Network Security » Socket Secure Layer I
In the above figure from left to right, the correct order of the shaded levels are

A. Network level, application level, transport level
B. Application level, network level, transport level
C. Transport level, application level, network level
D. Network level, transport level, application level

Explanation: IP/IPSec is the Network level, SSL or TLS is the Transport Level, Kerberos and S/MIME are the Application level.

In the above figure, which of the above shaded block is transparent to end users and applications?

A. Ip/ipsec
B. Ssl
C. Kerberos
D. S/mime

Explanation: IP/IPSec is the Network layer which is transparent to end users and applications.

Which one of the following is not a higher –layer SSL protocol?

A. Alert protocol
B. Handshake protocol
C. Alarm protocol
D. Change cipher spec protocol

Explanation: Three higher –layer protocols are defined as part of SSL: The Handshake Protocol, The Change Cipher Spec Protocol and The Alert Protocol.

Which one of the following is not a session state parameter?

A. Master secret
B. Cipher spec
C. Peer certificate
D. Server write key

Explanation: Session state is defined by the following parameters – Session identifier, Peer certificate, Compression method, Cipher spec, Master secret, Is resumable. Server Write Key falls under Connection State.

In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

A. 216
B. 232
C. 214
D. 212

Explanation: In the fragmentation process we obtain blocks of 2^14 bytes which is compressed in the next step.

The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.

A. Nanded, xored
B. Concatenated, xored
C. Xored, nanded
D. Xored, concatenated

Explanation: The pads are concatenated in SSLv3 and XORed in HMAC algorithm.

The full form of SSL is

A. Serial session layer
B. Secure socket layer
C. Session secure layer
D. Series socket layer

Explanation: SSL stands for Secure Sockets Layer.

After the encryption stage in SSL, the maximum length of each fragment is

A. 214+1028
B. 214+2048
C. 216+1028
D. 216+2048

Explanation: Encryption may not increase the content length by more than 1024 bytes, so the total length may not exceed 214+2048.

Consider the following example – Size of Plaintext – 48 bytes. Size of MAC – 20 bytes. Block Length – 8 bytes. How many bytes of padding need to be added to the system?

A. 1
B. 2
C. 3
D. 4

Explanation: 48 + 20 = 68 bytes. 72 is the next multiple of 8 (Block Length). 72 – 68 = 4. But we need to compensate 1 byte for length of the padding. Therefore, we require only 3 Bytes padding.

Which protocol is used to convey SSL related alerts to the peer entity?

A. Alert protocol
B. Handshake protocol
C. Upper-layer protocol
D. Change cipher spec protocol

Explanation: The Alert protocol is used to convey SSL related alerts to the peer entity.