Network Security
Which layer in the IEEE 802.11 protocol stack has the function of flow control and error control?

A. Physical layer
B. Logic link control layer
C. Medium access layer
D. None of the mentioned

Explanation: Logic Link Layer has the function of flow control and error control.

In the SSL record protocol operation pad_2 is –

A. Is the byte 0x36 repeated 40 times for md5
B. Is the byte 0x5c repeated 40 times for md5
C. Is the byte 0x5c repeated 48 times for sha-1
D. Is the byte 0x36 repeated 48 times for md5

Explanation: pad_2 = is the byte 0x5C repeated 48 times for MD5.

In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

A. Server_done
B. Server_key_exchange
C. Certificate_request
D. Crtificate_verify

Explanation: The last step of the Phase 2 is the server_done step.

Which is the key exchange algorithm used in CipherSuite parameter?

A. Ephemeral diffie-hellman
B. Anonymous diffie-hellman
C. Fixed diffie-hellman
D. Rsa

Explanation: We can use either of the following for the CipherSuite key exchange- i) RSA ii) Fixed Diffie-Hellman iii) Ephemeral Diffie-Hellman iv) Anonymous Diffie-Hellman v) Fortezza.

The DSS signature uses which hash algorithm?

A. Md5
B. Sha-2
C. Sha-1
D. Does not use hash algorithm

Explanation: The DSS signature uses SHA-1.

The RSA signature uses which hash algorithm?

A. Md5
B. Sha-1
C. Md5 and sha-1
D. None of the mentioned.

Explanation: The MD5 and SHA-1 hash is concatenated together and the then encrypted with the server’s private key.

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 bytes

Explanation: The size is 36 bytes after MD5 and SHA-1 processing.

The certificate_request massage includes two parameters, one of which is-

A. Certificate_extension
B. Certificate_creation
C. Certificate_exchange
D. Certificate_type

Explanation: The certificate_request massage includes two parameters : certificate_type and certificate_authorities.

The client_key_exchange message uses a pre master key of size –

A. 48 bytes
B. 56 bytes
C. 64 bytes
D. 32 bytes

Explanation: The client_key_exchange message uses a pre master key of size 48 bytes.

The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) – CertificateVerify.signature.md5_hash = MD5(master_secret || pad_2 || MD5(handshake_messages || master_secret || pad_1). Is there any error? If so, what is it?

A. Yes. pad_1 and pad_2 should be interchanged
B. Yes. pad’s should be present towards the end
C. Yes. master_key should not be used, the pre_master key should be used
D. No error

Explanation: The code is correct with no errors.