0% found this document useful (0 votes)
152 views73 pages

Paper III

Uploaded by

Upasana Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views73 pages

Paper III

Uploaded by

Upasana Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

Paper : III

Subject:
Computer
Applications
and
NBCD/
Computer
Applications
Ser Section Sub-Section Topic Difficulty Question Type Question Text Option Option Option Option Correct Option Marks
1 2 3 4
1 Computer Computer Evolution of Fill in the Blanks In 1830, _____ designed an 'analytical engine' that performed calculations. Babbage 1
Applications Fundamentals Computers
VLSI Stands for __________. Very Large Scale Integration 1

The ___________ was the earliest calculating aid Abacus 1


Napier bones consisted of a set of _________ rods. 4 1
Before the invention of electronic calculator, scientists used the slide 1
___________rule to carry out numerical calculations
The invention of _____________ fed to the development of electronic IC 1
computers
Programs for the first generation computers were inItially written in FORTRAN 1
__________ language
________ circuits were used to make third generation computers. IC 1

_________ register is used only to read memory RAM 1


Charles babbage designed ___________ and __________ machines Different and Analytical engines 1

Transistors were used during the _____________ generation in the Second 1


computer evolution history
The RAM locatted in_____________ Motherboard 1
_________ is the assembly language Low level programming 1
_________ is the first super computer of india PARAM 8000 1
_____________first commercial computer Ferranti Mark 1 1
ENIAC stands for __________. Electronic Numerical Integrator and Computer 1
In the late __________, Herman Hollerith invented data storage on punched 1880 1
cards that could then be read by a machine.
__________ is used as a programming language in first generation Machine language 1
computers
___________ is the major drawback in programming of ENIAC Onboard wiring 1
Basic is ________ language. Procedural 1
Apple company used chips from ______ for its computers motorolo 1
True or False Punch card was invented by Herman Holerith 1
Typical bandwidth of optical fibers is in MHz 1
First Computer was made in 1949 1
Transistors were used in third generation 1
IC's were used in third generation 1
Slide ruler was invented in 1700 1
Vacuum tube was used in first generation 1
ENIAC was constructed by John Mauchly and J. Presper Eckert 1
Punch card was invented by John Mauchly 1
EDSAC was the first digital stored program computer 1
The first e-mail sent in 1980 1
The Period of fourth generation is from 1971-1980 1
The Period of third generation is from 1965-1971 1
The Period of second generation is from 1959-1965 1
The Period of first generation is from 1946-1959 1
Multiple Choice What was the name of the first computer designed by Charles Babbage ? Analytical engine Difference Engine Colossus ENIAC 2 1
Questions

Which was the first electronic digital programmable computing device ? Analytical engine Difference Engine Colossus ENIAC 3 1

EDSAC stands for __________. Electronic Delay Electronic Delay Electronic Data Electronic Data 1 1
Storage Autiomatic Storage Automatic Storage Automatic Storage Automatic
Calculator Computer Calculator Computer

EDVAC stands for __________. Electronic Discrete Electronic Discrete Electronic Data Electronic Data 2 1
Variable Automatic Variable Automatic Variable Automatic Variable Automatic
Calculator Calculator Calculator Computer

Which was the first commercial computer? Ferranti Mark 1 Analytical Engine Difference Engine Colossus 1 1

UNIAC stands for __________. Universal Automatic Universal Native Universal Native Universal Automatic 4 1
Calculator Input Automatic Input Automatic Computer
computer calculator
ENIAC stands for __________. Electronic Electronic Electronic Numerical Electronic Numerical 1 1
Numerical Numerical Integrator Automatic Integrator Automatic
Integrator And Integrator And Computer Calculator
Computer Calculator
John Mauchly and J. Presper Eckert are the inventors of __________ UNIAC ENIAC EDSAC Ferranti Mark 1 2 1
computer.

Who invented the punch card? Charles Baggage Semen Korsakov Herman Hollerith Joseph Marie 3 1
Jacquard
In the late __________, Herman Hollerith invented data storage on punched 1860 1900 1890 1880 4 1
cards that could then be read by a machine.

Which electronic components are used in First Generation Computers? Integrated circuits Vaccum Tubes VLSI ULSI Micro 2 1
Microprocessor processor
Which electronic components are used in Second Generation Computers? Transistors Integrated Circuits Vaccum Tubes VLSI Micro 1 1
processor
Which electronic components are used in Third Generation Computers? Integrated Circuits Vacuum Tubes VLSI ULSI 1 1
Microprocessor Microprocessor
Which electronic components are used in Fourth Generation Computers? Integrated Circuits Vacuum Tubes VLSI ULSI 3 1
Microprocessor Microprocessor
Which electronic components are used in Fifth Generation Computers? Integrated Circuits Vacuum Tubes VLSI ULSI 4 1
Microprocessor Microprocessor
ENIAC Computer belongs to __________. First Generation Second Generation Third Generation Fourth Generation 1 1
Computers Computers Computers Computers

VLSI Stands for __________. Very Large Storage Very Large Storage Very Large Scale Very Large Scale 3 1
Integration Integrator Integration Integrator

ULSI Stands for __________. Ultra Large Storage Ultra Large Scale Ultra Large Storage Ultra Large Scale 2 1
Integration Integration Integrator Integrator

__________ is used as a programming language in first generation FORTRAN COBOL BASIC Machine Language 4 1
computers?

FORTRAN stands for __________. For Translation Format Fork Transformation Formula Translation 4 1
Transformation
The processing speed of first generation computers was milliseconds microseconds nanoseconds picoseconds 1 1

VGA staads for Video Graphics Visual Graphics Volatile Graphics Video Graphics 1 1
Array Array Array Adapter
MICR stands for Magnetic Ink Magnetic Ink Code Magnetic Ink Cases None 1 1
Character Reader Reader Reader

Which of the following is not a class based on size? Mainframe Micro Computer Mini Computer Digital Computer 4 1
Computer
In latest generation computers, the instructions are executed Parallel only Sequentially only Both sequentially All of above 3 1
and parallel
Which of the following generation computers had expensive operation cost? First Second Third Fourth 1 1

Slide Rules was invented in 1617 1617 1620 None of these 3 1

All modern computer operate on Information Floppies Data Word 3 1

Which of the following programming language started from the second LISP C QBASIC FORTRAN 4 1
generation?
Fifth generation computer is also known as Knowledge Very large scale Both of above None of above 1 1
information integration
processing system

Second Generation computers were developed during 1949 to 1955 1956 to 1965 1965 to 1970 1970 to 1990 2 1

Who built the world’s first electronic calculator using telephone relays, light Claude Shannon Konrard Zues George Stibits Howard H. Aiken 3 1
bulbs, and batteries ?

Which of the following is a feature of fifth-generation computers? Use of natural artificial intelligence bio-chips All of above 4 1
language
Minicomputers and microcomputers are from which generation of First Second Third Fourth 4 1
computers?
Charles Babbage is considered the father of modern computers because of his difference of his analytical his concept of input, All of above 3 1
engine engine mill and output

Which of the following have the fastest access time? Semiconductor Magnetic Disks Magnetic Tapes Compact Disks 1 1
Memories
One Word Question Which generation was based on integrated circuits Fourth 1

Who built the world’s first electronic calculator using telephone relays, light George Stibits 1
bulbs, and batteries ?
What was the name of the first computer designed by Charles Babagge? Difference Engine 1

Which was the first commercial computer? Ferranti Mark1 1


Which access method is used for magnetic tape Direct access method 1
Typical bandwidth of optical fibers is In order of GHz 1
Which generation language is C? A third generation high level language 1
In which generation Neural netowrk was used at first Third Generation 1
The period of first generation 1946-1959 1
The period of second generation 1959-1965 1
The period of third generation 1965-1971 1
The period of fourth generation 1971-1980 1
The period of fifth generation 1980-onwards 1
The first generation computer was based on Vacuum Tube 1
The second generation computer was based on Transistor 1
The third generation computer was based on IC based 1
The fourth generation computer was based on VLSI Microprocessor based 1
The fifth generation computer was based on ULSI Microprocessor based 1
The basic architecture of computer was developed by John Von Neumann 1
Artificial Intelligence started in which generation Fifth Generation 1
Microprocessor was introduced in which generation fourth Generation 1
GUI is stands for Graphical User Interface 1
Memory size in mainframe computers are expressed as Megabytes 1
Who invented the super computer Seymour Cray 1
Supercomputer were introduced in which year 1960 1
Which was the first intel processor 4004 1
When was the first e-mail sent 1971 1
The most advanced form of ROM is? EEPROM 1
AVI (Audio Video Interleave) format was developed by? Microsoft in 1992 1
Which is the most powerful type of computer Super computer 1
Performance of a supercomputer is measured in? Floating point per second 1
Who invented the punch card? Herman Holerith 1
The processing speed of first generation computers was Milliseconds 1
Which generations computers had expensive operation cost? First 1
Slide Ruler was invented in 1620 1
In the latest generation computers, the instructions are executed in which Sequntial and parallel both 1
method ?
Minicomputers and microcomputers are from which generation of Fourth 1
computers?
Which was the first stored program computer EDVAC 1
Which was the first digital stored program computer EDSAC 1
IN which generation Microprocessor was invented Third Generation 1
what was major drawback in programming of ENIAC Its on board wiring 1
Which is the first known machine for calculation Mechanical Calculator 1
First computer was made in which year 1943 1
Who constructed ENIAC John Mauchly and J. Presper Eckert 1
Who prepared the first UNIVAC 1 John Mauchly and J. Presper Eckert 1
When was the first mechanical computer invented ? 1822 1
Which was first programmable computer ? Z1 1
Which was first electric programmable computer ? The Colossus 1
Which was first stored program computer ? SSEM (Small-Scale Experimental Machine) 1
Which was first commercial computer? Z4 1
which was the first desktop and mass-market computer ? the Programma 101 1
Which was the first microprocessor ? the Intel 4004 1
Which was the first laptop or portable computer ? The IBM 5100 1
Which was the first PC clone ? The Compaq Portable 1
Which was the first multimedia computer ? M2500 XL/2 and M4020 SX 1
What is the technology behind the first generation computer was a fragile vacuum tubes. 1
glass device ?
What is ENIAC ? general purpose computer 1
Who invented the super computer ? Seymour Cray 1
Microprocessor was introduced in which generation ? fourth generation 1
Who invented the punch card ? Herman Holerith 1
How performance of super computer was measured ? Floating point per second 1
Which generation language is C? third generation high level language 1
What is the period of first generation ? 1946-1959 1
What is the period of second generation? 1959-1965 1
What is the period of third generation ? 1965-1971 1
What is the period of fourthgeneration? 1971-1980 1
What is the period of fifthgeneration ? 1980-onwards 1
The first generation of computers used vacuum tubes. Why were they heating issues and lot of energy consumption 1
replaced by the transistor?
What is reduced in fourth generation computers ? Size of computer 1
What are small introduced in size and cost less Microcomputers 1
Which was the first electronic digital computer ? ENIAC(Electronic Numeric Integrator And Calculator) 1

