The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL
B) ESP
C) TSL
D) PSL

1 Answer

Answer :

B) ESP

Related questions

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP

Last Answer : Answer: 1

Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : D) Both A and B

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b

Last Answer : A. firewall

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : What is an ssl encryption and how will it help my business?

Last Answer : SSL encryption is a means of transferring web data from server to pages over a secure connection. Web security experts Symantec have more information on general internet security, passwords, and encryption.

Description : What exactly is SSL encryption?

Last Answer : SSL encryption is a system that protects data. As the name implies in encrypts the data that is transferred between systems. It also checks to see whether the site is safe and will ... These are additional checks that make sure the transfer of important and sensitive data are performed securely.

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : What is the size of the 'total length' field in IPv 4 datagram ? (A) 4 bits (B) 8 bits (C) 16 bits (D) 32 bits

Last Answer : (C) 16 bits 

Description : Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification

Last Answer : (A) Type of service 

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : IP is _________ datagram protocol. A) an unreliable B) a connectionless C) botha and b D) noneof the above

Last Answer : botha and b

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : The sender is a router thathas receiveda datagram destinedfor a host on anothernetwork. The logicaladdress that must be mapped to aphysical address is ______. A) thedestination IP address in the datagram header ... address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application