Network Security Questions and Answers – Secure Socket Layer – II

This set of Network Security MCQs focuses on “Secure Socket Layer – II”.

1. Number of phases in the handshaking protocol?
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: c
Explanation: There are 4 phases in the handshaking protocol. These are –
Phase 1 : Establishing security capabilities
Phase 2 : Server Authentication and Key Exchange
Phase 3 : Client Authentication and Key Exchange
Phase 4 : Finish/ End.

2. In the SSL record protocol operation pad_2 is –
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 48 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
View Answer

Answer: b
Explanation: pad_2 = is the byte 0x5C repeated 48 times for MD5.

3.In the SSL record protocol operation pad_1 is –
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 40 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
View Answer

Answer: d
Explanation: pad_1 = is the byte 0x36 repeated 48 times for MD5.
advertisement
advertisement

4. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
a) server_done
b) server_key_exchange
c) certificate_request
d) crtificate_verify
View Answer

Answer: a
Explanation: The last step of the Phase 2 is the server_done step.

5. Which is the key exchange algorithm used in CipherSuite parameter?
a) RSA
b) Fixed Diffie-Hellman
c) Ephemeral Diffie-Hellman
d) Any of the mentioned
View Answer

Answer: d
Explanation: We can use either of the following for the CipherSuite key exchange-
i) RSA
ii) Fixed Diffie-Hellman
iii) Ephemeral Diffie-Hellman
iv) Anonymous Diffie-Hellman
v) Fortezza.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6.The certificate message is required for any agreed-on key exchange method except _______________
a) Ephemeral Diffie-Hellman
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
View Answer

Answer: b
Explanation: The certificate message is required for any agreed-on key exchange method except Anonymous Diffie-Hellman.

7. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
a) Fortezza
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
View Answer

Answer: c
Explanation: The Fixed Diffie-Helmann does not require the server_key_exchange step in the handshake protocol.
advertisement

8. The DSS signature uses which hash algorithm?
a) MD5
b) SHA-2
c) SHA-1
d) Does not use hash algorithm
View Answer

Answer: c
Explanation: The DSS signature uses SHA-1.

9. The RSA signature uses which hash algorithm?
a) MD5
b) SHA-1
c) MD5 and SHA-1
d) None of the mentioned.
View Answer

Answer: c
Explanation: The MD5 and SHA-1 hash is concatenated together and the then encrypted with the server’s private key.
advertisement

10. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
a) 42 bytes
b) 32 bytes
c) 36 bytes
d) 48 bytes
View Answer

Answer: c
Explanation: The size is 36 bytes after MD5 and SHA-1 processing.

11. The certificate_request massage includes two parameters, one of which is-
a) certificate_extension
b) certificate_creation
c) certificate_exchange
d) certificate_type
View Answer

Answer: d
Explanation: The certificate_request massage includes two parameters : certificate_type and certificate_authorities.

12. The client_key_exchange message uses a pre master key of size –
a) 48 bytes
b) 56 bytes
c) 64 bytes
d) 32 bytes
View Answer

Answer: a
Explanation: The client_key_exchange message uses a pre master key of size 48 bytes.

13. The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) –
CertificateVerify.signature.md5_hash = MD5(master_secret || pad_2 || MD5(handshake_messages || master_secret || pad_1).
Is there any error? If so, what is it?
a) Yes. pad_1 and pad_2 should be interchanged
b) Yes. pad’s should be present towards the end
c) Yes. master_key should not be used, the pre_master key should be used
d) No Error
View Answer

Answer: d
Explanation: The code is correct with no errors.

14. In the handshake protocol which is the message type first sent between client and server ?
a) server_hello
b) client_hello
c) hello_request
d) certificate_request
View Answer

Answer: b
Explanation: Interaction between the client and server starts via the client_hello message.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.