A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

1. In the below figure from left to right, the correct order of the shaded levels are
a. Network level, Application level, Transport level
b. Application level, Network level, Transport level
c. Transport level, Application level, Network level
d. Network level, Transport level, Application level
View Answer Report Discuss Too Difficult!
Answer: (d).Network level, Transport level, Application level

2. In the below figure, which of the above shaded block is transparent to end users and applications?
a. IP/IPSec
b. SSL
c. Kerberos
d. S/MIME
View Answer Report Discuss Too Difficult!
Answer: (a).IP/IPSec

3. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
a. True
b. False
c. May be
d. Can't say
View Answer Report Discuss Too Difficult!
Answer: (b).False

4. Which one of the following is not a higher –layer SSL protocol?
a. Alert Protocol
b. Handshake Protocol
c. Alarm Protocol
d. Change Cipher Spec Protocol
View Answer Report Discuss Too Difficult!
Answer: (c).Alarm Protocol

5. Which one of the following is not a session state parameter?
a. Master Secret
b. Cipher Spec
c. Peer Certificate
d. Server Write Key
View Answer Report Discuss Too Difficult!
Answer: (d).Server Write Key

6. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
a. 2^16
b. 2^32
c. 2^14
d. 2^12
View Answer Report Discuss Too Difficult!
Answer: (c).2^14

7. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
a. NANDed, XORed
b. Concatenated, XORed
c. XORed, NANDed
d. XORed, Concatenated
View Answer Report Discuss Too Difficult!
Answer: (b).Concatenated, XORed

8. The full form of SSL is
a. Serial Session Layer
b. Secure Socket Layer
c. Session Secure Layer
d. Series Socket Layer
View Answer Report Discuss Too Difficult!
Answer: (b).Secure Socket Layer

9. After the encryption stage in SSL, the maximum length of each fragment is
a. 2^14+1028
b. 2^14+2048
c. 2^16+1028
d. 2^16+2048
View Answer Report Discuss Too Difficult!
Answer: (b).2^14+2048

10. Consider the following example –

Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.

How many bytes of padding need to be added to the system?
a. 1
b. 2
c. 3
d. 4
View Answer Report Discuss Too Difficult!
Answer: (c).3

Page 1 of 12