DCS BITS -3

download DCS BITS -3

of 19

Transcript of DCS BITS -3

  • 7/25/2019 DCS BITS -3

    1/19

    CHAPTER-28

    NETWORK MANAGEMENT: SNMP

    1.

    A manager is a host that runs the SNMP _______ process.A) client

    B) server

    C) both a and b

    D) none of the above

    2. An SNMP agent can send _______ messages.

    A) Response

    B) GetRequest

    C) SetRequest

    D) none of the above

    3. SMI uses another standard, ___________, to encode data to be transmitted over the

    network.

    A) MIB

    B) ANS.1

    C) BER

    D) none of the above

    4. We can compare the task of network management to the task of writing a program.Both tasks need variable declarations. In network management this is handled by

    _________.

    A) SMNP

    B) MIB

    C) SMID) none of the above

    5. We can compare the task of network management to the task of writing a program.

    Both tasks need rules. In network management this is handled by ___________.

    A) SMNP

    B) MIB

    C) SMI

    D) none of the above

    6. The _______ data types are atomic data types.

    A) structure

    B) simpleC) both a and b

    D) none of the above

    7. An SNMP agent can send _______ messages.

    A) GetRequest

    B) SetRequest

    C) Trap

    D) none of the above

    8. Which is a manager duty?

    A) Retrieve the value of an object defined in an agent.

    B) Store the value of an object defined in an agent.

    C) a and b

  • 7/25/2019 DCS BITS -3

    2/19

    D) none of the above

    9. We can compare the task of network management to the task of writing a program.

    Both tasks have actions performed by statements. In network management this is

    handled by _______.

    A) SMNP

    B) MIBC) SMI

    D) none of the above

    10.An agent is a host or computer that runs the SNMP _______ process.

    A) client

    B) server

    C) both a and b

    D) none of the above11.The Trap PDU is sent from the ______ to the _______ to report an event.

    A) server; client

    B) client; serverC) network; host

    D) none of the above

    12.

    To name objects globally, SMI uses an object identifier, which is a hierarchical

    identifier based on a _______ structure.

    A) linear

    B) tree

    C) graph

    D) none of the above13.INTEGER, OCTET STRING, and Object Identifier are _______ definitions used by

    SMI.

    A) MIB

    B) SNMP

    C) ASN.1

    D) none of the above

    14.The Response PDU is sent from the ______ to the ______ in response to GetRequest

    or GetNextRequest.

    A) server; client

    B) client; server

    C) network; host

    D) none of the above

    15.

    SMI emphasizes three attributes to handle an object: _____, ________, and_________.

    A) name; data type; size

    B) name; size; encoding method

    C) name; data type; encoding method

    D) none of the above

    16.SNMP uses the services of UDP on two well-known ports, _______ and _______.

    A) 161; 162

    B) 160; 161

    C) 160; 162

    D) none of the above17.SNMP uses two other protocols:________ and _________.

  • 7/25/2019 DCS BITS -3

    3/19

    A) MIB; SMTP

    B) SMI; MIB

    C) FTP; SMI

    D) none of the above

    18._______ runs the SNMP client program; _______ runs the SNMP server program.

    A) A manager; a manager

    B) An agent; an agent

    C) A manager; an agent

    D) An agent; a manager

    19.An object id defines a _______. Add a zero suffix to define the _______.

    A) variable; table

    B) table; variable

    C) variable; variable contents

    D) none of the above

    20.The _______ field in the SNMP PDU consists of a sequence of variables and their

    corresponding values.A) version

    B) community

    C) VarBindList

    D) none of the above

    21.SMI defines two structured data types: ________ and _________.

    A) sequence; atomic

    B) sequence; sequence of

    C) a sequence of; array

    D) none of the above

    22.

    The _______ field in the SNMP PDU reports an error in a response message.A) community

    B) enterprise

    C) error status

    D) none of the above

    23.All objects managed by SNMP are given an object identifier. The object identifier

    always starts with _______.

    A) 1.3.6.1.2.1

    B) 1.3.6.1.2.2

    C) 1.3.6.1.2.3

    D) none of the above

    24.

    Which of the following could be a legitimate MIB object identifier?

    A) 1.3.6.1.2.1.1

    B) 1.3.6.1.2.2.1

    C) 2.3.6.1.2.1.2

    D) none of the above25.SMI has two broad categories of data type: _______ and _______.

