Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which one of the following is not correct?(a) telnet is a general purpose client-server program(b) telnet lets user access an application on a remote computer(c) telnet can also be used for file transfer(d) telnet can be used for remote loginI got this question in an internship interview.My enquiry is from Telnet in section Application Layer of Computer Network

Answer» RIGHT choice is (c) telnet can also be used for file TRANSFER

For explanation: File Transfer Protocol is used for file transfer. Telnet PROVIDES access to the command-line interface on a REMOTE host.
2.

In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?(a) default mode(b) character mode(c) server mode(d) command modeThis question was addressed to me during an online interview.This intriguing question comes from Telnet in division Application Layer of Computer Network

Answer»

Correct answer is (a) default MODE

Best explanation: In the default mode, the CLIENT does not send each character TYPED by the USER to the server, thus saving the amount of packet transmissions required for executing each operation. But the server has to remain idle until the client sends the completed line wasting a lot of time.

3.

Which of the following is true for character mode operation of telnet implementation?(a) each character typed is sent by the client to the server(b) each character typed is discarded by the server(c) each character typed is aggregated into a word and then sent to the server(d) each character type is aggregated into a line and then sent to the serverThe question was asked in an online quiz.My question is based upon Telnet topic in chapter Application Layer of Computer Network

Answer»

Correct option is (a) each character typed is SENT by the client to the server

Easy explanation: In character mode, each character that the user is typing is IMMEDIATELY sent to the server which then interprets it only after the complete OPERATION command is received.

4.

The decimal code of Interpret as Command (IAC) character is _______(a) 252(b) 253(c) 254(d) 255This question was posed to me in final exam.My doubt stems from Telnet in portion Application Layer of Computer Network

Answer»

Right choice is (d) 255

For EXPLANATION I would SAY: If we want that a character be INTERPRETED by the client instead of SERVER, we use the IAC character. If IAC is followed by any other code than IAC, the client interprets it as a character.

5.

AbsoluteTelnet is a telnet client for _______ Operating system.(a) windows(b) linux(c) mac(d) ubuntuI had been asked this question by my college director while I was bunking the class.This interesting question is from Telnet topic in section Application Layer of Computer Network

Answer»

The correct ANSWER is (a) windows

Explanation: AbsoluteTelnet was originally released in 1999. It was developed by BRIAN PENCE of Celestial Software.

6.

All telnet operations are sent as ________(a) 4 bits(b) 8 bits(c) 16 bits(d) 32 bitsI have been asked this question in unit test.Asked question is from Telnet in section Application Layer of Computer Network

Answer»

Right answer is (B) 8 bits

Easy explanation: Telnet provides a bi-directional, 8-bit byte oriented communications FACILITY through which OPERATIONS are sent as 8-bit bytes for the server to interpret.

7.

Which one of the following is not true?(a) telnet defines a network virtual terminal (NVT) standard(b) client programs interact with NVT(c) server translates NVT operations(d) client can transfer files using to remote server using NVTThe question was asked during an online exam.I'm obligated to ask this question of Telnet in chapter Application Layer of Computer Network

Answer»

Correct choice is (d) client can TRANSFER files using to remote server using NVT

Easiest explanation: The client can use the NVT only to interact with the programs already PRESENT on the remote server, not to transfer files to it. To transfer files, an FTP CONNECTION has to be USED.

8.

Telnet protocol is used to establish a connection to __________(a) TCP port number 21(b) TCP port number 22(c) TCP port number 23(d) TCP port number 25I got this question in an online interview.My question is from Telnet topic in division Application Layer of Computer Network

Answer»

The correct option is (c) TCP port NUMBER 23

Best explanation: TCP port 21 is USED for FTP, TCP port 22 is used for SSH and TCP port 25 is used for SMTP. TELNET provides ACCESS to a command line interface on a remote computer using the TCP port number 23.

9.

If we want that a character be interpreted by the client instead of server _________(a) interpret as command (IAC) escape character has to be used(b) control functions has to be disabled(c) it is not possible(d) cli character has to be usedThis question was posed to me during an online exam.Query is from Telnet in section Application Layer of Computer Network

Answer»

The correct answer is (a) interpret as command (IAC) ESCAPE character has to be used

Best explanation: The client must look at each byte that arrives and look for IAC escape character. If IAC is found, the client moves on to look for any other CODE or IAC. If the next byte is IAC – a SINGLE byte is presented by the client to the terminal. If IAC is FOLLOWED by any other code than IAC, the client interprets this as a command.

