adplus-dvertising
frame-decoration

Question

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

a.

True

b.

False

c.

May be

d.

Can't say

Answer: (b).False

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

Similar Questions

Discover Related MCQs

Q. Which one of the following is not a higher –layer SSL protocol?

Q. Which one of the following is not a session state parameter?

Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

Q. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.

Q. The full form of SSL is

Q. After the encryption stage in SSL, the maximum length of each fragment is

Q. Consider the following example –

Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.

How many bytes of padding need to be added to the system?

Q. Which protocol is used to convey SSL related alerts to the peer entity?

Q. Which protocol consists of only 1 bit?

Q. Which protocol is used for the purpose of copying the pending state into the current state?

Q. Which of the following are possible sizes of MACs?

i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes

Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

Q. Number of phases in the handshaking protocol?

Q. In the SSL record protocol operation pad_2 is –

Q. In the SSL record protocol operation pad_1 is –

Q. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

Q. Which is the key exchange algorithm used in CipherSuite parameter?

Q. he certificate message is required for any agreed-on key exchange method except _______________

Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

Q. The DSS signature uses which hash algorithm?