Saturday, 10 December 2016

Computer Networks Multiple Choice Questions - Set 25

1.       The protocol used to provide security to e-mails?
(A) POP             (B) PGP
(C) SNMP         (D) HTTP
Answer: B
2.       To access e-mails from any machine and anywhere, we use ................
(A) PGP             (B) PEM
(C) IMAP           (D) None of these
Answer: C
3.       SMTP is used to transfer ..............
(A) Only text files         (B) Only audio files
(C) Only video files     (D) Only image files
Answer: A
4.       Using IMAP, the e-mails are stored at ....................
(A) Users PC                (B) Router
(C) Gateway                 (D) Server
Answer: D
5.       The art of breaking ciphers is known as:
(A) cryptology               (B) cryptography
(C) cryptanalysis          (D) crypting
Answer: C

6.       The number of subkeys generated in IDEA algorithm are .................
(A) 54                 (B) 48
(C) 52                 (D) 50
Answer: C
7.       Number of S - boxes used in DES algorithm is ...............
(A) 4                   (B) 8
(C) 16                 (D) 32
Answer: B
8.       Minimum number of DNS name servers, each domain should posses?
(A) 1                   (B) 2
(C) 3                   (D) 4
Answer: B
9.       To map a name onto an IP address, an application program calls a library procedure called the ......................
(A) Scheduler               (B) Resolver
(C) Mapper                    (D) Encoder
Answer: B
10.    In source routing bridges each LAN has a unique ................. bit number.
(A) 10                 (B) 8
(C) 16                 (D) 12
Answer: D


0 comments:

Post a Comment