10.

Which operating mode of telnet is full duplex?(a) default mode(b) server mode(c) line mode(d) character modeThis question was posed to me in my homework.My question comes from Telnet in division Application Layer of Computer Network

Answer»

Right answer is (c) line mode

To elaborate: In line mode, terminal character processing is done on the client SIDE but EDITING is enabled on the server side. Line mode REDUCES the number of packets and is useful for long delay NETWORKS.

11.

Which one of the following is not correct?(a) telnet is a general purpose client-server program(b) telnet lets user access an application on a remote computer(c) telnet can also be used for file transfer(d) telnet can be used for remote loginI have been asked this question during an interview.Enquiry is from Telnet in chapter Application Layer of Computer Network

Answer»

Correct answer is (c) TELNET can also be USED for file transfer

Easiest explanation: File Transfer Protocol is used for file transfer. Telnet PROVIDES access to the command-line INTERFACE on a REMOTE host.

12.

Telnet is used for _______(a) Television on net(b) Network of Telephones(c) Remote Login(d) Teleshopping siteThe question was asked during an internship interview.The question is from Telnet topic in section Application Layer of Computer Network

Answer» CORRECT choice is (c) REMOTE Login

The explanation is: Telnet is an application layer PROTOCOL that provides access to the command LINE INTERFACE of a remote computer that can be used to perform remote login.
13.

What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?(a) telnet//www.sanfoundry.com(b) telnet:www.sanfoundry.com(c) telnet://www.sanfoundry.com(d) telnet www.sanfoundry.comI had been asked this question in an interview.This intriguing question comes from Telnet topic in division Application Layer of Computer Network

Answer»

Correct answer is (c) telnet://www.sanfoundry.com

The best I can explain: telnet://” is the HEADER to be used to initiate a Telnet CONNECTION to a web server. ONE can BROWSE the website using telnet if they are authorized to.

14.

_______ allows you to connect and login to a remote computer(a) Telnet(b) FTP(c) HTTP(d) SMTPThe question was posed to me in exam.My doubt is from Telnet topic in section Application Layer of Computer Network

Answer»

Correct option is (a) TELNET

To elaborate: Telnet provides access to the command-line INTERFACE on a remote COMPUTER. One can LOGIN to the computer from the command-line interface.

15.

Which amongst the following statements is correct for “character at a time” mode?(a) Character processing is done on the local system under the control of the remote system(b) Most text typed is immediately sent to the remote host for processing(c) All text is echoed locally, only completed lines are sent to the remote host(d) All text is processed locally, and only confirmed lines are sent to the remote hostI have been asked this question in an interview for internship.I want to ask this question from Telnet in section Application Layer of Computer Network

Answer» CORRECT CHOICE is (b) Most text typed is immediately sent to the REMOTE host for processing

For explanation: In character at a time mode, the typed text is sent immediately to the remote host while the user is typing. Another mode USED in TELNET is “Old line by line” mode in which only completed lines are sent to the remote host.
16.

The application layer protocol used by a Telnet application is ________(a) Telnet(b) FTP(c) HTTP(d) SMTPThis question was addressed to me by my college professor while I was bunking the class.I want to ask this question from Telnet in portion Application Layer of Computer Network

Answer»

Right CHOICE is (a) Telnet

Easiest explanation: Telnet is an application layer protocol that provides access to the command-line INTERFACE on a REMOTE HOST. Telnet STANDS for teletype network.

17.

Structure of Management Information (SMI), is the guideline of ________(a) HTTP(b) SNMP(c) URL(d) MIBI have been asked this question at a job interview.This interesting question is from SNMP in portion Application Layer of Computer Network

Answer» CORRECT option is (B) SNMP

Explanation: SMI was developed by the Storage Networking Industry Association (SNIA) and it defines a standard that can be manipulated by SNMP. Basically, it defines the standard format and hierarchy of management data which is used by the SNMP. It does not describe how the objects are to be MANAGED.
18.

SNMP is the framework for managing devices in an internet using the ______(a) TCP/IP protocol(b) UDP(c) SMTP(d) NoneI had been asked this question in an online quiz.The above asked question is from SNMP topic in division Application Layer of Computer Network

Answer» RIGHT choice is (a) TCP/IP protocol

To elaborate: SNMP is a management protocol in which a few manager stations CONTROL a set of agents USING the TCP/IP protocol suite. SNMP stands for Simple NETWORK Management Protocol.
19.

Control of the users’ access to network resources through charges is the main responsibility of ________(a) Reactive Fault Management(b) Reconfigured Fault Management(c) Accounting Management(d) Security ManagementI had been asked this question at a job interview.This is a very interesting question from SNMP topic in division Application Layer of Computer Network

Answer»

The correct answer is (C) Accounting Management

The BEST I can explain: The accounting management keeps track of the users and their access rights to the network and controls the user’s access by COMMUNICATING with the security management. The accounting management takes support of the Management Information Block to perform its operations.

20.

BER stands for ________(a) Basic Encoding Rules(b) Basic Encoding Resolver(c) Basic Encoding Rotator(d) Basic Encoding RouterThis question was posed to me during an interview for a job.I would like to ask this question from SNMP topic in section Application Layer of Computer Network

Answer»

Right option is (a) BASIC Encoding Rules

Easy explanation: The Basic Encoding Rules are a set of rules that specify the guidelines to encode the SNMP messages in BINARY form. Each SNMP message is encoded into 3 parts NAMELY data, length and type of message.

21.

In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________(a) Fault Management(b) Secured Management(c) Active Management(d) Security ManagementI have been asked this question during an internship interview.This intriguing question originated from SNMP in chapter Application Layer of Computer Network

Answer»

The CORRECT option is (d) SECURITY Management

Explanation: Security management is also RESPONSIBLE to provide confidentiality, authentication and encryption in ADDITION to controlling access to network. Without security management, the network and its traffic would be vulnerable to be EXPLOITED by attackers.

22.

The main difference between SNMPv3 and SNMPv2 is _______(a) Management(b) Integration(c) Classification(d) Enhanced securityThe question was asked in a national level competition.I'd like to ask this question from SNMP topic in section Application Layer of Computer Network

Answer»

The correct option is (d) Enhanced security

To elaborate: SNMPv3 has INTRODUCED NEW cryptographic security, through which confidentiality is provided by encrypting packets and BLOCKING intruders. It also ENSURES that the MESSAGE is coming from a reliable source.

23.

To use a Simple Network Management System, we need _______(a) Servers(b) IP(c) Protocols(d) RulesThe question was posed to me in an interview.This interesting question is from SNMP topic in chapter Application Layer of Computer Network

Answer»

Correct option is (d) Rules

Explanation: Rules are a collection of EXPRESSION containing parameters to observe the attributes of the USER’s device, and then EXECUTE some actions. It specifies the parameters for the managed objects inside the application and performs operations that would support the expression. The input of a RULE may be many expressions or even a single expression that end in an output of single OBJECT invoking some action.

24.

Configuration management can be divided into which two subsystems?(a) Reconfiguration and documentation(b) Management and configuration(c) Documentation and dialing up(d) Configuration and dialing upThis question was posed to me in class test.My question comes from SNMP in division Application Layer of Computer Network

Answer»

The correct option is (a) Reconfiguration and documentation

Easiest explanation: The BEST current practices REPORT is created by a management group to ensure the most effective configuration management. The group also makes a MIB (Management INFORMATION Base) module to HELP with the configuration management.

25.

Full duplex mode increases the capacity of each domain by ________(a) 10 to 20 mbps(b) 20 to 30 mbps(c) 30 to 40 mbps(d) 40 to 50 mbpsThe question was posed to me during an online exam.Asked question is from SNMP in chapter Application Layer of Computer Network

Answer»

The correct answer is (a) 10 to 20 mbps

Easiest explanation: In FULL DUPLEX MODE, both endpoints share a SINGLE channel bandwidth to achieve two-way transmission. This results in complete utilization of the band capacity INCREASING the capacity by 10 to 20 mbps than half-duplex mode.

26.

The application-level protocol in which a few manager stations control a set of agents is called ______(a) HTML(b) TCP(c) SNMP(d) SNMP/IPI had been asked this question in an interview for job.Enquiry is from SNMP in chapter Application Layer of Computer Network

Answer»

The correct option is (c) SNMP

Explanation: SNMP stands for Simple Network Management PROTOCOL. It is an application-level protocol in which a few MANAGER STATIONS control a SET of agents. It is used under the TCP/IP protocol suite and is used for managing devices on the INTERNET.

27.

SMI-S Standard uses which of the following?(a) Java RMI(b) CIM-XML/HTTP(c) CORBA(d) .NETThis question was addressed to me in an online interview.My enquiry is from SMI topic in section Application Layer of Computer Network

Answer» RIGHT answer is (b) CIM-XML/HTTP

The best I can explain: The Distributed Management Task Force MAINTAINS a Common Information MODEL (CIM) to represent a common set of network objects and their RELATIONSHIPS. CIM-XML/HTTP refers to the operations of CIM being performed over HTTP or XML. SMI-S USES CIM-XML/HTTP.
28.

Task of Distributed Management Task Force is not ________(a) to promote interoperability among the management solution providers(b) bto act as an interface between the various budding technologies and provide solution to manage various environments(c) to track the operation of the different management solution providers(d) to manage the facility by itself if one of the management solution providers failThis question was posed to me by my college professor while I was bunking the class.This intriguing question originated from SMI in division Application Layer of Computer Network

Answer»

Correct choice is (d) to manage the facility by itself if ONE of the MANAGEMENT solution providers fail

Best explanation: The Distributed Management TASK Force is USED just to simplify the overall management of the network. It cannot manage a network facility by itself in case one of the management solution providers fails. It provides an INTERFACE for promoting interoperability among management solution providers.

29.

Effect of open standards like SMI(s) is _______________(a) standardization drives software interoperability and interchange ability(b) breaks the old-style dependence on proprietary methods, trade secrets, and singleproviders(c) builds a strong foundation on which others can quickly build and innovate(d) all of the mentionedThe question was posed to me in exam.Question is taken from SMI topic in chapter Application Layer of Computer Network

Answer»

Right ANSWER is (d) all of the mentioned

Easiest explanation: Open standards like SMI-S inculcate a general ideal through which the normal designers are able to easily implement the STANDARD into their software and its scalability. Since it is open-source, nothing is HIDDEN from its users and they can implement it as they like or require to. As a WHOLE lot of time is spent to build it as strong and scalable, it provides an efficient foundation to the designers to build and innovate on.

30.

Among the following, identify which task is not involved in Storage Capacity management?(a) Identifying storage systems are approaching full capacity(b) Monitoring trends for each resource(c) Tracking Total capacity, total used, total available(d) Preventing unauthorized access to the storageThe question was asked by my school principal while I was bunking the class.I'm obligated to ask this question of SMI in chapter Application Layer of Computer Network

Answer» RIGHT ANSWER is (d) Preventing unauthorized access to the storage

Best EXPLANATION: Prevention of unauthorized access to storage is the task of Security management. IDENTIFYING when the storage is APPROACHING full capacity, monitoring trends, reporting and tracking capacity are the tasks of Storage Capacity management.
31.

Effective Storage management does not include __________(a) security(b) backups(c) reporting(d) connectionThis question was addressed to me during an internship interview.Question is from SMI topic in division Application Layer of Computer Network

Answer»

Correct choice is (d) connection

The best I can EXPLAIN: Connection is the responsibility of the connection manager. Storage management INCLUDES management of all NECESSITIES such as security, backups and reporting FACILITIES.

32.

How do Storage administrators ensure secure access to storage devices?(a) By using Zoning(b) By putting a physical lock on the storage device(c) By keeping devices shutdown when not in use(d) By keeping devices when usedThis question was addressed to me at a job interview.My enquiry is from SMI topic in division Application Layer of Computer Network

Answer» RIGHT CHOICE is (a) By USING Zoning

The best I can explain: Zoning is a METHOD in SAN that can be used by a storage administrator to specify who can see what in the SAN. Zoning might complicate the SCALING process if the size of the SAN increases.
33.

Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.(a) Proprietary management interfaces(b) Multiple applications to manage storage in the data center(c) No single view(d) Single viewThe question was posed to me in an interview.The question is from SMI in section Application Layer of Computer Network

Answer»

The correct choice is (d) Single VIEW

The explanation is: A single view is not possible with DIVERSE vendors present. PROPRIETARY management interfaces, multiple applications management and no single view are the main DIFFICULTIES incurred by a SAN administrator in such a situation.

