• Post author:
  • Post category:Computer

1231. Network layer firewall work as a :

A. Frame Filter
B. Packet Filter *
C. Both A and B
D. None of the above

1232. Network Layer firewall has to sub categories as :

A. Stateful firewall and stateless firewall *
B. Bit oriented firewall and byte oriented firewall
C. Frame firewall and packet firewall
D. None of the mentioned

1233. WPA2 is used for security in :

A. Ethernet
B. Bluetooth
C. Wi-Fi *
D. None of the above

1234. An attempt to make a computer resource unavailable to its intended users is called :

A. Denial-of-service attack *
B. Virus attack
C. Worms attack
D. Botnet process

1235. Extensible authentication protocol is authentication frame work frequently used in :

A. Wired personal area network
B. Wireless networks *
C. Wired local area network
D. None of the above

1236. Pretty good privacy (PGP) is used in :

A. Browser security
B. Email security *
C. FTP security
D. None of the mentioned

1237. PGP encrypts data by using a block cipher called :

A. International data encryption algorithm *
B. Private data encryption algorithm
C. Internet data encryption algorithm
D. None of the above

1238. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information then it is called :

A. DNS lookup
B. DNS Hijacking
C. DNS Spoofing *
D. None of the above

1239. Which of the following delay is faced by the packet in travelling from one end system to another ?

A. Propagation delay
B. Queuing delay
C. Transmission Delay
D. All of the above *

1240. For a 10Mbps ethernet link , if the length of the packet is 32 bits, the transmission delay is ( in milliseconds) :

A. 3.2 *
B. 32
C. 0.32
D. None of the above