Question
a.
routing
b.
security
c.
tunnelling
d.
congestion control
Posted under Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Firewalls are used for ................
Similar Questions
Discover Related MCQs
Q. Decryption and Encryption of data are the responsibility of which of the following layer?
View solution
Q. What is the port number for (HTTP Secure) HTTPS?
View solution
Q. ………….transform message into format (cyber text) that cannot be read by hackers.
View solution
Q. Number of rounds in Data Encryption Standard algorithm?
View solution
Q. Caesar cipher is represented as .................
View solution
Q. ............... is an example for public key algorithm.
View solution
Q. The length of the key in one time pad method is ....................
View solution
Q. In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message (spaces are omitted during encryption)
WELCOME TO NETWORK SECURITY!
View solution
Q. The ................... portion of LAN management software restricts access, records user activities and audit data etc.
View solution
Q. Number of S - boxes used in DES algorithm is ...............
View solution
Q. The number of subkeys generated in IDEA algorithm are .................
View solution
Q. The art of breaking ciphers is known as:
View solution
Q. The protocol used to provide security to e-mails?
View solution
Q. Which one of the following is correct ?
View solution
Q. The type of encoding in which manipulation of bit streams without regard to what the bits mean is .....................
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!