Sample questions
Q1. Spoofing is a type of:
Vulnerability
Masquerading
Protocol
Layer in a TCP/IP model
Q2. An attack is a:
Threat
Vulnerability
Technique
Protocol
Q3. Transport layer security and secure sockets layer are not:
Protocols
Cryptographic algorithms
Vulnerabilities
Use encryption
Q4. Replay attacks are used to:
Gain unauthorized access to the application systems
Resolve domain names
Break cryptographic keys
Setup secure connections
Q5. Internet Protocol (IP) operates in:
Physical layer
Network layer
Application layer
Communication layer
Q6. Border Gateway Protocol is a:
Physical layer protocol
Address Resolution Protocol
Routing Protocol
LAN technology
Q7. Multi Protocol Label Switching (MPLS) is often referred to as:
Application Layer Protocol
Layer 2.5 protocol
Layer 3 protocol
Layer 3.5 protocol
Q8. IPsec is a set of protocols that are used to secure Internet communications. Which of the following is not a key function of the protocol?
Authentication
Encryption
Key exchange
Key modification