1. The
protocol used to provide security to e-mails?
(A) POP (B)
PGP
(C) SNMP (D)
HTTP
Answer: B
2. To
access e-mails from any machine and anywhere, we use ................
(A) PGP (B)
PEM
(C) IMAP (D)
None of these
Answer: C
3. SMTP
is used to transfer ..............
(A) Only text files (B) Only audio files
(C) Only video files (D) Only image files
Answer: A
4. Using
IMAP, the e-mails are stored at ....................
(A) Users PC (B) Router
(C) Gateway (D) Server
Answer: D
5. The
art of breaking ciphers is known as:
(A) cryptology (B) cryptography
(C) cryptanalysis (D) crypting
Answer: C
6. The
number of subkeys generated in IDEA algorithm are .................
(A) 54 (B)
48
(C) 52 (D)
50
Answer: C
7. Number
of S - boxes used in DES algorithm is ...............
(A) 4 (B)
8
(C) 16 (D)
32
Answer: B
8. Minimum
number of DNS name servers, each domain should posses?
(A) 1 (B)
2
(C) 3 (D)
4
Answer: B
9. To
map a name onto an IP address, an application program calls a library procedure
called the ......................
(A) Scheduler (B)
Resolver
(C) Mapper (D)
Encoder
Answer: B
10. In
source routing bridges each LAN has a unique ................. bit number.
(A) 10 (B)
8
(C) 16 (D)
12
Answer: D
0 Comments