Quiznetik
Computer Architecture and Organization | Set 4
1. The DSS signature uses which hash algorithm?
A. md5
B. sha-2
C. sha-1
D. does not use hash algorithm
Correct : C. sha-1
2. The RSA signature uses which hash algorithm?
A. md5
B. sha-1
C. md5 and sha-1
D. none of the mentioned.
Correct : C. md5 and sha-1
3. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 bytes
Correct : C. 36 bytes
4. The certificate_request massage includes two parameters, one of which is-
A. certificate_extension
B. certificate_creation
C. certificate_exchange
D. certificate_type
Correct : D. certificate_type
5. The client_key_exchange message uses a pre master key of size –
A. 48 bytes
B. 56 bytes
C. 64 bytes
D. 32 bytes
Correct : A. 48 bytes
6. In the handshake protocol which is the message type first sent between client and server ?
A. server_hello
B. client_hello
C. hello_request
D. certificate_request
Correct : B. client_hello
7. Network layer firewall works as a
A. frame filter
B. packet filter
C. content filter
D. virus filter
Correct : B. packet filter
8. Network layer firewall has two sub- categories as
A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Correct : A. state full firewall and stateless firewall
9. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
A. chock point
B. meeting point
C. firewall point
D. secure point
Correct : A. chock point
10. Which of the following is / are the types of firewall?
A. packet filtering firewall
B. dual homed gateway firewall
C. screen host firewall
D. dual host firewall
Correct : A. packet filtering firewall
11. A proxy firewall filters at
A. physical layer
B. data link layer
C. network layer
D. application layer
Correct : D. application layer
12. A packet filter firewall filters at
A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Correct : C. network layer or transport layer
13. What is one advantage of setting up a DMZ with two firewalls?
A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. improved network performance
Correct : C. you can do load balancing
14. A firewall needs to be so that it can grow proportionally with the network that it protects.
A. robust
B. expansive
C. fast
D. scalable
Correct : B. expansive