Home

In the symmetric-key method of cryptography, which key is publicly known?

A. Encryption key only

B. Decryption key only

C. Both

D. None of the above

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The generic domain name for air transport industry is ________.
  2. Which of the following is the port used by SMTP?
  3. Your network has gotten a single class C address but has 300 computers. How can you connect them to…
  4. --------------- is/are used for error detection.
  5. Which of the following address supports 254 hosts on each of 2 million networks?
  6. ………………….is a technique of conversion between the representation…
  7. Using a class B address maximum of …………………networks can be…
  8. What is attenuation?
  9. Which of the following is used for testing the data-link connection in a PPP network?
  10. Which of the following protocols use a topology table to install routes into the IP routing table?
  11. Which of these is a feature of hubs?
  12. Which of the following delivery methods works with only one source and one destination? Multicast
  13. ARP is defined in RFC _____ and it is a current internet standard, ________
  14. Select the class C IP address from the following:
  15. Which of the following is required to communicate between two computers?
  16. Which of the following network topologies has the highest level of redundancy?
  17. Which class does the IP address 202.119.22.31 belong to?
  18. Which of the following provides control over multimedia sessions?
  19. Transmission medias are classified into two main categories, which are -------------- and --------------------.
  20. Which of the following application uses 1.5 Mbps bandwidth?
  21. Thinnet coaxial cable uses what type of connector?
  22. Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
  23. E-mail is an example of ………………………… mode…
  24. Which of these cable is/are used to connect devices to hubs and switches.
  25. In distance vector routing an active router sends out information ………………………….
  26. Which of the following is the IEEE specification for wireless networks?
  27. ___________ is based on resources that are present within the Diffserv region.
  28. _____________ command is used by the client to transfer the job across to the server.
  29. FDDI operates on 100 Mbps.
  30. ____________ was developed to support aggregation and summarization of routing information.