Question
a.
Master Secret
b.
Cipher Spec
c.
Peer Certificate
d.
Server Write Key
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which one of the following is not a session state parameter?
Similar Questions
Discover Related MCQs
Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
View solution
Q. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
View solution
Q. The full form of SSL is
View solution
Q. After the encryption stage in SSL, the maximum length of each fragment is
View solution
Q. Consider the following example –
Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.
How many bytes of padding need to be added to the system?
View solution
Q. Which protocol is used to convey SSL related alerts to the peer entity?
View solution
Q. Which protocol consists of only 1 bit?
View solution
Q. Which protocol is used for the purpose of copying the pending state into the current state?
View solution
Q. Which of the following are possible sizes of MACs?
i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes
View solution
Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
View solution
Q. Number of phases in the handshaking protocol?
View solution
Q. In the SSL record protocol operation pad_2 is –
View solution
Q. In the SSL record protocol operation pad_1 is –
View solution
Q. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
View solution
Q. Which is the key exchange algorithm used in CipherSuite parameter?
View solution
Q. he certificate message is required for any agreed-on key exchange method except _______________
View solution
Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
View solution
Q. The DSS signature uses which hash algorithm?
View solution
Q. The RSA signature uses which hash algorithm?
View solution
Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!