MCQ 1 One security protocol for the email system is ________________.
MCQ 2 Who provide us internet?
MCQ 3 Which is not the requirement of internet.
MCQ 4 In which method we can connect to internet protocol.
MCQ 5 Which is not the browser?
MCQ 6 The port number of SMTP (Simple mail transfer protocol) is.
MCQ 7 DES (Data Encryption Standard) follows.
MCQ 8 In the SSL Protocol, each upper layer message if fragmented into a maximum of _______________ bytes.
MCQ 9 An ____________ algorithm transforms plain text to cipher text
MCQ 10 Which can be divided into monoalphabetic and polyalphabetic.
MCQ 11 If the sender and receiver use different keys, the system is referred to as conventional cipher system.
MCQ 12 Which class for IP is used in smaller organizations.
MCQ 13 The ______________ is the message after transformation.
MCQ 14 An example of a layer that is absent in broadcast networks is _____________.
MCQ 15 Which is not the server side programming language.
MCQ 16 _______________ can retrive application data from application layer protocol, but the protocol is normally HTTP.
MCQ 17 _____________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet.
MCQ 18 An encryption technique with 2 keys is ______________.
MCQ 19 The maximum payload of a TCP segment is :
MCQ 20 Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?'
MCQ 21 Which of the protocol is not used in the network layer of the TCP/IP model?
MCQ 22 A message COMPUTERNETWORK encrypted using columnar transposition cipher with a key LAYER. The encrypted message is
MCQ 23 TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
MCQ 24 S/MIME is abbreviated as __________________.
MCQ 25 In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to.