Network Security Exam MCQ Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Arjun
A
Arjun
Community Contributor
Quizzes Created: 1 | Total Attempts: 375
Questions: 13 | Attempts: 375

SettingsSettingsSettings
Network Security Exam MCQ Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Which one of the following is not a higher –layer SSL protocol?

    • A.

      Alert Protocol

    • B.

      Handshake protocol

    • C.

      Alarm protocol

    • D.

      Change Cipher Spec Protocol

    Correct Answer
    D. Change CipHer Spec Protocol
    Explanation
    The Change Cipher Spec Protocol is not a higher-layer SSL protocol. This protocol is used to signal a change in the cipher suite and the activation of the negotiated encryption and MAC algorithms. It is not responsible for higher-level tasks such as establishing a secure connection or exchanging cryptographic keys, which are handled by the Handshake protocol. The Alert Protocol is responsible for communicating SSL-related alerts and the Alarm protocol does not exist in the SSL protocol suite.

    Rate this question:

  • 2. 

    Which one of the following is not a session state parameter?

    • A.

      Master Secret

    • B.

      Cipher Spec

    • C.

      Peer Certificate

    • D.

      Server Write Key

    Correct Answer
    D. Server Write Key
    Explanation
    The session state parameters are used to maintain the state of a session between a client and a server. Master Secret, Cipher Spec, and Peer Certificate are all examples of session state parameters. However, the Server Write Key is not a session state parameter. The Server Write Key is used for encrypting data that is sent from the server to the client, but it is not directly related to maintaining the state of the session.

    Rate this question:

  • 3. 

    In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

    • A.

      2 power 16

    • B.

      2 power 14

    • C.

      2 power 32

    • D.

      2 power 12

    Correct Answer
    B. 2 power 14
    Explanation
    In the SSL Protocol, each upper layer message is fragmented into a maximum of 2 power 14 bytes. This means that the message is divided into smaller chunks of data, each containing a maximum of 2 power 14 bytes. This fragmentation helps in transmitting the message efficiently over the network, especially when dealing with large amounts of data.

    Rate this question:

  • 4. 

    After the encryption stage in SSL, the maximum length of each fragment is

    • A.

      2 power 14 plus 1028

    • B.

      2 power 14 plus 2048

    • C.

      2 power 16 plus 1028

    • D.

      2 power 16 plus 2048

    Correct Answer
    B. 2 power 14 plus 2048
    Explanation
    After the encryption stage in SSL, the maximum length of each fragment is 2 power 14 plus 2048. This means that each encrypted fragment can have a maximum length of 2^14 + 2048 bytes.

    Rate this question:

  • 5. 

    Consider the following example – Size of Plaintext – 48 bytes. Size of MAC – 20 bytes. Block Length – 8 bytes.

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    D. 4
    Explanation
    The given answer, 4, is the correct answer. It is likely that the question is asking about the number of blocks needed to encrypt the plaintext using a block cipher with a block length of 8 bytes. Since the plaintext size is 48 bytes and the block length is 8 bytes, we can divide the plaintext size by the block length to get the number of blocks needed. In this case, 48 divided by 8 equals 6, so 6 blocks are needed.

    Rate this question:

  • 6. 

    Which protocol consists of only 1 bit?

    • A.

      Alert Protocol

    • B.

      Handshake Protocol

    • C.

      Upper-Layer Protocol

    • D.

      Change Cipher Spec Protocol

    Correct Answer
    D. Change CipHer Spec Protocol
    Explanation
    The Change Cipher Spec Protocol consists of only 1 bit. This protocol is used in the SSL/TLS handshake process to indicate that the encryption and decryption of data should begin using the newly negotiated cipher suite. It is a simple and lightweight protocol that plays a crucial role in establishing secure communication between the client and the server.

    Rate this question:

  • 7. 

    Which protocol is used for the purpose of copying the pending state into the current state?

    • A.

      Alert Protocol

    • B.

      Handshake Protocol

    • C.

      Upper-Layer Protocol

    • D.

