251. Network layer firewall works as a:
A. Frame Filter
B. Packet Filter
C. Both A and B
D. None of the above
252. Network Layer firewall has two subcategories as:
A. Stateful firewall and stateless firewall
B. Bit-oriented firewall and byte-oriented firewall
C. Frame firewall and packet firewall
D. None of the mentioned
253. WPA2 is used for security in:
A. Ethernet
B. Bluetooth
C. Wi-Fi
D. None of the above
254. An attempt to make a computer resource unavailable to its intended users is called:
A. Denial-of-service attack
B. Virus attack
C. Worms attack
D. Botnet process
255. Extensible Authentication Protocol is an authentication framework frequently used in:
A. Wired personal area network
B. Wireless networks
C. Wired local area network
D. None of the above
256. Pretty Good Privacy (PGP) is used in:
A. Browser security
B. Email security
C. FTP security
D. None of the mentioned
257. PGP encrypts data by using a block cipher called:
A. International Data Encryption Algorithm
B. Private Data Encryption Algorithm
C. Internet Data Encryption Algorithm
D. None of the above
258. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called:
A. DNS lookup
B. DNS Hijacking
C. DNS Spoofing
D. None of the above
259. Which of the following delays is faced by the packet in traveling from one end system to another?
A. Propagation delay
B. Queuing delay
C. Transmission Delay
D. All of the above
260. For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission delay is (in milliseconds):
A. 3.2
B. 32
C. 0.32
D. None of the above