Forouzan: MCQ in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls

(Last Updated On: April 22, 2018)
MCQ for Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
This is the MCQ in Internet Security: IPSec, SSL/TLS, PGP, VPN, and Firewalls from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in datacom, topic in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.

Begin and Good luck!

Choose the letter of the best answer in each questions.

1. _________ operates in the transport mode or the tunnel mode.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option A

Solution:

2. IKE creates SAs for _____.

A) SSL

B) PGP

C) IPSec

D) VP

View Answer:

Answer: Option C

Solution:

3. ______ provides either authentication or encryption, or both, for packets at the IP level.

A) AH

B) ESP

C) PGP

D) SSL

View Answer:

Answer: Option B

Solution:

4. One security protocol for the e-mail system is _________.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option C

Solution:

5. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

A) SSL

B) TLS

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option D

Solution:

6. IKE is a complex protocol based on ______ other protocols.

A) two

B) three

C) four

D) five

View Answer:

Answer: Option B

Solution:

7. IPSec defines two protocols: _______ and ________.

A) AH; SSL

B) PGP; ESP

C) AH; ESP

D) all of the above

View Answer:

Answer: Option C

Solution:

8. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

9. ______ is the protocol designed to create security associations, both inbound and outbound.

A) SA

B) CA

C) KDC

D) IKE

View Answer:

Answer: Option D

Solution:

10. A _______network is used inside an organization.

A) private

B) public

C) semi-private

D) semi-public

View Answer:

Answer: Option A

Solution:

11. SSL provides _________.

A) message integrity

B) confidentiality

C) compression

D) all of the above

View Answer:

Answer: Option D

Solution:

12. The Internet authorities have reserved addresses for _______.

A) intranets

B) internets

C) extranets

D) none of the above

View Answer:

Answer: Option D

Solution:

13. An _________ is a network that allows authorized access from outside users.

A) intranet

B) internet

C) extranet

D) none of the above

View Answer:

Answer: Option C

Solution:

14. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option A

Solution:

15. IKE uses _______.

A) Oakley

B) SKEME

C) ISAKMP

D) all of the above

View Answer:

Answer: Option D

Solution:

16. IPSec uses a set of SAs called the ________.

A) SAD

B) SAB

C) SADB

D) none of the above

View Answer:

Answer: Option C

Solution:

17. An ________ is a private network that uses the Internet model.

A) intranet

B) internet

C) extranet

D) none of the above

View Answer:

Answer: Option A

Solution:

18. ______ is actually an IETF version of _____.

A) TLS; TSS

B) SSL; TLS

C) TLS; SSL

D) SSL; SLT

View Answer:

Answer: Option C

Solution:

19. In ______, there is a single path from the fully trusted authority to any certificate.

A) X509

B) PGP

C) KDC

D) none of the above

View Answer:

Answer: Option A

Solution:

20. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

A) list of protocols

B) cipher suite

C) list of keys

D) none of the above

View Answer:

Answer: Option B

Solution:

21. A ______ provides privacy for LANs that must communicate through the global Internet.

A) VPP

B) VNP

C) VNN

D) VPN

View Answer:

Answer: Option D

Solution:

22. _______ uses the idea of certificate trust levels.

A) X509

B) PGP

C) KDC

D) none of the above

View Answer:

Answer: Option B

Solution:

23. IPSec in the ______ mode does not protect the IP header.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

24. ________ provides privacy, integrity, and authentication in e-mail.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option C

Solution:

25. In _____, there can be multiple paths from fully or partially trusted authorities.

A) X509

B) PGP

C) KDC

D) none of the above

View Answer:

Answer: Option B

Solution:

26. ______ provides authentication at the IP level.

A) AH

B) ESP

C) PGP

D) SSL

View Answer:

Answer: Option A

Solution:

27. In _______, the cryptographic algorithms and secrets are sent with the message.

A) IPSec

B) SSL

C) TLS

D) PGP

View Answer:

Answer: Option D

Solution:

28. ______ is designed to provide security and compression services to data generated from the application layer.

A) SSL

B) TLS

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option D

Solution:

29. _______ provide security at the transport layer.

A) SSL

B) TLS

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option D

Solution:

30. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

31. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

32. ______ was invented by Phil Zimmerman.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option C

Solution:

33. A _______ layer security protocol provides end-to-end security services for applications.

A) data link

B) network

C) transport

D) none of the above

View Answer:

Answer: Option C

Solution:

34. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

A) secret

B) public

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option B

Solution:

FINISHED:

Complete List of Chapter Quiz in Data Communications and Networking

Check your work.

Download File in PDF

Forouzan: MCQ in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
5 (100%) 2 votes

Add Comment

© 2014 PinoyBIX Engineering. © 2018 All Rights Reserved | How to Donate?
MCQ in Solid State Devices Part 7 | ECE Board Exam
MCQ in Solid State Devices Series | ECE Board Exam
MCQ in Electricity and Magnetism Fundamentals Series | ECE Board Exam
MCQ in Electricity and Magnetism Fundamentals Series | ECE Board Exam
Basic Television - Grob TV  Chapter Exercises
Basic Television – Grob TV Chapter Exercises
Series of Multiple Choice Questions in Engineering Mathematics
Series of Multiple Choice Questions in Engineering Mathematics
Online Tool: Color Code Conversions
Online Tool: Color Code Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Length Measurement Conversions
Online Tool: Length Measurement Conversions

Get FREE Review Course
in your inbox

Subscribe to our mailing list and get reviewers and updates to your email inbox.

Thank you for subscribing.

Something went wrong.