 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 102 Mcqs, each offering curated multiple-choice questions to sharpen your Mongodb knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which of the following is a valid encryption technique? | 
| A. | Parallel key encryption | 
| B. | Public key encryption | 
| C. | Systematic key encryption | 
| D. | All of the mentioned | 
| Answer» C. Systematic key encryption | |
| 2. | In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker. | 
| A. | SQL injection | 
| B. | SQL | 
| C. | Direct | 
| D. | Application | 
| Answer» B. SQL | |
| 3. | In the SSL record protocol operation pad_2 is – | 
| A. | is the byte 0x36 repeated 40 times for MD5 | 
| B. | is the byte 0x5C repeated 48 times for MD5 | 
| C. | is the byte 0x5C repeated 48 times for SHA-1 | 
| D. | is the byte 0x36 repeated 48 times for MD5 | 
| Answer» C. is the byte 0x5C repeated 48 times for SHA-1 | |
| 4. | In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange? | 
| A. | server_done | 
| B. | server_key_exchange | 
| C. | certificate_request | 
| D. | crtificate_verify | 
| Answer» B. server_key_exchange | |
| 5. | Number of phases in the handshaking protocol? | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» D. 5 | |
| 6. | In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively. | 
| A. | Select, Alarm | 
| B. | Alert, Alarm | 
| C. | Warning, Alarm | 
| D. | Warning, Fatal | 
| Answer» E. | |
| 7. | Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes | 
| A. | i and iii | 
| B. | ii only | 
| C. | ii and iii | 
| D. | ii iii and iv | 
| Answer» D. ii iii and iv | |
| 8. | Which of the following is not a valid input to the PRF in SSLv3? | 
| A. | secret value | 
| B. | identifying label | 
| C. | initialization vector | 
| D. | secret value | 
| Answer» D. secret value | |
| 9. | In the SSLv3 the padding bits are ____________ with the secret key. | 
| A. | Padded | 
| B. | XORed | 
| C. | Concatenated | 
| D. | ANDed | 
| Answer» D. ANDed | |
| 10. | The client_key_exchange message uses a pre master key of size – | 
| A. | 48 bytes | 
| B. | 56 bytes | 
| C. | 64 bytes | 
| D. | 32 bytes | 
| Answer» B. 56 bytes | |
| 11. | he certificate message is required for any agreed-on key exchange method except _______________ | 
| A. | Ephemeral Diffie-Hellman | 
| B. | Anonymous Diffie-Hellman | 
| C. | Fixed Diffie-Hellman | 
| D. | RSA | 
| Answer» C. Fixed Diffie-Hellman | |
| 12. | The DSS signature uses which hash algorithm? | 
| A. | MD5 | 
| B. | SHA-2 | 
| C. | SHA-1 | 
| D. | Does not use hash algorithm | 
| Answer» D. Does not use hash algorithm | |
| 13. | The certificate_request massage includes two parameters, one of which is- | 
| A. | certificate_extension | 
| B. | certificate_creation | 
| C. | certificate_exchange | 
| D. | certificate_type | 
| Answer» E. | |
| 14. | What is the size of the RSA signature hash after the MD5 and SHA-1 processing? | 
| A. | 42 bytes | 
| B. | 32 bytes | 
| C. | 36 bytes | 
| D. | 48 bytes | 
| Answer» D. 48 bytes | |
| 15. | The RSA signature uses which hash algorithm? | 
| A. | MD5 | 
| B. | SHA-1 | 
| C. | MD5 and SHA-1 | 
| D. | None of the mentioned. | 
| Answer» D. None of the mentioned. | |
| 16. | _______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. | 
| A. | OpenID | 
| B. | Single-site system | 
| C. | Security Assertion Markup Language (SAML) | 
| D. | Virtual Private Database (VPD) | 
| Answer» E. | |
| 17. | VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism. | 
| A. | Row-level authorization | 
| B. | Column-level authentication | 
| C. | Row-type authentication | 
| D. | Authorization security | 
| Answer» B. Column-level authentication | |
| 18. | The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years. | 
| A. | OpenID | 
| B. | Single-site system | 
| C. | Security Assertion Markup Language (SAML) | 
| D. | Virtual Private Database (VPD) | 
| Answer» B. Single-site system | |
| 19. | Many applications use _________________, where two independent factors are used to identify a user. | 
| A. | Two-factor authentication | 
| B. | Cross-site request forgery | 
| C. | Cross-site scripting | 
| D. | Cross-site scoring scripting | 
| Answer» B. Cross-site request forgery | |
| 20. | The message digest needs to be | 
| A. | public | 
| B. | private | 
| C. | kept secret | 
| D. | None | 
| Answer» D. None | |
| 21. | The Message confidentiality or privacy means that the sender and the receiver expect | 
| A. | Integrity | 
| B. | Confidentiality | 
| C. | Authentication | 
| D. | Nonrepudiation | 
| Answer» C. Authentication | |
| 22. | In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of | 
| A. | 512 Bit Blocks | 
| B. | 1001 Bit Blocks | 
| C. | 1510 Bit Blocks | 
| D. | 2020 Bit Blocks | 
| Answer» B. 1001 Bit Blocks | |
| 23. | To preserve the integrity of a document, both the document and the fingerprint are | 
| A. | Not Used | 
| B. | Unimportant | 
| C. | Needed | 
| D. | Not needed | 
| Answer» D. Not needed | |
| 24. | A sender must not be able to deny sending a message that was sent, is known as | 
| A. | Message Nonrepudiation | 
| B. | Message Integrity | 
| C. | Message Confidentiality | 
| D. | Message Sending | 
| Answer» B. Message Integrity | |
| 25. | Message confidentiality is using | 
| A. | Cipher Text | 
| B. | Cipher | 
| C. | Symmetric-Key | 
| D. | Asymmetric-Key | 
| Answer» E. | |
| 26. | Encryption and decryption provide secrecy, or confidentiality, but not | 
| A. | Authentication | 
| B. | Integrity | 
| C. | Privacy | 
| D. | All of the above | 
| Answer» C. Privacy | |
| 27. | When the data must arrive at the receiver exactly as they were sent, its called | 
| A. | Message Confidentiality | 
| B. | Message Integrity | 
| C. | Message Splashing | 
| D. | Message Sending | 
| Answer» C. Message Splashing | |
| 28. | A digital signature needs a | 
| A. | Private-key system | 
| B. | Shared-key system | 
| C. | Public-key system | 
| D. | All of them | 
| Answer» D. All of them | |
| 29. | A session symmetric key between two parties is used | 
| A. | Only once | 
| B. | Twice | 
| C. | Multiple times | 
| D. | Conditions dependant | 
| Answer» B. Twice | |
| 30. | One way to preserve the integrity of a document is through the use of a | 
| A. | Eye-Rays | 
| B. | Finger Print | 
| C. | Biometric | 
| D. | X-Rays | 
| Answer» C. Biometric | |
| 31. | To check the integrity of a message, or document, the receiver creates the | 
| A. | Hash-Table | 
| B. | Hash Tag | 
| C. | Hyper Text | 
| D. | Finger Print | 
| Answer» C. Hyper Text | |
| 32. | Message authentication is a service beyond | 
| A. | Message Confidentiality | 
| B. | Message Integrity | 
| C. | Message Splashing | 
| D. | Message Sending | 
| Answer» C. Message Splashing | |
| 33. | The digest created by a hash function is normally called a | 
| A. | Modification detection code (MDC) | 
| B. | Modify authentication connection | 
| C. | Message authentication control | 
| D. | Message authentication cipher | 
| Answer» B. Modify authentication connection | |
| 34. | A hash function guarantees the integrity of a message. It guarantees that the message has not be | 
| A. | Replaced | 
| B. | Over view | 
| C. | Changed | 
| D. | Violated | 
| Answer» D. Violated | |
| 35. | Which of the following alert codes is not supported by SSLv3? | 
| A. | record_overflow | 
| B. | no_certificate | 
| C. | internal_error | 
| D. | decode_error | 
| Answer» C. internal_error | |
| 36. | We encounter the record_overflow error when the payload length exceeds – | 
| A. | 2^14 + 1024 | 
| B. | 2^16 + 1024 | 
| C. | 2^14 + 2048 | 
| D. | 2^16 + 2048 | 
| Answer» D. 2^16 + 2048 | |
| 37. | An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. | 
| A. | 40; 80 | 
| B. | 60; 620 | 
| C. | 80; 443 | 
| D. | 620; 80 | 
| Answer» D. 620; 80 | |
| 38. | Which key exchange technique is not supported by SSLv3? | 
| A. | Anonymous Diffie-Hellman | 
| B. | Fixed Diffie-Hellman | 
| C. | RSA | 
| D. | Fortezza | 
| Answer» E. | |
| 39. | URL stands for – | 
| A. | Universal Remote Locator | 
| B. | Universal Resource Language | 
| C. | Uniform Resource Locator | 
| D. | Uniform Resource Language | 
| Answer» D. Uniform Resource Language | |
| 40. | HTTPS stands for Hypertext Transfer Protocol over TLS. | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» B. False | |
| 41. | In TLS padding cann be upto a maximum of – | 
| A. | 79 bytes | 
| B. | 127 bytes | 
| C. | 255 bytes | 
| D. | none of the mentioned | 
| Answer» D. none of the mentioned | |
| 42. | In the Key generation procedure, the Initialization Vector from the server to client is represented as: | 
| A. | HASH(K||H||”C”||session_id) | 
| B. | HASH(K||H||”B”||session_id) | 
| C. | HASH(K||H||”F”||session_id) | 
| D. | HASH(K||H||”D”||session_id) | 
| Answer» C. HASH(K||H||”F”||session_id) | |
| 43. | The session Identifier remains constant throughout the SSH connection. | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» B. False | |
| 44. | Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string- | 
| A. | client finished for the client | 
| B. | client finished for the client, server finished for the server | 
| C. | server finished for the server | 
| D. | client finished for the server, server finished for the client | 
| Answer» C. server finished for the server | |
| 45. | The correct order of operations in the SSH Transport Layer Protocol Packet Formation is – | 
| A. | Compression; Encryption; Padding and Addition of seq bits | 
| B. | Compression; Padding and Addition of seq bits; Encryption | 
| C. | Encryption; Padding and Addition of seq bits; Compression | 
| D. | Padding and Addition of seq bits; Encryption; Compression | 
| Answer» C. Encryption; Padding and Addition of seq bits; Compression | |
| 46. | In the Key generation procedure, the Integrity Key from the server to client is represented as: | 
| A. | HASH(K||H||”A”||session_id) | 
| B. | HASH(K||H||”B”||session_id) | 
| C. | HASH(K||H||”E”||session_id) | 
| D. | HASH(K||H||”F”||session_id) | 
| Answer» E. | |
| 47. | In the Key generation procedure, the Integrity Key from the client to server is represented as: | 
| A. | HASH(K||H||”E”||session_id) | 
| B. | HASH(K||H||”C”||session_id) | 
| C. | HASH(K||H||”B”||session_id) | 
| D. | HASH(K||H||”D”||session_id) | 
| Answer» B. HASH(K||H||”C”||session_id) | |
| 48. | SH_MSG_USERAUTH_SUCCESS is represented by the byte – | 
| A. | 50 | 
| B. | 51 | 
| C. | 60 | 
| D. | None of the mentioned | 
| Answer» E. | |
| 49. | Which of the following are valid authentication methods? | 
| A. | Public Key Based | 
| B. | Password Based | 
| C. | Host Based | 
| D. | All of the mentioned | 
| Answer» E. | |
| 50. | SSH_MSG_USERAUTH_FALIURE is represented by byte- | 
| A. | 50 | 
| B. | 51 | 
| C. | 52 | 
| D. | None of the mentioned | 
| Answer» C. 52 | |