IPSec Interview Questions | Snaprecruit.com
IPSec Interview Questions | Snaprecruit.com
JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing
Enterprises
IPSec interview questions
IPSec interview questions
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 9
1. IPsec is designed to provide the security at the
A. Transport layer
B. Network layer
C. Application layer
D. Session layer
Show Correct Answer
Correct Answer is :
Network layer
2. In tunnel mode IPsec protects the
A. Entire IP packet
B. IP header
C. IP payload
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Entire IP packet
3. Which component is included in IP security?
A. Authentication Header (AH)
B. Encapsulating Security Payload (ESP)
C. Internet key Exchange (IKE)
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
4. WPA2 is used for security in
A. Ethernet
B. Bluetooth
C. Wi-Fi
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Wi-Fi
5. An attempt to make a computer resource unavailable to its intended users is called
A. Denial-of-service attack
B. Virus attack
C. Worms attack
D. Botnet process
Show Correct Answer
Correct Answer is :
Denial-of-service attack
6. Extensible authentication protocol is authentication framework frequently used in
A. Wired personal area network
B. Wireless networks
C. Wired local area network
D. None of the mentioned
Show Correct Answer
Correct Answer is :
FALSE
7. Pretty good privacy (PGP) is used in
A. Browser security
B. Email security
C. FTP security
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Email security
8. PGP encrypts data by using a block cipher called
A. International data encryption algorithm
B. Private data encryption algorithm
C. Internet data encryption algorithm
D. None of the mentioned
Show Correct Answer
Correct Answer is :
International data encryption algorithm
9. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
A. DNS lookup
B. DNS hijacking
C. DNS spoofing
D. None of the mentioned
Show Correct Answer
Correct Answer is :
DNS spoofing
Similar Interview Questions
Search for latest jobs
Find Jobs