Cyber Security Questions and Answers – Security Protocols – 2

This set of Cyber Security Questions and Answers for Freshers focuses on “Security Protocols – 2”.

1. Authentication in PCT requires _____ keys.
a) 1
b) 2
c) 3
d) 4
View Answer

Answer: b
Explanation: For message encryption using PCT it requires two separate keys. Moreover, PCT has more options for data formats and security algorithms.

2. The latest version of TLS is _____
a) version 1.1
b) version 1.2
c) version 2.1
d) version 1.3
View Answer

Answer: b
Explanation: The latest standard version of TLS is version 1.2. Version 1.3 is still in the development stage.

3. SIP is abbreviated as __________
a) Session Initiation Protocol
b) Secured Initiation Protocol
c) Secure Initiation Protocol
d) Session Integration Protocol
View Answer

Answer: a
Explanation: Session Initiation Protocol is an important protocol used for starting, preserving and terminating any real time sessions over the internet.

4. In which of the following cases Session Initiation Protocol is not used?
a) Instant Messaging
b) Voice over LTE (VoLTE)
c) Internet telephony
d) Data Transferring
View Answer

Answer: d
Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice, video as well as messaging applications for controlling multimedia communication sessions.

5. SRTP is abbreviated as ________
a) Secure Relay Transport Protocol
b) Secure Real-time Transferring Protocol
c) Secure Real-time Transport Protocol
d) Secure Real-time Transportation Protocol
View Answer

Answer: c
Explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with encryption for message integrity and authentication. It is used mostly in entertainment systems and streaming media and sites.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. ESP is abbreviated as ____________
a) Encapsulating Security Payload
b) Encapsulating Secure Protocol
c) Encrypted Secure Payload
d) Encapsulating Secure Payload
View Answer

Answer: d
Explanation: Encapsulating Secure Payload is a special type of protocol used for offering integrity, authentication, and confidentiality to network packets’ data in IPSec (Secure Internet Protocol).

7. ________ is the entity for issuing digital certificates.
a) Certificate Authority (CA)
b) Cert Authority (CA)
c) Cert Authorization (CA)
d) Certificate Authorization (CA)
View Answer

Answer: a
Explanation: Digital certificates are used for certifying the ownership of a public key and the entity who issue those certificates is the Certificate Authority.

8. IKE is abbreviated as Internet Key Exchange.
a) True
b) False
View Answer

Answer: a
Explanation: Internet Key Exchange is a security protocol used for setting up a security association in the Secure IP protocol. IKE = Key Management Protocol (KMP) + Security Association (SA).

Sanfoundry Global Education & Learning Series – Cyber Security.


To practice all areas of Cyber Security for Freshers, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.