Computer Network Security MCQS with answers
Network Security multiple choice questions emphasize on network security aspects. These Multiple Choice Questions (MCQ) should be practiced to improve the Network Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
2. Which one of the following is correct ?
Character - represented by One’s Complement
Character - represented by Two’s Complement
Integer - represented by ASCII
Character - represented by Unicode
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
3. The protocol used to provide security to e-mails?
POP
PGP
SNMP
HTTP
4. The art of breaking ciphers is known as:
Cryptology
Cryptography
Cryptanalysis
Crypting
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
5. The number of subkeys generated in IDEA algorithm are ……………..
54
48
52
50
6. Number of S – boxes used in DES algorithm is ……………
4
8
16
32
7. The ………………. portion of LAN management software restricts access, records user activities and audit data etc.
Configuration management
Security management
Performance management
None of these
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
8. In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message (spaces are omitted during encryption) WELCOME TO NETWORK SECURITY!
WMEKREETSILTWETCOOCYONRU!
EETSICOOCYWMEKRONRU!LTWET
LTWETONRU!WMEKRCOOCYEETSI
ONRU!COOCYLTWETEETSIWMEKR
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
9. The length of the key in one time pad method is ………………..
Random
Fixed
64
56
10. …………… is an example for public key algorithm.
RSA
DES
IREA
RC5
11. Caesar cipher is represented as ……………..
C = (p+3)mod3
C = (p+26)mod3
C = (p-3)mod26
C = (p+3)mod26
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
12. Number of rounds in Data Encryption Standard algorithm?
8 rounds
12 rounds
16 rounds
24 rounds
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
13. ………….transform message into format (cyber text) that cannot be read by hackers.
Decryption
Encryption
Transformation
None of these
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
14. What is the port number for (HTTP Secure) HTTPS?
43
443
445
444
15. Decryption and Encryption of data are the responsibility of which of the following layer?
Session layer
Network layer
Transport layer
Presentation layer
Answer & Solution
No Solution for this Answer..! Report or Discus this Question