Which are the two modes of IP security?
A. | Transport and certificate |
B. | Transport and tunnel |
C. | Certificate and tunnel |
D. | Preshared and transport |
Option: B Explanation :
IPsec can be implemented in a host-to-host transport mode, as well as in a network tunneling mode. Click on Discuss to view users comments. |
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :
A. | CTTOEWMROPNRUEK |
B. | MROUEKCTTPNROEW |
C. | OEWPNRCTTUEKMRO |
D. | UEKPNRMROOEWCTT |
Option: C Explanation : Perform Transposition Cipher. Click on Discuss to view users comments. |
Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?
A. | 32 kbps |
B. | 64 kbps |
C. | 128 kbps |
D. | 256 kbps |
Option: C Explanation :
The bit rate can be calculated as : Click on Discuss to view users comments. |
The maximum payload of a TCP segment is :
A. | 65,535 |
B. | 65,515 |
C. | 65,495 |
D. | 65,475 |
Option: C Explanation : Each segment, including the TCP header, must fit in the 65515 byte IP payload, and the TCP header is 20 bytes at least, so the maximum payload of a TCP segment is 65515-20=65495 bytes. Click on Discuss to view users comments. |
An all-pairs shortest-paths problem is efficiently solved using :
A. | Dijkstra' algorithm |
B. | Bellman-Ford algorithm |
C. | Kruskal algorithm |
D. | Floyd-Warshall algorithm |
Option: D Explanation :
The Dijsktra algrithm solves the Single-Source Shortest Paths (SSSP) problem. Click on Discuss to view users comments. |