CN MCQ
CN MCQ
DEPARTMENT OF ECE
Computer Network Question Bank EC-602
1|Pa ge
15. Method of communication in which transmission takes place in both directions,But only in one
direction at a time, is called –
a) Simplex b) full-duplex c) four-wire circuit d) half-duplex
16. Communication between a computer and a keyboard involves –
a) Simplex b) Half-duplex c) Duplex d) Automatic
17. The key elements of a protocol are –
a) syntax b) semantics c) timing d) all of these
18. The different networking standards are –
a) De facto (i.e., by fact) b) De jure (i.e., by law) c) Both a and b d) None of these
19. If a protocol specifies that data should be sent at 100 Mbps, what is the issue?
a) syntax b) semantics c) timing d) none of these
20. When a protocol specifies that the address of the sender must occupy the first 4 bytes of a message,
what is this issue?
a) syntax b) semantics c) timing d) none of these
21. Repeaters function in which layer(s)?
a) physical b) data link c) network d) both a and b
22. Bridges/Switches function in which layer(s)?
a) physical b) data link c) network d) both a and b
23. Routers function in which layers?
a) physical and data link b) physical, data link and network
c) data link and network d) network and transport
24. Gateways in OSI model can function all the way up to –
a) transport layer b) session layer c) presentation layer d) application layer
25. Which of the following can be handled by a gateway?
a) protocol conversion b) packet resizingc) data encapsulation d) all of the above
26. Protection of data from a natural disaster such as a tornado belongs to which of the following network
issue –
a) performance b) reliability c) security d) management
27. In which OSI layers does FDDI protocol operate?
a) Physical b) Data link c) Network d) a and b both
28. Which of the following allows devices on one network to communicate with devices on another
network?
a) Multiplexer b) Gateway c) Switch d) Modem
29. The two parameters used for measuring the performance of a network are –
a) throughput and delay b)power and delay
c)power andthroughput d)throughput and buffer size
30. Different computers are connected to a LAN by a cable and –
a) Modem b) NIC c) special wires d) telephone lines
31. The extended ASCII is of bit size and can represent up to characters.
a) 7 bit, 128 b) 8 bit, 128 c) 8 bit, 256 d) 7 bit, 256
2|Pa ge
Part –B [WBUT Exam Type Questions]
[5 marks each]
1. For n devices, calculate the number of cable links required for a mesh, ring, bus and star topology.5
2. What are the various modes of communication? Explain the fiber optic cable.5
3. What do you mean by the term protocol? What are the key elements of a protocol?5
4. What are the different criteria that make a network effective and efficient?5
5.Discuss about the different kinds of transmission modes. 5
6.Explain the utility of layered network architecture. Compare OSI and TCP/IP reference model. 2+3
7.What are the responsibilities of the network layer and transport layer in the Internet model? 5
8.How do the layers of the TCP/IP model correlate to the layers of the OSI model? 5
9. What do you mean by transmission impairments? Discuss about different kinds of transmission
impairments. 1+4
10. Discuss protocols and standards in brief. Explain why a trailer is needed in data link layer frame. 3+2
11. Discuss about the different network topologies. 5
12. Compare star and mess topology with advantages and disadvantages. 5
[Part – C]
1. Assume a layered networking architecture. The packet structure in this architecture, as seen at the
lowest (physical) layer, is as follows:
WBUT Header AOT Header CSE Header STUDENT data
| 5 Bytes | 15 Bytes | 20 Bytes |
Sketch the layered protocol model that applies to the given architecture (i.e. packet) by labeling each
layer in the figure below with the appropriate layer name. Your choices are WBUT, AOT, CSE and
STUDENT data.
Layer
Layer
Layer
Layer
2. If, in the given architecture above, the maximum length of the user data field is 150 bytes, what is the
overhead (as a percentage!) to send a 1600 byte user message?
3. Explain the typical characteristics of a LAN in terms of addressing mechanism, topology, MAC
protocol, channel capacity, cost and application.
