Network Security MCQs

Network Security Questions and Answers -MCQ

Network Security questions and answers focuses on all areas of Network Security which will help to clear your doubts and prepare anyone easily towards Cloud Computing interviews, online tests, examinations and certifications.

Question 1

Instead of storing plaintext passwords, AES encrypted passwords are stored in database.

In such a system, Which of these statements is true ?

Select one:
a. even if database admin knows the key, original passwords cannot get revealed.
b. Password Authentication becomes slow
c. Changing passwords will not be possible
d. if database admin knows the key, there is no security

Feedback

The answer is: if database admin knows the key, there is no security

Question 2

Choose the prime number from the given list

Select one:
A. 12411
B. 1206117
C. 39229
D. 930931

Feedback

The answer is: 39229

Question 3

Consider Hashed Message Authentication Code (HMAC) scheme.

Pick which statement is true.

Select one:
A. HMAC output depends on the size of the input message
B. HMAC output size is not fixed
C. HMAC output size is same as the input key size
D. HMAC output size depends on the hashing tool chosen

Feedback

The answer is: HMAC output size depends on the hashing tool chosen

Question 4

Find the modular inverse of a number in mod arithmetic using

Select one:
a. El-Gamal Algorithm
b. Extended Euclidean Algorithm
c. Euclids Algorithm
d. Diffie Hellmann Algorithm

Feedback

The answer is: Extended Euclidean Algorithm

Question 5

I gave two hashes to my friend :

H1 = MD5(my password)

H2 = MD5(reverse of my password)

The next day he was able to tell my password.

What do I infer from this exercise?

Select one:
a. My password did not contain special characters
b. Revealing the reverse hash of the password
is enough to figure out the password
c. MD5 is weak and can be cracked
d. My password was too weak and guessable

Feedback

The answer is: My password was too weak and guessable

Question 6

Which is the generator for modulo base 11 ?

Select one:
A. 1
B. 3
C. 2
D. 5

Feedback

The answer is: 2

Question 7

Pick which statement is true.

Triple DES…

Select one:
A. 128-bit blocks of plain text, 112 bit keys, DES thrice
B. 192-bit blocks of plain text, DES thrice
C. 64-bit blocks of plain text, 56 bit keys, DES thrice
D. 128 bit keys on 64-bit blocks, DES once

Feedback

The answer is: 64-bit blocks of plain text, 56 bit keys, DES thrice

Question 8

Which of these statements is true ?

HTTPS, if SSL certificate is self-signed

Select one:
a. encryption is not done
b. encrpytion is done but trust is lost
c. Only HTTP payload is encrypted
d. encrpytion is done but can be cracked

Feedback

The answer is: encrpytion is done but trust is lost

Question 9

399915 ^ 505021 mod 9 = ?

Select one:
a. 1
b. 3
c. 0
d. 6

Feedback

The answer is: 0

Question 10

Which are these sets are co-primes ?

Set i – 22, 101

Set ii – 23, 345

Set iii – 350, 91

Set iv – 31, 48

Select one:
a. i and iv
b. only iv
c. iv and iii
d. i, ii, and iii

Feedback

The answer is: i and iv

Question 11

DES is no longer a recommended cipher because…

Select one:
A. it produces reflexive keys in pairs which are weak
B. it requires more computing power
C. major flaws were found in the rounds of DES
D. it can be brute forced as it is 56-bit

Feedback

The answer is: it can be brute forced as it is 56-bit

Question 12

Pick which statement is true.

Select one:
a. Both Secure Hash and secure cipher can be reversed, but only in the case of hash the output size is fixed.
b. Secure Hash cannot be reversed, but a secure cipher can be.
c. Both Secure Hash and secure cipher cannot be reversed, but only in the case of hash the output size is fixed.
d. Secure Hash can be reversed, but a secure cipher cannot

Feedback

The answer is: Secure Hash cannot be reversed, but a secure cipher can be.

Question 13

Consider (a ^ n) mod p = 1, and pick which of the following is true.

Select one:
A. If n = p-1, it implies that p is prime.
B. If p is not prime and a and p are co-prime, then n=p-1
C. If p is prime, then n=p-1
D. If and only if p is prime, n = p-1

Feedback

The answer is: If p is not prime and a and p are co-prime, then n=p-1

Question 14

Which of these DNS records are used for SPAM filtering?

Select one:
A. MX and SPF
B. PTR and SPF
C. A, MX and SPF
D. A and MX

Feedback

The answer is: PTR and SPF

Question 15

210031 ^ X mod 19 = 1

Here the matching values for X are

Select one:
a. 6, 9, 18
b. 8, 18, 27
c. 18, 9, 36
d. 6, 12, 18

Feedback

The answer is: 18, 9, 36

Question 16

Why is it not possible to host multiple web domains under

the same IP address in https?

Select one:
a. It is very much possible by using load balancer
b. It is very much possible if https uses SNI option
c. IP addresses are verified in https
d. https mandates IP address tied to SSL certificates

Feedback

The answer is: It is very much possible by using load balancer

Question 17

Which of these statements is true?

Select one:
a. If TLS mode in SMTP is set forwarding will fail
b. Email mandates use of IMAP so that security is enforced
c. SMTP has a mechanism to enable TLS mode to enforce security.
d. IMAP provides security, but is optional in email

Feedback

The answer is: SMTP has a mechanism to enable TLS mode to enforce security.

Question 18

Pick the valid MIME header, when sending an image in email.

Select one:
A. Content-type: image/gif/jpeg/jpg; name=”star.gif”
Content-Disposition: attachment; filename=”star.gif”
B. Content-type: image/gif; name=”star.gif”
Content-Disposition: image; filename=”star.gif”
C. Content-type: image/gif; name=”star.gif”
Content-Disposition: base64; filename=”star.gif”
D. Content-type: image/gif
Content-Disposition: attachment; filename=”star.gif”

Feedback

The answer is: Content-type: image/gif
Content-Disposition: attachment; filename=”star.gif”

Question 19

Which of the following methods relies on prime number factoring for its strength?

Select one:
A. Elliptic Curve
B. RSA
C. El-Gamal
D. DES

Feedback

The answer is: RSA

Question 20

Pick which statement is true.

Elliptic curve -Digital Signature generation…

Select one:
A. encrypts the plaintext and produces a signature
such that the plaintext is confidential.
B. provides data integrity for plaintext
C. is encryption of the plaintext by sender using the
elliptic curve public key of the receiver
D. is encryption of the plaintext by sender using the
elliptic curve private key of the receiver.

Feedback

The answer is: provides data integrity for plaintext