Data Communication and Networking MCQs
M
Q 101. Substitutional cipers are
M
Q 102. Shift cipher is sometimes referred to as the
M
Q 103. We use Cryptography term to transforming messages to make them secure and immune to
M
Q 104. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
M
Q 105. A straight permutation cipher or a straight P-box has same number of inputs as
M
Q 106. An asymmetric-key (or public-key) cipher uses
M
Q 107. In OSI model dialogue control and token management are responsibilities of ?
M
Q 108. What is Unicode?
M
Q 109. A high speed communication equipment typically would not be needed for
M