3|Pa ge
Module – II: Physical Layer
Part – A [Multiple Choice Type Questions]
1. Guard band increases the bandwidth for –
a) TDM b) WDM c) FDM d) none of these
2. A communication line with bandwidth 1 MHz and SNR value 63, what is the approximate bit rate and
signal level?
a) 8 Mbps, 4 b) 6 Mbps, 3 c) 4 Mbps, 2 d)6 Mbps, 4
3. Manchester code is a–
a) Non-return to zero code b) polar code c) both a and b d) none of these
4. Which is not a basic multiplexing method?
a) FDM b) TDM c) WDM d) none of these
5. The maximum data rate of a channel of 3000 Hz bandwidth and SNR of 30 dB is –
a) 15,000 bps b) 60,000 bps c) 1500 bps d) 3,000 bps
6. Before data can be transmitted, they must be transformed into–
a) low-frequency sine wave b) electromagnetic signals c) aperiodic signals d) none of these
7. Baud means –
a) number of bits transmitted per unit time b) number of bytes transmitted per unit time
c) rate at which the signal changes d) none of these
8. The maximum data rate of a channel of 3000 Hz bandwidth and SNR of 30 dB is –
a) 15,000 bps b) 60,000 bps c) 1500 bps d) 3,000 bps
9. If the maximum value of a signal is 31 and minimum value is -32, how many bits are used for
coding?
a) 4 b) 5 c) 6 d) 7
10. In networking terminology UTP means–
a) Unshielded twisted pair b) Ubiquitous Teflon port
c) Uniformly terminating port d) Unshielded T-connector port
11. In synchronous TDM, the data rate of link is –
a) n times faster b) n times slower c) 2 times faster d) 2 times slower
12. A telephone network is an example of ................... network.
a) Packet-switched b) Circuit-switched c) Message-switched d) None of the above
13. BNC connectors are used by ..................... cable.
a) UTP b) STP c) Coaxial d) Fiber-optic
14. Which is not a basic multiplexing method?
a) FDM b) TDM c) WDM d) IMUX
15. In an optical fiber, the inner core is .................. the cladding.
a) denser than b) less dense than c) the same density as d) another name for
16. The geostationary satellite used for communication systems –
a) rotates with earth b) remains stationary relative to the earth
c) is positioned over equator d) all the above
4|Pa ge
17.The RJ45 is a connector used in case of .
a) 10Base2 b) 10Base5 c) 10BaseT d) 10BaseF
18. For separating channels in FDM, it is necessary to use .
a) time slots b) band pass filters c) differentiator d) Integrator
19. The number of times a signal changes value per second is called the rate.
a) Bit rate b) Baud rate c) frequency rate d) Bit interval
5|Pa ge
13. Give examples to illustrate the following scenarios: 5
a. Bit rate = Baud rate
b. Bit rate < Baud rate
c. Bit rate > Baud rate
[15 marks each]
14. What do you mean by transmission impairments? Discuss about different kinds of transmission
impairments. Discuss about the different kinds of transmission medium. 3+6+6
15. Explain the different kinds of digital-to-digital encoding techniques. What is scrambling techniques?
12 + 3
16. In analog transmission, what is the role of carrier signal? Discuss about the different kind of digital-
to-analog conversion. 3 + 12
17. Explain PCM. Differentiate between bit rate and baud rate. What is quantization error? Explain
QAM. What is the difference between PSK and QAM? 5+3+2+3+2
[Part – C]
1. Justify the reason for which the PCM sampling rate has been set at 125 sec.
2. Mention the advantage of QAM over ASK or PSK. Discuss 8-QAM constellation with two amplitude
and four phases using the necessary diagram.
3. A telephone line can normally transmit frequencies in the range 300 to 3300 Hz, and the signal-to-
noise ratio is typically 3162. Estimate the capacity of this channel in bps.
4. A channel has a signal-to-noise ratio of 63 and a bandwidth of 1 MHz. What are the appropriate bit
rate and signal level?
5. Draw a space division three stage switch. There are 18 inputs and 20 outputs. Stage 1 has three
switches, stage 2 has two switches and stage 3 has four switches. How many cross points are needed
to compare this to a system using just one crossbar?
6. Determine the bit rate for high-definition TV (HDTV).
7. Consider a PCM encoder which samples an input analog signal at the rate 10 KHz, and digitizes each
sample in 8 bits. What will be the required data rate for the communication channel?
6|Pa ge
5. Four bits are used for packed sequence numbering in a sliding window protocol used in computer
network. What is the maximum window size?
a) 4 b)8 c) 15 d) 16
6. Different computers are connected to a LAN by a cable and –
a) Modem b) NIC c) special wires d) telephone lines
7. For Stop-and-Wait ARQ, for n data packets sent ………acknowledgements are needed.
a) n b) 2n c) n-1 d) n+1
8. In HDLC inserts a 0 bit after ..................... consecutive 1 bits in the message data.
a) 4 b)6 c) 5 d)7
9. In which ARQ, if a NAK received, onlythe specific damaged or lost frame is retransmitted?
a) stop-and-wait b) go-back-n c) selective repeat d) both a and b
10. The l-persistent CSMA / CD is a special case of the p-persistent approach with p equal to –
a) 0.5 b) 0.1 c) 1.0 d) None of these.
11. Pure ALOHA has a maximum efficiency of
a) 18% b)37%c) 10% d) none of these
12. In the .......... random-access method there is no collision
a) ALOHA b) CSMA / CD c) CSMA / CA d) Token passing
13. How much channel throughput of Slotted ALOHA will be in comparison to Pure ALOHA?
a) Same b) Double c) Three times d) None of these
16. FDDI is a –
a) ring network b) star network c) mesh network d) bus network
17. A bridge has access to which address of a station on the same network?
a) physical b) network c) service access point d) all of the above
18.Bluetooth uses to communicate between two devices.
a) Radio wave b) Microwave c) Infrared d) Satellite
19. What is the Hamming distance between 11100110 and 10100011?
a) 2 b) 3 c) 4 d) 5
20. An Ethernet has 38 bytes of data. How many bytes padding should be added?
a) 12 b) 8 c) 26 d) 46
7|Pa ge
m-1
4. Prove thatthe maximum size of window in Selective Repeat ARQ is 2 where m is the number of bits
used for sequence number.
5. What is working operation of stop and wait ARQ for lost acknowledgement? 5
6. Prove thatthe maximum size of window in Go-Back-N ARQ is (2 – 1) where m is the number of bits
m
8|Pa ge
d) A 1 km 10 Mbps CSMA/CD LAN has a propagation speed of 200 m/µ sec. Data frames are 256
bits long including 32 bits of header, checksum and other overhead. The first bit slot after a successful
transition is reserved for the receiver to capture the channel to send a 32 bit acknowledge frame. What
is the affective data rate excluding overhead assuming there is no collision. 1+2+5+7
22. a) Why is the contention slot of CSMA/CD protocol 2Y? Explain
b) How a station can join and leave from a Token Ring LAN?
c) What is FDDI?
d) Describe the priority scheme of a Token Bus LAN.
e) What is the function of the preamble field of the 802.3 LAN?
f) Why is 802.4 called the ―Logical Ring‖? 3+3+2+2+2+3
23. Describe 'Stop-and-wait ARQ', ‗Go-Back-N ARQ' and 'Selective repeat ARQ' protocols, with the
help of diagram. Which one is better and why? (4+4+4) + 3
24. a) Compare and contrast a random access protocol with a controlled access protocol.
b) Theaddress 43:7B:6C:DE:10:00 has been shown as the source physical address in an
Ethernet frame. The receiver has discarded the frame. Why?
c) Compare and contrast CSMA/CA with CSMA/CD.
d) What is transparent bridge? How does a repeater extend the length of a LAN?3 + 3 + 5 + 4
25. a) Name the types of HDLC frames, and give a brief description of each.
b) Draw the sender and receiver windows for a system using Go-Back-N ARQ, given the following:
i) Frame 0 is sent; frame 0 is acknowledged.
ii) Frames 1 and 2 are sent; frames 1 and 2 are acknowledged.
iii) Frames 3, 4 and 5 are sent; frame 4 is acknowledged; timer for frame 5 expires.
iv) Frames 5, 6 and 7 are sent; frames 5 through 7 are acknowledged. 9+6
[Part – C]
1. A receiver receives the code 11001110111. When it uses the Hamming coding algorithm, the result is
0101. Which bit is in error? What is the correct code?
2. An Ethernet MAC sub-layer receives 1510 bytes of data from the upper layer. Can the
databeencapsulatedin oneframe?Ifnot,howmanyframes need to be sent? Calculate the sizeofthe
dataineach frame.
9|Pa ge
6. A sliding Window protocol with selective repeat ARQ uses a sliding window size of 4. Frames were
sent as follows from station A to station B.
(a) Calculate the frames available in sender and receiver windows after frame 3 is lost.
(b) Receiver sends one data frame to after receiving frame 3 correctly, along with piggybacking
acknowledgement, then determine the frames in the sender window of station A and receiver window of
station B currently.
8. In a CSMA/CD network with a data rate of 10 Mbps, the minimum frame size is found to be 512 bits
for the correct operation of the collision detection process. Calculate the minimum frame size if we
increase the data rate to: i) 100Mbps, ii) 1Gbps, iii) 10Gbps.
10 | P a g e
5. Different computers are connected to a LAN by a cable and –
a) Modem b) NIC c) special wires d) telephone lines
6. Physical to Logical addresses conversion done by which protocol(s)?
a) RARP b) BOOTP c) DHCP d) all of the above
7. The ..........................field in IP Datagram is used for error detection.
a) urgent pointer b) checksum c) sequence number d) acknowledge number
8. ARP is a –
a) TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware
address
b) TCP/IP high level protocols for transferring files from one machine to another
c) Protocol used to monitor computers
d) Protocol that handles error and control messages
9. ICMP is a –
a) protocol handles error and control messages
b) protocol used to monitor computers
c) both a and b above
d) none of those
10. Which of the following is not an IPv6 address?
a) anycast b) multicast c) broadcast d) unicast
11. The network layer provides ..................... delivery.
a)host-to-host b) port-to-port c) process-to-process d) hop-to-hop
12. Maximum size of the data portion of the IP datagram is
a) 65515 bytes b) 65555 bytes c) 65535 bytes d) none of these
13. IP address can be used to specify a broadcast and map to hardware broadcast if available.
Byconversion broadcast address has hosted with all bits
a) 0 b) 1 c) both a and b above d) none of the above
14. Which of the following is an interior routing protocol?
a) RIP b) OSPF c) BGP d) both a and b
15. A station in a network forward incoming packets by placing them on its shortest output queue. What
routing algorithm is being used?
a) Distance vector routing b) Flooding c) Static routing d) Delta routing
16. In which routing method do all the routers have a common database?
a) distance vector b) link state c) link vector d) none of the above
17. Adaptive or dynamic directory used in packet routing changes
a) within each user session b) with each user session
c) at system generation time only d) both (a) and (b)
18. Which routing algorithm requires more traffic between routers for set-up and updating?
a) Distance vector b) Link state c) Dijkstra d) Vector link.
19. Which of the following is not an IPv6 address?
a) Anycast b) Multicast c) Broadcast d) Unicast
11 | P a g e
20. The.......................... field in IP Datagram is used for error detection.
a) urgent pointer b) checksum c) sequence number d)acknowledge number
21. Identify the class of IP address 199.1.2.3.
a. Class A
b. Class B
c. Class C
d. Class D
Note: First byte of class C ranges from 192-223
22. A subnet mask in class A has fourteen 1s. How many subnets does it define?
a. 32
b. 8
c. 64
d. 128
6
Note: default mask of class A has 8 bits. Subnet id has 14-8=6 bits so 2 = 64 subnets can be defined
23. A subnet mask in class B has nineteen 1s. How many subnets does it define?
a. 8
b. 32
c. 64
d. 128
Note: default mask of class B has 16 bits; subnet id has 19-16=3 bits so 23 = 8 subnets can be defined
24. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?
a. 201.14.78.32
b. 201.14.78.65
c. 201.14.78.64
d. 201.14.78.12
Note: since first 3 bytes of subnet mask is 255 255 255. So first 3 bytes of subnet address is 201.14.78.
The last bytes is 65& 224 = 01000001(bin) & 11100000 (bin) = 01000000 (bin) = 64
25. Class has the greatest number of hosts per given network address.
a. A
b. B
c. C
d. D
Note: Class A’s netid length is the greatest
26. In routing, the full IP address of a destination is given in the routing table.
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
27. In routing, the mask & destination addresses are both 0.0.0.0 in routing table.
a. Next-hop
b. Network-specific
12 | P a g e
c. Host-specific
d. Default
28. In routing, the destination address is a network address in the routing table.
a. Next-hop
b. Network-specific
c. Host-specific
d. Default
29. Find the netid and the hostid of the following IP addresses.
a. 114.34.2.8 (netid: 114, hostid: 34.2.8)
b. 19.34.21.5 (netid: 19, hostid: 34.21.5)
c. 23.67.12.1 (netid: 23, hosted: 67.12.1)
d. 127.23.4.0 (netid: 127, hosted: 23.4.0)
30. In a class B subnet, we know the IP address of one of the hosts and the mask as given below:
IP address: 195.134.112.66
Mask: 255.255.224.0
What is the first address (network address)?
The first address is 195.134.96.0 (third byte is 112&224 = 96)
31. Find the masks that create the following number of subnets in class B.
a. 2 (255.255.128.0 : put first bits of 3rd byte 1)
b. 5 (255.255.224.0: put first 3 bits of 3rd byte 1)
c. 30 (255.255.248.0: put first 5 bits of 3rd byte 1)
d. 62 255.255.242.0: put first 6 bits of 3rd byte 1)
e. 120 255.255.254.0 : put first 7 bits of 3rd byte 1)
f. 250 255.255.255.0 : all 8 bits of 3rd byte 1)
Note: all bits in first 2 bytes are 1 since the mask is for class B address, for subnet id field, choose the
m1 m
bit number (m) that fits 2 < n <= 2 (n is the number provided in the question and m is the bits
number in subnet field) then fill the m bit with 1s.
32. What is the maximum number of subnets in class C using the following masks?
a. 255.255.255.192
(since 4th byte of the mask is 192 = 11000000(bin), with two 1s on left side so the answer is
22 = 4)
b. 255.255.255.224
(since 4th byte of the mask is 224 = 11100000(bin), with 3 1s on left side, so the answer is
23 = 8)
c. 255.255.255.240 (same method as above, the answer is 16)
d. 255.255.255.0 (same method as above, no bit assigned for subnetid, so there is no subnet, the
answer should be 0)
33. For each of the following subnet masks used in class B, find the number of 1s that defines the subnet.
a. 255.255.192.0 (2 since there are two 1s on the leftmost bits on third bytes)
b. 255.255.0.0 (0 since there are no 1s on the leftmost bits on third bytes)
c. 255.255.224.0 ( 3 since there are 3 1s on leftmost bits on the third bytes)
d. 255.255.255.0 ( 8 since there are 8 1s on the leftmost bits on the third bytes)
Note: default mask of class B is 255.255.0.0
13 | P a g e
34. Write the following masks in the /n format.
a. 255.255.255.0 (/24 since 24 leftmost bits are 1s)
b. 255.0.0.0 (/8 since 8 leftmost bits are 1s)
c. 255.255.224.0 (/19 since 19 leftmost bits are 1s)
d. 255.255.240.0 (/20 since 20 leftmost bits are 1s)
14 | P a g e
[15 marks each]
19. What is IP address? Describe different classes of IP address. Why IP address is unique and universal?
Explain how CIDR is improving the IP address utilization? Explain the usefulness of subnet mask.
Draw the header format of IPv4 packet. Explain the utility of header length field. 1+2+1+2+2+5+2
20. a) Differentiate static routing with dynamic routing. Explain various fields of a typical routing table.
b) Explain link state routing principle. What is flooding?
c) Explain count to infinity problem. (2+3)+(3+2)+5
21. a) What is the difference between classful addressing and classless addressing in IPv4?
b)An ISP has a block of 1024 addresses. It needs to divide the addresses among 1024 customers.
Does it need sub netting? Explain your answer.
c) Calculate the HLEN field (in IPv4) value if the total length is 1200 bytes; 116 of which is data
from the upper layer.
d) Write the advantages of ICMP over the IPv4. 3+3+5+4
22. a) Briefly describe IPv4 header fields.
b) What do you mean by unicasting,multicasting and broadcasting?
c) What are the differences between Distance Vector Routing and Link State Routing? 6+4+5
23. a) What is IP address? Describe different classes of IP address.
b) Explain the significance of the ARP and ICMP in networking.
c) Differentiate between sub-netting and super-netting.
d) Suppose an organization is given the block 190.100.0.0/16 (65,536 addresses). The organization
needs to divide the addresses into three groups of customers —
st
i. 1 group has 64 customers; each needs 256 addresses.
ii.2nd group has 128 customers; each needs 128 addresses.
iii.3rd group has 128 customers; each needs 64 addresses.