      Change Cipher Spec Protocol

    Correct Answer
    D. Change CipHer Spec Protocol
    Explanation
    The Change Cipher Spec Protocol is used for the purpose of copying the pending state into the current state. This protocol is responsible for signaling that the pending state should be used as the current state for encrypting and decrypting data. It is a part of the SSL/TLS protocol suite and is used during the handshake process to ensure secure communication between client and server.

    Rate this question:

  • 8. 

    Which of the following are possible sizes of MACs? i) 12 Bytes ii) 16 Bytes iii) 20 Bytes iv) 24 Bytes

    • A.

      I and ii

    • B.

      Ii only

    • C.

      Ii and iii

    • D.

      I , ii and iv

    Correct Answer
    C. Ii and iii
    Explanation
    The possible sizes of MACs are 16 Bytes and 20 Bytes. This means that option ii and iii are correct. Option i is not correct because 12 Bytes is not a possible size for MACs. Option iv is also not correct because 24 Bytes is not a possible size for MACs.

    Rate this question:

  • 9. 

    In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

    • A.

      Select, Alarm

    • B.

      Alert, Alarm

    • C.

      Warning, Alarm

    • D.

      Warning, Fatal

    Correct Answer
    D. Warning, Fatal
    Explanation
    In the alert protocol, the first byte takes the value 1 or 2, which corresponds to "Warning" and "Fatal" respectively. This means that if the first byte has a value of 1, it indicates a warning alert, while a value of 2 indicates a fatal alert.

    Rate this question:

  • 10. 

    In the Handshake protocol action, which is the last step of Phase 2: Server Authentication and Key Exchange?

    • A.

      Server_done

    • B.

      Server_key_exchange

    • C.

      Certificate_request

    • D.

      Crtificate_verify

    Correct Answer
    A. Server_done
    Explanation
    The last step of Phase 2: Server Authentication and Key Exchange in the Handshake protocol action is "server_done". This step indicates that the server has completed its authentication and key exchange process. It signifies that the server is ready to proceed to the next phase of the protocol.

    Rate this question:

  • 11. 

    Which is the key exchange algorithm used in the CipherSuite parameter?

    • A.

      RSA

    • B.

      Fixed Diffie-Hellman

    • C.

      Ephemeral Diffie-Hellman

    • D.

      Any of the mentioned

    Correct Answer
    D. Any of the mentioned
    Explanation
    The key exchange algorithm used in the CipherSuite parameter can be any of the mentioned options, which are RSA, Fixed Diffie-Hellman, and Ephemeral Diffie-Hellman. This means that the CipherSuite parameter allows for flexibility in choosing the appropriate key exchange algorithm based on the specific requirements and security considerations of the system.

    Rate this question:

  • 12. 

    A public key cryptosystem is used for the encryption of?

    • A.

      Messages

    • B.

      Session key

    • C.

      Session key & Messages

    • D.

      None of the mentioned

    Correct Answer
    B. Session key
    Explanation
    A public key cryptosystem is used for the encryption of session keys. This is because public key encryption allows for secure communication between two parties without the need for them to share a secret key beforehand. In this system, each party has a pair of keys - a public key and a private key. The session key, which is a symmetric key, is generated by one party and encrypted using the recipient's public key. The encrypted session key is then sent to the recipient, who can decrypt it using their private key. Once the session key is decrypted, it can be used for encrypting and decrypting messages between the two parties.

    Rate this question:

  • 13. 

    Data compression includes:

    • A.

      Removal of redundant character

    • B.

      Uniform distribution of characters

    • C.

      Both of the mentioned

    • D.

      None of the mentioned

    Correct Answer
    C. Both of the mentioned
    Explanation
    Data compression includes both the removal of redundant characters and the uniform distribution of characters. Redundant characters are those that are repeated unnecessarily and can be eliminated to reduce the size of the data. Uniform distribution of characters means that the characters are spread out evenly throughout the data, which can also help in reducing its size. Therefore, both of these techniques are used in data compression to achieve efficient storage and transmission of data.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2018
    Quiz Created by
    Arjun
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.