MCQOPTIONS
Saved Bookmarks
This section includes 7 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Loopback address is given by: |
| A. | 0.0.0.0 |
| B. | 127.x.x.x |
| C. | 255.255.255.255 |
| D. | None of the mentioned |
| Answer» C. 255.255.255.255 | |
| 2. |
When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges. Which type of Wireless network threat would you classify this under? |
| A. | Identity Theft |
| B. | Man in the middle attack |
| C. | Network Injection |
| D. | Accidental Association |
| Answer» B. Man in the middle attack | |
| 3. |
SSID stands for |
| A. | Secure Service Identifier |
| B. | Secure Set Independent Device |
| C. | Secure Set Identifier |
| D. | Service Set Independent Device |
| Answer» D. Service Set Independent Device | |
| 4. |
An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL. |
| A. | 40; 80 |
| B. | 60; 620 |
| C. | 80; 443 |
| D. | 620; 80 |
| Answer» D. 620; 80 | |
| 5. |
In the SSL record protocol operation pad_1 is : |
| A. | is the byte 0x36 repeated 40 times for MD5 |
| B. | is the byte 0x5C repeated 40 times for MD5 |
| C. | is the byte 0x5C repeated 48 times for SHA-1 |
| D. | is the byte 0x36 repeated 48 times for MD5 |
| Answer» E. | |
| 6. |
In terms of Web Security Threats, Impersonation of another user is a Passive Attack. |
| A. | True |
| B. | False |
| Answer» C. | |
| 7. |
In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively. |
| A. | Select, Alarm |
| B. | Alert, Alarm |
| C. | Warning, Alarm |
| D. | Warning, Fatal |
| Answer» E. | |