41. | Which one of the following is true for asymmetric-key cryptography? |
Discuss |
Answer: (a).Private key is kept by the receiver and public key is announced to the public
|
42. | A Trojan horse is |
Discuss |
Answer: (d).All of the above
|
43. | In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text |
Discuss |
Answer: (b).mono alphabetic
|
44. | Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE |
Discuss |
Answer: (a).BUTAEEZ
|
45. | Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? |
Discuss |
Answer: (d).Session Initiation Protocol
|
46. | Match the following port numbers with their uses : (a) 23 (i) World wide web (b) 25 (ii) Remote Login (c) 80 (iii) USENET news (d) 119 (iv) Email code (a) (b) (c) (d) |
Discuss |
Answer: (d).(ii) (iv) (i) (iii)
|
47. | Which of the following is not associated with the session layer ? |
Discuss |
Answer: (c).Semantics of the information transmitted
|
48. | What is the size of the 'total length' field in IPv4 datagram ? |
Discuss |
Answer: (c).16 bits
|
49. | Which of the following is/are restriction(s) in classless addressing ? |
Discuss |
Answer: (d).All of the above
|
50. | The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
Discuss |
Answer: (d).Quantization
|