Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) visual private network
B) virtual protocol network
C) virtual private network
D) virtual protocol networking
Correct Answer
verified
Multiple Choice
A) symmetric key encryption algorithm
B) asymmetric key encryption algorithm
C) not an encryption algorithm
D) block cipher method
Correct Answer
verified
Multiple Choice
A) man-in-the-middle
B) ciphertext attack
C) plaintext attack
D) none of the above
Correct Answer
verified
Multiple Choice
A) remote access vpns
B) site-to-site vpns
C) peer-to-peer vpns
D) router-to-router vpns
Correct Answer
verified
Multiple Choice
A) protocols used for tunnelling the traffic
B) whether vpns are providing site-to-site or remote access connection
C) securing the network from bots and malwares
D) levels of security provided for sending and receiving data privately
Correct Answer
verified
Multiple Choice
A) 3
B) 4
C) 5
D) 6
Correct Answer
verified
Multiple Choice
A) remote access vpns
B) site-to-site vpns
C) peer-to-peer vpns
D) country-to-country vpns
Correct Answer
verified
Multiple Choice
A) application level protocols
B) tunnelling protocols
C) network protocols
D) mailing protocols
Correct Answer
verified
Multiple Choice
A) diffie-hellman
B) rsa
C) des
D) aes
Correct Answer
verified
Multiple Choice
A) 1
B) 2
C) 3
D) 4
Correct Answer
verified
Multiple Choice
A) 3
B) 2
C) 5
D) 4
Correct Answer
verified
Multiple Choice
A) 42 bytes
B) 32 bytes
C) 36 bytes
D) 48 bytes
Correct Answer
verified
Multiple Choice
A) server_hello
B) client_hello
C) hello_request
D) certificate_request
Correct Answer
verified
Multiple Choice
A) encryption
B) decryption
C) hash
D) none of the above
Correct Answer
verified
Multiple Choice
A) elliptic curve cryptography
B) enhanced curve cryptography
C) elliptic cone cryptography
D) eclipse curve cryptography
Correct Answer
verified
Multiple Choice
A) rss
B) ras
C) rsa
D) raa
Correct Answer
verified
Multiple Choice
A) symmetric-key
B) asymmetric-key
C) either (a) or (b)
D) neither (a) nor (b)
Correct Answer
verified
Multiple Choice
A) md5
B) sha-2
C) sha-1
D) does not use hash algorithm
Correct Answer
verified
Showing 1 - 20 of 23
Related Exams