20 Network Security MCQ For IBPS IT Officer Exam

image_pdfimage_print

1)The secret key between members needs to be created as a ______ key when two members contact KDC.
A)public
B)session
C)complimentary
D) none of the above

2)IKE creates SAs for _____.
A)SSL
B)PGP
C)IPSec
D)VP

3) ______ provides either authentication or encryption, or both, for packets at the IP level.
A)AH
B)ESP
C)PGP
D)SSL

4)One security protocol for the e-mail system is _________.
A)IPSec
B)SSL
C)PGP
D)none of the above

5)IPSec defines two protocols: _______ and ________.
A) AH; SSL
B) PGP; ESP
C) AH; ESP
D) all of the above

6) A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers.
A)round
B)circle
C)square
D)none of the above

7)______ is the protocol designed to create security associations, both inbound and outbound.
A)SA
B)CA
C)KDC
D)IKE

8)The Internet authorities have reserved addresses for _______.
A)intranets
B)internets
C)extranets
D)none of the above

9) An _________ is a network that allows authorized access from outside users.
A)intranet
B)internet
C)extranet
D)none of the above

10) _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
A)IPSec
B)SSL
C)PGP
D)none of the above

11) In ______, there is a single path from the fully trusted authority to any certificate.
A)X509
B)PGP
C)KDC
D)none of the above

12)A ______ provides privacy for LANs that must communicate through the global Internet.
A)VPP
B)VNP
C)VNN
D)VPN

13)IPSec in the ______ mode does not protect the IP header.
A)transport
B)tunnel
C)either (a) or (b)
D)neither (a) nor (b)

14) In _______, the cryptographic algorithms and secrets are sent with the message.
A)IPSec
B)SSL
C)TLS
D)PGP

15)A _______ layer security protocol provides end-to-end security services for applications.
A)data link
B)network
C)transport
D)none of the above

16) In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
A)secret
B)public
C)either (a) or (b)
D)both (a) and (b)

17)The ________ method provides a one-time session key for two parties.
A)Diffie-Hellman
B)RSA
C)DES
D)AES

18)_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
A)AEE
B)AED
C)AER
D)AES

19)AES has _____ different configurations.
A)two
B)three
C)four
D)five

20)DES uses a key generator to generate sixteen _______ round keys.
A)32-bit
B)48-bit
C)54-bit
D)42-bit