Network Security Questions and Answers
Network Security Questions and Answers contain set of 28 Network Security MCQs with answers which will help you to clear beginner level quiz.
Question 1
Consider these statements and state which are true.
i) Encoding and encryption change the data format.
ii) Encoding is a reversible process, while encryption is not.
iii) Both Encoding and Encryption are reversible processes.
iv) Any third party will be able to reverse an encoded data,but not an encrypted data.
Select one:
i), iii) and iv)
ii) and iv)
i) and iv)
i), ii) and iv)
Correct answer: i), iii) and iv)
Question 2
Which of the following attacks is not an attack on Integrity?
Select one:
Modification
Replay
Denial Of Service
Masquerading
Correct answer: Denial Of Service
Question 3
I sent a data set {A,B,C,D} to a recipient which got received as {B,A,D,C}.
Select one:
Data security is compromised
Data integrity is lost
Confidentiality is lost
Data availability is compromised
Correct answer: Data integrity is lost
Question 4
A website login mechanim employs both password and verifying a PIN number sent via SMS to registered mobile.
This scenario provides ______
Select one:
High convenience but low security
High convenience and good security
Low convenience and low security
Low convenience but good security
Correct answer: Low convenience but good security
Question 5
A fake email posing as a legitimate email from bank is
Select one:
Attack on Availability
Masquerading attack
Denial of Service (DOS) attack
Attack on Confidentiality
Correct answer: Masquerading attack
Question 6
Which of these mechanims provide data integrity ?
i) DES Encryption
ii) Asymmetric encryption
iii) SHA Hashing
iv) Hashed-MAC
Select one:
i and iv
i and iii
ii and iii
iii and iv
Correct answer: iii and iv
Question 7
Email attachments typically employ
Select one:
Base64 encoding
Base16 encoding
UTF-8 encoding
URL encoding
Correct answer: Base64 encoding
Question 8
The combination of key exchange, hash and encryption algorithms is termed as _______ in SSL/TLS.
Select one:
TLS Handshake
Protocol suite
Cipher suite
TLS Records
Correct answer: Cipher suite
Question 9
The protocol ‘POP’ stands for-
Select one:
Personal Office Protocol
Post Office Protocol
Privacy Overall Protocol
Privacy Over Protocol
Correct answer: Post Office Protocol
Question 10
Which is the most secure way to remote login?
Select one:
SSH with public keys
Telnet with password
SSH with password
Telnet with public keys
Correct answer: SSH with public keys
Question 11
The Application layer protocol required for Electronic Mail is:
Select one:
SMTP
HTTP
FTP
SIP
Correct answer: SMTP
Question 12
Which of these statements regarding HTTP is true.
Select one:
HTTPS adds security to HTTP POST and PUT messages as this is where password exchange is done.
HTTPS uses the same HTTP message format but adds a handshake+encryption mechanism.
HTTPS introduces new messages HANDSHAKE and ALERT for bringing in security in HTTP.
HTTPS does not add security to HTTP GET and HEAD messages
Correct answer: HTTPS uses the same HTTP message format but adds a handshake + encryption mechanism.
Question 13
For SSL which is the advised cryptographic algorithm?
Select one:
- twofish 128
- aes 192
- aes 128
- blowfish
Correct answer: aes 128
Question 14
In SSL handshake, Server Hello message typically contains
Select one:
List of ciphers for the session and extensions list
Selected cipher for the session and random bytes
Selected cipher for the session and public key of server
Random bytes and public key of server
Correct answer: Selected cipher for the session and random bytes
Question 15
Pretty Good Privacy (PGP) is employed in
Select one:
FTP and WWW Security
Email and FTP Security
Email security
Email and WWW Security
Correct answer: Email security
Question 16
What is the common term present in HTTP request and status line?
Select one:
HTTP version number
URL
Method
None of the mentioned
Correct answer: HTTP version number
Question 17
A session symmetric key between two keys is used:
Select one:
Only once
Two times
Multiple times
Dependent on other conditions
Correct answer: Only once
Question 18
Which one of the following is a cryptographic protocol used to secure HTTP connection?
Select one:
Stream Control Transmission Protocol (SCTP)
Pretty Good Privacy (PGP)
Secure Mime(SMIME)
Transport Layer Security (TLS)
Correct answer: Transport Layer Security (TLS)
Question 19
The services provided by application layer are:
Select one:
Network virtual terminal
File transfer, access, and management
Mail service
All of the mentioned
Correct answer: All of the mentioned
Question 20
A group having 30 members uses Symmetric Key Encryption for message transmission. How many secret keys are needed if all the members need to send secret messages to each other?