Which test undertakes trial test of a computer or software before the Beta test 1
commercial launch ?
What is Scareware? Fake antivirus softwares 1
which programming language is used in the Third generation of computer ? C and C++ 1

What was the world's first general-purpose computer ? The Analytical Engine 1
In which year third generation computers was developed? 1965 - 1970 1
When was first generation of computers was developed ? 1946 - 1958 1
Which is ancient memory aid device used to record and document numbers, A tally stick 1
quantities or even messages?
What is the first electro-mechanical computer ? IBM Automatic Sequence Controlled Calculator (ASCC) 1

What is ENIAC stands for? Electronic Numerical Integrator and Computer. 1


what is the year of fourth generation computers ? 1971 - today 1
What uses parallel processing and superconductors in reality ? artificial intelligence 1
This devices Siri, Cortana and Google now are examples of ? artificial intelligence 1
Name any one type of AI ? reactive machines 1
What are the examples of third generation computers? PDP-8, PDP-11 1
In which generation of computers magnetic cores were used as secondary Second generation computers 1
storage devices ?
What are the examples of second generation computers? IBM 1620,UNIVAC 1108 1
What is meant by computer evolution? CDC 3600, UNIVAC 1108. 1
How many computer languages are in use? 2,000 in active use, whereas only 15 in use in 1970. 1
What is the other name of ‘main memory’? Primary Memory 1
What is ‘OCR’? OCR (Optical Character Recognition) 1
First generation computers were made of ? vaccum tubes 1
Second generation computer were made of ? Transistor 1
Which concepts fifth generation computers were developed for ? artificial intelligence 1
Third generation computer were made of ? Intergrated circuits 1
Fourth generation computer were made of ? microprocessors or chips 1
Write any one disadvantages of first generation computer? Not-portable. 1

Write any one advantages of second generation computers? less energy 1


Write any one characteristics of first generation computers? Magnetic drums 1
write any one advantages of third generation computers? Maintenance cost was low 1
What was the first computer called? ENIAC 1
Which generation of computer is still under development? Fifth Generation 1
In Which year generation Z was born ? Generation Z—born after 1997. 1
How are computers differ based on? data processing abilities 1
What is meant by computer evolution? change in computer technology 1
Who created the computer? Charles Babbage 1
What is the use of microprocessor in computer ? increased reliability 1
What is the technology of computer? Information technology 1
In which generation concept of AI came? fifth generation 1
Who designed Differential and Analytical engine Charles Babage 1
Which is the first super computer of India? PARAM 8000 1
Comprehension 0
Hardware Fill in the Blanks BIOS stands for _________________________ Basic input output system 1
CMOS stands for__________________________ Complementry metal oxide semiconductor 1
The unit of system clock speed is _______ Mhz 1
SSD stands for _________________________ Solid state device 1
_____________ is measure of how long it takes the head assembly to travel Seek time 1
to the track of the disk that contain data.
______________ is a procedure used to minimize delay in retrieving data. Defragmentation 1

Time to access data in hard disk can be improved by increasing rotational speed 1
______________
SCSI stands for _______________________ small computer system interface 1
IDE stands for _____________________________ Integrated drive electronics 1
__________________is a successor to parallel SCSI interface on Fibre channel 1
enterprise market.
Separation of user logical memory and physical memory is ___________ Virtual memory 1

Virtual Memory can be implemented via __________ Demand paging 1


LRU stands for ___________________________ Least Recently used 1
__________________is one or more physically contigious pages. Slab 1

Cashe memory bridge the gap between RAM and _______ Processor 1
Bus which used to connect monitor to CPU is __________ SCSI bus 1
To extend connectivity of processor bus we use__________ PCI bus 1
Main advantage of multiple bus organization over single bus Reduction in a number of cycles for execution 1
is_______________________
ISA standard buses are used to connect_____________ Hard disk and processor 1
Missing slot covers on a computer can cause___________ Overheat 1
The DC voltage on most circuit boards is:________ 0 1
The main circuit board in the system unit is also called Motherboard 1
the:______________________
Your operating system will detect and install the appropriate device drivers Plug and play 1
for this type of device:_________________
Component of CPU which is responsible for comparing contents of two ALU 1
pieces of data is___________________________
When arithmetic, logic and control unit of a computer are combined into a Central Processing Unit 1
single unit, it is known as__________________________
Brain of a computer is called_______________________ CPU 1
The transfer rate, when the USB is operating in low-speed of operation is 1.5Mb/s 1
_________________
The high speed mode of operation of the USB was introduced by USB 2.0 1
________________
The sampling process in speaker output is a ________ process. Isochronous 1
The USB device follows _______ structure. Tree 1
The device can send a message to the host by taking part in _____ for the Polling 1
communication path.
When the USB is connected to a system, its root hub is connected to the Processor BUS 1
________
The devices connected to USB is assigned a ____ address. 7 bit 1
The initial address of a device just connected to the HUB is ________ ans:0000000 1

A USB pipe is a ______ channel. Full-Duplex 1


The type/s of packets sent by the USB is/are _______ Both data and control 1
Type of computer data transmission which uses a clock to control timing of Synchronous 1
bit being sent is__________________
Type of computer data transmission in which start/stop transmission bits are Synchronous 1
not required is termed as____________________

Diameter of fiber optic cable is___________________ 62.5 microns 1


Transmission media which transmits voice and data through air as high Microwaves 1
frequency radio waves is_________________
True or False CD-ROM is a Non-volatile memory 1
A write operation may also be referred to as a "fetch" operation. 1
A burst refresh and a normal memory operation of a DRAM can be 1
interspersed.
DRAM chips can be combined for larger capacity and word sizes using the 1
same methods as for other memory types.
Erasing or programming a flash memory device is a one step operation. 1

Cache memory is used in high-speed systems. 1


ROMs are used to store data that generally cannot be easily changed. 1

Fusible link PROMs are programmed by removing the desired fuse links 1
using a microscope and tweezers.
One of the advantages of DRAMs is their ability to store data without 1
needing periodic refreshment of the memory contents.
Main computer memory is usually DRAM because of high density and low 1
cost; cache memory is usually SRAM because of high speed.

RAM stands for Readily Accessible Memory 1


More than one bit of data can occupy each memory cell. 1
Due to their ability to be easily erased and reused, magnetic memory 1
devices are widely used for RAM.
EEPROMS can be electrically erased and reused. 1
The main advantage of bipolar (TTL) memories over MOS memories is 1
speed
A ROM which allows the user to program data into the chip by permanently 1
opening fusible-links is the EPROM.
The time delay called access time, tacc, is a measure of the ROM's 1
operating speed
Most flash chips use a bulk erase operation in which all cells on the chip are 1
erased simultaneously.
The TMS44100 4M X 1 DRAM does not have a chip select (SC) input. 1

Testing and troubleshooting the decoding logic will not reveal problems with 1
the memory chips and their connections to the CPU busses.

Primary storage is composed of semiconductor chips. 1


Primary storage is composed of semiconductor chips. 1
Microprocessors integrate memory, logic, and control circuits for an entire 1
CPU onto a single chip.
Conventional chips may take several clock cycles to execute a single 1
instruction.
ROM can be written to. 1
A nanosecond is one-millionth of a second. 1
A machine cycle is the series of operations required to process a single 1
machine instruction.
The CPU contains both the ALU and a control unit. 1
Primary storage is temporary. 1
A current-sourcing transistor may also be referred to as a pull-down 1
transistor.
The principal advantage of MOS ICs over TTL ICs is their fast operating 1
speed.
The dc noise margins calculated using the proper values from a standard 1
TTL data sheet are the worst-case margins. The typical dc noise margins
are usually somewhat higher.
A major drawback in using ECL logic circuits in conjunction with TTL and 1
MOS circuits is its negative supply voltages and logic levels.

The fan-out of CMOS gates is frequency-dependent. 1


Octal number system contains digits from 0 - 7. 1
CPU controls only input data of computer. 1
Freeware is software that is available for use at no monetary cost 1
IPv6 Internet Protocol address is represented as eight groups of four Octal 1
digits.
Worms and trojan horses are easily detected and eliminated by antivirus 1
software
GNU / Linux is a open source operating system. 1
Multiple Choice The n-bit address is placed in the __________ MBR MAR RAM ROM 2 1
What is the high speed memory between the main memory and the CPU Register Memory Cache Memory Storage Memory Virtual Memory 2 1
called?
Whenever the data is found in the cache memory it is called as _________ HIT MISS FOUND ERROR 1 1

LRU stands for ___________ Low Rate Usage Least Rate Usage Least Recently Used Low Required 3 1
Usage
Because of virtual memory, the memory can be shared among processes threads instructions none of these 1 1
____________
When a program tries to access a page that is mapped in address space segementation fault fatal error occurs page fault occurs no error occurs 3 1
but not loaded in physical memory, then ____________ occurs

Effective access time is directly proportional to ____________ page-fault rate hit ratio memory access none of these 1 1
time
Computer memory in which user cannot write new information or RWM RAM ROM CMOS 3 1
instructions is
Which of the following is not a type of memory? RAM FPROM EEPROM ROM 3 1
If a RAM chip has n address input lines then it can access memory locations 2(n-1) 2(n+1) 2n 22n 3 1
upto __________
One Word Question The n-bit address is placed in the MAR 1

Which of the following control signals are selected for read and write Read and write 1
operations in a RAM?
Computers invariably use RAM for __________ High speed main memory 1
How many types of RAMs are? 2 1
Static RAM employs __________ BJT or MOS 1
Dynamic RAM employs __________ Capacitor or MOSFET 1
Which one of the following is volatile in nature? RAM 1
The magnetic core memories have been replaced by semiconductor RAMs, All of the Mentioned 1
why?
The data written in flip-flop remains stored as long as D.C. power is supplied 1
The memory capacity of a static RAM varies from 64 bit to 1 Mega bit 1
The input data bit is written into the cell by setting Both the flip-flop for 1 and resetting the flip-flop 1
When the READ/(WRITE)’ line is HIGH then the flip-flop is Unaffected 1
The flip-flop in static memory cell can be constructed using BJT or MOSFET 1
Which of the following IC is TTL based static RAM? IC 7489 1
IC 7489 is of ____________ 64 bit 1
The first practical form of Random Access Memory (RAM) was the Memory tube 1

Magnetic-core memory was invented in 1947 1


Which of the following RAM is volatile in nature? Both SRAM and DRAM 1
Cache memory acts between __________ CPU and RAM 1
The memory which is used for storing programs and data currently being PROM 1
processed by the CPU is called
What is RAM? Random Access Memory 1
What are various type of RAM? DDR3, DDR4 1
What is ROM and different types of ROM? Read only memory 1
What is EPROM AND EEPROM? Erasuable programmable read Only Memory 1
What is EEPROM? Electrically Erasuable Programmable Read Only Memory 1

What is BIOS Basic input output system 1


What is CMOS and CMOS battery? Complementary Metal Oxide Semiconductor 1
What is the meaning of the acronym NAS? Network attached storage/Network Area Storage 1
What is to provide for configuration a TCP/PI client for an IPv4 client, ? IP address, Subnet mask 1

What RAID stands for Redundant Array of Independent Disks 1


What NTFS stands for New Technology File System 1
Which memory is a very useful memory management technique which Virtual memory 1
enables processes to execute outside of memory?
Which space can be larger than physical address space? Logical Address 1
Which is the server that authorizes security requests with a particular Domain Controller 1
domain.
Comprehension 0
Storage Fill in the Blanks Storage which stores or retains data after power off is called- Non-volatile storage 1

A permanent memory, which halls data and instruction for start-up the ROM 1
computer and does not erase data after power off.
Which of the following memories must be refreshed many times per Dynamic RAM 1
second?
USB-type storage device is - Secondary 1
_________device is used to back up the data Network Drive. 1
A half byte is known as_____. nibble 1
Main memory of computer is - Internal 1
The contents of memory into blocks of the same size is called as: EEPROM 1
What is the permanent memory built into your computer called? ROM 1
With a CD you can........... read 1
RAM is a.......memory- main 1
__________ is the permanent memory built into your computer called. ROM 1

Magnetic tape is not practical for applications where data must be quickly A sequential-access medium 1
recalled because tape is __________
What is the main advantage of magnetic core memory over semiconductor Non-volatile 1
RAM memory?
Hard disc drives are considered.........storage- Non-volatile 1
Flash is ................ PROM 1
Permanent instructions that the computer uses when it is turned on and that ROM 1
cannot be changed by other instructions are contained in-

Flash memory is also called as __________. Flash RAM 1


A Winchester disk is a_________. disk stack 1
Typical acronym of reusable optical storage will be...... CD-RW 1
Data gathering in computer means, they allow to use.........data. Store 1
The process to copy the software in hard disk from secondary storage Escalation 1
media is called -
When we work on any document on PC, it is stored temporarily on- RAM 1

The faster, costlier and relatively small from of storage managed by Cache 1
computer system hardware
The analytical engine developed during first generation of computers used Counter wheels 1
__________ as a memory unit.
________ is used to hold ROM, RAM, CPU and expansion cards Motherboard 1
Which of the following medium is used between CPU & RAM TO speed up Cache Memory 1
the processing power of a CPU
Breaking logical memory into blocks of the same size is called as: Pages 1

is random access memory- RAM 1


data will remain intact even when the computer is turned of Secondary storage device 1
Main memory works in conjunction with __________. CPU 1
SRAM stands for- Static Random-Access Memory 1
What is the capacity of super computers floppy disc 500 M 1
Built in memory of computer is................. ROM 1
____ is the type of flash drive P-RAM 1
USB stands for- Universal Serial Bus 1
Secondary storage memory is basically non volatile memory 1
A piece of data that can be transferred between CPU and backup storage is block 1
called
In fixed head discs, sum of rotational delay and transfer time is equals to access time 1

When power is switched OFF, it will lost its data, such type of memory is volatile storage 1
classified as
Process of reading data from permanent store and writing it to computer's loading the data 1
main store is called
The storage element for a static RAM is the ________. flip-flop 1
Which is/are the basic refresh mode(s) for dynamic RAM Burst refresh and distributed refresh 1
One of the most important specifications on magnetic media is the data transfer rate 1

A 64-bit word consists of ________. 8 bytes 1


CCD stands for ________. charge-coupled device 1
Dynamic memory cells store a data bit in a _________. capacitor 1
_____________address bits are required for a 4096-bit memory organized 9 1
as a 512 × 8 memory
In general, the ________ have the smallest bit size and the ________ have EEPROMs, Flash 1
the largest.
The mask ROM is _________. permanently programmed during the manufacturing process 1

uses a CMOS capacitor as its memory cell___________ DRAM 1


On a CD-ROM, ________ are recessed areas representing a 0. pits 1
_______________is not a magnetic storage device Magneto-optical disk 1
___________ is not a hard disk performance parameter Break time 1
The ideal memory ________. has all of the above characteristics 1
is the bit storage capacity of a ROM with a 1024 × 8 organization? 8192 1

bits make up the data path of a 30-pin SIMM 8 1


type of memory must be constantly refreshed DRAM 1
indicates the number of pins found on a DIMM 168 1
type of DRAM is synchronized with the system clock SDRAM 1
True or False Static memory will maintain storage even if power is removed. 1
Static RAMs (SRAMs) use internal capacitors as basic storage elements. 1

A burst refresh and a normal memory operation of a DRAM can be 1


interspersed.
ROMs are used to store data that generally cannot be easily changed. 1

RAM stands for Readily Accessible Memory. 1


If a memory design allows a storage location to be accessed without first 1
sequencing through other locations, it is called Random Access Memory.

An optical disk is an example of magnetic storage. 1


The address-decoding scheme for a 16K-byte EPROM memory system 1
requires a 1-to-8-address decoder when 4K × 8 memory is used.

The time from the beginning of a read cycle to the point when the data 1
output is valid is called propagation delay.
Due to their ability to be easily erased and reused, magnetic memory 1
devices are widely used for RAM.
The TMS44100 4M × 1 DRAM does not have a chip select (SC) input. 1

The highest-speed magnetic storage is achieved by using a floppy disk. 1

The floating-gate MOSFET is the actual storage element for EEPROMs. An 1


electron charge will remain on the floating gate for more than 10 years
unless drained off electrically.
ROMs are used to store data on a permanent basis. 1
The time delay called access time, tac, is a measure of the ROM's operating 1
speed.
A typical RAM will read (place stored data on its outputs) whenever the Chip 1
Select line is active and the Write Enable line is inactive.

A group of 6 bits is also known as 1 byte. 1


Erasing or programming a flash memory device is a one-step operation. 1

EEPROM and Flash memory are electrically erasable. 1


RAMs must have a READ/WRITE input, in addition to data in. 1
The EPROM is strictly a MOS device. 1
A term often used commercially to refer to read/write memory is sequential- 1
access memory.
DRAM chips can be combined for larger capacity and word sizes using the 1
same methods as for other memory types.
More than one bit of data can occupy each memory cell. 1
Flash memories are frequently used in place of floppy or small-capacity 1
hard disk drives in portable computers.
A nibble is a group of eight bits. FALSE 1
Fusible-link PROMs are programmed by removing the desired fuse links FALSE 1
using a microscope and tweezers.
When a computer is executing a program of instructions, the CPU 1
continually fetches information from those locations in memory that contain
(1) the program codes representing the operations to be performed and (2)
the data to be operated upon.

A ROM that allows the user to program data into the chip by permanently FALSE 1
opening fusible links is the EPROM.
A write operation may also be referred to as a "fetch" operation. FALSE 1
Address multiplexing is used to reduce the number of address lines. 1

PROMs are basically the same as mask ROMs, once they have been 1
programmed.
RAM is nonvolatile. FALSE 1
Cache memory is used in high-speed systems. 1
Dynamic memories, such as the 2118 16K × 1 RAM, have to multiplex the 1
address bus.
ROM is a type of memory in which data are stored permanently or 1
semipermanently.
EEPROMS can be electrically erased and reused. 1
DRAM uses a cross-transistor configuration. 1
Main computer memory is usually DRAM because of its high density and 1
low cost; cache memory is usually SRAM because of its high speed

Information stored in an EPROM can be erased by prolonged exposure to 1


ultraviolet light.
A CD player is an example of a device that has random access capability. 1

One of the advantages of DRAMs is their ability to store data without FALSE 1
needing periodic refreshment of the memory contents.
A typical RAM will write (store data internally) whenever the Chip Select line FALSE 1
is active and the Write Enable line is inactive.
When two or more devices try to send their own digital levels to a shared 1
data bus at the same time, bus contention will take place.
The main advantage of bipolar (TTL) memories over MOS memories is 1
speed.
Multiple choice Storage which stores or retains data after power off is called- Volatile storage Non-volatile Sequential storage Direct storage 2 1
storage
A permanent memory, which halls data and instruction for start-up the Network interface CPU RAM ROM 4 1
computer and does not erase data after power off. card
Which of the following memories must be refreshed many times per EPROM ROM static RAM Dynamic RAM 4 1
second?
USB-type storage device is - Secondary axiliary Tertiary Primary 1 1
Which of the following places the common data elements in order from Character, File, Character, Record, Character, Field, Bit, Byte, Character, 3 1
smallest to largest? Record, Field, Field, Database, Record, File, Record, Field, File,
Database, File File Database Database

Which device is used to back up the data? Floppy disk Tape Network Drive All of above 4 1
A half byte is known as_____. data bit half byte nibble 4 1
Main memory of computer is - internal External (1) and (2)both Auxiliary 1 1
The contents of memory into blocks of the same size is called as: ROM EPROM EEPROM All of above 4 1
What is the permanent memory built into your computer called? RAM ROM CPU CD-ROM 2 1
With a CD you can Write Read and Write either read or write 1 1
Read
12. RAM is a.......memory- External Auxiliary Internal Main 4 1
__________ is the permanent memory built into your computer called. ROM CPU DVD-ROM RAM 1 1

Magnetic tape is not practical for applications where data must be quickly A random-access A sequential- A read-only medium An expensive 2 1
recalled because tape is __________ medium access medium storage medium
What is the main advantage of magnetic core memory over semiconductor More compact and More economical A bit does not have Non-volatile 4 1
RAM memory? smaller to write after reading

Hard disc drives are considered.........storage- Flash Non-volatile Temporary Non-permanent 2 1


Flash is ................ Software Hardware ROM PROM 4 1
Permanent instructions that the computer uses when it is turned on and that ROM RAM ALU CPU 1 1
cannot be changed by other instructions are contained in-

Flash memory is also called as __________. Flash RAM Flash ROM Flash DRAM Flash DROM 1 1
A Winchester disk is a_________. Disk stack Removable Disk Flexible Disk All of above 1 1

Typical acronym of reusable optical storage will be...... CD CD-RW DVD RPM 2 1
Data gathering in computer means, they allow to use.........data. Present Input Output Store 4 1
The process to copy the software in hard disk from secondary storage Configuration Download Storage Escalation 4 1
media is called -
When we work on any document on PC, it is stored temporarily on- RAM ROM CPU Flash memory 1 1

The faster, costlier and relatively small from of storage managed by Main Memory Flash Memory Cache Disk 3 1
computer system hardware is:
The analytical engine developed during first generation of computers used RAM Floppies Cards Counter wheels 4 1
__________ as a memory unit.
Which of the following is used to hold ROM, RAM, CPU and expansion Computer bus Motherboard Cache Memory All of above 2 1
cards?
Which of the following medium is used between CPU & RAM TO speed up Virtual Memory D RAM Flash Memory Cache Memory 4 1
the processing power of a CPU?
Breaking logical memory into blocks of the same size is called as: Frames Segments Packets Pages 4 1

USB stands for- Uniform Service BusUniversal Serial Universal Sector Universe Service 2 1
Bus Buffer Bus
Which one is random access memory- RAM ROM PROM All of above 1 1
Where, data will remain intact even when the computer is turned of RAM Motherboard Secondary Storage Primary Storage 3 1
Device Device
For permanent memory in computer objects used are - Floppy disk Optical disk Hard disk All of above 4 1
Main memory works in conjunction with __________. RAM CPU Graphics Card LAN 2 1
SRAM stands for- Special Random- Supreme Random- Static Random- Stable Random- 3 1
Access Memory Access Memory Access Memory Access Memory

What is the capacity of super computers floppy disc? 400 M 500 M 600 M 700 M 2 1
Built in memory of computer is................. EROM ROM RAM PROM 2 1
FLASH is.............. Flash D-RAM S-RAM P-RAM 4 1
Virtual memory is_______. memory on the hard in RAM only necessary if a backup device for 1 1
disk that the CPU you do not have any floppy disk
uses an extended RAM in your
RAM computer

Saving data and instructions to make them readily available is the job of Storage Unit Cache Unit Input Unit Output Unit 1 1
__________
Which of the following is used to hold running program instructions? Primary Storage Virtual Storage Internal Storage Minor Devices 1 1
Which of the following is used in main memory? SRAM DRAM PRAM DDR 2 1
Which of the following are types of ROMs? SROM & DROM PROM & EPROM Only one type there PROM & EROM 2 1
is no further
classification
RAID stands for __________ Redundant array of Redundant array of Reusable Array of Reusable array of 1 1
independent disks individual disks independent disks individual disks

A non-erasable disk that stores digitized audio information is _____ CD CD-ROM DVD-R DVD-RW 1 1

One Word Question Storage which stores or retains data after power off is called- Non-volatile storage 1

A permanent memory, which halls data and instruction for start-up the ROM 1
computer and does not erase data after power off.
USB-type storage device is - Secondary 1
Which device is used to back up the data? Floppy Disk 1
Main memory of computer is - Internal 1
A nonvolatile type of memory that can be programmed and erased in flash memory 1
sectors, rather than one byte at a time is:
Memory that loses its contents when power is lost is: volatile 1
When power is supplied to the system then to maintain data with the life of CMOS 1
battery, computer BIOS contains the following
What is meant by the term RAM? Memory which both read and written 1
The two kind of main memory are primary and secondary 1
Which one is the secondary memory device ? floppy disk 1
The word 'computer' usually refers to the central processor unit plus internal memory 1

What are the two basic types of memory that your computer uses? RAM/ROM 1

What is the name given to the memory which works on time-sharing Virtual memory 1
principle to create an illusion of infinite memory space?
Which contents are lost when the computer turns off? Memory 1
How can UV erasable PROMs be recognized? small window on the chip. 1
What is the principal advantage of using address multiplexing with DRAM reduced pin count and decrease in package size 1
memory?
Why is a refresh cycle necessary for a dynamic RAM? The refresh cycle keeps the charge on the capacitor cells. 1

How many 1K * 4 RAM chips would be required to build a 1K * 8 memory 2 1


system?
How many address bits are required for a 4096-bit memory organized as a 9 1
512 * 8 memory?
Which type of ROM can be erased by UV light? EPROM 1
What is used in the main memory? Random Access Memory (RAM) 1
Which memory is used for short-term temporary data storage within the Random Access Memory 1
computer?
What does the storage unit provide? logical space to store data 1
What are storage devices give examples? DVDs. CDs. Magnetic tape. Flash memory 1
What are the types of Primary memory? RAM and ROM 1

Which component is responsible for storing data and instructions? Implicit vs. Explicit memory 1

Which computer parts are responsible for data storage? Central Processing Unit (CPU) 1
What are the main components of a computer? Primary Data Storage 1
Write any one storage device? hard disk 1
What is the storage unit? Saving data and instructions to make them readily available 1
is the job of
Which memory is used to hold running program instructions? Primary Storage 1
Which is non-volatile storage? Secondary 1
What is DRAM Dynamic random access memory 1
The memory space is divided into segments of dynamic size are known as Segmentation 1

In which form data store in HDD Binary 1


Comprehension 0
Operating System Basics of OS Fill in the Blanks If one or more devices use a common set of wires to communicate with the Bus 1
and Application computer system, the connection is called ______
Software
A ____ a set of wires and a rigidly defined protocol that specifies a set of bus 1
messages that can be sent on the wires.
When device A has a cable that plugs into device B, and device B has a daisy chain 1
cable that plugs into device C and device C plugs into a port on the
computer, this arrangement is called a _________

The _________ present a uniform device-access interface to the I/O Device drivers 1
subsystem, much as system calls provide a standard interface between the
application and the operating system.
A ________ is a collection of electronics that can operate a port, a bus, or a controller 1
device.
An I/O port typically consists of four registers status, control, ________ and data in, data out 1
________ registers.
The ______ register is read by the host to get input. data in 1
The ______ register is written by the host to send output data out 1
The hardware mechanism that allows a device to notify the CPU is called interrupt 1
_______
The CPU hardware has a wire called __________ that the CPU senses interrupt request line 1
after executing every instruction.
The _________ determines the cause of the interrupt, performs the interrupt handler 1
necessary processing and executes a return from the interrupt instruction to
return the CPU to the execution state prior to the interrupt.

The _________ are reserved for events such as unrecoverable memory non maskable interrupts 1
errors.
Linux uses a time-sharing algorithm ___________ to pair preemptive scheduling between multiple processes 1

The first linux kernel which supports the SMP hardware? linux 2.0 1
Which one of the following linux file system does not support journaling ext2 1
feature?
Which one of the following bootloader is not used by linux? NTLDR 1
The first process launched by the linux kernel is ___________ init process 1
Standard set of functions through which interacts with kernel is defined by system libraries 1
___________
What is Linux? multi user, multitasking 1
The ________ can be turned off by the CPU before the execution of critical maskable interrupt 1
instruction sequences that must not be interrupted.
The __________ is used by device controllers to request service. maskable interrupt 1

interrupt vector contains ____________ the memory addresses of specialized interrupt handlers 1

Division by zero, accessing a protected or non existent memory address, or exceptions 1


attempting to execute a privileged instruction from user mode are all
categorized as ________
For large data transfers, _________ is used. dma 1
A character stream device transfers ____________ bytes one by one 1
block device transfers ____________ block of bytes as a unit 1
A keyboard is an example of a device that is accessed through a character stream 1
__________ interface.
In polling ____________ busy – wait cycles wait for I/O from device 1
A non blocking system call _________________ does not halt the execution of the application 1
In real time operating system ____________ a task must be serviced by its deadline period 1
Hard real time operating system has ______________ jitter than a soft real less 1
time operating system.
For real time operating systems, interrupt latency should be ____________ minimal 1

In rate monotonic scheduling ____________ shorter duration job has higher priority 1
The problem of priority inversion can be solved by ____________ priority inheritance protocol 1

Time duration required for scheduling dispatcher to stop one process and dispatch latency 1
start another is known as ____________
VxWorks is centered around ____________ wind microkernel 1
Inside its jacket, the floppy media is rotated at the speed of 300 RPM 1
The Double Density Double Sided disks on each side are organized with 40 tracks 1

For reading the disks DVD uses red laser 1


blue ray disk can store data upto _________ per layer. 25 GB 1
he HDD is also called as hard disk,hard drive,fixed disk 1
n floppy disk, the small hole that enables the drive to identify the beginning index hole 1
of a track and its first sector is
Inside its jacket, the floppy media is rotated at the speed of 300 RPM 1
DVDRW is for rewriteable DVD 1
For reading the disks, the blue ray disk uses high frequency blue laser 1
True or False Virtual memory space is always smaller than physical memory space 1

In a base-and-bounds model, the base tells where a segment (module) is 1


loaded in memory
Segmentation avoids external memory fragmentation 1
The optimal (Min) page placement algorithm is not used in practice because 1
it relies on accurately predicting future page references

An inverted page table keeps track of one entry per virtual page per process 1

If a deadlock is detected, the OS should always kill the process in the 1


deadlock
An error is reported when the compiler cannot resolve the address when 1
compiling a code module
In a non distributed systems, deadlock is rare enough that most systems 1
just ignore it
The second chance cyclic algorithm selects the oldest page as its victim 1
1
In the working set model, exceeding the balance set leads to thrashing

Run time binding is used for Microsoft Dynamic link libraries 1


1
If an OS designer does not like page size he/she just picks a new one

Interrupts can be shut off by user processes. 1


1
Processes in a microkernal architecture operating system usually
communicate using shared memory protected by mutexes
By default, threads share global memory 1
In the remote procedure call (RPC) paradiagm, data is not translated if the 1
client and the server are running on the same architecture and using the
same operation

Usually, there's one I/O queue for the system 1


The medium term scheduler only runs in times of high resource contention, 1
as when physical memory is full
1
In multicore systems, symmetric multiprocessing uses one core to handle
the scheduling for all the other cores.
Segmented memory model is good for separating code from data. 1

Using a larger page size makes page tables larger 1


One of the four conditions necessary for deadlock is that a process acquire 1
a resource and hold onto it while it acquires other resources

If a deadlock is detected, the OS should always kill the process holding the 1
most resources in the deadlock.
The linker can resolves all address not resolved by the compiler 1
Since an inverted page table must be searched on each page references, it 1
is useful to organize it as a has table
1
In non-distributed systems. deadlock is rare enough that most systems just
ignore it.
an error is reported when a compiler cannot resolve an address when 1
compiling a code module
A paging scheme does not suffer from external fragmentation 1
In a base-and-bounds model, the base tells where a segment (module) is 1
loaded in memory
Virtual memory space is always bigger than physical memory space 1

A system that uses segmentation and paging just means that the pages are 1
grouped into logical statements
In Java RMI, data must be translated between the caller and the callee. 1

The medium term scheduler's job is to suspend jobs if the system is under 1
heavy load.
When a new process is forked in UNIX, it retains access ti the parent's open 1
files
In dual mode procesessing, a user process does I/O by accessing the I/O 1
device firectly
Every I/o device typically has a waiting queue associated with it 1
Kernal level threads, when blocking doing a system call, block all the 1
threads associated with that process
The kernel uses the Process Control Block to keep track of bookkeeping 1
information about processes, such as the program counter.

In multicore systems, systematic multiprocessing uses one core to handle 1


the scheduling for all the other cores
Application software are programs that allow computer users to accomplish 1
specific tasks such as accessing the Web.
Application software includes operating systems, utility programs, and 1
language translators.
An operating system is responsible for keeping track of where the data and 1
program files are stored on secondary storage devices.

In a multiprogramming and multitasking environment all programs use the 1


CPU at the same time.
Virtual memory is a technique used to divide primary memory into equally 1
sized pieces called leaflets.

Systems administrators can limit a user's access to certain files and 1


directories based on permissions that have been set in the OS.

Multiple choice Dual mode of operating system has 1 Mode 2 Modes 3 Modes 4 Modes 2 1
Multi-processor system gives a Small system Tightly coupled Loosely coupled Both 1 and 2 2 1
system system
Logical extension of multiprogramming operating system is Time sharing Multi-tasking Single Programming Both 1 and 2 4 1

Multiprocessor system have advantage of Increased Through Extensive Operating System Both 1 and 2 1 1
put hardware
Scheduling of threads are done by Input Output Operating System Memory 3 1

Multiprogramming of computer system increases Memory Storage CPU utilization Cost 3 1


Interrupt table of pointers having addresses for each interrupt is located at High memory Low memory Mid memory Both 1 and 2 1 1

Example of open source operating system is UNIX LINUX WINDOWS Both 1 and 2 4 1
Main memory of computer system is also called Non volatile Volatile Reserved Large 2 1
When many users accesses mainframes, this approach is called as Resource allocation Word Processors Dedicated resources Interface 1 1

Accessing same data from storage of computer system is provided by Serial clusters Parallel clusters Beowulf clusters Both 1 and 2 2 1

To start an I/O operation device driver loads appropriate register into? Memory Secondary Device Controller Arrays 3 1
Storage
Symmetric multiprocessing architecture of computer system uses shared Bus Memory Processors Both 1 and 2 4 1

In asymmetric clustering other machines perform operations while one Hot standby mode Standby mode Reset mode Undefined Mode 1 1
machine is in
Ability to continuously providing service proportional to level of surviving Graceful Degradation Upgradation Graceful 4 1
hardware upgradation degradation
Secondary memory of computer system is also called Non volatile Volatile Reserved Small 1 1
Environment in which programs of computer system are executed is: Operating system Nodes Clustered system Both 1 and 2 1 1

One word memory storage is collection of 2 Bytes 4 Bytes 7 Bytes 8 Bytes 2 1


Each user of computer system that uses computer services has at least 1 Program 2 Programs 3 Programs 4 Programs 1 1

Clusters of computer system can be used more efficiently using Serialization Parallelization LAN WAN 2 1
A properly designed operating system must ensure that an incorrect (or Incorrectly Correctly both 1 and 2 None of these 1 1
malicious) program cannot cause other programs to execute

Table of pointers for interrupt to be executed contains the Interrupts Programs Addresses Compilers 3 1
User view of system depends upon the CPU Software Hardware Interface 4 1
Memories are normally classified according to their Speed Cost Indexes Both 1 and 2 4 1
SCSI system stands for Small common- Small common- Small computer small computer- 3 1
system interface system interaction system interface system interaction

One megabyte memory storage in form of bytes is equal to 1024 bytes 10242 bytes 10243 bytes 10244 bytes 2 1
Multi-processing systems of computer system are of 2 types 3 types 4 types 5 types 1 1
Clustered computer systems are normally linked via LAN WAN PAN TAN 1 1
The address of a page table in memory is pointed by Stack pointer Page table base Page registered Program counter 2 1
register
Program always runs on _____ address Logical address Absolute Address Physical address Relative address 1 1

One Word Question Dual mode of operating system has 2 modes 1

Scheduling of threads are done by operating system 1


Multiprogramming of computer system increases CPU utilization 1
Main memory of computer system is also called volatile 1
To start an I/O operation device driver loads appropriate register into? Device Controller 1

Symmetric multiprocessing architecture of computer system uses shared 1

Secondary memory of computer system is also called non volatile 1


Environment in which programs of computer system are executed is: operating system 1

One word memory storage is collection of 4 bytes 1


Each user of computer system that uses computer services has at least 1program 1

Table of pointers for interrupt to be executed contains the interface 1


Memories are normally classified according to their speed and cost 1
SCSI system is abbreviation of the small computer-system interface 1
One megabyte memory storage in form of bytes is equal to 1024² bytes 1
Multi-processing systems of computer system are of 2 types 1
Clustered computer systems are normally linked via LAN 1
Multi-processor systems of computer system has advantage of reliability 1
Privileged mode of operating system mode is a kernel mode 1
Multiprocessor system have advantage of Increased Throughput 1
Scheduling of threads are done by operating system 1
In asymmetric clustering other machines perform operations while one hot standby mode 1
machine is in
Which system software brings about computer hardware and software An operating system (OS) 1
properties and delivers common facilities for computer programs?

what is the core of every operating system? Kernel 1


Which systems are used when rigid time requirements have been placed on Real-time systems 1
the operation of a processor?
which memory management technique for letting processes execute outside Virtual memory 1
of memory?
Describe the objective of multiprogramming? process running at all times 1
What is the system where the CPU executes multiple jobs by switching Time sharing system 1
among them?
What is SMP? Symmetric MultiProcessing 1
What is the GUI? Graphical User Interface 1
Which process within an operating system that allows the user to run multitasking 1
several applications at the same time?
What provides a connection between two applications. A socket 1
where does the operating system kernel is located? Root partition 1
Which is a computer program that operates or controls a particular type of a device driver 1
device that is attached to a computer?
What is a program that converts the assembly language into machine code? An assembler 1

What is a process in which data is temporarily gathered to be used and Spooling 1


executed by a device, program or the system?
What are the different operating systems? Microsoft Windows, macOS, and Linux 1
What are the basic functions of an operating system? interface between computer user and computer hardware. 1

What is a situation where a set of processes are blocked? Deadlock 1


A series of actions or steps taken in order to achieve a particular end is process 1
known as
What is a phenomenon in a virtual memory scheme when the processor Thrashing . 1
spends most of its time swapping pages, rather than executing instructions?

What is Memory wasted? Fragmentation 1


What are the necessary conditions for a deadlock? Mutual Exclusion Circular Wait: 1
What is another name for CPU memory? Cache memory 1
Which address is generated by CPU? Logical address 1
Which systems are used when rigid time requirements have been placed on Real-time Systems 1
the operation of a processor?
Which algorithm is primarily aimed for time-sharing systems? RR (round-robin) scheduling 1
What is a program in execution? Process 1
What refers to the same location in a file system relative to the root Absolute path 1
directory?
What is DRAM? Dynamic Random Access Memory 1
What is a group of instructions to carry out a specified task? Program 1
Which specifies the address which is generated by the CPU Logical address 1
What commands are the built-in part of the operating system? Internal commands 1
What is RAID stands for? Redundant Array of Independent Disks 1
What is a specific situation or condition where two processes are waiting for Deadlock 1
each other to complete?
Which are the necessary conditions to achieve a deadlock? Mutual Exclusion/Hold and Wait/No preemption/ Circular 1
Wait
What is a protected variable or abstract data type that is used to lock the semaphore 1
resource being used?
What is composed of a thread ID, program counter, register set, and the A thread 1
stack?
utilization of multiprocessing architecture is a benefit of which Multi-Threaded programming 1
programming?
What does the Direct Access Method allow arbitrary blocks to do? Read or written 1

where the operating system kernel is located? Root partition 1


What is gives control of the CPU to the process selected by the short-term Dispatcher 1
scheduler?
When the OS at the explicit request of another process creates a process, Process spawning 1
this action is called
What is FtDisk? fault tolerance disk Driver 1
The special thread a dispatcher will execute when no ready thread is found Idle Thread 1
is known as
What is a software interrupt, usually the result of an error condition? A trap 1

What is a secret undocumented entry point into a program used to grant Trapdoor 1
access without normal methods of access authentication?

Comprehension 0
File System and Fill in the Blanks ________________________ is a program that manages a computer’s Operating system 1
types of OS hardware.

________________________ increases CPU utilization by organizing jobs Multiprogramming 1


(code and data) so that the CPU always have one programm to execute.

________________________is a logical extension of multiprogramming. Time sharing (or multitasking) 1

__________________provides a GUI for viewing and managing the file Windows Explorer 1
system.
____________contains icons that access programs, files, applications, and Desktop 1
file systems.
______________is only available in Vista. Sidebar 1
in ____________the Notification Area is referred to as the System Tray. Windows XP, 1

______________is basically Windows Explorer with a different name. Computer (My Computer in XP) 1

___________________commands are executed through instructions written command face interfaces, 1


into a command line.
________________is the ability to run multiple parts of an application Multi-threading 1
simultaneously.
________________is the ability to run multiple applications simultaneously. Multi-tasking 1

________________is the ability to use multiple processing devices. Multi-processing 1

The processes that are residing in main memory and are ready and waiting ready queue 1
to execute are kept on a list called _____________.
The interval from the time of submission of a process to the time of turnaround time 1
completion is termed as ____________.
CPU is allocated to the process with highest priority in_________________. priority scheduling algorithm 1

In priority scheduling algorithm, when a process arrives at the ready queue, currently running process 1
its priority is compared with the priority of ____________.

Process are classified into different groups in ____________. multilevel queue scheduling algorithm 1
The initial program that is run when the computer is powered up is called bootstrap program 1
__________.
To access the services of operating system, the interface is provided by the System calls 1
___________.
By operating system, the resource management can be done via time and space division multiplexing 1
__________.
If a process fails, most operating system write the error information to a log file 1
___________.
The OS X has ____________ kernel. hybrid 1
The systems which allow only one process execution at a time, are called uniprocessing systems 1
__________.
A process stack does not contain __________. PID of child process 1
The address of the next instruction to be executed by the current process is Program counter 1
provided by the __________.
The number of processes completed per unit time is known as __________. Throughput 1

The entry of all the PCBs of the current processes is in __________. Process Table 1

A semaphore is a shared integer variable __________. that cannot drop below zero 1
Binary Semaphores are known as ______________. mutex locks 1
Process synchronization can be done on __________. both hardware and software level 1
A parent process calling __________ system call will be suspended until wait 1
children processes terminate.
Cascading termination refers to termination of all child processes before the Normally 1
parent terminates ___________.
In UNIX, each process is identified by its __________. Process Identifier 1
The child process completes execution, but the parent keeps executing, Zombie 1
then the child process is known as __________.
_________is the deadlock avoidance algorithm. banker’s algorithm 1
A problem encountered in multitasking when a process is perpetually denied starvation 1
necessary resources is called ____________.