    A) simple; complex

    B) simple; structured

    C) structured; unstructured

    D) none of the above

    26.

    The _______ field in the SNMP PDU is an offset that points to the variable in error.A) community

  • 7/25/2019 DCS BITS -3

    4/19

    B) enterprise

    C) error index

    D) none of the above

    27.SNMP defines the ___________________ to be sent from a manager to an agent and

    vice versa.

    A) format of the packetsB) encoding of the packets

    C) number of packets

    D) none of the above

    28.The GetRequest PDU is sent from the _______ to the __________ to retrieve the

    value of a variable or a set of variables.

    A) client; server

    B) server; client

    C) server; network

    D) none of the above

    29.

    The _________ ordering enables a manager to access a set of variables one afteranother by defining the first variable.

    A) lexicographic

    B) linear

    C) non-linear

    D) none of the above

    30.To define the data type, SMI uses fundamental _______ definitions and adds some

    new definitions.

    A) AMS.1

    B) ASN.1

    C) ASN.2

    D) none of the above

    31.________ defines the general rules for naming objects, defining object types, andshowing how to encode objects and values.

    A) MIB

    B) BER

    C) SMI

    D) none of the above32.

    For a 1-byte length field, what is the maximum value for the data length?

    A) 127

    B) 128

    C) 255

    D) none of the above

  • 7/25/2019 DCS BITS -3

    5/19

    CHAPTER-29

    MULTIMEDIA

    1.

    _______ is a standard to allow telephones on the public telephone network to talk tocomputers connected to the Internet.

    A) SIP

    B) H.323

    C) Q.991

    D) none of the above2. When there is more than one source, the _______ identifier defines the mixer.

    A) synchronization source

    B) contributor

    C) timestamp

    D) none of the above

    3.

    __________ is the protocol designed to handle real-time traffic on the Internet.

    A) TCP

    B) UDP

    C) RTP

    D) none of the above

    4. Jitter is introduced in real-time data by the _______________.

    A) error caused during transmission

    B) delay between packets

    C) both a and b

    D) none of the above

    5.

    In a real-time video conference, data from the server is _______ to the client sites.A) unicast

    B) multicast

    C) broadcast

    D) none of the above

    6. An RTP packet is encapsulated in _______.

    A) a UDP user datagram

    B) a TCP segment

    C) an IP datagram

    D) none of the above

    7.

    A _______ changes the format of a high-bandwidth video signal to a lower qualitynarrow-bandwidth signal.

    A) timestamp

    B) sequence number

    C) translator

    D) none of the above

    8. ____________ is used to compress video.

    A) MPEG

    B) JPEG

    C) either a or b

    D) none of the above9.

    Real-time traffic needs the support of ____________.

  • 7/25/2019 DCS BITS -3

    6/19

    A) broadcasting

    B) multicasting

    C) both a and b

    D) none of the above

    10._______ are used to number the packets of a real-time transmission.

    A) Timestamps

    B) Playback buffers

    C) Sequence numbers

    D) none of the above

    11.The third phase of JPEG is ___________.

    A) DCT transformation

    B) quantization

    C) data compression

    D) none of the above

    12.The second phase of JPEG is ___________.

    A) DCT transformationB) quantization

    C) data compression

    D) none of the above

    13.A __________on each packet is required for real-time traffic.

    A) timestamp

    B) sequence number

    C) both a and b

    D) none of the above14.To prevent _________, we can timestamp the packets and separate the arrival time

    from the playback time.A) error

    B) jitter

    C) either a or b

    D) none of the above

    15.__________ means combining several streams of traffic into one stream.

    A) Translation

    B) Mixing

    C) both a and b

    D) none of the above16.A real-time video performance lasts 10 min. If there is jitter in the system, the viewer

    spends _______ minutes watching the performance.

    A) less than 10

    B) more than 10

    C) exactly 10

    D) none of the above17.___________ audio/video refers to the broadcasting of radio and TV programs

    through the Internet.

    A) Interactive

    B) Streaming live

    C) Streaming stored

    D) none of the above

  • 7/25/2019 DCS BITS -3

    7/19

    18.__________ means changing the encoding of a payload to a lower quality to matchthe bandwidth of the receiving network.

    A) Translation

    B) Mixing

    C) both a and b

    D) none of the above19.____________ is used to compress images.

