Home / Engineering / Network Security MCQs / Page 3

Network Security MCQs | Page - 3

Dear candidates you will find MCQ questions of Network Security here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 21) In symmetric-key cryptography, the key locks and unlocks the box is

(A) Same
(B) shared
(C) private
(D) Public
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 22) The ciphers of today are called round ciphers because they involve

(A) Single Round
(B) Double Rounds
(C) Multiple Round
(D) Round about
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 23) Symmetric-key cryptography started thousands of years ago when people needed to exchange

(A) Files
(B) Packets
(C) Secrets
(D) Tr
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 24) The Advanced Encryption Standard (AES) was designed

(A) National Institute of Standards and Technology
(B) IBM
(C) HP
(D) Intel
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 25) The Mobile Application Protocol (MAP) typically runs on top of which protocol ?

(A) SNMP (Simple Network Management Protocol)
(B) SMTP (Simple Mail Transfer Protocol)
(C) SS7 (Signalling System 7)
(D) HTTP (Hyper Text Tr
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 26) If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment.

(A) First
(B) Middle
(C) Last
(D) Four
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 27) The design issue of Datalink Layer in OSI Reference Model is

(A) Framing
(B) Representation of bits
(C) Synchronization of bits
(D) Connection control
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 28) Data Encryption Techniques are particularly used for _______.

(A) protecting data in Data Communication System
(B) reduce Storage Space Requirement
(C) enhances Data Integrity
(D) decreases Data Integrity
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 29) An example of a layer that is absent in broadcast networks is:

(A) Physical layer
(B) Presentation layer
(C) Network layer Application layer
(D) none
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 30) Encryption and Decryption is the responsibility of ___ Layer.

(A) Physical
(B) Network
(C) Application
(D) Datalink
View Answer Discuss Share