Information Cyber Security Set 12
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 12
Q1 | Which of the following is not a secured mail transferring methodology?
- pop3
- ssmtp
- mail using pgp
- s/mime
Q2 | __________ is used for encrypting data at network level.
- ipsec
- https
- smtp
- s/mime
Q3 | S/MIME is abbreviated as __________________
- secure/multimedia internet mailing extensions
- secure/multipurpose internet mailing extensions
- secure/multimedia internet mail extensions
- secure/multipurpose internet mail extensions
Q4 | PGP encrypts data by using a block cipher called ______
- international data encryption algorithm
- private data encryption algorithm
- internet data encryption algorithm
- local data encryption algorithm
Q5 | When were VPNs introduced into the commercial world?
- early 80’s
- late 80’s
- early 90’s
- late 90’s
Q6 | What protocol is NOT used in the operation of a VPN?
- pptp
- ipsec
- ymum
- l2tp
Q7 | Which of the following statements is NOT true concerning VPNs?
- financially rewarding compared to leased lines
- allows remote workers to access corporate data
- allows lan-to-lan connectivity over public networks
- is the backbone of the internet
Q8 | Traffic in a VPN is NOT ____________
- invisible from public networks
- logically separated from other traffic
- accessible from unauthorized public networks
- restricted to a single protocol in ipsec
Q9 | Which layer 3 protocols can be transmitted over an L2TP VPN?
- only ip
- only ipx
- only icmp
- ip and ipx
Q10 | ESP (Encapsulating Security Protocol) is defined in which of the following standards?
- ipsec
- pptp
- ppp
- l2tp
Q11 | L2F was developed by which company?
- microsoft
- cisco
- blizzard entertainment
- ietf
Q12 | Which layer of the OSI reference model does PPTP work at?
- layer 1
- layer 2
- layer 3
- layer 4
Q13 | Which layer of the OSI reference model does IPsec work at?
- layer 1
- layer 2
- layer 3
- layer 4
Q14 | Firewalls can be of _______ kinds.
- 1
- 2
- 3
- 4
Q15 | _________________ is the kind of firewall is connected between the device and the network connecting to internet.
- hardware firewall
- software firewall
- stateful inspection firewall
- microsoft firewall
Q16 | _________ is software that is installed using an internet connection or they come by-default with operating systems.
- hardware firewall
- software firewall
- stateful inspection firewall
- microsoft firewall
Q17 | Which of the following is not a software firewall?
- windows firewall
- outpost firewall pro
- endian firewall
- linksys firewall
Q18 | Firewall examines each ____________ that are entering or leaving the internal network.
- emails users
- updates
- connections
- data packets
Q19 | A firewall protects which of the following attacks?
- phishing
- dumpster diving
- denial of service (dos)
- shoulder surfing
Q20 | There are ______ types of firewall.
- 5
- 4
- 3
- 2
Q21 | Packet filtering firewalls are deployed on ________
- routers
- switches
- hubs
- repeaters
Q22 | In the ______________ layer of OSI model, packet filtering firewalls are implemented.
- application layer
- session layer
- presentation layer
- network layer
Q23 | The __________ defines the packet filtering firewall rules.
- access control list
- protocols
- policies
- ports
Q24 | ACL stands for _____________
- access condition list
- anti-control list
- access control logs
- access control list
Q25 | When a packet does not fulfil the ACL criteria, the packet is _________
- resend
- dropped
- destroyed
- acknowledged as received