    A) MPEG

    B) JPEG

    C) either a or b

    D) none of the above

    20.A ________buffer is required for real-time traffic.

    A) playback

    B) reordering

    C) sorting

    D) none of the above21.In ________ encoding, the differences between the samples are encoded instead of

    encoding all the sampled values.

    A) predictive

    B) perceptual

    C) both a and b

    D) none of the above

    22.__________ encoding is based on the science of psychoacoustics, which is the study

    of how people perceive sound.

    A) Predictive

    B) PerceptualC) both a and b

    D) none of the above

    23._________ audio/video refers to the use of the Internet for interactive audio/videoapplications.

    A) Interactive

    B) Streaming live

    C) Streaming stored

    D) none of the above24.

    According to the Nyquist theorem, we need to sample an analog signal

    ________times the highest frequency.

    A) threeB) two

    C) four

    D) none of the above25.___________ is an application protocol that establishes, manages, and terminates a

    multimedia session.

    A) RIP

    B) SIP

    C) DIP

    D) none of the above

    26.

    _________ is not suitable for interactive multimedia traffic because it retransmitspackets in case of errors.

  • 7/25/2019 DCS BITS -3

    8/19

    A) UDP

    B) TCP

    C) both a and b

    D) none of the above

    27.RTCP uses an odd-numbered _______ port number that follows the port number

    selected for RTP.A) UDP

    B) TCP

    C) both a and b

    D) none of the above28.We can divide audio and video services into _______ broad categories.

    A) three

    B) two

    C) four

    D) none of the above

    29.

    RTP uses a temporary even-numbered _______ port.A) UDP

    B) TCP

    C) both a and b

    D) none of the above

    30.________ audio/video refers to on-demand requests for compressed audio/video files.

    A) Streaming live

    B) Streaming stored

    C) Interactive

    D) none of the above

    31.

    ___________ is a protocol for controlling the flow and quality of data.A) RTP

    B) RTCP

    C) UDP

    D) none of the above

    32.A _______ adds signals from different sources to create a single signal.

    A) timestamp

    B) sequence number

    C) mixer

    D) none of the above

    33.A _______ shows the time a packet was produced relative to the first or previous

    packet.

    A) timestamp

    B) playback buffer

    C) sequence number

    D) none of the above

    34.The first phase of JPEG is ___________.

    A) DCT transformation

    B) quantization

    C) data compression

    D) none of the above

  • 7/25/2019 DCS BITS -3

    9/19

    CHAPTER-30

    CRYPTOGRAPHY

    1.One commonly used public-key cryptography method is the ______ algorithm.A) RSS

    B) RAS

    C) RSA

    D) RAA

    2. A(n) ______ algorithm transforms ciphertext to plaintext.

    A) encryption

    B) decryption

    C) either (a) or (b)

    D) neither (a) nor (b)

    3. The ________ is the message after transformation.

    A) ciphertext

    B) plaintext

    C) secret-text

    D) none of the above

    4. A(n) _______ algorithm transforms plaintext to ciphertext.

    A) encryption

    B) decryption

    C) either (a) or (b)

    D) neither (a) nor (b)

    5. The ________ method provides a one-time session key for two parties.

    A) Diffie-Hellman

    B) RSA

    C) DES

    D) AES

    6. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that usesa formula to define the relationship between the input stream and the output stream.

    A) S-box

    B) P-box

    C) T-box

    D) none of the above

    7. A ________ cipher replaces one character with another character.A) substitution

    B) transposition

    C) either (a) or (b)

    D) neither (a) nor (b)

    8. The ________ cipher reorders the plaintext characters to create a ciphertext.

    A) substitution

    B) transposition

    C) either (a) or (b)

    D) neither (a) nor (b)

    9. _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit blockof data.

  • 7/25/2019 DCS BITS -3

    10/19

    A) AEE

    B) AED

    C) AER

    D) AES

    10. The ________is the original message before transformation.

    A) ciphertext

    B) plaintext

    C) secret-text

    D) none of the above

    11. A modern cipher is usually a complex _____cipher made of a combination of

    different simple ciphers.

    A) round

    B) circle

    C) square

    D) none of the above

    12. The _________ attack can endanger the security of the Diffie-Hellman method iftwo parties are not authenticated to each other.

