General Questions on Networking related Questions and Answers - Page 7

Question 62 : Voice privacy in GSM cellular telephone protocol is provided by
1. A5/2 cipher
2. b5/4 cipher
3. b5/6 cipher
4. b5/8 cipher
View Answer   Discuss with Members

Question 67 : Which one of the following algorithm is not used in asymmetric-key cryptography?
1. rsa algorithm
2. diffie-hellman algorithm
3. electronic code book algorithm
4. none of the mentioned
View Answer   Discuss with Members

Question 68 : In asymmetric key cryptography, the private key is kept by
1. sender
2. receiver
3. sender and receiver
4. all the connected devices to the network
View Answer   Discuss with Members

Question 70 : Which routing protocol implements the diffusing update algorithm?
1. IS-IS
2. IGRP
3. EIGRP
4. OSPF
View Answer   Discuss with Members


View 61 - 70 of 117 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter