On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 12

Q1 | Which of the following is not a secured mail transferring methodology?
  • pop3
  • ssmtp
  • mail using pgp
  • s/mime
Q2 | __________ is used for encrypting data at network level.
  • ipsec
  • https
  • smtp
  • s/mime
Q3 | S/MIME is abbreviated as __________________
  • secure/multimedia internet mailing extensions
  • secure/multipurpose internet mailing extensions
  • secure/multimedia internet mail extensions
  • secure/multipurpose internet mail extensions
Q4 | PGP encrypts data by using a block cipher called ______
  • international data encryption algorithm
  • private data encryption algorithm
  • internet data encryption algorithm
  • local data encryption algorithm
Q5 | When were VPNs introduced into the commercial world?
  • early 80’s
  • late 80’s
  • early 90’s
  • late 90’s
Q6 | What protocol is NOT used in the operation of a VPN?
  • pptp
  • ipsec
  • ymum
  • l2tp
Q7 | Which of the following statements is NOT true concerning VPNs?
  • financially rewarding compared to leased lines
  • allows remote workers to access corporate data
  • allows lan-to-lan connectivity over public networks
  • is the backbone of the internet
Q8 | Traffic in a VPN is NOT ____________
  • invisible from public networks
  • logically separated from other traffic
  • accessible from unauthorized public networks
  • restricted to a single protocol in ipsec
Q9 | Which layer 3 protocols can be transmitted over an L2TP VPN?
  • only ip
  • only ipx
  • only icmp
  • ip and ipx
Q10 | ESP (Encapsulating Security Protocol) is defined in which of the following standards?
  • ipsec
  • pptp
  • ppp
  • l2tp
Q11 | L2F was developed by which company?
  • microsoft
  • cisco
  • blizzard entertainment
  • ietf
Q12 | Which layer of the OSI reference model does PPTP work at?
  • layer 1
  • layer 2
  • layer 3
  • layer 4
Q13 | Which layer of the OSI reference model does IPsec work at?
  • layer 1
  • layer 2
  • layer 3
  • layer 4
Q14 | Firewalls can be of _______ kinds.
  • 1
  • 2
  • 3
  • 4
Q15 | _________________ is the kind of firewall is connected between the device and the network connecting to internet.
  • hardware firewall
  • software firewall
  • stateful inspection firewall
  • microsoft firewall
Q16 | _________ is software that is installed using an internet connection or they come by-default with operating systems.
  • hardware firewall
  • software firewall
  • stateful inspection firewall
  • microsoft firewall
Q17 | Which of the following is not a software firewall?
  • windows firewall
  • outpost firewall pro
  • endian firewall
  • linksys firewall
Q18 | Firewall examines each ____________ that are entering or leaving the internal network.
  • emails users
  • updates
  • connections
  • data packets
Q19 | A firewall protects which of the following attacks?
  • phishing
  • dumpster diving
  • denial of service (dos)
  • shoulder surfing
Q20 | There are ______ types of firewall.
  • 5
  • 4
  • 3
  • 2
Q21 | Packet filtering firewalls are deployed on ________
  • routers
  • switches
  • hubs
  • repeaters
Q22 | In the ______________ layer of OSI model, packet filtering firewalls are implemented.
  • application layer
  • session layer
  • presentation layer
  • network layer
Q23 | The __________ defines the packet filtering firewall rules.
  • access control list
  • protocols
  • policies
  • ports
Q24 | ACL stands for _____________
  • access condition list
  • anti-control list
  • access control logs
  • access control list
Q25 | When a packet does not fulfil the ACL criteria, the packet is _________
  • resend
  • dropped
  • destroyed
  • acknowledged as received