Network Security Exam MCQ Quiz!

  • ISO/IEC 27001
  • NIST SP 800-52
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Arjun
A
Arjun
Community Contributor
Quizzes Created: 1 | Total Attempts: 394
| Attempts: 394 | Questions: 13
Please wait...
Question 1 / 13
0 %
0/100
Score 0/100
1. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

Explanation

In the SSL Protocol, each upper layer message is fragmented into a maximum of 2 power 14 bytes. This means that the message is divided into smaller chunks of data, each containing a maximum of 2 power 14 bytes. This fragmentation helps in transmitting the message efficiently over the network, especially when dealing with large amounts of data.

Submit
Please wait...
About This Quiz
Network Security Exam MCQ Quiz! - Quiz

Dive into the intricacies of network security with our Network Security Exam MCQ Quiz! Test your knowledge on SSL protocols, session state parameters, and encryption processes. Ideal for learners aiming to enhance their understanding of secure network communications.

Personalize your quiz and earn a certificate with your name on it!
2. Which of the following are possible sizes of MACs? i) 12 Bytes ii) 16 Bytes iii) 20 Bytes iv) 24 Bytes

Explanation

The possible sizes of MACs are 16 Bytes and 20 Bytes. This means that option ii and iii are correct. Option i is not correct because 12 Bytes is not a possible size for MACs. Option iv is also not correct because 24 Bytes is not a possible size for MACs.

Submit
3. Which protocol is used for the purpose of copying the pending state into the current state?

Explanation

The Change Cipher Spec Protocol is used for the purpose of copying the pending state into the current state. This protocol is responsible for signaling that the pending state should be used as the current state for encrypting and decrypting data. It is a part of the SSL/TLS protocol suite and is used during the handshake process to ensure secure communication between client and server.

Submit
4. Which one of the following is not a session state parameter?

Explanation

The session state parameters are used to maintain the state of a session between a client and a server. Master Secret, Cipher Spec, and Peer Certificate are all examples of session state parameters. However, the Server Write Key is not a session state parameter. The Server Write Key is used for encrypting data that is sent from the server to the client, but it is not directly related to maintaining the state of the session.

Submit
5. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

Explanation

In the alert protocol, the first byte takes the value 1 or 2, which corresponds to "Warning" and "Fatal" respectively. This means that if the first byte has a value of 1, it indicates a warning alert, while a value of 2 indicates a fatal alert.

Submit
6. After the encryption stage in SSL, the maximum length of each fragment is

Explanation

After the encryption stage in SSL, the maximum length of each fragment is 2 power 14 plus 2048. This means that each encrypted fragment can have a maximum length of 2^14 + 2048 bytes.

Submit
7. In the Handshake protocol action, which is the last step of Phase 2: Server Authentication and Key Exchange?

Explanation

The last step of Phase 2: Server Authentication and Key Exchange in the Handshake protocol action is "server_done". This step indicates that the server has completed its authentication and key exchange process. It signifies that the server is ready to proceed to the next phase of the protocol.

Submit
8. Which protocol consists of only 1 bit?

Explanation

The Change Cipher Spec Protocol consists of only 1 bit. This protocol is used in the SSL/TLS handshake process to indicate that the encryption and decryption of data should begin using the newly negotiated cipher suite. It is a simple and lightweight protocol that plays a crucial role in establishing secure communication between the client and the server.

Submit
9. Data compression includes:

Explanation

Data compression includes both the removal of redundant characters and the uniform distribution of characters. Redundant characters are those that are repeated unnecessarily and can be eliminated to reduce the size of the data. Uniform distribution of characters means that the characters are spread out evenly throughout the data, which can also help in reducing its size. Therefore, both of these techniques are used in data compression to achieve efficient storage and transmission of data.

Submit
10. Consider the following example – Size of Plaintext – 48 bytes. Size of MAC – 20 bytes. Block Length – 8 bytes.

Explanation

The given answer, 4, is the correct answer. It is likely that the question is asking about the number of blocks needed to encrypt the plaintext using a block cipher with a block length of 8 bytes. Since the plaintext size is 48 bytes and the block length is 8 bytes, we can divide the plaintext size by the block length to get the number of blocks needed. In this case, 48 divided by 8 equals 6, so 6 blocks are needed.

Submit
11. Which is the key exchange algorithm used in the CipherSuite parameter?

Explanation

The key exchange algorithm used in the CipherSuite parameter can be any of the mentioned options, which are RSA, Fixed Diffie-Hellman, and Ephemeral Diffie-Hellman. This means that the CipherSuite parameter allows for flexibility in choosing the appropriate key exchange algorithm based on the specific requirements and security considerations of the system.

Submit
12. Which one of the following is not a higher –layer SSL protocol?

Explanation

The Change Cipher Spec Protocol is not a higher-layer SSL protocol. This protocol is used to signal a change in the cipher suite and the activation of the negotiated encryption and MAC algorithms. It is not responsible for higher-level tasks such as establishing a secure connection or exchanging cryptographic keys, which are handled by the Handshake protocol. The Alert Protocol is responsible for communicating SSL-related alerts and the Alarm protocol does not exist in the SSL protocol suite.

Submit
13. A public key cryptosystem is used for the encryption of?

Explanation

A public key cryptosystem is used for the encryption of session keys. This is because public key encryption allows for secure communication between two parties without the need for them to share a secret key beforehand. In this system, each party has a pair of keys - a public key and a private key. The session key, which is a symmetric key, is generated by one party and encrypted using the recipient's public key. The encrypted session key is then sent to the recipient, who can decrypt it using their private key. Once the session key is decrypted, it can be used for encrypting and decrypting messages between the two parties.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2018
    Quiz Created by
    Arjun
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In the SSL Protocol, each upper layer message if fragmented into a...
Which of the following are possible sizes of MACs?...
Which protocol is used for the purpose of copying the pending state...
Which one of the following is not a session state parameter?
In the alert protocol the first byte takes the value 1 or 2 which...
After the encryption stage in SSL, the maximum length of each fragment...
In the Handshake protocol action, which is the last step of Phase 2:...
Which protocol consists of only 1 bit?
Data compression includes:
Consider the following example –...
Which is the key exchange algorithm used in the CipherSuite parameter?
Which one of the following is not a higher –layer SSL protocol?
A public key cryptosystem is used for the encryption of?
Alert!

Advertisement