This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Security Protocols – 2”.
1. Authentication in PCT requires _____ keys.
a) 1
b) 2
c) 3
d) 4
View Answer
Explanation: For message encryption using PCT it requires two separate keys. Moreover, PCT has more options for data formats and security algorithms.
2. The latest version of TLS is _____
a) version 1.1
b) version 1.2
c) version 2.1
d) version 1.3
View Answer
Explanation: The latest standard version of TLS is version 1.2. Version 1.3 is still in the development stage.
3. SIP is abbreviated as __________
a) Session Initiation Protocol
b) Secured Initiation Protocol
c) Secure Initiation Protocol
d) Session Integration Protocol
View Answer
Explanation: Session Initiation Protocol is an important protocol used for starting, preserving and terminating any real time sessions over the internet.
4. In which of the following cases Session Initiation Protocol is not used?
a) Instant Messaging
b) Voice over LTE (VoLTE)
c) Internet telephony
d) Data Transferring
View Answer
Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice, video as well as messaging applications for controlling multimedia communication sessions.
5. SRTP is abbreviated as ________
a) Secure Relay Transport Protocol
b) Secure Real-time Transferring Protocol
c) Secure Real-time Transport Protocol
d) Secure Real-time Transportation Protocol
View Answer
Explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with encryption for message integrity and authentication. It is used mostly in entertainment systems and streaming media and sites.
6. ESP is abbreviated as ____________
a) Encapsulating Security Payload
b) Encapsulating Secure Protocol
c) Encrypted Secure Payload
d) Encapsulating Secure Payload
View Answer
Explanation: Encapsulating Secure Payload is a special type of protocol used for offering integrity, authentication, and confidentiality to network packets’ data in IPSec (Secure Internet Protocol).
7. ________ is the entity for issuing digital certificates.
a) Certificate Authority (CA)
b) Cert Authority (CA)
c) Cert Authorization (CA)
d) Certificate Authorization (CA)
View Answer
Explanation: Digital certificates are used for certifying the ownership of a public key and the entity who issue those certificates is the Certificate Authority.
8. IKE is abbreviated as Internet Key Exchange.
a) True
b) False
View Answer
Explanation: Internet Key Exchange is a security protocol used for setting up a security association in the Secure IP protocol. IKE = Key Management Protocol (KMP) + Security Association (SA).
Sanfoundry Global Education & Learning Series – Cyber Security.
To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Check Programming Books
- Practice Cryptography & Network Security MCQ
- Check Cyber Security Books
- Practice Programming MCQs
- Apply for Computer Science Internship