Computer Networks
Concepts of Layering
Marks 1Marks 2
Data Link Layer and Switching
Marks 1Marks 2
Network Layer
Marks 1Marks 2
Application Layer Protocol
Marks 1Marks 2
Routing Algorithm
Marks 1Marks 2
TCP UDP Sockets and Congestion Control
Marks 1Marks 2
Lan Technologies and Wi-Fi
Marks 1Marks 2
Network Security
Marks 1Marks 2
1
GATE CSE 2019
Numerical
+1
-0
The value of 351 mod 5 is_________.
Your input ____
2
GATE CSE 2017 Set 1
MCQ (Single Correct Answer)
+1
-0.3
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.

I. S can launch a birthday attack to replace m with a fraudulent message.
II. A third party attacker can launch a birthday attack to replace m with a fraudulent message.
III. R can launch a birthday attack to replace m with a fraudulent message.

Which of the following are possible security violations?
A
I and II only
B
I only
C
II only
D
II and III only
3
GATE CSE 2016 Set 2
MCQ (Single Correct Answer)
+1
-0.3
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
A
Anarkali's public key
B
Salim's public key
C
Salim's private key
D
Anarkali's private key
4
GATE CSE 2015 Set 1
MCQ (Single Correct Answer)
+1
-0.3
Suppose that everyone in a group of N people wants to communicate secretly with the N - 1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
A
2N
B
N(N - 1)
C
$${{N(N - 1)} \over 2}$$
D
(N - 1)2
GATE CSE Subjects
Theory of Computation
Operating Systems
Algorithms
Digital Logic
Database Management System
Data Structures
Computer Networks
Software Engineering
Compiler Design
Web Technologies
General Aptitude
Discrete Mathematics
Programming Languages
Computer Organization