Explore topic-wise MCQs in Mongodb.

This section includes 102 Mcqs, each offering curated multiple-choice questions to sharpen your Mongodb knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is a valid encryption technique?

A. Parallel key encryption
B. Public key encryption
C. Systematic key encryption
D. All of the mentioned
Answer» C. Systematic key encryption
2.

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. SQL injection
B. SQL
C. Direct
D. Application
Answer» B. SQL
3.

In the SSL record protocol operation pad_2 is –

A. is the byte 0x36 repeated 40 times for MD5
B. is the byte 0x5C repeated 48 times for MD5
C. is the byte 0x5C repeated 48 times for SHA-1
D. is the byte 0x36 repeated 48 times for MD5
Answer» C. is the byte 0x5C repeated 48 times for SHA-1
4.

In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

A. server_done
B. server_key_exchange
C. certificate_request
D. crtificate_verify
Answer» B. server_key_exchange
5.

Number of phases in the handshaking protocol?

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
6.

In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

A. Select, Alarm
B. Alert, Alarm
C. Warning, Alarm
D. Warning, Fatal
Answer» E.
7.

Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes

A. i and iii
B. ii only
C. ii and iii
D. ii iii and iv
Answer» D. ii iii and iv
8.

Which of the following is not a valid input to the PRF in SSLv3?

A. secret value
B. identifying label
C. initialization vector
D. secret value
Answer» D. secret value
9.

In the SSLv3 the padding bits are ____________ with the secret key.

A. Padded
B. XORed
C. Concatenated
D. ANDed
Answer» D. ANDed
10.

The client_key_exchange message uses a pre master key of size –

A. 48 bytes
B. 56 bytes
C. 64 bytes
D. 32 bytes
Answer» B. 56 bytes
11.

he certificate message is required for any agreed-on key exchange method except _______________

A. Ephemeral Diffie-Hellman
B. Anonymous Diffie-Hellman
C. Fixed Diffie-Hellman
D. RSA
Answer» C. Fixed Diffie-Hellman
12.

The DSS signature uses which hash algorithm?

A. MD5
B. SHA-2
C. SHA-1
D. Does not use hash algorithm
Answer» D. Does not use hash algorithm
13.

The certificate_request massage includes two parameters, one of which is-

A. certificate_extension
B. certificate_creation
C. certificate_exchange
D. certificate_type
Answer» E.
14.

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 bytes
Answer» D. 48 bytes
15.

The RSA signature uses which hash algorithm?

A. MD5
B. SHA-1
C. MD5 and SHA-1
D. None of the mentioned.
Answer» D. None of the mentioned.
16.

_______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

A. OpenID
B. Single-site system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» E.
17.

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.

A. Row-level authorization
B. Column-level authentication
C. Row-type authentication
D. Authorization security
Answer» B. Column-level authentication
18.

The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.

A. OpenID
B. Single-site system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» B. Single-site system
19.

Many applications use _________________, where two independent factors are used to identify a user.

A. Two-factor authentication
B. Cross-site request forgery
C. Cross-site scripting
D. Cross-site scoring scripting
Answer» B. Cross-site request forgery
20.

The message digest needs to be

A. public
B. private
C. kept secret
D. None
Answer» D. None
21.

The Message confidentiality or privacy means that the sender and the receiver expect

A. Integrity
B. Confidentiality
C. Authentication
D. Nonrepudiation
Answer» C. Authentication
22.

In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of

A. 512 Bit Blocks
B. 1001 Bit Blocks
C. 1510 Bit Blocks
D. 2020 Bit Blocks
Answer» B. 1001 Bit Blocks
23.

To preserve the integrity of a document, both the document and the fingerprint are

A. Not Used
B. Unimportant
C. Needed
D. Not needed
Answer» D. Not needed
24.

A sender must not be able to deny sending a message that was sent, is known as

A. Message Nonrepudiation
B. Message Integrity
C. Message Confidentiality
D. Message Sending
Answer» B. Message Integrity
25.

Message confidentiality is using

A. Cipher Text
B. Cipher
C. Symmetric-Key
D. Asymmetric-Key
Answer» E.
26.

Encryption and decryption provide secrecy, or confidentiality, but not

A. Authentication
B. Integrity
C. Privacy
D. All of the above
Answer» C. Privacy
27.

When the data must arrive at the receiver exactly as they were sent, its called

A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer» C. Message Splashing
28.

