Task1 : 2/10/2017 : Question Paper : Solving
Question Paper Code: 86/2016/OL
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Date of Test: 29-12-2016
Alpha code: A
1.The buffer overflow attack is caused by
(A) Vulnerability in the design of a networking protocol
(B) Vulnerability in the implementation of a networking protocol
(C) Vulnerability in human behaviour
(D) Vulnerability in software
Answer: D
2.Which of the following is not valid IPv4 addresses?
(A) 192.10.14.3
(B) 201.172.275.33
(C) 65.90.11.00
(D) 193.20.250.10
Answer: B
3.Address resource records are associated with
(A) Routing tables in Internet routers
(B) ARP aches in LAN workstations
(C) DNS servers
(D) None of the above
Answer: C
4.Which of the following protocols is used in accessing web mail?
(A) HTTP
(B) SMTP
(C) POP3
(D) IMAP
Answer:-Question Cancelled
5.If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
(A) xy
(B) gcd(x, y)
(C) xy/gcd(x, y)
(D) None of these
Answer: D
6.Assuming the same key is used, two occurrences of the same plaintext characters are
encrypted as identical output symbols in which of the following
(A) Caesar cipher
(B) Vigenere cipher
(C) Hill cipher
(D) One time pad
Answer: A
7.A product cipher is constructed using a combination ofqu
(A) Symmetric and asymmetric ciphers
(B) Substitution and transposition ciphers
(C) Monoalphabetic and polyalphabetic ciphers
(D) Stream and block ciphers
Answer: B
8.Which of the following characteristics is most widely used in fingerprint recognition?
(A) Number and coordinates of arch patterns
(B) Number and coordinates of loop patterns
(C) Coordinates and orientations of fingerprint minutiae
(D) Number and coordinates of whorl patterns
Answer: C
9.During the initial stages of an attack by a new internet scanning worm, the number of
infected machines increases
(A) Exponentially with time
(B) Logarithmically with time
(C) Polynomially with time
(D) At a constant rate
Answer: A
10. Use privileges in windows are stored in
(A) DACL
(B) ACE
(C) Access token
(D) SID
Answer: C
More>>
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Date of Test: 29-12-2016
Alpha code: A
1.The buffer overflow attack is caused by
(A) Vulnerability in the design of a networking protocol
(B) Vulnerability in the implementation of a networking protocol
(C) Vulnerability in human behaviour
(D) Vulnerability in software
Answer: D
2.Which of the following is not valid IPv4 addresses?
(A) 192.10.14.3
(B) 201.172.275.33
(C) 65.90.11.00
(D) 193.20.250.10
Answer: B
3.Address resource records are associated with
(A) Routing tables in Internet routers
(B) ARP aches in LAN workstations
(C) DNS servers
(D) None of the above
Answer: C
4.Which of the following protocols is used in accessing web mail?
(A) HTTP
(B) SMTP
(C) POP3
(D) IMAP
Answer:-Question Cancelled
5.If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
(A) xy
(B) gcd(x, y)
(C) xy/gcd(x, y)
(D) None of these
Answer: D
6.Assuming the same key is used, two occurrences of the same plaintext characters are
encrypted as identical output symbols in which of the following
(A) Caesar cipher
(B) Vigenere cipher
(C) Hill cipher
(D) One time pad
Answer: A
7.A product cipher is constructed using a combination ofqu
(A) Symmetric and asymmetric ciphers
(B) Substitution and transposition ciphers
(C) Monoalphabetic and polyalphabetic ciphers
(D) Stream and block ciphers
Answer: B
8.Which of the following characteristics is most widely used in fingerprint recognition?
(A) Number and coordinates of arch patterns
(B) Number and coordinates of loop patterns
(C) Coordinates and orientations of fingerprint minutiae
(D) Number and coordinates of whorl patterns
Answer: C
9.During the initial stages of an attack by a new internet scanning worm, the number of
infected machines increases
(A) Exponentially with time
(B) Logarithmically with time
(C) Polynomially with time
(D) At a constant rate
Answer: A
10. Use privileges in windows are stored in
(A) DACL
(B) ACE
(C) Access token
(D) SID
Answer: C
More>>
Comments
Post a Comment