Network Security Questions and Answers -MCQ
Network Security questions and answers focuses on all areas of Network Security which will help to clear your doubts and prepare anyone easily towards Cloud Computing interviews, online tests, examinations and certifications.
Question 1
Instead of storing plaintext passwords, AES encrypted passwords are stored in database.
In such a system, Which of these statements is true ?
Select one:
a. even if database admin knows the key, original passwords cannot get revealed.
b. Password Authentication becomes slow
c. Changing passwords will not be possible
d. if database admin knows the key, there is no security
Feedback
The answer is: if database admin knows the key, there is no security
Question 2
Choose the prime number from the given list
Select one:
A. 12411
B. 1206117
C. 39229
D. 930931
Feedback
The answer is: 39229
Question 3
Consider Hashed Message Authentication Code (HMAC) scheme.
Pick which statement is true.
Select one:
A. HMAC output depends on the size of the input message
B. HMAC output size is not fixed
C. HMAC output size is same as the input key size
D. HMAC output size depends on the hashing tool chosen
Feedback
The answer is: HMAC output size depends on the hashing tool chosen
Question 4
Find the modular inverse of a number in mod arithmetic using
Select one:
a. El-Gamal Algorithm
b. Extended Euclidean Algorithm
c. Euclids Algorithm
d. Diffie Hellmann Algorithm
Feedback
The answer is: Extended Euclidean Algorithm
Question 5
I gave two hashes to my friend :
H1 = MD5(my password)
H2 = MD5(reverse of my password)
The next day he was able to tell my password.
What do I infer from this exercise?
Select one:
a. My password did not contain special characters
b. Revealing the reverse hash of the password
is enough to figure out the password
c. MD5 is weak and can be cracked
d. My password was too weak and guessable
Feedback
The answer is: My password was too weak and guessable
Question 6
Which is the generator for modulo base 11 ?
Select one:
A. 1
B. 3
C. 2
D. 5
Feedback
The answer is: 2
Question 7
Pick which statement is true.
Triple DES…
Select one:
A. 128-bit blocks of plain text, 112 bit keys, DES thrice
B. 192-bit blocks of plain text, DES thrice
C. 64-bit blocks of plain text, 56 bit keys, DES thrice
D. 128 bit keys on 64-bit blocks, DES once
Feedback
The answer is: 64-bit blocks of plain text, 56 bit keys, DES thrice
Question 8
Which of these statements is true ?
HTTPS, if SSL certificate is self-signed
Select one:
a. encryption is not done
b. encrpytion is done but trust is lost
c. Only HTTP payload is encrypted
d. encrpytion is done but can be cracked
Feedback
The answer is: encrpytion is done but trust is lost
Question 9
399915 ^ 505021 mod 9 = ?
Select one:
a. 1
b. 3
c. 0
d. 6
Feedback
The answer is: 0
Question 10
Which are these sets are co-primes ?
Set i – 22, 101
Set ii – 23, 345
Set iii – 350, 91
Set iv – 31, 48
Select one:
a. i and iv
b. only iv
c. iv and iii
d. i, ii, and iii
Feedback
The answer is: i and iv
Question 11
DES is no longer a recommended cipher because…
Select one:
A. it produces reflexive keys in pairs which are weak
B. it requires more computing power
C. major flaws were found in the rounds of DES
D. it can be brute forced as it is 56-bit
Feedback
The answer is: it can be brute forced as it is 56-bit
Question 12
Pick which statement is true.
Select one:
a. Both Secure Hash and secure cipher can be reversed, but only in the case of hash the output size is fixed.
b. Secure Hash cannot be reversed, but a secure cipher can be.
c. Both Secure Hash and secure cipher cannot be reversed, but only in the case of hash the output size is fixed.
d. Secure Hash can be reversed, but a secure cipher cannot
Feedback
The answer is: Secure Hash cannot be reversed, but a secure cipher can be.
Question 13
Consider (a ^ n) mod p = 1, and pick which of the following is true.
Select one:
A. If n = p-1, it implies that p is prime.
B. If p is not prime and a and p are co-prime, then n=p-1
C. If p is prime, then n=p-1
D. If and only if p is prime, n = p-1
Feedback
The answer is: If p is not prime and a and p are co-prime, then n=p-1
Question 14
Which of these DNS records are used for SPAM filtering?
Select one:
A. MX and SPF
B. PTR and SPF
C. A, MX and SPF
D. A and MX
Feedback
The answer is: PTR and SPF
Question 15
210031 ^ X mod 19 = 1
Here the matching values for X are
Select one:
a. 6, 9, 18
b. 8, 18, 27
c. 18, 9, 36
d. 6, 12, 18
Feedback
The answer is: 18, 9, 36
Question 16
Why is it not possible to host multiple web domains under
the same IP address in https?
Select one:
a. It is very much possible by using load balancer
b. It is very much possible if https uses SNI option
c. IP addresses are verified in https
d. https mandates IP address tied to SSL certificates
Feedback
The answer is: It is very much possible by using load balancer
Question 17
Which of these statements is true?
Select one:
a. If TLS mode in SMTP is set forwarding will fail
b. Email mandates use of IMAP so that security is enforced
c. SMTP has a mechanism to enable TLS mode to enforce security.
d. IMAP provides security, but is optional in email
Feedback
The answer is: SMTP has a mechanism to enable TLS mode to enforce security.
Question 18
Pick the valid MIME header, when sending an image in email.
Select one:
A. Content-type: image/gif/jpeg/jpg; name=”star.gif”
Content-Disposition: attachment; filename=”star.gif”
B. Content-type: image/gif; name=”star.gif”
Content-Disposition: image; filename=”star.gif”
C. Content-type: image/gif; name=”star.gif”
Content-Disposition: base64; filename=”star.gif”
D. Content-type: image/gif
Content-Disposition: attachment; filename=”star.gif”
Feedback
The answer is: Content-type: image/gif
Content-Disposition: attachment; filename=”star.gif”
Question 19
Which of the following methods relies on prime number factoring for its strength?
Select one:
A. Elliptic Curve
B. RSA
C. El-Gamal
D. DES
Feedback
The answer is: RSA
Question 20
Pick which statement is true.
Elliptic curve -Digital Signature generation…
Select one:
A. encrypts the plaintext and produces a signature
such that the plaintext is confidential.
B. provides data integrity for plaintext
C. is encryption of the plaintext by sender using the
elliptic curve public key of the receiver
D. is encryption of the plaintext by sender using the
elliptic curve private key of the receiver.
Feedback
The answer is: provides data integrity for plaintext