The instruction being executed, must be in ____________. physical memory 1


IME duration required for scheduling dispatcher to stop one process and dispatch latency 1
start another is known as ____________.
The delay that occur during the playback of a stream is called jitter 1
___________.
Virtual memory is normally implemented by ________. demand paging 1
File type can be represented by ____________. File extension 1
Mapping of file is managed by ____________. file metadata 1
Mapping of network file system protocol to local file system is done by network file system 1
____________.
UNIX is written in ________________ language. C 1
________ part of the UNIX OS interacts with the hardware. Kernel 1
Linux is an ______________operating system. Open source 1
Scheduling of threads are done by _______________. operating system 1
The operating system is the most common type of ______________ System 1
Software.

Special software to create a job queue is called a_______________. Spooler 1

A system program that combines the separately compiled modules of a linking loader 1
program into a form suitable for execution ______________.
An Operating System is a program that manages the_________. Computer Hardware 1
A________ is the basic unit of computer storage. bit 1
General-purpose computers run most of their programs from rewriteable Random Access Memory 1
memory, called main memory also called _________.

________increases CPU utilization by organizing jobs. Multiprocessing 1

___________, is a technique that allows the execution of a process that is Virtual Memory 1
not completely in Memory.
The file system resides on a collection of _________. Disks 1
A ________is a software generated interupt caused either by an error or Trap 1
specific request from user.
_________ storage loses its contents when the power to the device is volatile 1
removed.

Multiprocessor systems are also known as ___________. parallel systems 1

SMP stands for ____________. symmetric multiprocessing 1


___________divides a program into separate components that run in parallelization 1
parallel on individual computers in the cluster.
A _________ can be set to interrupt the computer after a specified period. timer 1

_____________ is any mechanism for controlling the access of processes Protection 1


or users to the resources defined by a computer system.

SID stands for _____________. Security Identity 1


An ________ is a simple data structure in which each element can be Array 1
accessed directly.
In a _______, a given item can refer either to its predecessor or to its doubly linked list 1
successor.
In a_________, the last element in the list refers to the first element, rather circularly linked list 1
than to null.
A _________is a sequentially ordered data structure that uses the first in, Queue 1
first out (FIFO) principle.
A _______ is a data structure that can be used to represent data Tree 1
hierarchically.
_________ computing refers to computing on handheld smartphones and Mobile 1
tablet computers.
A _________is a communication path between two or more systems. Network 1

PAN stands for___________. Personal Area Network 1


The __________ provides a file-system interface where clients can file-server system 1
create, update, read, and delete files.

__________is used when the source CPU type is different from the target Emulation 1
CPU type.

__________is a type of computing that delivers computing, storage,and Cloud computing 1


even applications as a service across a network.

True or False Magnetic Disk is a secondary Storage Device. 1


Clustering can be structured symmetrically only. 1
Hybrid cloud—a cloud run by a company for that company’s own use 1

GUI stands for graphical used interface 1


System calls provide an interface to the services made available by an 1
operating system.

Magnetic disks provide the bulk of secondary storage for modern computer 1
systems.

The time necessary for the desired sector to rotate to the disk head, called 1
the rational latency

SSTF satnds forshortest-seek-time-first algorithm. 1


The basic unit of information in an accounting information system database 1
is the debit.
A foreign key is a data field in the records of one file that references a 1
primary key in the records of another file.
The E-R model refers to the "entity-relationship" model. 1
A flat file is a database with no records. 1
Relational databases store small amounts of data in spreadsheets. 1

A Social Security number is a good example of a useful primary record key. 1

An example of a database cardinality is "one-to-few." 1


The letter "M" in the acronym DBMS stands for "maintenance." 1
A virus is a fragment of code embedded in a legitimate program. 1
A virus is a process that uses the spawn mechanism to duplicate itself. 1

In a symmetric encryption algorithm, different keys are used to encrypt and 1


to
decrypt.
A stream cipher is designed to encrypt and decrypt a stream of bytes 1

A keystream is an infinite set of bits that can be used to encrypt a plaintext 1


stream by simply XORing it with the plaintext
Constraining the set of potential senders of a message is called 1
authentication.
A file virus infects the boot sector of the system, executing every 1
time the system is booted and before the operating system is loaded.

A source code virus looks for source code and modifies it to 1


include the virus and to help spread the virus.
A key is a universal bit pattern that can be associated with a capability. 1

An operating system acts as an intermediary between the user of a 1


computer and the computer hardware
An operating system is a program that manages a computer’s hardware 1

Data is set of multiple choice SAN storage questions and answers focuses 1
on Filesystems.
Faster file system recovery Journaling is preferred for a 1
Password salting improves security as long as the underlying hash function 1
is invertible.
Cross-site scripting attacks require the victim’s browser to have cookies 1
enabled
The protocol shown above authenticates both the client to the server and 1
the server to
the client
The memcpy call should have been replaced by a printf call. 1
The foo function is still vulnerable to a buffer overrun attack 1
Adding bounds-checking on use of buff would have been a better change 1
than moving the buffer to the heap.
File locking is used to ensure consistency of file content. 1
It is designed to handle frequent hardware failures during operation. 1

File naming/renaming is atomic 1


From the point of view of clients, it provides single-copy consistency over its 1
replicas
Time-limited leases are used to reduce the need for network traffic to the 1
master.
To detect possible corruption of data, GFS compares contents of a chunk on 1
multiple chunk-servers.
GFS uses Paxos to allow the group of chunk-servers to elect a new master 1
in case of master failure.
Application software are programs that allow computer users to accomplish 1
specific tasks such as accessing the Web.
Application software includes operating systems, utility programs, and 1
language translators.
An operating system is responsible for keeping track of where the data and 1
program files are stored on secondary storage devices.

In a multiprogramming and multitasking environment all programs use the 1


CPU at the same time.
1
Virtual memory is a technique used to divide primary memory into equally 1
sized pieces called leaflets.
Systems administrators can limit a user's access to certain files and 1
directories based on permissions that have been set in the OS.

DOS was a character-based interface operating system that could handle 1


multiprogramming and multitasking tasks.
The latest addition to the Microsoft OS family is Windows 2000. 1
UNIX is a multiprogramming and multitasking operating system. 1
The purpose of a computer language translator is to translate source code 1
into zeros and ones.
PalmOS and Windows CE are both operating systems that run on handheld 1
computers and personal digital assistants.
Companies who develop shareware applications expect users who use their 1
software to pay a small fee.

Assembly language is a machine = independent language, and it is 1


relatively easy to program.
An interpreter is a special program that translates 3GL into machine code so 1
that different types of processors can run the program.
In OOP, data and the processes performed on the data are combined into 1
objects.
"If you do not save your workbook, you can recover any lost data the next 1
time you start Excel."
"After you click the Save toolbar button, the Save dialog box will appear if 1
the file already exists."
"Excel will not regard the entry as text, if any numbers are included with text 1
in the entry."
"Instead of typing in cell references, you can use the mouse click for Excel 1
to enter the cell names into formulas for you."
You can only select cells that are adjacent to each other. 1
Dragging the mouse or holding the down the Shift key while clicking with the 1
mouse will only select cells
that are adjacent to each other.
"If you want to move large amounts of data within a worksheet or from one 1
worksheet to another, it's better to use the cut and paste method."

You can paste the copied data to more than one selected cell or range. 1

"You can only insert one column, row or cell at a time." 1


Rows and Columns can be inserted by selecting the Cells command from 1
the Insert menu.
To delete a column or row you can select a cell within it's range and then 1
choose the Delete command from the Edit menu."
"To Hide or Unhide columns or rows, you must select the entire Column or 1
Row range by clicking on the Column or Row Headers."

"You can use the formatting toolbar buttons to apply any type of formatting 1
to the selected cell entry."
Excel does not format the entry in the formatting bar. 1
"You must first precisely select the range of cells to be named, as you will 1
not be able to redefine or modify the range before adding a name."

"Range names can be removed, as well as added, by selecting the Define 1


command from the Insert/Name menu."
If a formula consisting of relative references is copied from one cell to 1
another it will still be the same.
Multiple choice ______ is a unique tag, usually a number identifies the file within the file File identifier File name File type None of these 1 1
system.
To create a file ____________ allocate the space make an entry for allocate the space in None of these 3 1
in file system new file in directory file system and
make an entry for
new file in directory

File type can be represented by ____________ File name File extension File identifier None of these 2 1
Mapping of file is managed by ____________ File metadata Page table base Virtual Memory File system 1 1
register
When will file system fragmentation occur? Unused space or Used space is not Unused spcae is Multiple file are non- 1 1
single file are not contiguous non-contiguous contiguous
contiguous

The systems which allow only one process execution at a time, are called Uniprogramming Uniprocessing Unitasking systems None of these 2 1
___ systems systems
A process can be terminated due to __________ Normal exit fatal error Killed by another All of above 4 1
process

What is interprocess communication? communication communication communication None of these 2 1


within the process between two between two threads
process of same process

A set of processes is deadlock if __________ each process is each process is all processes are None of these 1 1
blocked and will terminated trying to kill each
remain so forever other

A process stack does not contain __________ Function Local variables Return addresses PID of child process 4 1
parameters

Which system call returns the process identifier of a terminated child? Wait Exit Fork Get 1 1

The code segment that misuses its environment is called a _____________Internal thief Trojan Horse Code Stacker None of these 2 1

Which of the following is not the state of a process? New Old Waiting Running 2 1
What is a Process Control Block? Process type Data Structure A secondary storage A Block in memory 2 1
variable section

What is the degree of multiprogramming? the number of the number of the number of the number of 4 1
processes executed processes in the processes in the I/O processes in
per unit time ready queue queue memory

The initial program that is run when the computer is powered up is called boot program bootloader initializer bootstrap program 4 1
____
How does the software trigger an interrupt? Sending signals to Executing a special Executing a special Executing a special 2 1
CPU through bus operation called program called program called
system call system program interrupt trigger
program

The initial program that is run when the computer is powered up is called boot program bootloader initializer bootstrap program 4 1
____
What is an ISR? Information Service Interrupt Service Interrupt Service Information Service 3 1
Request Request Routine Routine

CPU scheduling is the basis of ___________ multiprocessor multiprogramming larger memory sized None of these 2 1
systems operating systems systems

With multiprogramming ______ is used productively. Time Space Money All of above 1 1
What are the two steps of a process execution? I/O & OS Burst CPU & I/O Burst Memory & I/O Burst OS & Memory Burst 2 1

The switching of the CPU from one process or thread to another is called process switch task switch context switch All of above 4 1
____
Scheduling is done so as to ____________ increase CPU decrease CPU keep the CPU more None of these 1 1
utilization utilization idle

What is Turn around time? the total waiting the total time spent the total time spent the total time from 4 1
time for a process in the ready queue in the running queue the completion till
to finish execution the submission of a
process

Linux uses a time-sharing algorithm ___________ to pair preemptive for tasks where both 1 and 2 None of these 1 1
scheduling between absolute priorities
multiple processes are more important
than fairness

