Exam 13: Hash Algorithms, Certificate Request, Firewall Types, and Dmz Setup

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

The client_key_exchange message uses a pre master key of size -

Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
Verified

A

Which of the following is / are the types of firewall?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

The RSA signature uses which hash algorithm?

(Multiple Choice)
4.8/5
(39)

A proxy firewall filters at                    

(Multiple Choice)
4.9/5
(35)

The certificate_request massage includes two parameters, one of which is-

(Multiple Choice)
4.8/5
(37)

Network layer firewall works as a

(Multiple Choice)
4.9/5
(47)

Network layer firewall has two sub- categories as                    

(Multiple Choice)
4.9/5
(38)

What is one advantage of setting up a DMZ with two firewalls?

(Multiple Choice)
4.8/5
(40)

A firewall needs to be------------  so that it can grow proportionally with the network that it protects.

(Multiple Choice)
4.8/5
(41)

A packet filter firewall filters at

(Multiple Choice)
4.8/5
(40)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)