Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

In the “Opening a channel” phase what is the function of the “maximum packet size” parameter?(a) It specifies the number of bytes in the IV(b) It specifies the maximum size of an individual packet(c) It specifies how many bytes of channel data can be sent(d) None of the mentionedI got this question in an interview for job.My doubt is from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct answer is (b) It specifies the MAXIMUM SIZE of an individual PACKET

The EXPLANATION is: The “maximum packet size” specifies the maximum size of an individual packet.

2.

SSH_MSG_USERAUTH_SUCCESS is represented by the byte –(a) 50(b) 51(c) 60(d) None of the mentionedI got this question in an interview for job.I'd like to ask this question from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT CHOICE is (d) None of the mentioned

To explain I WOULD say: SSH_MSG_USERAUTH_SUCCESS is REPRESENTED by 52.

3.

Which one of the following does not undergo the encryption procedure?(a) pdl(b) pktl(c) seq#(d) paddingI got this question in an internship interview.My question is taken from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT choice is (C) seq#

Easiest EXPLANATION: The seq# 32 bits does not undergo encryption.

4.

Number of phases in the handshaking protocol?(a) 2(b) 3(c) 4(d) 5The question was asked in an online quiz.This interesting question is from Secure Socket Layer in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct option is (c) 4

The best I can explain: There are 4 PHASES in the handshaking protocol. These are –

Phase 1 : ESTABLISHING security capabilities

Phase 2 : Server Authentication and Key Exchange

Phase 3 : Client Authentication and Key Exchange

Phase 4 : Finish/ END.

5.

Which protocol consists of only 1 bit?(a) Alert Protocol(b) Handshake Protocol(c) Upper-Layer Protocol(d) Change Cipher Spec ProtocolI got this question by my college director while I was bunking the class.I want to ask this question from Secure Socket Layer topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct choice is (d) Change CIPHER SPEC PROTOCOL

For explanation I would SAY: The change cipher spec protocol is bit LONG.

6.

What are the total number of addresses in Group 3?(a) 32768(b) 8192(c) 16384(d) None of the mentionedI have been asked this question in exam.I'm obligated to ask this question of Designing Subnets topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT answer is (B) 8192

For EXPLANATION I would say: Total addresses: 128×64 = 8192.
7.

ICANN stands for Internet Corporation for Assigned Names and Addresses.(a) True(b) FalseThis question was posed to me in examination.I'd like to ask this question from Classless Addressing in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct option is (a) True

For EXPLANATION I WOULD say: The address block allocation is managed by a global authority called the ICANN.

8.

Number of Blocks in class C are –(a) 2^7(b) 2^8(c) 2^14(d) 2^9I had been asked this question in an online quiz.This is a very interesting question from Classful Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT answer is (a) 2^7

Best explanation: NUMBER of Blocks in CLASS A are 2^7.
9.

The slash notation in classless addressing is referred to as –(a) NIFT(b) PITF(c) CIDR(d) TRSThe question was posed to me during an internship interview.This intriguing question originated from Classless Addressing in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT CHOICE is (c) CIDR

Easiest explanation: It is REFERRED to as CIDR.

10.

Number of Blocks in class C are –(a) 2^12(b) 2^16(c) 2^14(d) 2^18The question was asked at a job interview.Asked question is from Classful Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT OPTION is (c) 2^14

The explanation is: Number of BLOCKS in class C are 2^14.
11.

Which channel ensures local port forwarding?(a) session(b) x11(c) forward-tcpip(d) direct-tcpipThe question was asked in homework.The origin of the question is Secure Shell(SSH) topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (d) direct-tcpip

For explanation I WOULD say: Direct-tcpip has the function of LOCAL port FORWARDING.

12.

Which of the following alert codes is not supported by SSLv3?(a) record_overflow(b) no_certificate(c) internal_error(d) decode_errorI got this question by my college professor while I was bunking the class.This interesting question is from Transport Layer Security and HTTPS topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct CHOICE is (B) no_certificate

For explanation I WOULD say: no_certificate is not SUPPORTED by the SSLv3.

13.

The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.(a) NANDed, XORed(b) Concatenated, XORed(c) XORed, NANDed(d) XORed, ConcatenatedI had been asked this question in an international level competition.The question is from Secure Socket Layer in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct ANSWER is (b) Concatenated, XORed

Explanation: The pads are concatenated in SSLV3 and XORed in HMAC ALGORITHM.

14.

