Do you know that? 43.8% of freelancers get the bulk of their training by self taught next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Upwork (oDesk) test answers << Networking category

Test answers for Internet Security Test 2016

(76 / 3) Last updated: February 27
Upwork (oDesk) • Networking
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

76 Answered Test Questions:

1. Which of the following are the components of a UTM appliance?

Answers:

• Firewall

• Gateway Antispam

• Gateway Antivirus

• IDS/IPS

2. Which of the following are Virus propagation techniques?

Answers:

• Master Boot Record

• File Infection

• Server Boot Record

• Macro Infection

• Slave Boot Record

3. Which of the following measures are taken to enhance the security of the system? (Select all that apply)

Answers:

• Operating System based hardening

• Network Based hardening

• Application Based hardening

• Timely Refining of Security Policies

4. Which of the following methods can be used for Network hardening?

Answers:

• Evaluating IDS

• E-mail Encryption

• Backup of the Mail Server.

• Refining ACLs on routers and switches.

• Up-to-date OS and patches of Network devices.

5. Which of the following are signs of  Security breach?

Answers:

• Data modification and deletion.

• System performance issues.

• Different traffic patterns.

• Large number of failed log in attempts.

6. Which of the following are the placement modes of an IDS/IPS?

Answers:

• Inline

• Hybrid

• Tap

• SPAN

7. Which of the following are the advantages of Honeypots?

Answers:

• Intelligent IDS

• Distracts Hackers

• Encrypts Data

• Decrypts Data

8. Which of the following things should be kept in mind while managing passwords?

Answers:

• Dictionary words should be used.

• Easily guessed passwords should not be used.

• Passwords should not be stored on a plain view.

• Passwords should be changed once a month.

• Passwords should be shared.

9. Which of the following Symmetric encryption algorithms is/are supported by S/MIME?

Answers:

• RSA

• DES

• 3DES

• SHA-1

10. Which of the following are Email Security protocols?

Answers:

• S/MIME

• PEM

• STE

• PME

11. Which of the following can be classified as passive attacks?

Answers:

• SYN attacks.

• Vulnerability scans.

• ARP Spoofing.

• DoS Attack

• Sniffing.

12. Select the common VPN protocols.

Answers:

• PPP

• L2TP

• LT2P

• PPTP

13. Which of the following are Vulnerability assessment tools?

Answers:

• TCPDUMP

• Nmap

• Wireshark

• Nessus

14. Which of the following are the components of IPSec?

Answers:

• Authentication Header.

• Authorization Header

• Encapsulated Payload.

• Encapsulating Security Payload.

15. Which of the following appliances help/s in filtering virus packets?

Answers:

• Firewalls

• Antivirus Engines

• Routers

• UTM

• IDS/IPS

16. Select the objectives of E-mail security.

Answers:

• Verifying the source of a message.

• Classifying attachments.

• E-mail backups.

• Message integrity.

17. Which of the following protocols uses UDP:

Answers:

• HTTP

• DNS

• TFTP

• FTP

18. Below are the given statements, which statement shows the breach of Confidentiality:

Answers:

• Hacker using sniffer tools to view the packets in a network.

• Important data deleted from a document.

• SYN attack on a host.

• Brute Force attack on server.

19. Which of the following goals cannot be achieved with Symmetric cryptography?

Answers:

• Non-repudiation

• Confidentiality

• Integrity

• Availability.

20. The ability to exploit a vulnerability is called:

Answers:

• Threat

• Weakness

• Permission Escalation

• Risk

21. Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?

Answers:

• Allen's Public key.

• Allen's Private key.

• Mark's Public key.

• Mark's Private key.

22. Which protocol helps in securing LDAP?

Answers:

• SSL/TLS

• SLDAP

• LDAPS

• SSH

23. By which of the following third parties are Digital Certificates signed?

Answers:

• Digital Certificate Signing Authority

• Certificate Authority

• Certificate Signing Authority

• Digital Signing Authority.

