

MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes |
A. | i and iii |
B. | ii only |
C. | ii and iii |
D. | ii iii and ivView Answer |
Answer» D. ii iii and ivView Answer | |
2. |
Consider the following example –Size of Plaintext – 48 bytes.Size of MAC – 20 bytes.Block Length – 8 bytes.How many bytes of padding need to be added to the system? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
3. |
After the encryption stage in SSL, the maximum length of each fragment is |
A. | 214+1028 |
B. | 214+2048 |
C. | 216+1028 |
D. | 216+2048 |
Answer» C. 216+1028 | |
4. |
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC. |
A. | NANDed, XORed |
B. | Concatenated, XORed |
C. | XORed, NANDed |
D. | XORed, Concatenated |
Answer» C. XORed, NANDed | |
5. |
Which one of the following is not a higher –layer SSL protocol? |
A. | Alert Protocol |
B. | Handshake Protocol |
C. | Alarm Protocol |
D. | Change Cipher Spec Protocol |
Answer» D. Change Cipher Spec Protocol | |
6. |
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack. |
A. | True |
B. | False |
Answer» C. | |
7. |
THE_FULL_FORM_OF_SSL_IS?$ |
A. | Serial Session Layer |
B. | Secure Socket Layer |
C. | Session Secure Layer |
D. | Series Socket Layer |
Answer» C. Session Secure Layer | |
8. |
After the encryption stage in SSL, the maximum length of each fragment is$ |
A. | 2<sup>14</sup>+1028 |
B. | 2<sup>14</sup>+2048 |
C. | 2<sup>16</sup>+1028 |
D. | 2<sup>16</sup>+2048 |
Answer» D. 2<sup>16</sup>+2048 | |
9. |
Which of the following are possible sizes of MACs? |
A. | 12 Bytes |
B. | 16 Bytes |
C. | 20 Bytes |
D. | 24 Bytes |
Answer» E. | |
10. |
Which protocol is used for the purpose of copying the pending state into the current state? |
A. | Alert Protocol |
B. | Handshake Protocol |
C. | Upper-Layer Protocol |
D. | Change Cipher Spec Protocol |
Answer» D. Change Cipher Spec Protocol | |
11. |
Which protocol consists of only 1 bit? |
A. | Alert Protocol |
B. | Handshake Protocol |
C. | Upper-Layer Protocol |
D. | Change Cipher Spec Protocol |
Answer» E. | |
12. |
Which protocol is used to convey SSL related alerts to the peer entity? |
A. | Alert Protocol |
B. | Handshake Protocol |
C. | Upper-Layer Protocol |
D. | Change Cipher Spec Protocol |
Answer» E. | |
13. |
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC? |
A. | NANDed, XORed |
B. | Concatenated, XORed |
C. | XORed, NANDed |
D. | XORed, Concatenated |
Answer» C. XORed, NANDed | |
14. |
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes. |
A. | 2<sup>16</sup> |
B. | 2<sup>32</sup> |
C. | 2<sup>14</sup> |
D. | 2<sup>12</sup> |
Answer» C. 2<sup>14</sup> | |
15. |
Which one of the following is not a session state parameter? |
A. | Master Secret |
B. | Cipher Spec |
C. | Peer Certificate |
D. | Server Write Key |
Answer» D. Server Write Key | |
16. |
Which one of the following is not a higher –layer SSL protocol?$ |
A. | Alert Protocol |
B. | Handshake Protocol |
C. | Alarm Protocol |
D. | Change Cipher Spec Protocol |
Answer» E. | |