Question
List I List II
(a) Blowfish (i) 128 – 256 bits
(b) DES (ii) 128 bits
(c) IDEA (iii) 1 - 448 bits
(d) RC5 (iv) 56 bits
a.
(a)–(iv), (b)-(iii), (c)-(ii) , d-(i)
b.
(a)–(iii), (b)-(iv), (c)-(i) , d-(ii)
c.
(a)–(iii), (b)-(iv), (c)-(ii) , d-(i)
d.
(a)–(ii), (b)-(iii), (c)-(iv) , d-(i)
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Match the following Secret Key Algorithms (List I) with Corresponding Key Lengths (List II) and choose the correct answer from the code given below: List I...
Similar Questions
Discover Related MCQs
Q. The four byte IP address consists of
View solution
Q. Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token management and .................. as services.
View solution
Q. Which of the following statement/s is/are true?
(i) Firewalls can screen traffic going into or out of an organization.
(ii) Virtual private networks can stimulate an old leased network to provide certain desirable properties.
Choose the correct answer from the code given below:
View solution
Q. A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is
View solution
Q. An Internet Service Provider (ISP) has following chunk of CIDR-based IP addresses available with it :245.248.128.9./20. The ISP wants to give half of this chunk of addresses to organization A and a quarter to organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
View solution
Q. Consider the following two statements:
S1: TCP handles both congestion and flow control
S2: UDP handles congestion but not flow control
Which of the following options is correct with respect to the above statements (S1) and (S2)?
View solution
Q. Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host has just been restarted.
View solution
Q. Suppose that everyone in a group of N people wants to communicate secretly with (N−1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
View solution
Q. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:
View solution
Q. The period of a signal is 100 ms. Its frequency is .............
View solution
Q. The dotted-decimal notation of the following IPV4 address in binary notation is ...................
10000001 00001011 00001011 11101111
View solution
Q. Which of the following statements are true?
(a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
(b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
(c) The Third generation cellular phone system will provide universal personnel communication.
View solution
Q. Match the following symmetric block ciphers with corresponding block and key sizes:
List - I
(a) DES
(b) IDEA
(c) BLOW FISH
(d) AES
List - II
(i) block size 64 and key size ranges between 32 and 448
(ii) block size 64 and key size 64
(iii) block size 128 and key sizes 128, 192, 256
(iv) block size 64 and key size 128
Code:
(a) (b) (c) (d)
View solution
Q. Which of the following statements are true?
(a) Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
(b) Circuit Switched Network resources need not be reserved during the set up phase.
(c) In packet switching there is no resource allocation for packets.
View solution
Q. In Challenge-Response authentication the claimant ...............
View solution
Q. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.
View solution
Q. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................
View solution
Q. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?
View solution
Q. .................. do not take their decisions on measurements or estimates of the current traffic and topology.
View solution
Q. The number of bits used for addressing in Gigabit Ethernet is ...................
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!