Explore topic-wise MCQs in Network Security.

This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes

A. i and iii
B. ii only
C. ii and iii
D. ii iii and ivView Answer
Answer» D. ii iii and ivView Answer
2.

Consider the following example –Size of Plaintext – 48 bytes.Size of MAC – 20 bytes.Block Length – 8 bytes.How many bytes of padding need to be added to the system?

A. 1
B. 2
C. 3
D. 4
Answer» D. 4
3.

After the encryption stage in SSL, the maximum length of each fragment is

A. 214+1028
B. 214+2048
C. 216+1028
D. 216+2048
Answer» C. 216+1028
4.

The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.

A. NANDed, XORed
B. Concatenated, XORed
C. XORed, NANDed
D. XORed, Concatenated
Answer» C. XORed, NANDed
5.

Which one of the following is not a higher –layer SSL protocol?

A. Alert Protocol
B. Handshake Protocol
C. Alarm Protocol
D. Change Cipher Spec Protocol
Answer» D. Change Cipher Spec Protocol
6.

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

A. True
B. False
Answer» C.
7.

THE_FULL_FORM_OF_SSL_IS?$

A. Serial Session Layer
B. Secure Socket Layer
C. Session Secure Layer
D. Series Socket Layer
Answer» C. Session Secure Layer
8.

After the encryption stage in SSL, the maximum length of each fragment is$

A. 2<sup>14</sup>+1028
B. 2<sup>14</sup>+2048
C. 2<sup>16</sup>+1028
D. 2<sup>16</sup>+2048
Answer» D. 2<sup>16</sup>+2048
9.

Which of the following are possible sizes of MACs?

A. 12 Bytes
B. 16 Bytes
C. 20 Bytes
D. 24 Bytes
Answer» E.
10.

Which protocol is used for the purpose of copying the pending state into the current state?

A. Alert Protocol
B. Handshake Protocol
C. Upper-Layer Protocol
D. Change Cipher Spec Protocol
Answer» D. Change Cipher Spec Protocol
11.

Which protocol consists of only 1 bit?

A. Alert Protocol
B. Handshake Protocol
C. Upper-Layer Protocol
D. Change Cipher Spec Protocol
Answer» E.
12.

Which protocol is used to convey SSL related alerts to the peer entity?

A. Alert Protocol
B. Handshake Protocol
C. Upper-Layer Protocol
D. Change Cipher Spec Protocol
Answer» E.
13.

The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC?

A. NANDed, XORed
B. Concatenated, XORed
C. XORed, NANDed
D. XORed, Concatenated
Answer» C. XORed, NANDed
14.

In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

A. 2<sup>16</sup>
B. 2<sup>32</sup>
C. 2<sup>14</sup>
D. 2<sup>12</sup>
Answer» C. 2<sup>14</sup>
15.

Which one of the following is not a session state parameter?

A. Master Secret
B. Cipher Spec
C. Peer Certificate
D. Server Write Key
Answer» D. Server Write Key
16.

Which one of the following is not a higher –layer SSL protocol?$

A. Alert Protocol
B. Handshake Protocol
C. Alarm Protocol
D. Change Cipher Spec Protocol
Answer» E.