Question On Network Security And Asked
Who should Practice these Network Security Based Quiz?
- Anyone wishing to sharpen their knowledge.
- Anyone preparing for aptitude test.
- Anyone preparing for interview.
In these quiz we Covers Following Topics:
- TCP/IP and Communication Networks
- Internet Protocol, Network Addressing and Transport Level Security
- Wireless Network Security and Network Security Overview
What you’ll learn
- Able to Solve Multiple Choice Questions on Network Security
- Students will develop a strong confidence on topic "Network Security"
Are there any course requirements or prerequisites?
- Basic knowledge of Computer Network
- Basic Knowledge of Electronics
Who this course is for:
- Students who want to Learn About "Network Security"
If the first address is First address = 18.14.12.0/22. What is the last address?
A. 18.14.15.255/22
B. 18.14.15.32/22
C. 18.14.25.64/22
D. 18.14.15.128/22
Eplanation
The Correct Answer is A .
Last address = (any address) OR [NOT (network mask)].
The Last Address = 18.14.15.255/22.
A packet has arrived in which the offset value is 100. What is the number of the first byte?
A. 780
B. 400
C. 200
D. 800
Eplanation
The Correct Answer is D .
TTL = 01, the packet can travel only one hop.
The number of the first byte is 100 x 8 = 800.
The first byte number is 800.
The full form of SSL is
A. Secure Socket Layer
B. Series Socket Layer
C. Serial Session Layer
D. Session Secure Layer
Eplanation
The Correct Answer is A .
SSL stands for Secure Sockets Layer.
Which protocol consists of only 1 bit?
A. Upper-Layer Protocol
B. Alert Protocol
C. Change Cipher Spec Protocol
D. Handshake Protocol
Eplanation
The Correct Answer is C .
The change cipher spec protocol is bit long.
The secure authentication connection is referred to as-
A. handshaking
B. tunnel
C. zeroing
D. chisel
Eplanation
The Correct Answer is B .
The secure connection is referred to as tunnel.
Classless Addressing overcomes the problem of –
A. all of the mentioned
B. address extraction
C. address completion
D. address depletion
Eplanation
The Correct Answer is D .
Classless Addressing overcomes the problem of address depletion.
Which is the lowest level in the SSH protocol stack?
A. SSH Transport Layer Protocol
B. IP
C. TCP
D. SSH User Authentication Protocol
Eplanation
The Correct Answer is B .
The IP is the lowest level in SSH the protocol stack.
Percent of addresses occupied by Class D?
A. 6.25%
B. 50%
C. 25%
D. 12.50%
Eplanation
The Correct Answer is A .
Class D has 2^28 addresses in total.
A packet has arrived in which the offset value is 100, the value of HLEN is 5 and the value of the total length field is 100. What is the number of the first byte?
A. 880
B. 780
C. 800
D. 400
Eplanation
The Correct Answer is C .
Total data bytes = total length – header length = 80 bytes in this datagram.
First byte is 800.
CIDR stands for :
A. Class In Domain Range
B. Classless Inter Domain Routing
C. Classless In Domain Range
D. Non of the mentioned
Eplanation
The Correct Answer is B .
CIDR stands for Classless Inter Domain Routing.
What is the size of the Host ID in Class C?
A. 16 bits
B. 24 bits
C. 8 bits
D. 14 bits
Eplanation
The Correct Answer is C .
The size of the Host ID in Class C is 8 bits.
Convert the following binary notation to dotted-decimal notation –
10000001 00001011 00001011 11101111
A. 129.11.11.239
B. 129.12.1.231
C. 128.11.12.231
D. 127.11.13.244
Eplanation
The Correct Answer is A .
Converting the binary value to their respective decimal values yields 129.11.11.239.
What is the error (if any) in the following representation – 75.45.301.14?
A. There should be no leading zeros
B. Each byte should be less than or equal to 255
C. No error
D. We cannot have more than 4 bytes in an IPv4 address
Eplanation
The Correct Answer is B .
An IP packet has arrived with the first 8 bits as 01000010. What is the header length?
A. 12
B. 16
C. 8
D. 4
Eplanation
The Correct Answer is C .
The right 4-bits multiplied by 4 is the header length (0010=2).
