COMPUTER HARDWARE AND NETWORK MAINTENANCE
1. The small current developed in a P—N junction diode when it is in reverse bias is called :
(A) Reverse current (B) Forward current (C) Reverse saturation current (D) Active current
Ans: C
2. Which among the following factor doesn’t change the diode current ?
(A) Temperature (B) External voltage to the diode (C) Boltzman’s constant (D) Resistance
Ans: D
3. The cut—in point of a capacitor filter is :
(A) The instant at which the conduction starts (B) The instant at which the conduction stops
(C) The time after which the output is not filtered (D) The time during which the output is perfectly filtered
Ans: A
4. An optoisolator is :
(A) A combination of LED and varactor in the same package
(B) A combination of a varactor and photodiode in the same package
(C) A combination of LED and a photodiode in the same package
(D) A combination of photodiode and a Shottky-Barrier diode in the same package
Ans: C
5. The magnitude of thermal voltage is given by :
(A) k/Tq (B) kT/q (C) q/kT (D) Tk/q
Ans: B
6. The form factor is the ratio of :
(A) Peak value to r.m.s. value (B) r.m.s. value to average value (C) Average value to r.m.s. value (D) None of the above
Ans: B
7. If the number of turns, area and current of an ac circuit is doubled, the new inductance will be :
(A) Equal to the former (B) Twice of the former (C) Four times the former (D) Half of the former
Ans: C
8. An electric heater draws 3.5 A from a 110 V source. The resistance of the heating element is approximately :
(A) 385 Ohms (B) 38.5 Ohms (C) 3.1 Ohms (D) 31 Ohms
Ans: D
9. Thevenin resistance is found by :
(A) Shorting all voltage sources and opening all current sources (B) Opening all current sources
(C) Shorting all voltage sources (D) Opening all voltage sources and shorting all current sources
Ans: A
10. Mutual flux at the lagging loading and it at the leading power factor.
(A) Decreases, increases (B) Increases, increases (C) Decreases, decreases (D) Increases, decreases
Ans: A
11. Eddy currents are induced in the pole shoes of a DC machine due to :
(A) Oscillating magnetic field (B) Pulsating magnetic flux (C) Relative rotation between field and armature (D) All of the above
Ans: C
12. Which of the following is not true ?
(A) 0+A=A (B) 1+A=1 (C) A+A=A (D) 1.A=1
Ans: D
13. A positive AND gate is also a negative :
(A) NAND gate (B) NOR gate (C) AND gate (D) OR gate
Ans: D
14. As compared to MOS memories, bipolar memories have :
(A) Faster access time and are costly (B) Slower access time and are costly
(C) Faster access time and are cheaper (D) Slower success time but are cheaper
Ans: A
15. A digital multiplexer is basically a combination logic circuit to perform the operation :
(A) AND-AND (B) OR-OR (C) AND-OR (D) OR—AND
Ans: C
16. The instruction that is used as prefix to an instruction to execute it repeatedly until CX resister becomes zero is :
(A) SCAS (B) REP (C) CMPS (D) STOS
Ans: B
17. The Bus Interface Unit of 8086 contains FIFO register of size bytes.
(A) 8 (B) 6 (C) 4 (D) 16
Ans: B
18. In 8086, the instruction providing both segment base and offset address are called :
(A) High address (B) Low address (C) Far address (D) Below address
Ans: C
19. The 8086 instruction which is used for translating from one code to another code is :
(A) XLAT (B) XCHG (C) POP (D) PUSH
Ans: A
20. In 8086, the overflow flag is set when
(A) The sum is more than 16 bits (B) Signed numbers go out of their range after arithmetic operation
(C) Carry and sign flags are set (D) Subtraction
Ans: B
21. Among the following, Access time is faster for :
(A) SRAM (B) DRAM (C) ERAM (D) ROM
Ans: A
22. Which method by—passes the CPU for certain types of data transfer ?
(A) Software Interrupts (B) Interrupt driven I/O (C) Polled I/O (D) Direct Memory Access (DMA)
Ans: D
23. Which group of instructions do not affect flags ?
(A) Arithmetic operations (B) Logic Operations (C) Data Transfer Instructions (D) Branch Instructions
