Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation
Last Answer : d. presentation
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2
Last Answer : (C) N(N-1)/2
Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption
Last Answer : c) Encryption
Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption
Last Answer : (D) Encryption
Description : In the following list of devices, which device is used in datalink layer? (1) Repeaters (2) Routers (3) Application gateway (4) Bridge
Last Answer : Bridge
Description : ICMP is a _________ layer protocol. A) datalink B) transport C) network D) noneof the above
Last Answer : network
Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application
Last Answer : (C) Transport
Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network
Last Answer : Answer: Marks to all
Description : Explain encryption and decryption. -Technology
Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification
Last Answer : A. encryption, authentication.
Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption
Last Answer : a. Guided or Unguided
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Last Answer : a) Encryption
Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These
Last Answer : c) Decryption
Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption
Last Answer : D
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : A) SSL handshake protocol
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above
Last Answer : Transmission
Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport
Last Answer : B) Mac sub layer
Description : The ……………… layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transpor
Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport
Last Answer : (A) Transport, Session, Presentation, Application
Description : Which OSI layer assumes responsibility for managing network connections between applications? a. Network layer b. Data link layer c. Application layer d. Session layer
Last Answer : d. Session layer
Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine
Last Answer : C) multiple engine
Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation
Last Answer : A) Encryption
Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These
Last Answer : c) Presentation Layer
Description : Transmission media lie below the_______ layer. A) physical B) network C) transport D) application
Last Answer : physical
Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application
Last Answer : d.application
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer
Last Answer : a. network layer
Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer
Last Answer : a. data link layer
Description : SMTP is a protocol used in which layer? a. Application b. Network c. Physical d. Transport
Last Answer : a. Application
Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer
Last Answer : A. an application level , an IP level
Description : The _______ layer is the topmost layer in the subnet. A. Network B. application C. transport D. physical
Last Answer : A. Network
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer
Last Answer : A. network layer
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : Choose the correct layer numbers and names of the OSI model below. a. Layer 3 - Network Layer, Layer 2 - Data Link Layer, Layer 1 - Physical Layer b. Layer 7 - Application Layer, Layer 6 - Presentation Layer c. Layer 5 - Session Layer, Layer 4 - Transport Layer d. All given options
Last Answer : d. All given options
Description : TCP/IP layer is equivalent to combined Session, Presentation and a. Transport layer b. Network layer c. Application layer d. Physical layer
Last Answer : c. Application layer
Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : D. Link layer