COMPUTER SCIENCE - PAGE 8
1. What is prototype in Prototype Model ?
1) Minimodel of existing system
2) Minimodel of proposed system
3) Working model of existing system
4) None of these
Ans: 2
2. SRS stands for :
1) Software Requirement Specification
2) Software Requirement Standard
3) System Requirement Standard
4) Software Requirement Set
Ans: 1
3. Cryptanalysis is :
1) Process of break to cipher text message to obtain plain text message
2) Process of increase the speed
3) Process of encrypt the data
4) None of these
Ans: 1
4. DES stands for : ( In reference to cryptography )
1) Digital Encryption Standard
2) Digital Encryption Set
3) Data Encoding Scheme
4) Data Encryption Standard
Ans: 4
5. " Man in the middle attack " is also known as : ( In reference of DiffieHellman key exchange algorithm )
1) Brute Force attack
2) Bucket bridge attack
3) Plaint text attack
4) None of these
Ans: 2
6. Vernam cipher is also called :
1) Rail fence technique
2) Casear Cipher
3) One Time pad
4) Homophonic cipher
Ans: 3
7. In IDEA algorithm , the key size is :
1) 64 bit
2) 128 bit
3) 256 bit
4) 56 bit
Ans: 2
8. Who will increase the redundancy of plain text ?
1) Confusion
2) Diffusion
3) Both confusion and diffusion
4) None of these
Ans: 2
9. To verify a digital signature, we need the ____________
1) Sender's private key
2) Sender's public key
3) Receiver's private key
4) Receiver's public key
Ans: 2
10. In RSA algorithm, P = 7 and Q = 17, What is the value of N, E (Public Key), D (Private Key) respectively
1) 119 , 3 , 77
2) 119 , 3 , 67
3) 129 , 5 ,77
4) 119 , 5 , 77
Ans: 4
11. Which of the following service is supported by PGP ( Pretty Good Privacy ) ?
1) Confidentiality
2) eMail Compatibility
3) Compression
4) All of these
Ans: 4
12. Which one of the following is not a Denial of Service (DoS) atatck ?
1) Tear drop attack
2) Smurf attack
3) SYNFlood Attack
4) Code Red
Ans: 4
13. In tunnel mode, IP Sec protect :
1) Entire packet
2) IP header
3) IP Payload
4) None of these
Ans: 1
14. When one entity pretend to be a another entity, the attack is known as :
1) Replay attack
2) Modification
3) Denial of Service
4) Masquerade
Ans: 4
15. Baud is :
1) Number of bits transmitted per unit time
2) Number of bytes transmitted per unit time
3) Number of signal changes per second
4) None of these
Ans: 3
16. Network uses star topology if :
1) All computer are arranged in local loop
2) All computers are attached to a central point
3) All computers are attached to a single long cable
4) All computers are attached to multiple hierarchical cable
Ans: 2
17. CIDR stands for :
1) Classified Internet Domain Routing
2) Classless Inter Domain Routing
3) Classless Internet Domain Routing
4) Classified Inter Domain Routing
Ans: 2
18. In cycle redundancy check, CRC is :
1) Divisor
2) Quotient
3) Dividend
4) Remainder
Ans: 4
19. Loss in signal power as light travel down the fiber is called
1) Attenuation
2) Propagation
3) Scattering
4) Interruption
Ans: 1
20. Six channel, each with a 100 KHz bandwidth are to be multiplexed together , what is the minimum bandwidth of the link if there is need for a guard band of 10 KHz between to channels to prevent interference
1) 600 KHz
2) 610 KHz
3) 650 KHz
4) 590 KHz
Ans: 3
21. In OSI Model match the following : A) Physical Layer 1) Dialog control & synchronization B) Data Link layer 2) Synchronization of bits and transmission mode C) Session layer 3) Translation and Compression D) Presentation Layer 4) Error Control and Framing
