InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In the “Opening a channel” phase what is the function of the “maximum packet size” parameter?(a) It specifies the number of bytes in the IV(b) It specifies the maximum size of an individual packet(c) It specifies how many bytes of channel data can be sent(d) None of the mentionedI got this question in an interview for job.My doubt is from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct answer is (b) It specifies the MAXIMUM SIZE of an individual PACKET |
|
| 2. |
SSH_MSG_USERAUTH_SUCCESS is represented by the byte –(a) 50(b) 51(c) 60(d) None of the mentionedI got this question in an interview for job.I'd like to ask this question from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT CHOICE is (d) None of the mentioned |
|
| 3. |
Which one of the following does not undergo the encryption procedure?(a) pdl(b) pktl(c) seq#(d) paddingI got this question in an internship interview.My question is taken from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT choice is (C) seq# |
|
| 4. |
Number of phases in the handshaking protocol?(a) 2(b) 3(c) 4(d) 5The question was asked in an online quiz.This interesting question is from Secure Socket Layer in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct option is (c) 4 |
|
| 5. |
Which protocol consists of only 1 bit?(a) Alert Protocol(b) Handshake Protocol(c) Upper-Layer Protocol(d) Change Cipher Spec ProtocolI got this question by my college director while I was bunking the class.I want to ask this question from Secure Socket Layer topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct choice is (d) Change CIPHER SPEC PROTOCOL |
|
| 6. |
What are the total number of addresses in Group 3?(a) 32768(b) 8192(c) 16384(d) None of the mentionedI have been asked this question in exam.I'm obligated to ask this question of Designing Subnets topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT answer is (B) 8192 For EXPLANATION I would say: Total addresses: 128×64 = 8192. |
|
| 7. |
ICANN stands for Internet Corporation for Assigned Names and Addresses.(a) True(b) FalseThis question was posed to me in examination.I'd like to ask this question from Classless Addressing in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct option is (a) True |
|
| 8. |
Number of Blocks in class C are –(a) 2^7(b) 2^8(c) 2^14(d) 2^9I had been asked this question in an online quiz.This is a very interesting question from Classful Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT answer is (a) 2^7 Best explanation: NUMBER of Blocks in CLASS A are 2^7. |
|
| 9. |
The slash notation in classless addressing is referred to as –(a) NIFT(b) PITF(c) CIDR(d) TRSThe question was posed to me during an internship interview.This intriguing question originated from Classless Addressing in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT CHOICE is (c) CIDR |
|
| 10. |
Number of Blocks in class C are –(a) 2^12(b) 2^16(c) 2^14(d) 2^18The question was asked at a job interview.Asked question is from Classful Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT OPTION is (c) 2^14 The explanation is: Number of BLOCKS in class C are 2^14. |
|
| 11. |
Which channel ensures local port forwarding?(a) session(b) x11(c) forward-tcpip(d) direct-tcpipThe question was asked in homework.The origin of the question is Secure Shell(SSH) topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (d) direct-tcpip |
|
| 12. |
Which of the following alert codes is not supported by SSLv3?(a) record_overflow(b) no_certificate(c) internal_error(d) decode_errorI got this question by my college professor while I was bunking the class.This interesting question is from Transport Layer Security and HTTPS topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct CHOICE is (B) no_certificate |
|
| 13. |
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.(a) NANDed, XORed(b) Concatenated, XORed(c) XORed, NANDed(d) XORed, ConcatenatedI had been asked this question in an international level competition.The question is from Secure Socket Layer in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct ANSWER is (b) Concatenated, XORed |
|
| 14. |
What is the first address for customer 128 of group 2?(a) 190.100.127.128/26(b) 190.100.127.255/26(c) 190.100.127.128/25(d) 190.100.127.255/25I got this question in an interview.I would like to ask this question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (a) 190.100.127.128/26 |
|
| 15. |
What is the prefix length for group 3?(a) 28(b) 26(c) 24(d) None of the mentionedThe question was asked at a job interview.My doubt stems from Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct answer is (b) 26 |
|
| 16. |
In an IP packet, the value of HLEN is 5_16 and the value of the total length field is 0028_16. How many bytes of data are being carried by this packet?(a) 10(b) 40(c) 60(d) 20The question was posed to me during an interview.This key question is from IP Datagram Packet topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (d) 20 |
|
| 17. |
N_sub = n + log_2(N/N_sub) is used to find the suffix length.(a) True(b) FalseThe question was asked by my college professor while I was bunking the class.My question is taken from Designing Subnets topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT OPTION is (b) False Easy explanation: N_sub = N + log_2(N/N_sub) is used to find the prefix LENGTH. |
|
| 18. |
A classless address is given as 167.199.170.82/27. Find the number of addresses.(a) 128(b) 64(c) 32(d) 16This question was posed to me in unit test.Enquiry is from Classless Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT choice is (C) 32 The best I can explain: n =27 Therefore NUMBER of addresses is 2^(32-n) = 32. |
