1.
Which one of the following is not a higher –layer SSL protocol?
Correct Answer
D. Change CipHer Spec Protocol
Explanation
The Change Cipher Spec Protocol is not a higher-layer SSL protocol. This protocol is used to signal a change in the cipher suite and the activation of the negotiated encryption and MAC algorithms. It is not responsible for higher-level tasks such as establishing a secure connection or exchanging cryptographic keys, which are handled by the Handshake protocol. The Alert Protocol is responsible for communicating SSL-related alerts and the Alarm protocol does not exist in the SSL protocol suite.
2.
Which one of the following is not a session state parameter?
Correct Answer
D. Server Write Key
Explanation
The session state parameters are used to maintain the state of a session between a client and a server. Master Secret, Cipher Spec, and Peer Certificate are all examples of session state parameters. However, the Server Write Key is not a session state parameter. The Server Write Key is used for encrypting data that is sent from the server to the client, but it is not directly related to maintaining the state of the session.
3.
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
Correct Answer
B. 2 power 14
Explanation
In the SSL Protocol, each upper layer message is fragmented into a maximum of 2 power 14 bytes. This means that the message is divided into smaller chunks of data, each containing a maximum of 2 power 14 bytes. This fragmentation helps in transmitting the message efficiently over the network, especially when dealing with large amounts of data.
4.
After the encryption stage in SSL, the maximum length of each fragment is
Correct Answer
B. 2 power 14 plus 2048
Explanation
After the encryption stage in SSL, the maximum length of each fragment is 2 power 14 plus 2048. This means that each encrypted fragment can have a maximum length of 2^14 + 2048 bytes.
5.
Consider the following example –
Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.
Correct Answer
D. 4
Explanation
The given answer, 4, is the correct answer. It is likely that the question is asking about the number of blocks needed to encrypt the plaintext using a block cipher with a block length of 8 bytes. Since the plaintext size is 48 bytes and the block length is 8 bytes, we can divide the plaintext size by the block length to get the number of blocks needed. In this case, 48 divided by 8 equals 6, so 6 blocks are needed.
6.
Which protocol consists of only 1 bit?
Correct Answer
D. Change CipHer Spec Protocol
Explanation
The Change Cipher Spec Protocol consists of only 1 bit. This protocol is used in the SSL/TLS handshake process to indicate that the encryption and decryption of data should begin using the newly negotiated cipher suite. It is a simple and lightweight protocol that plays a crucial role in establishing secure communication between the client and the server.
7.
Which protocol is used for the purpose of copying the pending state into the current state?
Correct Answer
D. Change CipHer Spec Protocol
Explanation
The Change Cipher Spec Protocol is used for the purpose of copying the pending state into the current state. This protocol is responsible for signaling that the pending state should be used as the current state for encrypting and decrypting data. It is a part of the SSL/TLS protocol suite and is used during the handshake process to ensure secure communication between client and server.
8.
Which of the following are possible sizes of MACs?
i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes
Correct Answer
C. Ii and iii
Explanation
The possible sizes of MACs are 16 Bytes and 20 Bytes. This means that option ii and iii are correct. Option i is not correct because 12 Bytes is not a possible size for MACs. Option iv is also not correct because 24 Bytes is not a possible size for MACs.
9.
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
Correct Answer
D. Warning, Fatal
Explanation
In the alert protocol, the first byte takes the value 1 or 2, which corresponds to "Warning" and "Fatal" respectively. This means that if the first byte has a value of 1, it indicates a warning alert, while a value of 2 indicates a fatal alert.
10.
In the Handshake protocol action, which is the last step of Phase 2: Server Authentication and Key Exchange?
Correct Answer
A. Server_done
Explanation
The last step of Phase 2: Server Authentication and Key Exchange in the Handshake protocol action is "server_done". This step indicates that the server has completed its authentication and key exchange process. It signifies that the server is ready to proceed to the next phase of the protocol.
11.
Which is the key exchange algorithm used in the CipherSuite parameter?
Correct Answer
D. Any of the mentioned
Explanation
The key exchange algorithm used in the CipherSuite parameter can be any of the mentioned options, which are RSA, Fixed Diffie-Hellman, and Ephemeral Diffie-Hellman. This means that the CipherSuite parameter allows for flexibility in choosing the appropriate key exchange algorithm based on the specific requirements and security considerations of the system.
12.
A public key cryptosystem is used for the encryption of?
Correct Answer
B. Session key
Explanation
A public key cryptosystem is used for the encryption of session keys. This is because public key encryption allows for secure communication between two parties without the need for them to share a secret key beforehand. In this system, each party has a pair of keys - a public key and a private key. The session key, which is a symmetric key, is generated by one party and encrypted using the recipient's public key. The encrypted session key is then sent to the recipient, who can decrypt it using their private key. Once the session key is decrypted, it can be used for encrypting and decrypting messages between the two parties.
13.
Data compression includes:
Correct Answer
C. Both of the mentioned
Explanation
Data compression includes both the removal of redundant characters and the uniform distribution of characters. Redundant characters are those that are repeated unnecessarily and can be eliminated to reduce the size of the data. Uniform distribution of characters means that the characters are spread out evenly throughout the data, which can also help in reducing its size. Therefore, both of these techniques are used in data compression to achieve efficient storage and transmission of data.