You are on page 1of 2

Network & System Security and Data Communication & Computer Networks

Holistic Examination
Name__________________________________________IDNo_______________

1. Which of the following are not the responsibilities of the data link layer?

a. Framing d. flow control


b. error control e. none
c. Addressing

2. which of the following is global addressing scheme:


a. Physical Address c. link-to-link address
d. all
b. Logical address e. none

3. The reason for IPv6 Address generation is:


a. Being 32 bits long d. Address depletion
b. IP address being automatic e. b and c
c. Being 128 bits long
4. Which of the following is connectionless transport layer protocol?
a. TCP d. SCTP
b. SMTP e. none
c. UDP
5. Which of the following address is Class A?
a. 182.5.235.6 d. 109.214.2.11
b. 251.2.56.0 e. 201.35.236.1
c. 228.5.23.36
6. Which of the following Security services fulfills secrecy or disclosure of information?
a. Confidentiality d. Non-repudiation
b. Authentication e. None
c. Integrity
7. Which of the following security attack is attack on Integrity?
a. Interruption d. Fabrication
b. Interception e. None
c. Modification
8. _______________ is the design of algorithms for encryption and decryption.
a. Cryptology d. Steganography
b. Cryptography e. None
c. Cryptanalysis
9. Security of conventional encryption depends up on ____________________.
a. Powerfulness of the c. Strength of encryption
encryption algorithm algorithm
b. Secrecy of the key d. All
e. None
10. ___________________ is the process of attempting to discover original message by
exhaustibly trying all possibilities.
a. Encryption d. Cryptanalysis
b. Decryption e. Cryptology
c. Cryptography
Network & System Security and Data Communication & Computer Networks
Holistic Examination
Name__________________________________________IDNo_______________

You might also like