Q1. Testing from an external network with no prior knowledge of the internal networks and systems is referred to as __________.
Q2. The transport layer in the TCP/IP model does two things. One is to package the data given out by applications to a format that is suitable for transport over the network, and the other is to:
Q3. The network or the internet layer in the TCP/IP model is for internet working. This layer has A group of:
Q4. Which one of the following services does Domain Name System Security Extensions (DNSSEC) not provide?
Q5. Which check does Wired Equivalent Privacy (WEP) use for integrity assurance?
Q6. Kerberos provides which of the following:
Q7. Biba model focuses on data integrity. A simple way to remember this model is:
Q8. A security mechanism to control the communication between entities that are labeled lower sensitive and high sensitive is known as what?
Q9. One of the popular methods to authenticate the sender using sender's public key is known as what?
Q10. Which one of the following is not a Denial-of-Service (DoS) attack?
Q11. In a Trusted Computer System (TCS), which one of the following is a security mechanism that controls the communication between entities that are labeled as low sensitive and high sensitive?
Q12. Secret Key Cryptography is denoted as what?
Q13. Domain Name System (DNS) maintains records to resolve host names to IP addresses. For faster resolving of addresses, the browser stores data of the resolved IP addresses in a temporary memory. Which of the following attacks could most likely compromise such a mechanism to redirect user request to illegitimate addresses?
Q14. Identify the correct statements pertaining to the primary purpose of cryptography?
Q15. When a plaintext is Exclusively-ORed (XORed) with the previous block of ciphertext, then the mode is called what?