MCQ 1 One security protocol for the email system is ________________.

Correct Answer Choice C PGP
See Answer

MCQ 2 Who provide us internet?

Correct Answer Choice B ISP
See Answer

MCQ 3 Which is not the requirement of internet.

Correct Answer Choice C DOS
See Answer

MCQ 4 In which method we can connect to internet protocol.

Correct Answer Choice D All of the above
See Answer


MCQ 5 Which is not the browser?

Correct Answer Choice D Google
See Answer

MCQ 6 The port number of SMTP (Simple mail transfer protocol) is.

Correct Answer Choice C 25
See Answer

MCQ 7 DES (Data Encryption Standard) follows.

Correct Answer Choice A Feistel Cipher Structure
See Answer

MCQ 8 In the SSL Protocol, each upper layer message if fragmented into a maximum of _______________ bytes.

Correct Answer Choice C 214
See Answer


MCQ 9 An ____________ algorithm transforms plain text to cipher text

Correct Answer Choice B encryption
See Answer

MCQ 10 Which can be divided into monoalphabetic and polyalphabetic.

Correct Answer Choice B Substitution Technique
See Answer

MCQ 11 If the sender and receiver use different keys, the system is referred to as conventional cipher system.

Correct Answer Choice B False
See Answer

MCQ 12 Which class for IP is used in smaller organizations.

Correct Answer Choice C Class C
See Answer


MCQ 13 The ______________ is the message after transformation.

Correct Answer Choice A cipher text
See Answer

MCQ 14 An example of a layer that is absent in broadcast networks is _____________.

Correct Answer Choice D Network layer
See Answer

MCQ 15 Which is not the server side programming language.

Correct Answer Choice C Javascript
See Answer

MCQ 16 _______________ can retrive application data from application layer protocol, but the protocol is normally HTTP.

Correct Answer Choice D Both A and B
See Answer


MCQ 17 _____________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet.

Correct Answer Choice D Encryption
See Answer

MCQ 18 An encryption technique with 2 keys is ______________.

Correct Answer Choice D Public key cryptography
See Answer

MCQ 19 The maximum payload of a TCP segment is :

Correct Answer Choice D 65495
See Answer

MCQ 20 Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?'

Correct Answer Choice C Transport
See Answer


MCQ 21 Which of the protocol is not used in the network layer of the TCP/IP model?

Correct Answer Choice D HTTP
See Answer

MCQ 22 A message COMPUTERNETWORK encrypted using columnar transposition cipher with a key LAYER. The encrypted message is

Correct Answer Choice C OEWPNRCTTUEKMRO
See Answer

MCQ 23 TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

Correct Answer Choice A 1
See Answer

MCQ 24 S/MIME is abbreviated as __________________.

Correct Answer Choice B Secure/Multipurpose Internet Mailing Extensions
See Answer


MCQ 25 In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to.

Correct Answer Choice B Each other
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories