Network security
Share your result
View the answers below
Want to improve this app? Please:
REVIEW & RATE NOW
QUESTION 1:
Which network security protocol will encrypt the connection between a web browser and a web server?
HTTP
SSH
SSL
SFTP
QUESTION 2:
A protocol which forms part in the IPSec is?
Secure Socket Layer (SSL)
Security Header (SH)
Password Header (PH)
Authentication Header (AH)
QUESTION 3:
AES stands for what?
Advanced Encryption Security
Advanced Encryption Standard
Automated Encryption Security
Automated Encryption Standard
QUESTION 4:
Give an example of an insecure password?
spiderman
banana//**2014
matrix88matrix**
password2014
QUESTION 5:
A method of security which requires a user to input their username and password to get access to a server is?
Kerberos
RADIUS
PKI
PPPoE
QUESTION 6:
Which type of attack will normally flood a person's network to affect his/her system?
Ping of death
Ping
Phishing
Ping of hell
QUESTION 7:
Give a basic role of a firewall?
It identifies a virus and delete it
It scans your computer and delete spywares
It filters your network packets to prevent intruders
It scans your network to search for connection issue
QUESTION 8:
Which protocol is better for online shopping?
HTTPS
SSH
SFTP
VPN
QUESTION 9:
What is the basic functionality of Access Control List (ACL)?
It controls which files you can install on your computer
It filters which IP addresses can be connected to the network
It gives access to the user to authenticate
It has a list of who can use the file server
QUESTION 10:
What is the role of an IP proxy?
It hides your IP address
It secures your computer by converting binary to IP
It is a server which scans proxy connections
It is a server which gives IP addresses to hosts
QUESTION 11:
An attacker is using a fake source address which is similar to the network he/she is attacking. What kind of network attack it is?
IP spoofing
Network mapping attack
Tribe Flood Network (TFN)
Smurf
QUESTION 12:
A hacker has penetrated into your network and is accessing data. What kind of network attack it is?
Phishing
Man in the middle
Backdoors
Cross-Site Scripting (XSS)
QUESTION 13:
You have a firewall installed on your home computer. What type of firewall it is?
Server-based firewall
Network-based firewall
Host-based firewall
Workstation-based firewall
QUESTION 14:
Access Control List (ACL) is a useful security feature. Give an example of what type of attack it can prevent?
Boot-sector virus
Smurf
Cross-Site Scripting (XSS)
Application virus
QUESTION 15:
Which hardware firewall will detect an attack but does not prevent it?
Intrusion Prevention Systems (IPS)
Intrusion Detection Services (IDS)
Intrusion Detection Systems (IDS)
Intrusion Prevention Services (IPS)
QUESTION 16:
HTTPS uses which protocol?
443
80
53
553
QUESTION 17:
A user's password has been stolen while filling a fake login page online. What kind of attack is this?
Ping of death
Cross-site Scripting (XSS)
Phishing
Man in the middle
QUESTION 18:
What are the key sizes of the Rijndael encryption?
128, 192 or 256 bits
128, 196 or 256 bits
64, 128 or 256 bits
256, 512 or 1024 bits
QUESTION 19:
A security measure to protect an online account is?
Write your password under your table so that you can remember it
Do not click on suspicious links
Disable your firewall to access the website
Always make your online shopping on a website starts with "http://" for better security
QUESTION 20:
You have a server installed in a server room. What is an appropriate physical security measure to adopt?
Use an entrance log file to register all people who are accessing the server room
Place security cameras both inside and outside the server room
Put high fencing to protect outside the server room
All of them above
Submit