0% found this document useful (0 votes)
70 views5 pages

Networking

This document discusses networking security and cloud computing. It covers topics such as the benefits of cloud computing from an organization's perspective, characteristics and payment models of cloud computing, security risks and protocols, and cloud service providers. Specifically, it addresses questions about cloud flexibility and automatic updates, characteristics of cloud computing, disadvantages of packet filter firewalls, appropriate payment models for small businesses, attacks on cryptosystems, functions of distributed coordination in wireless networks, and characteristics that allow organizations to scale resources on demand in the cloud.

Uploaded by

Harshini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views5 pages

Networking

This document discusses networking security and cloud computing. It covers topics such as the benefits of cloud computing from an organization's perspective, characteristics and payment models of cloud computing, security risks and protocols, and cloud service providers. Specifically, it addresses questions about cloud flexibility and automatic updates, characteristics of cloud computing, disadvantages of packet filter firewalls, appropriate payment models for small businesses, attacks on cryptosystems, functions of distributed coordination in wireless networks, and characteristics that allow organizations to scale resources on demand in the cloud.

Uploaded by

Harshini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

NETWORKING SECURITY AND CLOUD

1. Which is the benefit(s) of cloud from the perspective of a 8. Which of the following statements is not true about cloud
resource manager of any organization? and data center?
(a) Flexibility of work practices (a) Cloud is better when it comes to economically
maintaining data security
(b) Access to automatic updates
(b) Internal Management team is required to run the data
(c) None of the mentioned options center
(d) Both Flexibility of work practices and Access to (c) Cloud is better when it comes to maintaining data
automatic updates security
(d) Data center is better when it comes to maintaining
2. Which of the following option is incorrect relationship
data security
between the characteristic of Cloud and its description?
(a) Rapid Elasticity: scale out and in quickly as per need 9. Map true (T) and false (F) for the following statements.
(b) Resource pooling: Multiple type of clients are Statement I: Higher the network bandwidth, the better the
provided service quality of service of the network
Statement II: Higher the latency, better the quality of
(c) Measured Service: resource utilization is tracked and
service of the network
Rapid Elasticity: scale out and in quickly as per need
Statement III: Lower the latency, better the quality of
(d) Measured Service: resource utilization is tracked service of the network
3. Which of the following is the disadvantage of the Packet Statement IV: Just-in-time (JIT) service is the notion
Filter Firewall? required cloud elasticity either to provide more resources
in the cloud or less
(a) Stateless (b) Cost
(a) F T F T (b) T F T F
(c) Transparency (d) Efficiency
(c) T T F F (d) T F T T
4. Which of the following payment options is best suited for
10. Which of the following is /are not the risks associated
small businesses in cloud? with SSH keys?
(a) Pay-per-use (a) SSH keys can be used to hide backdoors
(b) pay-as-you-go (b) Vulnerable to active network – level attacks
(c) pay-and-use (c) The keys can be kept offline
(d) None of the mentioned options (d) Lack of provisioning, termination, and overnight
processes
5. Which of the following attacks focuses on breaking the
cryptosystem? 11. Which of the following options is correct based on the
below statements?
(a) Brute-Force attacks
Statement I: Wi-Fi Protected Access was introduced after
(b) Social Engineering attack
increasingly noticeable vulnerabilities of the WEP
(c) Implementation attacks standard.
(d) Classical Mathematical Attacks Statement II: Wired Equivalent Privacy algorithm has a
limit of 138-bit encryption key only
6. Which of the following is/are not required to calculate the
(a) Both statements are true and Statement II is the
Message Authentication Code?
incorrect explanation of Statement I
(a) Actual Message sent (b) Statement I is true and Statement II is false
(b) Symmetrical shared secret (c) Both statements are true and Statement II is the
(c) Packet number correct explanation of Statement I
(d) Hash value (d) Both statements are false

7. Which of the following is true about the Distributed 12. Which of the following layer(s) of an OSI model include
Coordination Function? type of protocol in their?
1. It is a mandatory function used in CSMA/CA (a) Layer (b) All except Layer 4
(c) Layer 2 (d) Layer 4
2. It is an optional function used by 802.11 MAC
Sublayer 13. Your sister wants to become an expert in animation and
3. It is used in distributed contention-based channel seeks your advice on what software would be appropriate
access for her to master. Which of the following would you not
suggest for animation?
4. It is used in centralized-free channel access
(a) Flash (b) 3D5 MAX
(a) 1 and 4 (b) 2 and 3
(c) MS Paint (d) Maya
(c) 2 and 4 (d) 1 and 3

