Sample questions
Q1. Spoofing is a type of:
- Vulnerability
- Masquerading
- Protocol
- Layer in a TCP/IP model
Q2. An attack is a:
- Threat
- Vulnerability
- Technique
- Protocol
Q3. Transport layer security and secure sockets layer are not:
- Protocols
- Cryptographic algorithms
- Vulnerabilities
- Use encryption
Q4. Replay attacks are used to:
- Gain unauthorized access to the application systems
- Resolve domain names
- Break cryptographic keys
- Setup secure connections
Q5. Internet Protocol (IP) operates in:
- Physical layer
- Network layer
- Application layer
- Communication layer
Q6. Border Gateway Protocol is a:
- Physical layer protocol
- Address Resolution Protocol
- Routing Protocol
- LAN technology
Q7. Multi Protocol Label Switching (MPLS) is often referred to as:
- Application Layer Protocol
- Layer 2.5 protocol
- Layer 3 protocol
- Layer 3.5 protocol
Q8. IPsec is a set of protocols that are used to secure Internet communications. Which of the following is not a key function of the protocol?
- Authentication
- Encryption
- Key exchange
- Key modification