Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

IKE is abbreviated as Internet Key Exchange.(a) True(b) FalseThis question was addressed to me by my college director while I was bunking the class.My question comes from Security Protocols topic in division Cyber Security of Cyber Security

Answer»

Correct answer is (a) True

The BEST I can explain: Internet KEY Exchange is a security protocol used for setting up a security association in the Secure IP protocol. IKE = Key Management Protocol (KMP) + Security Association (SA).

2.

________ is the entity for issuing digital certificates.(a) Certificate Authority (CA)(b) Cert Authority (CA)(c) Cert Authorization (CA)(d) Certificate Authorization (CA)The question was asked in an interview for job.This intriguing question comes from Security Protocols in chapter Cyber Security of Cyber Security

Answer»

The correct choice is (a) Certificate Authority (CA)

Best EXPLANATION: DIGITAL certificates are used for CERTIFYING the OWNERSHIP of a public key and the entity who issue those certificates is the Certificate Authority.

3.

ESP is abbreviated as ____________(a) Encapsulating Security Payload(b) Encapsulating Secure Protocol(c) Encrypted Secure Payload(d) Encapsulating Secure PayloadI have been asked this question during a job interview.The query is from Security Protocols topic in section Cyber Security of Cyber Security

Answer»

The CORRECT choice is (d) Encapsulating Secure Payload

To elaborate: Encapsulating Secure Payload is a SPECIAL TYPE of protocol used for offering integrity, AUTHENTICATION, and confidentiality to network packets’ DATA in IPSec (Secure Internet Protocol).

4.

SRTP is abbreviated as ________(a) Secure Relay Transport Protocol(b) Secure Real-time Transferring Protocol(c) Secure Real-time Transport Protocol(d) Secure Real-time Transportation ProtocolI have been asked this question during an online interview.This intriguing question comes from Security Protocols topic in division Cyber Security of Cyber Security

Answer» RIGHT answer is (c) SECURE Real-time Transport Protocol

Best explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with ENCRYPTION for message integrity and authentication. It is USED mostly in entertainment SYSTEMS and streaming media and sites.
5.

In which of the following cases Session Initiation Protocol is not used?(a) Instant Messaging(b) Voice over LTE (VoLTE)(c) Internet telephony(d) Data TransferringI have been asked this question in examination.I need to ask this question from Security Protocols in section Cyber Security of Cyber Security

Answer»

The correct choice is (d) DATA Transferring

Explanation: Session Initiation Protocol is used as real-time session MAINTAINING and is used voice, VIDEO as well as messaging applications for controlling MULTIMEDIA COMMUNICATION sessions.

6.

SIP is abbreviated as __________(a) Session Initiation Protocol(b) Secured Initiation Protocol(c) Secure Initiation Protocol(d) Session Integration ProtocolThe question was posed to me by my school principal while I was bunking the class.I would like to ask this question from Security Protocols topic in portion Cyber Security of Cyber Security

Answer» CORRECT choice is (a) Session Initiation PROTOCOL

The best explanation: Session Initiation Protocol is an IMPORTANT protocol used for starting, preserving and terminating any real time SESSIONS over the INTERNET.
7.

The latest version of TLS is _____(a) version 1.1(b) version 1.2(c) version 2.1(d) version 1.3I have been asked this question in an international level competition.The doubt is from Security Protocols in section Cyber Security of Cyber Security

Answer» RIGHT ANSWER is (B) version 1.2

Easiest explanation: The latest standard version of TLS is version 1.2. Version 1.3 is STILL in the development stage.
8.

Authentication in PCT requires _____ keys.(a) 1(b) 2(c) 3(d) 4This question was addressed to me during an internship interview.My question is based upon Security Protocols in chapter Cyber Security of Cyber Security

Answer»

The correct OPTION is (b) 2

Easy explanation: For message encryption using PCT it requires TWO separate keys. Moreover, PCT has more options for DATA FORMATS and security algorithms.

9.

PCT is abbreviated as ________(a) Private Connecting Technology(b) Personal Communication Technology(c) Private Communication Technique(d) Private Communication TechnologyThis question was addressed to me during an interview for a job.The above asked question is from Security Protocols in division Cyber Security of Cyber Security

Answer»

Right answer is (d) Private COMMUNICATION TECHNOLOGY

Best explanation: Private Communication Technology (PCT) is similar to SSL except that the size of the message is smaller in the case of PCT. It SUPPORTS different encryption ALGORITHMS like DES, RSA, Diffie-Hellman etc.

10.

SFTP is abbreviated as ________(a) Secure File Transfer Protocol(b) Secured File Transfer Protocol(c) Secure Folder Transfer Protocol(d) Secure File Transferring ProtocolThis question was addressed to me in my homework.This key question is from Security Protocols in section Cyber Security of Cyber Security

Answer»

Right choice is (a) Secure File Transfer Protocol

The explanation: It is a secured FTP, where communication is made secured USING SSH (Secure Shell) which helps in secure transferring of files in both LOCAL as well as remote SYSTEMS.

11.

Why did SSL certificate require in HTTP?(a) For making security weak(b) For making information move faster(c) For encrypted data sent over HTTP protocol(d) For sending and receiving emails unencryptedI have been asked this question in semester exam.Question is from Security Protocols topic in division Cyber Security of Cyber Security

Answer»

Correct answer is (c) For encrypted data sent over HTTP protocol

Best explanation: In the case of HTTP connection, data are sent as plain-text, which is easily readable by hackers, especially when it is CREDIT card DETAILS and personal information. But with the incorporation of SSL certificate, communication BECOMES SECURE and data sent and received are encrypted.

12.

Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection.(a) HTTP(b) HTTPS(c) SMTP(d) SFTPThis question was posed to me in class test.This key question is from Security Protocols topic in division Cyber Security of Cyber Security

Answer»

Right answer is (b) HTTPS

The best explanation: It is when HTTPS (Hyper TEXT Transfer Protocol Secure) connection is built an extended VALIDATION CERTIFICATE is installed in the WEBSITE for SECURITY reasons.

13.

S/MIME is abbreviated as __________________(a) Secure/Multimedia Internet Mailing Extensions(b) Secure/Multipurpose Internet Mailing Extensions(c) Secure/Multimedia Internet Mail Extensions(d) Secure/Multipurpose Internet Mail ExtensionsI have been asked this question in homework.Origin of the question is Security Protocols in chapter Cyber Security of Cyber Security

Answer»

Right choice is (d) Secure/Multipurpose Internet MAIL EXTENSIONS

To explain I would say: Secure/Multipurpose Internet Mail Extensions is the most popular protocol used to send encrypted messages that are DIGITALLY signed. In this protocol, the encryption is DONE with a digital sign in them.

14.

__________ is used for encrypting data at network level.(a) IPSec(b) HTTPS(c) SMTP(d) S/MIMEThis question was addressed to me in an international level competition.I'm obligated to ask this question of Security Protocols in portion Cyber Security of Cyber Security

Answer»

The correct answer is (a) IPSEC

To EXPLAIN I would say: IPSec (Secure Internet Protocol) is used for securing data at the network level by using 3 different PROTOCOLS. These are Encapsulating Secure Payload (ESP), Authentication HEADER, and Internet Key Exchange (IKE).

15.

In SSL, what is used for authenticating a message?(a) MAC (Message Access Code)(b) MAC (Message Authentication Code)(c) MAC (Machine Authentication Code)(d) MAC (Machine Access Code)This question was addressed to me in class test.This interesting question is from Security Protocols topic in portion Cyber Security of Cyber Security

Answer»

Correct option is (b) MAC (MESSAGE Authentication Code)

Easy explanation: For authenticating in SSL, a short message KNOWN as MAC (Message Authentication Code) is used for authenticating a message; where both the sender & the receiver NEED to IMPLEMENT the same KEY in order to start communicating.

16.

__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?(a) Security policies(b) Protocols(c) Wireless network(d) Network algorithmsThis question was addressed to me in an online interview.Question is taken from Security Protocols topic in section Cyber Security of Cyber Security

Answer»

Correct OPTION is (b) Protocols

Explanation: Network protocols are DESIGNED with mechanisms for IDENTIFYING devices and make CONNECTIONS between them. In addition, some proper rules are defined as to how data packets will be SENT and received.

17.

SSL primarily focuses on _______(a) integrity and authenticity(b) integrity and non-repudiation(c) authenticity and privacy(d) confidentiality and integrityI had been asked this question in my homework.My question is based upon Security Protocols in chapter Cyber Security of Cyber Security

Answer»

Right choice is (a) integrity and authenticity

Explanation: SSL PRIMARILY focuses on maintaining the integrity of the DATA. Also, it maintains authenticity which HELPS the CUSTOMERS feel secure to COMMUNICATE over the internet.

18.

HTTPS is abbreviated as _________(a) Hypertexts Transfer Protocol Secured(b) Secured Hyper Text Transfer Protocol(c) Hyperlinked Text Transfer Protocol Secured(d) Hyper Text Transfer Protocol SecureThe question was posed to me in quiz.Question is from Security Protocols in division Cyber Security of Cyber Security

Answer»

Right choice is (d) HYPER Text Transfer Protocol SECURE

To explain: Hyper Text Transfer Protocol Secure (HTTPS) is a SECURITY protocol which MAINTAINS security when data is sent from browser to server and vice versa. It denotes that all communication SETUP between the browser and the server is encrypted.

19.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.(a) True(b) FalseThis question was addressed to me in examination.This interesting question is from Security Protocols in portion Cyber Security of Cyber Security

Answer»

The correct CHOICE is (a) True

For explanation: TLS which has now become SSL (Secure Socket Layer) is one of the popular cryptographic PROTOCOLS developed to provide SECURITY to computer NETWORK while COMMUNICATION.

20.

Which of the following is not a secured mail transferring methodology?(a) POP3(b) SSMTP(c) Mail using PGP(d) S/MIMEI have been asked this question by my school principal while I was bunking the class.This is a very interesting question from Security Protocols topic in chapter Cyber Security of Cyber Security

Answer»

Right option is (a) POP3

The best explanation: POP (Post OFFICE Protocol) is a simple protocol which FETCHES the updated mail STORED for you by the server. S/MIME (Secure/Multipurpose Internet Mail Extensions), SSMTP (Secure-Simple Mail Transfer Protocol), and PGP (Pretty Good Privacy) are examples of PROTOCOLS and METHODS for secure mailing.

21.

Which of the following is not a strong security protocol?(a) HTTPS(b) SSL(c) SMTP(d) SFTPI had been asked this question at a job interview.Asked question is from Security Protocols topic in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (c) SMTP

The best I can explain: SMTP (is abbreviated as SIMPLE Mail Transfer Protocol) is a STANDARD protocol to transmit ELECTRONIC mail and is a widely used mail TRANSMITTING protocol.

22.

___________ ensures the integrity and security of data that are passing over a network.(a) Firewall(b) Antivirus(c) Pentesting Tools(d) Network-security protocolsThe question was asked during a job interview.Origin of the question is Security Protocols in chapter Cyber Security of Cyber Security

Answer»

Right OPTION is (d) Network-security PROTOCOLS

To explain I WOULD say: The methods and processes in securing network data from unauthorized CONTENT extraction are controlled by network-security protocols.