Friday, April 10, 2015

Network security Quiz 3

1.Signature matching techniques are not capable to detect metamorphic malwares.

Select one:
True{correct}
False

2.ESP provides both message content confidentiality and authentication.

Select one:
True {correct}
False

3.DSA security level is 120 bit.

Select one:
True
False{correct}

4.Signature matching technique can be used to detect metamorphic malware.

Select one:
True
False{correct}

5.Digital signature only provide non-repudiation.

Select one:
True
False {correct}

6.In key agreement two or more parties jointly generate a secret key.

Select one:
True {correct}
False

7.In PGP signature is generated after encryption.

Select one:
True
False{correct}

8.In PGP signature is generated before encryption.

Select one:
True {correct}
False

9.SSL/TLS works below the TCP layer

Select one:
True
False{correct}

10.Kerberos is not scalable.

Select one:
True
False{correct}

11.SSL provides security at IP layer.

Select one:
True
False {correct} //at application layer

12.Default BLOCK/DROP action is good to set in firewall.

Select one:
True
False {correct}

13.RSA signature verification is less efficient then DSA.

Select one:
True
False{correct}

14.SSL is originally designed by google.

Select one:
True
False{correct} // by netscape

15.Without certificate Diffe-Hellman key exchange is vulnerable to MIM attack.
Select one:
True {correct}
False

16.Digital signature only provide Authentication.

Select one:
True
False{correct}

17.S/MIME provides security at application layer.

Select one:
True{correct}
False

18.In key agreement one party generates and distributes a secret key.

Select one:
True
False{correct}

19.In key transport two or more parties jointly generate a secret key.

Select one:
True
False{correct}

20.AH provides message content confidentiality.

Select one:
True
False{correct}

21.Default ACCEPT action is good to set in firewall.
Select one:
True
False{correct}

22.RSA signature verification is more efficient then DSA.

Select one:
True{correct}
False

23.Firewalls insulates the internal network from external network.

Select one:
True{correct}
False

24.Modulus of the DHKE can be a composite number.

Select one:
True
False{correct}

25.In key transport one party generates and distributes a secret key.

Select one:
True{correct}
False

1 comment:

  1. Hi, Any reference for this answer ?
    Default BLOCK/DROP action is good to set in firewall

    ReplyDelete