IPSecurity - Computer Networks Questions & Answers - Sanfoundry
IPSecurity - Computer Networks Questions & Answers - Sanfoundry
IPSecurity - Computer Networks Questions & Answers - Sanfoundry
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“IPSecurity”.
Answer: b
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and
confidentiality between two machines in an IP network. In the TCP/IP model, it provides
security at the IP layer i.e. the network layer.
advertisement
c) IP payload
d) IP trailer
View Answer
Answer: a
Explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire
packet between the IPSec endpoints. Using encryption, it provides secure communication
between the two endpoints.
Answer: d
Explanation: AH ensures that there is no retransmission of data from an unauthorized source,
and protects against data tampering. ESP provides with content protection and ensures that
there is integrity and confidentiality for the message. IKE is used to make sure that only the
intended sender and receiver can access the message.
advertisement
Answer: c
Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and
firms with strong data security and protection for their wireless networks (WiFi) to give them
confidence that only authorized users can access their network.
5. An attempt to make a computer resource unavailable to its intended users is called ______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
View Answer
Answer: a
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network
by using a certain method that ensures that an essential network resource is unavailable to
the victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding
and connection flooding.
advertisement
Answer: b
Explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to
https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity/ 3/7
11/21/21, 7:35 PM IPSecurity - Computer Networks Questions & Answers - Sanfoundry
connect a network node to the Internet. It designed through extending the methods used by
the Point-to-Point Protocol for authentication.
Answer: b
Explanation: PGP is an encryption method used in e-mail security to encrypt and decrypt the
content of an e-mail transmitted over the internet. It makes sure that the message cannot be
stolen by other unauthorized users.
advertisement
Answer: a
Explanation: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP
used the cipher method BassOmatic.
9. When a DNS server accepts and uses incorrect information from a host that has no authority
giving that information, then it is called _________
https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity/ 4/7
11/21/21, 7:35 PM IPSecurity - Computer Networks Questions & Answers - Sanfoundry
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
View Answer
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid
credentials from a victim by spoofing the intended resource, and tricking the victim to give
his/her valid authorization credentials.
advertisement
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
advertisement
https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity/ 5/7
11/21/21, 7:35 PM IPSecurity - Computer Networks Questions & Answers - Sanfoundry
Recommended Articles:
1. Computer Networks Questions & Answers – Virtual Private Networks
2. Computer Networks Questions & Answers – AH and ESP Protocols
3. Computer Networks Questions & Answers – Security In The Internet
4. Computer Networks Questions & Answers – Reference Models – 2
5. Computer Networks Questions & Answers – Wireless LAN
6. Computer Networks Questions & Answers – Reference Models – 1
7. Computer Networks Internship
8. Computer Networks Questions & Answers – PPP
9. Computer Networks Questions & Answers – SONET
10. Computer Networks Questions & Answers – Datagram Networks
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at
Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency
developments in these areas. He lives in Bangalore and delivers focused training sessions to IT
https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity/ 6/7
11/21/21, 7:35 PM IPSecurity - Computer Networks Questions & Answers - Sanfoundry
Name*
Email*
Subscribe
https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity/ 7/7