This set of Cyber Security Questions and Answers for Freshers focuses on “Security Protocols – 2”.
1. Authentication in PCT requires _____ keys.
Explanation: For message encryption using PCT it requires two separate keys. Moreover, PCT has more options for data formats and security algorithms.
2. The latest version of TLS is _____
a) version 1.1
b) version 1.2
c) version 2.1
d) version 1.3
Explanation: The latest standard version of TLS is version 1.2. Version 1.3 is still in the development stage.
3. SIP is abbreviated as __________
a) Session Initiation Protocol
b) Secured Initiation Protocol
c) Secure Initiation Protocol
d) Session Integration Protocol
Explanation: Session Initiation Protocol is an important protocol used for starting, preserving and terminating any real time sessions over the internet.
4. In which of the following cases Session Initiation Protocol is not used?
a) Instant Messaging
b) Voice over LTE (VoLTE)
c) Internet telephony
d) Data Transferring
Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice, video as well as messaging applications for controlling multimedia communication sessions.
5. SRTP is abbreviated as ________
a) Secure Relay Transport Protocol
b) Secure Real-time Transferring Protocol
c) Secure Real-time Transport Protocol
d) Secure Real-time Transportation Protocol
Explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with encryption for message integrity and authentication. It is used mostly in entertainment systems and streaming media and sites.
6. ESP is abbreviated as ____________
a) Encapsulating Security Payload
b) Encapsulating Secure Protocol
c) Encrypted Secure Payload
d) Encapsulating Secure Payload
Explanation: Encapsulating Secure Payload is a special type of protocol used for offering integrity, authentication, and confidentiality to network packets’ data in IPSec (Secure Internet Protocol).
7. ________ is the entity for issuing digital certificates.
a) Certificate Authority (CA)
b) Cert Authority (CA)
c) Cert Authorization (CA)
d) Certificate Authorization (CA)
Explanation: Digital certificates are used for certifying the ownership of a public key and the entity who issue those certificates is the Certificate Authority.
8. IKE is abbreviated as Internet Key Exchange.
Explanation: Internet Key Exchange is a security protocol used for setting up a security association in the Secure IP protocol. IKE = Key Management Protocol (KMP) + Security Association (SA).
Sanfoundry Global Education & Learning Series – Cyber Security.
To practice all areas of Cyber Security for Freshers, here is complete set of 1000+ Multiple Choice Questions and Answers.