

MCQOPTIONS
Saved Bookmarks
This section includes 102 Mcqs, each offering curated multiple-choice questions to sharpen your Mongodb knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is a valid encryption technique? |
A. | Parallel key encryption |
B. | Public key encryption |
C. | Systematic key encryption |
D. | All of the mentioned |
Answer» C. Systematic key encryption | |
2. |
In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
A. | SQL injection |
B. | SQL |
C. | Direct |
D. | Application |
Answer» B. SQL | |
3. |
In the SSL record protocol operation pad_2 is – |
A. | is the byte 0x36 repeated 40 times for MD5 |
B. | is the byte 0x5C repeated 48 times for MD5 |
C. | is the byte 0x5C repeated 48 times for SHA-1 |
D. | is the byte 0x36 repeated 48 times for MD5 |
Answer» C. is the byte 0x5C repeated 48 times for SHA-1 | |
4. |
In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange? |
A. | server_done |
B. | server_key_exchange |
C. | certificate_request |
D. | crtificate_verify |
Answer» B. server_key_exchange | |
5. |
Number of phases in the handshaking protocol? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
6. |
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively. |
A. | Select, Alarm |
B. | Alert, Alarm |
C. | Warning, Alarm |
D. | Warning, Fatal |
Answer» E. | |
7. |
Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes |
A. | i and iii |
B. | ii only |
C. | ii and iii |
D. | ii iii and iv |
Answer» D. ii iii and iv | |
8. |
Which of the following is not a valid input to the PRF in SSLv3? |
A. | secret value |
B. | identifying label |
C. | initialization vector |
D. | secret value |
Answer» D. secret value | |
9. |
In the SSLv3 the padding bits are ____________ with the secret key. |
A. | Padded |
B. | XORed |
C. | Concatenated |
D. | ANDed |
Answer» D. ANDed | |
10. |
The client_key_exchange message uses a pre master key of size – |
A. | 48 bytes |
B. | 56 bytes |
C. | 64 bytes |
D. | 32 bytes |
Answer» B. 56 bytes | |
11. |
he certificate message is required for any agreed-on key exchange method except _______________ |
A. | Ephemeral Diffie-Hellman |
B. | Anonymous Diffie-Hellman |
C. | Fixed Diffie-Hellman |
D. | RSA |
Answer» C. Fixed Diffie-Hellman | |
12. |
The DSS signature uses which hash algorithm? |
A. | MD5 |
B. | SHA-2 |
C. | SHA-1 |
D. | Does not use hash algorithm |
Answer» D. Does not use hash algorithm | |
13. |
The certificate_request massage includes two parameters, one of which is- |
A. | certificate_extension |
B. | certificate_creation |
C. | certificate_exchange |
D. | certificate_type |
Answer» E. | |
14. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
A. | 42 bytes |
B. | 32 bytes |
C. | 36 bytes |
D. | 48 bytes |
Answer» D. 48 bytes | |
15. |
The RSA signature uses which hash algorithm? |
A. | MD5 |
B. | SHA-1 |
C. | MD5 and SHA-1 |
D. | None of the mentioned. |
Answer» D. None of the mentioned. | |
16. |
_______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. |
A. | OpenID |
B. | Single-site system |
C. | Security Assertion Markup Language (SAML) |
D. | Virtual Private Database (VPD) |
Answer» E. | |
17. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism. |
A. | Row-level authorization |
B. | Column-level authentication |
C. | Row-type authentication |
D. | Authorization security |
Answer» B. Column-level authentication | |
18. |
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years. |
A. | OpenID |
B. | Single-site system |
C. | Security Assertion Markup Language (SAML) |
D. | Virtual Private Database (VPD) |
Answer» B. Single-site system | |
19. |
Many applications use _________________, where two independent factors are used to identify a user. |
A. | Two-factor authentication |
B. | Cross-site request forgery |
C. | Cross-site scripting |
D. | Cross-site scoring scripting |
Answer» B. Cross-site request forgery | |
20. |
The message digest needs to be |
A. | public |
B. | private |
C. | kept secret |
D. | None |
Answer» D. None | |
21. |
The Message confidentiality or privacy means that the sender and the receiver expect |
A. | Integrity |
B. | Confidentiality |
C. | Authentication |
D. | Nonrepudiation |
Answer» C. Authentication | |
22. |
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of |
A. | 512 Bit Blocks |
B. | 1001 Bit Blocks |
C. | 1510 Bit Blocks |
D. | 2020 Bit Blocks |
Answer» B. 1001 Bit Blocks | |
23. |
To preserve the integrity of a document, both the document and the fingerprint are |
A. | Not Used |
B. | Unimportant |
C. | Needed |
D. | Not needed |
Answer» D. Not needed | |
24. |
A sender must not be able to deny sending a message that was sent, is known as |
A. | Message Nonrepudiation |
B. | Message Integrity |
C. | Message Confidentiality |
D. | Message Sending |
Answer» B. Message Integrity | |
25. |
Message confidentiality is using |
A. | Cipher Text |
B. | Cipher |
C. | Symmetric-Key |
D. | Asymmetric-Key |
Answer» E. | |
26. |
Encryption and decryption provide secrecy, or confidentiality, but not |
A. | Authentication |
B. | Integrity |
C. | Privacy |
D. | All of the above |
Answer» C. Privacy | |
27. |
When the data must arrive at the receiver exactly as they were sent, its called |
A. | Message Confidentiality |
B. | Message Integrity |
C. | Message Splashing |
D. | Message Sending |
Answer» C. Message Splashing | |
28. |
A digital signature needs a |
A. | Private-key system |
B. | Shared-key system |
C. | Public-key system |
D. | All of them |
Answer» D. All of them | |
29. |
A session symmetric key between two parties is used |
A. | Only once |
B. | Twice |
C. | Multiple times |
D. | Conditions dependant |
Answer» B. Twice | |
30. |
One way to preserve the integrity of a document is through the use of a |
A. | Eye-Rays |
B. | Finger Print |
C. | Biometric |
D. | X-Rays |
Answer» C. Biometric | |
31. |
To check the integrity of a message, or document, the receiver creates the |
A. | Hash-Table |
B. | Hash Tag |
C. | Hyper Text |
D. | Finger Print |
Answer» C. Hyper Text | |
32. |
Message authentication is a service beyond |
A. | Message Confidentiality |
B. | Message Integrity |
C. | Message Splashing |
D. | Message Sending |
Answer» C. Message Splashing | |
33. |
The digest created by a hash function is normally called a |
A. | Modification detection code (MDC) |
B. | Modify authentication connection |
C. | Message authentication control |
D. | Message authentication cipher |
Answer» B. Modify authentication connection | |
34. |
A hash function guarantees the integrity of a message. It guarantees that the message has not be |
A. | Replaced |
B. | Over view |
C. | Changed |
D. | Violated |
Answer» D. Violated | |
35. |
Which of the following alert codes is not supported by SSLv3? |
A. | record_overflow |
B. | no_certificate |
C. | internal_error |
D. | decode_error |
Answer» C. internal_error | |
36. |
We encounter the record_overflow error when the payload length exceeds – |
A. | 2^14 + 1024 |
B. | 2^16 + 1024 |
C. | 2^14 + 2048 |
D. | 2^16 + 2048 |
Answer» D. 2^16 + 2048 | |
37. |
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. |
A. | 40; 80 |
B. | 60; 620 |
C. | 80; 443 |
D. | 620; 80 |
Answer» D. 620; 80 | |
38. |
Which key exchange technique is not supported by SSLv3? |
A. | Anonymous Diffie-Hellman |
B. | Fixed Diffie-Hellman |
C. | RSA |
D. | Fortezza |
Answer» E. | |
39. |
URL stands for – |
A. | Universal Remote Locator |
B. | Universal Resource Language |
C. | Uniform Resource Locator |
D. | Uniform Resource Language |
Answer» D. Uniform Resource Language | |
40. |
HTTPS stands for Hypertext Transfer Protocol over TLS. |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» B. False | |
41. |
In TLS padding cann be upto a maximum of – |
A. | 79 bytes |
B. | 127 bytes |
C. | 255 bytes |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
42. |
In the Key generation procedure, the Initialization Vector from the server to client is represented as: |
A. | HASH(K||H||”C”||session_id) |
B. | HASH(K||H||”B”||session_id) |
C. | HASH(K||H||”F”||session_id) |
D. | HASH(K||H||”D”||session_id) |
Answer» C. HASH(K||H||”F”||session_id) | |
43. |
The session Identifier remains constant throughout the SSH connection. |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» B. False | |
44. |
Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string- |
A. | client finished for the client |
B. | client finished for the client, server finished for the server |
C. | server finished for the server |
D. | client finished for the server, server finished for the client |
Answer» C. server finished for the server | |
45. |
The correct order of operations in the SSH Transport Layer Protocol Packet Formation is – |
A. | Compression; Encryption; Padding and Addition of seq bits |
B. | Compression; Padding and Addition of seq bits; Encryption |
C. | Encryption; Padding and Addition of seq bits; Compression |
D. | Padding and Addition of seq bits; Encryption; Compression |
Answer» C. Encryption; Padding and Addition of seq bits; Compression | |
46. |
In the Key generation procedure, the Integrity Key from the server to client is represented as: |
A. | HASH(K||H||”A”||session_id) |
B. | HASH(K||H||”B”||session_id) |
C. | HASH(K||H||”E”||session_id) |
D. | HASH(K||H||”F”||session_id) |
Answer» E. | |
47. |
In the Key generation procedure, the Integrity Key from the client to server is represented as: |
A. | HASH(K||H||”E”||session_id) |
B. | HASH(K||H||”C”||session_id) |
C. | HASH(K||H||”B”||session_id) |
D. | HASH(K||H||”D”||session_id) |
Answer» B. HASH(K||H||”C”||session_id) | |
48. |
SH_MSG_USERAUTH_SUCCESS is represented by the byte – |
A. | 50 |
B. | 51 |
C. | 60 |
D. | None of the mentioned |
Answer» E. | |
49. |
Which of the following are valid authentication methods? |
A. | Public Key Based |
B. | Password Based |
C. | Host Based |
D. | All of the mentioned |
Answer» E. | |
50. |
SSH_MSG_USERAUTH_FALIURE is represented by byte- |
A. | 50 |
B. | 51 |
C. | 52 |
D. | None of the mentioned |
Answer» C. 52 | |