MCQOPTIONS
Saved Bookmarks
This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Sc in Information Technology knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The ESP provides |
| A. | Source authentication |
| B. | Data integrity |
| C. | Privacy |
| D. | All of them |
| Answer» E. | |
| 2. |
One of the protocols to provide security at the application layer is |
| A. | Pretty Good Privacy |
| B. | Handshake Protocol |
| C. | Alert Protocol |
| D. | Record Protocol |
| Answer» B. Handshake Protocol | |
| 3. |
The SSL divides the data into blocks of |
| A. | 2*6 |
| B. | 2*14 |
| C. | 2*20 |
| D. | 2*24 |
| Answer» C. 2*20 | |
| 4. |
The AH Protocol provides source authentication and data integrity, but not |
| A. | Integrity |
| B. | Privacy |
| C. | Nonrepudiation |
| D. | Both a and c |
| Answer» C. Nonrepudiation | |
| 5. |
A proxy firewall filters at the |
| A. | Physical layer |
| B. | Application layer |
| C. | Data link layer |
| D. | Network layer |
| Answer» C. Data link layer | |
| 6. |
A packet.filter firewall filters at the |
| A. | Application or transport |
| B. | Data link layer |
| C. | Physical Layer |
| D. | Network or transport layer |
| Answer» E. | |
| 7. |
The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server. |
| A. | limited |
| B. | vast |
| C. | distributed |
| D. | none of the above |
| Answer» D. none of the above | |
| 8. |
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line. |
| A. | request; response |
| B. | response; request |
| C. | response; status |
| D. | none of the above |
| Answer» E. | |
| 9. |
HTTP version 1.1 specifies a _________connection by default. |
| A. | persistent |
| B. | nonpersistent |
| C. | both a and b |
| D. | none of the above |
| Answer» B. nonpersistent | |
| 10. |
In a URL, the _______ is the full name of the file where the information is located. |
| A. | path |
| B. | protocol |
| C. | host |
| D. | none of the above |
| Answer» B. protocol | |
| 11. |
In a ___________ connection, one TCP connection is made for each request/response. |
| A. | persistent |
| B. | nonpersistent |
| C. | both a and b |
| D. | none of the above |
| Answer» C. both a and b | |
| 12. |
In a URL, the ______ is the computer on which the information is located. |
| A. | path |
| B. | protocol |
| C. | host |
| D. | none of the above |
| Answer» D. none of the above | |
| 13. |
An HTTP request message always contains _______. |
| A. | a header and a body |
| B. | a request line and a header |
| C. | a status line, a header, and a body |
| D. | one of the above |
| Answer» C. a status line, a header, and a body | |
| 14. |
In a ___________connection, the server leaves the connection open for more requests after sending a response. |
| A. | persistent |
| B. | nonpersistent |
| C. | both a and b |
| D. | none of the above |
| Answer» B. nonpersistent | |
| 15. |
The HTTP request line contains a _______ method to request a document from the server. |
| A. | get |
| B. | post |
| C. | copy |
| D. | none of the above |
| Answer» B. post | |
| 16. |
___________ is a technology that creates and handles dynamic documents. |
| A. | gic |
| B. | cgi |
| C. | gci |
| D. | none of the above |
| Answer» C. gci | |
| 17. |
_____________ is a language for creating Web pages. |
| A. | http |
| B. | html |
| C. | fttp |
| D. | none of the above |
| Answer» C. fttp | |
| 18. |
The documents in the WWW can be grouped into ______ broad categories. |
| A. | two |
| B. | three |
| C. | four |
| D. | none of the above |
| Answer» C. four | |
| 19. |
An applet is _______ document application program. |
| A. | a static |
| B. | an active |
| C. | a passive |
| D. | a dynamic |
| Answer» C. a passive | |
| 20. |
In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. |
| A. | path |
| B. | protocol |
| C. | host |
| D. | none of the above |
| Answer» E. | |
| 21. |
A response message always contains _______. |
| A. | a header and a body |
| B. | a request line and a header |
| C. | a status line and a header |
| D. | none of the above |
| Answer» D. none of the above | |
| 22. |
The HTTP request line contains a _______ method to get information about a document without retrieving the document itself. |
| A. | head |
| B. | post |
| C. | copy |
| D. | none of the above |
| Answer» B. post | |
| 23. |
In HTTP, a _______ server is a computer that keeps copies of responses to recent requests. |
| A. | regular |
| B. | proxy |
| C. | both a and b |
| D. | none of the above |
| Answer» C. both a and b | |
| 24. |
For many applications, we need a program or a script to be run at the client site. These are called _______________ documents. |
| A. | static |
| B. | dynamic |
| C. | active |
| D. | none of the above |
| Answer» D. none of the above | |
| 25. |
