Question
a.
IP/IPSec
b.
SSL
c.
Kerberos
d.
S/MIME
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In the below figure, which of the above shaded block is transparent to end users and applications?
Similar Questions
Discover Related MCQs
Q. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
View solution
Q. Which one of the following is not a higher –layer SSL protocol?
View solution
Q. Which one of the following is not a session state parameter?
View solution
Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
View solution
Q. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
View solution
Q. The full form of SSL is
View solution
Q. After the encryption stage in SSL, the maximum length of each fragment is
View solution
Q. Consider the following example –
Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.
How many bytes of padding need to be added to the system?
View solution
Q. Which protocol is used to convey SSL related alerts to the peer entity?
View solution
Q. Which protocol consists of only 1 bit?
View solution
Q. Which protocol is used for the purpose of copying the pending state into the current state?
View solution
Q. Which of the following are possible sizes of MACs?
i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes
View solution
Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
View solution
Q. Number of phases in the handshaking protocol?
View solution
Q. In the SSL record protocol operation pad_2 is –
View solution
Q. In the SSL record protocol operation pad_1 is –
View solution
Q. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
View solution
Q. Which is the key exchange algorithm used in CipherSuite parameter?
View solution
Q. he certificate message is required for any agreed-on key exchange method except _______________
View solution
Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!