Thursday, 10 October 2019

Multiple Choice Questions

MCQ's on Network Security and Web security


  1. 1. Network layer firewall works as a
    a) Frame filter                                                                                   b) Packet filter
    c) Both Frame as well as Packet filter                                            d) None of the mentioned


    2)Which of the following is/are types of firewall?
    a)Packet filtering firewall                                                              b)Application/proxy firewall
    c)Both a and b                                                                                d)None of the above

    3)The reference model enforce _____ security rule.
    a)read up                                                                                        b)no read up
    c)read down                                                                                    d)no read down


    4)_____ is a buffer zone between internet and secure intranet.
    a)Kerberoes                                                                                   b)De Militarized zone
    c)Firewall                                                                                       d)None of the above

    5)_____ is a logical grouping of network users and resources.
    a)VLAN                                                                                          b)VPN
    c)Tunneling                                                                                    d)None of the above


    6)____ protocol works in transport mode or tunnel mode.
    a)Http                                                                                                      b)smtp
    c)IPsec                                                                                                     d)Https

                                                                                      
    7)___ is a person who attempts to gain unauthorized access to a network.
    a)Intruder                                                                                 b)hacker
    c)Developer                                                                             d)tester


    8)Which are the types of host based intrusion detection system?
    a)File system monitor                                                               b)Log file analysis
    c)Connection analysis                                                                d)All of the above


    9)___ protocol is designed to provide security and compression service to data generated from application layer.
    a)SSL                                                                                       b)IPV4
    c)IPV6                                                                                      d)MIME

    10)Which are the services provided by SSL?
    a)Fragmentation                                                                       b)Framing
    c)Message integrity                                                                 d)All of the above


    11)Which of the following are not SET participant?
    a)Card holder                                                                               b)Acquirer
    c)Issuer                                                                                          d)server


    12)In SSL merchant is liable in case of customer fraud.
    a)True                                                                                        b)False