logo
  • Home
  • Rank
  • Tests
  • About
  • Training
  • Programming
  • CS
  • IT
  • IS
  • ECE
  • EEE
  • EE
  • Civil
  • Mechanical
  • Chemical
  • Metallurgy
  • Instrumentation
  • Aeronautical
  • Aerospace
  • Biotechnology
  • Agriculture
  • MCA
  • BCA
  • Internship
  • Contact

Cyber Security Multiple Choice Questions | MCQs | Quiz

Cyber Security Interview Questions and Answers
Practice Cyber Security questions and answers for interviews, campus placements, online tests, aptitude tests, quizzes and competitive exams.

Get Started

•   Hacking History
•   Hackers Types
•   Cyber Attacks Types
•   Security Elements
•   Security Technologies
•   Generic Security Steps - 1
•   Generic Security Steps - 2
•   Physical Hacking
•   Security Protocols - 1
•   Security Protocols - 2
•   Hacking Terminologies - 1
•   Hacking Terminologies - 2
•   Ports & Its Types - 1
•   Ports & Its Types - 2
•   Firewalls - 1
•   Firewalls - 2
•   VPNs
•   Linux OS & Its Security
•   Buffer Overflow - 1
•   Buffer Overflow - 2
•   Enumerating-Cyber Security
•   Hacking & Security Skills
•   Fingerprinting
•   Exploits & Exploitation
•   Cyber & IT laws - 1
•   Cyber & IT laws - 2
•   Security Tools - 1
•   Security Tools - 2
•   Bugs & Vulnerabilities
•   Ethical Hacking Ethics
•   Security Breach
•   Corporate Cyber Security
•   OSI Model Security - 1
•   OSI Model Security - 2
•   TCP-IP Model Security
•   Data Leakage - 1
•   Data Leakage - 2
•   Information Techniques - 1
•   Information Techniques - 2
•   Security Scanning Phase-1
•   Security Scanning Phase-2
•   Email Security - 1
•   Email Security - 2
•   Password Cracking - 1
•   Password Cracking - 2
•   Windows Security
•   Mobile Phone Security
•   Wireless Security
•   Virus & Worms
•   Trojans & Backdoors - 1
•   Trojans & Backdoors - 2
•   Botnets
•   Digital Privacy
•   DoS & DDoS
•   Phishing & Its Types
•   Sniffing
•   Session Hijacking
•   Web Server Attacks
•   Application Vulnerabilities
•   Adwares
•   Spywares
•   Reverse Engineering - 1
•   Reverse Engineering - 2
•   DNS Hacking & Security
•   Caches & Cookies
•   Social Networking Security
•   Spamming
•   Cryptography Types - 1
•   Cryptography Types - 2
•   Ciphers & Its Security
•   Steganography Security
•   Tor Services
•   Anonymity & Pseudonymity
•   Deep Web & Darknet

« Prev Page
Next Page »

Cyber Security Questions and Answers – Security Protocols – 2

Posted on February 11, 2019 by Manish

This set of Cyber Security Questions and Answers for Freshers focuses on “Security Protocols – 2”.

1. Authentication in PCT requires _____ keys.
a) 1
b) 2
c) 3
d) 4
View Answer

Answer: b
Explanation: For message encryption using PCT it requires two separate keys. Moreover, PCT has more options for data formats and security algorithms.
advertisement

2. The latest version of TLS is _____
a) version 1.1
b) version 1.2
c) version 2.1
d) version 1.3
View Answer

Answer: b
Explanation: The latest standard version of TLS is version 1.2. Version 1.3 is still in the development stage.

3. SIP is abbreviated as __________
a) Session Initiation Protocol
b) Secured Initiation Protocol
c) Secure Initiation Protocol
d) Session Integration Protocol
View Answer

Answer: a
Explanation: Session Initiation Protocol is an important protocol used for starting, preserving and terminating any real time sessions over the internet.

4. In which of the following cases Session Initiation Protocol is not used?
a) Instant Messaging
b) Voice over LTE (VoLTE)
c) Internet telephony
d) Data Transferring
View Answer

Answer: d
Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice, video as well as messaging applications for controlling multimedia communication sessions.
advertisement

5. SRTP is abbreviated as ________
a) Secure Relay Transport Protocol
b) Secure Real-time Transferring Protocol
c) Secure Real-time Transport Protocol
d) Secure Real-time Transportation Protocol
View Answer

Answer: c
Explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with encryption for message integrity and authentication. It is used mostly in entertainment systems and streaming media and sites.

