Important Instructions:
- Total Number Of Questions : 10
- Passing Marks : 7
- Each Question Carry 1 Mark, No Negative Marking.
- Do Not Refresh The Page.
- This Is A FREE Online Test, DO NOT Pay Money To Anyone To Attend This Test.
- Best Of Luck…
Results
-
Congratulation…
You Have Passed The Test, You Should Try To The Next One…!!
Unfortunately…
You Did Not Pass. Why Not Try It Again?
#1. Which of the following is a symmetric encryption algorithm available in 128-bit, 192-bit, and 256-bit key versions?
#2. In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies , to simultaneously flood a target system with traffic?
#3. Which of the following is a continually changing document that dictates a set of guidelines for network use?
#4. What type of software application should network administrators routinely use to verify the security of their network and check for any weaknesses?
#5. Which of the following are characteristics of RADIUS? (Choose two.)
Select all that apply:
#6. What feature allows a firewall to permit traffic to flow from a trusted network (for example, a corporate intranet) to an untrusted network (for example, the Internet) and then allow return traffic for that session, while blocking sessions initiated on the untrusted network?
#7. Which of the following is an IPsec protocol that provides authentication and integrity services but does not support encryption?
#8. Which of the following protocols are most commonly used to provide security for an HTTPS connection? (Choose two.)
#9. Which of the following security solutions consists of software running on a host to protect that host against a collection of well-known attacks?
#10. From the following list, identify the detection methods commonly used by IPS sensors. (Choose three.)
Select all that apply: