Upwork Test Answers: Get all the correct answers of most recent and possible Upwork Tests A to Z (Updated on Jan, 2016)
Cover Letter Templates: These cover letter samples are not only for Upwork job, but also you will have some idea about your real life job
 
Freelance Profile Overviews: Different Profile samples and overviews of experts, advanced and intermediate level freelancers
For Newbie of Upwork: Upwork Help - How to apply for a job in Upwork with 10 most important articles about Upwork

A to Z View - All Upwork Test Answers

Internet Security Test Answers

Hello networking experts, here goes a post for you. In this post you will have 76 most recent test questions with updated answers of Internet Security Test for Upwork Networking category.

Press Ctrl + F to find your desired answers of this test. enjoy :)
--------------------------------------------------------------------------------------------------------------------------

1. Which of the following are the components of a UTM appliance?

 Answers: • Firewall • Gateway Antispam • Gateway Antivirus

 2. Which of the following are Virus propagation techniques?
 Answers: • Master Boot Record or • File Infection or • Macro Infection

 3. Which of the following measures are taken to enhance the security of the system? (Select all that apply)
 Answers: • Operating System based hardening ---- • Network Based hardening --- • Application Based hardening

 4. Which of the following methods can be used for Network hardening?
 Answers: • Evaluating IDS - • Refining ACLs on routers and switches. - • Up-to-date OS and patches of Network devices.

 5. Which of the following are signs of Security breach?
 Answers: • Data modification and deletion. ---- • System performance issues. ---- • Different traffic patterns.

 6. Which of the following are the placement modes of an IDS/IPS?
 Answers: • Inline or • SPAN

 7. Which of the following are the advantages of Honeypots?
 Answers: • Intelligent IDS or • Distracts Hackers

 8. Which of the following things should be kept in mind while managing passwords?
 Answers: • Easily guessed passwords should not be used. or • Passwords should not be stored on a plain view.

 9. Which of the following Symmetric encryption algorithms is/are supported by S/MIME?
 Answers: • DES or • 3DES

 10. Which of the following are Email Security protocols?
 Answers: • S/MIME or • PEM

 11. Which of the following can be classified as passive attacks?
 Answers: • Vulnerability scans. or • Sniffing.

 12. Select the common VPN protocols.
 Answers: • L2TP or • PPTP

 13. Which of the following are Vulnerability assessment tools?
 Answers: • Nmap or • Nessus

 14. Which of the following are the components of IPSec?
 Answers: • Authentication Header. or • Encapsulating Security Payload.

 15. Which of the following appliances help/s in filtering virus packets?
 Answers: • UTM or • IDS/IPS

 16. Select the objectives of E-mail security.
 Answers: • Verifying the source of a message. or • Classifying attachments.

 17. Which of the following protocols uses UDP:
 Answers: • DNS or • TFTP

 18. Below are the given statements, which statement shows the breach of Confidentiality:
 Answers: • Hacker using sniffer tools to view the packets in a network.

 19. Which of the following goals cannot be achieved with Symmetric cryptography?
 Answers: • Non-repudiation

 20. The ability to exploit a vulnerability is called:
 Answers: • Threat

 21. Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?
 Answers: • Mark's Public key.

 22. Which protocol helps in securing LDAP?
 Answers: • LDAPS

 23. By which of the following third parties are Digital Certificates signed?
 Answers: • Certificate Authority

 24. Which of the following Asymmetric encryption algorithms is supported by S/MIME?
 Answers: • RSA

 25. Which of the following is the standard certificate?
 Answers: • X.509

 26. Which of the following is an application attack?
 Answers: • DNS Poisoning

 27. In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?
 Answers: • 2

 28. In which of the following protocols does an SYN attack help to find a weakness?
 Answers: • TCP/IP

 29. Which of the following authentication protocols are used to encrypt passwords?
 Answers: • CHAP

 30. Which protocol is used by TACACS+?
 Answers: • TCP

 31. Which of the following is an Asymmetric algorithm?
 Answers: • El Gamal

 32. Which of the following helps us to block attacks on a single machine?
 Answers: • Host Based IPS

 33. How many keys are required if two parties communicate using Asymmetric cryptography?
 Answers: • Two

 34. What is the key length of Triple DES?
 Answers: • 168

 35. What are the features of an IPS?
 Answers: • Anomaly based.

 36. Which key is used to decrypt the message in PKI?
 Answers: • Private Key

 37. Which of the following statements resembles Trojan horses?
 Answers: • Installation of Backdoor Programs.

 38. Which port is used by PPTP?
 Answers: • 1723

 39. Below are the given statements, which statement shows the breach of Availability:
 Answers: • SYN attack on a server.

 40. A criminal who breaks into computers maliciously is known as
 Answers: • Black Hat Hacker.

 41. What is function of IPS?
 Answers: • A device to block intrusion attacks

 42. The process of switching protocols between routing devices is called
 Answers: • Switching

 43. Which of the following are Transport Layer Security protocols?
 Answers: • SOCKS

 44. A Brute Force attack
 Answers: • discovers the passwords.

 45. Which of the following statements is true of Tunneling?
 Answers: • Contents of the protocol are encapsulated.

 46. Which of the following detect/s security weaknesses in a remote or local host?
 Answers: • Scanner

 47. By which of the following can the injection of bogus routes into the core network be prevented ?
 Answers: • Routing Protocol Authentication

 48. Mike wants to secure the data on his personal computer. Which of the following options will he choose to secure the data?
 Answers: • Encryption

 49. Which protocol is used to secure the WAP communication?
 Answers: • Wireless Transport Layer Security

 50. The part of a company's intranet which is extended to users outside the company is called:
 Answers: • Extranet

 51. The concept of allowing access to resources only to those permitted is known as
 Answers: • Authorization

 52. How many keys are required if two parties communicate using Symmetric cryptography?
 Answers: • One

 53. Which of the following keys helps us in the verification of the Digital Signature?
 Answers: • Public Key

 54. What is RBL in E-mail Security?
 Answers: • Realtime Blocking List

 55. Which of the following techniques is used to approach security in Java?
 Answers: • Sandboxing

 56. What does RBL contain?
 Answers: • IP addresses of closed relay mail servers

 57. What is RSA in cryptography?
 Answers: • Rivest, Shamir, Adleman

 58. Which of the following are the key principles of Internet Security?
 Answers: • Confidentiality, Integrity, Authentication

 59. Which of the following is created to serve as a snare for intruders?
 Answers: • Honey Pots.

 60. What is S/MIME?
 Answers: • Secure Multipurpose Internet Mail Extensions

 61. Which of the following can be transmitted through an E-mail?
 Answers: • All of the above

 62. Joe wants to secure his client's Web Server. Which of the following measures will he take?
 Answers: • Eliminating Scripting Vulnerabilities

 63. Which of the following is Application-level security protocol are used for communications session security?
 Answers: • Both A and B

 64. What is a UTM appliance?
 Answers: • Unified Threat Management.

 65. In which of the following does Buffer Overflow help us to find weaknesses?
 Answers: • Firewalls

 66. In which of the following attacks, sending a large number of spoofed ICMP ECHO requests to broadcast address?
 Answers: • SMURF attack

 67. Which port does IKE key negotiation protocol use?
 Answers: • UDP 500

 68. Which type of authentication is."Something the user has " ?
 Answers: • Dual Factor

 69. Which protocol is used by RADIUS?
 Answers: • UDP

 70. A positive detection of result that is false or untrue is called
 Answers: • False Positive

 71. Which of the following are the components of PKI?
 Answers: • Certificate Authority.

 72. Which of the following protocols does not help in securing the FTP?
 Answers: • SSFTP

 73. By which of the following methods can social engineering be curbed by?
 Answers: • User Education

 74. Which of the following Symmetric algorithms has variable key length?
 Answers: • Rivest Cipher 4

 75. Which of the following statement shows the breach of Integrity:
 Answers: • Important data deleted from a document.

 76. Select the drawbacks of Symmetric key cryptography.
 Answers: • It is less secure