Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Quearn

Quearn Logo Quearn Logo

Quearn Navigation

  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Quearn Academy
  • About Us
  • Blog
  • Contact Us

Computer Network

Computer Network MCQ (Multiple Choice Questions)

 

Share
  • Facebook
0 Followers
3k Answers
635 Questions
Home/Computer Science/Computer Network

Quearn Latest Questions

VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which of the following organizations is primarily concerned with military encryption systems? a) NSA b) NIST c) IEEE d) ITU

  • 0

ittransport layer
  • 3 Answers
  • 11 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities. a) confidentiality b) integrity c) availability d) authenticity

  • 0

ittransport layer
  • 2 Answers
  • 5 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

n computer security _______ means that computer system assets can be modified only by authorized parities. a) confidentiality b) integrity c) availability d) authenticity

  • 0

ittransport layer
  • 2 Answers
  • 5 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

IP Security operates in which layer of the OSI model? a) Network b) Transport c) Application d) Physical

  • 0

ittransport layer
  • 5 Answers
  • 10 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

ESP does not provide ________ a) source authentication b) data integrity c) privacy d) error control

  • 0

ittransport layer
  • 6 Answers
  • 12 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

IPsec defines two protocols: _______ and ________ a) AH; SSL b) PGP; ESP c) AH; ESP d) PGP; SSL

  • 0

ittransport layer
  • 4 Answers
  • 10 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

______ provides authentication at the IP level. a) AH b) ESP c) PGP d) SSL

  • 0

ittransport layer
  • 3 Answers
  • 7 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which two types of IPsec can be used to secure communications between two LANs? a) AH tunnel mode b) ESP tunnel mode c) Both AH tunnel mode and ESP tunnel mode d) ESP transport mode

  • 0

ittransport layer
  • 3 Answers
  • 7 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? a) Kerberos V5 b) SHA c) MD5 d) Both SHA and MD5

  • 0

ittransport layer
  • 3 Answers
  • 7 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? a) AH transport mode b) ESP transport mode c) ESP tunnel mode d) AH tunnel mode

  • 0

ittransport layer
  • 2 Answers
  • 6 Views
Answer
Load More Questions

Sidebar

Ask A Question
  • Popular
  • Answers
  • imran

    Point out the wrong statement. A. The standard instances are ...

    • 218 Answers
  • imran

    Point out the correct statement. A. A volume is mounted ...

    • 206 Answers
  • VARISHA PARVEZ

    Which type of e‐commerce focuses on consumers dealing with ...

    • 180 Answers
  • monoshwinee
    monoshwinee added an answer C.iaas May 29, 2023 at 5:43 pm
  • Sagar Tiwari
    Sagar Tiwari added an answer A.0.5% each CGST and SGST May 29, 2023 at 5:42 pm
  • Shivangi
    Shivangi added an answer D.All of the given options May 29, 2023 at 5:42 pm

Top Members

Afiya Arshi

Afiya Arshi

  • 0 Questions
  • 0 Answers
Hafsa Quraishi

Hafsa Quraishi

  • 0 Questions
  • 0 Answers
TANNU .

TANNU .

  • 0 Questions
  • 0 Answers

Trending Tags

account algorithm analytics answer bank c computer computer science python cs e commerce electric electronics it language mcq mechanical physics programming python question

Explore

  • Home
  • Quearn Academy
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help

Footer

Quearn

Quearn is a social questions & Answers Engine which will help you establish your community and connect with other people, Also you Can Earn Money.

About Us

  • Meet The Team
  • Blog
  • About Us
  • Contact Us

Legal Stuff

  • Terms of Use
  • Privacy Policy
  • Cookie Policy

Help

  • Knowledge Base
  • Support

Follow

© 2018-2023 Quearn®. All Rights Reserved | Developed by ASHAS Industries Proudly 🇮🇳