Q:
Which is the key exchange algorithm used in CipherSuite parameter?
belongs to collection: CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ
CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ
- In the below figure from left to right, the correct order of the shaded levels are
- In the below figure, which of the above shaded block is transparent to end users and applications?
- In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack
- Which one of the following is not a higher –layer SSL protocol?
- Which one of the following is not a session state parameter?
- In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes
- The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC
- The full form of SSL is
- After the encryption stage in SSL, the maximum length of each fragment is
- Consider the following example
- Which protocol is used to convey SSL related alerts to the peer entity?
- Which protocol consists of only 1 bit?
- Which protocol is used for the purpose of copying the pending state into the current state?
- Which of the following are possible sizes of MACs?
- In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively
- Number of phases in the handshaking protocol?
- In the SSL record protocol operation pad_2 is –
- In the SSL record protocol operation pad_1 is –
- In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
- Which is the key exchange algorithm used in CipherSuite parameter?
- he certificate message is required for any agreed-on key exchange method except _______________
- In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
- The DSS signature uses which hash algorithm?
- The RSA signature uses which hash algorithm?
- What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
- The certificate_request massage includes two parameters, one of which is-
- The client_key_exchange message uses a pre master key of size –
- In the handshake protocol which is the message type first sent between client and server ?
- In the SSLv3 the padding bits are ____________ with the secret key
- Which of the following is not a valid input to the PRF in SSLv3?
- Which of the following alert codes is not supported by SSLv3?
- We encounter the record_overflow error when the payload length exceeds –
- Which key exchange technique is not supported by SSLv3?
- Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string-
- In TLS padding cann be upto a maximum of –
- URL stands for –
- HTTPS stands for Hypertext Transfer Protocol over TLS
- An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL
- Which of the following is not a secure shell protocol?
- Which is the lowest level in the SSH protocol stack?
- How many trust models does the RFC 4251 dictate?
- Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
- The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –
- Size of the sequence number is-
- Which one of the following does not undergo the encryption procedure?
- What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?
- What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer?
- What is the recommended MAC algorithm for the SSH Transport Layer?
- The session Identifier remains constant throughout the SSH connection
- In the Key generation procedure, the Initialization Vector from the server to client is represented as:
- Which port forwarding technique intercepts application-level traffic and redirects it from an insecure TCP connections to secure SSH tunnels?
- The protocol ‘POP’ stands for-
- In which port forwarding technique does the client act on the server’s behalf?
- In the Key generation procedure, the Integrity Key from the client to server is represented as:
- In the Key generation procedure, the Integrity Key from the server to client is represented as:
- In the Key generation procedure, the Encryption key from the server to client is represented as:
- In the User Authentication Protocol, when the client requests for authentication, then the first byte ( in this format) has decimal value –
- SSH_MSG_USERAUTH_FALIURE is represented by byte-
- SH_MSG_USERAUTH_SUCCESS is represented by the byte –
- Which of the following are valid authentication methods?
- The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use
- The secure authentication connection is referred to as-
- The Secure Shell Connection Protocol Message exchange has the fist phase as “Opening a Channel” and it sends a message with parameters-
- In the “Opening a channel” phase what is the function of the “innitial window size” parameter?
- In the “Opening a channel” phase what is the function of the “maximum packet size” parameter?
- Which is not a channel recognized by the SSH connection protocol?
- Which channel ensures local port forwarding?
- On which port will the server generally listen to for SMTP?
- Confidentiality with asymmetric-key cryptosystem has its own
- SHA-l has a message digest of
- Message authentication is a service beyond
- In Message Confidentiality, the transmitted message must make sense to only intended
- A hash function guarantees the integrity of a message. It guarantees that the message has not be
- To check the integrity of a message, or document, the receiver creates the
- A digital signature needs a
- One way to preserve the integrity of a document is through the use of a
- A session symmetric key between two parties is used
- Encryption and decryption provide secrecy, or confidentiality, but not
- MAC stands for
- The digest created by a hash function is normally called a
- Message confidentiality is using
- A sender must not be able to deny sending a message that was sent, is known as
- To preserve the integrity of a document, both the document and the fingerprint are
- When the data must arrive at the receiver exactly as they were sent, its called
- The message digest needs to be
- In Message Integrity, the message digest needs to be kept
- In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
- The Message confidentiality or privacy means that the sender and the receiver expect
- The message must be encrypted at the sender site and decrypted at the
- The field that covers a variety of computer networks, both public and private, that are used in everyday jobs
- Network Security provides authentication and access control for resources
- Which is not an objective of network security?
- Which of these is a part of network identification?
- The process of verifying the identity of a user
- A concern of authentication that deals with user rights
- CHAP stands for?
- Security features that control that can access resources in the OS
- An algorithm in encryption is called _____________
- The information that gets transformed in encryption is ____________
- If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________
- An attack on a website that stores and displays text to a user is known as ______ attack
- The URL of the page that had the link that the user clicked to access the page is called as _____
- State true or false: Password leakage is a major security problem
- The system where two independent pieces of data are used to identify a user is called as ______
- What are man in the middle attacks?
- What are phishing attacks?
- What is the standard for exchanging authentication and authorization information between two different security domains?
- A log of all changes to the application data is called as __________
- Which of the following is a valid encryption technique?
- In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker
- A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack
- _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated
- Many applications use _________________, where two independent factors are used to identify a user
- Even with two-factor authentication, users may still be vulnerable to_____________attacks
- A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication
- The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on
- The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years
- _______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation
- VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism
(d).Any of the mentioned
need an explanation for this answer? contact us directly to get an explanation for this answer