Question
a.
Proves that she knows the secret without revealing it
b.
Proves that she doesn’t know the secret
c.
Reveals the secret
d.
Gives a challenge
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In Challenge-Response authentication the claimant ...............
Similar Questions
Discover Related MCQs
Q. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.
View solution
Q. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................
View solution
Q. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?
View solution
Q. .................. do not take their decisions on measurements or estimates of the current traffic and topology.
View solution
Q. The number of bits used for addressing in Gigabit Ethernet is ...................
View solution
Q. Which of the following layer of OSI Reference model is also called end-to-end layer?
View solution
Q. The IP address ................... is used by hosts when they are being booted.
View solution
Q. Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an average of 24 lines with 80 characters in each line. What is the required bit rate of the channel?
View solution
Q. Quadrature Amplitude Modulation means changing both:
View solution
Q. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is ........................
View solution
Q. Match the following:
List - I
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Presentation layer
List - II
(i) Encryption
(ii) Connection control
(iii) Routing
(iv) Framing
Code :
(a) (b) (c) (d)
View solution
Q. The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet?
View solution
Q. Which of the following statements are true?
(a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.
(b) The authentication extension header is new in IPv6.
(c) The record route option is not implemented in IPv6.
View solution
Q. Which of the following routing technique / techniques is / are used in distributed systems?
(a) Fixed Routing
(b) Virtual Routing
(c) Dynamic Routing
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!