Computer Networks Questions & Answers – EIGRP

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “EIGRP”. 1. EIGRP is a routing protocol design by Cisco. a) True b) False 2. EIGRP metric is ________ a) K-values b) Bandwidth only c) Hop Count d) Delay only 3. EIGRP can support ____________ a) VLSM/subnetting b) Auto summary c) Unequal … Read more

advertisement

Computer Networks Questions & Answers – PPP

This set of Basic Computer Networks Questions and Answers focuses on “PPP”. 1. Both HDLC and PPP are Data link layer protocols. a) True b) False 2. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? a) LCP b) NCP c) Both LCP and NCP d) TCP … Read more

advertisement

Computer Networks Questions & Answers – Cisco Lan Switches

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Cisco Lan Switches”. 1. ___________ command is used to enter privileged mode in a switch. a) enable b) configure terminal c) hostname d) wr 2. Which command is used to configure telnet for remote access? a) enable b) login c) line vty … Read more

advertisement

Computer Networks Questions & Answers – Intrusion Detection Systems

This set of Computer Networks Questions and Answers for Entrance exams focuses on “Intrusion Detection Systems”. 1. Which of the following is an advantage of anomaly detection? a) Rules are easy to define b) Custom protocols can be easily analyzed c) The engine can scale as the rule set grows d) Malicious activity that falls … Read more

advertisement

Computer Networks Questions & Answers – Digital Signatures

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Digital Signatures”. 1. What can it be called, if an attacker determines the private key of the user, after breaking the signature scheme? a) Universal forgery b) Total break c) Selective forgery d) Existential forgery 2. Which of the following is not … Read more

advertisement

Computer Networks Questions & Answers – Hash Functions

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Hash Functions”. 1. Which of the following equation is correct in case of hash function, where M = input, N = hash value, H = hash function? a) H = M(N) b) M = H(N) c) N = H(M) d) N = … Read more

advertisement

Computer Networks Questions & Answers – Public Key Cryptography

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Public Key Cryptography”. 1. What are the two keys that are used in asymmetric key cryptography? a) Secret key and private key b) Private key and public key c) Public key and secured key d) Secured key and private key 2. Who … Read more

advertisement

Computer Networks Questions & Answers – Symmetric Key Cryptography

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Symmetric Key Cryptography”. 1. Which of the following is not an alternative name for symmetric key cryptography? a) Secret key cryptography b) Public key cryptography c) Conventional encryption d) Private key cryptography 2. What is the cipher text for the text “GREET … Read more

advertisement

Computer Networks Questions & Answers – RPC

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RPC”. 1. An RPC (remote procedure call) is initiated by the _________ a) server b) client c) client after the sever d) a third party 2. In RPC, while a server is processing the call, the client is blocked ________ a) unless … Read more

advertisement

Computer Networks Questions & Answers – RTP

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RTP”. 1. Real-time transport protocol (RTP) is mostly used in _________ a) streaming media b) video teleconference c) television services d) all of the mentioned 2. RTP is used to ________ a) carry the media stream b) monitor transmission statistics of streams … Read more

advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.