On This Page

This set of Internet Security Multiple Choice Questions & Answers (MCQs) focuses on Internet Security Set 2

Q1 | _________ means that a sender must not be able to deny sending a message that he sent.
  • confidentiality
  • integrity
  • authentication
  • nonrepudiation
Q2 | A hash function must meet ________ criteria.
  • two
  • three
  • four
  • none of the above
Q3 | __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
  • kdc
  • kerberos
  • ca
  • none of the above
Q4 | Password-based authentication can be divided into two broad categories: _______ and _______.
  • fixed; variable
  • time-stamped; fixed
  • fixed; one-time
  • none of the above
Q5 | _________ operates in the transport mode or the tunnel mode.
  • ipsec
  • ssl
  • pgp
  • none of the above
Q6 | IKE creates SAs for _____.
  • ssl
  • pgp
  • ipsec
  • vp
Q7 | ______ provides either authentication or encryption, or both, for packets at the IP level.
  • ah
  • esp
  • pgp
  • ssl
Q8 | One security protocol for the e-mail system is _________.
  • ipsec
  • ssl
  • pgp
  • none of the above
Q9 | IKE is a complex protocol based on ______ other protocols.
  • two
  • three
  • four
  • five
Q10 | IPSec defines two protocols: _______ and ________.
  • ah; ssl
  • pgp; esp
  • ah; esp
  • all of the above
Q11 | In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.
  • transport
  • tunnel
  • either (a) or (b)
  • neither (a) nor (b)
Q12 | ______ is the protocol designed to create security associations, both inbound and outbound.
  • sa
  • ca
  • kdc
  • ike
Q13 | A _______network is used inside an organization.
  • private
  • public
  • semi-private
  • semi-public
Q14 | SSL provides _________.
  • message integrity
  • confidentiality
  • compression
  • all of the above
Q15 | The Internet authorities have reserved addresses for _______.
  • intranets
  • internets
  • extranets
  • none of the above
Q16 | An _________ is a network that allows authorized access from outside users.
  • intranet
  • internet
  • extranet
  • none of the above
Q17 | _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
  • ipsec
  • ssl
  • pgp
  • none of the above
Q18 | IKE uses _______.
  • oakley
  • skeme
  • isakmp
  • all of the above
Q19 | IPSec uses a set of SAs called the ________.
  • sad
  • sab
  • sadb
  • none of the above
Q20 | An ________ is a private network that uses the Internet model.
  • intranet
  • internet
  • extranet
  • none of the above
Q21 | ______ is actually an IETF version of _____.
  • tls; tss
  • ssl; tls
  • tls; ssl
  • ssl; slt
Q22 | In ______, there is a single path from the fully trusted authority to any certificate.
  • x509
  • pgp
  • kdc
  • none of the above
Q23 | The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
  • list of protocols
  • cipher suite
  • list of keys
  • none of the above
Q24 | A ______ provides privacy for LANs that must communicate through the global Internet.
  • vpp
  • vnp
  • vnn
  • vpn
Q25 | _______ uses the idea of certificate trust levels.
  • x509
  • pgp
  • kdc
  • none of the above