MCQOPTIONS
Saved Bookmarks
This section includes 102 Mcqs, each offering curated multiple-choice questions to sharpen your Mongodb knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which channel ensures local port forwarding? |
| A. | session |
| B. | x11 |
| C. | forward-tcpip |
| D. | direct-tcpip |
| Answer» E. | |
| 52. |
In Message Integrity, the message digest needs to be kept |
| A. | Secret |
| B. | Low |
| C. | High |
| D. | Constant 0 |
| Answer» B. Low | |
| 53. |
The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 54. |
On which port will the server generally listen to for SMTP? |
| A. | port 35 |
| B. | port 63 |
| C. | port 25 |
| D. | port 65 |
| Answer» D. port 65 | |
| 55. |
The secure authentication connection is referred to as- |
| A. | chisel |
| B. | tunnel |
| C. | zeroing |
| D. | handshaking |
| Answer» C. zeroing | |
| 56. |
The protocol ‘POP’ stands for- |
| A. | Personal Office Protocol |
| B. | Post Office Protocol |
| C. | Privacy Overall Protocol |
| D. | Privacy Over Protocol |
| Answer» C. Privacy Overall Protocol | |
| 57. |
In the SSL record protocol operation pad_1 is – |
| A. | is the byte 0x36 repeated 40 times for MD5 |
| B. | is the byte 0x5C repeated 40 times for MD5 |
| C. | is the byte 0x5C repeated 48 times for SHA-1 |
| D. | is the byte 0x36 repeated 48 times for MD5 |
| Answer» E. | |
| 58. |
In the handshake protocol which is the message type first sent between client and server ? |
| A. | server_hello |
| B. | client_hello |
| C. | hello_request |
| D. | certificate_request |
| Answer» C. hello_request | |
| 59. |
In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems? |
| A. | Fortezza |
| B. | Anonymous Diffie-Hellman |
| C. | Fixed Diffie-Hellman |
| D. | RSA |
| Answer» D. RSA | |
| 60. |
In the “Opening a channel” phase what is the function of the “maximum packet size” parameter? |
| A. | It specifies the number of bytes in the IV |
| B. | It specifies the maximum size of an individual packet |
| C. | It specifies how many bytes of channel data can be sent |
| D. | None of the mentioned |
| Answer» C. It specifies how many bytes of channel data can be sent | |
| 61. |
The Secure Shell Connection Protocol Message exchange has the fist phase as “Opening a Channel” and it sends a message with parameters-SSH_MSG_CHANNEL_OPENchannel typesender channelinnitial window sizemaximum packet sizeWhat is the data type sender channel/innitial window size/ channel type? |
| A. | uint16 |
| B. | uint32 |
| C. | int16 |
| D. | int32 |
| Answer» C. int16 | |
| 62. |
In the “Opening a channel” phase what is the function of the “innitial window size” parameter? |
| A. | It specifies the number of bytes in the IV |
| B. | It specifies the maximum size of an individual packet |
| C. | It specifies how many bytes of channel data can be sent |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 63. |
Which is the key exchange algorithm used in CipherSuite parameter? |
| A. | RSA |
| B. | Fixed Diffie-Hellman |
| C. | Ephemeral Diffie-Hellman |
| D. | Any of the mentioned |
| Answer» E. | |
| 64. |
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication. |
| A. | OpenID |
| B. | Sign-on system |
| C. | Security Assertion Markup Language (SAML) |
| D. | Virtual Private Database (VPD) |
| Answer» C. Security Assertion Markup Language (SAML) | |
| 65. |
What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer? |
| A. | ECB |
| B. | OFB |
| C. | CBC |
| D. | CFB |
| Answer» D. CFB | |
| 66. |
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack. |
| A. | Two-factor authentication |
| B. | Cross-site request forgery |
| C. | Cross-site scripting |
| D. | Cross-site scoring scripting |
| Answer» D. Cross-site scoring scripting | |
| 67. |
In the Key generation procedure, the Encryption key from the server to client is represented as: |
