Explore topic-wise MCQs in Network Security.

This section includes 7 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Loopback address is given by:

A. 0.0.0.0
B. 127.x.x.x
C. 255.255.255.255
D. None of the mentioned
Answer» C. 255.255.255.255
2.

When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges. Which type of Wireless network threat would you classify this under?

A. Identity Theft
B. Man in the middle attack
C. Network Injection
D. Accidental Association
Answer» B. Man in the middle attack
3.

SSID stands for

A. Secure Service Identifier
B. Secure Set Independent Device
C. Secure Set Identifier
D. Service Set Independent Device
Answer» D. Service Set Independent Device
4.

An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.

A. 40; 80
B. 60; 620
C. 80; 443
D. 620; 80
Answer» D. 620; 80
5.

In the SSL record protocol operation pad_1 is :

A. is the byte 0x36 repeated 40 times for MD5
B. is the byte 0x5C repeated 40 times for MD5
C. is the byte 0x5C repeated 48 times for SHA-1
D. is the byte 0x36 repeated 48 times for MD5
Answer» E.
6.

In terms of Web Security Threats, Impersonation of another user is a Passive Attack.

A. True
B. False
Answer» C.
7.

In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.

A. Select, Alarm
B. Alert, Alarm
C. Warning, Alarm
D. Warning, Fatal
Answer» E.