A. Physical layer
B. Logic link control layer
C. Medium access layer
D. None of the mentioned
Explanation: Logic Link Layer has the function of flow control and error control.
A. Is the byte 0x36 repeated 40 times for md5
B. Is the byte 0x5c repeated 40 times for md5
C. Is the byte 0x5c repeated 48 times for sha-1
D. Is the byte 0x36 repeated 48 times for md5
Explanation: pad_2 = is the byte 0x5C repeated 48 times for MD5.
A. Server_done
B. Server_key_exchange
C. Certificate_request
D. Crtificate_verify
Explanation: The last step of the Phase 2 is the server_done step.
A. Ephemeral diffie-hellman
B. Anonymous diffie-hellman
C. Fixed diffie-hellman
D. Rsa
Explanation: We can use either of the following for the CipherSuite key exchange- i) RSA ii) Fixed Diffie-Hellman iii) Ephemeral Diffie-Hellman iv) Anonymous Diffie-Hellman v) Fortezza.
A. Md5
B. Sha-2
C. Sha-1
D. Does not use hash algorithm
Explanation: The DSS signature uses SHA-1.
A. Md5
B. Sha-1
C. Md5 and sha-1
D. None of the mentioned.
Explanation: The MD5 and SHA-1 hash is concatenated together and the then encrypted with the server’s private key.
A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 bytes
Explanation: The size is 36 bytes after MD5 and SHA-1 processing.
A. Certificate_extension
B. Certificate_creation
C. Certificate_exchange
D. Certificate_type
Explanation: The certificate_request massage includes two parameters : certificate_type and certificate_authorities.
A. 48 bytes
B. 56 bytes
C. 64 bytes
D. 32 bytes
Explanation: The client_key_exchange message uses a pre master key of size 48 bytes.
A. Yes. pad_1 and pad_2 should be interchanged
B. Yes. pad’s should be present towards the end
C. Yes. master_key should not be used, the pre_master key should be used
D. No error
Explanation: The code is correct with no errors.