Quiznetik

Computer Architecture and Organization | Set 4

1. The DSS signature uses which hash algorithm?

Correct : C. sha-1

2. The RSA signature uses which hash algorithm?

Correct : C. md5 and sha-1

3. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

Correct : C. 36 bytes

4. The certificate_request massage includes two parameters, one of which is-

Correct : D. certificate_type

5. The client_key_exchange message uses a pre master key of size –

Correct : A. 48 bytes

6. In the handshake protocol which is the message type first sent between client and server ?

Correct : B. client_hello

7. Network layer firewall works as a

Correct : B. packet filter

8. Network layer firewall has two sub- categories as

Correct : A. state full firewall and stateless firewall

9. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

Correct : A. chock point

10. Which of the following is / are the types of firewall?

Correct : A. packet filtering firewall

11. A proxy firewall filters at

Correct : D. application layer

12. A packet filter firewall filters at

Correct : C. network layer or transport layer

13. What is one advantage of setting up a DMZ with two firewalls?

Correct : C. you can do load balancing

14. A firewall needs to be                      so that it can grow proportionally with the network that it protects.

Correct : B. expansive