0

Network Security and Firewall

Description: Network Security and Firewall
Number of Questions: 15
Created by:
Tags: Network Security and Firewall Computer Science & Information Technology - CS
Attempted 0/15 Correct 0 Score 0

____________ ensures client server security.

  1. Antivirus

  2. Password encryption only

  3. Firewalls

  4. None of the above


Correct Option: C
Explanation:

Firewall ensures client server security.

The body scan for security comes within the category of ______________.

  1. firewall

  2. password protection

  3. body protection

  4. biometric system


Correct Option: D
Explanation:

The body scan for security comes within the category of biometric system.

Which of the following is not a client server network security problem?

  1. Physical security holes

  2. Software security holes

  3. Inconsistent usage holes

  4. Biometric systems


Correct Option: D
Explanation:

Biometric systems is a client server protection method not a problem.

________ is a program that performs desired task but also executes some unexpected task.

  1. Worm

  2. Trojan Horse

  3. Virus

  4. Antivirus


Correct Option: B
Explanation:

Trojan Horse is a program that performs desired task but also executes some unexpected task.

______________ is a self replicating program that is self contained and does not require a host program.

  1. Worm

  2. Trojan Horse

  3. Virus

  4. Antivirus


Correct Option: A
Explanation:

Worm is a self replicating program that is self contained and does not require a host program.

__________ occurs when anyone sends a very large file to the inbox in every few minutes.

  1. Operation overloading

  2. Message overloading

  3. Frequent message

  4. Service overloading


Correct Option: B
Explanation:

Message overloading occurs when anyone sends a very large file to a inbox in every few minutes.

Which of the following is not a threat to the server?

  1. Message overloading

  2. Packets replay

  3. Service overloading

  4. Wireless connections


Correct Option: D
Explanation:

Wireless connections are not a threat to a server. It is just a way to connect client to server.

Which of the following securities is required to protect organization network from outside world?

  1. Antivirus

  2. Wall

  3. Firewall

  4. Password


Correct Option: C
Explanation:

Firewall protects the internal network of organization from the outside world.

_________ is a network management tool of the TCP/IP protocol suite.

  1. FTP

  2. TCP

  3. ICMP

  4. UDP


Correct Option: C
Explanation:

ICMP (Internet Control Message Protocol). A network management tool of the TCP/IP protocol suite.

Which of the following network protocols is used by the USENET news server?

  1. HTTP

  2. FTP

  3. Gopher

  4. NNTP


Correct Option: D
Explanation:

The network protocol NNTP is used by the USENET news server.

Which of the following is not a feature of message security?

  1. Confidentiality

  2. Data security

  3. Integrity

  4. Sender authenticity


Correct Option: B
Explanation:

Data security is not the feature of message security.

Which of the following activities cannot be handled by a firewall?

  1. Packet filtering

  2. Blocking traffic

  3. Restrict websites

  4. Intrusion detection


Correct Option: D
Explanation:

Intrusion detection cannot be done by the firewall, i.e.,  if internal employee will do the cheating then it cannot be handled by the firewall.

Public key cryptography uses

  1. public and private keys

  2. public and shared keys

  3. internal and external keys

  4. open and closed keys


Correct Option: A
Explanation:

Public key cryptography uses two keys: public key and private key. Information is encrypted by private key and decrypted by public key.

DES was introduced in 1975 by _____.

  1. Microsoft

  2. IBM

  3. DELL

  4. Intel


Correct Option: B
Explanation:

DES (Data Encryption Standard) was introduced in 1975 by IBM.

RSA is a ____________ for both encryption and authentication.

  1. virus

  2. firewall

  3. secret key cryptosystem

  4. public key cryptosystem


Correct Option: D
Explanation:

RSA is a public key cryptosystem for both encryption and authentication.

- Hide questions