Which key exchange technique is not supported by SSLv3?
A. Anonymous Diffie-Hellman
B. Fortezza
C. RSA
D. Fixed Diffie-Hellman
Eplanation
The Correct Answer is B .
Fortezza is not supported in SSLv3.
Which of the following does not have a Net ID and Host ID?
A. Class C
B. Class D
C. Class A
D. Class B
Eplanation
The Correct Answer is B .
Class D is the multicast address class. It does not have Net ID and Host ID fields.
What is the error (if any) in the following representation – 11100010.23.14.67?
A. Each byte should be less than or equal to 255
B. We cannot have more than 4 bytes in an IPv4 address
C. None of the mentioned
D. There should be no leading zeros
Eplanation
The Correct Answer is C .
The error is that there is a mixture of binary and dotted-decimal notation.
A classless address is given as 167.199.170.82/27. Find the number of addresses.
A. 16
B. 128
C. 32
D. 64
Eplanation
The Correct Answer is C .
n =27
Therefore number of addresses is 2^(32-n) = 32.
An organization is granted the block 130.34.12.64/26. What is the last address of the network?
A. 130.34.12.128/28
B. 130.34.12.63/26
C. 130.34.12.64/26
D. 130.34.12.127/26
Eplanation
The Correct Answer is D .
Last address = 130.34.12.127/26.
This can be found via: Last address = (any address) OR [NOT (network mask)].
Which of the following is not a secure shell protocol?
A. Secure Layer Protocol
B. Transport Layer Protocol
C. Connection Protocol
D. User Authentication Protocol
Eplanation
The Correct Answer is A .
SSH is organised as three protocols – Transport Layer Protocol, User Authentication Protocol and Connection Protocol.
Which protocol is used to convey SSL related alerts to the peer entity?
A. Upper-Layer Protocol
B. Alert Protocol
C. Change Cipher Spec Protocol
D. Handshake Protocol
Eplanation
The Correct Answer is B .
The Alert protocol is used to convey SSL related alerts to the peer entity.
The slash notation in classless addressing is referred to as –
A. NIFT
B. CIDR
C. PITF
D. TRS
Eplanation
The Correct Answer is B .
It is referred to as CIDR.
A packet has arrived in which the offset value is 100, the value of HLEN is 5 and the value of the total length field is 100. What is the number of the last byte
A. 880
B. 801
C. 879
D. 881
Eplanation
The Correct Answer is C .
Total data bytes = total length – header length = 80 bytes in this datagram.
Last byte is therefore 879.
In the SSLv3 the padding bits are ____________ with the secret key.
A. Concatenated
B. ANDed
C. Padded
D. XORed
Eplanation
The Correct Answer is A .
The padding bits are concatenated with the secret key.
An IP packet has arrived with the first 8 bits as 01000010. What is the version?
A. 5
B. 3
C. 6
D. 4
Eplanation
The Correct Answer is D .
The first 4-bits show the version i.e. 0100 -> version 4.
Which Class is reserved for future use?
A. None of the mentioned
B. C
C. A
D. B
Eplanation
The Correct Answer is A .
Class E is reserved for future use.
Which of the following are valid authentication methods?
A. all of the mentioned
B. Public Key Based
C. Host Based
D. Password Based
Eplanation
The Correct Answer is A .
The server may require one or more of the three authentication methods mentioned above.
What is the recommended modes of operation for encryption and decryption in the Secure Shell Transport Layer?
A. CFB
B. CBC
C. OFB
D. ECB
Eplanation
The Correct Answer is B .
The cipher block chaining mode is the recommended mode of operation in the SSH Transport layer.
An organization is granted the block 130.34.12.64/26. The organization needs four subnetworks, each with an equal number of hosts. What is the number of addresses to each subnetwork?
A. 16
B. 4
C. 32
D. 8
Eplanation
The Correct Answer is A .
N = 2^(32-36) = 64.
Nsub= N/No. of subnetworks = 64/4 = 16.
URL stands for :
A. Uniform Resource Locator
B. Uniform Resource Language
C. Universal Resource Language
D. Universal Remote Locator
Eplanation
The Correct Answer is A .
URL stands for Uniform Resource Locator.