Bca 6th Sem Internal Exam Network Security

15 Questions | Total Attempts: 56

SettingsSettingsSettings
Please wait...
Bca 6th Sem Internal Exam Network Security


Questions and Answers
  • 1. 
    In the SSLv3 the padding bits are ____________ with the secret key.
    • A. 

      Padded

    • B. 

      XORed

    • C. 

      Concatenated

    • D. 

      ANDed

  • 2. 
    Which of the following is not a valid input to the PRF in SSLv3?
    • A. 

      Secret value

    • B. 

      Identifying label

    • C. 

      Initialization vector

    • D. 

      Secret value

  • 3. 
    Which of the following alert codes is not supported by SSLv3?
    • A. 

      Record_overflow

    • B. 

      No_certificate

    • C. 

      Internal_error

    • D. 

      Decode_error

  • 4. 
    We encounter the record_overflow error when the payload length exceeds –
    • A. 

      214 + 1024

    • B. 

      216 + 1024

    • C. 

      214 + 2048

    • D. 

      216 + 2048

  • 5. 
    URL stands for –
    • A. 

      Universal Remote Locator

    • B. 

      Universal Resource Language

    • C. 

      Uniform Resource Locator

    • D. 

      Uniform Resource Language

  • 6. 
    _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
    • A. 

      Network Security

    • B. 

      Information Security

    • C. 

      Information Security

    • D. 

      Physical Security

  • 7. 
    From the options below, which of them is not a threat to information security?
    • A. 

      Disaster

    • B. 

      Eavesdropping

    • C. 

      Information leakage

    • D. 

      Unchanged default password

  • 8. 
    The full form of EDR is _______
    • A. 

      Endpoint Detection and recovery

    • B. 

      Early detection and response

    • C. 

      Endpoint Detection and response

    • D. 

      Endless Detection and Recovery

  • 9. 
    Possible threat to any information cannot be ________________
    • A. 

      Reduced

    • B. 

      Transferred

    • C. 

      Protected

    • D. 

      Ignored

  • 10. 
    How many basic processes or steps are there in ethical hacking?
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

  • 11. 
    There are ______ subtypes of reconnaissance.
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

  • 12. 
    To Hide Information Inside A Picture, What Technology Is Used?
    • A. 

      Rootkits

    • B. 

      Bitmapping

    • C. 

      Steganography

    • D. 

      Image Rendering

  • 13. 
    What Is The Sequence Of A TCP Connection?
    • A. 

      SYN-ACK-FIN

    • B. 

      SYN-SYN ACK-ACK

    • C. 

      SYN-ACK

    • D. 

      SYN-SYN-ACK

  • 14. 
    The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?
    • A. 

      Availability

    • B. 

      Confidentiality

    • C. 

      Integrity

    • D. 

      Authentication

  • 15. 
    What Port Does Telnet Use?
    • A. 

      22

    • B. 

      80

    • C. 

      20

    • D. 

      23

Back to Top Back to top