Explore topic-wise MCQs in Mongodb.

This section includes 102 Mcqs, each offering curated multiple-choice questions to sharpen your Mongodb knowledge and support exam preparation. Choose a topic below to get started.

51.

Which channel ensures local port forwarding?

A. session
B. x11
C. forward-tcpip
D. direct-tcpip
Answer» E.
52.

In Message Integrity, the message digest needs to be kept

A. Secret
B. Low
C. High
D. Constant 0
Answer» B. Low
53.

The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
54.

On which port will the server generally listen to for SMTP?

A. port 35
B. port 63
C. port 25
D. port 65
Answer» D. port 65
55.

The secure authentication connection is referred to as-

A. chisel
B. tunnel
C. zeroing
D. handshaking
Answer» C. zeroing
56.

The protocol ‘POP’ stands for-

A. Personal Office Protocol
B. Post Office Protocol
C. Privacy Overall Protocol
D. Privacy Over Protocol
Answer» C. Privacy Overall Protocol
57.

In the SSL record protocol operation pad_1 is –

A. is the byte 0x36 repeated 40 times for MD5
B. is the byte 0x5C repeated 40 times for MD5
C. is the byte 0x5C repeated 48 times for SHA-1
D. is the byte 0x36 repeated 48 times for MD5
Answer» E.
58.

In the handshake protocol which is the message type first sent between client and server ?

A. server_hello
B. client_hello
C. hello_request
D. certificate_request
Answer» C. hello_request
59.

In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

A. Fortezza
B. Anonymous Diffie-Hellman
C. Fixed Diffie-Hellman
D. RSA
Answer» D. RSA
60.

In the “Opening a channel” phase what is the function of the “maximum packet size” parameter?

A. It specifies the number of bytes in the IV
B. It specifies the maximum size of an individual packet
C. It specifies how many bytes of channel data can be sent
D. None of the mentioned
Answer» C. It specifies how many bytes of channel data can be sent
61.

The Secure Shell Connection Protocol Message exchange has the fist phase as “Opening a Channel” and it sends a message with parameters-SSH_MSG_CHANNEL_OPENchannel typesender channelinnitial window sizemaximum packet sizeWhat is the data type sender channel/innitial window size/ channel type?

A. uint16
B. uint32
C. int16
D. int32
Answer» C. int16
62.

In the “Opening a channel” phase what is the function of the “innitial window size” parameter?

A. It specifies the number of bytes in the IV
B. It specifies the maximum size of an individual packet
C. It specifies how many bytes of channel data can be sent
D. None of the mentioned
Answer» D. None of the mentioned
63.

Which is the key exchange algorithm used in CipherSuite parameter?

A. RSA
B. Fixed Diffie-Hellman
C. Ephemeral Diffie-Hellman
D. Any of the mentioned
Answer» E.
64.

A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

A. OpenID
B. Sign-on system
C. Security Assertion Markup Language (SAML)
D. Virtual Private Database (VPD)
Answer» C. Security Assertion Markup Language (SAML)
65.

What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer?

A. ECB
B. OFB
C. CBC
D. CFB
Answer» D. CFB
66.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.

A. Two-factor authentication
B. Cross-site request forgery
C. Cross-site scripting
D. Cross-site scoring scripting
Answer» D. Cross-site scoring scripting
67.

In the Key generation procedure, the Encryption key from the server to client is represented as:

A. HASH(K||H||”C”||session_id)
B. HASH(K||H||”B”||session_id)
C. HASH(K||H||”F”||session_id)
D. HASH(K||H||”D”||session_id)
Answer» E.
68.

The message must be encrypted at the sender site and decrypted at the

A. Sender Site
B. Site
C. Receiver site
D. Conferencing
Answer» D. Conferencing
69.

MAC stands for

A. Message authentication code
B. Message arbitrary connection
C. Message authentication control
D. Message authentication cipher
Answer» B. Message arbitrary connection
70.

Which is not a channel recognized by the SSH connection protocol?

A. session
B. backward-tcpip
C. direct-tcpip
D. x11
Answer» C. direct-tcpip
71.

A log of all changes to the application data is called as __________

A. Audit trail
B. Audit log
C. Audit lead
D. Data log
Answer» B. Audit log
72.

SHA-l has a message digest of

A. 160 bits
B. 512 bits
C. 628 bits
D. 820 bits
Answer» B. 512 bits
73.

In which port forwarding technique does the client act on the server’s behalf?

A. Remote Forwarding
B. Local Forwarding
C. Stable Forwarding
D. None of the mentioned
Answer» B. Local Forwarding
74.

In Message Confidentiality, the transmitted message must make sense to only intended

A. Receiver
B. Sender
C. Modulor
D. Translator
Answer» B. Sender
75.

In the User Authentication Protocol, when the client requests for authentication, then the first byte ( in this format) has decimal value –

A. 80
B. 60
C. 50
D. 61
Answer» D. 61
76.

Confidentiality with asymmetric-key cryptosystem has its own

A. Entities
B. Data
C. Problems
D. Translator
Answer» D. Translator
77.

What is the recommended MAC algorithm for the SSH Transport Layer?

A. HMAC – MD5
B. HMAC – MD5 – 96
C. HMAC SHA1 – 96
D. HMAC SHA1
Answer» D. HMAC SHA1
78.

Which of the following is an example of application layer vulnerability?

A. Cryptographic flaws lead to the privacy issue
B. Very complex application security controls
C. MAC Address Spoofing
D. Weak or non-existent authentication
Answer» C. MAC Address Spoofing
79.

Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
80.

Which of the following is an example of Transport layer vulnerability?

A. weak or non-existent mechanisms for authentication
B. overloading of transport-layer mechanisms
C. poor handling of unexpected input
D. highly complex application security controls
Answer» C. poor handling of unexpected input
81.

Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

A. Physical layer
B. Data-link Layer
C. Session layer
D. Presentation layer
Answer» D. Presentation layer
82.

Which of the following is not a vulnerability of the application layer?

A. Application design bugs may bypass security controls
B. Inadequate security controls force “all-or-nothing” approach
C. Logical bugs in programs may be by chance or on purpose be used for crashing programs
D. Overloading of transport-layer mechanisms
Answer» E.
83.

TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
84.

Which of the following is not an example of presentation layer issues?

A. Poor handling of unexpected input can lead to the execution of arbitrary instructions
B. Unintentional or ill-directed use of superficially supplied input
C. Cryptographic flaws in the system may get exploited to evade privacy
D. Weak or non-existent authentication mechanisms
Answer» E.
85.

Which of them is not an attack done in the network layer of the TCP/IP model?

A. MITM attack
B. DoS attack
C. Spoofing attack
D. Shoulder surfing
Answer» E.
86.

Which of the following is not session layer vulnerability?

A. Mishandling of undefined, poorly defined
B. Spoofing and hijacking of data based on failed authentication attempts
C. Passing of session-credentials allowing intercept and unauthorized use
D. Weak or non-existent authentication mechanisms
Answer» B. Spoofing and hijacking of data based on failed authentication attempts
87.

There are __________ different versions of IP popularly used.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
88.

Which of the following is not a transport layer vulnerability?

A. Mishandling of undefined, poorly defined
B. The Vulnerability that allows “fingerprinting” & other enumeration of host information
C. Overloading of transport-layer mechanisms
D. Unauthorized network access
Answer» E.
89.

___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.

A. SYN flooding attack
B. ACK flooding attack
C. SYN & ACK flooding attack
D. Packet flooding attack
Answer» B. ACK flooding attack
90.

Which of the following is an example of presentation layer vulnerability?

A. weak or non-existent mechanisms for authentication
B. overloading of transport-layer mechanisms
C. highly complex application security controls
D. poor handling of unexpected input
Answer» E.
91.

Which of the following is an example of session layer vulnerability?

A. weak or non-existent mechanisms for authentication
B. overloading of transport-layer mechanisms
C. poor handling of unexpected input
D. highly complex application security controls
Answer» B. overloading of transport-layer mechanisms
92.

____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

A. TCP Spoofing
B. TCP Blind Spoofing
C. IP Spoofing
D. IP Blind Spoofing
Answer» C. IP Spoofing
93.

The full form of SSL is

A. Serial Session Layer
B. Secure Socket Layer
C. Session Secure Layer
D. Series Socket Layer
Answer» C. Session Secure Layer
94.

The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.

A. NANDed, XORed
B. Concatenated, XORed
C. XORed, NANDed
D. XORed, Concatenated
Answer» C. XORed, NANDed
95.

In the below figure, which of the above shaded block is transparent to end users and applications?

A. IP/IPSec
B. SSL
C. Kerberos
D. S/MIME
Answer» B. SSL
96.

Consider the following example –Size of Plaintext – 48 bytes.Size of MAC – 20 bytes.Block Length – 8 bytes.How many bytes of padding need to be added to the system?

A. 1
B. 2
C. 3
D. 4
Answer» D. 4
97.

After the encryption stage in SSL, the maximum length of each fragment is

A. 2^14+1028
B. 2^14+2048
C. 2^16+1028
D. 2^16+2048
Answer» C. 2^16+1028
98.

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
99.

Which one of the following is not a higher –layer SSL protocol?

A. Alert Protocol
B. Handshake Protocol
C. Alarm Protocol
D. Change Cipher Spec Protocol
Answer» D. Change Cipher Spec Protocol
100.

In the below figure from left to right, the correct order of the shaded levels are

A. Network level, Application level, Transport level
B. Application level, Network level, Transport level
C. Transport level, Application level, Network level
D. Network level, Transport level, Application level
Answer» E.