MCQOPTIONS
Saved Bookmarks
This section includes 102 Mcqs, each offering curated multiple-choice questions to sharpen your Mongodb knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is a valid encryption technique? |
| A. | Parallel key encryption |
| B. | Public key encryption |
| C. | Systematic key encryption |
| D. | All of the mentioned |
| Answer» C. Systematic key encryption | |
| 2. |
In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
| A. | SQL injection |
| B. | SQL |
| C. | Direct |
| D. | Application |
| Answer» B. SQL | |
| 3. |
In the SSL record protocol operation pad_2 is – |
| A. | is the byte 0x36 repeated 40 times for MD5 |
| B. | is the byte 0x5C repeated 48 times for MD5 |
| C. | is the byte 0x5C repeated 48 times for SHA-1 |
| D. | is the byte 0x36 repeated 48 times for MD5 |
| Answer» C. is the byte 0x5C repeated 48 times for SHA-1 | |
| 4. |
In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange? |
| A. | server_done |
| B. | server_key_exchange |
| C. | certificate_request |
| D. | crtificate_verify |
| Answer» B. server_key_exchange | |
| 5. |
Number of phases in the handshaking protocol? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 6. |
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively. |
| A. | Select, Alarm |
| B. | Alert, Alarm |
| C. | Warning, Alarm |
| D. | Warning, Fatal |
| Answer» E. | |
| 7. |
Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes |
| A. | i and iii |
| B. | ii only |
| C. | ii and iii |
| D. | ii iii and iv |
| Answer» D. ii iii and iv | |
| 8. |
Which of the following is not a valid input to the PRF in SSLv3? |
| A. | secret value |
| B. | identifying label |
| C. | initialization vector |
| D. | secret value |
| Answer» D. secret value | |
| 9. |
In the SSLv3 the padding bits are ____________ with the secret key. |
| A. | Padded |
| B. | XORed |
| C. | Concatenated |
| D. | ANDed |
| Answer» D. ANDed | |
| 10. |
The client_key_exchange message uses a pre master key of size – |
| A. | 48 bytes |
| B. | 56 bytes |
| C. | 64 bytes |
| D. | 32 bytes |
| Answer» B. 56 bytes | |
| 11. |
he certificate message is required for any agreed-on key exchange method except _______________ |
| A. | Ephemeral Diffie-Hellman |
| B. | Anonymous Diffie-Hellman |
| C. | Fixed Diffie-Hellman |
| D. | RSA |
| Answer» C. Fixed Diffie-Hellman | |
| 12. |
The DSS signature uses which hash algorithm? |
| A. | MD5 |
| B. | SHA-2 |
| C. | SHA-1 |
| D. | Does not use hash algorithm |
| Answer» D. Does not use hash algorithm | |
| 13. |
The certificate_request massage includes two parameters, one of which is- |
| A. | certificate_extension |
| B. | certificate_creation |
| C. | certificate_exchange |
| D. | certificate_type |
| Answer» E. | |
| 14. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
| A. | 42 bytes |
| B. | 32 bytes |
| C. | 36 bytes |
| D. | 48 bytes |
| Answer» D. 48 bytes | |
| 15. |
The RSA signature uses which hash algorithm? |
| A. | MD5 |
| B. | SHA-1 |
| C. | MD5 and SHA-1 |
| D. | None of the mentioned. |
| Answer» D. None of the mentioned. | |
| 16. |
_______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. |
| A. | OpenID |
| B. | Single-site system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» E. | |
| 17. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism. |
| A. | Row-level authorization |
| B. | Column-level authentication |
| C. | Row-type authentication |
| D. | Authorization security |
| Answer» B. Column-level authentication | |
| 18. |
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years. |
| A. | OpenID |
| B. | Single-site system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» B. Single-site system | |
| 19. |
Many applications use _________________, where two independent factors are used to identify a user. |
| A. | Two-factor authentication |
| B. | Cross-site request forgery |
| C. | Cross-site scripting |
| D. | Cross-site scoring scripting |
| Answer» B. Cross-site request forgery | |
| 20. |
The message digest needs to be |
| A. | public |
| B. | private |
| C. | kept secret |
| D. | None |
| Answer» D. None | |
| 21. |
The Message confidentiality or privacy means that the sender and the receiver expect |
| A. | Integrity |
| B. | Confidentiality |
| C. | Authentication |
| D. | Nonrepudiation |
| Answer» C. Authentication | |
| 22. |
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of |
| A. | 512 Bit Blocks |
| B. | 1001 Bit Blocks |
| C. | 1510 Bit Blocks |
| D. | 2020 Bit Blocks |
| Answer» B. 1001 Bit Blocks | |
| 23. |
To preserve the integrity of a document, both the document and the fingerprint are |
| A. | Not Used |
| B. | Unimportant |
| C. | Needed |
| D. | Not needed |
| Answer» D. Not needed | |
| 24. |
A sender must not be able to deny sending a message that was sent, is known as |
| A. | Message Nonrepudiation |
| B. | Message Integrity |
| C. | Message Confidentiality |
| D. | Message Sending |
| Answer» B. Message Integrity | |
| 25. |
Message confidentiality is using |
| A. | Cipher Text |
| B. | Cipher |
| C. | Symmetric-Key |
| D. | Asymmetric-Key |
| Answer» E. | |
| 26. |
Encryption and decryption provide secrecy, or confidentiality, but not |
| A. | Authentication |