|
| 19. |
HTTPS stands for Hypertext Transfer Protocol over TLS.(a) True(b) FalseI have been asked this question during an online interview.Query is from Transport Layer Security and HTTPS in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct option is (a) True |
|
| 20. |
A classless address is given as 167.199.170.82/27. Find the first address.(a) 167.199.170.32(b) 167.199.170.82(c) 167.199.170.64(d) 167.199.170.78I got this question during an interview for a job.My doubt is from Classless Addressing topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct OPTION is (C) 167.199.170.64 |
|
| 21. |
An IP packet has arrived with the first 8 bits as 01000010. What is the header length?(a) 4(b) 8(c) 12(d) 16The question was asked by my college director while I was bunking the class.My question is based upon IP Datagram Packet topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT option is (b) 8 |
|
| 22. |
Which Class is reserved for future use?(a) A(b) B(c) D(d) None of the MentionedThe question was asked in an online interview.This intriguing question comes from Classful Addressing in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT option is (d) None of the Mentioned |
|
| 23. |
What is the error (if any) in the following representation – 221.34.7.8.20?(a) There should be no leading zeros(b) Each byte should be less than or equal to 255(c) We cannot have more than 4 bytes in an IPv4 address(d) No errorI had been asked this question in an interview for job.This is a very interesting question from IP Addressing in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct option is (c) We cannot have more than 4 BYTES in an IPV4 address |
|
| 24. |
Which port forwarding technique intercepts application-level traffic and redirects it from an insecure TCP connections to secure SSH tunnels?(a) Remote Forwarding(b) Local Forwarding(c) Stable Forwarding(d) None of the mentionedThis question was addressed to me in final exam.I want to ask this question from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT answer is (B) Local FORWARDING To elaborate: This is the function of local forwarding. |
|
| 25. |
An organization is granted the block 130.34.12.64/26. What is the last address of the network?(a) 130.34.12.63/26(b) 130.34.12.64/26(c) 130.34.12.127/26(d) 130.34.12.128/28I got this question by my school teacher while I was bunking the class.This key question is from Designing Subnets topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (C) 130.34.12.127/26 |
|
| 26. |
Which of the following does not have a Net ID and Host ID?(a) Class A(b) Class B(c) Class C(d) Class DThe question was asked during an internship interview.This key question is from Classful Addressing topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (d) CLASS D |
|
| 27. |
Percent of addresses occupied by Class D?(a) 50 %(b) 25 %(c) 6.25 %(d) 12.5 %This question was addressed to me during an interview.Asked question is from Classful Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT answer is (c) 6.25 % For EXPLANATION I would say: CLASS D has 2^28 ADDRESSES in total. |
|
| 28. |
Number of Blocks in class B are –(a) 2^12(b) 2^16(c) 2^14(d) 2^18The question was asked during a job interview.I'd like to ask this question from Classful Addressing topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT choice is (c) 2^14 The EXPLANATION: Number of BLOCKS in class B are 2^14. |
|
| 29. |
A packet has arrived in which the offset value is 100. What is the number of the first byte?(a) 400(b) 800(c) 200(d) 780The question was posed to me in my homework.My question is based upon IP Datagram Packet in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT choice is (B) 800 |
|
| 30. |
The session Identifier remains constant throughout the SSH connection.(a) True(b) FalseThis question was posed to me in an online quiz.My question is from Secure Shell(SSH) topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct option is (a) True |
|
| 31. |
The secure authentication connection is referred to as-(a) chisel(b) tunnel(c) zeroing(d) handshakingThis question was posed to me in an interview for job.I'm obligated to ask this question of Secure Shell(SSH) in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct ANSWER is (b) TUNNEL |
|
| 32. |
In the SSLv3 the padding bits are ____________ with the secret key.(a) Padded(b) XORed(c) Concatenated(d) ANDedI had been asked this question in final exam.This is a very interesting question from Transport Layer Security and HTTPS in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct ANSWER is (C) Concatenated |
|
| 33. |
The RSA signature uses which hash algorithm?(a) MD5(b) SHA-1(c) MD5 and SHA-1(d) None of the mentioned.The question was posed to me in an international level competition.My query is from Secure Socket Layer in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct option is (C) MD5 and SHA-1 |
|
| 34. |
The DSS signature uses which hash algorithm?(a) MD5(b) SHA-2(c) SHA-1(d) Does not use hash algorithmThis question was posed to me by my school principal while I was bunking the class.This is a very interesting question from Secure Socket Layer in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (c) SHA-1 |
|
| 35. |
What is the prefix length for group 1?(a) 8(b) 16(c) 24(d) None of the mentionedThe question was posed to me in an internship interview.My question comes from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct OPTION is (a) 8 |
|
| 36. |
An organization is granted the block 130.34.12.64/26. The organization needs four subnetworks, each with an equal number of hosts. What is the first address for the 3rd subnetwork?(a) 130.34.12.64/28(b) 130.34.12.96/28(c) 130.34.12.96/26(d) 130.34.12.80/27I have been asked this question in an interview for internship.This is a very interesting question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right answer is (b) 130.34.12.96/28 |
|
| 37. |
An ISP has requested a block of 1000 addresses. What is its prefix length?(a) 28(b) 22(c) 26(d) 24The question was posed to me during an online interview.Question is taken from Classless Addressing in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right OPTION is (B) 22 |
|
| 38. |
In the Key generation procedure, the Integrity Key from the server to client is represented as:(a) HASH(K||H||”A”||session_id)(b) HASH(K||H||”B”||session_id)(c) HASH(K||H||”E”||session_id)(d) HASH(K||H||”F”||session_id)The question was posed to me in my homework.I'm obligated to ask this question of Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT option is (d) HASH(K||H||”F”||session_id) Best explanation: The INITIALIZATION Vector from the server to client is given by HASH(K||H||”F”||session_id). |
|
| 39. |
An organization is granted the block 130.34.12.64/26. Find the number of addresses for the whole network.(a) 128(b) 32(c) 256(d) None of the mentionedThis question was addressed to me in semester exam.I would like to ask this question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (d) None of the mentioned |
|
| 40. |
In the handshake protocol which is the message type first sent between client and server ?(a) server_hello(b) client_hello(c) hello_request(d) certificate_requestThe question was posed to me in a national level competition.Origin of the question is Secure Socket Layer topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right OPTION is (b) client_hello |
|
| 41. |
Find the number of addresses in a range if the first address is 146.102.29.0 and last address is 146.102.32.255.(a) 1028(b) 1024(c) 578(d) 512I had been asked this question in an international level competition.This is a very interesting question from IP Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct option is (b) 1024 |
|
| 42. |
A packet has arrived in which the offset value is 100, the value of HLEN is 5 and the value of the total length field is 100. What is the number of the first byte?(a) 800(b) 880(c) 400(d) 780This question was posed to me in an online quiz.This intriguing question comes from IP Datagram Packet topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT option is (a) 800 The BEST EXPLANATION: Total data bytes = total length – header length = 80 bytes in this datagram. First byte is 800. |
|
| 43. |
How many trust models does the RFC 4251 dictate?(a) 2(b) 3(c) 4(d) 5The question was asked during an internship interview.This is a very interesting question from Secure Shell(SSH) topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right OPTION is (a) 2 |
|
| 44. |
What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?(a) twofish 128(b) aes 192(c) aes 128(d) blowfishI had been asked this question by my college professor while I was bunking the class.My doubt is from Secure Shell(SSH) in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (c) aes 128 |
|
| 45. |
We encounter the record_overflow error when the payload length exceeds –(a) 2^14 + 1024(b) 2^16 + 1024(c) 2^14 + 2048(d) 2^16 + 2048The question was posed to me in exam.I would like to ask this question from Transport Layer Security and HTTPS in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right CHOICE is (c) 2^14 + 2048 |
|
| 46. |
In the above figure from left to right, the correct order of the shaded levels are(a) Network level, Application level, Transport level(b) Application level, Network level, Transport level(c) Transport level, Application level, Network level(d) Network level, Transport level, Application levelThe question was posed to me by my school principal while I was bunking the class.This interesting question is from Secure Socket Layer topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct answer is (d) Network level, Transport level, APPLICATION level |
|
| 47. |
An ISP has requested a block of 1000 addresses. Can 18.14.12.0 be its first address?(a) Yes(b) No(c) Can’t Say(d) Insufficient DataI had been asked this question by my school principal while I was bunking the class.My query is from Classless Addressing in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct option is (a) Yes |
|
| 48. |
Classless Addressing overcomes the problem of –(a) address completion(b) address depletion(c) address extraction(d) all of the mentionedThe question was asked in an online quiz.I want to ask this question from Classless Addressing topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT choice is (B) ADDRESS depletion |
|
| 49. |
Which of the following values can ‘n’ not take?(a) 16(b) 8(c) 20(d) 24I had been asked this question in unit test.This intriguing question originated from Classless Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT choice is (c) 20 |
|
| 50. |
In the Key generation procedure, the Initialization Vector from the server to client is represented as:(a) HASH(K||H||”C”||session_id)(b) HASH(K||H||”B”||session_id)(c) HASH(K||H||”F”||session_id)(d) HASH(K||H||”D”||session_id)The question was posed to me in my homework.This key question is from Secure Shell(SSH) in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct option is (b) HASH(K||H||”B”||session_id) |
|