Ans: D
24. The result of MOV AL, 65 is to store :
(A) 01000010 in AL (B) 42H in AL (C) 40H in AL (D) 01000001 in AL
Ans: D
25. In a pre—emptive multitasking operating system, the saving and restoring of FF and MMX states are performed by :
(A) Control unit (B) Operating system (C) MMX instructions (D) MMX registers
Ans: B
26. Which motherboard form factor uses one 20 pin connector ?
(A) ATX (B) AT (C) BABY AT (D) All of the above
Ans: A
27. Among the following, which standard governs parallel communications ?
(A) R5232 (B) RS—232a (C) CAT 6 (D) IEEE 1284
Ans: D
28. Which common bus specification provides the fastest data transfer rate ?
(A) VL BUS (B) ISA (C) PCI (D) All of the above
Ans: C
29. What is the data transfer rate for USB 2.0 ?
(A) 10 Mbps (B) 480 Mbps (C) 512 Mbps (D) 256 Mbps
Ans: B
30. How many address lines are required to address each memory location in a 2048x4 memory chip ?
(A) 10 (B) 11 (C) 8 (D) 12
Ans: B
31. Pseudo instruction are :
(A) Instructions in any program that have no corresponding machine code
(B) Instructions that are partially executed
(C) Instructions for caching
(D) Assembler directives
Ans: D
32. Associative memory is a :
(A) Pointer Addressable Memory (B) Very Cheap Memory (C) Content Addressable Memory (D) Slow Memory
Ans: C
33. Which of the following addressing modes permits relocation without any change whatsoever in the code ?
(A) Indirect addressing (B) Indexed addressing (C) Base register addressing (D) PC relative addressing
Ans: D
34. In a digital camera, which sensor converts light energy into electrical energy ?
(A) PCB (B) CCD (C) DSLR (D) Photons
Ans: B
35. Number of pins in an HDMI cable is :
(A) 19 (B) 20 (C) 21 (D) 22
Ans: A
36. Inventor of computer mouse is :
(A) Alan Shugart (B) Steve Russel (C) Douglas Engelbart (D) Faggin
Ans: C
37. Which module of operating system gives control of the CPU to the process selected by the short term scheduler ?
(A) Dispatcher (B) Interrupt (C) Scheduler (D) DMA
Ans: A
38. Aging is :
(A) Keeping track of cache contents (B) Keeping track of what pages are currently residing in memory
(C) Keeping track of how many times a given page is referenced (D) Increasing the priority of jobs to ensure termination in a finite time
Ans: D
39. Which one of the following is the deadlock avoidance algorithm ?
(A) Round robin algorithm (B) Bankers algorithm (C) Elevator algorithm (D) Karn’s algorithm
Ans: B
40. In internal fragmentation, memory is internal to a partition and :
(A) Is being used (B) Is not being used (C) Is always used (D) None of the above
Ans: B
41. External fragmentation will not occur when :
(A) First fit is used B) Best fit is used( (C) Worst fit is used (D) No matter which algorithm is used, it will always occur
Ans: D
42. A heavy weight process :
(A) Has multiple threads of execution (B) Has a single thread of execution
(C) Can have multiple or a single thread for execution (D) None of the above
Ans: B
43. Consider the following page reference string :
1 2 3 4 2 1 5 6 2 1 2 3 7 6 3 2 1 2 3 6
For FIFO page replacement algorithm with 4 frames, the number of page fault is :
(A) 16 (B) 15 (C) 14 (D) 11
Ans: C
44. The time taken to move the disk arm to the desired cylinder is called :
(A) Positioning time (B) Random access time (C) Seek time (D) Rotational latency
Ans: C
45. Consider a disk queue with requests for I/O to blocks on cylinders :
98, 183, 37, 122, 14, 124, 65, 67.
Considering FCFS scheduling, the total number of head movements is, if the disk head is initially at 53 :
(A) 600 (B) 620 (C) 630 (D) 640
Ans: D
46. The segment of code in which the process may change common variables, update tables, write into files is known as :
(A) Critical section (B) Program (C) Synchronising (D) Starvation
Ans: A
47. ADSL stands for :
(A) Asymmetric Digital Subscriber Line (B) Asynchronous Digital Subscriber Line
(C) Associated Digital Subscriber Link (D) Asynchronous Data Sending Line
Ans: A
48. TCP/IP model does not have layer, but 051 model have this layer.
(A) Session Layer (B) Transport Layer (C) Application Layer (D) None of the above
Ans: A
49. Automatic repeat request error management mechanism is provided by :
(A) Media access control sub layer (B) Logical link control sub layer (C) Network interface control sub layer (D) None of the mentioned
Ans: B
50. The resources needed for communication between end systems are reserved for the duration of session between end systems in :
(A) Packet switching (B) Circuit switching (C) Line switching (D) Frequency switching
Ans: B
(A) Reverse current (B) Forward current (C) Reverse saturation current (D) Active current
Ans: C
2. Which among the following factor doesn’t change the diode current ?
(A) Temperature (B) External voltage to the diode (C) Boltzman’s constant (D) Resistance
Ans: D
3. The cut—in point of a capacitor filter is :
(A) The instant at which the conduction starts (B) The instant at which the conduction stops
(C) The time after which the output is not filtered (D) The time during which the output is perfectly filtered
Ans: A
4. An optoisolator is :
(A) A combination of LED and varactor in the same package
(B) A combination of a varactor and photodiode in the same package
(C) A combination of LED and a photodiode in the same package
(D) A combination of photodiode and a Shottky-Barrier diode in the same package
Ans: C
5. The magnitude of thermal voltage is given by :
(A) k/Tq (B) kT/q (C) q/kT (D) Tk/q
Ans: B
6. The form factor is the ratio of :
(A) Peak value to r.m.s. value (B) r.m.s. value to average value (C) Average value to r.m.s. value (D) None of the above
Ans: B
7. If the number of turns, area and current of an ac circuit is doubled, the new inductance will be :
(A) Equal to the former (B) Twice of the former (C) Four times the former (D) Half of the former
Ans: C
8. An electric heater draws 3.5 A from a 110 V source. The resistance of the heating element is approximately :
(A) 385 Ohms (B) 38.5 Ohms (C) 3.1 Ohms (D) 31 Ohms
Ans: D
9. Thevenin resistance is found by :
(A) Shorting all voltage sources and opening all current sources (B) Opening all current sources
(C) Shorting all voltage sources (D) Opening all voltage sources and shorting all current sources
Ans: A
10. Mutual flux at the lagging loading and it at the leading power factor.
(A) Decreases, increases (B) Increases, increases (C) Decreases, decreases (D) Increases, decreases
Ans: A
11. Eddy currents are induced in the pole shoes of a DC machine due to :
(A) Oscillating magnetic field (B) Pulsating magnetic flux (C) Relative rotation between field and armature (D) All of the above
Ans: C
12. Which of the following is not true ?
(A) 0+A=A (B) 1+A=1 (C) A+A=A (D) 1.A=1
Ans: D
13. A positive AND gate is also a negative :
(A) NAND gate (B) NOR gate (C) AND gate (D) OR gate
Ans: D
14. As compared to MOS memories, bipolar memories have :
(A) Faster access time and are costly (B) Slower access time and are costly
(C) Faster access time and are cheaper (D) Slower success time but are cheaper
Ans: A
15. A digital multiplexer is basically a combination logic circuit to perform the operation :
(A) AND-AND (B) OR-OR (C) AND-OR (D) OR—AND
Ans: C
16. The instruction that is used as prefix to an instruction to execute it repeatedly until CX resister becomes zero is :
(A) SCAS (B) REP (C) CMPS (D) STOS
Ans: B
17. The Bus Interface Unit of 8086 contains FIFO register of size bytes.
(A) 8 (B) 6 (C) 4 (D) 16
Ans: B
18. In 8086, the instruction providing both segment base and offset address are called :
(A) High address (B) Low address (C) Far address (D) Below address
Ans: C
19. The 8086 instruction which is used for translating from one code to another code is :
(A) XLAT (B) XCHG (C) POP (D) PUSH
Ans: A
20. In 8086, the overflow flag is set when
(A) The sum is more than 16 bits (B) Signed numbers go out of their range after arithmetic operation
(C) Carry and sign flags are set (D) Subtraction
Ans: B
21. Among the following, Access time is faster for :
(A) SRAM (B) DRAM (C) ERAM (D) ROM
Ans: A
22. Which method by—passes the CPU for certain types of data transfer ?
(A) Software Interrupts (B) Interrupt driven I/O (C) Polled I/O (D) Direct Memory Access (DMA)
Ans: D
23. Which group of instructions do not affect flags ?
(A) Arithmetic operations (B) Logic Operations (C) Data Transfer Instructions (D) Branch Instructions
Ans: D
24. The result of MOV AL, 65 is to store :
(A) 01000010 in AL (B) 42H in AL (C) 40H in AL (D) 01000001 in AL
Ans: D
25. In a pre—emptive multitasking operating system, the saving and restoring of FF and MMX states are performed by :
(A) Control unit (B) Operating system (C) MMX instructions (D) MMX registers
Ans: B
26. Which motherboard form factor uses one 20 pin connector ?
(A) ATX (B) AT (C) BABY AT (D) All of the above
Ans: A
27. Among the following, which standard governs parallel communications ?
(A) R5232 (B) RS—232a (C) CAT 6 (D) IEEE 1284
Ans: D
28. Which common bus specification provides the fastest data transfer rate ?
(A) VL BUS (B) ISA (C) PCI (D) All of the above
Ans: C
29. What is the data transfer rate for USB 2.0 ?
(A) 10 Mbps (B) 480 Mbps (C) 512 Mbps (D) 256 Mbps
Ans: B
30. How many address lines are required to address each memory location in a 2048x4 memory chip ?
(A) 10 (B) 11 (C) 8 (D) 12
Ans: B
31. Pseudo instruction are :
(A) Instructions in any program that have no corresponding machine code
(B) Instructions that are partially executed
(C) Instructions for caching
(D) Assembler directives
Ans: D
32. Associative memory is a :
(A) Pointer Addressable Memory (B) Very Cheap Memory (C) Content Addressable Memory (D) Slow Memory
Ans: C
33. Which of the following addressing modes permits relocation without any change whatsoever in the code ?
(A) Indirect addressing (B) Indexed addressing (C) Base register addressing (D) PC relative addressing
Ans: D
34. In a digital camera, which sensor converts light energy into electrical energy ?
(A) PCB (B) CCD (C) DSLR (D) Photons
Ans: B
35. Number of pins in an HDMI cable is :
(A) 19 (B) 20 (C) 21 (D) 22
Ans: A
36. Inventor of computer mouse is :
(A) Alan Shugart (B) Steve Russel (C) Douglas Engelbart (D) Faggin
Ans: C
37. Which module of operating system gives control of the CPU to the process selected by the short term scheduler ?
(A) Dispatcher (B) Interrupt (C) Scheduler (D) DMA
Ans: A
38. Aging is :
(A) Keeping track of cache contents (B) Keeping track of what pages are currently residing in memory
(C) Keeping track of how many times a given page is referenced (D) Increasing the priority of jobs to ensure termination in a finite time
Ans: D
39. Which one of the following is the deadlock avoidance algorithm ?
(A) Round robin algorithm (B) Bankers algorithm (C) Elevator algorithm (D) Karn’s algorithm
Ans: B
40. In internal fragmentation, memory is internal to a partition and :
(A) Is being used (B) Is not being used (C) Is always used (D) None of the above
Ans: B
41. External fragmentation will not occur when :
(A) First fit is used B) Best fit is used( (C) Worst fit is used (D) No matter which algorithm is used, it will always occur
Ans: D
42. A heavy weight process :
(A) Has multiple threads of execution (B) Has a single thread of execution
(C) Can have multiple or a single thread for execution (D) None of the above
Ans: B
43. Consider the following page reference string :
1 2 3 4 2 1 5 6 2 1 2 3 7 6 3 2 1 2 3 6
For FIFO page replacement algorithm with 4 frames, the number of page fault is :
(A) 16 (B) 15 (C) 14 (D) 11
Ans: C
44. The time taken to move the disk arm to the desired cylinder is called :
(A) Positioning time (B) Random access time (C) Seek time (D) Rotational latency
Ans: C
45. Consider a disk queue with requests for I/O to blocks on cylinders :
98, 183, 37, 122, 14, 124, 65, 67.
Considering FCFS scheduling, the total number of head movements is, if the disk head is initially at 53 :
(A) 600 (B) 620 (C) 630 (D) 640
Ans: D
46. The segment of code in which the process may change common variables, update tables, write into files is known as :
(A) Critical section (B) Program (C) Synchronising (D) Starvation
Ans: A
47. ADSL stands for :
(A) Asymmetric Digital Subscriber Line (B) Asynchronous Digital Subscriber Line
(C) Associated Digital Subscriber Link (D) Asynchronous Data Sending Line
Ans: A
48. TCP/IP model does not have layer, but 051 model have this layer.
(A) Session Layer (B) Transport Layer (C) Application Layer (D) None of the above
Ans: A
49. Automatic repeat request error management mechanism is provided by :
(A) Media access control sub layer (B) Logical link control sub layer (C) Network interface control sub layer (D) None of the mentioned
Ans: B
50. The resources needed for communication between end systems are reserved for the duration of session between end systems in :
(A) Packet switching (B) Circuit switching (C) Line switching (D) Frequency switching
Ans: B
51. Electronic mail uses this application layer protocol :
(A) HTTP (B) FTP (C) SMTP (D) SNMP
Ans: C
52. Traffic in VPN is :
(A) Visible to public networks (B) Not logically separated from other traffic
(C) Not restricted to a single protocol in IPSEC (D) Not accessible from unauthorised public networks
Ans: D
53. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment ?
