Top 150+ Solved Data Communication and Networking MCQ Questions Answer

From 166 to 179 of 179

Q. Transmission control protocol is

a. connection oriented protocol

b. uses a three way handshake to establish a connection

c. recievs data from application as a single stream

d. all of the above

  • d. all of the above

Q. An endpoint of an inter-process communication flow across a computer network is called

a. socket

b. pipe

c. port

d. none of the above

  • a. socket

Q. Transport layer aggregates data from different applications into a single stream beforepassing it to

a. network layer

b. data link layer

c. application layer

d. physical layer

  • a. network layer

Q. The ASCII encoding of binary data is called

a. base 64 encoding

b. base 32 encoding

c. base 16 encoding

d. base 8 encoding

  • a. base 64 encoding

Q. A high speed communication equipment typically would not be needed for

a. E-mail

b. Transferring large volume of data

c. Supporting communication between nodes in a LAN

d. All of these

  • a. E-mail

Q. What is Unicode?

a. Represents symbol or characters used in any langua

b. Only few languages are supported

c. Supports only few characters

d. Characters from A to Z

  • a. Represents symbol or characters used in any langua

Q. In OSI model dialogue control and token management are responsibilities of ?

a. Session Layer

b. Network layer

c. Transport layer

d. Data link layer

  • a. Session Layer

Q. An asymmetric-key (or public-key) cipher uses

a. 1 Key

b. 2 Key

c. 3 Key

d. 4 Key

  • b. 2 Key

Q. A straight permutation cipher or a straight P-box has same number of inputs as

a. cipher

b. Frames

c. Outputs

d. Bits

  • c. Outputs

Q. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

a. Authenticated

b. Joined

c. Submit

d. Separate

  • a. Authenticated

Q. Shift cipher is sometimes referred to as the

a. Caesar cipher

b. Shift cipher

c. cipher

d. cipher text

  • a. Caesar cipher

Q. Substitutional cipers are

a. Monoalphabatic

b. Sami alphabetic

c. polyalphabetic

d. both a and c

  • d. both a and c

Q. Heart of Data Encryption Standard (DES), is the

a. Cipher

b. Rounds

c. Encryption

d. DES function

  • d. DES function
Subscribe Now

Get All Updates & News