System Administrator 2026
Extensible authentication protocol is authentication framework frequently used in ______
  • A. Wired personal area network
  • B. Wireless networks
  • C. Wired local area network
  • D. Wired metropolitan area network
Pretty good privacy (PGP) is used in ______
  • A. Browser security
  • B. Email security
  • C. FTP security
  • D. Wifi security
PGP encrypts data by using a block cipher called ______
  • A. International data encryption algorithm
  • B. Private data encryption algorithm
  • C. Internet data encryption algorithm
  • D. Local data encryption algorithm
Open Shortest Path First (OSPF) is also called as _____________
  • A. Link state protocol
  • B. Error-correction protocol
  • C. Routing information protocol
  • D. Border gateway protocol
The computation of the shortest path in OSPF is usually done by ____________
  • A. Bellman-ford algorithm
  • B. Routing information protocol
  • C. Dijkstra’s algorithm
  • D. Distance vector routing
Which of the following is false with respect to the features of OSPF?
  • A. Support for fixed-length subnetting by including the subnet mask in the routing message
  • B. More flexible link cost than can range from 1 to 65535
  • C. Use of designated router
  • D. Distribution of traffic over multiple paths that have equal cost to the destination
In OSPF, which protocol is used to discover neighbour routers automatically?
  • A. Link state protocol
  • B. Error-correction protocol
  • C. Routing information protocol
  • D. Hello protocol
Which of the following is not a type of OSPF packet?
  • A. Hello
  • B. Link-state request
  • C. Link-state response
  • D. Link-state ack