Multiple Choice Questions
One of the outcomes of the IKE v1 Phase 1 is __________ .
a) an IPsec SA
b) an IKE SA
c) Traffic selectors
d) Session ID
Which of the following is a characteristic of a bastion host?
a) It has one and only one network interface.
b) It is located in the most secure area of a network.
c) It implements application filtering.
d) It is a computer running an action role-playing video game.
Which of the following is a characteristic of a leased line?
a) A leased line connects the two end entities by a virtual private network.
b) A leased line connection goes through public networks.
c) The networks connected via a leased can use the same IP network
d) The ISP from which a leased line is leased has complete control over the
operation of the connection.
Why do misuse intrusion detection methods produce less false positive detections?
a) Misuse intrusion detection methods can accurately detect deviations from
b) Signatures for known intrusions are reliable.
c) Intruder has no evasion methods to use to evade misuse intrusion
d) Misuse intrusion detection methods are more complex than other intrusion
Which of the following provides authenticity protection of a message in SSL?
a) A keyed-hash of the message and the sender’s MAC write secret.
b) A keyed-hash of the message and the sender’s write secret.
c) A keyed-hash of the message and the sender’s master secret.
d) A digital signature of a message signed by the sender.
In SNMP, which of the following is true about an authoritative engine?
a) An authoritative engine always sends the first message in an SNMP
b) An authoritative engine has complete control of an SNMP session.
c) An authoritative engine’s message must be replied.
d) An authoritative engine is the receiver of a message if the message expects
Which one of the following is true about Open System Authentication?
a) It consists of 3 messages.
b) Authentication is by exchanging a keyed-hash.
c) Authentication is always successful.
d) It is used by a client authenticating an AP.
Which of the following is a characteristic of the counter mode of operation of a block
a) A counter value is used to create a one-time encryption key.
b) A counter is used to count the number of plaintext blocks.
c) A counter is used to count the number of ciphertext blocks.
d) It is a cipher chaining mode to link adjacent ciphertext blocks.
本网站支持 Alipay WeChatPay PayPal等支付方式
E-mail: firstname.lastname@example.org 微信号:vipnxx