InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
IKE is abbreviated as Internet Key Exchange.(a) True(b) FalseThis question was addressed to me by my college director while I was bunking the class.My question comes from Security Protocols topic in division Cyber Security of Cyber Security |
|
Answer» Correct answer is (a) True |
|
| 2. |
________ is the entity for issuing digital certificates.(a) Certificate Authority (CA)(b) Cert Authority (CA)(c) Cert Authorization (CA)(d) Certificate Authorization (CA)The question was asked in an interview for job.This intriguing question comes from Security Protocols in chapter Cyber Security of Cyber Security |
|
Answer» The correct choice is (a) Certificate Authority (CA) |
|
| 3. |
ESP is abbreviated as ____________(a) Encapsulating Security Payload(b) Encapsulating Secure Protocol(c) Encrypted Secure Payload(d) Encapsulating Secure PayloadI have been asked this question during a job interview.The query is from Security Protocols topic in section Cyber Security of Cyber Security |
|
Answer» The CORRECT choice is (d) Encapsulating Secure Payload |
|
| 4. |
SRTP is abbreviated as ________(a) Secure Relay Transport Protocol(b) Secure Real-time Transferring Protocol(c) Secure Real-time Transport Protocol(d) Secure Real-time Transportation ProtocolI have been asked this question during an online interview.This intriguing question comes from Security Protocols topic in division Cyber Security of Cyber Security |
|
Answer» RIGHT answer is (c) SECURE Real-time Transport Protocol Best explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with ENCRYPTION for message integrity and authentication. It is USED mostly in entertainment SYSTEMS and streaming media and sites. |
|
| 5. |
In which of the following cases Session Initiation Protocol is not used?(a) Instant Messaging(b) Voice over LTE (VoLTE)(c) Internet telephony(d) Data TransferringI have been asked this question in examination.I need to ask this question from Security Protocols in section Cyber Security of Cyber Security |
|
Answer» The correct choice is (d) DATA Transferring |
|
| 6. |
SIP is abbreviated as __________(a) Session Initiation Protocol(b) Secured Initiation Protocol(c) Secure Initiation Protocol(d) Session Integration ProtocolThe question was posed to me by my school principal while I was bunking the class.I would like to ask this question from Security Protocols topic in portion Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (a) Session Initiation PROTOCOL The best explanation: Session Initiation Protocol is an IMPORTANT protocol used for starting, preserving and terminating any real time SESSIONS over the INTERNET. |
|
| 7. |
The latest version of TLS is _____(a) version 1.1(b) version 1.2(c) version 2.1(d) version 1.3I have been asked this question in an international level competition.The doubt is from Security Protocols in section Cyber Security of Cyber Security |
|
Answer» RIGHT ANSWER is (B) version 1.2 Easiest explanation: The latest standard version of TLS is version 1.2. Version 1.3 is STILL in the development stage. |
|
| 8. |
Authentication in PCT requires _____ keys.(a) 1(b) 2(c) 3(d) 4This question was addressed to me during an internship interview.My question is based upon Security Protocols in chapter Cyber Security of Cyber Security |
|
Answer» The correct OPTION is (b) 2 |
|
| 9. |
PCT is abbreviated as ________(a) Private Connecting Technology(b) Personal Communication Technology(c) Private Communication Technique(d) Private Communication TechnologyThis question was addressed to me during an interview for a job.The above asked question is from Security Protocols in division Cyber Security of Cyber Security |
|
Answer» Right answer is (d) Private COMMUNICATION TECHNOLOGY |
|
| 10. |
SFTP is abbreviated as ________(a) Secure File Transfer Protocol(b) Secured File Transfer Protocol(c) Secure Folder Transfer Protocol(d) Secure File Transferring ProtocolThis question was addressed to me in my homework.This key question is from Security Protocols in section Cyber Security of Cyber Security |
|
Answer» Right choice is (a) Secure File Transfer Protocol |
|
| 11. |
Why did SSL certificate require in HTTP?(a) For making security weak(b) For making information move faster(c) For encrypted data sent over HTTP protocol(d) For sending and receiving emails unencryptedI have been asked this question in semester exam.Question is from Security Protocols topic in division Cyber Security of Cyber Security |
|
Answer» Correct answer is (c) For encrypted data sent over HTTP protocol |
|
| 12. |
Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection.(a) HTTP(b) HTTPS(c) SMTP(d) SFTPThis question was posed to me in class test.This key question is from Security Protocols topic in division Cyber Security of Cyber Security |
|
Answer» Right answer is (b) HTTPS |
|
| 13. |
S/MIME is abbreviated as __________________(a) Secure/Multimedia Internet Mailing Extensions(b) Secure/Multipurpose Internet Mailing Extensions(c) Secure/Multimedia Internet Mail Extensions(d) Secure/Multipurpose Internet Mail ExtensionsI have been asked this question in homework.Origin of the question is Security Protocols in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (d) Secure/Multipurpose Internet MAIL EXTENSIONS |
|
| 14. |
__________ is used for encrypting data at network level.(a) IPSec(b) HTTPS(c) SMTP(d) S/MIMEThis question was addressed to me in an international level competition.I'm obligated to ask this question of Security Protocols in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (a) IPSEC |
|
| 15. |
In SSL, what is used for authenticating a message?(a) MAC (Message Access Code)(b) MAC (Message Authentication Code)(c) MAC (Machine Authentication Code)(d) MAC (Machine Access Code)This question was addressed to me in class test.This interesting question is from Security Protocols topic in portion Cyber Security of Cyber Security |
|
Answer» Correct option is (b) MAC (MESSAGE Authentication Code) |
|
| 16. |
__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?(a) Security policies(b) Protocols(c) Wireless network(d) Network algorithmsThis question was addressed to me in an online interview.Question is taken from Security Protocols topic in section Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (b) Protocols |
|
| 17. |
SSL primarily focuses on _______(a) integrity and authenticity(b) integrity and non-repudiation(c) authenticity and privacy(d) confidentiality and integrityI had been asked this question in my homework.My question is based upon Security Protocols in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (a) integrity and authenticity |
|
| 18. |
HTTPS is abbreviated as _________(a) Hypertexts Transfer Protocol Secured(b) Secured Hyper Text Transfer Protocol(c) Hyperlinked Text Transfer Protocol Secured(d) Hyper Text Transfer Protocol SecureThe question was posed to me in quiz.Question is from Security Protocols in division Cyber Security of Cyber Security |
|
Answer» Right choice is (d) HYPER Text Transfer Protocol SECURE |
|
| 19. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.(a) True(b) FalseThis question was addressed to me in examination.This interesting question is from Security Protocols in portion Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (a) True |
|
| 20. |
Which of the following is not a secured mail transferring methodology?(a) POP3(b) SSMTP(c) Mail using PGP(d) S/MIMEI have been asked this question by my school principal while I was bunking the class.This is a very interesting question from Security Protocols topic in chapter Cyber Security of Cyber Security |
|
Answer» Right option is (a) POP3 |
|
| 21. |
Which of the following is not a strong security protocol?(a) HTTPS(b) SSL(c) SMTP(d) SFTPI had been asked this question at a job interview.Asked question is from Security Protocols topic in section Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (c) SMTP |
|
| 22. |
___________ ensures the integrity and security of data that are passing over a network.(a) Firewall(b) Antivirus(c) Pentesting Tools(d) Network-security protocolsThe question was asked during a job interview.Origin of the question is Security Protocols in chapter Cyber Security of Cyber Security |
|
Answer» Right OPTION is (d) Network-security PROTOCOLS |
|