Thursday, 16 February 2017

HSST Computer Science Solved Paper (SR For SC/ST) 86/2016/OL - Part 1

Question Paper Code: 86/2016/OL
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Date of Test: 29-12-2016
Alpha code: A

1.       The buffer overflow attack is caused by
(A) Vulnerability in the design of a networking protocol
(B) Vulnerability in the implementation of a networking protocol
(C) Vulnerability in human behaviour
(D) Vulnerability in software
Answer: D
2.       Which of the following is not valid IPv4 addresses?
(A) 192.10.14.3
(B) 201.172.275.33
(C) 65.90.11.00
(D) 193.20.250.10
Answer: B
3.       Address resource records are associated with
(A) Routing tables in Internet routers
(B) ARP aches in LAN workstations
(C) DNS servers
(D) None of the above
Answer: C
4.       Which of the following protocols is used in accessing web mail?
(A) HTTP
(B) SMTP
(C) POP3
(D) IMAP
Answer:-Question Cancelled
5.       If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
(A) xy
(B) gcd(x, y)
(C) xy/gcd(x, y)
(D) None of these
Answer: D
6.       Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical output symbols in which of the following
(A) Caesar cipher
(B) Vigenere cipher
(C) Hill cipher
(D) One time pad
Answer: A
7.       A product cipher is constructed using a combination of
(A) Symmetric and asymmetric ciphers
(B) Substitution and transposition ciphers
(C) Monoalphabetic and polyalphabetic ciphers
(D) Stream and block ciphers
Answer: B
8.       Which of the following characteristics is most widely used in fingerprint recognition?
(A) Number and coordinates of arch patterns
(B) Number and coordinates of loop patterns
(C) Coordinates and orientations of fingerprint minutiae
(D) Number and coordinates of whorl patterns
Answer: C
9.       During the initial stages of an attack by a new internet scanning worm, the number of infected machines increases
(A) Exponentially with time
(B) Logarithmically with time
(C) Polynomially with time
(D) At a constant rate
Answer: A
10.    Use privileges in windows are stored in
(A) DACL
(B) ACE
(C) Access token
(D) SID
Answer: C

11.    Probabilistic packet marking is technique used in support of
(A) DDoS prevention
(B) IP traceback
(C) DDoS detection
(D) Worm detection
Answer: B
12.    The role of the payment gateway is
(A) A proxy to the merchant
(B) A financial service provider
(C) A government regulator
(D) A proxy to the bankcard network
Answer: D
13.    What type of parameters are used in transcendental functions in Java?
(A) double
(B) long
(C) byte
(D) int
Answer: A
14.    In what format is Java's character set represented?
(A) 16 bits ASCII
(B) 16 bits unicode
(C) 16 bits EBC
(D) None of the above
Answer: B
15.    Basic futures of structured programming
(A) Sequence
(B) Looping
(C) Branching
(D) All of the above
Answer: D
16.    In which year Java was developed?
(A) 1989
(B) 1990
(C) 1991
(D) 1992
Answer: C
17.    What feature of C++ was dropped in Java?
(A) Virtual function
(B) Abstract class
(C) Inheritance
(D) Pointers
Answer: D
18.    What type of storage class is involved when we pass by value in function?
(A) External
(B) Automatic
(C) Static
(D) Register
Answer: B
19.    What is Java equivalent of const in C++?
(A) const
(B) #define
(C) final
(D) All of the above
Answer: C
20.    What is another name for semantic errors?
(A) Runtime errors
(B) Compile time errors
(C) Syntax errors
(D) None of the above
Answer: A

Pages   2   3   4   5 

0 comments:

Post a Comment