a program is call as?
- (A) Password
Guessing
- (B) Dictionary
Attack
- (C) Default
password attack
- (D) None
of these
7. SSL provides _________.
- (A) Message
integrity
- (B) Confidentiality
- (C) Compression
- (D) All
of the above
8. VPN is abbreviated as ________
- (A) Visual
Private Network
- (B) Virtual
Protocol Network
- (C) Virtual
Private Network
- (D) Virtual
Protocol Networking
9. Site-to-Site VPN architecture is also known as _________
- (A) Remote
connection based VPNs
- (B) Peer-to-Peer
VPNs
- (C) Extranet
based VPN
- (D) Country-to-country
VPNs
10. The full form of OSI is OSI model__________.
- (A) Open
systems interconnection
- (B) Open
software interconnection
- (C) Open
connection
- (D) Open
system internet
11. There are _________ types of VPNs.
- (A) 3
- (B) 2
- (C) 5
- (D) 4
12. IKE uses _________
- (A) Oakley
- (B) SKEME
- (C) ISAKMP
- (D) All
of the above
Next Tests: