Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

101.

What is the first address of group 3?(a) 190.100.128.63/26(b) 190.100.128.0/26(c) 190.100.128.64/26(d) 190.100.128.127/25I have been asked this question in an interview for internship.I'd like to ask this question from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT answer is (B) 190.100.128.0/26

To elaborate: Find the IP address USING basic NETWORKING concepts.
102.

An ISP has requested a block of 1000 addresses. How many blocks are granted to it?(a) 512(b) 1000(c) 1024(d) None of the mentionedI have been asked this question at a job interview.My doubt is from Classless Addressing topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT answer is (C) 1024

The BEST I can explain: The number of BLOCKS allotted can only be in the powers of 2.
103.

CIDR stands for –(a) Class In Domain Range(b) Classless Inter Domain Routing(c) Classless In Domain Range(d) None of the mentioned.I have been asked this question by my college director while I was bunking the class.My doubt stems from Classless Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct option is (B) CLASSLESS Inter Domain Routing

The BEST I can explain: CIDR stands for Classless Inter Domain Routing.

104.

The following IPv4 addresses in hexadecimal notation is – 10000001 00001011 00001011 11101111-(a) 0x810B0BEF(b) 0x810D0AFF(c) 0x810B0BFE(d) 0x810C0CEFI got this question in an internship interview.I'd like to ask this question from IP Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct answer is (a) 0x810B0BEF

The explanation: We replace each GROUP of 4 bits with its hexadecimal equivalent. Note that 0X (or 0x) is ADDED at the beginning or the SUBSCRIPT 16 at the end. 0x810B0BEF or 810B0BEF_16.

105.

A classless address is given as 167.199.170.82/27. Find the last address.(a) 167.199.170.95(b) 167.199.170.256(c) 167.199.170.128(d) 167.199.170.88I have been asked this question in an interview for job.My doubt stems from Classless Addressing topic in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right CHOICE is (a) 167.199.170.95

Best EXPLANATION: LAST address = (any address) OR [NOT (network MASK)].

106.

What is the error (if any) in the following representation – 11100010.23.14.67?(a) There should be no leading zeros(b) We cannot have more than 4 bytes in an IPv4 address(c) Each byte should be less than or equal to 255(d) None of the mentionedI have been asked this question in an interview for job.My doubt is from IP Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct choice is (d) None of the mentioned

The explanation is: The ERROR is that there is a mixture of BINARY and dotted-decimal NOTATION.

107.

In the Handshake protocol action,which is the last step of the Phase 2 : Server Authentication and Key Exchange?(a) server_done(b) server_key_exchange(c) certificate_request(d) crtificate_verifyI got this question in my homework.The above asked question is from Secure Socket Layer in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT ANSWER is (a) server_done

For explanation: The last STEP of the Phase 2 is the server_done step.

108.

Which one of the following is not a higher –layer SSL protocol?(a) Alert Protocol(b) Handshake Protocol(c) Alarm Protocol(d) Change Cipher Spec ProtocolI had been asked this question during an internship interview.The origin of the question is Secure Socket Layer topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (c) Alarm Protocol

For EXPLANATION: THREE higher –layer protocols are defined as part of SSL: The Handshake Protocol, The Change Cipher SPEC Protocol and The Alert Protocol.

109.

What is the suffix length for group 1?(a) 8(b) 16(c) 24(d) None of the mentionedThis question was addressed to me in exam.My doubt is from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT OPTION is (a) 8

The best explanation: 64 customers, each needs 256 addresses

Suffix LENGTH = 8 (2^8=256)

110.

The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.(a) True(b) FalseThe question was posed to me in an online interview.This intriguing question comes from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT option is (a) True

The explanation: The statement is true.The SSH Connection Protocol does run on top of the SSH TRANSPORT LAYER Protocol.
111.

Which is not a channel recognized by the SSH connection protocol?(a) session(b) backward-tcpip(c) direct-tcpip(d) x11I got this question by my school principal while I was bunking the class.This intriguing question comes from Secure Shell(SSH) topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» RIGHT ANSWER is (B) backward-tcpip

To ELABORATE: Backward-tcpip is not a CHANNEL.
112.

The protocol ‘POP’ stands for-(a) Personal Office Protocol(b) Post Office Protocol(c) Privacy Overall Protocol(d) Privacy Over ProtocolThis question was posed to me in an international level competition.My query is from Secure Shell(SSH) topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct answer is (B) POST Office Protocol

The explanation: ‘POPSTANDS for Post Office Protocol.

113.

