Cyber Security Questions and Answers – Security Protocols – 1

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Security Protocols – 1”.

1. ___________ ensures the integrity and security of data that are passing over a network.
a) Firewall
b) Antivirus
c) Pentesting Tools
d) Network-security protocols
View Answer

Answer: d
Explanation: The methods and processes in securing network data from unauthorized content extraction are controlled by network-security protocols.

2. Which of the following is not a strong security protocol?
a) HTTPS
b) SSL
c) SMTP
d) SFTP
View Answer

Answer: c
Explanation: SMTP (is abbreviated as Simple Mail Transfer Protocol) is a standard protocol to transmit electronic mail and is a widely used mail transmitting protocol.

3. Which of the following is not a secured mail transferring methodology?
a) POP3
b) SSMTP
c) Mail using PGP
d) S/MIME
View Answer

Answer: a
Explanation: POP (Post Office Protocol) is a simple protocol which fetches the updated mail stored for you by the server. S/MIME (Secure/Multipurpose Internet Mail Extensions), SSMTP (Secure-Simple Mail Transfer Protocol), and PGP (Pretty Good Privacy) are examples of protocols and methods for secure mailing.
advertisement
advertisement

4. __________ is a set of conventions & rules set for communicating two or more devices residing in the same network?
a) Security policies
b) Protocols
c) Wireless network
d) Network algorithms
View Answer

Answer: b
Explanation: Network protocols are designed with mechanisms for identifying devices and make connections between them. In addition, some proper rules are defined as to how data packets will be sent and received.

5. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
a) True
b) False
View Answer

Answer: a
Explanation: TLS which has now become SSL (Secure Socket Layer) is one of the popular cryptographic protocols developed to provide security to computer network while communication.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. HTTPS is abbreviated as _________
a) Hypertexts Transfer Protocol Secured
b) Secured Hyper Text Transfer Protocol
c) Hyperlinked Text Transfer Protocol Secured
d) Hyper Text Transfer Protocol Secure
View Answer

Answer: d
Explanation: Hyper Text Transfer Protocol Secure (HTTPS) is a security protocol which maintains security when data is sent from browser to server and vice versa. It denotes that all communication setup between the browser and the server is encrypted.

7. SSL primarily focuses on _______
a) integrity and authenticity
b) integrity and non-repudiation
c) authenticity and privacy
d) confidentiality and integrity
View Answer

Answer: a
Explanation: SSL primarily focuses on maintaining the integrity of the data. Also, it maintains authenticity which helps the customers feel secure to communicate over the internet.
advertisement

8. In SSL, what is used for authenticating a message?
a) MAC (Message Access Code)
b) MAC (Message Authentication Code)
c) MAC (Machine Authentication Code)
d) MAC (Machine Access Code)
View Answer

Answer: b
Explanation: For authenticating in SSL, a short message known as MAC (Message Authentication Code) is used for authenticating a message; where both the sender & the receiver need to implement the same key in order to start communicating.

9. __________ is used for encrypting data at network level.
a) IPSec
b) HTTPS
c) SMTP
d) S/MIME
View Answer

Answer: a
Explanation: IPSec (Secure Internet Protocol) is used for securing data at the network level by using 3 different protocols. These are Encapsulating Secure Payload (ESP), Authentication Header, and Internet Key Exchange (IKE).
advertisement

10. S/MIME is abbreviated as __________________
a) Secure/Multimedia Internet Mailing Extensions
b) Secure/Multipurpose Internet Mailing Extensions
c) Secure/Multimedia Internet Mail Extensions
d) Secure/Multipurpose Internet Mail Extensions
View Answer

Answer: d
Explanation: Secure/Multipurpose Internet Mail Extensions is the most popular protocol used to send encrypted messages that are digitally signed. In this protocol, the encryption is done with a digital sign in them.

11. Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection.
a) HTTP
b) HTTPS
c) SMTP
d) SFTP
View Answer

Answer: b
Explanation: It is when HTTPS (Hyper Text Transfer Protocol Secure) connection is built an extended validation certificate is installed in the website for security reasons.

12. Why did SSL certificate require in HTTP?
a) For making security weak
b) For making information move faster
c) For encrypted data sent over HTTP protocol
d) For sending and receiving emails unencrypted
View Answer

Answer: c
Explanation: In the case of HTTP connection, data are sent as plain-text, which is easily readable by hackers, especially when it is credit card details and personal information. But with the incorporation of SSL certificate, communication becomes secure and data sent and received are encrypted.

13. SFTP is abbreviated as ________
a) Secure File Transfer Protocol
b) Secured File Transfer Protocol
c) Secure Folder Transfer Protocol
d) Secure File Transferring Protocol
View Answer

Answer: a
Explanation: It is a secured FTP, where communication is made secured using SSH (Secure Shell) which helps in secure transferring of files in both local as well as remote systems.

14. PCT is abbreviated as ________
a) Private Connecting Technology
b) Personal Communication Technology
c) Private Communication Technique
d) Private Communication Technology
View Answer

Answer: d
Explanation: Private Communication Technology (PCT) is similar to SSL except that the size of the message is smaller in the case of PCT. It supports different encryption algorithms like DES, RSA, Diffie-Hellman etc.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.