| A. | HASH(K||H||”C”||session_id) |
| B. | HASH(K||H||”B”||session_id) |
| C. | HASH(K||H||”F”||session_id) |
| D. | HASH(K||H||”D”||session_id) |
| Answer» E. | |
| 68. |
The message must be encrypted at the sender site and decrypted at the |
| A. | Sender Site |
| B. | Site |
| C. | Receiver site |
| D. | Conferencing |
| Answer» D. Conferencing | |
| 69. |
MAC stands for |
| A. | Message authentication code |
| B. | Message arbitrary connection |
| C. | Message authentication control |
| D. | Message authentication cipher |
| Answer» B. Message arbitrary connection | |
| 70. |
Which is not a channel recognized by the SSH connection protocol? |
| A. | session |
| B. | backward-tcpip |
| C. | direct-tcpip |
| D. | x11 |
| Answer» C. direct-tcpip | |
| 71. |
A log of all changes to the application data is called as __________ |
| A. | Audit trail |
| B. | Audit log |
| C. | Audit lead |
| D. | Data log |
| Answer» B. Audit log | |
| 72. |
SHA-l has a message digest of |
| A. | 160 bits |
| B. | 512 bits |
| C. | 628 bits |
| D. | 820 bits |
| Answer» B. 512 bits | |
| 73. |
In which port forwarding technique does the client act on the server’s behalf? |
| A. | Remote Forwarding |
| B. | Local Forwarding |
| C. | Stable Forwarding |
| D. | None of the mentioned |
| Answer» B. Local Forwarding | |
| 74. |
In Message Confidentiality, the transmitted message must make sense to only intended |
| A. | Receiver |
| B. | Sender |
| C. | Modulor |
| D. | Translator |
| Answer» B. Sender | |
| 75. |
In the User Authentication Protocol, when the client requests for authentication, then the first byte ( in this format) has decimal value – |
| A. | 80 |
| B. | 60 |
| C. | 50 |
| D. | 61 |
| Answer» D. 61 | |
| 76. |
Confidentiality with asymmetric-key cryptosystem has its own |
| A. | Entities |
| B. | Data |
| C. | Problems |
| D. | Translator |
| Answer» D. Translator | |
| 77. |
What is the recommended MAC algorithm for the SSH Transport Layer? |
| A. | HMAC – MD5 |
| B. | HMAC – MD5 – 96 |
| C. | HMAC SHA1 – 96 |
| D. | HMAC SHA1 |
| Answer» D. HMAC SHA1 | |
| 78. |
Which of the following is an example of application layer vulnerability? |
| A. | Cryptographic flaws lead to the privacy issue |
| B. | Very complex application security controls |
| C. | MAC Address Spoofing |
| D. | Weak or non-existent authentication |
| Answer» C. MAC Address Spoofing | |
| 79. |
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 80. |
Which of the following is an example of Transport layer vulnerability? |
| A. | weak or non-existent mechanisms for authentication |
| B. | overloading of transport-layer mechanisms |
| C. | poor handling of unexpected input |
| D. | highly complex application security controls |
| Answer» C. poor handling of unexpected input | |
| 81. |
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model? |
| A. | Physical layer |
| B. | Data-link Layer |
| C. | Session layer |
| D. | Presentation layer |
| Answer» D. Presentation layer | |
| 82. |
Which of the following is not a vulnerability of the application layer? |
| A. | Application design bugs may bypass security controls |
| B. | Inadequate security controls force “all-or-nothing” approach |
| C. | Logical bugs in programs may be by chance or on purpose be used for crashing programs |
| D. | Overloading of transport-layer mechanisms |
| Answer» E. | |
| 83. |
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 84. |
Which of the following is not an example of presentation layer issues? |
| A. | Poor handling of unexpected input can lead to the execution of arbitrary instructions |
| B. | Unintentional or ill-directed use of superficially supplied input |
| C. | Cryptographic flaws in the system may get exploited to evade privacy |
| D. | Weak or non-existent authentication mechanisms |
