Internet Connection Sharing (ICS) MCQ with Answers - ObjectiveBooks

Internet Connection Sharing (ICS) MCQ with Answers

Practice Test: Question Set - 05


1. Which of the statements are not true to classify VPN systems?
    (A) Protocols used for tunneling the traffic
    (B) Whether VPNs are providing site-to-site or remote access connection
    (C) Securing the network from bots and malwares
    (D) Levels of security provided for sending and receiving data privately

2. There are ________ types of VPN protocols.
    (A) 3
    (B) 4
    (C) 5
    (D) 6

3. Conversion of plain text into Cipher text is called as________.
    (A) Encryption
    (B) Decryption
    (C) Hidden Text
    (D) None of above

4. ________ provides privacy, integrity, and authentication in e-mail.
    (A) IPSec
    (B) SSL
    (C) PGP
    (D) None of the above

5. The DSS signature uses which hash algorithm?
    (A) MD5
    (B) SHA-2
    (C) SHA-1
    (D) Does not use hash algorithm

6. A hacker guessing suggested password to a program is call as?
    (A) Password Guessing
    (B) Dictionary Attack
    (C) Default password attack
    (D) None of these

7. SSL provides _________.
    (A) Message integrity
    (B) Confidentiality
    (C) Compression
    (D) All of the above

8. VPN is abbreviated as ________
    (A) Visual Private Network
    (B) Virtual Protocol Network
    (C) Virtual Private Network
    (D) Virtual Protocol Networking

9. Site-to-Site VPN architecture is also known as _________
    (A) Remote connection based VPNs
    (B) Peer-to-Peer VPNs
    (C) Extranet based VPN
    (D) Country-to-country VPNs

10. The full form of OSI is OSI model__________.
    (A) Open systems interconnection
    (B) Open software interconnection
    (C) Open connection
    (D) Open system internet

11. There are _________ types of VPNs.
    (A) 3
    (B) 2
    (C) 5
    (D) 4

12. IKE uses _________
    (A) Oakley
    (B) SKEME
    (C) ISAKMP
    (D) All of the above

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests: