Q11➡| ___________ is a bit-oriented protocol for communication over point-to-point and multipoint links.
i ➥ HDLC
ii ➥ Sliding window
iii ➥ Stop-and-wait
iv ➥ Go-back-N
Q12➡| Which of the following is false?
i ➥ Public-key cryptography is also known as asymmetric cryptography
ii ➥ Asymmetric cryptography uses a pair of cryptographic keys
iii ➥ A message encrypted with the private key can be decrypted only with the corresponding public key
iv ➥ The private key is kept secret, while the public key is widely distributed
Q13➡| Calculate the link utilization (throughput) for stop and wait flow control mechanism if the frame size is 4800 bits, bit rate is 9600 bps, and distance between the devices is 2000 km. Given propagation speed is 200000 km/s.
i ➥ 0.92
ii ➥ 0.96
iii ➥ 0.82
iv ➥ 0.86
Q14➡| In____authentication, the claimant proves that she knows the secret without sending it to the verifier.
i ➥ Asymmetric
ii ➥ Zero knowledge
iii ➥ Symmetric
iv ➥ Challenge response
Q15➡| In RSA algorithm if p=7, q=11 and e=13 then what will be the value of d?
Ans 11 – HDLC
Ans 12 – A message encrypted with the private key can be decrypted only with the corresponding public key
Ans 13 – 0.96
Ans 14 – Challenge response
Ans 15 – 37
11.(i)
12.(iii)
13.(ii)
14.(iv)
15.(i)
Ans 11 – HDLC
Ans 12 – A message encrypted with the private key can be decrypted only with the corresponding public key
Ans 13 – 0.96
Ans 14 – Challenge response
Ans 15 – 37
11-a
12-b
13-b
14-d
15-a
Ans11-i
Ans12-iii
Ans13-ii
Ans14-iv
Ans15-i
11) A
12) C
13)
14) D
15) A
11,ii
12, IV
13, IV
14, I
15,IV