Network Security Exam MCQ Quiz!

13 Questions | Total Attempts: 212

SettingsSettingsSettings
Network Security Exam MCQ Quiz! - Quiz

.


Questions and Answers
  • 1. 
    Which one of the following is not a higher –layer SSL protocol?
    • A. 

      Alert Protocol

    • B. 

      Handshake protocol

    • C. 

      Alarm protocol

    • D. 

      Change Cipher Spec Protocol

  • 2. 
    Which one of the following is not a session state parameter?
    • A. 

      Master Secret

    • B. 

      Cipher Spec

    • C. 

      Peer Certificate

    • D. 

      Server Write Key

  • 3. 
    In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
    • A. 

      2 power 16

    • B. 

      2 power 14

    • C. 

      2 power 32

    • D. 

      2 power 12

  • 4. 
    After the encryption stage in SSL, the maximum length of each fragment is
    • A. 

      2 power 14 plus 1028

    • B. 

      2 power 14 plus 2048

    • C. 

      2 power 16 plus 1028

    • D. 

      2 power 16 plus 2048

  • 5. 
    Consider the following example – Size of Plaintext – 48 bytes. Size of MAC – 20 bytes. Block Length – 8 bytes.
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 6. 
    Which protocol consists of only 1 bit?
    • A. 

      Alert Protocol

    • B. 

      Handshake Protocol

    • C. 

      Upper-Layer Protocol

    • D. 

      Change Cipher Spec Protocol

  • 7. 
    Which protocol is used for the purpose of copying the pending state into the current state?
    • A. 

      Alert Protocol

    • B. 

      Handshake Protocol

    • C. 

      Upper-Layer Protocol

    • D. 

      Change Cipher Spec Protocol

  • 8. 
    Which of the following are possible sizes of MACs? i) 12 Bytes ii) 16 Bytes iii) 20 Bytes iv) 24 Bytes
    • A. 

      I and ii

    • B. 

      Ii only

    • C. 

      Ii and iii

    • D. 

      I , ii and iv

  • 9. 
    In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
    • A. 

      Select, Alarm

    • B. 

      Alert, Alarm

    • C. 

      Warning, Alarm

    • D. 

      Warning, Fatal

  • 10. 
    In the Handshake protocol action, which is the last step of Phase 2: Server Authentication and Key Exchange?
    • A. 

      Server_done

    • B. 

      Server_key_exchange

    • C. 

      Certificate_request

    • D. 

      Crtificate_verify

  • 11. 
    Which is the key exchange algorithm used in the CipherSuite parameter?
    • A. 

      RSA

    • B. 

      Fixed Diffie-Hellman

    • C. 

      Ephemeral Diffie-Hellman

    • D. 

      Any of the mentioned

  • 12. 
    A public key cryptosystem is used for the encryption of?
    • A. 

      Messages

    • B. 

      Session key

    • C. 

      Session key & Messages

    • D. 

      None of the mentioned

  • 13. 
    Data compression includes:
    • A. 

      Removal of redundant character

    • B. 

      Uniform distribution of characters

    • C. 

      Both of the mentioned

    • D. 

      None of the mentioned

Back to Top Back to top