Network Security MCQs on “Secure Socket Layer”.
1. Number of phases in the handshaking protocol?
a) 2
b) 3
c) 4
d) 5
Answer: c
Clarification: There are 4 phases in the handshaking protocol. These are –
Phase 1 : Establishing security capabilities
Phase 2 : Server Authentication and Key Exchange
Phase 3 : Client Authentication and Key Exchange
Phase 4 : Finish/ End.
2. In the SSL record protocol operation pad_2 is –
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 48 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
Answer: b
Clarification: pad_2 = is the byte 0x5C repeated 48 times for MD5.
3.In the SSL record protocol operation pad_1 is –
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 40 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
Answer: d
Clarification: pad_1 = is the byte 0x36 repeated 48 times for MD5.
4. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
a) server_done
b) server_key_exchange
c) certificate_request
d) crtificate_verify
Answer: a
Clarification: The last step of the Phase 2 is the server_done step.
5. Which is the key exchange algorithm used in CipherSuite parameter?
a) RSA
b) Fixed Diffie-Hellman
c) Ephemeral Diffie-Hellman
d) Any of the mentioned
Answer: d
Clarification: We can use either of the following for the CipherSuite key exchange-
i) RSA
ii) Fixed Diffie-Hellman
iii) Ephemeral Diffie-Hellman
iv) Anonymous Diffie-Hellman
v) Fortezza.
6.The certificate message is required for any agreed-on key exchange method except _______________
a) Ephemeral Diffie-Hellman
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
Answer: b
Clarification: The certificate message is required for any agreed-on key exchange method except Anonymous Diffie-Hellman.
7. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
a) Fortezza
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
Answer: c
Clarification: The Fixed Diffie-Helmann does not require the server_key_exchange step in the handshake protocol.
8. The DSS signature uses which hash algorithm?
a) MD5
b) SHA-2
c) SHA-1
d) Does not use hash algorithm
Answer: c
Clarification: The DSS signature uses SHA-1.
9. The RSA signature uses which hash algorithm?
a) MD5
b) SHA-1
c) MD5 and SHA-1
d) None of the mentioned.
Answer: c
Clarification: The MD5 and SHA-1 hash is concatenated together and the then encrypted with the server’s private key.
10. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
a) 42 bytes
b) 32 bytes
c) 36 bytes
d) 48 bytes
Answer: c
Clarification: The size is 36 bytes after MD5 and SHA-1 processing.
11. The certificate_request massage includes two parameters, one of which is-
a) certificate_extension
b) certificate_creation
c) certificate_exchange
d) certificate_type
Answer: d
Clarification: The certificate_request massage includes two parameters : certificate_type and certificate_authorities.
12. The client_key_exchange message uses a pre master key of size –
a) 48 bytes
b) 56 bytes
c) 64 bytes
d) 32 bytes
Answer: a
Clarification: The client_key_exchange message uses a pre master key of size 48 bytes.
13. The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) –
CertificateVerify.signature.md5_hash = MD5(master_secret || pad_2 || MD5(handshake_messages || master_secret || pad_1).
Is there any error? If so, what is it?
a) Yes. pad_1 and pad_2 should be interchanged
b) Yes. pad’s should be present towards the end
c) Yes. master_key should not be used, the pre_master key should be used
d) No Error
Answer: d
Clarification: The code is correct with no errors.
14. In the handshake protocol which is the message type first sent between client and server ?
a) server_hello
b) client_hello
c) hello_request
d) certificate_request
Answer: b
Clarification: Interaction between the client and server starts via the client_hello message.