Network Security Questions and Answers – Secure Socket Layer – I

This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on “Secure Socket Layer”.

The shaded levels are Network level Transport level & Application level

1. In the above figure from left to right, the correct order of the shaded levels are
a) Network level, Application level, Transport level
b) Application level, Network level, Transport level
c) Transport level, Application level, Network level
d) Network level, Transport level, Application level
View Answer

Answer: d
Explanation: IP/IPSec is the Network level, SSL or TLS is the Transport Level, Kerberos and S/MIME are the Application level.

2. In the above figure, which of the above shaded block is transparent to end users and applications?
a) IP/IPSec
b) SSL
c) Kerberos
d) S/MIME
View Answer

Answer: a
Explanation: IP/IPSec is the Network layer which is transparent to end users and applications.
advertisement
advertisement

3. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
a) True
b) False
View Answer

Answer: b
Explanation: Passive attacks include eavesdropping on network traffic between browser and server and gaining access to information on a website that is supposed to be restricted. Active attacks include impersonating another user, altering messages in transit between client and server, altering information on a website.

4. Which one of the following is not a higher –layer SSL protocol?
a) Alert Protocol
b) Handshake Protocol
c) Alarm Protocol
d) Change Cipher Spec Protocol
View Answer

Answer: c
Explanation: Three higher –layer protocols are defined as part of SSL: The Handshake Protocol, The Change Cipher Spec Protocol and The Alert Protocol.

5. Which one of the following is not a session state parameter?
a) Master Secret
b) Cipher Spec
c) Peer Certificate
d) Server Write Key
View Answer

Answer: d
Explanation: Session state is defined by the following parameters – Session identifier, Peer certificate, Compression method, Cipher spec, Master secret, Is resumable. Server Write Key falls under Connection State.

6. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
a) 216
b) 232
c) 214
d) 212
View Answer

Answer: c
Explanation: In the fragmentation process we obtain blocks of 2^14 bytes which is compressed in the next step.
advertisement

7. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
a) NANDed, XORed
b) Concatenated, XORed
c) XORed, NANDed
d) XORed, Concatenated
View Answer

Answer: b
Explanation: The pads are concatenated in SSLv3 and XORed in HMAC algorithm.

8. The full form of SSL is
a) Serial Session Layer
b) Secure Socket Layer
c) Session Secure Layer
d) Series Socket Layer
View Answer

Answer: b
Explanation: SSL stands for Secure Sockets Layer.
advertisement

9. After the encryption stage in SSL, the maximum length of each fragment is
a) 214+1028
b) 214+2048
c) 216+1028
d) 216+2048
View Answer

Answer: b
Explanation: Encryption may not increase the content length by more than 1024 bytes, so the total length may not exceed 214+2048.

10. Consider the following example –
Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.
How many bytes of padding need to be added to the system?
a) 1
b) 2
c) 3
d) 4
View Answer

Answer: c
Explanation: 48 + 20 = 68 bytes. 72 is the next multiple of 8 (Block Length). 72 – 68 = 4. But we need to compensate 1 byte for length of the padding. Therefore, we require only 3 Bytes padding.

11. Which protocol is used to convey SSL related alerts to the peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
View Answer

Answer: a
Explanation: The Alert protocol is used to convey SSL related alerts to the peer entity.

12. Which protocol consists of only 1 bit?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
View Answer

Answer: d
Explanation: The change cipher spec protocol is bit long.

13. Which protocol is used for the purpose of copying the pending state into the current state?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
View Answer

Answer: d
Explanation: The Change Cipher Spec Protocol is used for this action.

14. Which of the following are possible sizes of MACs?
i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes

a) i and iii
b) ii only
c) ii and iii
d) ii iii and iv
View Answer

Answer: c
Explanation: MACs can be 0, 16 or 20 Bytes.

15. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
a) Select, Alarm
b) Alert, Alarm
c) Warning, Alarm
d) Warning, Fatal
View Answer

Answer: d
Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.