MCQOPTIONS
Saved Bookmarks
This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The protocol ‘POP’ stands for-a) Personal Office Protocolb) Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf? |
| A. | Personal Office Protocolb) Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwarding |
| B. | Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwarding |
| C. | Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwardingc) Stable Forwarding |
| D. | Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwardingc) Stable Forwardingd) None of the mentionedView Answer |
| Answer» C. Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwardingc) Stable Forwarding | |
| 2. |
In the Key generation procedure, the Initialization Vector from the server to client is represented as: |
| A. | HASH(K||H||”C”||session_id) |
| B. | HASH(K||H||”B”||session_id) |
| C. | HASH(K||H||”F”||session_id)d) HASH(K||H||”D”||session_i |
| D. | HASH(K||H||”B”||session_id)c) HASH(K||H||”F”||session_id)d) HASH(K||H||”D”||session_id) |
| Answer» C. HASH(K||H||”F”||session_id)d) HASH(K||H||”D”||session_i | |
| 3. |
The session Identifier remains constant throughout the SSH connection. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
What is the recommended MAC algorithm for the SSH Transport Layer? |
| A. | HMAC – MD5 |
| B. | HMAC – MD5 – 96 |
| C. | HMAC SHA1 – 96 |
| D. | HMAC SHA1 |
| Answer» D. HMAC SHA1 | |
| 5. |
What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer? |
| A. | ECB |
| B. | OFB |
| C. | CBC |
| D. | CFB |
| Answer» D. CFB | |
| 6. |
The correct order of operations in the SSH Transport Layer Protocol Packet Formation is – |
| A. | Compression; Encryption; Padding and Addition of seq bits |
| B. | Compression; Padding and Addition of seq bits; Encryption |
| C. | Encryption; Padding and Addition of seq bits; Compression |
| D. | Padding and Addition of seq bits; Encryption; Compression |
| Answer» C. Encryption; Padding and Addition of seq bits; Compression | |
| 7. |
Which of the following is not a secure shell protocol?a) Transport Layer Protocolb) Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack? |
| A. | Transport Layer Protocolb) Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocol |
| B. | Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCP |
| C. | Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCPc) IP |
| D. | User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCPc) IPd) SSH User Authentication ProtocolView Answer |
| Answer» C. Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCPc) IP | |
| 8. |
WHAT_IS_THE_RECOMMENDED_MODES_OF_OPERATION_FOR_ENCRYPTION_AND_DECRYPTION_IN_THE_SECURE_SHELL_TRANSPORT_LAYER??$ |
| A. | ECB |
| B. | OFB |
| C. | CBC |
| D. | CFB |
| Answer» D. CFB | |
| 9. |
The session Identifier remains constant throughout the SSH connection.$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
What_is_the_recommended_MAC_algorithm_for_the_SSH_Transport_Layer?$ |
| A. | HMAC – MD5 |
| B. | HMAC – MD5 – 96 |
| C. | HMAC SHA1 – 96 |
| D. | HMAC SHA1 |
| Answer» D. HMAC SHA1 | |
| 11. |
In which port forwarding technique does the client act on the server’s behalf?$ |
| A. | Remote Forwarding |
| B. | Local Forwarding |
| C. | Stable Forwarding |
| D. | None of the mentioned |
| Answer» B. Local Forwarding | |
| 12. |
The protocol ‘POP’ stands for-$ |
| A. | Personal Office Protocol |
| B. | Post Office Protocol |
| C. | Privacy Overall Protocol |
| D. | Privacy Over Protocol |
| Answer» C. Privacy Overall Protocol | |
| 13. |
Which port forwarding technique intercepts application-level traffic and redirects it from an insecure TCP connections to secure SSH tunnels? |
| A. | Remote Forwarding |
| B. | Local Forwarding |
| C. | Stable Forwarding |
| D. | None of the mentioned |
| Answer» C. Stable Forwarding | |
| 14. |
In_the_Key_generation_procedure,_the_Initialization_Vector_from_the_server_to_client_is_represented_as: |
| A. | HASH(K||H||”C”||session_id) |
| B. | HASH(K||H||”B”||session_id) |
| C. | HASH(K||H||”F”||session_id) |
| D. | HASH(K||H||”D”||session_id) |
| Answer» C. HASH(K||H||‚Äö√Ñ√∂‚àö√ë‚àöœÄF‚Äö√Ñ√∂‚àö√ë‚àöœÄ||session_id) | |
| 15. |
What is the recommended cryptographic algorithm for the Secure Shell Transport Layer? |
| A. | twofish 128 |
| B. | aes 192 |
| C. | aes 128 |
| D. | blowfish |
| Answer» D. blowfish | |
| 16. |
Which one of the following does not undergo the encryption procedure? |
| A. | pdl |
| B. | pktl |
| C. | seq |
| D. | padding |
| Answer» D. padding | |
| 17. |
Size of the sequence number is- |
| A. | 32 bits |
| B. | 48 bits |
| C. | 56 bits |
| D. | 64 bits |
| Answer» B. 48 bits | |
| 18. |
The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –$ |
| A. | Compression; Encryption; Padding and Addition of seq bits |
| B. | Compression; Padding and Addition of seq bits; Encryption |
| C. | Encryption; Padding and Addition of seq bits; Compression |
| D. | Padding and Addition of seq bits; Encryption; Compression |
| Answer» C. Encryption; Padding and Addition of seq bits; Compression | |
| 19. |
Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges? |
| A. | Algorithm Negotiation; End of key exchange; Service request; Identification string exchange |
| B. | Identification string exchange; Algorithm Negotiation; End of key exchange; Service request |
| C. | Identification string exchange; End of key exchange; Service request; Algorithm Negotiation |
| D. | Algorithm Negotiation; Identification string exchange; End of key exchange; Service request |
| Answer» C. Identification string exchange; End of key exchange; Service request; Algorithm Negotiation | |
| 20. |
How many trust models does the RFC 4251 dictate? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 21. |
Which is the lowest level in the SSH protocol stack? |
| A. | SSH Transport Layer Protocol |
| B. | TCP |
| C. | IP |
| D. | SSH User Authentication Protocol |
| Answer» D. SSH User Authentication Protocol | |
| 22. |
Which of the following is not a secure shell protocol? |
| A. | Transport Layer Protocol |
| B. | Secure Layer Protocol |
| C. | Connection Protocol |
| D. | User Authentication Protocol |
| Answer» C. Connection Protocol | |