This set of tough Network Security questions and answers focuses on “Overview – III”.
1. On which port will the server generally listen to for SMTP?
a) port 35
b) port 63
c) port 25
d) port 65
View Answer
Explanation: The server would have to listen on port 25 for the simple mail transfer protocol.
2. In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.
a) Select, Alarm
b) Alert, Alarm
c) Warning, Alarm
d) Warning, Fatal
View Answer
Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.
3. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
a) True
b) False
View Answer
Explanation: Passive attacks include eavesdropping on network traffic between browser and server and gaining access to information on a website that is supposed to be restricted. Active attacks include impersonating another user, altering messages in transit between client and server, altering information on a website.
4. In the SSL record protocol operation pad_1 is :
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 40 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
View Answer
Explanation: pad_1 = is the byte 0x36 repeated 48 times for MD5.
5. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
a) Fortezza
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
View Answer
Explanation: The Fixed Diffie-Helmann does not require the server_key_exchange step in the handshake protocol.
6. Which key exchange technique is not supported by SSLv3?
a) Anonymous Diffie-Hellman
b) Fixed Diffie-Hellman
c) RSA
d) Fortezza
View Answer
Explanation: Fortezza is not supported in SSLv3.
7. An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.
a) 40; 80
b) 60; 620
c) 80; 443
d) 620; 80
View Answer
Explanation: HTTP uses 80 ports, whereas HTTPS uses 443 ports.
8. SSID stands for
a) Secure Service Identifier
b) Secure Set Independent Device
c) Secure Set Identifier
d) Service Set Independent Device
View Answer
Explanation: SSID stands for Secure Set Identifier.
9. “When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges.” Which type of Wireless network threat would you classify this under?
a) Identity Theft
b) Man in the middle attack
c) Network Injection
d) Accidental Association
View Answer
Explanation: This threat falls under Identity Theft.
10. Loopback address is given by:
a) 0.0.0.0
b) 127.x.x.x
c) 255.255.255.255
d) None of the mentioned
View Answer
Explanation: Loopback address is given by 127.x.x.x.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice tough questions on all areas of Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Practice Computer Science MCQs
- Check Cryptography and Network Security Books
- Check Computer Science Books
- Practice Cyber Security MCQ
- Apply for Computer Science Internship