Q1)-Cookies were originally designed for
Q2)-Which of the following defines the Cookie visibility?
Q3)-What is the constraint on the data per cookie?
Q4)-IPSec is designed to provide the security at the
Q5)-Network layer firewall has two sub-categories as
Q6)-An attempt to make a computer resource unavailable to its intended users is called
Q7)-Pretty good privacy (PGP) is used in
Q8)-When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
Q9)-WPA2 is used for security in
Q10)-Which of the following is a Boolean cookie attribute?
Client side programming
Server side programming
Both a and b
None of the mentioned
Ans.- B
Q2)-Which of the following defines the Cookie visibility?
Document Path
Local Storage
Session Storage
All of the mentioned
Ans.- D
Q3)-What is the constraint on the data per cookie?
1 KB
2 KB
3 KB
4 KB
Ans.- D
Q4)-IPSec is designed to provide the security at the
transport layer
network layer
application layer
session layer
Ans.- B
Q5)-Network layer firewall has two sub-categories as
stateful firewall and stateless firewall
bit oriented firewall and byte oriented firewall
frame firewall and packet firewall
none of the above
Ans.- A
Q6)-An attempt to make a computer resource unavailable to its intended users is called
virus attack
denial-of-service attack
worms attack
botnet process
Ans.- B
Q7)-Pretty good privacy (PGP) is used in
browser security
email security
FTP security
none of the mentioned
Ans.- B
Q8)-When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
DNS lookup
DNS hijacking
DNS spoofing
None of the mentioned
Ans.- C
Q9)-WPA2 is used for security in
ethernet
bluetooth
wi-fi
none of the above
Ans.- C
Q10)-Which of the following is a Boolean cookie attribute?
Bool
Secure
Lookup
Domain
Ans.- B
No comments:
Post a Comment