a) Frame filter
b) Packet filter
c) Both Frame as well as Packet filter d)
None of the mentioned
2)Which of the following is/are types of firewall?
a)Packet filtering firewall b)Application/proxy
firewall
c)Both a and b
d)None of the above
3)The reference model enforce _____ security rule.
a)read up
b)no read up
c)read down
d)no read down
4)_____ is a buffer zone between internet and secure
intranet.
a)Kerberoes
b)De Militarized zone
c)Firewall
d)None
of the above
5)_____ is a logical grouping of network users and
resources.
a)VLAN
b)VPN
c)Tunneling d)None
of the above
6)____ protocol works in transport mode or tunnel mode.
7)___ is a person who attempts to gain unauthorized access
to a network.
a)Intruder b)hacker
c)Developer d)tester
8)Which are the types of host based intrusion detection
system?
a)File system monitor b)Log file analysis
c)Connection analysis
d)All of the above
9)___ protocol is designed to provide security and
compression service to data generated from application layer.
a)SSL b)IPV4
c)IPV6 d)MIME
10)Which are the services provided by SSL?
a)Fragmentation b)Framing
c)Message integrity d)All
of the above
11)Which of the following are not SET participant?
a)Card holder b)Acquirer
c)Issuer d)server