Which of the following is not a secure shell protocol?(a) Transport Layer Protocol(b) Secure Layer Protocol(c) Connection Protocol(d) User Authentication ProtocolThis question was posed to me by my college director while I was bunking the class.Question is taken from Secure Shell(SSH) in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT CHOICE is (b) SECURE Layer Protocol

The explanation: SSH is organised as three PROTOCOLS – Transport Layer Protocol, User Authentication Protocol and Connection Protocol.
114.

What is the recommended MAC algorithm for the SSH Transport Layer?(a) HMAC – MD5(b) HMAC – MD5 – 96(c) HMAC SHA1 – 96(d) HMAC SHA1The question was asked during an interview.I want to ask this question from Secure Shell(SSH) in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer» CORRECT option is (c) HMAC SHA1 – 96

Easy explanation: The recommended MAC algorithm for the SSH Transport LAYER is the HMAC SHA1 – 96.
115.

After the encryption stage in SSL, the maximum length of each fragment is(a) 2^14+1028(b) 2^14+2048(c) 2^16+1028(d) 2^16+2048This question was addressed to me by my school teacher while I was bunking the class.Asked question is from Secure Socket Layer topic in chapter Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct ANSWER is (b) 2^14+2048

Easy EXPLANATION: Encryption may not INCREASE the CONTENT length by more than 1024 bytes, so thetotal length may not EXCEED 2^14+2048.

116.

Network address is given by –(a) 0.0.0.0(b) 127.x.x.x(c) 255.255.255.255(d) None of the mentionedI got this question during a job interview.Origin of the question is Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right option is (a) 0.0.0.0

To explain I would say: Network address is GIVEN by 0.0.0.0. It is reserved for COMMUNICATION when a host NEEDS to SEND an IPv4 PACKET but it does not know its own address.

117.

Loopback address is given by –(a) 0.0.0.0(b) 127.x.x.x(c) 255.255.255.255(d) None of the mentionedI got this question in an interview for job.Enquiry is from Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The correct choice is (B) 127.x.x.x

To explain: Loopback ADDRESS is GIVEN by 127.x.x.x

118.

What is the suffix length for group 3?(a) 7(b) 6(c) 5(d) None of the mentionedThis question was posed to me by my college professor while I was bunking the class.The query is from Designing Subnets in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct OPTION is (B) 6

To elaborate: 128 customers, each NEEDS 64 addresses

Suffix LENGTH = 6 (2^6=64).

119.

The subnet mask nsub3=(a) 28(b) 27(c) 26(d) 24The question was posed to me during an interview for a job.This intriguing question comes from Designing Subnets topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT ANSWER is (a) 28

Explanation: The SUBNET MASK nsub3= n+log2(N/Nsub3) = 28.

120.

An organization is granted the block 130.34.12.64/26. The organization needs four subnetworks, each with an equal number of hosts. What is the number of addresses to each subnetwork?(a) 4(b) 16(c) 8(d) 32The question was asked in a national level competition.My question is from Designing Subnets in division Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct answer is (b) 16

For EXPLANATION: N = 2^(32-36) = 64.

Nsub= N/No. of subnetworks = 64/4 = 16.

121.

No. of address in the block= N= NOT(mask)+1.(a) True(b) FalseI got this question during an internship interview.The question is from Classless Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Right OPTION is (a) TRUE

For EXPLANATION: The statement is true.

122.

Which of the following is true for classless addressing?(a) The addresses are contiguous(b) The number of addresses is a power of 2 (16 = 24), and the first address is divisible by 16(c) The first address, when converted to a decimal number, is 3,440,387,360, which when divided by 16 results in 215,024,210(d) All of the mentionedI had been asked this question in final exam.I need to ask this question from Classless Addressing in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT OPTION is (d) All of the mentioned

To ELABORATE: All the STATEMENTS are TRUE.

123.

The value ‘n’ in classless addressing is referred to as –(a) prefix length(b) suffix length(c) intermediate length(d) none of the mentionedI had been asked this question in an interview.Origin of the question is Classless Addressing topic in section Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

The CORRECT OPTION is (a) prefix LENGTH

For explanation: ‘n’ is referred to as prefix length.

124.

What is the size of the Host ID in Class C?(a) 24 bits(b) 16 bits(c) 8 bits(d) 14 bitsThis question was posed to me in semester exam.This intriguing question originated from Classful Addressing topic in portion Internet Protocol, Network Addressing and Transport Level Security of Cryptograph & Network Security

Answer»

Correct choice is (C) 8 bits

To explain I WOULD SAY: The SIZE of the Host ID in Class C is 8 bits.