Explore topic-wise MCQs in Network Security.

This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

The protocol ‘POP’ stands for-a) Personal Office Protocolb) Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?

A. Personal Office Protocolb) Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwarding
B. Post Office Protocolc) Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwarding
C. Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwardingc) Stable Forwarding
D. Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwardingc) Stable Forwardingd) None of the mentionedView Answer
Answer» C. Privacy Overall Protocold) Privacy Over Protocol 15.In which port forwarding technique does the client act on the server’s behalf?a) Remote Forwardingb) Local Forwardingc) Stable Forwarding
2.

In the Key generation procedure, the Initialization Vector from the server to client is represented as:

A. HASH(K||H||”C”||session_id)
B. HASH(K||H||”B”||session_id)
C. HASH(K||H||”F”||session_id)d) HASH(K||H||”D”||session_i
D. HASH(K||H||”B”||session_id)c) HASH(K||H||”F”||session_id)d) HASH(K||H||”D”||session_id)
Answer» C. HASH(K||H||”F”||session_id)d) HASH(K||H||”D”||session_i
3.

The session Identifier remains constant throughout the SSH connection.

A. True
B. False
Answer» B. False
4.

What is the recommended MAC algorithm for the SSH Transport Layer?

A. HMAC – MD5
B. HMAC – MD5 – 96
C. HMAC SHA1 – 96
D. HMAC SHA1
Answer» D. HMAC SHA1
5.

What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer?

A. ECB
B. OFB
C. CBC
D. CFB
Answer» D. CFB
6.

The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –

A. Compression; Encryption; Padding and Addition of seq bits
B. Compression; Padding and Addition of seq bits; Encryption
C. Encryption; Padding and Addition of seq bits; Compression
D. Padding and Addition of seq bits; Encryption; Compression
Answer» C. Encryption; Padding and Addition of seq bits; Compression
7.

Which of the following is not a secure shell protocol?a) Transport Layer Protocolb) Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?

A. Transport Layer Protocolb) Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocol
B. Secure Layer Protocolc) Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCP
C. Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCPc) IP
D. User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCPc) IPd) SSH User Authentication ProtocolView Answer
Answer» C. Connection Protocold) User Authentication Protocol 2.Which is the lowest level in the SSH protocol stack?a) SSH Transport Layer Protocolb) TCPc) IP
8.

WHAT_IS_THE_RECOMMENDED_MODES_OF_OPERATION_FOR_ENCRYPTION_AND_DECRYPTION_IN_THE_SECURE_SHELL_TRANSPORT_LAYER??$

A. ECB
B. OFB
C. CBC
D. CFB
Answer» D. CFB
9.

The session Identifier remains constant throughout the SSH connection.$

A. True
B. False
Answer» B. False
10.

What_is_the_recommended_MAC_algorithm_for_the_SSH_Transport_Layer?$

A. HMAC – MD5
B. HMAC – MD5 – 96
C. HMAC SHA1 – 96
D. HMAC SHA1
Answer» D. HMAC SHA1
11.

In which port forwarding technique does the client act on the server’s behalf?$

A. Remote Forwarding
B. Local Forwarding
C. Stable Forwarding
D. None of the mentioned
Answer» B. Local Forwarding
12.

The protocol ‘POP’ stands for-$

A. Personal Office Protocol
B. Post Office Protocol
C. Privacy Overall Protocol
D. Privacy Over Protocol
Answer» C. Privacy Overall Protocol
13.

Which port forwarding technique intercepts application-level traffic and redirects it from an insecure TCP connections to secure SSH tunnels?

A. Remote Forwarding
B. Local Forwarding
C. Stable Forwarding
D. None of the mentioned
Answer» C. Stable Forwarding
14.

In_the_Key_generation_procedure,_the_Initialization_Vector_from_the_server_to_client_is_represented_as:

A. HASH(K||H||”C”||session_id)
B. HASH(K||H||”B”||session_id)
C. HASH(K||H||”F”||session_id)
D. HASH(K||H||”D”||session_id)
Answer» C. HASH(K||H||‚Äö√Ñ√∂‚àö√ë‚àöœÄF‚Äö√Ñ√∂‚àö√ë‚àöœÄ||session_id)
15.

What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?

A. twofish 128
B. aes 192
C. aes 128
D. blowfish
Answer» D. blowfish
16.

Which one of the following does not undergo the encryption procedure?

A. pdl
B. pktl
C. seq
D. padding
Answer» D. padding
17.

Size of the sequence number is-

A. 32 bits
B. 48 bits
C. 56 bits
D. 64 bits
Answer» B. 48 bits
18.

The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –$

A. Compression; Encryption; Padding and Addition of seq bits
B. Compression; Padding and Addition of seq bits; Encryption
C. Encryption; Padding and Addition of seq bits; Compression
D. Padding and Addition of seq bits; Encryption; Compression
Answer» C. Encryption; Padding and Addition of seq bits; Compression
19.

Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?

A. Algorithm Negotiation; End of key exchange; Service request; Identification string exchange
B. Identification string exchange; Algorithm Negotiation; End of key exchange; Service request
C. Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
D. Algorithm Negotiation; Identification string exchange; End of key exchange; Service request
Answer» C. Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
20.

How many trust models does the RFC 4251 dictate?

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
21.

Which is the lowest level in the SSH protocol stack?

A. SSH Transport Layer Protocol
B. TCP
C. IP
D. SSH User Authentication Protocol
Answer» D. SSH User Authentication Protocol
22.

Which of the following is not a secure shell protocol?

A. Transport Layer Protocol
B. Secure Layer Protocol
C. Connection Protocol
D. User Authentication Protocol
Answer» C. Connection Protocol