    A) man-in-the-middle

    B) ciphertext attack

    C) plaintext attack

    D) none of the above

    13. A combination of an encryption algorithm and a decryption algorithm is called a________.

    A) cipher

    B) secret

    C) keyD) none of the above

    14. In an asymmetric-key cipher, the receiver uses the ______ key.

    A) private

    B) public

    C) either a or b

    D) neither (a) nor (b)

    15. AES has _____ different configurations.

    A) two

    B) three

    C) fourD) five

    16. DES is a(n) ________ method adopted by the U.S. government.

    A) symmetric-key

    B) asymmetric-key

    C) either (a) or (b)

    D) neither (a) nor (b)

    17. DES uses a key generator to generate sixteen _______ round keys.

    A) 32-bit

    B) 48-bit

    C) 54-bitD) 42-bit

  • 7/25/2019 DCS BITS -3

    11/19

    18. The Caesar cipher is a _______cipher that has a key of 3.

    A) transposition

    B) additive

    C) shift

    D) none of the above

    19. ECB and CBC are ________ ciphers.

    A) block

    B) stream

    C) field

    D) none of the above

    20. A(n) _______is a keyless transposition cipher with N inputs and M outputs that

    uses a table to define the relationship between the input stream and the output stream.

    A) S-box

    B) P-box

    C) T-box

    D) none of the above21. ________ DES was designed to increase the size of the DES key.

    A) Double

    B) Triple

    C) Quadruple

    D) none of the above

    22. ________ is the science and art of transforming messages to make them secure

    and immune to attacks.

    A) Cryptography

    B) Cryptoanalysis

    C) either (a) or (b)D) neither (a) nor (b)

    23. DES has an initial and final permutation block and _________ rounds.

    A) 14

    B) 15

    C) 16

    D) none of the above

    24. The DES function has _______ components.

    A) 2

    B) 3

    C) 4D) 5

    25. In a(n) ________ cipher, the same key is used by both the sender and receiver.

    A) symmetric-key

    B) asymmetric-key

    C) either (a) or (b)

    D) neither (a) nor (b)

    26. _________ ciphers can be categorized into two broad categories: monoalphabetic

    and polyalphabetic.

    A) Substitution

    B) TranspositionC) either (a) or (b)

  • 7/25/2019 DCS BITS -3

    12/19

    D) neither (a) nor (b)

    27. The _______ cipher is the simplest monoalphabetic cipher. It uses modular

    arithmetic with a modulus of 26.

    A) transposition

    B) additive

    C) shift

    D) none of the above

    28. In an asymmetric-key cipher, the sender uses the__________ key.

    A) private

    B) public

    C) either (a) or (b)

    D) neither (a) nor (b)

    29. In a(n) ________ cipher, a pair of keys is used.

    A) symmetric-key

    B) asymmetric-key

    C) either (a) or (b)D) neither (a) nor (b)

    30. The _______ is a number or a set of numbers on which the cipher operates.

    A) cipher

    B) secret

    C) key

    D) none of the above

    31. In a(n) ________, the key is called the secret key.

    A) symmetric-key

    B) asymmetric-key

    C) either (a) or (b)D) neither (a) nor (b)

    CHAPTER-31

    NETWORK SECURITY

    1. Message_____ means that the data must arrive at the receiver exactly as sent.

    A) confidentiality

    B) integrity

    C) authentication

    D) none of the above2.

    Message _______ means that the receiver is ensured that the message is coming from

    the intended sender, not an imposter.

    A) confidentiality

    B) integrity

    C) authentication

    D) none of the above

    3.

    A(n) ________function creates a message digest out of a message.A) encryption

  • 7/25/2019 DCS BITS -3

    13/19

    B) decryption

    C) hash

    D) none of the above

    4. The secret key between members needs to be created as a ______ key when two

    members contact KDC.

    A) publicB) session

    C) complimentary

    D) none of the above

    5. The ________ criterion ensures that a message cannot easily be forged.

    A) one-wayness

    B) weak-collision-resistance

    C) strong-collision-resistance

    D) none of the above

    6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

    A) KDCB) CA

    C) KDD

    D) none of the above

    7. A witness used in entity authentication is ____________.

    A) something known

    B) something possessed

    C) something inherent

    D) all of the above8. A _______ message digest is used as an MDC.

    A) keylessB) keyed

    C) either (a) or (b)

    D) neither (a) nor (b)9. A(n)______ creates a secret key only between a member and the center.

    A) CA

    B) KDC

    C) KDD

    D) none of the above10.

    ________ means to prove the identity of the entity that tries to access the system's

    resources.

    A) Message authentication

    B) Entity authentication

    C) Message confidentiality

    D) none of the above11.A ________ signature is included in the document; a _______ signature is a separate

    entity.

    A) conventional; digital

    B) digital; digital

    C) either (a) or (b)

    D) neither (a) nor (b)

    12.

    If _________ is needed, a cryptosystem must be applied over the scheme.A) integrity

  • 7/25/2019 DCS BITS -3

    14/19

    B) confidentiality

    C) nonrepudiation

    D) authentication

    13.Digital signature provides ________.

    A) authentication

    B) nonrepudiation

    C) both (a) and (b)

    D) neither (a) nor (b)

    14.Digital signature cannot provide ________ for the message.

    A) integrity

    B) confidentiality

    C) nonrepudiation

    D) authentication

    15.To authenticate the data origin, one needs a(n) _______.

    A) MDC

    B) MACC) either (a) or (b)

    D) neither (a) nor (b)16.A(n) _________ can be used to preserve the integrity of a document or a message.

    A) message digest

    B) message summary

    C) encrypted message

    D) none of the above

    17.

    Challenge-response authentication can be done using ________.

    A) symmetric-key ciphers

    B) asymmetric-key ciphersC) keyed-hash functions

    D) all of the above18.The _______criterion ensures that we cannot find two messages that hash to the same

    digest.

    A) one-wayness

    B) weak-collision-resistance

    C) strong-collision-resistance

    D) none of the above19.

    A digital signature needs a(n)_________ system.

    A) symmetric-key

    B) asymmetric-key

    C) either (a) or (b)

    D) neither (a) nor (b)

    20.A(n) ________is a federal or state organization that binds a public key to an entityand issues a certificate.

    A) KDC

    B) Kerberos

    C) CA

    D) none of the above21.

    Message ________ means that the sender and the receiver expect privacy.

    A) confidentialityB) integrity

  • 7/25/2019 DCS BITS -3

    15/19

    C) authentication

    D) none of the above

    22.In ________ authentication, the claimant proves that she knows a secret without

    actually sending it.

    A) password-based

    B) challenge-responseC) either (a) or (b)

    D) neither (a) nor (b)23.

    In _______, a claimant proves her identity to the verifier by using one of the three

    kinds of witnesses.

    A) message authentication

    B) entity authentication

    C) message confidentiality

    D) message integrity

    24.The _______ criterion states that it must be extremely difficult or impossible to create

    the message if the message digest is given.A) one-wayness

    B) weak-collision-resistance

    C) strong-collision-resistance

    D) none of the above

    25.A(n) ______ is a hierarchical system that answers queries about key certification.

    A) KDC

    B) PKI

    C) CA

    D) none of the above26._________ means that a sender must not be able to deny sending a message that he

    sent.

    A) Confidentiality

    B) Integrity

    C) Authentication

    D) Nonrepudiation27.A hash function must meet ________ criteria.

    A) two

    B) three

    C) four

    D) none of the above

    28.

    __________ is a popular session key creator protocol that requires an authenticationserver and a ticket-granting server.

    A) KDC

    B) Kerberos

    C) CA

    D) none of the above

    29.Password-based authentication can be divided into two broad categories: _______ and

    _______.

    A) fixed; variable

    B) time-stamped; fixed

    C) fixed; one-timeD) none of the above

  • 7/25/2019 DCS BITS -3

    16/19

    CHAPTER-32

    SECURITY IN THE INTERNET: IPSEC, SSL/TLS,

    PGP, VPN, AND FIREWALLS

    1.

    _________ operates in the transport mode or the tunnel mode.

    A) IPSec

    B) SSL

    C) PGP

    D) none of the above

    2. IKE creates SAs for _____.

    A) SSL

    B) PGP

    C) IPSec

    D) VP

    3. ______ provides either authentication or encryption, or both, for packets at the IPlevel.

    A) AH

    B) ESP

    C) PGP

    D) SSL

    4. One security protocol for the e-mail system is _________.

    A) IPSec

    B) SSL

    C) PGPD) none of the above

    5. Typically, ______ can receive application data from any application layer protocol,but the protocol is normally HTTP.

    A) SSL

    B) TLS

    C) either (a) or (b)

    D) both (a) and (b)6. IKE is a complex protocol based on ______ other protocols.

