PYTORCH QUIZ DESCRIPTION

In the SSL record protocol operation pad_1 is -

  •  is the byte 0x36 repeated 40 times for MD5
     

  • is the byte 0x5C repeated 40 times for MD5
     

  •  is the byte 0x5C repeated 48 times for SHA1 
     

  •  is the byte 0x36 repeated 48 times for MD5

The certificate message is required for any agreed-on key exchange method except__

  • Ephemeral Diffie-Hellman 
     

  •  Anonymous Diffie-Hellman
     

  • Fixed Diffie-Hellman
     

  •  RSA

Which protocol is used for the purpose of copying the pending state into the current state?

  • Alert Protocol
     

  • Handshake Protocol
     

  • Upper-Layer Protocol
     

  • Change Cipher Spec Protocol

In the Key generation procedure, the Integrity Key from the client to server is represented as:

  • HASH(K||H||"E"|| session_id)
     

  •  HASH(K||H||"C" || session_id)
     

  • HASH(K||H||"B"|| session_id)
     

  • HASH(K||H||"D"|| session_id)

For duplex communication we can't use___

  • Long Polling 
     

  • HTML5
     

  •  JavaScript
     

  • Streaming

The certificate_request massage includes  two parameters, one of which is 

  • certificate_extension
     

  • certificate_creation
     

  • certificate_exchange 
     

  • certificate_type

The RSA signature uses which hash algorithm?

  • MD5
     

  •  SHA-1
     

  •  MD5 and SHA-1
     

  • None of the mentioned.

The DSS signature uses which hash algorithm?

  •  MD5
     

  •  SHA-2
     

  • SHA-1
     

  • Does not use hash algorithm

After the encryption stage in SSL, the maximum length of each fragment is 

  • 2^14+1028
     

  • 2^14+2048
     

  • 2^16+1028
     

  • 2^16+2048

The ____________package in PyTorch abstracts the idea of an optimization algorithm and provides implementations of commonly used optimization algorithms.
 

  • Optim 
     

  • Tensor
     

  • numpy
     

  • None Of these 

In desktop which browser does not support WebSocket?

  • Chrome version 7
     

  •  Chrome version 6
     

  •  Chrome version 43 
     

  •  Internet Explorer 10

In TensorFlow, packages like ________ provide higher-level abstractions over raw computational graphs that are useful for building neural networks.
 

  • Keras 
     

  • TenserFlow-Slim 
     

  • TELearn

     

  • All Of The Above  
     

In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

  • Fortezza
     

  • Anonymous Diffie-Hellman
     

  • Fixed Diffie-Hellman
     

  •  RSA

Which of the following are the advantages of PyTorch?
 

  • It is easy to debug and understand the code
     

  •  It includes many layers as Torch
     

  •  It includes lot of loss functions
     

  • All of the above    

In the handshake protocol which is the message type first sent between client and server?

  •  server_hello
     

  •  client_hello
     

  • hello_request 
     

  • certificate_request

The nn package defines a set of Modules, which are roughly equivalent to neural network layers.

  • Modules 
     

  • Layers
     

  • Groups
     

  • None of these

Messages from the server are received by

  • onmessage
     

  •  send
     

  •  arrayBuffer
     

  • blob

The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) -CertificateVerify.signature.md5_hash MD5(master_secret || pad_2 ||MD5(handshake_messages ||master_secret || pad_1).Is there any error? If so, what

  • Yes. pad_1 and pad_2 should be interchanged
     

  •  Yes. pad's should be present towards the end
     

  • Yes. master_key should not be used, the pre_master key should be used

     

  •  No Error

Which of the following are possible sizes of MACS?

i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes

  • i and iii
     

  • ii only
     

  •  ii and iii 
     

  • ii iii and iv

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

  • 42 bytes
     

  • 32 bytes
     

  • 36 bytes
     

  •  48 bytes

________ is an imperative n-dimensional array which runs on GPU.
 

  • Variable
     

  • Tensor 
     

  •  Module
     

  • All of the above

Number of phases in the handshaking protocol?

  • 2

  • 3

  • 4

  • 5

The__________ function computes output Tensors from input Tensors. 

  • Forward (ans)
     

  • Backward
     

  • None of these
     

  • both

Which of the following is not the event of WebSocket API?

  • Close
     

  • Message
     

  •  Send
     

  • Error

A Tensor is an _________________

  • Dimensional Array
     

  • Bi-dimentional Array
     

  • n-dimensional Array  
     

  • None of these

The full form of SSL is 

  • Serial Session Layer
     

  •  Secure Socket Layer
     

  • Session Secure Layer
     

  •  Series Socket Layer
     

Which of the following is the server library for Node.js? 

  •  Caddy
     

  • SignalR
     

  •  ws
     

  •  jsonrpc

Which protocol is used to convey SSL related alerts to the peer entity? 

  • Alert Protocol
     

  • Handshake Protocol
     

  •  Upper-Layer Protocol
     

  • Change Cipher Spec Protocol

The Conv1d and Conv2D is used to apply 1D and 2D convolution.

  • TRUE 
     

  • FALSE
     

  •  Can be true or false
     

  • Can not say

Which of the following is not associated with web socket communication?

  • https
     

  • wss
     

  • ws
     

  • http