A digital signature needs a

A. Private-key system
B. Shared-key system
C. Public-key system
D. All of them
Answer» D. All of them
29.

A session symmetric key between two parties is used

A. Only once
B. Twice
C. Multiple times
D. Conditions dependant
Answer» B. Twice
30.

One way to preserve the integrity of a document is through the use of a

A. Eye-Rays
B. Finger Print
C. Biometric
D. X-Rays
Answer» C. Biometric
31.

To check the integrity of a message, or document, the receiver creates the

A. Hash-Table
B. Hash Tag
C. Hyper Text
D. Finger Print
Answer» C. Hyper Text
32.

Message authentication is a service beyond

A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer» C. Message Splashing
33.

The digest created by a hash function is normally called a

A. Modification detection code (MDC)
B. Modify authentication connection
C. Message authentication control
D. Message authentication cipher
Answer» B. Modify authentication connection
34.

A hash function guarantees the integrity of a message. It guarantees that the message has not be

A. Replaced
B. Over view
C. Changed
D. Violated
Answer» D. Violated
35.

Which of the following alert codes is not supported by SSLv3?

A. record_overflow
B. no_certificate
C. internal_error
D. decode_error
Answer» C. internal_error
36.

We encounter the record_overflow error when the payload length exceeds –

A. 2^14 + 1024
B. 2^16 + 1024
C. 2^14 + 2048
D. 2^16 + 2048
Answer» D. 2^16 + 2048
37.

An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL.

A. 40; 80
B. 60; 620
C. 80; 443
D. 620; 80
Answer» D. 620; 80
38.

Which key exchange technique is not supported by SSLv3?

A. Anonymous Diffie-Hellman
B. Fixed Diffie-Hellman
C. RSA
D. Fortezza
Answer» E.
39.

URL stands for –

A. Universal Remote Locator
B. Universal Resource Language
C. Uniform Resource Locator
D. Uniform Resource Language
Answer» D. Uniform Resource Language
40.

HTTPS stands for Hypertext Transfer Protocol over TLS.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
41.

In TLS padding cann be upto a maximum of –

A. 79 bytes
B. 127 bytes
C. 255 bytes
D. none of the mentioned
Answer» D. none of the mentioned
42.

In the Key generation procedure, the Initialization Vector from the server to client is represented as:

A. HASH(K||H||”C”||session_id)
B. HASH(K||H||”B”||session_id)
C. HASH(K||H||”F”||session_id)
D. HASH(K||H||”D”||session_id)
Answer» C. HASH(K||H||”F”||session_id)
43.

The session Identifier remains constant throughout the SSH connection.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
44.

Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string-

A. client finished for the client
B. client finished for the client, server finished for the server
C. server finished for the server
D. client finished for the server, server finished for the client
Answer» C. server finished for the server
45.

The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –

A. Compression; Encryption; Padding and Addition of seq bits
B. Compression; Padding and Addition of seq bits; Encryption
C. Encryption; Padding and Addition of seq bits; Compression
D. Padding and Addition of seq bits; Encryption; Compression
Answer» C. Encryption; Padding and Addition of seq bits; Compression
46.

In the Key generation procedure, the Integrity Key from the server to client is represented as:

A. HASH(K||H||”A”||session_id)
B. HASH(K||H||”B”||session_id)
C. HASH(K||H||”E”||session_id)
D. HASH(K||H||”F”||session_id)
Answer» E.
47.

In the Key generation procedure, the Integrity Key from the client to server is represented as:

A. HASH(K||H||”E”||session_id)
B. HASH(K||H||”C”||session_id)
C. HASH(K||H||”B”||session_id)
D. HASH(K||H||”D”||session_id)
Answer» B. HASH(K||H||”C”||session_id)
48.

SH_MSG_USERAUTH_SUCCESS is represented by the byte –

A. 50
B. 51
C. 60
D. None of the mentioned
Answer» E.
49.

Which of the following are valid authentication methods?

A. Public Key Based
B. Password Based
C. Host Based
D. All of the mentioned
Answer» E.
50.

SSH_MSG_USERAUTH_FALIURE is represented by byte-

A. 50
B. 51
C. 52
D. None of the mentioned
Answer» C. 52