Home

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.

A. 90

B. 10

C. 20

D. 45

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Which of the following filed represents the sender of the message in an electronic mail?
  2. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  3. --------------- is/are used for error detection.
  4. In 1996, 36.44% of _________ addresses were brought in use.
  5. What is the default subnet mask for a class A network?
  6. Which of the following defines a family of standards for 100 Mbps fiber optic LANs that provides the…
  7. Which of the following protocol resolves a host's hardware address for a known IP address?
  8. AppleTalk protocol configures hosts in zones on the network.
  9. Which of the following is used for testing the data-link connection in a PPP network?
  10. Which of the following fields holds the packets of several protocols?
  11. What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that…
  12. How many 64-Kbps channels are used on an ISDN BRI?
  13. Which of the following can support many concurrent B-channel links and one 64 Kbps Dchannel?
  14. Which of the following application uses 1.5 Mbps bandwidth?
  15. What is the distance limitation of Cat5 UTP?
  16. What can be used in the place of DNS to resolve host names to IP addresses?
  17. Thick Ethernet cable uses what type of connector? Select all that apply.
  18. The Point-to-Point Protocol (PPP) is described in which of the following?
  19. In TCP segment format _______indicates start of data.
  20. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  21. Which of the following versions will replace IPv4 Internet layer?
  22. Which field in Domain Name System message format specifies the class of query?
  23. The key concern in the design of transmission system is -------------- and ---------------
  24. T1 makes up 24 channels.
  25. In flags message attribute, which of the following flag indicates that message has been completed?
  26. Strings enclosed in _______ quotation marks indicate single tokens.
  27. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
  28. 25 is used by SMTP
  29. Which of the following protocols use a topology table to install routes into the IP routing table?
  30. What is the address identified when socket is available at each end of TCP?