Sample Quiz Part 5 PDF
Document Details
Uploaded by FeatureRichWetland9191
DR M Y Siyal
Tags
Summary
This document is a sample quiz covering topics related to network security, including TLS, firewalls, and intrusion detection. The quiz comprises multiple-choice questions.
Full Transcript
1. The most complex part of TLS is the __________. a. signature b. message header c. payload d. handshake protocol 2. _______ is a list that contains the combinations of cryptographic algorithms supported by the client a. Compression method b. Session ID...
1. The most complex part of TLS is the __________. a. signature b. message header c. payload d. handshake protocol 2. _______ is a list that contains the combinations of cryptographic algorithms supported by the client a. Compression method b. Session ID c. Cipher Suite d. All of the above 3. The SSL record protocol provides two services for SSL/TLS connection: message integrity and _________ a. Confidentiality b. Availability c. Authentication d. None of the above DR M Y Siyal Q5-1 4. The _________ is used to convey SSL-related alerts to the peer entity a. alert protocol b. digital signature c. Digital certificate d. None of the above 5. Most browsers come equipped with TLS/SSL and most Web servers have implemented the protocol a. TRUE b. FALSE 6. The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function. a. TRUE b. FALSE 7. A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context a. TRUE b. FALSE DR M Y Siyal Q5-2 8. The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks. a. Firewall b. Session ID c. IP protocol field d. All of the above 9. A _________ applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. a. packet filtering firewall b. IP protocol field c. Both of the above d. None of the above 10. An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________. a. spoofing b. authentication c. generation d. None of the above DR M Y Siyal Q5-3 11. A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side a. personnel b. poxy server c. application-level gateway d. None of the above 12. The firewall can protect against attacks that bypass the firewall a. TRUE b. FALSE 13. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. a. TRUE b. FALSE 14. Signature-based approaches attempt to define normal, or expected behavior, whereas anomaly approaches attempt to define proper behavior a. TRUE b. FALSE DR M Y Siyal Q5-4 15. A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity a. host-based IDS b. security intrusion c. network-based IDS d. None of the above 16.A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity a. host-based IDS b. security intrusion c. network-based IDS d. None of the above 17.__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behaviour is that of an intruder. a. Profile based detection b. Signature detection c. Threshold detection d. Anomaly detection DR M Y Siyal Q5-5 18. _________ involves the collection of data relating to the behavior of legitimate users over a period. a. Profile based detection b. Signature detection c. Threshold detection d. Anomaly detection DR M Y Siyal Q5-6