| Answer» E. | |
| 85. |
Which of them is not an attack done in the network layer of the TCP/IP model? |
| A. | MITM attack |
| B. | DoS attack |
| C. | Spoofing attack |
| D. | Shoulder surfing |
| Answer» E. | |
| 86. |
Which of the following is not session layer vulnerability? |
| A. | Mishandling of undefined, poorly defined |
| B. | Spoofing and hijacking of data based on failed authentication attempts |
| C. | Passing of session-credentials allowing intercept and unauthorized use |
| D. | Weak or non-existent authentication mechanisms |
| Answer» B. Spoofing and hijacking of data based on failed authentication attempts | |
| 87. |
There are __________ different versions of IP popularly used. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 88. |
Which of the following is not a transport layer vulnerability? |
| A. | Mishandling of undefined, poorly defined |
| B. | The Vulnerability that allows “fingerprinting” & other enumeration of host information |
| C. | Overloading of transport-layer mechanisms |
| D. | Unauthorized network access |
| Answer» E. | |
| 89. |
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. |
| A. | SYN flooding attack |
| B. | ACK flooding attack |
| C. | SYN & ACK flooding attack |
| D. | Packet flooding attack |
| Answer» B. ACK flooding attack | |
| 90. |
Which of the following is an example of presentation layer vulnerability? |
| A. | weak or non-existent mechanisms for authentication |
| B. | overloading of transport-layer mechanisms |
| C. | highly complex application security controls |
| D. | poor handling of unexpected input |
| Answer» E. | |
| 91. |
Which of the following is an example of session layer vulnerability? |
| A. | weak or non-existent mechanisms for authentication |
| B. | overloading of transport-layer mechanisms |
| C. | poor handling of unexpected input |
| D. | highly complex application security controls |
| Answer» B. overloading of transport-layer mechanisms | |
| 92. |
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number. |
| A. | TCP Spoofing |
| B. | TCP Blind Spoofing |
| C. | IP Spoofing |
| D. | IP Blind Spoofing |
| Answer» C. IP Spoofing | |
| 93. |
The full form of SSL is |
| A. | Serial Session Layer |
| B. | Secure Socket Layer |
| C. | Session Secure Layer |
| D. | Series Socket Layer |
| Answer» C. Session Secure Layer | |
| 94. |
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC. |
| A. | NANDed, XORed |
| B. | Concatenated, XORed |
| C. | XORed, NANDed |
| D. | XORed, Concatenated |
| Answer» C. XORed, NANDed | |
| 95. |
In the below figure, which of the above shaded block is transparent to end users and applications? |
| A. | IP/IPSec |
| B. | SSL |
| C. | Kerberos |
| D. | S/MIME |
| Answer» B. SSL | |
| 96. |
Consider the following example –Size of Plaintext – 48 bytes.Size of MAC – 20 bytes.Block Length – 8 bytes.How many bytes of padding need to be added to the system? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» D. 4 | |
| 97. |
After the encryption stage in SSL, the maximum length of each fragment is |
| A. | 2^14+1028 |
| B. | 2^14+2048 |
| C. | 2^16+1028 |
| D. | 2^16+2048 |
| Answer» C. 2^16+1028 | |
| 98. |
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 99. |
Which one of the following is not a higher –layer SSL protocol? |
| A. | Alert Protocol |
| B. | Handshake Protocol |
| C. | Alarm Protocol |
| D. | Change Cipher Spec Protocol |
| Answer» D. Change Cipher Spec Protocol | |
| 100. |
In the below figure from left to right, the correct order of the shaded levels are |
| A. | Network level, Application level, Transport level |
| B. | Application level, Network level, Transport level |
| C. | Transport level, Application level, Network level |
| D. | Network level, Transport level, Application level |
| Answer» E. | |