24. Which of the following Asymmetric encryption algorithms is supported by S/MIME?

Answers:

• RSA

• DES

• 3DES

• SHA-1

25. Which of the following is the standard certificate?

Answers:

• C.509

• X.505

• X.509

• C.505

26. Which of the following is an application attack?

Answers:

• Buffer Overflow

• DNS Poisoning

• LAND

• Brute Force

27. In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?

Answers:

• 1

• 2

• 3

• 4

28. In which of the following protocols does an SYN attack help to find  a weakness?

Answers:

• HTTP

• RIP

• TCP/IP

• FTP

29. Which of the following authentication protocols are used to encrypt passwords?

Answers:

• CHAP

• APP

• RAP

• ARAP

30. Which protocol is used by TACACS+?

Answers:

• TCP

• UDP

• IP

• AIX

31. Which of the following is an Asymmetric algorithm?

Answers:

• MD5

• El Gamal

• IDEA

• SHA-1

32. Which of the following helps us to block attacks on a single machine?

Answers:

• Host Based IDS

• Network Based IDS

• Host Based IPS

• Network Based IPS

33. How many keys are required if two parties communicate using Asymmetric cryptography?

Answers:

• One

• Two

• Three

• Four

34. What is the key length of Triple DES?

Answers:

• 56

• 156

• Variable Length

• 168

35. What are the features of an IPS?

Answers:

• Fault Tolerance.

• Minimal Overhead.

• Timely Alerting Mechanism.

• Anomaly based.

36. Which key is used to decrypt the message in PKI?

Answers:

• Public Key

• Private Key

• Pre-shared Secret

• Hybrid Key

37. Which of the following statements resembles Trojan horses?

Answers:

• Self Replication

• Virus Infections

• Installation of Backdoor Programs.

• Displaying Unauthorized Advertisements

38. Which port is used by PPTP?

Answers:

• 1702

• 1701

• 1723

• 1724

39. Below are the given statements, which statement shows the breach of Availability:

Answers:

• SYN attack on a server.

• Deleting important contents from a document.

• Decrypting a credit card during transmission.

• Using wrong password to access authorized documents.

40. A criminal who breaks into computers maliciously is known as

Answers:

• Black Hat Hacker.

• Grey Hat Hacker

• White Hat Hacker

• Script Kiddie

41. What is function of IPS?

Answers:

• NATing Device

• A device to block intrusion attacks

• A device to scan for Virus

• Firewall Technology

42. The process of switching protocols between routing devices is called

Answers:

• Exchanging

• Protocol Exchanging

• Switching

• Protocol Switching

43. Which of the following are  Transport Layer Security protocols?

Answers:

• SHTTP

• SSL

• SOCKS

• IPSec

44. A Brute Force attack

Answers:

• sends SYN packets.

• sends Spam mails.

• prevents the system from responding.

• discovers the passwords.

45. Which of the following statements is true of Tunneling?

Answers:

• Data is unencrypted

• Only passwords are encrypted.

• Data part is encrypted.

• Contents of the protocol are encapsulated.

46. Which of the following detect/s security weaknesses in a remote or local host?

Answers:

• Worms

• Antivirus

• Scanner

• Adwares

47. By which of the following can the injection of bogus routes into the core network be prevented ?

Answers:

• Routed Protocol Authentication

• Routing Protocol Authentication

• Router Authentication

• Route Authentication

48. Mike wants to secure the data on his personal computer. Which of the following options will he choose to secure the data?

Answers:

• Archiving the data

• Compression

• Hide

• Encryption

49. Which protocol is used to secure the WAP communication?

Answers:

• Secure Wireless Communication.

• WAP Transport Layer Security

• Transport Layer Security

• Wireless Transport Layer Security

50. The part of a company's intranet which is extended to users outside the company is called:

Answers:

• Internet

• Intranet

• Exposed Intranet

• Extranet

51. The concept of allowing access to resources only to those permitted is known as

Answers:

• Resource Security

• Accounting

• Authentication

• Authorization

52. How many keys are required if two parties communicate using Symmetric cryptography?

Answers:

• One

• Two

• Three

• Four

53. Which of the following keys helps us in the verification of the Digital Signature?

Answers:

• Private Key

• Public Key

• Public and Private Key

• Digital Key

54. What is RBL in E-mail Security?

Answers:

• Realtime Blacking List

• Realtime Blocking List

• Realtime Blackhole List

55. Which of the following techniques is used to approach security in Java?

Answers:

• Blackbox

• Sandboxing

• Whitebox

• Java Applets

56. What does RBL contain?

Answers:

• IP addresses of mail server

• IP addresses of open relay mail servers

• IP addresses of closed relay mail servers

• Vulnerable ports

57. What is RSA in cryptography?

Answers:

• Riven, Shamir, Adleman

• Rivest, Shamir, Adleman

• Rivest, Shamid, Adleman

• Rivest, Shamir, Ademan

58. Which of the following are the key principles of Internet  Security?

Answers:

• Confidentiality, Identification, Availability

• Confidentiality, Integrity, Authentication

• Confidentiality, Integrity, Availability

• Confidentiality, Identification, Authentication

59. Which of the following is created to serve as a snare for intruders?

Answers:

• Honey Pots.

• IDS/IPS

• Firewalls

• Vulnerability Assessment Tools

60. What is S/MIME?

Answers:

• Secure Multipurpose Intranet Mail Extensions

• Secure Multipurpose Internet Mail Extensions

• Secure Multipurpose Internet Message Extensions

• Secure Multipurpose Intranet Message Extensions

61. Which of the following can be transmitted through an E-mail?

Answers:

• Viruses

• Trojan Horses

• Worms

• Malicious Codes

• All of the above

62. Joe wants to secure his client's Web Server. Which of the following measures will he take?

Answers:

• Managing Access Control

• Eliminating Scripting Vulnerabilities

• Maintaining Integrity.

• Blocking Browser Exploits.

63. Which of the following is Application-level security protocol are used for communications session security?

Answers:

• SSH

• SSL/TLS

• Both A and B

• None of the above

64. What is a UTM appliance?

Answers:

• Unified Threat Manager.

• Unified Threat Management.

• Universal Threat Management.

• Unique Threat Management.

65. In which of the following does Buffer Overflow help us to find weaknesses?

Answers:

• Hardware

• Software

• Firewalls

• Routers

66. In which of the following attacks, sending a large number of spoofed ICMP ECHO requests to broadcast address?

Answers:

• SYN attack.

• land.c attack

• teardrop.c attack

• SMURF attack

67. Which port does IKE  key negotiation protocol use?

Answers:

• TCP 4500

• UDP 4500

• UDP 500

• UDP 550

68. Which type of authentication is."Something the user has " ?

Answers:

• Single Factor

• Dual Factor

• Triple Factor

• Hybrid Factor

69. Which protocol is used by RADIUS?

Answers:

• UDP

• TCP

• IP

• AIX

70. A positive detection of result that is false or untrue is called

Answers:

• True Positive

• Event Detection

• False Positive

• False Negative

71. Which of the following are the components of PKI?

Answers:

• Certificate Authority.

• Organizational Registration Authorities

• Certificate Holders

• Clients that validate digital signatures.

72. Which of the following protocols does not help in securing the FTP?

Answers:

• SSL

• SSFTP

• FTPS

• S/FTP

73. By which of the following methods can social engineering be curbed by?

Answers:

• Instaling more than 2 firewalls.

• User Education

• Installing 2 antiviruses

• Installing IPS.

74. Which of the following Symmetric algorithms has variable key length?

Answers:

• AES

• Triple DES

• IDEA

• Rivest Cipher 4

75. Which of the following statement shows the breach of Integrity:

Answers:

• Viewing packets using sniffer tools in a network.

• Encrypting a document.

• Spoof attack on a host.

• Important data deleted from a document.

76. Select the drawbacks of Symmetric key cryptography.

Answers:

• It can't implement non-repudiation

• It is scalable

• Key distribution is easy in it

• It is less secure


3 NOT Answered Yet Test Questions:

(hold on, will be updated soon)
77. Which of the following technique is used to approach security in ActiveX?

Answers:

• Sandboxing

• Digital Sign

• Encrypting

• SSL

78. Which of the following can be classified as code and cryptographic attacks?

Answers:

• DDoS

• Viruses

• Brute Force

• Worms

• Trojans

79. Which of the below listed are included in Application hardening?

Answers:

• DNS server

• Mail Server

• Core Routers

• Firewalls

• Web Server