What does SSL stands for ?
System socket layer
Secure system login
Secure socket layer
Secure system login

1 Answer

Answer :

Secure socket layer

Related questions

Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b

Last Answer : A. firewall

Description : What is SSL (Secure Sockets Layer)? (easy words)

Last Answer : answer:Easy words. SSL is a method of scrambling (or encrypting) web communications so that the only people that can read it are the sender and the receiver. To everyone else it is gobbledegook. - It is more complicated than that, of course.

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None

Last Answer : C. Hyper Text Transfer Protocol Secure

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : Which of the following system calls results in the sending of SYN packets? a. socket b. bind c. listen d. connect

Last Answer : d. connect

Description : Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API a. listen, accept, bind recv b. bind, listen, accept, recv c. bind, accept, listen, recv d. accept, listen, bind, recv

Last Answer : b. bind, listen, accept, recv

Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine

Last Answer : a. socket

Description : Socket-style API for windows is called ____________ a. wsock b. winsock c. wins d. sockwi

Last Answer : b. winsock

Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine

Last Answer : a. socket

Description : Socket-style API for windows is called ____________ a. wsock b. winsock c. wins d. sockwi

Last Answer : b. winsock

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Match the following Layers and Protocols for a user browsing with SSL: a. Application of layer i. TCP b. Transport layer ii. IP c. Network layer iii. PPP d. Datalink layer iv. HTTP

Last Answer : Answer: 1

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure

Last Answer : b. Path

Description : Name four factors needed for a secure network.

Last Answer : Privacy: The sender and the receiver expect confidentiality. Authentication: The receiver is sure of the sender's identity and that an imposter has not sent the message. Integrity: The data ... -Reputation: The receiver must able to prove that a received message came from a specific sender.

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : S/MIME in Internet technology stands for (A) Secure Multipurpose Internet Mail Extension (B) Secure Multimedia Internet Mail Extension (C) Simple Multipurpose Internet Mail Extension (D) Simple Multimedia Internet Mail Extension

Last Answer : (A) Secure Multipurpose Internet Mail Extension

Description : SRS stands for ? Software requirement specification Software requirement solution System requirement specification None of Above

Last Answer : Software requirement specification

Description : SDLC stands for ? Software design life cycle Software development life cycle System design life cycle System development life cycle

Last Answer : Software development life cycle

Description : MSI stands for a. Medium Scale Integrated Circuits b. Medium System Integrated Circuits c. Medium Scale Intelligent Circuit d. Medium System Intelligent Circuit

Last Answer : Medium Scale Integrated Circuits

Description : OSI stands for __________ a) open system interconnection b) operating system interface c) optical service implementation d) open service Internet

Last Answer : a) open system interconnection

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : Transport layer is implemented in _________ a. End system b. NIC c. Ethernet d. Signal transmission

Last Answer : a. End system

Description : Application layer is implemented in _______ a. End system b. NIC c. Ethernet d. Packet transport

Last Answer : a. End system

Description : A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system

Last Answer : b) protocol stack

Description : Application layer is implemented in ____________ a) End system b) NIC c) Ethernet d) Packet transport

Last Answer : a) End system

Description : A layer of the OSI model on one system communicates with the layer of its peer system. a. above b. same c. below d. None

Last Answer : b. same

Description : A… ................is an implementation of the same protocol in the equivalent layer on aremote system. a. Physical layer b. peer c. protocol stack d. layer

Last Answer : b. peer

Description : RAD stands for ? Rapid Application Development Relative Application Development Ready Application Development Repeated Application Development

Last Answer : Rapid Application Development

Description : ASCII stands for a. American Stable Code for International Interchange b. American Standard Case for Institutional Interchange c. American Standard Code for Information Interchange d. American Standard Code for Interchange Information

Last Answer : American Standard Code for Information Interchange

Description : EBCDIC stands for a. Extended Binary Coded Decimal Interchange Code b. Extended Bit Code Decimal Interchange Code c. Extended Bit Case Decimal Interchange Code d. Extended Binary Case Decimal Interchange Code

Last Answer : Extended Binary Coded Decimal Interchange Code

Description : MICR stands for a. Magnetic Ink Character Reader b. Magnetic Ink Code Reader c. Magnetic Ink Cases Reader d. None

Last Answer : Magnetic Ink Character Reader

Description : WAN stands for a. Wap Area Network b. Wide Area Network c. Wide Array Net d. Wireless Area Network

Last Answer : Wide Area Network

Description : CD-ROM stands for a. Compactable Read Only Memory b. Compact Data Read Only Memory c. Compactable Disk Read Only Memory d. Compact Disk Read Only Memory

Last Answer : Compact Disk Read Only Memory

Description : ARQ stands for _______. A) Automatic repeatquantization B) Automatic repeat request C) Automatic retransmissionrequest D) Acknowledge repeat request

Last Answer : Automatic repeat request

Description : FDDI stands for A) Fiber Distributed Data Interface B) Fiber Data Distributed Interface C) Fiber Dual Distributed Interface D) Fiber Distributed Data Interface

Last Answer : A) Fiber Distributed Data Interface

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : ARQ stands for __________ a. Automatic Repeat Request b. Automatic Request Repeat c. Application Repeat Request d. Application Request Repeat

Last Answer : a. Automatic Repeat Request

Description : FCP stands for _________ a. Fiber Channel Protocol b. Field Channel Protocol c. Fast Channel Protocol d. Fiber Carrying Protocol

Last Answer : a. Fiber Channel Protocol

Description : The term IPv4 stands for? a. Internet Protocol Version 4 b. Internet Programming Version 4 c. International Programming Version 4 d. None of these

Last Answer : a. Internet Protocol Version 4

Description : DDP stands for _________ a. Datagram Delivery Protocol b. Device Delivery Protocol c. Datagram Device Protocol d. Device Datagram Protocol

Last Answer : a. Datagram Delivery Protocol

Description : RIP stands for ________ a. Reduced Information Protocol b. Routing Internet Protocol c. Routing Information Protocol d. Reduced Internet Protocol

Last Answer : c. Routing Information Protocol