Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

Network Security MCQs

Table of Contents

Network Security MCQs

1. For which technique is used for data protection ?.

A. Data piracy

B. Authentication

C. Encryption

D. None of these

Answer - Click Here:
C

3.__________are the types of firewalls.

A. Packet Filtering

B. Dual Homed Gateway

C. Both A and B

D. None of these

Answer - Click Here:
C

4. Data is mirrored in two disks with______.

A. RAID 0
B. RAID 2
C. RAID 1
D. All of these

Answer - Click Here:
C

5. IDEA algorithm generates ______keys.
A. 56
B. 28
C. 52
D. 72

Answer - Click Here:
C

6.Coaxial cables used in ________networks

A. Telephone

B. Cable TV

C. Both A and B

D. NONE OF these

Answer - Click Here:
B

7. How many S – boxes used in DES algorithm?

A. 6
B. 24
C. 8
D. 42

Answer - Click Here:
C

8.Optical Fiber transmit______.

A. light signal
B. radio signal
C. electrical signal
D. Both A and B
E. None of these

Answer - Click Here:
A

9. HTTP port number used is______.
A. 43
B. 441
C. 443
D. 449
E. Both A and B

Answer - Click Here:
C

10.In networks protocol TCP/ IP stands for.

A. Transaction control protocol

B. Transmission control protocol

C. Transmission contribution protocol

D. None of these

Answer - Click Here:
B

 

Fazal Rehman Shamil Click Here to Know More
Instructor, Researcher, Blogger, SEO Expert, Poet and Publisher of International Journal Of Software, Technology & Science ISSN : 2616 - 5325
Dear Professors and Resarchers!You are welome to Cite these tutorials in your research or slides etc. Please don't forget to mention the reference of website. Copy Paste of text is strcitly forbidden. Images can be reuse because images are protected with watermark.

Leave a Reply

Your email address will not be published. Required fields are marked *