0% found this document useful (0 votes)
22 views10 pages

LA1 - QUIZ - Unit 5 - Attempt Review

Nitte la test

Uploaded by

medicaltalks9797
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views10 pages

LA1 - QUIZ - Unit 5 - Attempt Review

Nitte la test

Uploaded by

medicaltalks9797
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Dashboard AY_23_24_Sem6_21IS63_CNS Section ‘A’ Activity LA1- QUIZ -Unit 5

← LA1-QUIZ-UNIT4 Surprise quiz 1 →

Started on Monday, 1 July 2024, 2:17 PM


State Finished
Completed on Monday, 1 July 2024, 2:17 PM
Time taken 10 secs
Grade 0.00 out of 20.00 (0%)

Question 1

Not answered

Marked out of 1.00

1. !What is the primary purpose of the SSL protocol?

a. Firewall protection
b. Securing HTTP connections

c. Encrypting email content

d. Digital signature verification

The correct answer is: Securing HTTP connections

Question 2

Not answered

Marked out of 1.00

11. !Which of the following is a feature of PGP?

a. Firewall protection

b. Bandwidth optimization
c. Network routing

d. Data encryption

The correct answer is: Data encryption


Question 3

Not answered

Marked out of 1.00

4. The SSL Record Protocol provides:

a. Message integrity and confidentiality


b. Only confidentiality

c. Only message integrity

d. Neither confidentiality nor message integrity

The correct answer is: Message integrity and confidentiality

Question 4

Not answered

Marked out of 1.00

5. Transport Layer Security (TLS) is an upgraded version of:

a. S/MIME

b. SSL
c. PGP

d. Kerberos

The correct answer is: SSL


Question 5

Not answered

Marked out of 1.00

13. Kerberos is primarily used for:

a. Message integrity
b. Virus protection

c. Network authentication

d. Data encryption

The correct answer is: Network authentication

Question 6

Not answered

Marked out of 1.00

14. Which version of Kerberos includes the use of public-key cryptography for initial authentication?

a. Version 2

b. Version 5
c. Version 3

d. Version 4

The correct answer is: Version 5


Question 7

Not answered

Marked out of 1.00

3. !What does SSL stand for?

a. Secure Socket Link


b. Secure Sockets Layer

c. Safe Sockets Layer

d. Security Socket Layer

The correct answer is: Secure Sockets Layer

Question 8

Not answered

Marked out of 1.00

8. In TLS, alert codes are used to:

a. Report errors and warnings

b. Synchronize communication
c. Request new session keys

d. Signal the end of a connection

The correct answer is: Report errors and warnings


Question 9

Not answered

Marked out of 1.00

15. In Kerberos, what is the role of the Ticket Granting Ticket (TGT)?

a. To encrypt messages
b. To generate session keys

c. To authenticate users to the Ticket Granting Server

d. To verify message integrity

The correct answer is: To authenticate users to the Ticket Granting Server

Question 10

Not answered

Marked out of 1.00

2. Which layer of the OSI model does SSL primarily operate on?

a. Network layer

b. Application layer
c. Data Link layer

d. Transport layer

The correct answer is: Transport layer


Question 11

Not answered

Marked out of 1.00

9. Which of the following is NOT a component of a TLS cipher suite?

a. Encryption algorithm
b. Pseudorandom function

c. Key exchange algorithm

d. Authentication algorithm

The correct answer is: Pseudorandom function

Question 12

Not answered

Marked out of 1.00

7. The Pseudorandom Function (PRF) in TLS is used to:

a. Generate random session keys

b. Generate keys and IVs from secret values


c. Encrypt data packets

d. Authenticate messages

The correct answer is: Generate keys and IVs from secret values
Question 13

Not answered

Marked out of 1.00

17. What is the primary difference between SSL and TLS?

a. SSL is more secure than TLS


b. TLS uses stronger encryption algorithms

c. TLS is an enhanced version of SSL

d. TLS is older than SSL

The correct answer is: TLS is an enhanced version of SSL

Question 14

Not answered

Marked out of 1.00

20. Which protocol is known for providing end-to-end encryption for email?

a. TLS

b. SSL
c. Kerberos

d. PGP

The correct answer is: PGP


Question 15

Not answered

Marked out of 1.00

18. In S/MIME, what is the primary purpose of a digital signature?

a. Compress the email content


b. Verify the sender's identity and ensure message integrity

c. Encrypt the email content

d. Generate session keys

The correct answer is: Verify the sender's identity and ensure message integrity

Question 16

Not answered

Marked out of 1.00

16. Which component is NOT part of Kerberos 5 architecture?

a. Key Distribution Center

b. Ticket Granting Server


c. Secure Socket Layer

d. Authentication Server

The correct answer is: Secure Socket Layer


Question 17

Not answered

Marked out of 1.00

6. In TLS, what is the purpose of the Message Authentication Code (MAC)?

a. Encrypt the data


b. Authenticate the message sender

c. Ensure message integrity

d. Generate session keys

The correct answer is: Ensure message integrity

Question 18

Not answered

Marked out of 1.00

10. !What does PGP stand for?

a. Pretty Good Protocol

b. Pretty Good Privacy


c. Public Guard Protocol

d. Private Good Protocol

The correct answer is: Pretty Good Privacy


Question 19

Not answered

Marked out of 1.00

12. S/MIME is used for:

a. Secure routing
b. Secure email communication

c. Securing web pages

d. Secure file transfer

The correct answer is: Secure email communication

Question 20

Incorrect

Mark 0.00 out of 1.00

19. What is the primary purpose of padding in cryptographic protocols like SSL/TLS?

a. To ensure that data blocks are the correct size for encryption

b. To speed up the encryption process


c. To add an additional layer of security

d. To randomize the data 

The correct answer is: To ensure that data blocks are the correct size for encryption

You might also like