    A) two

    B) threeC) four

    D) five

    7. IPSec defines two protocols: _______ and ________.

    A) AH; SSL

    B) PGP; ESP

    C) AH; ESP

    D) all of the above

    8. In the ______ mode, IPSec protects information delivered from the transport layer to

    the network layer.

    A) transport

    B) tunnel

    http://www.froydwess.com/2014/04/mcqs-security-in-the-internet.htmlhttp://www.froydwess.com/2014/04/mcqs-security-in-the-internet.html
  • 7/25/2019 DCS BITS -3

    17/19

    C) either (a) or (b)

    D) neither (a) nor (b)

    9. ______ is the protocol designed to create security associations, both inbound and

    outbound.

    A) SA

    B) CAC) KDC

    D) IKE10.

    A _______network is used inside an organization.

    A) private

    B) public

    C) semi-private

    D) semi-public

    11.SSL provides _________.

    A) message integrity

    B) confidentialityC) compression

    D) all of the above12.The Internet authorities have reserved addresses for _______.

    A) intranets

    B) internets

    C) extranets

    D) none of the above13.An _________ is a network that allows authorized access from outside users.

    A) intranet

    B) internetC) extranet

    D) none of the above14._________ is a collection of protocols designed by the IETF (Internet Engineering

    Task Force) to provide security for a packet at the network level.

    A) IPSec

    B) SSL

    C) PGP

    D) none of the above

    15.IKE uses _______.

    A) Oakley

    B) SKEME

    C) ISAKMP

    D) all of the above16.IPSec uses a set of SAs called the ________.

    A) SAD

    B) SAB

    C) SADB

    D) none of the above17.

    An ________ is a private network that uses the Internet model.

    A) intranet

    B) internetC) extranet

  • 7/25/2019 DCS BITS -3

    18/19

    D) none of the above

    18.______ is actually an IETF version of _____.

    A) TLS; TSS

    B) SSL; TLS

    C) TLS; SSL

    D) SSL; SLT19.In ______, there is a single path from the fully trusted authority to any certificate.

    A) X509

    B) PGP

    C) KDC

    D) none of the above

    20.The combination of key exchange, hash, and encryption algorithms defines a

    ________ for each SSL session.

    A) list of protocols

    B) cipher suite

    C) list of keysD) none of the above

    21.A ______ provides privacy for LANs that must communicate through the global

    Internet.

    A) VPP

    B) VNP

    C) VNN

    D) VPN22._______ uses the idea of certificate trust levels.

    A) X509

    B) PGPC) KDC

    D) none of the above

    23.IPSec in the ______ mode does not protect the IP header.

    A) transport

    B) tunnel

    C) either (a) or (b)

    D) neither (a) nor (b)24.________ provides privacy, integrity, and authentication in e-mail.

    A) IPSec

    B) SSL

    C) PGP

    D) none of the above25.

    In _____, there can be multiple paths from fully or partially trusted authorities.

    A) X509

    B) PGP

    C) KDC

    D) none of the above

    26.______ provides authentication at the IP level.

    A) AH

    B) ESP

    C) PGPD) SSL

  • 7/25/2019 DCS BITS -3

    19/19

    27.In _______, the cryptographic algorithms and secrets are sent with the message.

    A) IPSec

    B) SSL

    C) TLS

    D) PGP

    28.

    ______ is designed to provide security and compression services to data generatedfrom the application layer.

    A) SSL

    B) TLS

    C) either (a) or (b)

    D) both (a) and (b)29._______ provide security at the transport layer.

    A) SSL

    B) TLS

    C) either (a) or (b)

    D) both (a) and (b)30.The _______ mode is normally used when we need host-to-host (end-to-end)

    protection of data.

    A) transport

    B) tunnel

    C) either (a) or (b)

    D) neither (a) nor (b)

    31.In the _______ mode, IPSec protects the whole IP packet, including the original IP

    header.

    A) transport

    B) tunnelC) either (a) or (b)

    D) neither (a) nor (b)

    32.______ was invented by Phil Zimmerman.

    A) IPSec

    B) SSL

    C) PGP

    D) none of the above

    33.A _______ layer security protocol provides end-to-end security services for

    applications.

    A) data link

    B) network

    C) transport

    D) none of the above

    34.In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

    A) secret

    B) public

    C) either (a) or (b)

    D) both (a) and (b)