(A) 10000 (B) 10001 (C) 11001 03) 11002
Ans: B
54. The header size of an IPv6 datagram is :
(A) 40 bytes (B) 128 bytes (C) 64 bytes (D) 32 bytes
Ans: A
55. Which of the following is not an IPv4 to IPv6 transition strategy ?
(A) Dual stack (B) Tunnelling (C) Conversion (D) Header translation
Ans: C
56. In OSPF, which protocol is used to discover neighbour routers automatically ?
(A) Link state protocol (B) Error correction protocol (C) Routing information protocol (D) Hello protocol
Ans: D
57. If you need to change the typeface of an MS Word document, which menu will you choose ?
(A) Edit (B) View (C) Format (D) Tools
Ans: C
58. In which view Headers and Footers are visible in MS Word ?
(A) Normal View (B) Print layout View (C) Page layout View (D) Draft View
Ans: B
59. To apply the center alignment to a paragraph, we can press :
(A) Ctr1+S (B) Ctr1+C (C) Ctr1+Shift+A (D) Ctrl+E
Ans: D
60. In MS Excel, what is the smallest width of a column ?
(A) 0 (B) 0.5" (C) 1' (D) 1.5"
Ans: A
61. In MS Word, pressing F8 for three times selects :
(A) Entire document (B) A Paragraph
(C) A Sentence (D) A word
Ans: A
62. In MS Access, which of the field has width 8 bytes ?
(A) Memo (B) Number (C) Date/Time (D) All of the above
Ans: C
63. A gutter margin is :
(A) Margin that is added to the binding side of page when printing
(B) Margin that is added to the outside of the page when printing
(C) Margin that is added to the left margin when printing
(D) Margin that is added to the right margin when printing
Ans: A
64. What is the smallest and largest font size available in Font Size tool on formatting toolbar of MS Word ?
(A) 8 and 64 (B) 8 and 72 (C) 6 and 72 (D) 6 and 68
Ans: B
65. In MS Excel, which among the following keyboard shortcut can be used for creating chart from selected cells ?
(A) F2 (B) F6 (C) F10 (D) F11
Ans: D
66. Which of the following is valid field name in MS Access ?
(A) Student.Address (B) Student’sAddress
(C) Student_address (D) Student Address
Ans: C
67. Intellectual Property Rights (IPR) protect the use of information and ideas that are of :
(A) Ethical value (B) Moral value
(C) Social value (D) Commercial value
Ans: D
68. In ’quid—pro-quo’, quo stands for :
(A) Knowledge disclosed to the public
(B) Monopoly granted for the term of the patent
(C) Exclusive privilege of making, selling and using the invention
(D) None of the above
Ans: B
69. Which of the following is not one of the major types of e-commerce ?
(A) C2B (B) B2C (C) 3213 (D) c2c
Ans: A
70. What is DES ?
(A) Bit cipher
(B) Stream cipher
(C) Block cipher
(D) None of the above mentioned
Ans: C
71. Which of the following is a cryptographic protocol used to secure HTTP connection ?
(A) Stream control transmission protocol
(B) Transport layer protocol
(C) Explicit congestion notification
(D) Resource reservation protocol
Ans: B
72. Network layer firewall works as a :
(A) Frame filter
(B) Packet filter
(C) Both frame and packet filters
(D) None of the above mentioned
Ans: B
73. A proxy firewall filters at :
(A) Physical layer (B) Data link layer (C) Network layer (D) Application layer
Ans: D
74. What is the type of injection, in which malicious scripts are injected into trusted websites ?
(A) XSS (B) SQL Injection (C) Access (D) Broadcasting
Ans: A
75. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called :
(A) Slow read attack (B) Spoofed attack
(C) Starvation attack (D) Denial of service attack
Ans: D
76. In asymmetric encryption :
(A) Same key is used for encryption and decryption
(B) Different keys are used for encryption and decryption
(C) No key is required for encryption and decryption
(D) No key is used for encryption and a public key is used for decryption
Ans: B
(A) HTTP (B) FTP (C) SMTP (D) SNMP
Ans: C
52. Traffic in VPN is :
(A) Visible to public networks (B) Not logically separated from other traffic
(C) Not restricted to a single protocol in IPSEC (D) Not accessible from unauthorised public networks
Ans: D
53. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment ?
