System and Network Security
Description: Securing Web Application Network Security and FirewallNetwork Security and FirewallNetwork Security and Firewall | |
Number of Questions: 15 | |
Created by: Karuna Seth | |
Tags: Securing Web Application Network Security and Firewall |
Which of the following is excellent for exchanging keys and associating an identity with a public encryption key?
Which of the following provides all alerts as defined by alert protocol of SSL except for no certificate, and also has some new alerts?
Under which of the following characteristics should a security policy grow and adapt well?
Which of the following protocols is used by SSL for reporting errors and abnormal conditions?
Which of the following uses hierarchically validated certificates, usually represented in X.509 format for key exchange?
Which of the following fields contains the message encryption key, encrypted under shared encryption key?
In which of the following characteristics of security policy should the policy either apply to or explicitly exclude all possible situations?
Which of the following firewalls follows the sequence of packets and their conditions from one to another to foil such an attack?
Which of the following security design issues act(s) mapping control(s) to the vulnerabilities identified in the policy and requirements?
Which of the following fields tells what privacy enhancement services have been applied?
Which of the following is a firewall that simulates the proper effects of an application so that the application receives only requests to act properly?
In which of the following characteristics of security policy should the policy be succinct, clear and direct?
Which of the following is an open encryption and security specification designed to protect credit card transactions on the internet?
Which of the following firewalls receives protocol data units, interprets them and passes through the same or different protocol data units that achieves either the same result or a modified result?
Which of the following security design issues describes the status of security at the time of the plan?