Kerala PSC HSST Computer Science Previous Year Question Paper Download

HSST Computer Science Previous Year Question Paper 2016

1:-The buffer overflow attack is caused by
 A:-Vulnerability in the design of a networking protocol
 B:-Vulnerability in the implementation of a networking protocol
 C:-Vulnerability in human behaviour
 D:-Vulnerability in software
 Correct Answer:- Option-D

2:-Which of the following is not valid IPv4 addresses ?
 A:-192.10.14.3
 B:-201.172.275.33
 C:-65.90.11.00
 D:-193.20.250.10
 Correct Answer:- Option-B

3:-Address resource records are associated with
 A:-Routing tables in Internet routers
 B:-ARP aches in LAN workstations
 C:-DNS servers
 D:-None of the above
 Correct Answer:- Option-C

4:-Which of the following protocols is used in accessing web mail ?
 A:-HTTP
 B:-SMTP
 C:-POP3
 D:-IMAP
 Correct Answer:-Question Cancelled

5:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
 A:-xy
 B:-gcd(x, y)
 C:-xy/gcd(x, y)
 D:-None of these
 Correct Answer:- Option-D

6:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical
output symbols in which of the following
 A:-Caesar cipher
 B:-Vigenere cipher
 C:-Hill cipher
 D:-One time pad
 Correct Answer:- Option-A

7:-A product cipher is constructed using a combination of
 A:-Symmetric and asymmetric ciphers
 B:-Substitution and transposition ciphers
 C:-Monoalphabetic and polyalphabetic ciphers
 D:-Stream and block ciphers
 Correct Answer:- Option-B

8:-Which of the following characteristics is most widely used in fingerprint recognition ?
 A:-Number and coordinates of arch patterns
 B:-Number and coordinates of loop patterns
 C:-Coordinates and orientations of fingerprint minutiae
 D:-Number and coordinates of whorl patterns
 Correct Answer:- Option-C


9:-During the initial stages of an attack by a new internet scanning worm, the number of infected machines
increases
 A:-Exponentially with time
 B:-Logarithmically with time
 C:-Polynomially with time
 D:-At a constant rate
 Correct Answer:- Option-A

10:-Use privileges in windows are stored in
 A:-DACL
 B:-ACE
 C:-Access token
 D:-SID
 Correct Answer:- Option-C

Kerala PSC HSST Computer Science Previous Year Question Paper Download Kerala PSC HSST Computer Science Previous Year Question Paper Download Reviewed by PSC BOOK on 21:25 Rating: 5

No comments:

Post Bottom Ad

Powered by Blogger.