Computer Architecture And Organization Set 13
On This Page
This set of Computer Architecture and Organization Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture And Organization Set 13
Q1 | Number of phases in the handshaking protocol?
- 2
- 3
- 4
- 5
Q2 | In the SSL record protocol operation pad_2 is –
- is the byte 0x36 repeated 40 times for md5
- is the byte 0x5c repeated 48 times for md5
- is the byte 0x5c repeated 48 times for sha-1
- is the byte 0x36 repeated 48 times for md5
Q3 | In the SSL record protocol operation pad_1 is –
- is the byte 0x36 repeated 40 times for md5
- is the byte 0x5c repeated 40 times for md5
- is the byte 0x5c repeated 48 times for sha-1
- is the byte 0x36 repeated 48 times for md5
Q4 | In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
- server_done
- server_key_exchange
- certificate_request
- crtificate_verify
Q5 | Which is the key exchange algorithm used in CipherSuite parameter?
- rsa
- fixed diffie-hellman
- ephemeral diffie-hellman
- any of the mentioned
Q6 | The certificate message is required for any agreed-on key exchange method except
- ephemeral diffie-hellman
- anonymous diffie-hellman
- fixed diffie-hellman
- rsa
Q7 | In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
- fortezza
- anonymous diffie-hellman
- fixed diffie-hellman
- rsa
Q8 | The DSS signature uses which hash algorithm?
- md5
- sha-2
- sha-1
- does not use hash algorithm
Q9 | The RSA signature uses which hash algorithm?
- md5
- sha-1
- md5 and sha-1
- none of the mentioned.
Q10 | What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
- 42 bytes
- 32 bytes
- 36 bytes
- 48 bytes
Q11 | The certificate_request massage includes two parameters, one of which is-
- certificate_extension
- certificate_creation
- certificate_exchange
- certificate_type
Q12 | The client_key_exchange message uses a pre master key of size –
- 48 bytes
- 56 bytes
- 64 bytes
- 32 bytes
Q13 | In the handshake protocol which is the message type first sent between client and server ?
- server_hello
- client_hello
- hello_request
- certificate_request
Q14 | Network layer firewall works as a
- frame filter
- packet filter
- content filter
- virus filter
Q15 | Network layer firewall has two sub- categories as
- state full firewall and stateless firewall
- bit oriented firewall and byte oriented firewall
- frame firewall and packet firewall
- network layer firewall and session layer firewall
Q16 | A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
- chock point
- meeting point
- firewall point
- secure point
Q17 | Which of the following is / are the types of firewall?
- packet filtering firewall
- dual homed gateway firewall
- screen host firewall
- dual host firewall
Q18 | A proxy firewall filters at
- physical layer
- data link layer
- network layer
- application layer
Q19 | A packet filter firewall filters at
- physical layer
- data link layer
- network layer or transport layer
- application layer
Q20 | What is one advantage of setting up a DMZ with two firewalls?
- you can control where traffic goes in three networks
- you can do stateful packet filtering
- you can do load balancing
- improved network performance
Q21 | A firewall needs to be so that it can grow proportionally with the network that it protects.
- robust
- expansive
- fast
- scalable