Network Security Questions and Answers – Overview – III

This set of tough Network Security questions and answers focuses on “Overview – III”.

1. On which port will the server generally listen to for SMTP?
a) port 35
b) port 63
c) port 25
d) port 65
View Answer

Answer: c
Explanation: The server would have to listen on port 25 for the simple mail transfer protocol.

2. In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.
a) Select, Alarm
b) Alert, Alarm
c) Warning, Alarm
d) Warning, Fatal
View Answer

Answer: d
Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.

3. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
a) True
b) False
View Answer

Answer: b
Explanation: Passive attacks include eavesdropping on network traffic between browser and server and gaining access to information on a website that is supposed to be restricted. Active attacks include impersonating another user, altering messages in transit between client and server, altering information on a website.
advertisement
advertisement

4. In the SSL record protocol operation pad_1 is :
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 40 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
View Answer

Answer: d
Explanation: pad_1 = is the byte 0x36 repeated 48 times for MD5.

5. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
a) Fortezza
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
View Answer

Answer: c
Explanation: The Fixed Diffie-Helmann does not require the server_key_exchange step in the handshake protocol.

6. Which key exchange technique is not supported by SSLv3?
a) Anonymous Diffie-Hellman
b) Fixed Diffie-Hellman
c) RSA
d) Fortezza
View Answer

Answer: d
Explanation: Fortezza is not supported in SSLv3.

7. An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.
a) 40; 80
b) 60; 620
c) 80; 443
d) 620; 80
View Answer

Answer: c
Explanation: HTTP uses 80 ports, whereas HTTPS uses 443 ports.
advertisement

8. SSID stands for
a) Secure Service Identifier
b) Secure Set Independent Device
c) Secure Set Identifier
d) Service Set Independent Device
View Answer

Answer: c
Explanation: SSID stands for Secure Set Identifier.

9. “When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges.” Which type of Wireless network threat would you classify this under?
a) Identity Theft
b) Man in the middle attack
c) Network Injection
d) Accidental Association
View Answer

Answer: a
Explanation: This threat falls under Identity Theft.
advertisement

10. Loopback address is given by:
a) 0.0.0.0
b) 127.x.x.x
c) 255.255.255.255
d) None of the mentioned
View Answer

Answer: b
Explanation: Loopback address is given by 127.x.x.x.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice tough questions on all areas of Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.