Top 80+ Solved Internet Security MCQ Questions Answer
Q. In ______, there is a single path from the fully trusted authority to any certificate.
a. x509
b. pgp
c. kdc
d. none of the above
Q. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
a. list of protocols
b. cipher suite
c. list of keys
d. none of the above
Q. A ______ provides privacy for LANs that must communicate through the global Internet.
a. vpp
b. vnp
c. vnn
d. vpn
Q. IPSec in the ______ mode does not protect the IP header.
a. transport
b. tunnel
c. either (a) or (b)
d. neither (a) nor (b)
Q. ________ provides privacy, integrity, and authentication in e-mail.
a. ipsec
b. ssl
c. pgp
d. none of the above
Q. In _____, there can be multiple paths from fully or partially trusted authorities.
a. x509
b. pgp
c. kdc
d. none of the above
Q. In _______, the cryptographic algorithms and secrets are sent with the message.
a. ipsec
b. ssl
c. tls
d. pgp
Q. ______ is designed to provide security and compression services to data generated from the application layer.
a. ssl
b. tls
c. either (a) or (b)
d. both (a) and (b)
Q. _______ provide security at the transport layer.
a. ssl
b. tls
c. either (a) or (b)
d. both (a) and (b)
Q. A _______ layer security protocol provides end-to-end security services for applications.
a. data link
b. network
c. transport
d. none of the above
Q. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
a. secret
b. public
c. either (a) or (b)
d. both (a) and (b)