Computer Networks — Test 14
Page 1 of 3
Question 1
What is the vulnerable time in carrier sense multiple access?
0
System Administrator 2026
Question 2
Slotted aloha has vulnerable time that is half of the vulnerable time of pure aloha.
0
System Administrator 2026
Question 3
Which of the following is not a channelization protocol?
0
System Administrator 2026
Question 4
What technique is used by the TDMA to accomplish synchronization?
0
System Administrator 2026
Question 5
Which of the following is not an alternative name for symmetric key cryptography?
0
System Administrator 2026
Question 6
What is the cipher text for the text “GREET HER”, if Caesar Cipher is used(key=3)?
0
System Administrator 2026
Question 7
What is the cipher text for the message “TAKE ME TO THE PARTY”, id Rail Fence technique is used with two rows?
0
System Administrator 2026
Question 8
What are the two broad categories of symmetric key cryptography?
0
System Administrator 2026
Question 9
Which of the following algorithm does not belong to symmetric key ciphers?
0
System Administrator 2026
Question 10
Which of the following is an advantage of symmetric cipher?
0
System Administrator 2026