MCQ 1 8. Which one of the following is not an application layer protocol used in internet?
MCQ 2 A process of making the encrypted text readable again.
MCQ 3 Full form of SET.
MCQ 4 The message digest needs to be _______________.
MCQ 5 The message must be encrypted at the sender site and decrypted at the
MCQ 6 Which is the lowest layer of TCP/IP Model.
MCQ 7 Which of the following is an example of application layer vulnerability?
MCQ 8 TCP/IP is composed of ________________number of layers.
MCQ 9 Which of the following is not the primary objective of cryptography?
MCQ 10 The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
MCQ 11 The keys used in cryptography are
MCQ 12 In symmetric key cryptography, the key used by the sender and the receiver is
MCQ 13 A cipher in which the order is not preserved.
MCQ 14 The Data Encryption Standard (DES) was designed by
MCQ 15 In _____________________ same keys are implemented for encrypting as well as
MCQ 16 Cryptography, a word with Greek origins, means
MCQ 17 RSA stands for
MCQ 18 A _____________ provides privacy for LANs that must communicate through the global internet
MCQ 19 _______________ takes the plain text and the key as input for creating cipher text.
MCQ 20 ________________ ensures the integrity and security of data that are passing over a network.
MCQ 21 How many keys does the Triple DES algorithm use?
MCQ 22 An encryption algorithm transforms the plaintext into
MCQ 23 The relationship between a character in the plaintext to a character is
MCQ 24 EMAIL is a ?
MCQ 25 In Computer which range is in registered ports.