Filters
Question type

Study Flashcards

IPSec provides ....protocols for network layer


A) 7
B) 3
C) 1
D) 4

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Internet Key Exchange has .... phases and modes of operations


A) 4
B) 3
C) 2
D) 5

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

C

length of the IPv4 address is ....


A) 32 bits
B) 64 bits
C) 16 bits
D) 128 bit

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____________________________  means the protection of data from modification by unknown users.


A) confidentiality
B) integrity
C) authentication
D) non-repudiation

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

CIA triad is also known as ____________________________   


A) nic (non-repudiation, integrity, confidentiality)
B) aic (availability, integrity, confidentiality)
C) ain (availability, integrity, non-repudiation)
D) aic (authenticity, integrity, confidentiality)

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

SSL provides .


A) message integrity
B) confidentiality
C) compression
D) all of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

D

Data integrity gets compromised when and are taken control off.


A) access control, file deletion
B) network, file permission
C) access control, file permission
D) network, system

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

length of the IPv6 header is....


A) 64 bits
B) 16 bits
C) 32 bits
D) 8 bits

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

When integrity is lacking in a security system, __________________________________________  occurs.


A) database hacking
B) data deletion
C) data tampering
D) data leakage

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

When you use the word it means you are protecting your data from getting disclosed.


A) confidentiality
B) integrity
C) authentication
D) availability

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?


A) confidentiality
B) integrity
C) authenticity
D) availability

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

______________is used for encrypting data at network level


A) ipsec
B) https
C) smtp
D) s/mime

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Data is used to ensure confidentiality.


A) encryption
B) locking
C) deleting
D) backup

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Transport layer Protocol consists of ... main components


A) 2
B) 1
C) 3
D) 4

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

IPSec operates in..... different modes


A) 3
B) 2
C) 4
D) 5

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

SET stands for


A) set electronic transaction
B) secure electronic transaction
C) simple electronic transaction
D) none of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

This helps in identifying the origin of information and authentic user. This referred to here as __________________________________________


A) confidentiality
B) integrity
C) authenticity
D) availability

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

WPA2 is used for security in ____________________________   


A) ethernet
B) wi-fi
C) bluetooth
D) e-mail

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?


A) they help understanding hacking better
B) they are key elements to a security breach
C) they help understands security and its components better
D) they help to understand the cyber-crime better

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A) True
B) False

Correct Answer

verifed

verified

True

Showing 1 - 20 of 24

Related Exams

Show Answer