Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer
Q. The RSA signature uses which hash algorithm?
a. md5
b. sha-1
c. md5 and sha-1
d. none of the mentione
Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
a. 42 bytes
b. 32 bytes
c. 36 bytes
d. 48 bytes
Q. The certificate_request massage includes two parameters, one of which is-
a. certificate_extension
b. certificate_creation
c. certificate_exchange
d. certificate_type
Q. The client_key_exchange message uses a pre master key of size –
a. 48 bytes
b. 56 bytes
c. 64 bytes
d. 32 bytes
Q. In the handshake protocol which is the message type first sent between client and server ?
a. server_hello
b. client_hello
c. hello_request
d. certificate_request
Q. Network layer firewall works as a
a. frame filter
b. packet filter
c. content filter
d. virus filter
Q. Network layer firewall has two sub- categories as
a. state full firewall and stateless firewall
b. bit oriented firewall and byte oriented firewall
c. frame firewall and packet firewall
d. network layer firewall and session layer firewall
Q. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
a. chock point
b. meeting point
c. firewall point
d. secure point
Q. Which of the following is / are the types of firewall?
a. packet filtering firewall
b. dual homed gateway firewall
c. screen host firewall
d. dual host firewall
Q. A proxy firewall filters at
a. physical layer
b. data link layer
c. network layer
d. application layer
Q. A packet filter firewall filters at
a. physical layer
b. data link layer
c. network layer or transport layer
d. application layer
Q. What is one advantage of setting up a DMZ with two firewalls?
a. you can control where traffic goes in three networks
b. you can do stateful packet filtering
c. you can do load balancing
d. improved network performance
Q. A firewall needs to be so that it can grow proportionally with the network that it protects.
a. robust
b. expansive
c. fast
d. scalable
Q. Which one of the following is not an application layer protocol used in internet?
a. remote procedure call
b. internet relay chat
c. resource reservation protocol
d. local procedure call
Q. Which protocol assigns IP address to the client connected in the internet?
a. dhcp
b. ip
c. rpc
d. rsvp