Top 150+ Solved Data Communication and Networking MCQ Questions Answer
Q. Transmission control protocol is
a. connection oriented protocol
b. uses a three way handshake to establish a connection
c. recievs data from application as a single stream
d. all of the above
Q. An endpoint of an inter-process communication flow across a computer network is called
a. socket
b. pipe
c. port
d. none of the above
Q. Transport layer aggregates data from different applications into a single stream beforepassing it to
a. network layer
b. data link layer
c. application layer
d. physical layer
Q. The ASCII encoding of binary data is called
a. base 64 encoding
b. base 32 encoding
c. base 16 encoding
d. base 8 encoding
Q. A high speed communication equipment typically would not be needed for
a. E-mail
b. Transferring large volume of data
c. Supporting communication between nodes in a LAN
d. All of these
Q. What is Unicode?
a. Represents symbol or characters used in any langua
b. Only few languages are supported
c. Supports only few characters
d. Characters from A to Z
Q. In OSI model dialogue control and token management are responsibilities of ?
a. Session Layer
b. Network layer
c. Transport layer
d. Data link layer
Q. A straight permutation cipher or a straight P-box has same number of inputs as
a. cipher
b. Frames
c. Outputs
d. Bits
Q. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
a. Authenticated
b. Joined
c. Submit
d. Separate
Q. We use Cryptography term to transforming messages to make them secure and immune to
a. Change
b. Idle
c. Attacks
d. Defend
Q. Shift cipher is sometimes referred to as the
a. Caesar cipher
b. Shift cipher
c. cipher
d. cipher text
Q. Heart of Data Encryption Standard (DES), is the
a. Cipher
b. Rounds
c. Encryption
d. DES function