System Administrator 2026
Which of the following factors affect transmission rate in DSL?
  • A. The gauge of the twisted-pair line
  • B. Degree of electrical interfernece
  • C. Shadow fading
  • D. The gauge of the twisted-pair line and degree of electrical interference
What is the preferred way of encryption?
  • A. Pre shared secret key
  • B. Using key distribution center (kdc)
  • C. Public key-encryption
  • D. Symmetric key
What is not a role of encryption?
  • A. It is used to protect data from unauthorized access during transmission
  • B. It is used to ensure user authentication
  • C. It is used to ensure data integrity
  • D. It is used to ensure data corruption doesn’t happens
What is cipher-block chaining?
  • A. Data is logically €?anded’ with previous block
  • B. Data is logically €?ored’ with previous block
  • C. Data is logically €?xored’ with previous block
  • D. None of the mentioned
What is not an encryption standard?
  • A. Aes
  • B. Tes
  • C. Triple des
  • D. Des
Which of the following is not a stream cipher?
  • A. Two fish
  • B. Rc5
  • C. Rc4
  • D. Tbone
What is a Hash Function?
  • A. It creates a small flexible block of data
  • B. It creates a small,fixed block of data
  • C. It creates a encrypted block of data
  • D. None of the mentioned
MD5 produces __________ bits hash data.
  • A. 128
  • B. 150
  • C. 160
  • D. 112
SHA-1 produces __________ bit of hash.
  • A. 128
  • B. 160
  • C. 150
  • D. 112
Which two of the following are authentication algorithms?
  • A. Mac
  • B. Aes
  • C. Das
  • D. Digital-signature