Top 1000+ Solved Computer Networks MCQ Questions Answer

From 886 to 900 of 952

Q. In cryptography, what is cipher?

a. algorithm for performing encryption and decryption

b. encrypted message

c. both (a) and (b)

d. none of the mentioned

  • a. algorithm for performing encryption and decryption

Q. In asymmetric key cryptography, the private key is kept by

a. sender

b. receiver

c. sender and receiver

d. all the connected devices to the network

  • b. receiver

Q. Which one of the following algorithm is not used in asymmetric key cryptography?

a. rsa algorithm

b. diffie-hellman algorithm

c. electronic code book algorithm

d. none of the mentioned

  • c. electronic code book algorithm

Q. In cryptography, the order of the letters in a message is rearranged by

a. transpositional ciphers

b. substitution ciphers

c. both (a) and (b)

d. none of the mentioned

  • a. transpositional ciphers

Q. What is data encryption standard (DES)?

a. block cipher

b. stream cipher

c. bit cipher

d. none of the mentioned

  • a. block cipher

Q. Cryptanalysis is used

a. to find some insecurity in a cryptographic scheme

b. to increase the speed

c. to encrypt the data

d. none of the mentioned

  • a. to find some insecurity in a cryptographic scheme

Q. Which one of the following is a cryptographic protocol used to secure HTTP connection?

a. stream control transmission protocol (sctp)

b. transport layer security (tsl)

c. explicit congestion notification (ecn)

d. resource reservation protocol

  • b. transport layer security (tsl)

Q. Voice privacy in GSM cellular telephone protocol is provided by

a. a5/2 cipher

b. b5/4 cipher

c. b5/6 cipher

d. b5/8 cipher

  • a. a5/2 cipher

Q. ElGamal encryption system is

a. symmetric key encryption algorithm

b. asymmetric key encryption algorithm

c. not an encryption algorithm

d. none of the mentioned

  • b. asymmetric key encryption algorithm

Q. Cryptographic hash function takes an arbitrary block of data and returns

a. fixed size bit string

b. variable size bit string

c. both (a) and (b)

d. none of the mentioned

  • a. fixed size bit string

Q. The attackers a network of compromised devices known as

a. internet

b. botnet

c. telnet

d. d-net

  • b. botnet

Q. Which of the following is a form of DoS attack ?

a. vulnerability attack

b. bandwidth flooding

c. connection flooding

d. all of the mentioned

  • d. all of the mentioned

Q. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

a. vulnerability attack

b. bandwidth flooding

c. connection flooding

d. all of the mentioned

  • c. connection flooding

Q. The DoS attack is which the attacker sends deluge of packets to the targeted host

a. vulnerability attack

b. bandwidth flooding

c. connection flooding

d. all of the mentioned

  • b. bandwidth flooding

Q. Packet sniffers involve

a. active receiver

b. passive receiver

c. both of the mentioned

d. none of the mentioned

  • b. passive receiver
Subscribe Now

Get All Updates & News