Question 1: The TLS record protocol performs the following operations EXCEPT:
Select one:
A. Establishing TLS session
B. Appending a TLS header to the data
C. Fragmenting application data
D. Encrypting application data
Solution: Establishing TLS session
Question 2: Which of the following is NOT a characteristic of network application?
Select one:
A. The application must be assigned a port number
B. The application needs to implement a communication protocol
C. The application must be assigned an IP address
D. The application needs to communicate with another application over the network
Solution: The application must be assigned an IP address
Question 3: HTTP cookies allows a website to do the following EXCEPT:
Select one:
A. Keep track of user's activities on the website
B. Provide content based on user's identify
C. Identify the IP address of the user's machine
D. Maintain user login session
Solution: Identify the IP address of the user's machine
Question 4: What is the use of the Message Authentication Code (MAC) in TLS?
Select one:
A. To ensure the data is not modified during transit
B. To ensure the data is compressed to a smaller size
C. To ensure the data cannot be read during transit
D. To ensure an attacker cannot spoof the IP address of the sender
Solution: To ensure the data is not modified during transit
Question 5: Which of the following application protocols send its data in clear text?
Select one:
A. HTTPS
B. SCP
C. SFTP
D. FTP
Solution: FTP
Question 6: Which of the following statements best describe the port forwarding feature of SSH?
Select one:
A. It enables secure data transmission of any network application
B. It enables a port number of an application to be transferred to another application
C. It enables the port number on a host to be transferred to another host
D. It enables the forwarding of data from one host to another
Solution: It enables secure data transmission of any network application
Question 7: Which of the following is NOT true when HTTPS is used?
Select one:
A. HTTP cookies can no longer be sniffed
B. An HTTP header line indicating the use of HTTPS will be added to the header HTTP header
C. Password transmitted using form-based authentication can no longer be sniffed
D. HTTP header is encrypted
Solution: An HTTP header line indicating the use of HTTPS will be added to the header HTTP header
Question 8: HTTPS is the combination of which protocols?
Select one:
A. HTTP + TLS
B. HTTP + SSH
C. TLS + SSL
D. HTTP + TLS + SSH
Solution: HTTP + TLS
Question 9: Which of the following is NOT the function of a Web proxy?
Select one:
A. To enable faster Web browsing
B. To block illegal websites
C. To log browsing activities of users in an organization
D. To prevent malware from being downloaded during Web browsing
Solution: To prevent malware from being downloaded during Web browsing
Question 10: The use of digital certificate in HTTPS ensures which of the following security properties?
Select one:
A. Authenticity of the server
B. Confidentiality of the HTTP messages
C. Integrity of the HTTP messages
D. Availability of the server
Solution: Authenticity of the server
Question 11: Which of the following command line tools can be used to invoke DNS service to convert Internet hostname to IP address? Check all that apply.
Select one or more:
A. nslookup
B. netstat
C. dig
D. ifconfig
Solution: nslookup
dig
Question 12: What are the security services provided by HTTPS? Check all that apply.
Select one or more:
A. Confidentiality
B. Availability
C. Integrity
D. Authenticity
Solution: Confidentiality
Integrity
Authenticity
Question 13: Which of the following services cause data transmission in TCP to be slightly slower than in UDP? Check all that apply.
Select one or more:
A. Process-to-process delivery
B. Error detection
C. Reliable data transfer
D. Congestion control
Solution: Reliable data transfer
Congestion control
Question 14: In order to allow browsing of both HTTP and HTTPS websites, which of the following port number(s) need to be allowed by the firewall? Choose all that apply.
Select one or more:
A. 22
B. 21
C. 80
D. 443
Solution: 80
443
Question 15: Which of the following application-layer protocols utilize the SSH protocol? Check all that apply.
Select one or more:
A. SFTP
B. SHTTP
C. SMTP
D. SCP
Solution: SFTP
SCP
No comments:
Post a Comment