What is the first address for customer 128 of group 2?(a) 190.100.127.128/26(b) 190.100.127.255/26(c) 190.100.127.128/25(d) 190.100.127.255/25I got this question in an interview.I would like to ask this question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (a) 190.100.127.128/26

The best I can EXPLAIN: FIND the IP address using basic NETWORKING concepts.

15.

What is the prefix length for group 3?(a) 28(b) 26(c) 24(d) None of the mentionedThe question was asked at a job interview.My doubt stems from Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct answer is (b) 26

The BEST I can explain: 128 customers, each NEEDS 64 addresses

Suffix LENGTH = 6 (2^6=64)

Prefix length = 32-6= 26.

16.

In an IP packet, the value of HLEN is 5_16 and the value of the total length field is 0028_16. How many bytes of data are being carried by this packet?(a) 10(b) 40(c) 60(d) 20The question was posed to me during an interview.This key question is from IP Datagram Packet topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (d) 20

To explain I WOULD say: Total number of BYTES in the header = 5 X 4 = 20 bytes.

Total length = 0028_16 = 40 bytes.

Data carried by the PACKET = (40 – 20) = 20 bytes.

17.

N_sub = n + log_2(N/N_sub) is used to find the suffix length.(a) True(b) FalseThe question was asked by my college professor while I was bunking the class.My question is taken from Designing Subnets topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT OPTION is (b) False

Easy explanation: N_sub = N + log_2(N/N_sub) is used to find the prefix LENGTH.
18.

A classless address is given as 167.199.170.82/27. Find the number of addresses.(a) 128(b) 64(c) 32(d) 16This question was posed to me in unit test.Enquiry is from Classless Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT choice is (C) 32

The best I can explain: n =27

Therefore NUMBER of addresses is 2^(32-n) = 32.
19.

HTTPS stands for Hypertext Transfer Protocol over TLS.(a) True(b) FalseI have been asked this question during an online interview.Query is from Transport Layer Security and HTTPS in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct option is (a) True

For explanation I WOULD say: The STATEMENT is true. HTTPS is HTTP invoked over SSL/TLS.

20.

A classless address is given as 167.199.170.82/27. Find the first address.(a) 167.199.170.32(b) 167.199.170.82(c) 167.199.170.64(d) 167.199.170.78I got this question during an interview for a job.My doubt is from Classless Addressing topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct OPTION is (C) 167.199.170.64

Explanation: FIRST ADDRESS = (any address) AND (network mask).

21.

An IP packet has arrived with the first 8 bits as 01000010. What is the header length?(a) 4(b) 8(c) 12(d) 16The question was asked by my college director while I was bunking the class.My question is based upon IP Datagram Packet topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT option is (b) 8

The explanation: The right 4-bits multiplied by 4 is the header LENGTH (0010=2).

2 x 4 = 8.

22.

Which Class is reserved for future use?(a) A(b) B(c) D(d) None of the MentionedThe question was asked in an online interview.This intriguing question comes from Classful Addressing in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT option is (d) None of the Mentioned

To explain: CLASS E is reserved for future USE.

23.

What is the error (if any) in the following representation – 221.34.7.8.20?(a) There should be no leading zeros(b) Each byte should be less than or equal to 255(c) We cannot have more than 4 bytes in an IPv4 address(d) No errorI had been asked this question in an interview for job.This is a very interesting question from IP Addressing in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct option is (c) We cannot have more than 4 BYTES in an IPV4 address

The explanation is: We cannot have more than 4 bytes in an IPv4 address.

24.

Which port forwarding technique intercepts application-level traffic and redirects it from an insecure TCP connections to secure SSH tunnels?(a) Remote Forwarding(b) Local Forwarding(c) Stable Forwarding(d) None of the mentionedThis question was addressed to me in final exam.I want to ask this question from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT answer is (B) Local FORWARDING

To elaborate: This is the function of local forwarding.
25.

An organization is granted the block 130.34.12.64/26. What is the last address of the network?(a) 130.34.12.63/26(b) 130.34.12.64/26(c) 130.34.12.127/26(d) 130.34.12.128/28I got this question by my school teacher while I was bunking the class.This key question is from Designing Subnets topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT OPTION is (C) 130.34.12.127/26

Explanation: Last address = 130.34.12.127/26.

This can be found via: Last address = (any address) OR [NOT (NETWORK MASK)].

26.

Which of the following does not have a Net ID and Host ID?(a) Class A(b) Class B(c) Class C(d) Class DThe question was asked during an internship interview.This key question is from Classful Addressing topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT OPTION is (d) CLASS D

Easy EXPLANATION: Class D is the multicast address class. It does not have Net ID and Host ID fields.

27.

Percent of addresses occupied by Class D?(a) 50 %(b) 25 %(c) 6.25 %(d) 12.5 %This question was addressed to me during an interview.Asked question is from Classful Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT answer is (c) 6.25 %

For EXPLANATION I would say: CLASS D has 2^28 ADDRESSES in total.
28.

Number of Blocks in class B are –(a) 2^12(b) 2^16(c) 2^14(d) 2^18The question was asked during a job interview.I'd like to ask this question from Classful Addressing topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT choice is (c) 2^14

The EXPLANATION: Number of BLOCKS in class B are 2^14.
29.

A packet has arrived in which the offset value is 100. What is the number of the first byte?(a) 400(b) 800(c) 200(d) 780The question was posed to me in my homework.My question is based upon IP Datagram Packet in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT choice is (B) 800

Explanation: TTL = 01, the packet can TRAVEL only one hop.

The number of the first byte is 100 x 8 = 800.

The first byte number is 800.

30.

The session Identifier remains constant throughout the SSH connection.(a) True(b) FalseThis question was posed to me in an online quiz.My question is from Secure Shell(SSH) topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct option is (a) True

Explanation: The hash VALUE H SERVERS as a session identifier for this connection. Once computed, the session identifier is not changed, even if the key exchange is PERFORMED again for this connection to obtain fresh keys.

31.

The secure authentication connection is referred to as-(a) chisel(b) tunnel(c) zeroing(d) handshakingThis question was posed to me in an interview for job.I'm obligated to ask this question of Secure Shell(SSH) in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct ANSWER is (b) TUNNEL

Best explanation: The SECURE CONNECTION is referred to as tunnel.

32.

In the SSLv3 the padding bits are ____________ with the secret key.(a) Padded(b) XORed(c) Concatenated(d) ANDedI had been asked this question in final exam.This is a very interesting question from Transport Layer Security and HTTPS in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct ANSWER is (C) Concatenated

For EXPLANATION: The PADDING bits are concatenated with the secret key.

33.

The RSA signature uses which hash algorithm?(a) MD5(b) SHA-1(c) MD5 and SHA-1(d) None of the mentioned.The question was posed to me in an international level competition.My query is from Secure Socket Layer in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct option is (C) MD5 and SHA-1

The explanation is: The MD5 and SHA-1 HASH is CONCATENATED together and the then encrypted with the SERVER’s private key.

34.

The DSS signature uses which hash algorithm?(a) MD5(b) SHA-2(c) SHA-1(d) Does not use hash algorithmThis question was posed to me by my school principal while I was bunking the class.This is a very interesting question from Secure Socket Layer in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (c) SHA-1

The BEST EXPLANATION: The DSS signature uses SHA-1.

35.

What is the prefix length for group 1?(a) 8(b) 16(c) 24(d) None of the mentionedThe question was posed to me in an internship interview.My question comes from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct OPTION is (a) 8

Best explanation: 64 customers, each NEEDS 256 addresses

Suffix length = 8 (2^8=256)

32-8 = 24.

36.

An organization is granted the block 130.34.12.64/26. The organization needs four subnetworks, each with an equal number of hosts. What is the first address for the 3rd subnetwork?(a) 130.34.12.64/28(b) 130.34.12.96/28(c) 130.34.12.96/26(d) 130.34.12.80/27I have been asked this question in an interview for internship.This is a very interesting question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right answer is (b) 130.34.12.96/28

Explanation: Each subnetwork has 16 addresses. 64+32 = 96. This is the starting ADDRESS of the 3rd BLOCK.

37.

An ISP has requested a block of 1000 addresses. What is its prefix length?(a) 28(b) 22(c) 26(d) 24The question was posed to me during an online interview.Question is taken from Classless Addressing in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right OPTION is (B) 22

Explanation: n =32- log_2 (1024) = 22.

38.

In the Key generation procedure, the Integrity Key from the server to client is represented as:(a) HASH(K||H||”A”||session_id)(b) HASH(K||H||”B”||session_id)(c) HASH(K||H||”E”||session_id)(d) HASH(K||H||”F”||session_id)The question was posed to me in my homework.I'm obligated to ask this question of Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT option is (d) HASH(K||H||”F”||session_id)

Best explanation: The INITIALIZATION Vector from the server to client is given by HASH(K||H||”F”||session_id).
39.

An organization is granted the block 130.34.12.64/26. Find the number of addresses for the whole network.(a) 128(b) 32(c) 256(d) None of the mentionedThis question was addressed to me in semester exam.I would like to ask this question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (d) None of the mentioned

Easiest EXPLANATION: N = 2^(32-36) = 64.

40.

In the handshake protocol which is the message type first sent between client and server ?(a) server_hello(b) client_hello(c) hello_request(d) certificate_requestThe question was posed to me in a national level competition.Origin of the question is Secure Socket Layer topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right OPTION is (b) client_hello

To ELABORATE: INTERACTION between the client and server starts via the client_hello MESSAGE.

41.

Find the number of addresses in a range if the first address is 146.102.29.0 and last address is 146.102.32.255.(a) 1028(b) 1024(c) 578(d) 512I had been asked this question in an international level competition.This is a very interesting question from IP Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct option is (b) 1024

Explanation: Subtract the first address from the LAST address in base 256.

The result = 0.0.3.255

Therefore, NUMBER of ADDRESSES = (3 X 256 + 255) + 1 = 1024.

42.

A packet has arrived in which the offset value is 100, the value of HLEN is 5 and the value of the total length field is 100. What is the number of the first byte?(a) 800(b) 880(c) 400(d) 780This question was posed to me in an online quiz.This intriguing question comes from IP Datagram Packet topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT option is (a) 800

The BEST EXPLANATION: Total data bytes = total length – header length = 80 bytes in this datagram.

First byte is 800.
43.

How many trust models does the RFC 4251 dictate?(a) 2(b) 3(c) 4(d) 5The question was asked during an internship interview.This is a very interesting question from Secure Shell(SSH) topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right OPTION is (a) 2

To explain: The RFC 4251 DICTATES two alternative trust models : The local database model and the CERTIFICATION authority model.

44.

What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?(a) twofish 128(b) aes 192(c) aes 128(d) blowfishI had been asked this question by my college professor while I was bunking the class.My doubt is from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (c) aes 128

To EXPLAIN I WOULD SAY: aes 128 is the reccomended cryptographic algorithm.

45.

We encounter the record_overflow error when the payload length exceeds –(a) 2^14 + 1024(b) 2^16 + 1024(c) 2^14 + 2048(d) 2^16 + 2048The question was posed to me in exam.I would like to ask this question from Transport Layer Security and HTTPS in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right CHOICE is (c) 2^14 + 2048

To EXPLAIN: The overflow ERROR is encountered when the LENGTH exceeds 2^14 + 2048.

46.

In the above figure from left to right, the correct order of the shaded levels are(a) Network level, Application level, Transport level(b) Application level, Network level, Transport level(c) Transport level, Application level, Network level(d) Network level, Transport level, Application levelThe question was posed to me by my school principal while I was bunking the class.This interesting question is from Secure Socket Layer topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct answer is (d) Network level, Transport level, APPLICATION level

For EXPLANATION I would say: IP/IPSec is the Network level, SSL or TLS is the Transport Level, KERBEROS and S/MIME are the Application level.

47.

An ISP has requested a block of 1000 addresses. Can 18.14.12.0 be its first address?(a) Yes(b) No(c) Can’t Say(d) Insufficient DataI had been asked this question by my school principal while I was bunking the class.My query is from Classless Addressing in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct option is (a) Yes

Easiest EXPLANATION: 18.14.12.0 is divisible by 1024 HENCE it can be taken as FIRST address.

48.

Classless Addressing overcomes the problem of –(a) address completion(b) address depletion(c) address extraction(d) all of the mentionedThe question was asked in an online quiz.I want to ask this question from Classless Addressing topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT choice is (B) ADDRESS depletion

Easy EXPLANATION: Classless Addressing OVERCOMES the problem of address depletion.

49.

Which of the following values can ‘n’ not take?(a) 16(b) 8(c) 20(d) 24I had been asked this question in unit test.This intriguing question originated from Classless Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT choice is (c) 20

For explanation I WOULD SAY: ‘n’ can only have values 8, 16, or 24.

50.

In the Key generation procedure, the Initialization Vector from the server to client is represented as:(a) HASH(K||H||”C”||session_id)(b) HASH(K||H||”B”||session_id)(c) HASH(K||H||”F”||session_id)(d) HASH(K||H||”D”||session_id)The question was posed to me in my homework.This key question is from Secure Shell(SSH) in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct option is (b) HASH(K||H||”B”||session_id)

For explanation I would SAY: The Initialization Vector from the server to client is GIVEN by HASH(K||H||”B”||session_id).