Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer

From 91 to 105 of 268

Q. The RSA signature uses which hash algorithm?

a. md5

b. sha-1

c. md5 and sha-1

d. none of the mentione

  • c. md5 and sha-1

Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

a. 42 bytes

b. 32 bytes

c. 36 bytes

d. 48 bytes

  • c. 36 bytes

Q. The certificate_request massage includes two parameters, one of which is-

a. certificate_extension

b. certificate_creation

c. certificate_exchange

d. certificate_type

  • d. certificate_type

Q. The client_key_exchange message uses a pre master key of size –

a. 48 bytes

b. 56 bytes

c. 64 bytes

d. 32 bytes

  • a. 48 bytes

Q. In the handshake protocol which is the message type first sent between client and server ?

a. server_hello

b. client_hello

c. hello_request

d. certificate_request

  • b. client_hello

Q. Network layer firewall works as a

a. frame filter

b. packet filter

c. content filter

d. virus filter

  • b. packet filter

Q. Network layer firewall has two sub- categories as                    

a. state full firewall and stateless firewall

b. bit oriented firewall and byte oriented firewall

c. frame firewall and packet firewall

d. network layer firewall and session layer firewall

  • a. state full firewall and stateless firewall

Q. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

a. chock point

b. meeting point

c. firewall point

d. secure point

  • a. chock point

Q. Which of the following is / are the types of firewall?

a. packet filtering firewall

b. dual homed gateway firewall

c. screen host firewall

d. dual host firewall

  • a. packet filtering firewall

Q. A proxy firewall filters at                    

a. physical layer

b. data link layer

c. network layer

d. application layer

  • d. application layer

Q. A packet filter firewall filters at

a. physical layer

b. data link layer

c. network layer or transport layer

d. application layer

  • c. network layer or transport layer

Q. What is one advantage of setting up a DMZ with two firewalls?

a. you can control where traffic goes in three networks

b. you can do stateful packet filtering

c. you can do load balancing

d. improved network performance

  • c. you can do load balancing

Q. Which one of the following is not an application layer protocol used in internet?

a. remote procedure call

b. internet relay chat

c. resource reservation protocol

d. local procedure call

  • c. resource reservation protocol
Subscribe Now

Get All Updates & News