Select one:
30
60
435
900
Correct answer: 435
Question 21
I – me@gmail.com – tried to email a .jar file to Dinesh. dinesh@company.com . But it got blocked by gmail while attaching.Then I tried sending a .txt file to Dinesh which went through fine. What do you infer? .jar files cannot be sent as
Select one:
A. it is blocked by gmail as .jar files are bigger in size
B. Email uses SMTP which is a Text protocol
C. it is blocked by company.com
D. it is blocked by gmail as it could contain viruses.
Correct answer: it is blocked by gmail as it could contain viruses.
Question 22
What is the protocol used between Message User Agent (MUA) and Message Transfer Agent (MTA) in email system.
Select one:
A. HTTP
B. SMTP
C. IMAP
D. POP3
Correct answer: SMTP
Question 23
IPSec defines these two protocols:
Select one:
A. PGP; ESP
B. AH; ESP
C. AH; SSL
D. PGP: SSL
Correct answer: AH; ESP
Question 24
HTTPS implicitly uses Server certificates. These Server certificates contain ______
Select one:
A. Server’s public key, algorithm used and digital signature
B. Server’s public key and private key
C. Server’s private key, algorithm used and digital signature
D. Server’s public key and digital signature
Correct answer: Server’s public key, algorithm used and digital signature
Question 25
Asymmetric encryption has
Select one:
A. one key for encryption and another key for decryption
B. two keys – one key for public encryption and another for private encryption
C. one public key for doing encryption and decryption and another private key only for decryption
D. only one public key which is shared
Correct answer: one key for encryption and another key for decryption
Question 26
IP Header contains
Select one:
A. Source and destination IP addresses and priority numbers
B. Source and destination IP addresses and IP version number
C. Source and destination IP addresses and Port numbers
D. Source and destination IP addresses and sequence numbers
Correct answer: Source and destination IP addresses and IP version number
Question 27
Pick the most relevant option. I sent a data set {J,K,L,M,N} to a recipient which got received as {J,K,N}.
Select one:
A. Data integrity is lost
B. Data availability is compromised
C. Both Confidentiality and integrity are compromised
D. Data Confidentiality is compromised
Correct answer: Data integrity is lost
Question 28
A data center is secured with 3 outer gates – Og1, Og2, Og3 locked by separate keys – Kog1, Kog2, Kog3 – given to three personnel – P1, P2, P3. These 3 outer gates lead to 2 inner gates – Ig1, Ig2 – which provide main corridor access. The matching keys – Kig1, Kig2 are given to P2 and P4. The order of acessibility from most access to least access for the personnel is ____________
Select one:
A. P2, P1, P3, P4
B. P1, P2, P3, P4
C. P4, P3, P2, P1
D. P2, P4, P1, P3
Correct answer: P2, P1, P3, P4
Question 29
Pick the closest in meaning to non-repudiation. Manu sends data to Naren. Paari is sniffing the data transfer.
Select one:
A. Manu can verify if data reached Naren without any change.
B. Naren can verify if the data got changed by Paari
C. Naren can verify that data was indeed sent by Manu.
D. Paari is unable to get the original data.
Select one:
A. it is blocked by gmail as .jar files are bigger in size
B. Email uses SMTP which is a Text protocol
C. it is blocked by gmail as it could contain viruses.
D. it is blocked by company.com
Correct answer: it is blocked by gmail as it could contain viruses.
Select one:
A. 90
B. 18
C. 19
D. 81
Correct answer: 81
Question 32
The modes of IP-Sec are
Select one:
A. Secure and Unsecure Mode
B. Padding mode and Non-padding mode.
C. SPD and SAD mode
D. Tunnel Mode and Transport Mode
Correct answer: Tunnel Mode and Transport Mode
Question 33
When using HTTPS, a sniffer in a local LAN will be able to
Select one:
A. sniff only the websites/domain but not the URLs
B. sniff only the websties/domain but not the IP addresses
C. sniff only the URLs in the data exchange but not the posted/downloaded data contents.
D. sniff only the HTTP headers in the requests and response
Correct answer: sniff only the websites/domain but not the URLs
Question 34
Pick the statement which is true. A network application
Select one:
A. can use both TCP and UDP at the same time, but only
maximum of 1024 ports.
B. can use both TCP and UDP at the same time
C. can use both TCP and UDP at the same time, but only
maximum of 256 ports.
D. cannot use both TCP and UDP at the same time.
Correct answer: can use both TCP and UDP at the same time
Question 35
Of these, Which is the most secure way to remote login?
Select one:
A. SSH with public keys
B. Telnet with public keys
C. SSH with password
D. Telnet with password
Correct answer: SSH with public keys