1) A2 , B4 , C1 , D3
2) A1 , B3 , C2 , D4
3) A3 , B1 , C4 , D2
4) A4 , B2 , C3 , D1
Ans: 1
22. From which network device, the frame from one LAN can be transmitted to another LAN ?
1) Modem
2) Router
3) Bridge
4) Repeater
Ans: 3
23. What is the address size of IPv6 ?
1) 32 bit
2) 128 bit
3) 256 bit
4) 512 bit
Ans: 2
24. In which layer of OSI model does the repeater work ?
1) Physical Layer
2) Data Link Layer
3) Network layer
4) Transport Layer
Ans: 1
25. In which switching each packet of a message follow the same path from sender to receiver ?
1) Circuit Switching
2) Message switching
3) Virtual approach to packet switch
4) Datagram approach to packet switching
Ans: 1
1) Minimodel of existing system
2) Minimodel of proposed system
3) Working model of existing system
4) None of these
Ans: 2
2. SRS stands for :
1) Software Requirement Specification
2) Software Requirement Standard
3) System Requirement Standard
4) Software Requirement Set
Ans: 1
3. Cryptanalysis is :
1) Process of break to cipher text message to obtain plain text message
2) Process of increase the speed
3) Process of encrypt the data
4) None of these
Ans: 1
4. DES stands for : ( In reference to cryptography )
1) Digital Encryption Standard
2) Digital Encryption Set
3) Data Encoding Scheme
4) Data Encryption Standard
Ans: 4
5. " Man in the middle attack " is also known as : ( In reference of DiffieHellman key exchange algorithm )
1) Brute Force attack
2) Bucket bridge attack
3) Plaint text attack
4) None of these
Ans: 2
6. Vernam cipher is also called :
1) Rail fence technique
2) Casear Cipher
3) One Time pad
4) Homophonic cipher
Ans: 3
7. In IDEA algorithm , the key size is :
1) 64 bit
2) 128 bit
3) 256 bit
4) 56 bit
Ans: 2
8. Who will increase the redundancy of plain text ?
1) Confusion
2) Diffusion
3) Both confusion and diffusion
4) None of these
Ans: 2
9. To verify a digital signature, we need the ____________
1) Sender's private key
2) Sender's public key
3) Receiver's private key
4) Receiver's public key
Ans: 2
10. In RSA algorithm, P = 7 and Q = 17, What is the value of N, E (Public Key), D (Private Key) respectively
1) 119 , 3 , 77
2) 119 , 3 , 67
3) 129 , 5 ,77
4) 119 , 5 , 77
Ans: 4
11. Which of the following service is supported by PGP ( Pretty Good Privacy ) ?
1) Confidentiality
2) eMail Compatibility
3) Compression
4) All of these
Ans: 4
12. Which one of the following is not a Denial of Service (DoS) atatck ?
1) Tear drop attack
2) Smurf attack
3) SYNFlood Attack
4) Code Red
Ans: 4
13. In tunnel mode, IP Sec protect :
1) Entire packet
2) IP header
3) IP Payload
4) None of these
Ans: 1
14. When one entity pretend to be a another entity, the attack is known as :
1) Replay attack
2) Modification
3) Denial of Service
4) Masquerade
Ans: 4
15. Baud is :
1) Number of bits transmitted per unit time
2) Number of bytes transmitted per unit time
3) Number of signal changes per second
4) None of these
Ans: 3
16. Network uses star topology if :
1) All computer are arranged in local loop
2) All computers are attached to a central point
3) All computers are attached to a single long cable
4) All computers are attached to multiple hierarchical cable
Ans: 2
17. CIDR stands for :
1) Classified Internet Domain Routing
2) Classless Inter Domain Routing
3) Classless Internet Domain Routing
4) Classified Inter Domain Routing
Ans: 2
18. In cycle redundancy check, CRC is :
1) Divisor
2) Quotient
3) Dividend
4) Remainder
Ans: 4
19. Loss in signal power as light travel down the fiber is called
1) Attenuation
2) Propagation
3) Scattering
4) Interruption
Ans: 1
20. Six channel, each with a 100 KHz bandwidth are to be multiplexed together , what is the minimum bandwidth of the link if there is need for a guard band of 10 KHz between to channels to prevent interference
1) 600 KHz
2) 610 KHz
3) 650 KHz
4) 590 KHz
Ans: 3
21. In OSI Model match the following : A) Physical Layer 1) Dialog control & synchronization B) Data Link layer 2) Synchronization of bits and transmission mode C) Session layer 3) Translation and Compression D) Presentation Layer 4) Error Control and Framing
1) A2 , B4 , C1 , D3
2) A1 , B3 , C2 , D4
3) A3 , B1 , C4 , D2
4) A4 , B2 , C3 , D1
Ans: 1
22. From which network device, the frame from one LAN can be transmitted to another LAN ?
1) Modem
2) Router
3) Bridge
4) Repeater
Ans: 3
23. What is the address size of IPv6 ?
1) 32 bit
2) 128 bit
3) 256 bit
4) 512 bit
Ans: 2
24. In which layer of OSI model does the repeater work ?
1) Physical Layer
2) Data Link Layer
3) Network layer
4) Transport Layer
Ans: 1
25. In which switching each packet of a message follow the same path from sender to receiver ?
1) Circuit Switching
2) Message switching
3) Virtual approach to packet switch
4) Datagram approach to packet switching
Ans: 1
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15