Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

1 Answer

Answer :

(C) Application

Related questions

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : In the following list of devices, which device is used in datalink layer? (1) Repeaters (2) Routers (3) Application gateway (4) Bridge

Last Answer : Bridge

Description : ICMP is a _________ layer protocol. A) datalink B) transport C) network D) noneof the above

Last Answer : network

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : Explain encryption and decryption. -Technology

Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Transmission

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport

Last Answer : B) Mac sub layer

Description : The ……………… layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transpor

Last Answer : B) Mac sub layer

Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport

Last Answer : (A) Transport, Session, Presentation, Application

Description : Which OSI layer assumes responsibility for managing network connections between applications? a. Network layer b. Data link layer c. Application layer d. Session layer

Last Answer : d. Session layer

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : Transmission media lie below the_______ layer. A) physical B) network C) transport D) application

Last Answer : physical

Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application

Last Answer : d.application

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer

Last Answer : a. data link layer

Description : SMTP is a protocol used in which layer? a. Application b. Network c. Physical d. Transport

Last Answer : a. Application

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : The _______ layer is the topmost layer in the subnet. A. Network B. application C. transport D. physical

Last Answer : A. Network

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer

Last Answer : A. network layer

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : Choose the correct layer numbers and names of the OSI model below. a. Layer 3 - Network Layer, Layer 2 - Data Link Layer, Layer 1 - Physical Layer b. Layer 7 - Application Layer, Layer 6 - Presentation Layer c. Layer 5 - Session Layer, Layer 4 - Transport Layer d. All given options

Last Answer : d. All given options

Description : TCP/IP layer is equivalent to combined Session, Presentation and a. Transport layer b. Network layer c. Application layer d. Physical layer

Last Answer : c. Application layer

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer