This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on “Secure Socket Layer”.
1. In the above figure from left to right, the correct order of the shaded levels are
a) Network level, Application level, Transport level
b) Application level, Network level, Transport level
c) Transport level, Application level, Network level
d) Network level, Transport level, Application level
View Answer
Explanation: IP/IPSec is the Network level, SSL or TLS is the Transport Level, Kerberos and S/MIME are the Application level.
2. In the above figure, which of the above shaded block is transparent to end users and applications?
a) IP/IPSec
b) SSL
c) Kerberos
d) S/MIME
View Answer
Explanation: IP/IPSec is the Network layer which is transparent to end users and applications.
3. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
a) True
b) False
View Answer
Explanation: Passive attacks include eavesdropping on network traffic between browser and server and gaining access to information on a website that is supposed to be restricted. Active attacks include impersonating another user, altering messages in transit between client and server, altering information on a website.
4. Which one of the following is not a higher –layer SSL protocol?
a) Alert Protocol
b) Handshake Protocol
c) Alarm Protocol
d) Change Cipher Spec Protocol
View Answer
Explanation: Three higher –layer protocols are defined as part of SSL: The Handshake Protocol, The Change Cipher Spec Protocol and The Alert Protocol.
5. Which one of the following is not a session state parameter?
a) Master Secret
b) Cipher Spec
c) Peer Certificate
d) Server Write Key
View Answer
Explanation: Session state is defined by the following parameters – Session identifier, Peer certificate, Compression method, Cipher spec, Master secret, Is resumable. Server Write Key falls under Connection State.
6. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
a) 216
b) 232
c) 214
d) 212
View Answer
Explanation: In the fragmentation process we obtain blocks of 2^14 bytes which is compressed in the next step.
7. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
a) NANDed, XORed
b) Concatenated, XORed
c) XORed, NANDed
d) XORed, Concatenated
View Answer
Explanation: The pads are concatenated in SSLv3 and XORed in HMAC algorithm.
8. The full form of SSL is
a) Serial Session Layer
b) Secure Socket Layer
c) Session Secure Layer
d) Series Socket Layer
View Answer
Explanation: SSL stands for Secure Sockets Layer.
9. After the encryption stage in SSL, the maximum length of each fragment is
a) 214+1028
b) 214+2048
c) 216+1028
d) 216+2048
View Answer
Explanation: Encryption may not increase the content length by more than 1024 bytes, so the total length may not exceed 214+2048.
10. Consider the following example –
Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.
How many bytes of padding need to be added to the system?
a) 1
b) 2
c) 3
d) 4
View Answer
Explanation: 48 + 20 = 68 bytes. 72 is the next multiple of 8 (Block Length). 72 – 68 = 4. But we need to compensate 1 byte for length of the padding. Therefore, we require only 3 Bytes padding.
11. Which protocol is used to convey SSL related alerts to the peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
View Answer
Explanation: The Alert protocol is used to convey SSL related alerts to the peer entity.
12. Which protocol consists of only 1 bit?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
View Answer
Explanation: The change cipher spec protocol is bit long.
13. Which protocol is used for the purpose of copying the pending state into the current state?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
View Answer
Explanation: The Change Cipher Spec Protocol is used for this action.
14. Which of the following are possible sizes of MACs?
i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes
a) i and iii
b) ii only
c) ii and iii
d) ii iii and iv
View Answer
Explanation: MACs can be 0, 16 or 20 Bytes.
15. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
a) Select, Alarm
b) Alert, Alarm
c) Warning, Alarm
d) Warning, Fatal
View Answer
Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]
- Check Cryptography and Network Security Books
- Apply for Computer Science Internship
- Practice Computer Science MCQs
- Practice Cyber Security MCQ
- Check Computer Science Books