Home / Engineering / Computer Networks MCQs / Page 20

Computer Networks MCQs | Page - 20

Dear candidates you will find MCQ questions of Computer Networks here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.17K Points
Coach

Q. 191) What is data encryption standard (DES)?

(A) block cipher
(B) stream cipher
(C) bit cipher
(D) none of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 192) Cryptanalysis is used

(A) to find some insecurity in a cryptographic scheme
(B) to increase the speed
(C) to encrypt the data
(D) none of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 193) Which one of the following is a cryptographic protocol used to secure HTTP connection?

(A) stream control transmission protocol (sctp)
(B) transport layer security (tsl)
(C) explicit congestion notification (ecn)
(D) resource reservation protocol
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 194) Voice privacy in GSM cellular telephone protocol is provided by

(A) a5/2 cipher
(B) b5/4 cipher
(C) b5/6 cipher
(D) b5/8 cipher
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 195) ElGamal encryption system is

(A) symmetric key encryption algorithm
(B) asymmetric key encryption algorithm
(C) not an encryption algorithm
(D) none of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 196) Cryptographic hash function takes an arbitrary block of data and returns

(A) fixed size bit string
(B) variable size bit string
(C) both (a) and (b)
(D) none of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 197) The attackers a network of compromised devices known as

(A) internet
(B) botnet
(C) telnet
(D) d-net
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 198) Which of the following is a form of DoS attack ?

(A) vulnerability attack
(B) bandwidth flooding
(C) connection flooding
(D) all of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 199) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

(A) vulnerability attack
(B) bandwidth flooding
(C) connection flooding
(D) all of the mentioned
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 200) The DoS attack is which the attacker sends deluge of packets to the targeted host

(A) vulnerability attack
(B) bandwidth flooding
(C) connection flooding
(D) all of the mentioned
View Answer Discuss Share

Explore Sets

Computer Networks MCQs Set 1

Computer Networks MCQs Set 2

Computer Networks MCQs Set 3

Computer Networks MCQs Set 4

Computer Networks MCQs Set 5

Computer Networks MCQs Set 6

Computer Networks MCQs Set 7

Computer Networks MCQs Set 8

Computer Networks MCQs Set 9

Computer Networks MCQs Set 10

Computer Networks MCQs Set 11

Computer Networks MCQs Set 12

Computer Networks MCQs Set 13

Computer Networks MCQs Set 14

Computer Networks MCQs Set 15

Computer Networks MCQs Set 16

Computer Networks MCQs Set 17

Computer Networks MCQs Set 18

Computer Networks MCQs Set 19

Computer Networks MCQs Set 20

Computer Networks MCQs Set 21

Computer Networks MCQs Set 22

Computer Networks MCQs Set 23

Computer Networks MCQs Set 24

Computer Networks MCQs Set 25

Computer Networks MCQs Set 26

Computer Networks MCQs Set 27

Computer Networks MCQs Set 28

Computer Networks MCQs Set 29

Computer Networks MCQs Set 30

Computer Networks MCQs Set 31

Computer Networks MCQs Set 32

Computer Networks MCQs Set 33

Computer Networks MCQs Set 34

Computer Networks MCQs Set 35

Computer Networks MCQs Set 36

Computer Networks MCQs Set 37

Computer Networks MCQs Set 38

Computer Networks MCQs Set 39

Computer Networks MCQs Set 40

Computer Networks MCQs Set 41

Computer Networks MCQs Set 42

Computer Networks MCQs Set 43

Computer Networks MCQs Set 44

Computer Networks MCQs Set 45

Computer Networks MCQs Set 46

Computer Networks MCQs Set 47

Computer Networks MCQs Set 48

Computer Networks MCQs Set 49

Computer Networks MCQs Set 50

Computer Networks MCQs Set 51

Computer Networks MCQs Set 52

Computer Networks MCQs Set 53

Computer Networks MCQs Set 54

Computer Networks MCQs Set 55

Computer Networks MCQs Set 56

Computer Networks MCQs Set 57

Computer Networks MCQs Set 58

Computer Networks MCQs Set 59

Computer Networks MCQs Set 60

Computer Networks MCQs Set 61

Computer Networks MCQs Set 62

Computer Networks MCQs Set 63

Computer Networks MCQs Set 64

Computer Networks MCQs Set 65

Computer Networks MCQs Set 66

Computer Networks MCQs Set 67

Computer Networks MCQs Set 68

Computer Networks MCQs Set 69

Computer Networks MCQs Set 70

Computer Networks MCQs Set 71

Computer Networks MCQs Set 72

Computer Networks MCQs Set 73

Computer Networks MCQs Set 74

Computer Networks MCQs Set 75

Computer Networks MCQs Set 76

Computer Networks MCQs Set 77

Computer Networks MCQs Set 78

Computer Networks MCQs Set 79

Computer Networks MCQs Set 80

Computer Networks MCQs Set 81

Computer Networks MCQs Set 82

Computer Networks MCQs Set 83

Computer Networks MCQs Set 84

Computer Networks MCQs Set 85

Computer Networks MCQs Set 86

Computer Networks MCQs Set 87

Computer Networks MCQs Set 88

Computer Networks MCQs Set 89

Computer Networks MCQs Set 90

Computer Networks MCQs Set 91

Computer Networks MCQs Set 92

Computer Networks MCQs Set 93

Computer Networks MCQs Set 94

Computer Networks MCQs Set 95

Computer Networks MCQs Set 96