Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Tests  >  Computer Networks  >  Test: AH & ESP Protocols - Computer Science Engineering (CSE) MCQ

Test: AH & ESP Protocols - Computer Science Engineering (CSE) MCQ


Test Description

10 Questions MCQ Test Computer Networks - Test: AH & ESP Protocols

Test: AH & ESP Protocols for Computer Science Engineering (CSE) 2024 is part of Computer Networks preparation. The Test: AH & ESP Protocols questions and answers have been prepared according to the Computer Science Engineering (CSE) exam syllabus.The Test: AH & ESP Protocols MCQs are made for Computer Science Engineering (CSE) 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: AH & ESP Protocols below.
Solutions of Test: AH & ESP Protocols questions in English are available as part of our Computer Networks for Computer Science Engineering (CSE) & Test: AH & ESP Protocols solutions in Hindi for Computer Networks course. Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free. Attempt Test: AH & ESP Protocols | 10 questions in 10 minutes | Mock test for Computer Science Engineering (CSE) preparation | Free important questions MCQ to study Computer Networks for Computer Science Engineering (CSE) Exam | Download free PDF with solutions
Test: AH & ESP Protocols - Question 1

Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?

Detailed Solution for Test: AH & ESP Protocols - Question 1

Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.

*Multiple options can be correct
Test: AH & ESP Protocols - Question 2

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Detailed Solution for Test: AH & ESP Protocols - Question 2

Answer: c, d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.

1 Crore+ students have signed up on EduRev. Have you? Download the App
*Multiple options can be correct
Test: AH & ESP Protocols - Question 3

Which two types of IPsec can be used to secure communications between two LANs?

Detailed Solution for Test: AH & ESP Protocols - Question 3

Answer: a, b
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.

Test: AH & ESP Protocols - Question 4

______ provides authentication at the IP level.

Detailed Solution for Test: AH & ESP Protocols - Question 4

Answer: a
Explanation: It provides integrity checking and anti-reply security.

Test: AH & ESP Protocols - Question 5

IPsec defines two protocols: _______ and ________

Detailed Solution for Test: AH & ESP Protocols - Question 5

Answer: c
Explanation: Authentication header and Encryption security payload.

Test: AH & ESP Protocols - Question 6

 IP Security operates in which layer of the OSI model?

Detailed Solution for Test: AH & ESP Protocols - Question 6

Answer: a
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.

Test: AH & ESP Protocols - Question 7

ESP provides

Detailed Solution for Test: AH & ESP Protocols - Question 7

Answer: d
Explanation: Encrypted security payload provides source, data integrity and privacy.

Test: AH & ESP Protocols - Question 8

In computer security… means that computer system assets can be modified only by authorized parities.

Detailed Solution for Test: AH & ESP Protocols - Question 8

Answer: b
Explanation: Integrity means that computer system assets can be modified only by authorized parities.

Test: AH & ESP Protocols - Question 9

 In computer security… means that the information in a computer system only be accessible for reading by authorized parities.

Detailed Solution for Test: AH & ESP Protocols - Question 9

Answer: a
Explanation: Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.

Test: AH & ESP Protocols - Question 10

Which of the following organizations is primarily concerned with military encryption systems?

Detailed Solution for Test: AH & ESP Protocols - Question 10

Answer: a
Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.

21 videos|113 docs|66 tests
Information about Test: AH & ESP Protocols Page
In this test you can find the Exam questions for Test: AH & ESP Protocols solved & explained in the simplest way possible. Besides giving Questions and answers for Test: AH & ESP Protocols, EduRev gives you an ample number of Online tests for practice

Top Courses for Computer Science Engineering (CSE)

21 videos|113 docs|66 tests
Download as PDF

Top Courses for Computer Science Engineering (CSE)