Explore topic-wise MCQs in Computer Networks.

This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.

1.

An electronic document that establishes your credentials when you are performing transactions.

A. Digital code
B. OTP
C. E-mail
D. Digital certificate
Answer» E.
2.

Encryption standard that is selected by the US government to replace DES.

A. AES
B. BES
C. CES
D. DES
Answer» B. BES
3.

Triple-DES has ______ keys.

A. 1
B. 2
C. 5
D. 4
Answer» C. 5
4.

These ciphers replace a character or characters with a different character or characters, based on some key.

A. Polyalphabetic substitution based
B. Transposition-based
C. Substitution based
D. Mono alphabetic substitution based
Answer» E.
5.

ENCRYPTION_STANDARD_THAT_IS_SELECTED_BY_THE_US_GOVERNMENT_TO_REPLACE_DES.?$

A. AES
B. BES
C. CES
D. DES
Answer» B. BES
6.

ELGAMAL_ENCRYPTION_SYSTEM_IS?$

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Answer» C. not an encryption algorithm
7.

An electronic document that establishes your credentials when you are performing transactions.$

A. Digital code
B. OTP
C. E-mail
D. Digital certificate
Answer» E.
8.

Cryptographic_hash_function_takes_an_arbitrary_block_of_data_and_returns$

A. fixed size bit string
B. variable size bit string
C. both fixed size bit string and variable size bit string
D. none of the mentioned
Answer» B. variable size bit string
9.

Triple-DES has ______ keys?

A. 1
B. 2
C. 5
D. 4
Answer» C. 5
10.

Voice privacy in GSM cellular telephone protocol is provided b?

A. A5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» B. b5/4 cipher
11.

Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.

A. 64
B. 8
C. 16
D. 4
Answer» D. 4
12.

DES stands for?

A. Data Encryption Standard
B. Data Encryption Statistics
C. Data Encryption System
D. Data Encryption Sequence
Answer» B. Data Encryption Statistics
13.

In public key cryptography, a key that decrypts the message.

A. public key
B. unique key
C. private key
D. security key
Answer» D. security key
14.

An encryption technique with 2 keys is ______________

A. Monoalphabetic Cipher
B. Cryptography
C. Private key cryptography
D. Public key cryptography
Answer» E.
15.

A type of cipher that uses multiple alphabetic strings.

A. Substitution based
B. Transposition-based
C. Polyalphabetic substitution based
D. Mono alphabetic substitution based
Answer» D. Mono alphabetic substitution based
16.

Encryption is the study of creating and using decryption techniques.

A. True
B. False
Answer» C.