Forouzan: MCQ in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls

Print Friendly, PDF & Email
(Last Updated On: December 3, 2019)

Forouzan: MCQ in Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls

This is the MCQ in Internet Security: IPSec, SSL/TLS, PGP, VPN, and Firewalls from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in datacom, topic in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.

Begin and Good luck!

Choose the letter of the best answer in each questions.

1. _________ operates in the transport mode or the tunnel mode.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option A

Solution:

2. IKE creates SAs for _____.

A) SSL

B) PGP

C) IPSec

D) VP

View Answer:

Answer: Option C

Solution:

3. ______ provides either authentication or encryption, or both, for packets at the IP level.

A) AH

B) ESP

C) PGP

D) SSL

View Answer:

Answer: Option B

Solution:

4. One security protocol for the e-mail system is _________.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option C

Solution:

5. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

A) SSL

B) TLS

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option D

Solution:

6. IKE is a complex protocol based on ______ other protocols.

A) two

B) three

C) four

D) five

View Answer:

Answer: Option B

Solution:

7. IPSec defines two protocols: _______ and ________.

A) AH; SSL

B) PGP; ESP

C) AH; ESP

D) all of the above

View Answer:

Answer: Option C

Solution:

8. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

9. ______ is the protocol designed to create security associations, both inbound and outbound.

A) SA

B) CA

C) KDC

D) IKE

View Answer:

Answer: Option D

Solution:

10. A _______network is used inside an organization.

A) private

B) public

C) semi-private

D) semi-public

View Answer:

Answer: Option A

Solution:

11. SSL provides _________.

A) message integrity

B) confidentiality

C) compression

D) all of the above

View Answer:

Answer: Option D

Solution:

12. The Internet authorities have reserved addresses for _______.

A) intranets

B) internets

C) extranets

D) none of the above

View Answer:

Answer: Option D

Solution:

13. An _________ is a network that allows authorized access from outside users.

A) intranet

B) internet

C) extranet

D) none of the above

View Answer:

Answer: Option C

Solution:

14. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option A

Solution:

15. IKE uses _______.

A) Oakley

B) SKEME

C) ISAKMP

D) all of the above

View Answer:

Answer: Option D

Solution:

16. IPSec uses a set of SAs called the ________.

A) SAD

B) SAB

C) SADB

D) none of the above

View Answer:

Answer: Option C

Solution:

17. An ________ is a private network that uses the Internet model.

A) intranet

B) internet

C) extranet

D) none of the above

View Answer:

Answer: Option A

Solution:

18. ______ is actually an IETF version of _____.

A) TLS; TSS

B) SSL; TLS

C) TLS; SSL

D) SSL; SLT

View Answer:

Answer: Option C

Solution:

19. In ______, there is a single path from the fully trusted authority to any certificate.

A) X509

B) PGP

C) KDC

D) none of the above

View Answer:

Answer: Option A

Solution:

20. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

A) list of protocols

B) cipher suite

C) list of keys

D) none of the above

View Answer:

Answer: Option B

Solution:

21. A ______ provides privacy for LANs that must communicate through the global Internet.

A) VPP

B) VNP

C) VNN

D) VPN

View Answer:

Answer: Option D

Solution:

22. _______ uses the idea of certificate trust levels.

A) X509

B) PGP

C) KDC

D) none of the above

View Answer:

Answer: Option B

Solution:

23. IPSec in the ______ mode does not protect the IP header.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

24. ________ provides privacy, integrity, and authentication in e-mail.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option C

Solution:

25. In _____, there can be multiple paths from fully or partially trusted authorities.

A) X509

B) PGP

C) KDC

D) none of the above

View Answer:

Answer: Option B

Solution:

26. ______ provides authentication at the IP level.

A) AH

B) ESP

C) PGP

D) SSL

View Answer:

Answer: Option A

Solution:

27. In _______, the cryptographic algorithms and secrets are sent with the message.

A) IPSec

B) SSL

C) TLS

D) PGP

View Answer:

Answer: Option D

Solution:

28. ______ is designed to provide security and compression services to data generated from the application layer.

A) SSL

B) TLS

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option D

Solution:

29. _______ provide security at the transport layer.

A) SSL

B) TLS

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option D

Solution:

30. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

31. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

A) transport

B) tunnel

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

32. ______ was invented by Phil Zimmerman.

A) IPSec

B) SSL

C) PGP

D) none of the above

View Answer:

Answer: Option C

Solution:

33. A _______ layer security protocol provides end-to-end security services for applications.

A) data link

B) network

C) transport

D) none of the above

View Answer:

Answer: Option C

Solution:

34. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

A) secret

B) public

C) either (a) or (b)

D) both (a) and (b)

View Answer:

Answer: Option B

Solution:

FINISHED:

Complete List of Chapter Quiz in Data Communications and Networking

Check your work.

Download File in PDF

DOWNLOAD PDF / PRINT
Print Friendly, PDF & Email
Show Simple Act of Caring!

Please consider subscribing to our YouTube Channel for engineering video tutorials. You can also find us on Twitter and Facebook. Lastly, Our app is now available on Google Play, Pinoybix Elex

Add Comment

© 2014 PinoyBIX Engineering. © 2019 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
Do NOT follow this link or you will be banned from the site!

Math Solution

Advanced Math problem age work mixture digit motion Analytic Geometry 01 problem Analytic Geometry 02 problem clock variation progression misc Combination problem Differential Calculus 01 Problem Differential Calculus 02 Problem Differential Equations Problem Fundamentals in Algebra Fundamentals in Algebra Problem Integral Calculus problem Permutation problem Plane Geometry problem Plane Trigonometry problem Probability problem quadratic equation binomial theorem logarithms Solid Geometry problem Spherical Trigonometry problem System of Numbers Problem Venn Diagram Problem

Questions and Answers in Mathematics

video

Pre-board in Electronics Engineering

Pre-board in Electronics Engineering - Answers

Questions and Answers

Basic Television - Grob TV Boylestad Questions and Answers Computer Principles Electrical Circuit Electricity and Magnetism Fundamentals Electronic Circuits Floyd Questions and Answers Floyd Self-test Grob Questions and Answers Industrial Electronics Principles and Applications Microelectronics Power Generators / Sources / Principles and Applications Solid State Devices Tests and Measurements Vacuum Tubes

Pre-board in Communications Engineering

Pre-board in Communications Engineering - Answers

Questions and Answers

Acoustics Antennas Blake Questions and Answers Broadcasting and Cable TV System Digital Communication Networks Forouzan Kennedy Questions and Answers Microwave Communications Miscellaneous Questions in Communications Modulation Navigational Aids and Radar Systems Noise Optical Fiber Communications Radiation and Wave Propagation Satellite Communications Transmission Fundamentals Wire and Wireless Communications

GEAS Solution

Dynamics problem Economics problem Physics problem Statics problem Strength problem Thermodynamics problem

Pre-board in GEAS

Questions and Answers in GEAS

Engineering Economics Engineering Laws and Ethics Engineering Management Engineering Materials Engineering Mechanics General Chemistry Physics Strength of Materials Thermodynamics
Online Tool: Electrical Charge Conversions
Online Tool: Electrical Charge Conversions
Online Tool: Color Code Conversions
Online Tool: Color Code Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Temperature Measurement Conversions
Consider Simple Act of Caring!: LIKE MY FB PAGE

Our app is now available on Google Play, Pinoybix Elex

Get it on Google Play