Q:
What are phishing attacks?
belongs to collection: CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ
CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ
- In the below figure from left to right, the correct order of the shaded levels are
- In the below figure, which of the above shaded block is transparent to end users and applications?
- In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack
- Which one of the following is not a higher –layer SSL protocol?
- Which one of the following is not a session state parameter?
- In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes
- The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC
- The full form of SSL is
- After the encryption stage in SSL, the maximum length of each fragment is
- Consider the following example
- Which protocol is used to convey SSL related alerts to the peer entity?
- Which protocol consists of only 1 bit?
- Which protocol is used for the purpose of copying the pending state into the current state?
- Which of the following are possible sizes of MACs?
- In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively
- Number of phases in the handshaking protocol?
- In the SSL record protocol operation pad_2 is –
- In the SSL record protocol operation pad_1 is –
- In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
- Which is the key exchange algorithm used in CipherSuite parameter?
- he certificate message is required for any agreed-on key exchange method except _______________
- In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
- The DSS signature uses which hash algorithm?
- The RSA signature uses which hash algorithm?
- What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
- The certificate_request massage includes two parameters, one of which is-
- The client_key_exchange message uses a pre master key of size –
- In the handshake protocol which is the message type first sent between client and server ?
- In the SSLv3 the padding bits are ____________ with the secret key
- Which of the following is not a valid input to the PRF in SSLv3?
- Which of the following alert codes is not supported by SSLv3?
- We encounter the record_overflow error when the payload length exceeds –
- Which key exchange technique is not supported by SSLv3?
- Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string-
- In TLS padding cann be upto a maximum of –
- URL stands for –
- HTTPS stands for Hypertext Transfer Protocol over TLS
- An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL
- Which of the following is not a secure shell protocol?
- Which is the lowest level in the SSH protocol stack?
- How many trust models does the RFC 4251 dictate?
- Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
- The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –
- Size of the sequence number is-
- Which one of the following does not undergo the encryption procedure?
- What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?
- What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer?
- What is the recommended MAC algorithm for the SSH Transport Layer?
- The session Identifier remains constant throughout the SSH connection
- In the Key generation procedure, the Initialization Vector from the server to client is represented as:
- Which port forwarding technique intercepts application-level traffic and redirects it from an insecure TCP connections to secure SSH tunnels?
- The protocol ‘POP’ stands for-
- In which port forwarding technique does the client act on the server’s behalf?
- In the Key generation procedure, the Integrity Key from the client to server is represented as:
- In the Key generation procedure, the Integrity Key from the server to client is represented as:
- In the Key generation procedure, the Encryption key from the server to client is represented as:
- In the User Authentication Protocol, when the client requests for authentication, then the first byte ( in this format) has decimal value –
- SSH_MSG_USERAUTH_FALIURE is represented by byte-
- SH_MSG_USERAUTH_SUCCESS is represented by the byte –
- Which of the following are valid authentication methods?
- The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use
- The secure authentication connection is referred to as-
- The Secure Shell Connection Protocol Message exchange has the fist phase as “Opening a Channel” and it sends a message with parameters-
- In the “Opening a channel” phase what is the function of the “innitial window size” parameter?
- In the “Opening a channel” phase what is the function of the “maximum packet size” parameter?
- Which is not a channel recognized by the SSH connection protocol?
- Which channel ensures local port forwarding?
- On which port will the server generally listen to for SMTP?
- Confidentiality with asymmetric-key cryptosystem has its own
- SHA-l has a message digest of
- Message authentication is a service beyond
- In Message Confidentiality, the transmitted message must make sense to only intended
- A hash function guarantees the integrity of a message. It guarantees that the message has not be
- To check the integrity of a message, or document, the receiver creates the
- A digital signature needs a
- One way to preserve the integrity of a document is through the use of a
- A session symmetric key between two parties is used
- Encryption and decryption provide secrecy, or confidentiality, but not
- MAC stands for
- The digest created by a hash function is normally called a
- Message confidentiality is using
- A sender must not be able to deny sending a message that was sent, is known as
- To preserve the integrity of a document, both the document and the fingerprint are
- When the data must arrive at the receiver exactly as they were sent, its called
- The message digest needs to be
- In Message Integrity, the message digest needs to be kept
- In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
- The Message confidentiality or privacy means that the sender and the receiver expect
- The message must be encrypted at the sender site and decrypted at the
- The field that covers a variety of computer networks, both public and private, that are used in everyday jobs
- Network Security provides authentication and access control for resources
- Which is not an objective of network security?
- Which of these is a part of network identification?
- The process of verifying the identity of a user
- A concern of authentication that deals with user rights
- CHAP stands for?
- Security features that control that can access resources in the OS
- An algorithm in encryption is called _____________
- The information that gets transformed in encryption is ____________
- If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________
- An attack on a website that stores and displays text to a user is known as ______ attack
- The URL of the page that had the link that the user clicked to access the page is called as _____
- State true or false: Password leakage is a major security problem
- The system where two independent pieces of data are used to identify a user is called as ______
- What are man in the middle attacks?
- What are phishing attacks?
- What is the standard for exchanging authentication and authorization information between two different security domains?
- A log of all changes to the application data is called as __________
- Which of the following is a valid encryption technique?
- In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker
- A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack
- _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated
- Many applications use _________________, where two independent factors are used to identify a user
- Even with two-factor authentication, users may still be vulnerable to_____________attacks
- A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication
- The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on
- The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years
- _______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation
- VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism

Networks
(c).Users are fooled by similar GUI and data is extracted from them.
need an explanation for this answer? contact us directly to get an explanation for this answer