Dynamic documents are sometimes referred to as _________ dynamic documents. |
| A. | client-site |
| B. | server-site |
| C. | both a and b |
| D. | none of the above |
| Answer» C. both a and b | |
| 26. |
HTTP uses the services of _________ on well-known port 80. |
| A. | udp |
| B. | ip |
| C. | tcp |
| D. | none of the above |
| Answer» D. none of the above | |
| 27. |
Active documents are sometimes referred to as _________ dynamic documents. |
| A. | client-site |
| B. | server-site |
| C. | both a and b |
| D. | none of the above |
| Answer» B. server-site | |
| 28. |
Which of the following is present in both an HTTP request line and a status line? |
| A. | http version number |
| B. | url |
| C. | status code |
| D. | none of the above |
| Answer» B. url | |
| 29. |
_________ is a repository of information linked together from points all over the world. |
| A. | the www |
| B. | http |
| C. | html |
| D. | none of the above |
| Answer» B. http | |
| 30. |
The _________ is a standard for specifying any kind of information on the Internet. |
| A. | url |
| B. | ulr |
| C. | rlu |
| D. | none of the above |
| Answer» B. ulr | |
| 31. |
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. |
| A. | static |
| B. | dynamic |
| C. | active |
| D. | none of the above |
| Answer» B. dynamic | |
| 32. |
A cookie is made by the ________ and eaten by the _________. |
| A. | client; client |
| B. | client; server |
| C. | server; server |
| D. | none of the above |
| Answer» D. none of the above | |
| 33. |
One way to create an active document is to use __________. |
| A. | cgi |
| B. | java stand-alone programs |
| C. | java applets |
| D. | none of the above |
| Answer» D. none of the above | |
| 34. |
A _______ document is created by a Web server whenever a browser requests the document. |
| A. | static |
| B. | dynamic |
| C. | active |
| D. | none of the above |
| Answer» C. active | |
| 35. |
In a URL, the _______ is the client-server program used to retrieve the document. |
| A. | path |
| B. | protocol |
| C. | host |
| D. | none of the above |
| Answer» C. host | |
| 36. |
A user needs to send the server some information. The request line method is _______. |
| A. | option |
| B. | patch |
| C. | post |
| D. | none of the above |
| Answer» D. none of the above | |
| 37. |
In PGP, to exchange e-mail messages, a user needs a ring of _______ keys. |
| A. | secret |
| B. | public |
| C. | either (a) or (b) |
| D. | both (a) and (b) |
| Answer» C. either (a) or (b) | |
| 38. |
A _______ layer security protocol provides end-to-end security services for applications. |
| A. | data link |
| B. | network |
| C. | transport |
| D. | none of the above |
| Answer» D. none of the above | |
| 39. |
_______ provide security at the transport layer. |
| A. | ssl |
| B. | tls |
| C. | either (a) or (b) |
| D. | both (a) and (b) |
| Answer» E. | |
| 40. |
______ is designed to provide security and compression services to data generated from the application layer. |
| A. | ssl |
| B. | tls |
| C. | either (a) or (b) |
| D. | both (a) and (b) |
| Answer» E. | |
| 41. |
IPSec in the ______ mode does not protect the IP header. |
| A. | transport |
| B. | tunnel |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» B. tunnel | |
| 42. |
A ______ provides privacy for LANs that must communicate through the global Internet. |
| A. | vpp |
| B. | vnp |
| C. | vnn |
| D. | vpn |
| Answer» E. | |
| 43. |
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session. |
| A. | list of protocols |
| B. | cipher suite |
| C. | list of keys |
| D. | none of the above |
| Answer» C. list of keys | |
| 44. |
______ is actually an IETF version of _____. |
| A. | tls; tss |
| B. | ssl; tls |
| C. | tls; ssl |
| D. | ssl; slt |
| Answer» D. ssl; slt | |
| 45. |
An ________ is a private network that uses the Internet model. |
| A. | intranet |
| B. | internet |
| C. | extranet |
| D. | none of the above |
| Answer» B. internet | |
| 46. |
IPSec uses a set of SAs called the ________. |
| A. | sad |
| B. | sab |
| C. | sadb |
| D. | none of the above |
| Answer» D. none of the above | |
| 47. |
IKE uses _______. |
| A. | oakley |
| B. | skeme |
| C. | isakmp |
| D. | all of the above |
| Answer» E. | |
| 48. |
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level. |
| A. | ipsec |
| B. | ssl |
| C. | pgp |
| D. | none of the above |
| Answer» B. ssl | |
| 49. |
An _________ is a network that allows authorized access from outside users. |
| A. | intranet |
| B. | internet |
| C. | extranet |
| D. | none of the above |
| Answer» D. none of the above | |
| 50. |
The Internet authorities have reserved addresses for _______. |
| A. | intranets |
| B. | internets |
| C. | extranets |
| D. | none of the above |
| Answer» E. | |