Tough Network Security
Tough Network Security Subcategories
Tough Network Security
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

A. True
B. False
C.
D.

Explanation: Passive attacks include eavesdropping on network traffic between browser and server and gaining access to information on a website that is supposed to be restricted. Active attacks include impersonating another user, altering messages in transit between client and server, altering information on a website.

In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

A. Fortezza
B. Anonymous diffie-hellman
C. Fixed diffie-hellman
D. Rsa

Explanation: The Fixed Diffie-Helmann does not require the server_key_exchange step in the handshake protocol.

Which key exchange technique is not supported by SSLv3?

A. Anonymous diffie-hellman
B. Fixed diffie-hellman
C. Rsa
D. Fortezza

Explanation: Fortezza is not supported in SSLv3.

In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.

A. Select, alarm
B. Alert, alarm
C. Warning, alarm
D. Warning, fatal

Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.

In the SSL record protocol operation pad_1 is :

A. Is the byte 0x36 repeated 40 times for md5
B. Is the byte 0x5c repeated 40 times for md5
C. Is the byte 0x5c repeated 48 times for sha-1
D. Is the byte 0x36 repeated 48 times for md5

Explanation: pad_1 = is the byte 0x36 repeated 48 times for MD5.

An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.

A. 40; 80
B. 60; 620
C. 80; 443
D. 620; 80

Explanation: HTTP uses 80 ports, whereas HTTPS uses 443 ports.

SSID stands for

A. Secure service identifier
B. Secure set independent device
C. Secure set identifier
D. Service set independent device

Explanation: SSID stands for Secure Set Identifier.

Loopback address is given by:

A. 0.0.0.0
B. 127.x.x.x
C. 255.255.255.255
D. None of the mentioned

Explanation: Loopback address is given by 127.x.x.x.

What is the size of the Temporal Key for the case of TKIP?

A. 64 bits
B. 128 bits
C. 256 bits
D. 512 bits

Explanation: In the case of TKIP -256 bits and CCMP – 128 bits.