Data Communication and Networking MCQs

M

Mr. Dubey • 53.05K Points
Coach

Q 101. Substitutional cipers are

(A) Monoalphabatic
(B) Sami alphabetic
(C) polyalphabetic
(D) both a and c

M

Mr. Dubey • 53.05K Points
Coach

Q 102. Shift cipher is sometimes referred to as the

(A) Caesar cipher
(B) Shift cipher
(C) cipher
(D) cipher text

M

Mr. Dubey • 53.05K Points
Coach

Q 103. We use Cryptography term to transforming messages to make them secure and immune to

(A) Change
(B) Idle
(C) Attacks
(D) Defend

M

Mr. Dubey • 53.05K Points
Coach

Q 104. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

(A) Authenticated
(B) Joined
(C) Submit
(D) Separate

M

Mr. Dubey • 53.05K Points
Coach

Q 105. A straight permutation cipher or a straight P-box has same number of inputs as

(A) cipher
(B) Frames
(C) Outputs
(D) Bits

M

Mr. Dubey • 53.05K Points
Coach

Q 106. An asymmetric-key (or public-key) cipher uses

(A) 1 Key
(B) 2 Key
(C) 3 Key
(D) 4 Key

M

Mr. Dubey • 53.05K Points
Coach

Q 107. In OSI model dialogue control and token management are responsibilities of ?

(A) Session Layer
(B) Network layer
(C) Transport layer
(D) Data link layer

M

Mr. Dubey • 53.05K Points
Coach

Q 108. What is Unicode?

(A) Represents symbol or characters used in any langua
(B) Only few languages are supported
(C) Supports only few characters
(D) Characters from A to Z

M

Mr. Dubey • 53.05K Points
Coach

Q 109. A high speed communication equipment typically would not be needed for

(A) E-mail
(B) Transferring large volume of data
(C) Supporting communication between nodes in a LAN
(D) All of these

M

Mr. Dubey • 53.05K Points
Coach

Q 110. The ASCII encoding of binary data is called

(A) base 64 encoding
(B) base 32 encoding
(C) base 16 encoding
(D) base 8 encoding

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image