(A) 10000 (B) 10001 (C) 11001 03) 11002
Ans: B
54. The header size of an IPv6 datagram is :
(A) 40 bytes (B) 128 bytes (C) 64 bytes (D) 32 bytes
Ans: A
55. Which of the following is not an IPv4 to IPv6 transition strategy ?
(A) Dual stack (B) Tunnelling (C) Conversion (D) Header translation
Ans: C
56. In OSPF, which protocol is used to discover neighbour routers automatically ?
(A) Link state protocol (B) Error correction protocol (C) Routing information protocol (D) Hello protocol
Ans: D
57. If you need to change the typeface of an MS Word document, which menu will you choose ?
(A) Edit (B) View (C) Format (D) Tools
Ans: C
58. In which view Headers and Footers are visible in MS Word ?
(A) Normal View (B) Print layout View (C) Page layout View (D) Draft View
Ans: B
59. To apply the center alignment to a paragraph, we can press :
(A) Ctr1+S (B) Ctr1+C (C) Ctr1+Shift+A (D) Ctrl+E
Ans: D
60. In MS Excel, what is the smallest width of a column ?
(A) 0 (B) 0.5" (C) 1' (D) 1.5"
Ans: A
61. In MS Word, pressing F8 for three times selects :
(A) Entire document (B) A Paragraph
(C) A Sentence (D) A word
Ans: A
62. In MS Access, which of the field has width 8 bytes ?
(A) Memo (B) Number (C) Date/Time (D) All of the above
Ans: C
63. A gutter margin is :
(A) Margin that is added to the binding side of page when printing
(B) Margin that is added to the outside of the page when printing
(C) Margin that is added to the left margin when printing
(D) Margin that is added to the right margin when printing
Ans: A
64. What is the smallest and largest font size available in Font Size tool on formatting toolbar of MS Word ?
(A) 8 and 64 (B) 8 and 72 (C) 6 and 72 (D) 6 and 68
Ans: B
65. In MS Excel, which among the following keyboard shortcut can be used for creating chart from selected cells ?
(A) F2 (B) F6 (C) F10 (D) F11
Ans: D
66. Which of the following is valid field name in MS Access ?
(A) Student.Address (B) Student’sAddress
(C) Student_address (D) Student Address
Ans: C
67. Intellectual Property Rights (IPR) protect the use of information and ideas that are of :
(A) Ethical value (B) Moral value
(C) Social value (D) Commercial value
Ans: D
68. In ’quid—pro-quo’, quo stands for :
(A) Knowledge disclosed to the public
(B) Monopoly granted for the term of the patent
(C) Exclusive privilege of making, selling and using the invention
(D) None of the above
Ans: B
69. Which of the following is not one of the major types of e-commerce ?
(A) C2B (B) B2C (C) 3213 (D) c2c
Ans: A
70. What is DES ?
(A) Bit cipher
(B) Stream cipher
(C) Block cipher
(D) None of the above mentioned
Ans: C
71. Which of the following is a cryptographic protocol used to secure HTTP connection ?
(A) Stream control transmission protocol
(B) Transport layer protocol
(C) Explicit congestion notification
(D) Resource reservation protocol
Ans: B
72. Network layer firewall works as a :
(A) Frame filter
(B) Packet filter
(C) Both frame and packet filters
(D) None of the above mentioned
Ans: B
73. A proxy firewall filters at :
(A) Physical layer (B) Data link layer (C) Network layer (D) Application layer
Ans: D
74. What is the type of injection, in which malicious scripts are injected into trusted websites ?
(A) XSS (B) SQL Injection (C) Access (D) Broadcasting
Ans: A
75. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called :
(A) Slow read attack (B) Spoofed attack
(C) Starvation attack (D) Denial of service attack
Ans: D
76. In asymmetric encryption :
(A) Same key is used for encryption and decryption
(B) Different keys are used for encryption and decryption
(C) No key is required for encryption and decryption
(D) No key is used for encryption and a public key is used for decryption
Ans: B
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15