Top 50+ Solved Network Security MCQ Questions Answer

From 16 to 30 of 41

Q. The ________ is encrypted text

a. cipher text

b. cipher scricpt

c. secret text

d. secret script

  • c. secret text

Q. _______________________ ensures that information are in a format that is true andcorrect to its original purposes.

a. Availability

b. Confidentiality

c. Cryptography

d. Integrity

  • a. Availability

Q. _____________________ ensures that information and resources are available to thosewho need them.

a. Availability

b. Confidentiality

c. Cryptography

d. Integrity

  • d. Integrity

Q. _______________________ is the process of identifying an individual, usually based ona username and password.

a. Authentication

b. Authorization

c. integrity

d. crytography

  • a. Authentication

Q. ___________________ is the process of giving individuals access to system objectsbased on their identity.

a. Authentication

b. Authorization

c. key

d. Confidentiality

  • b. Authorization

Q. In symmetric-key cryptography, the key locks and unlocks the box is

a. Same

b. shared

c. private

d. Public

  • a. Same

Q. The ciphers of today are called round ciphers because they involve

a. Single Round

b. Double Rounds

c. Multiple Round

d. Round about

  • c. Multiple Round

Q. The Advanced Encryption Standard (AES) was designed

a. National Institute of Standards and Technology

b. IBM

c. HP

d. Intel

  • a. National Institute of Standards and Technology

Q. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?

a. SNMP (Simple Network Management Protocol)

b. SMTP (Simple Mail Transfer Protocol)

c. SS7 (Signalling System 7)

d. HTTP (Hyper Text Tr

  • c. SS7 (Signalling System 7)

Q. The design issue of Datalink Layer in OSI Reference Model is

a. Framing

b. Representation of bits

c. Synchronization of bits

d. Connection control

  • a. Framing

Q. Data Encryption Techniques are particularly used for _______.

a. protecting data in Data Communication System

b. reduce Storage Space Requirement

c. enhances Data Integrity

d. decreases Data Integrity

  • a. protecting data in Data Communication System

Q. An example of a layer that is absent in broadcast networks is:

a. Physical layer

b. Presentation layer

c. Network layer Application layer

d. none

  • c. Network layer Application layer

Q. Encryption and Decryption is the responsibility of ___ Layer.

a. Physical

b. Network

c. Application

d. Datalink

  • c. Application
Subscribe Now

Get All Updates & News