Network Security Set 2
On This Page
This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on Network Security Set 2
Q1 | If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is______ fragment.
- First
- Middle
- Last
- Four
Q2 | The design issue of Datalink Layer in OSI Reference Model is
- Framing
- Representation of bits
- Synchronization of bits
- Connection control
Q3 | Data Encryption Techniques are particularly used for _______.
- protecting data in Data Communication System
- reduce Storage Space Requirement
- enhances Data Integrity
- decreases Data Integrity
Q4 | An example of a layer that is absent in broadcast networks is:
- Physical layer
- Presentation layer
- Network layer Application layer
- none
Q5 | Encryption and Decryption is the responsibility of ___ Layer.
- Physical
- Network
- Application
- Datalink
Q6 | The VLF and LF bauds use propagation for communication
- Ground
- Sky
- Line of sight
- Space
Q7 | The start and stop bits are used in serial communication for
- error detection
- error correction
- Synchronization
- slowing down the communication
Q8 | ___________ is a type of transmission impairment in which the Signal looses strengthdue to The resistance of the transmission medium.
- Attenuation
- Distortion
- Noise
- Decible
Q9 | ________________ is a bit-oriented protocol for communication over point-to-point andmulti-point links .
- Stop-and-wait
- HDLC
- Sliding window
- Go-back-N
Q10 | In substitution, a character in the plaintext is always changed to the same character inthe ciphertext, regardless of its position in the text.
- polyalphabetic
- mono alphabetic
- Transpositional
- multialphabetic
Q11 | Which of the following is not associated with the session layer ?
- Dialog control
- Token management
- Semantics of the information transmitted
- Synchronization
Q12 | What is the size of the 'total length' field in IPv4 datagram ?
- 4 bits
- 8 bits
- 16 bits
- 32 bits
Q13 | The process of dividing an analog signal into a string of discrete outputs, each ofconstant amplitude, is called :
- Strobing
- Amplification
- Conditioning
- Quantization
Q14 | Which transmission technique guarantees that data packets will be received by thereceiver in the same order in which they were sent by the sender.
- Broadcasting
- Unicasting
- Packet switching
- Circuit switching
Q15 | Which of the following control fields in TCP header is used to specify whether the senderhas no more data to transmit?
- FIN
- RST
- SYN
- PSH
Q16 | Which are the two modes of IP security?
- Transport and certificate
- Transport and tunnel
- Certificate and tunnel
- Preshared and tr