MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes |
| A. | i and iii |
| B. | ii only |
| C. | ii and iii |
| D. | ii iii and ivView Answer |
| Answer» D. ii iii and ivView Answer | |
| 2. |
Consider the following example –Size of Plaintext – 48 bytes.Size of MAC – 20 bytes.Block Length – 8 bytes.How many bytes of padding need to be added to the system? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» D. 4 | |
| 3. |
After the encryption stage in SSL, the maximum length of each fragment is |
| A. | 214+1028 |
| B. | 214+2048 |
| C. | 216+1028 |
| D. | 216+2048 |
| Answer» C. 216+1028 | |
| 4. |
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC. |
| A. | NANDed, XORed |
| B. | Concatenated, XORed |
| C. | XORed, NANDed |
| D. | XORed, Concatenated |
| Answer» C. XORed, NANDed | |
| 5. |
Which one of the following is not a higher –layer SSL protocol? |
| A. | Alert Protocol |
| B. | Handshake Protocol |
| C. | Alarm Protocol |
| D. | Change Cipher Spec Protocol |
| Answer» D. Change Cipher Spec Protocol | |
| 6. |
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack. |
| A. | True |
| B. | False |
| Answer» C. | |
| 7. |
THE_FULL_FORM_OF_SSL_IS?$ |
| A. | Serial Session Layer |
| B. | Secure Socket Layer |
| C. | Session Secure Layer |
| D. | Series Socket Layer |
| Answer» C. Session Secure Layer | |
| 8. |
After the encryption stage in SSL, the maximum length of each fragment is$ |
| A. | 2<sup>14</sup>+1028 |
| B. | 2<sup>14</sup>+2048 |
| C. | 2<sup>16</sup>+1028 |
| D. | 2<sup>16</sup>+2048 |
| Answer» D. 2<sup>16</sup>+2048 | |
| 9. |
Which of the following are possible sizes of MACs? |
| A. | 12 Bytes |
| B. | 16 Bytes |
| C. | 20 Bytes |
| D. | 24 Bytes |
| Answer» E. | |
| 10. |
Which protocol is used for the purpose of copying the pending state into the current state? |
| A. | Alert Protocol |
| B. | Handshake Protocol |
| C. | Upper-Layer Protocol |
| D. | Change Cipher Spec Protocol |
| Answer» D. Change Cipher Spec Protocol | |
| 11. |
Which protocol consists of only 1 bit? |
| A. | Alert Protocol |
| B. | Handshake Protocol |
| C. | Upper-Layer Protocol |
| D. | Change Cipher Spec Protocol |
| Answer» E. | |
| 12. |
Which protocol is used to convey SSL related alerts to the peer entity? |
| A. | Alert Protocol |
| B. | Handshake Protocol |
| C. | Upper-Layer Protocol |
| D. | Change Cipher Spec Protocol |
| Answer» E. | |
| 13. |
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC? |
| A. | NANDed, XORed |
| B. | Concatenated, XORed |
| C. | XORed, NANDed |
| D. | XORed, Concatenated |
| Answer» C. XORed, NANDed | |
| 14. |
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes. |
| A. | 2<sup>16</sup> |
| B. | 2<sup>32</sup> |
| C. | 2<sup>14</sup> |
| D. | 2<sup>12</sup> |
| Answer» C. 2<sup>14</sup> | |
| 15. |
Which one of the following is not a session state parameter? |
| A. | Master Secret |
| B. | Cipher Spec |
| C. | Peer Certificate |
| D. | Server Write Key |
| Answer» D. Server Write Key | |
| 16. |
Which one of the following is not a higher –layer SSL protocol?$ |
| A. | Alert Protocol |
| B. | Handshake Protocol |
| C. | Alarm Protocol |
| D. | Change Cipher Spec Protocol |
| Answer» E. | |