6. ESP is abbreviated as ____________
a) Encapsulating Security Payload
b) Encapsulating Secure Protocol
c) Encrypted Secure Payload
d) Encapsulating Secure Payload
View Answer

Answer: d
Explanation: Encapsulating Secure Payload is a special type of protocol used for offering integrity, authentication, and confidentiality to network packets’ data in IPSec (Secure Internet Protocol).

7. ________ is the entity for issuing digital certificates.
a) Certificate Authority (CA)
b) Cert Authority (CA)
c) Cert Authorization (CA)
d) Certificate Authorization (CA)
View Answer

Answer: a
Explanation: Digital certificates are used for certifying the ownership of a public key and the entity who issue those certificates is the Certificate Authority.
advertisement

8. IKE is abbreviated as Internet Key Exchange.
a) True
b) False
View Answer

Answer: a
Explanation: Internet Key Exchange is a security protocol used for setting up a security association in the Secure IP protocol. IKE = Key Management Protocol (KMP) + Security Association (SA).

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security for Freshers, here is complete set of 1000+ Multiple Choice Questions and Answers.

« Prev Page - Cyber Security Questions and Answers – Security Protocols – 1
» Next Page - Cyber Security Questions and Answers – Hacking Terminologies – 1

« Cyber Security Questions and Answers – Security Protocols – 1
Cyber Security Questions and Answers – Hacking Terminologies – 1 »
advertisement

Deep Dive @ Sanfoundry:

  1. SAN – Storage Area Networks Questions & Answers
  2. Wireless & Mobile Communications Questions & Answers
  3. PHP Questions and Answers
  4. Java Programming Examples on Networking
  5. MySQL Database Questions and Answers
  6. Operating System Questions and Answers
  7. Computer Networks Questions and Answers
  8. IOT Questions and Answers
  9. Cryptography and Network Security Questions and Answers
  10. Cyber Security Questions and Answers
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer and SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage & Cluster Administration, Advanced C Programming, SAN Storage Technologies, SCSI Internals and Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him below:
LinkedIn | Facebook | Twitter | Google+

Best Careers

Developer Tracks
SAN Developer
Linux Kernel Developer
Linux Driver Developer
Linux Network Developer

Live Training Photos
Mentoring
Software Productivity
GDB Assignment
Sanfoundry is No. 1 choice for Deep Hands-ON Trainings in SAN, Linux & C, Kernel Programming. Our Founder has trained employees of almost all Top Companies in India such as VMware, Citrix, Oracle, Motorola, Ericsson, Aricent, HP, Intuit, Microsoft, Cisco, SAP Labs, Siemens, Symantec, Redhat, Chelsio, Cavium, ST-Micro, Samsung, LG-Soft, Wipro, TCS, HCL, IBM, Accenture, HSBC, Mphasis, Tata-Elxsi, Tata VSNL, Mindtree, Cognizant and Startups.

Best Trainings

SAN I - Technology
SAN II - Admin
Linux Fundamentals
Advanced C Training
Linux-C Debugging
System Programming
Network Programming
Linux Threads
Kernel Programming
Kernel Debugging
Linux Device Drivers

Best Reference Books

Computer Science Books
Algorithm & Programming Books
Electronics Engineering Books
Electrical Engineering Books
Chemical Engineering Books
Civil Engineering Books
Mechanical Engineering Books
Industrial Engineering Books
Instrumentation Engg Books
Metallurgical Engineering Books
All Stream Best Books

Questions and Answers

1000 C Questions & Answers
1000 C++ Questions & Answers
1000 C# Questions & Answers
1000 Java Questions & Answers
1000 Linux Questions & Answers
1000 Python Questions
1000 PHP Questions & Answers
1000 Hadoop Questions
Cloud Computing Questions
Computer Science Questions
All Stream Questions & Answers

India Internships

Computer Science Internships
Instrumentation Internships
Electronics Internships
Electrical Internships
Mechanical Internships
Industrial Internships
Systems Internships
Chemical Internships
Civil Internships
IT Internships
All Stream Internships

About Sanfoundry

About Us
Copyright
Terms
Privacy Policy
Jobs
Bangalore Training
Online Training
Developers Track
Mentoring Sessions
Contact Us
Sitemap
© 2011 Sanfoundry. All Rights Reserved.