0% found this document useful (0 votes)
22 views5 pages

QB CNS

Uploaded by

vishal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views5 pages

QB CNS

Uploaded by

vishal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Which sublayer of the data link layer performs data link functions that depend upon the type of
medium?
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. error control sublayer

2. When 2 or more bits in a data unit has been changed during the transmission, the error is called
____________
A. random error
B. burst error
C. inverted error
D. double error

3. A local telephone network is an example of a _______ network.


A. Packet switched
B. Circuit switched
C. Bit switched
D. Line switched

4. There are the following statements that are given below, which of them are correct ARP?
1. The ARP protocol is used to get destination MAC address from the destination IP address.
2. The ARP protocol is used to get the destination IP address from the destination MAC
address.
3. The ARP stands for Address Resolution Protocol.
4. The ARP protocol works on the same network as well as connected networks.
A. 1 and 3
B. 1 and 2
C. 1, 3 and 4
D. 2, 3, and 4

5. The size of an IP address in IPv6 is _________


A. 4bytes
B. 128bits
C. 8bytes
D. 100bits

6. Which of the following is not e-mail protocol?


A. POP
B. IMAP
C. SMTP
D. FTP

7. TCP is a _________ layer protocol in the TCP/IP protocol stack


A. Network
B. Transport
C. Application
D. Physical

8. In asymmetric key cryptography, the private key is kept by __________


A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network

9. What is data encryption standard (DES)?


A. block cipher
B. stream cipher
C. bit cipher
D. d) byte cipher

10. According to the CIA Triad, which of the below-mentioned element is not considered in the
triad?
Confidentiality
Integrity
Authenticity
Availability

11. What is the full-form of CMAC?


Code-based MAC
Cipher-based MAC
Construct-based MAC
Collective-based MAC

12. _____________ ensures that the message is real, accurate and safeguards from unauthorized
user modification during the transmission.
A. Authentication
B. Non-repudiation
C. Integrity
D. None of the above

13. Which among the following represents the objectives/requirements of Data Link Layer?
A. Frame Synchronization
B. Error & Flow Control
C. Both a & b
D. None of the above

14. CRC stands for __________


A. cyclic redundancy check
B. code repeat check
C. code redundancy check
D. cyclic repeat check
15. FDDI stands for_______
A. Fiber Distributed Data Interface
B. Fiber Data Distributed Interface
C. Fiber Dual Distributed Interface
D. Fiber Distributed Data Interface

16. RARP stands for?


A. Reserve Address Resolution Protocol
B. Reverse Address Resolution Protocol
C. Revert Address Resolution Protocol
D. Responsive Address Resolution Protocol

17. TCP is a _________ layer protocol in the TCP/IP protocol stack


A. Network
B. Transport
C. Application
D. Physical

18. POP stands for __________.


A. Post office Protocol
B. Post office Post
C. Post Operating Protocol
D. Pre-Operating Protocol

19. The shift cipher is sometimes referred to as the______.


Caesar cipher
shot cipher
cipher
cipher text

20. In asymmetric key cryptography, the private key is kept by __________


sender
receiver
sender and receiver
all the connected devices to the network

21. What is data encryption standard (DES)?


block cipher
stream cipher
bit cipher
byte cipher

22. How many rounds does the AES-256(256 bits block) perform?
10
b.12
14
d.16
23. When a hash function is used to provide message authentication, the hash function value is
referred to as ______
A. Message Field
B. Message Digest
C. Message Score
D. Message Leap

24. Which of the following is /are offered by the Hash functions?


A. Authentication
B. Non repudiation
C. Data Integrity
D. All of the above

Unit I

1. Explain various functions provided by Data link Layer.


2. Explain Flow Control and various methods of Flow Control in Data Link Layer.
3. Explain concept of framing and various methods of framing.

Unit II

1. Explain various functions provided by Network Layer


2. Explain the concept of Circuit Switching and Packet Switching.
3. Explain following protocols in Network Layer IP, ARP, DHCP, ICMP

Unit III

1. Explain various functions Services provided by Transport Layer.


2. Explain in detail User Datagram Protocol and Transmission Control Protocol.
3. Explain following Application Layer Protocols

a) FTP b) DNS c) Telnet

Unit IV

1. Explain in detail the network security goals.

2. Explain various cryptographic attacks in detail

3. Explain following Email protocols

A ) SMTP b) IMAP c) POP

Unit V

1. Explain in detail DES algorithm in detail.


2. Discuss AES algorithm in detail.
3. Explain the international Data Encryption Algorithm in detail.
4. Explain following with respect to AES
a. Transformations,
b. Key Expansion
Unit VI

1. Explain in detail Message Authentication Code.


2. Discuss Hash Function in detail.
3. What is Digital Signature? Explain working of Digital Signature.
4. Explain Public – Key Infrastructure in detail.

You might also like