Computer Science Study Materials for Competitive Exams

Sample Questions, Previous Year Solved Papers, Study Materials For Competitive Examinations Like UGC NET, SET And GATE Computer Science.

Saturday, 10 December 2016

Computer Networks Multiple Choice Questions - Set 25

1.       The protocol used to provide security to e-mails?
(A) POP             (B) PGP
(C) SNMP         (D) HTTP
Answer: B
2.       To access e-mails from any machine and anywhere, we use ................
(A) PGP             (B) PEM
(C) IMAP           (D) None of these
Answer: C
3.       SMTP is used to transfer ..............
(A) Only text files         (B) Only audio files
(C) Only video files     (D) Only image files
Answer: A
4.       Using IMAP, the e-mails are stored at ....................
(A) Users PC                (B) Router
(C) Gateway                 (D) Server
Answer: D
5.       The art of breaking ciphers is known as:
(A) cryptology               (B) cryptography
(C) cryptanalysis          (D) crypting
Answer: C

6.       The number of subkeys generated in IDEA algorithm are .................
(A) 54                 (B) 48
(C) 52                 (D) 50
Answer: C
7.       Number of S - boxes used in DES algorithm is ...............
(A) 4                   (B) 8
(C) 16                 (D) 32
Answer: B
8.       Minimum number of DNS name servers, each domain should posses?
(A) 1                   (B) 2
(C) 3                   (D) 4
Answer: B
9.       To map a name onto an IP address, an application program calls a library procedure called the ......................
(A) Scheduler               (B) Resolver
(C) Mapper                    (D) Encoder
Answer: B
10.    In source routing bridges each LAN has a unique ................. bit number.
(A) 10                 (B) 8
(C) 16                 (D) 12
Answer: D


No comments:

Post a Comment