Design the sub-blocks and find out how many addresses are still available. 4 + 3 + 2 + 6
24. a) What do you mean by routing? What is the difference between static and dynamic routing?
b) Describe the distance vector routing algorithm. Discuss the count-to-infinity problem in distance
vector routing algorithm and provide a solution mechanism for it.
c) Compare between IPv4 and IPv6 packet headers.2 + (5+4) + 4
25. Write short notes on the following (any three): 3x5
a. ARP
b. RARP
c. BOOTP
d. DHCP
e. ICMP
f. IGMP
23. DiscussIPv6 address structure in brief. Describe link state routing with example. Explain the necessity
of hierarchical routing.4 + 8 + 3
24. Distance vector routing suffers from count-to-infinity problem; BGP uses distance vector routing
principle but not suffers from count-to-infinity problem. Why? Describe the OSPF routing algorithm
along with the utility of ―Hello‖ and ―Link state update‖ message. Discuss about the different types
of OSPF links. 5+6+4
25. What is routing? Why is it needed? Define non-adaptive and adaptive routing algorithm. Explain
shortest path routing algorithm. Compare it with flooding. 2+2+4+5+2
15 | P a g e
[Part – C]
1. Mention the application of each class present in classful addressing (unicast, multicast, broadcast, or
reserved). Explain the differences between classful addressing and classless addressing in IPv4 with
regard to working principle.
2. An organization is granted a block 130.56.0.0/16. The administrator has created 1024 subnets.
a. Find the number of addresses in each subnet.
b. Find the subnet prefix.
c. Find the first and the last address in the first subnet.
d. Find the first and the last address in the last subnet.
3. An ISP is granted a block of addresses starting with120.60.4.0/22. The ISP wants to distribute these
blocks to 100 organizations with each organization receiving just eight addresses. Design the sub-
blocks and give the slash notation for each sub-block. Find out how many addresses are still available
after these allocations.
4. In a block of addresses, we know the IP address of one host is 25.34.12.56/16. Calculate the first
address (network address) and the last address (limited broadcast address)inthis block.
6. UDP needs the address to deliver the user datagram to the correct application program.
a. Port
16 | P a g e
b. Application
c. Internet
d. Physical
9. Which of the following is not part of the UDP user datagram header?
a. Length of header
b. Source port address
c. Checksum
d. Destination port address
10. A host can be identified by while a program running on the host can be identified by .
a. An IP address; a port number
b. A port number; an IP address
c. An IP address; a host address
d. An IP address; a well-known port
13. The timer prevents a long idle connection between two TCPs.
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
17 | P a g e
15. Karn‘s algorithm is used in calculations by the timer.
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
17. The timer keeps track of the time between the sending of a segment and the receipt of an
acknowledgment.
a. Retransmission
b. Persistence
c. Keep-alive
d. Time-waited
18. A special segment called a probe is sent by a sending TCP when the _ timer goes off.
a. Transmission
b. Persistence
c. Keep-alive
d. Time-waited
18 | P a g e
11. What is port address and socket address? Among TCP and UDP, which one is more reliable and why?
Why we use unreliable one? Draw the header format of TCP and explain different fields.
3+4+2+7
12. Describe the method of congestion control in datagram networks. How does it differ from the method
of congestion control in virtual circuit networks? 9+6
[Part – C]
1. Compare between the TCP header and the UDP header. List the fields in the TCP header that are
missing from UDP header. Give the reason for their absence.
2. Are there any circumstances when connection-oriented service will (or at least should) deliver packets
out of order? Explain.
19 | P a g e
c) Compare between HTTP GET and HTTP POST methods.
d) Explain the significance of CGI. 2+6+4+3
5. a) What do you mean by ‗terminal network‘? How are options negotiated in TELNET?How are
control and data characters distinguished in NVT?
b) Describe the working principle of SNMP in brief. (2+4+3) + 6
20 | P a g e
Part – B [WBUT Exam Type Questions]
[5 marks each]
1. Describe RSA algorithm in brief.(5)
2. What do you understand by message security? Explain the terms: ‗User Authentication‘,‘ Key
Management‘ and ‗Security Protocols‘. 3+2
3. Explain CFB and OFB modes of operation. (5)
4. Describe one round of DES in brief. (5)
5. What do you mean by ‗message digest‘? What are the key requirements of message digest?2 + 3
6. What is access control? How is it different from availability? (5)
7. What is the difference between ‗stream cipher‘ and ‗block cipher‘? What are the roles of the secret,
public and private key? 2+3
21 | P a g e
PART-D[INTERVIEW QUESTIONS]
1) What is the network?
5) Which are the different factors that affect the security of a network?
6) Which are the different factors that affect the reliability of a network?
7) Which are the different factors that affect the performance of a network?
9) What is bandwidth?
11) What is a gateway? Is there any difference between a gateway and router?
22 | P a g e
26) What is anonymous FTP?
46) What is the difference between TCP/IP model and the OSI model?
23 | P a g e