This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
What is the first address of group 3?(a) 190.100.128.63/26(b) 190.100.128.0/26(c) 190.100.128.64/26(d) 190.100.128.127/25I have been asked this question in an interview for internship.I'd like to ask this question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT answer is (B) 190.100.128.0/26 To elaborate: Find the IP address USING basic NETWORKING concepts. |
|
| 102. |
An ISP has requested a block of 1000 addresses. How many blocks are granted to it?(a) 512(b) 1000(c) 1024(d) None of the mentionedI have been asked this question at a job interview.My doubt is from Classless Addressing topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT answer is (C) 1024 The BEST I can explain: The number of BLOCKS allotted can only be in the powers of 2. |
|
| 103. |
CIDR stands for –(a) Class In Domain Range(b) Classless Inter Domain Routing(c) Classless In Domain Range(d) None of the mentioned.I have been asked this question by my college director while I was bunking the class.My doubt stems from Classless Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct option is (B) CLASSLESS Inter Domain Routing |
|
| 104. |
The following IPv4 addresses in hexadecimal notation is – 10000001 00001011 00001011 11101111-(a) 0x810B0BEF(b) 0x810D0AFF(c) 0x810B0BFE(d) 0x810C0CEFI got this question in an internship interview.I'd like to ask this question from IP Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct answer is (a) 0x810B0BEF |
|
| 105. |
A classless address is given as 167.199.170.82/27. Find the last address.(a) 167.199.170.95(b) 167.199.170.256(c) 167.199.170.128(d) 167.199.170.88I have been asked this question in an interview for job.My doubt stems from Classless Addressing topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right CHOICE is (a) 167.199.170.95 |
|
| 106. |
What is the error (if any) in the following representation – 11100010.23.14.67?(a) There should be no leading zeros(b) We cannot have more than 4 bytes in an IPv4 address(c) Each byte should be less than or equal to 255(d) None of the mentionedI have been asked this question in an interview for job.My doubt is from IP Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct choice is (d) None of the mentioned |
|
| 107. |
In the Handshake protocol action,which is the last step of the Phase 2 : Server Authentication and Key Exchange?(a) server_done(b) server_key_exchange(c) certificate_request(d) crtificate_verifyI got this question in my homework.The above asked question is from Secure Socket Layer in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT ANSWER is (a) server_done |
|
| 108. |
Which one of the following is not a higher –layer SSL protocol?(a) Alert Protocol(b) Handshake Protocol(c) Alarm Protocol(d) Change Cipher Spec ProtocolI had been asked this question during an internship interview.The origin of the question is Secure Socket Layer topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (c) Alarm Protocol |
|
| 109. |
What is the suffix length for group 1?(a) 8(b) 16(c) 24(d) None of the mentionedThis question was addressed to me in exam.My doubt is from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (a) 8 |
|
| 110. |
The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.(a) True(b) FalseThe question was posed to me in an online interview.This intriguing question comes from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT option is (a) True The explanation: The statement is true.The SSH Connection Protocol does run on top of the SSH TRANSPORT LAYER Protocol. |
|
| 111. |
Which is not a channel recognized by the SSH connection protocol?(a) session(b) backward-tcpip(c) direct-tcpip(d) x11I got this question by my school principal while I was bunking the class.This intriguing question comes from Secure Shell(SSH) topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» RIGHT ANSWER is (B) backward-tcpip To ELABORATE: Backward-tcpip is not a CHANNEL. |
|
| 112. |
The protocol ‘POP’ stands for-(a) Personal Office Protocol(b) Post Office Protocol(c) Privacy Overall Protocol(d) Privacy Over ProtocolThis question was posed to me in an international level competition.My query is from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct answer is (B) POST Office Protocol |
|
| 113. |
Which of the following is not a secure shell protocol?(a) Transport Layer Protocol(b) Secure Layer Protocol(c) Connection Protocol(d) User Authentication ProtocolThis question was posed to me by my college director while I was bunking the class.Question is taken from Secure Shell(SSH) in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT CHOICE is (b) SECURE Layer Protocol The explanation: SSH is organised as three PROTOCOLS – Transport Layer Protocol, User Authentication Protocol and Connection Protocol. |
|
| 114. |
What is the recommended MAC algorithm for the SSH Transport Layer?(a) HMAC – MD5(b) HMAC – MD5 – 96(c) HMAC SHA1 – 96(d) HMAC SHA1The question was asked during an interview.I want to ask this question from Secure Shell(SSH) in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» CORRECT option is (c) HMAC SHA1 – 96 Easy explanation: The recommended MAC algorithm for the SSH Transport LAYER is the HMAC SHA1 – 96. |
|
| 115. |
After the encryption stage in SSL, the maximum length of each fragment is(a) 2^14+1028(b) 2^14+2048(c) 2^16+1028(d) 2^16+2048This question was addressed to me by my school teacher while I was bunking the class.Asked question is from Secure Socket Layer topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct ANSWER is (b) 2^14+2048 |
|
| 116. |
Network address is given by –(a) 0.0.0.0(b) 127.x.x.x(c) 255.255.255.255(d) None of the mentionedI got this question during a job interview.Origin of the question is Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right option is (a) 0.0.0.0 |
|
| 117. |
Loopback address is given by –(a) 0.0.0.0(b) 127.x.x.x(c) 255.255.255.255(d) None of the mentionedI got this question in an interview for job.Enquiry is from Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The correct choice is (B) 127.x.x.x |
|
| 118. |
What is the suffix length for group 3?(a) 7(b) 6(c) 5(d) None of the mentionedThis question was posed to me by my college professor while I was bunking the class.The query is from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct OPTION is (B) 6 |
|
| 119. |
The subnet mask nsub3=(a) 28(b) 27(c) 26(d) 24The question was posed to me during an interview for a job.This intriguing question comes from Designing Subnets topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT ANSWER is (a) 28 |
|
| 120. |
An organization is granted the block 130.34.12.64/26. The organization needs four subnetworks, each with an equal number of hosts. What is the number of addresses to each subnetwork?(a) 4(b) 16(c) 8(d) 32The question was asked in a national level competition.My question is from Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct answer is (b) 16 |
|
| 121. |
No. of address in the block= N= NOT(mask)+1.(a) True(b) FalseI got this question during an internship interview.The question is from Classless Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Right OPTION is (a) TRUE |
|
| 122. |
Which of the following is true for classless addressing?(a) The addresses are contiguous(b) The number of addresses is a power of 2 (16 = 24), and the first address is divisible by 16(c) The first address, when converted to a decimal number, is 3,440,387,360, which when divided by 16 results in 215,024,210(d) All of the mentionedI had been asked this question in final exam.I need to ask this question from Classless Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (d) All of the mentioned |
|
| 123. |
The value ‘n’ in classless addressing is referred to as –(a) prefix length(b) suffix length(c) intermediate length(d) none of the mentionedI had been asked this question in an interview.Origin of the question is Classless Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (a) prefix LENGTH |
|
| 124. |
What is the size of the Host ID in Class C?(a) 24 bits(b) 16 bits(c) 8 bits(d) 14 bitsThis question was posed to me in semester exam.This intriguing question originated from Classful Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security |
|
Answer» Correct choice is (C) 8 bits |
|