34.

Which protocols are used for Storage management?(a) SNMP(b) LDAP(c) POP3(d) MIBThis question was addressed to me in final exam.This key question is from SMI in portion Application Layer of Computer Network

Answer»

The correct choice is (a) SNMP

To EXPLAIN: Simple Network Management Protocol is used for storage management. Lightweight DIRECTORY Access Protocol is used to access or locate information about directories and other resources on a network. Post Office Protocol 3 is used for e-mailing on the internet. Management Information Base is a part of SNMP and contains hierarchically ORGANIZED information.

35.

Which of the following is not a storage device?(a) Switch(b) RAID Arrays(c) Tape drives(d) HubI had been asked this question during an interview for a job.I'd like to ask this question from SMI topic in chapter Application Layer of Computer Network

Answer»

Right CHOICE is (d) Hub

The best I can explain: Switches, RAID arrays and tape drives are the main storage devices in SMI-S, while a Hub is simple networking DEVICE that cannot be USED as storage.

36.

Storage management comprises of _______________(a) SAN Management(b) Data protection(c) Disk operation(d) All of the mentionedI got this question during an interview.This interesting question is from SMI topic in chapter Application Layer of Computer Network

Answer»

The correct answer is (d) All of the mentioned

For explanation I WOULD say: SAN management, data PROTECTION and disk operation are the MAIN components of the Storage Management INITIATIVE Specification. SMI-S was developed by the Storage Networking Industry Association.

37.

Which layer of the OSI reference model does IPsec work at?(a) Layer 1(b) Layer 2(c) Layer 3(d) Layer 4I got this question during an interview for a job.My doubt stems from Virtual Private Networks in portion Application Layer of Computer Network

Answer»

The correct answer is (c) Layer 3

Best EXPLANATION: IPSec is a set of PROTOCOLS used to provide authentication, DATA INTEGRITY and confidentiality between two machines in an IP NETWORK. It operates in the network layer.

38.

Which layer of the OSI reference model does PPTP work at?(a) Layer 1(b) Layer 2(c) Layer 3(d) Layer 4The question was asked in a job interview.This interesting question is from Virtual Private Networks topic in section Application Layer of Computer Network

Answer»

Correct option is (b) Layer 2

Easiest explanation: PPTP STANDS for Point-to-Point Tunneling Protocol. PPTP is a tunneling protocol that was PRIMITIVELY USED to create VPNs. It is no longer used for VPNs due to the lack of security it provides.

39.

L2F was developed by which company?(a) Microsoft(b) Cisco(c) Blizzard Entertainment(d) IETFI got this question by my college professor while I was bunking the class.Origin of the question is Virtual Private Networks topic in division Application Layer of Computer Network

Answer» CORRECT option is (b) Cisco

Best explanation: L2F stands for LAYER 2 FORWARDING PROTOCOL. It was designed by Cisco to TUNNEL PPP traffic, helping create VPNs over the internet.
40.

ESP (Encapsulating Security Protocol) is defined in which of the following standards?(a) IPsec(b) PPTP(c) PPP(d) L2TPI have been asked this question in an online quiz.The query is from Virtual Private Networks topic in portion Application Layer of Computer Network

Answer»

Correct answer is (a) IPSEC

The EXPLANATION: ESP is a security COMPONENT of IPSec. ESP provides content protection and ensures that there is integrity and confidentiality of the message. The other security components of IPSec are Authentication Header and INTERNET KEY Exchange.

41.

Which layer 3 protocols can be transmitted over an L2TP VPN?(a) Only IP(b) Only IPX(c) Only ICMP(d) IP and IPXI had been asked this question in class test.The above asked question is from Virtual Private Networks topic in section Application Layer of Computer Network

Answer»

The correct option is (d) IP and IPX

The explanation is: L2TP stands for Layer 2 Tunneling Protocol. It is USED to TUNNEL all the L2 traffic on an IP network and is able to transmit network layer’s IP and IPX protocol DATA.

42.

