Google News
logo
Networking - Quiz(MCQ)
A)
Authentication Header (AH)
B)
Internet key Exchange (IKE)
C)
Encapsulating Security Payload (ESP)
D)
All of the Above

Correct Answer : Option (D) :   All of the Above


Explanation :

AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. IKE is used to make sure that only the intended sender and receiver can access the message.

A)
Wi-Fi
B)
Email
C)
Ethernet
D)
Bluetooth

Correct Answer : Option (A) :   Wi-Fi


Explanation : WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network.

A)
FTP security
B)
Email security
C)
WiFi security
D)
Browser security

Correct Answer : Option (B) :   Email security


Explanation : PGP is an encryption method used in e-mail security to encrypt and decrypt the content of an e-mail transmitted over the internet. It makes sure that the message cannot be stolen by other unauthorized users.

A)
DNS lookup
B)
DNS hijacking
C)
DNS spoofing
D)
DNS authorizing

Correct Answer : Option (C) :   DNS spoofing


Explanation : In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid credentials from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials.

A)
Invisible from public networks
B)
Logically separated from other traffic
C)
Restricted to a single protocol in IPsec
D)
Accessible from unauthorized public networks

Correct Answer : Option (D) :   Accessible from unauthorized public networks


Explanation : Traffic in a VPN is not accessible from any unauthorized public networks because it is secured with the masking IP address. This provides the benefit of access to blocked resources to the users.

A)
Usually cheaper than leased lines
B)
Always cheaper than leased lines
C)
Always more expensive than leased lines
D)
Usually more expensive than leased lines

Correct Answer : Option (A) :   Usually cheaper than leased lines


Explanation : The services of a VPN are cheaper for moderate to large scale institutional networks than the services of leased lines. Though for a small scale network, it does not prove to be as beneficial as the costs are not reduced to a great degree as compared to leased lines.

A)
Layer 1
B)
Layer 2
C)
Layer 3
D)
Layer 4

Correct Answer : Option (C) :   Layer 3


Explanation : IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. It operates in the network layer.

A)
Cisco
B)
IETF
C)
Microsoft
D)
Blizzard Entertainment

Correct Answer : Option (A) :   Cisco


Explanation : L2F stands for Layer 2 Forwarding protocol. It was designed by Cisco to tunnel PPP traffic, helping create VPNs over the internet.

A)
PPP
B)
IPsec
C)
L2TP
D)
PPTP

Correct Answer : Option (B) :   IPsec


Explanation : ESP is a security component of IPSec. ESP provides content protection and ensures that there is integrity and confidentiality of the message. The other security components of IPSec are Authentication Header and Internet Key Exchange.

A)
Only IP
B)
Only IPX
C)
Only ICMP
D)
IP and IPX

Correct Answer : Option (D) :   IP and IPX


Explanation : L2TP stands for Layer 2 Tunneling Protocol. It is used to tunnel all the L2 traffic on an IP network and is able to transmit network layer’s IP and IPX protocol data.