MCQ 1 8. Which one of the following is not an application layer protocol used in internet?

 

Correct Answer Choice C resource reservation protocol
See Answer

MCQ 2 A process of making the encrypted text readable again.

Correct Answer Choice A Decryption
See Answer

MCQ 3 Full form of SET.

Correct Answer Choice A Secure Electronic Transaction
See Answer

MCQ 4 The message digest needs to be _______________.

Correct Answer Choice C keep secret
See Answer


MCQ 5 The message must be encrypted at the sender site and decrypted at the

Correct Answer Choice A sender site
See Answer

MCQ 6 Which is the lowest layer of TCP/IP Model.

Correct Answer Choice B Netword Access layer
See Answer

MCQ 7 Which of the following is an example of application layer vulnerability?

Correct Answer Choice D Very complex application security controls
See Answer

MCQ 8 TCP/IP is composed of ________________number of layers.

Correct Answer Choice C 4
See Answer


MCQ 9 Which of the following is not the primary objective of cryptography?

Correct Answer Choice B Confidentiality
See Answer

MCQ 10 The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

Correct Answer Choice A network layer
See Answer

MCQ 11 The keys used in cryptography are

Correct Answer Choice D All of the above
See Answer

MCQ 12 In symmetric key cryptography, the key used by the sender and the receiver is

Correct Answer Choice A shared
See Answer


MCQ 13 A cipher in which the order is not preserved.

Correct Answer Choice C Transposition-based
See Answer

MCQ 14 The Data Encryption Standard (DES) was designed by

Correct Answer Choice C IBM
See Answer

MCQ 15 In _____________________ same keys are implemented for encrypting as well as

Correct Answer Choice A Symmetric Key Encryption
See Answer

MCQ 16 Cryptography, a word with Greek origins, means

Correct Answer Choice A Secret Writing
See Answer


MCQ 17 RSA stands for

Correct Answer Choice A Rivest, Shamir, Adleman
See Answer

MCQ 18 A _____________ provides privacy for LANs that must communicate through the global internet

Correct Answer Choice B VPN
See Answer

MCQ 19 _______________ takes the plain text and the key as input for creating cipher text.

Correct Answer Choice D Decryption Algorithm
See Answer

MCQ 20 ________________ ensures the integrity and security of data that are passing over a network.

Correct Answer Choice B Network-security protocols
See Answer


MCQ 21 How many keys does the Triple DES algorithm use?

Correct Answer Choice C 2 or 3
See Answer

MCQ 22 An encryption algorithm transforms the plaintext into

Correct Answer Choice B Cipher text
See Answer

MCQ 23 The relationship between a character in the plaintext to a character is

Correct Answer Choice D one-to-many relationship
See Answer

MCQ 24 EMAIL is a ?

Correct Answer Choice D Both A and C
See Answer


MCQ 25 In Computer which range is in registered ports.

Correct Answer Choice B 1024 to 49151
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories