System Administrator 2026
Which of the following is not a channelization protocol?
  • A. Frequency division multiple access
  • B. Time division multiple access
  • C. Code division multiple access
  • D. Bandwidth division multiple access
What technique is used by the TDMA to accomplish synchronization?
  • A. Preamble bits
  • B. Synchronization bytes
  • C. Guard bits
  • D. Start points
Which of the following is not an alternative name for symmetric key cryptography?
  • A. Secret key cryptography
  • B. Public key cryptography
  • C. Conventional encryption
  • D. Private key cryptography
What is the cipher text for the message “TAKE ME TO THE PARTY”, id Rail Fence technique is used with two rows?
  • A. Tkmtteataeeohpry
  • B. Takemetotheparty
  • C. Taekmeotthpearyt
  • D. Yrphoeeataettmkt
What are the two broad categories of symmetric key cryptography?
  • A. Transposition and substitution
  • B. Classical and modern
  • C. Stream and block
  • D. Classical and block
Which of the following is an advantage of symmetric cipher?
  • A. (n(n-1))/2 keys are required for n people
  • B. Sharing secret key over communication channel
  • C. Brute force attack for small key size
  • D. Quick encryption and decryption
Which of the following is incorrect about symmetric key cryptography?
  • A. It uses common key for both encryption and decryption
  • B. It is a secret key cryptography
  • C. It uses single fixed length key for each algorithm
  • D. Symmetric key can be combined with asymmetric key to achieve more security
Which of the following is a disadvantage of symmetric cipher?
  • A. Quick encryption
  • B. Less computational power
  • C. High level of security
  • D. Transmission of secret key