Top 50+ Solved Network Security MCQ Questions Answer
Q. _______________________ ensures that information are in a format that is true andcorrect to its original purposes.
a. Availability
b. Confidentiality
c. Cryptography
d. Integrity
Q. _____________________ ensures that information and resources are available to thosewho need them.
a. Availability
b. Confidentiality
c. Cryptography
d. Integrity
Q. _______________________ is the process of identifying an individual, usually based ona username and password.
a. Authentication
b. Authorization
c. integrity
d. crytography
Q. ___________________ is the process of giving individuals access to system objectsbased on their identity.
a. Authentication
b. Authorization
c. key
d. Confidentiality
Q. In symmetric-key cryptography, the key locks and unlocks the box is
a. Same
b. shared
c. private
d. Public
Q. The ciphers of today are called round ciphers because they involve
a. Single Round
b. Double Rounds
c. Multiple Round
d. Round about
Q. Symmetric-key cryptography started thousands of years ago when people needed toexchange
a. Files
b. Packets
c. Secrets
d. Tr
Q. The Advanced Encryption Standard (AES) was designed
a. National Institute of Standards and Technology
b. IBM
c. HP
d. Intel
Q. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
a. SNMP (Simple Network Management Protocol)
b. SMTP (Simple Mail Transfer Protocol)
c. SS7 (Signalling System 7)
d. HTTP (Hyper Text Tr
Q. If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is______ fragment.
a. First
b. Middle
c. Last
d. Four
Q. The design issue of Datalink Layer in OSI Reference Model is
a. Framing
b. Representation of bits
c. Synchronization of bits
d. Connection control
Q. Data Encryption Techniques are particularly used for _______.
a. protecting data in Data Communication System
b. reduce Storage Space Requirement
c. enhances Data Integrity
d. decreases Data Integrity
Q. An example of a layer that is absent in broadcast networks is:
a. Physical layer
b. Presentation layer
c. Network layer Application layer
d. none
Q. Encryption and Decryption is the responsibility of ___ Layer.
a. Physical
b. Network
c. Application
d. Datalink