1. The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.
A) SSL
B) ESP
C) TSL
D) PSL
2. The ……………. is used to provide integrity check, authentication, and encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL
3. In ……………………. mode, a common technique in packet-switched
networks consist of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above
4. The …………………………. is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec
5. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
Read Also: Solved MCQ on Internet Security set-1
6. While initiating the SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server.
A) 420
B) 1032
C) 443
D) 322
7. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
8. State whether the following statement is true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and the destination server.
A) True, False
B) False, True
C) True, True
D) False, False
9. In the packet-filtering router, the following information can be external from the packet header.
i) Source IP address ii) Destination IP address
iii) TCP/UDP source port iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
10. …………….. mode is used whenever either end of a security the association is the gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Answers:
1. A) SSL
2. B) ESP
3. C) Both A and B
4. A) IPsec
5. C) SSL record protocol
6. C) 443
7. A) SSL handshake protocol
8. A) True, False
9. D) All i, ii, iii, iv and v
10. A) Tunnel
Read More: Computer Networking MCQ Questions