Page 1 of 5
NETWORKING SECURITY AND CLOUD

14. Karen wishes to ensure that other users of her computer 22. Which of the following characteristic of Cloud allows the
are not able to track websites she has browsed. Which of organization to never get out of resources?
the following should she do in the browse settings? (a) Rapid Elasticity (b) Measured Service
(a) Shut down and restart the computer (c) Resource pooling (d) On-demand self-services
(b) Change all passwords
23. If a binary string, “101011” is encrypted to 101111 by
(c) Make sure the browser windows are closed
using CBC mode with the binary initialization vector 11,
(d) Clear history
then what will be the encrypted value for 110110?
15. Which of the following fields of IEEE 802.11 frame is the (a) 110100 (b) 101011
4-byte field that consists of error detection information? (c) 11010 (d) 110011
(a) Frame Check Sequence (b) Protocol Version
24. Which of the following allows any business to reduce time
(c) Frame Control (d) Protected Frame
delays and reduce energy consumption as well?
16. While creating a PowerPoint presentation you are (a) Cloud
planning to add references in footnotes. Under which of (b) None of the mentioned quotes
the following you find the Header & Footer option?
(c) Data Center
(a) Illustrations (b) Text
(d) Both Data Center and Cloud
(c) Add-ins (d) Images
25. Which of the following cloud service provider the
17. Which of the following encryption algorithm does not following Computations services?
operate in bit by bit fashion?
1. Elastic Container Service
(a) Rivest Cipher 4
2. Elastic Load Balancing
(b) Rivest Cipher 5
3. Fargate
(c) Data Encryption Standard
4. Batch
(d) Rivest Cipher 5 & Data Encryption Standar
(a) Google Cloud (b) Oracle
18. Which of the following options is true about the (c) AWS (d) Azure
statements given below?
26. Which out of the following keys is used to derive the
Statement I: Cloud increases the speed of computing by
increasing the processing power and making things Pairwise Master key?
simpler. (a) Authentication, Accounting and Authorization Key
Statement II: Software integration never occurs (b) Pre-shared key
automatically in the cloud. (c) Group Master Key
Statement III: DDOS attack on your talent could never (d) Pair-wise Transient key
affect the performance of your shared resource.
27. Assume that you have configured wireless access to the
Statement IV: In case your organization surpasses the
Internet using appropriate security. Which two items
given allowance, the additional changes are always less.
should be configured on the wireless client?
(a) All Statements are false
(a) RF Channel, BSS (b) WEP and Passphrase
(b) Except Statement I, all are false
(c) PSK, Manual SSID (d) SSID, IP address
(c) All Statements are true
(d) Only Statement I and II are true 28. In Zone based firewall, three zones are created (inside,
outside and DMZ). Zone pairs have to be created for
19. How many words would be required to change a plaintext communication zones to make the two zones to
piece of data into encrypted data in AES-256? communicate. You create a zone pair “inside to outside’.
(a) 31 (b) 52 (c) 60 (d) 58 Which command should be followed to create the zone pair?
20. Which of the following attacks depends on the human factor? (a) Ensure that Class-map policy and the Policy-map are
not interacting with each other Create Zone pair to
(a) Classical Mathematical Attacks
allow traffic in one direction
(b) Brute-Force attacks
(b) Assign Class-map to the Policy-map Create Zone pair
(c) Implementation attacks
to allow traffic in both direction
(d) Social Engineering attack
(c) Assign Class-map to the Policy-map Create a Zone pair
21. Which of the following subfields of IEEE 802.11 frame control to allow traffic in one direction
is the single bit field that indicates the frame security? (d) Ensure that Class map-policy and the Policy-map are
(a) Subtype (b) Frame Control not interacting with each other Create Zone pair to
(c) Protocol Version (d) Protected Frame allow traffic in both directions

Page 2 of 5
NETWORKING SECURITY AND CLOUD

29. Consider the following use case in a cloud- (a) SAAS (b) Iaas
A user of Gmail, Facebook, or LinkedIn accesses the (c) PAAS (d) None of the given options
application and their data through any browser on any
device. The user does not want t keep up with anything 33. The method to crack RSA encryption is to begin to desire
more than a password, their data is stored and managed the two prime numbers that are used in the RSA PKI
in the cloud. Here, the user has no idea about how the mathematical process. Which of the following options can
underlying architecture works. If they access the Internet, be used to find the two numbers, ‘A’ and ‘B’ to derive the
they can access their data. private key?
Which of the following options is the requirement of this (a) Factorization (b) Prime detection
use case?
(c) Hashtag (d) Brute-force
(a) The cloud service should authenticate the end user
(b) Although service level agreements for end users will 34. The filtering service in inbound response for DNS is
usually be much simpler than those for enterprises, sometimes difficult as the hostname to IP address is
cloud vendors should be clear about what guarantees received from outside network. As a result, it becomes
of service they provide. very difficult to take any security, related decisions.
(c) Depending on the kind of data the enterprise is Which of the following solutions is incorrect in the
managing on the user’s behalf, there can be logout context of filtering the DNS?
restrictions on the location of the physical server
(a) Use a DNS proxy that diverts internal information to
where the data is stored.
the internal DNS server
(d) Access to the cloud service should not require a
(b) Use a DNS proxy that blocks the inbound responses
particular platform or technology
(c) Keep inbound queries to DNS
30. Two serves are dedicated to payroll processing, a complex
(d) Use DNS proxy that diverts quenes for external
and time-consuming process. The organization decides to
information to the internal DNS server
see how practical it will be to run the payroll process in
the cloud. The existing payroll system is architected as a 35. Which of the following file extensions is used for email
distributed application. Which of the following statements storage in outlook?
about the probability of the application. Which of the
following statements about the portability of the .Pst
application is correct if it is on Fedora and Java & 7? .ost
(a) It will run without changes on any cloud providers .msg
platform that supports Fedora .oft
(b) We need to change the different cloud storage (a) Pst (b) Msg
provider
msg ost
(c) We need to change the different cloud middle ware
provider (c) pst (d) pst
(d) Changing the application to use a cloud database easy. oft ost
If it involves moving to a cloud database that does not
36. Which of the following SSH Command is used to copy a
support the relational model.
file?
31. Your customer is a large medical organization who is (a) touch filename Dir 1
considering using Microsoft virtualization. Their main
(b) cp fileName /directory/path/destination
concern is that they have some legacy applications that are
conflicting with the current opeating systems. What kind of (c) rm filename
virtualization will help them overcome this challenge? (d) mv fileName directory/path/destination
(a) Presentation Virtualization
37. Which of the following could not be valid email address?
(b) Application virtualization
(a) Edward.culeen@yahoo.com
(c) Server Virtualization
(b) Edward.cullen@yahoo.com
(d) Desktop Virtualization
(c) Edwardcullen@yahoo.com
32. Salesforce offers customers the capacity of obtaining a
(d) Ecullen@yahoo.com
customer relationship management (CRM) process from
the cloud. The customer has access to all their customer 38. Which of the following clouds service provider should be
data from any location. The customer has access to all preferred if most of your data is of Binary large objects?
their customer data from any location. Like email, CRM is
(a) Azure (b) Oracle
a clear and comprehensible process. So, which type of
model can it be easily offered in? (c) AWS (d) Google cloud platform

Page 3 of 5
NETWORKING SECURITY AND CLOUD

39. Which of the following is/are the correct option(s) in 45. Which of the following is the second stage of establishing
which of the intrusion detection system help? an SSH SESSION?
(a) resetting the connection to save the IP address from (a) Agree upon encryption to protect future
any blockage. communication
(b) Correction of cyclic redundancy errors (b) Establish encryption to protect future communication
(c) Sending an alarm against any malicious activity in the (c) Authenticate the user
network (d) Agree upon encryption and establish encryption to
(d) All of the mentioned options. protect future communication

40. Map true (T) and false (F) for the following statement: 46. Which of the following statements is true about cloud and
Statement I: Google cloud has a data lake storage which is data center?
useful for Big data applications. 1. In cloud, owner is responsible for downtime and
repairs
Statement II: Google cloud does not have a backup and
archive services. 2. In Data center, owner is responsible for downtime
and repairs
Statement III: Google cloud has two SQL- based options:
cloud SQL and cloud spanner. Choose the correct answer from the options given below.

Statement IV: AWS provides simple storage services, (a) Only 2 (b) Both 1 and 2
snowball Edge, Snowmobile as storage service. (c) Neither 1 and 2 (d) Only 1
(a) F T F F (b) T F F T 47. Which of the following attacks treats the encryption
(c) T F T F (d) D T T T algorithm as black box?

41. Which of the following option is correct based on the (a) Implementation attacks
below statements? (b) Social Engineering attack
Statement I: Google cloud provides cloud speech API, (c) Brute-force attacks
video Intelligence, video intelligence and Natural (d) Analytical Attacks
Languages
48. Which of the following encryption algorithm is based on
Statement II: It offers IoT and serverless services, but the RC4 algorithm and 24 bits bits of initialization vector?
both are still in beta previews.
(a) None of the mentioned options
(a) Statement I is true and statement II is false
(b) WEP
(b) Both statements are true and statement II is the
(c) WPA 2
incorrect explanations of statement I
(d) WPA
(c) Both statements are false
(d) Both statements are tune and statement II is the 49. Which of the following is/are the difference between the
correct explanations of statement I TKIP and WEP?
(a) All of the mentioned options
42. What will be the sum of the port numbers of Telnet and
(b) TKIP uses shorter key and IV lengths
Internet Relay chat?
(c) TKIP guard against integrity attacks
(a) 200 (b) 217 (c) 213 (d) 221
(d) TKIP uses Rivest Cipher 4 algorithm
43. Which cryptographic protocol is used to prevent attacks
50. Which of the following are present in the message
on data integrity by TKIP?
integrity Code’s tagging function to result a particular tag?
(a) Point to point protocol
(a) Bit swapping
(b) Message Integrity Code
(b) XOR operation
(c) Secure Shell
(c) Bit addition
(d) Internet key Exchange
(d) All of the mentioned options
44. Which of the following types of cryptography’s strength
51. Which of the following are the least expensive type of
depends on the number of key bites?
firewall?
(a) Asymmetric key cryptography
(a) Packet Filter Firewall
(b) Hashing
(b) Stateful inspection
(c) Symmetric key cryptography
(c) Proxy Firewalls
(d) None of the mentioned options
(d) Cloud firewalls

Page 4 of 5
NETWORKING SECURITY AND CLOUD

52. What is the size of the authentication key of the (a) Metamorphic virus mutates all its body
cryptographic protocol which is used to prevent attacks (b) Metamorphic virus mutates the variable only
on data integrity by TK… (c) None of the mentioned options
(a) 32-bits (b) 128-bits (d) Metamorphic virus mutates the decryptor loop
(c) 256-bits (d) 64-bits
60. Which of the following type of DES key causes the
53. Consider a situation where you have to choose between encryption to become self-inverting?
the major cloud service providers. Which would you (a) Key which consists of alternating 1’s and 0’s
choose if you need a cloud service which focus on (b) Key which consists of a pattern of two 1’s and one 0
Kubernetes and has a simplest UI?
(c) Key which consists of a pattern of two 0’s and one 1
(a) Google cloud (b) AWS
(d) Key which consists of a pattern of two 0’s and two 1’s
(c) Oracle (d) Azure
61. Which of the following types of encryption cannot be used
54. Which of the following attacks treats the encryption for decrypting bulk message?
algorithm as a black box?
(a) Asymmetric Key cryptography
(a) Implementation attacks (b) All of the mentioned options
(b) Social Engineering attack (c) symmetric key cryptography
(c) Brute-force attacks (d) Hashing
(d) Analytical Attacks
62. Which of the following encryption algorithms does not
55. What is the primary work of SSH in hashing encryption operate on the fixed-size block of data?
and decryption? (a) Rivest cipher 4
(a) Ensure that the received message text is intact and (b) Advanced Encryption Standard
unmodified (c) Data Encryption Standard
(b) Authenticate a client to a server (d) Rivest cipher 5
(c) Packet integrity
63. Which of the following characteristic of cloud allows you
(d) Utilize a variety of different symmetrical cipher
to make out of the effective use of resources?
systems
(a) Resource pooling
56. Which of the following is the incorrect representation of (b) Measured service
the layer number and name of an OST model?
(c) On-demand self-services
(a) Layer 2 is the data-link layer (d) Rapid Elasticity
(b) Layer 4 is the session layer
64. Which of the following statements is true about the cloud
(c) Layer 3 is the network layer
and data center?
(d) Layer 6 is the presentation layer
(a) Overall, the cloud is better when it comes to
57. Which of the following is the benefit of Enterprise data maintaining data security
warehouse? (b) Data center is better when it comes to economically
(a) Houses data for individual business units maintaining data security
(b) None of the mentioned options (c) Internal management team is not required to run the
(c) Data is accessible in one place data center
(d) Data center is better when it comes to maintaining
(d) Scattered datasets for data prevention.
data security
58. Which of the following option is the incorrect relationship
65. How many rounds of processing are there to change a
between the characteristic of the cloud and its
plaintext piece of data into encrypted data in AES-192?
description?
(a) 12 (b) 8 (c) 10 (d) 14
(a) Rapid Elasticity: more usage of resources at regular
time period. 66. Which WLAN security is based on stream cipher
(b) All of the mentioned options encryption algorithm and uses 16-byte encryption key?
(c) Measured Services: Multiple clients are provided (a) Wired equivalent Privacy (WEP)
service (b) IEEE802.1x
(c) Service Set Identifier
59. What is difference between metamorphic and
polymorphic viruses? (d) Temporal Key Integrity Protocol

Page 5 of 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy