On This Page

This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on Network Security Set 2

Q1 | If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is______ fragment.
  • First
  • Middle
  • Last
  • Four
Q2 | The design issue of Datalink Layer in OSI Reference Model is
  • Framing
  • Representation of bits
  • Synchronization of bits
  • Connection control
Q3 | Data Encryption Techniques are particularly used for _______.
  • protecting data in Data Communication System
  • reduce Storage Space Requirement
  • enhances Data Integrity
  • decreases Data Integrity
Q4 | An example of a layer that is absent in broadcast networks is:
  • Physical layer
  • Presentation layer
  • Network layer Application layer
  • none
Q5 | Encryption and Decryption is the responsibility of ___ Layer.
  • Physical
  • Network
  • Application
  • Datalink
Q6 | The VLF and LF bauds use propagation for communication
  • Ground
  • Sky
  • Line of sight
  • Space
Q7 | The start and stop bits are used in serial communication for
  • error detection
  • error correction
  • Synchronization
  • slowing down the communication
Q8 | ___________ is a type of transmission impairment in which the Signal looses strengthdue to The resistance of the transmission medium.
  • Attenuation
  • Distortion
  • Noise
  • Decible
Q9 | ________________ is a bit-oriented protocol for communication over point-to-point andmulti-point links .
  • Stop-and-wait
  • HDLC
  • Sliding window
  • Go-back-N
Q10 | In substitution, a character in the plaintext is always changed to the same character inthe ciphertext, regardless of its position in the text.
  • polyalphabetic
  • mono alphabetic
  • Transpositional
  • multialphabetic
Q11 | Which of the following is not associated with the session layer ?
  • Dialog control
  • Token management
  • Semantics of the information transmitted
  • Synchronization
Q12 | What is the size of the 'total length' field in IPv4 datagram ?
  • 4 bits
  • 8 bits
  • 16 bits
  • 32 bits
Q13 | The process of dividing an analog signal into a string of discrete outputs, each ofconstant amplitude, is called :
  • Strobing
  • Amplification
  • Conditioning
  • Quantization
Q14 | Which transmission technique guarantees that data packets will be received by thereceiver in the same order in which they were sent by the sender.
  • Broadcasting
  • Unicasting
  • Packet switching
  • Circuit switching
Q15 | Which of the following control fields in TCP header is used to specify whether the senderhas no more data to transmit?
  • FIN
  • RST
  • SYN
  • PSH
Q16 | Which are the two modes of IP security?
  • Transport and certificate
  • Transport and tunnel
  • Certificate and tunnel
  • Preshared and tr