| B. | Integrity |
| C. | Privacy |
| D. | All of the above |
| Answer» C. Privacy | |
| 27. |
When the data must arrive at the receiver exactly as they were sent, its called |
| A. | Message Confidentiality |
| B. | Message Integrity |
| C. | Message Splashing |
| D. | Message Sending |
| Answer» C. Message Splashing | |
| 28. |
A digital signature needs a |
| A. | Private-key system |
| B. | Shared-key system |
| C. | Public-key system |
| D. | All of them |
| Answer» D. All of them | |
| 29. |
A session symmetric key between two parties is used |
| A. | Only once |
| B. | Twice |
| C. | Multiple times |
| D. | Conditions dependant |
| Answer» B. Twice | |
| 30. |
One way to preserve the integrity of a document is through the use of a |
| A. | Eye-Rays |
| B. | Finger Print |
| C. | Biometric |
| D. | X-Rays |
| Answer» C. Biometric | |
| 31. |
To check the integrity of a message, or document, the receiver creates the |
| A. | Hash-Table |
| B. | Hash Tag |
| C. | Hyper Text |
| D. | Finger Print |
| Answer» C. Hyper Text | |
| 32. |
Message authentication is a service beyond |
| A. | Message Confidentiality |
| B. | Message Integrity |
| C. | Message Splashing |
| D. | Message Sending |
| Answer» C. Message Splashing | |
| 33. |
The digest created by a hash function is normally called a |
| A. | Modification detection code (MDC) |
| B. | Modify authentication connection |
| C. | Message authentication control |
| D. | Message authentication cipher |
| Answer» B. Modify authentication connection | |
| 34. |
A hash function guarantees the integrity of a message. It guarantees that the message has not be |
| A. | Replaced |
| B. | Over view |
| C. | Changed |
| D. | Violated |
| Answer» D. Violated | |
| 35. |
Which of the following alert codes is not supported by SSLv3? |
| A. | record_overflow |
| B. | no_certificate |
| C. | internal_error |
| D. | decode_error |
| Answer» C. internal_error | |
| 36. |
We encounter the record_overflow error when the payload length exceeds – |
| A. | 2^14 + 1024 |
| B. | 2^16 + 1024 |
| C. | 2^14 + 2048 |
| D. | 2^16 + 2048 |
| Answer» D. 2^16 + 2048 | |
| 37. |
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. |
| A. | 40; 80 |
| B. | 60; 620 |
| C. | 80; 443 |
| D. | 620; 80 |
| Answer» D. 620; 80 | |
| 38. |
Which key exchange technique is not supported by SSLv3? |
| A. | Anonymous Diffie-Hellman |
| B. | Fixed Diffie-Hellman |
| C. | RSA |
| D. | Fortezza |
| Answer» E. | |
| 39. |
URL stands for – |
| A. | Universal Remote Locator |
| B. | Universal Resource Language |
| C. | Uniform Resource Locator |
| D. | Uniform Resource Language |
| Answer» D. Uniform Resource Language | |
| 40. |
HTTPS stands for Hypertext Transfer Protocol over TLS. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 41. |
In TLS padding cann be upto a maximum of – |
| A. | 79 bytes |
| B. | 127 bytes |
| C. | 255 bytes |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 42. |
In the Key generation procedure, the Initialization Vector from the server to client is represented as: |
| A. | HASH(K||H||”C”||session_id) |
| B. | HASH(K||H||”B”||session_id) |
| C. | HASH(K||H||”F”||session_id) |
| D. | HASH(K||H||”D”||session_id) |
| Answer» C. HASH(K||H||”F”||session_id) | |
| 43. |
The session Identifier remains constant throughout the SSH connection. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 44. |
Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string- |
| A. | client finished for the client |
| B. | client finished for the client, server finished for the server |
| C. | server finished for the server |
| D. | client finished for the server, server finished for the client |
| Answer» C. server finished for the server | |
| 45. |
The correct order of operations in the SSH Transport Layer Protocol Packet Formation is – |
| A. | Compression; Encryption; Padding and Addition of seq bits |
| B. | Compression; Padding and Addition of seq bits; Encryption |
| C. | Encryption; Padding and Addition of seq bits; Compression |
| D. | Padding and Addition of seq bits; Encryption; Compression |
| Answer» C. Encryption; Padding and Addition of seq bits; Compression | |
| 46. |
In the Key generation procedure, the Integrity Key from the server to client is represented as: |
| A. | HASH(K||H||”A”||session_id) |
| B. | HASH(K||H||”B”||session_id) |
| C. | HASH(K||H||”E”||session_id) |
| D. | HASH(K||H||”F”||session_id) |
| Answer» E. | |
| 47. |
In the Key generation procedure, the Integrity Key from the client to server is represented as: |
| A. | HASH(K||H||”E”||session_id) |
| B. | HASH(K||H||”C”||session_id) |
| C. | HASH(K||H||”B”||session_id) |
| D. | HASH(K||H||”D”||session_id) |
| Answer» B. HASH(K||H||”C”||session_id) | |
| 48. |
SH_MSG_USERAUTH_SUCCESS is represented by the byte – |
| A. | 50 |
| B. | 51 |
| C. | 60 |
| D. | None of the mentioned |
| Answer» E. | |
| 49. |
Which of the following are valid authentication methods? |
| A. | Public Key Based |
| B. | Password Based |
| C. | Host Based |
| D. | All of the mentioned |
| Answer» E. | |
| 50. |
SSH_MSG_USERAUTH_FALIURE is represented by byte- |
| A. | 50 |
| B. | 51 |
| C. | 52 |
| D. | None of the mentioned |
| Answer» C. 52 | |