Network Security MCQs
Network Security MCQs
1. Which technique is used for data protection ?.
A. Data piracy
B. Authentication
C. Encryption
D. None of these
2.__________are the types of firewalls.
A. Packet Filtering
B. Dual Homed Gateway
C. Both A and B
D. None of these
3. Data is mirrored in two disks with______.
A. RAID 0
B. RAID 2
C. RAID 1
D. All of these
4. IDEA algorithm generates ______keys.
A. 56
B. 28
C. 52
D. 72
5.Coaxial cables used in ________networks
A. Telephone
B. Cable TV
C. Both A and B
D. NONE OF these
6. How many S – boxes used in DES algorithm?
A. 6
B. 24
C. 8
D. 42
7.Optical Fiber transmit______.
A. light signal
B. radio signal
C. electrical signal
D. Both A and B
E. None of these
8. HTTP port number used is______.
A. 43
B. 441
C. 443
D. 449
E. Both A and B
9.In networks protocol TCP/ IP stands for.
A. Transaction control protocol
B. Transmission control protocol
C. Transmission contribution protocol
D. None of these