MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The type of encoding in which manipulation of bit streams without regard to what the bits mean is |
| A. | Destination encoding |
| B. | Entropy encoding |
| C. | Source encoding |
| D. | Differential encoding |
| Answer» C. Source encoding | |
| 2. |
The number of subkeys generated in IDEA algorithm are .. |
| A. | 54 |
| B. | 48 |
| C. | 52 |
| D. | 50 |
| Answer» D. 50 | |
| 3. |
Number of S boxes used in DES algorithm is |
| A. | 4 |
| B. | 8 |
| C. | 16 |
| D. | 32 |
| Answer» C. 16 | |
| 4. |
The . portion of LAN management software restricts access, records user activities and audit data etc. |
| A. | Configuration management |
| B. | Security management |
| C. | Performance management |
| D. | None of these |
| Answer» C. Performance management | |
| 5. |
The length of the key in one time pad method is .. |
| A. | Random |
| B. | Fixed |
| C. | 64 |
| D. | 56 |
| Answer» B. Fixed | |
| 6. |
is an example for public key algorithm. |
| A. | RSA |
| B. | DES |
| C. | IREA |
| D. | RC5 |
| Answer» B. DES | |
| 7. |
Caesar cipher is represented as .. |
| A. | C = (p+3)mod3 |
| B. | C = (p+26)mod3 |
| C. | C = (p-3)mod26 |
| D. | C = (p+3)mod26 |
| Answer» E. | |
| 8. |
.transform message into format (cyber text) that cannot be read by hackers. |
| A. | Decryption |
| B. | Encryption |
| C. | Transformation |
| D. | None of these |
| Answer» C. Transformation | |
| 9. |
Firewalls are used for . |
| A. | Routing |
| B. | Security |
| C. | Tunnelling |
| D. | Congestion control |
| Answer» C. Tunnelling | |
| 10. |
.. ..is used to validate the identity of the message sender to the recipient. |
| A. | Encryption |
| B. | Decryption |
| C. | Digital certificate |
| D. | None of these |
| Answer» D. None of these | |