VPNs are financially speaking __________(a) Always more expensive than leased lines(b) Always cheaper than leased lines(c) Usually cheaper than leased lines(d) Usually more expensive than leased linesThis question was posed to me in an international level competition.Asked question is from Virtual Private Networks topic in division Application Layer of Computer Network

Answer»

The correct answer is (c) Usually cheaper than leased lines

Easy EXPLANATION: The services of a VPN are cheaper for MODERATE to large scale institutional NETWORKS than the services of leased lines. Though for a small scale network, it does not prove to be as beneficial as the costs are not REDUCED to a great degree as COMPARED to leased lines.

43.

Traffic in a VPN is NOT ____________(a) Invisible from public networks(b) Logically separated from other traffic(c) Accessible from unauthorized public networks(d) Restricted to a single protocol in IPsecThe question was asked in unit test.Query is from Virtual Private Networks topic in portion Application Layer of Computer Network

Answer»

Correct option is (c) ACCESSIBLE from UNAUTHORIZED public networks

The best explanation: Traffic in a VPN is not accessible from any unauthorized public networks because it is SECURED with the masking IP address. This provides the benefit of access to blocked resources to the users.

44.

Which of the following statements is NOT true concerning VPNs?(a) Financially rewarding compared to leased lines(b) Allows remote workers to access corporate data(c) Allows LAN-to-LAN connectivity over public networks(d) Is the backbone of the InternetThis question was addressed to me in an interview for job.I'm obligated to ask this question of Virtual Private Networks topic in section Application Layer of Computer Network

Answer»

The correct option is (d) Is the backbone of the INTERNET

To explain I WOULD say: VPNs are not the backbone of the Internet as they are just a METHOD to create private intranets on the internet. They are USED for enhancing the connection SECURITY for the users.

45.

What protocol is NOT used in the operation of a VPN?(a) PPTP(b) IPsec(c) YMUM(d) L2TPThis question was posed to me in quiz.My query is from Virtual Private Networks in portion Application Layer of Computer Network

Answer»

The correct answer is (C) YMUM

Best explanation: PPTP is a TUNNELING protocol which was initially used for the creation of VPNs. IPSec is used in encrypting the TRAFFIC flowing in the VPN. L2TP is used to tunnel all the L2 traffic on the VPN.

46.

When were VPNs introduced into the commercial world?(a) Early 80’s(b) Late 80’s(c) Early 90’s(d) Late 90’sThis question was posed to me by my college professor while I was bunking the class.This intriguing question comes from Virtual Private Networks topic in division Application Layer of Computer Network

Answer»

The correct answer is (d) Late 90’s

To explain: VPNs were first introduced in the year 1996. Then as the INTERNET started to get popularized, the NEED for connection security increased. VPN was a great SOLUTION to this, and that’s when VPNs were implemented in the COMMERCIAL world.

47.

A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.(a) VNP(b) VPN(c) VSN(d) VSPNI had been asked this question during an online exam.The query is from Virtual Private Networks in division Application Layer of Computer Network

Answer»

The correct CHOICE is (b) VPN

Explanation: VPN provides enhanced SECURITY and ONLINE anonymity to users on the internet. It is also used to unblock websites that are UNAVAILABLE in CERTAIN regions.

48.

When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________(a) DNS lookup(b) DNS hijacking(c) DNS spoofing(d) DNS authorizingThis question was addressed to me in exam.The question is from IPSecurity in section Application Layer of Computer Network

Answer»

The correct CHOICE is (c) DNS spoofing

For EXPLANATION I would say: In DNS spoofing, also KNOWN as DNS cache poisoning, an ATTACKER gets the valid CREDENTIALS from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials.

49.

PGP encrypts data by using a block cipher called ______(a) International data encryption algorithm(b) Private data encryption algorithm(c) Internet data encryption algorithm(d) Local data encryption algorithmThe question was asked in homework.Asked question is from IPSecurity topic in section Application Layer of Computer Network

Answer»

Right answer is (a) INTERNATIONAL data encryption algorithm

Best EXPLANATION: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP USED the cipher METHOD BassOmatic.

50.

Pretty good privacy (PGP) is used in ______(a) Browser security(b) Email security(c) FTP security(d) WiFi securityThe question was posed to me in an interview for job.My enquiry is from IPSecurity topic in division Application Layer of Computer Network

Answer»

Correct choice is (b) Email SECURITY

To explain: PGP is an ENCRYPTION METHOD used in e-mail security to encrypt and decrypt the content of an e-mail transmitted over the internet. It makes SURE that the message cannot be stolen by other unauthorized users.