The first linux kernel which supports the SMP hardware? linux 0.1 linux 1.0 linux 1.2 linux 2.0 4 1
Which one of the following linux file system does not support journaling Ext2 Ext3 Ext3 None of these 1 1
feature?
Which binary format is supported by linux? a.out elf both 1 and 2 None of these 3 1
Which one of the following bootloader is not used by linux? GRUB LILO NRTLDR None of these 3 1
The first process launched by the linux kernel is ___________ init process zombie process batch process boot process 1 1

What is Linux? single user, single single user, multi user, single multi user, 4 1
tasking multitasking tasking multitasking

In real time operating system ____________ all processes have a task must be process scheduling kernel is not 2 1
the same priority serviced by its can be done only required
deadline period once

The problem of priority inversion can be solved by ____________ priority inheritance priority inversion both 1 and 2 None of these 1 1
protocol protocol
A systems program such as fsck in ______ is a consistency checker. UNIX Windows Macintosh Solaris 1 1

Once the changes are written to the log, they are considered to be Committed Aborted Completed None of these 1 1
________
When an entire committed transaction is completed, ___________ it is stored in the it is removed from it is redone None of these 2 1
memory the log file
What is a circular buffer? writes to the end of overwrites older both 1 and 2 None of these 1 1
its space and then values as it goes
continues at the
beginning

In distributed system, each processor has its own ___________ Local memory Clock both 1 and 2 None of these 1 1
3. Network operating system runs on ___________ Server Every system in the both 1 and 2 None of these 1 1
network
Which routing technique is used in a distributed system? Fixed routing Virtual routing Dynamic routing All of above 4 1
Internet provides _______ for remote login. Telnet HTTP FTP RPC 1 1
Which buffer holds the output for a device? Spool Output Status Magic 1 1
A process is moved to wait queue when I/O request is made with non-blocking I/O blocking I/O asynchronous I/O synchronous I/O 2 1
__________
1. Physical memory is broken into fixed-sized blocks called ________ Frames Pages Backing Store None of these 1 1

Logical memory is broken into blocks of the same size called _________ Frames Pages Backing Store None of these 1 1

The __________ is used as an index into the page table. Frame bit Page number Page offset Frame offset 2 1
With paging there is no ________ fragmentation. Internal External either type of None of these 2 1
Smaller page tables are implemented as a set of _______ Queues Stack Counters Registers 4 1
The page table registers should be built with _______ very low speed very high speed a large memory None of these 2 1
logic logic space
One Word Question ______ is a unique tag, usually a number identifies the file within the file File Identifier 1
system.
To create a file allocate the space in file system & make an entry for new file directory 1
in _____________
File type can be represented by File extension 1
Which file is a sequence of bytes organized into blocks understandable by Object File 1
the systems Linker
What is the attached portion into a directory structure File system 1
Mapping of file is managed by ____________ File metadata 1
Mapping of network file system protocol to local file system is done by network file system 1
____________
Which one of the following explains the sequential file access method? read bytes one at a time, in order 1

Which deadlock condition where resources cannot be taken away while they No-preemptive condition 1
are being used by processes
Belady's Anomaly is also called as FIFO Anomaly 1
___________is the process of using the output of one program as an input plumbing/piping 1
to another
NOS stands for Network Operating System 1
__________commands are built-in commands that are already part of the Internal commands 1
operating system
what command will you type when you want to list down the files in a dir /w /p 1
directory, and at the same time pause after every screen output
In Linux, which is a super secure O.S system Ubuntu 1
_____________ and viruses are coded to take advantage of the weakness Malware 1
in Windows
In Ubuntu, Unity is the default _____________ graphical shel 1
Libaio is Linux Kernel _____________ Asynchronous I/O (A/O) 1
______________ is a command in Bash shell language Export 1
GUI stands for Graphical User Interface 1
_____________ is one of the different types of CPU registers in a typical Accumulators 1
operating system design.
__________________also shows which files are opened, and other I/O I/O status information 1
device state.
____________ also contains other potentially important system files that are Root partition 1
mounted during boot time
__________is one of the different attritubes for designing the file structure identifier 1
for an operating system
____________ is advantageous when accessing large amounts of Direct access 1
information.
Each endpoint of a communication is a ___________ socket 1
___________allows more operations to be run that can fit into memory at Swapping 1
one time
With _____________, a routine is not loaded until it is called dynamic loading 1
______________ refers to the address that is seen by the memory unit physical address 1

Logical address refers to the address that is generated by the __________ CPU 1

FCFS stands for First-come, __________ first-served 1


In a Time-sharing system, the CPU executes multiple jobs by switching multitasking 1
among them, also known as __________
____________ happens when it is spending more time paging instead of Thrashing 1
executing
____________ is one of the advantages of multithreaded programming: Economical 1

There are two types of semaphore Binary semaphores and Counting semaphores 1
_______________
What is a software program that facilitates computer hardware to The operating system 1
communicate and operate with the computer software?
Whose purpose is that a computer system performs well by managing its operating system 1
computational activities?
What is used to make a connection between two applications Socket 1
Which system is used in the case when rigid-time requirements have been Real-time system 1
placed on the operation of a processor.
What are the core and most important part of a computer operating system Kernel 1
which provides basic services for all parts of the OS

Executing program is also known as Process 1


What is used to solve the external fragmentation problem in the operating Paging 1
system?
Which technique ensures that the data you need is available as quickly as Paging 1
possible?
Who specifies that if an area of memory is not currently being used, it is Demand paging 1
swapped to disk to make room for an application's need?
Which system provides the advantage of increasing processors and Multiprocessing system 1
considerable increment in throughput?
Which memory is a very useful memory management technique which Virtual memory 1
enables processes to execute outside of memory?
Which technique is especially used when an executing program cannot fit in Virtual memory 1
the physical memory?
Which phenomenon in the virtual memory scheme when the processor Thrashing 1
spends most of its time swapping pages, rather than executing instructions?

Which deadlock condition specifies that the resources involved are non- Mutual Exclusion Condition 1
sharable.
Which deadlock condition specifies that there must be a process that is Hold and Wait condition 1
holding a resource already allocated to it while waiting for an additional
resource that is currently being held by other processes?

Which deadlock conditions where resources cannot be taken away while No-preemptive condition 1
they are being used by processes?
Which deadlock condition specifies that the processes in the system form a Circular wait condition 1
circular list or a chain?
What is a basic unit of CPU utilization? Thread 1
What consists of a thread ID, program counter, register set, and a stack? Thread 1

What FCFS stands for First Come, First Served 1


Which type of algorithm is FCFS Scheduling algorithm 1
Which queue is manages the implementation of FCFS FIFO queue 1
What is SMP? symmetric multiprocessing 1
What is the most common type of multiple processor system symmetric multiprocessing 1
Which system where each processor runs an identical copy of the operating symmetric multiprocessing 1
system, and these copies communicate with one another when required?

What is a specific situation or condition where two processes are waiting for Deadlock 1
each other to complete so that they can start?
Name any one condition of deadlock Mutual Exclusion Condition 1
What is used to avoid deadlock? Banker's algorithm 1
Which algorithm is a deadlock-avoidance method? Banker's algorithm 1
which algorithm is named after the banking system Banker's algorithm 1
Which address is generated by CPU? Logical address 1
What is a phenomenon of memory wastage Fragmentation 1
Which phenomenon reduces the capacity and performance because space Fragmentation 1
is used inefficiently?
Which type of fragmentation occurs when we deal with the systems that Internal Fragmentation 1
have fixed-size allocation units?
Which type of fragmentation occurs when we deal with systems that have External Fragmentation 1
variable-size allocation units?
What is a process in which data is temporarily gathered to be used and spooling 1
executed by a device, program or the system?
Which process is associated with printing? spooling 1
Which commands are the built-in part of the operating system? Internal commands 1
Which commands are the separate file programs that are stored in a External commands 1
separate folder or directory?
What is a protected variable or abstract data type that is used to lock the Semaphore 1
resource being used?
Whose value indicates the status of a common resource? Semaphore 1
Name any one type of semaphore? binary Semaphores 1
Which semaphore takes only 0 and 1 as value? binary Semaphores 1
Which semaphore is used to implement mutual exclusion and synchronize binary Semaphores 1
concurrent processes?
What is termed as when increasing the number of frames allocated to a Belady's Anomaly 1
process virtual memory, the process execution is faster because fewer page
faults occur?
Belady's Anomaly is also called as? FIFO Anomaly 1
What does starvation in the operating system means? Resource management system 1
Which technique is used to avoid the starvation in resource scheduling aging technique 1
system?
Resource sharing within the process is an advantage of which Multithreaded -programming 1
programming?
What makes a process to be larger than the amount of memory allocated to Overlays 1
it?
What ensures that only important instructions and data at any given time are Overlays 1
kept in memory?
What specifies an instance of high paging activity? Thrashing 1
Whose main objective is to have a process running at all times? Multiprogramming 1
Time-Sharing system is also known as? multitasking 1
Which system can be classified as either computer-server systems or file Server system 1
server systems?

a machine is in a state known as hot standby mode where it does nothing Asymmetric clustering 1
but to monitor the active server known as?
What is the RR scheduling algorithm? RR (round-robin) scheduling algorithm 1
Which algorithm is primarily aimed for time-sharing systems? RR (round-robin) scheduling algorithm 1
In the RR-scheduling algorithm which queue is set up in such a way that the Circular queue 1
CPU scheduler goes around that queue?
Which method is especially useful when large amounts of code are needed Dynamic loading aid 1
in order to handle infrequently occurring cases such as error routines?

What allows more operations to be run that can fit into memory at one time? Swapping 1

What is based on a disk model of a file, such that it is viewed as a Direct Access method 1
numbered sequence of blocks or records?
where the operating system kernel is located? Root partition 1
What provide a standard means of representing I/O devices that may be Device drivers 1
manufactured by different companies
which type of registers are index registers and stack pointers in typical CPU registers 1
operating system design?
What provides information about which I/O devices are to be allocated for a I/O status information 1
particular process?
What allows the user to type in commands that can immediately provide Command line interface 1
results?
What is the processing of utilizing a region of fast memory for limited data Caching 1
and processes?
What acts as a translator for the low-level language? Assembler 1
Which memory is usually much efficient because of its high access speed? Cache memory 1

Which codes written using mnemonic commands are translated by the Assembly codes 1
Assembler into machine language?
What is part of a hardware mechanism that sends a notification to the CPU Interrrupts 1
when it wants to gain access to a particular resource?
What does GUI stand for Graphical User Interface 1
What provides users with an interface wherein actions can be performed by Graphical User Interface 1
interacting with icons and graphical symbols?
What allows an operating system to switch between software programs? Preemptive multitasking 1

Comprehension 0
Basics of Software Software Fill in the Blanks Software is a set of ————————— that when executed provide Instructions or Computer programs. 1
Engineering Engineering desired function and performance.
Software is a process and ——————————. Product 1
Software engineering is a —————— Discipline 1
The definition phase of software engineering includes tasks such as system Requirements analysis 1
engineering,software project planning and ————
——————— results in modification to the software to accommodate Adaptive maintenance 1
changes to its external environment.
.In Water fall model, the phases involved in the software development are Linear Order 1
organized in——
The development approach followed in prototype model is —————— Quick And Dirty 1

The ——————————— method is also known as the iterative Incremental. 1


enhancement model.
The software requirements deal with the ————————of the proposed requirements 1
system.
The document produced at the end of the requirements phase of software Software Requirements Specification (SRS) 1
development cycle is known as ————————
The process of determining requirements for a system has two phases requirements definition and specification 1
namely, requirements elicitation and analysis and ———————

Structured analysis mainly depends on data flow diagrams and —————- data dictionary 1
-
An external entity is represented using ————————— in a DFD rectangle 1

.A———————— SRS is one in which the requirements are tightly, strong 1


unambiguously, and precisely defined in such a way that leaves no other
interpretation or meaning to any individual requirement.

——————— are often used in review meetings to focus on the reviews Checklists 1
and to ensure that no major source of errors is over looked by the
reviewers.
In object-oriented design, the modules in the design represent ——— data abstraction. 1

The three important levels of abstraction are procedural abstraction, data control abstraction 1
abstraction and ---------
The functional Independence is measured using two qualitative criteria Cohesion 1
namely, ——————— and coupling.
The weakest coupling that is most desirable is —————— Data Coupling 1
A data flow diagram is mapped into program structure using transform Transaction mapping 1
mapping and/or ———————

——————— type of mapping is applied to an information flow that transform mapping 1


exhibits distinct boundaries between incoming and outgoing data.
The constructs fundamental to structured programming are sequence, condition 1
————————and repetition.
PDL stands for —————— program design language. 1
A program component involves three important aspects: control structures, Algorithms 1
—————--and data structures.
The two kinds of program documentation are internal and ———— External 1

Comments in a program are —————————— that are meant for Textual Statement 1
program readers and are not executed.
——— helps to view the source code Browsing tools 1
—————tools helps in code creation, debugging and testing. executable code 1
————————— is also known as functional testing. Black-Box Testing 1
————— is a software measure, that provides a quantitative measure cyclomatic complexity 1
of logical complexity of a program.
Equivalence class of objects are present if the set of objects have transitive 1
relationships like —————, reflexive and symmetric.
The two categories of Integrated testing are incremental non-incremental 1
and_____________.
A___________ outlines the classes of tests to be conducted. test plan 1
_________ is mainly used for testing real-time and embedded systems. performance testing 1

The important metrics used during testing is ________. reliability 1


Estimation makes use of an important approach___________ decomposition 1
_______is a project control technique that can be used for several Gantt chart 1
purposeslike scheduling, budgeting and resource planning.

COCOMO stands for ——————— Constructive Cost MOde 1


The equation for the Basic COCOMO model to estimate effort is_____ E = Ab * (KLOC) Bb ( person-months) 1

PERT stands for _______________ Program Evaluation and Review Technique 1


________risks threaten the quality and timeliness of the software to be built. technical risks. 1

________is an activity that consists of auditing, reporting functions Quality assurance 1


of management.
______ are a “filter” to software engineering processes. Software reviews 1
FTR includes _________inspections, round-robin reviews walkthroughs 1
The quality standard used in software engineering process is __________ ISO 9001 1

CMM stands for _______________ Capability Maturity Model 1


McCall’s quality factors focus on————————————, product Product operations 1
transition and product revision.
————————— defines the extent to which access to software or data Integrity 1
by unauthorized persons can be controlled.
A baseline is a milestone in the software development process that is Software Configuration Items 1
marked by the deliveryof one or more__________
Software Configuration Items can be approved through______ Formal Technical Reviews 1
SCM is an important element of ____________ Software Quality Assurance 1
__________will help in describing inter dependencies among configuration Module interconnection language 1
objects and enables any version of a system to be constructed
automatically.
The most commonly used version representations are evolution graph and Object-pool representation 1
———————
ECO stands for_________ Engineering Change Order 1
_________ensures that parallel changes made by two different people, Synchronization control 1
don’toverwrite one another.
____contains the status information regarding changes that take place inthe Status reporting 1
change control process.
Software is defined as ____ instructions, Data Sturucture and Documents 1
Which coding element is generally omitted at the end of line? Whitespace 1
Efficiency in a software product does not include ________ licensing 1
__________ is a a fourth generation language(4GL). Unix Shell 1
True or False Software is a product and can be manufactured using the same 1
technologies used for other engineering artifacts.
WebApps are a mixture of print publishing and software development, 1
making their development outside the realm of software engineering
practice
There are no real differences between creating WebApps and Mobile-Apps 1

In its simplest form an external computing device may access cloud data 1
services using a web browser.
Product line software development depends the reuse of existing software 1
components to provide software engineering leverage.
Agility is nothing more than the ability of a project team to respond rapidly to 1
change.
In agile software processes the highest priorities is to satisfy the customer 1
through early and continuous delivery of valuable software.

In agile development it is more important to build software that meets the 1


customers’ needs today than worry about features that might be needed in
the future.
All agile process models conform to a greater or lesser degree to the 1
principles stated in the “Manifesto for Agile Software Development”.

The Dynamic Systems Development Method (DSDM) suggests a 1


philosophy that is based on the Paretoprinciple (80% of the application can
be delivered in 20% of the time required to build the complete application).

Agile Unified Process uses the classic UP phased activities (inception, 1


elaboration, construction, transition) to helpthe team visualize the overall
process flow.
Human aspects of software engineering are not relevant in today’s agile 1
process models.
Group communication and collaboration are as important as the technical 1
skills of an individual team member to the success of a team

Teams with diversity in the individual team member skill sets tend to be 1
more effective than teams without this diversity.
Software engineering team structure is independent of problem complexity 1
and size of the expected software products.
Agile teams are allowed to self-organize and make their own technical 1
decisions.
In XP a metaphor is used as a device to facilitate communications among 1
customers, team members, and managers?

Using an established social media platform negates the need to be 1


concerned about privacy or security
Use of cloud services can speed up information sharing among software 1
team members?
In collaborative development environments, metrics are used to reward and 1
punish team members
Process technology tools allow software organizations to compress 1
schedules by skipping unimportant activities.
It is generally accepted that one cannot have weak software processes and 1
create high quality end products.
The communication activity is best handled for small projects using six 1
distinct actions (inception, elicitation, elaboration, negotiation, specification,
validation).
A good software development team always uses the same task set for every 1
project to insure high quality work products.
Software processes can be constructed out of pre-existing software patterns 1
to best meet the needs of a software project
In general software only succeeds if its behavior is consistent with the 1
objectives of its designers.
Agility is nothing more than the ability of a project team to respond rapidly to 1
change.
In agile software processes the highest priorities is to satisfy the customer 1
through early and continuous delivery of valuable software.

Software engineering principles have about a three year half-life. 1


Every communication activity should have a facilitator to make sure that the 1
customer is not allowed to dominatethe proceedings.

The agile view of iterative customer communication and collaboration is 1


applicable to all software engineering practice
Project plans should not be changed once they are adopted by a team 1

The design model should be traceable to the requirements model 1


Teams using agile software practices do not generally create models 1

A successful test I ones that discovers at least one as-yet undiscovered 1


error.
Larger programming teams are always more productive than smaller teams. 1

Increasingly, organizations adopt and follow a standardized systems 1


development process
The number and scope of phases and activities in a methodology varies 1

A directive is a new requirement that's imposed by management, 1


government or some external influence
Opportunities are chances to improve the organization in the absence of 1
specific problems
By dividing a larger problem (system) into more easily manage pieces 1
(subsystems); the analyst can simplify the problem-solving process.

The first solution an analyst finds is usually the best solution. It is not cost 1
effective to consider alternatives
Project management ensures that an information system is developed at 1
minimum cost, within a specific time frame, and with acceptable quality
The most common reason for software project failure is lack of functionality 1

In requirements validation the requirements model is reviewed to ensure its 1


technical feasibility.
In win-win negotiation, the customer’s needs are met even though the 1
developer’s need may not be.
In agile process models requirements engineering and design activities are 1
interleaved.
Analysis patterns facilitate the transformation of the analysis model into a 1
design model by suggesting reliable solutions to common problems

Use-case actors are always people, never system devices. 1


Developers and customers create use-cases to help the software team 1
understand how different classes of end-users will use functions

User stories are complete descriptions the user needs and include the non- 1
functional requirements for a software increment.
User stories are complete descriptions the user needs and include the non- 1
functional requirements for a software increment.
Non-functional requirements can be safely ignored in modern 1
It is relatively common for different customers to propose conflicting 1
requirements, each arguing that his or her version is the right one.

A stakeholder is anyone who will purchase the completed software system 1


under development. Answer is
Requirements engineering is a generic process that does not vary from one 1
software project to another.
Software engineering doesn’t concern with customer problem 1
in vlaue based view the quality is related to the amount the customer is 1
willing to pay
the cost of software on a computer are not greater than the hardware cost 1

software scope is well-defined boundary, which encompasses all the 1


activities that are done to develop and deliver th software product

Multiple choice Which of the following is NOT a major phase of information engineering? Enterprise Analysis Business Area Business System Construction 3 1
Analysis Analysis
Temporal Metrics include all but the following except: Enviornmental Collateral Damage Remediation Level Report Confidence 1 1
Metrics Potential(CDP) (RL) (RC)

See Table 13-1; which methodology requires Business Entity Analysis? Process Data Object None of these 2 1

See Figure 12-17; Which subdomain is responsible for service objects such Data Human Software Hardware/Operating 1 1
as Define logical data access control and application presentation. system

According to Table 13-5; Which methodology is MOST predictable and Data Human Software Hardware/Operating 1 1
consistent: system
The _______ supports and sells the goals of the project throughout the Project Manager Sponsor Champion User 3 1
organization:
The Goal of 3NF Is to: Remove Repeating Remove Partial Remove Non- Remove non key 4 1
Groups Key Dependencies Repeating Groups dependencies
Program Code

Jenkins (2005) listed the mythical man month diagram how many interfaces 1 3 6 10 3 1
exist for a 5 person project.
All listed below are examples of stakeholders with the exception of: End user Programmer Executive Expert 2 1

Which of the following is NOT an element of a project plan: What location is when it needs to be who is to do it how it is to be 1 1
involved done by achieved
A __________ is written by the PM and the SE and used to advertise a Bidding document Project request Request for bid Request for 4 1
project to vendors to bid on. Proposal(RPF)
An important part of the maintainability is to make all which of the following Project Design Supporting material All of above 4 1
available: documentation documentation
Based on this diagram return on investment (ROI) will be reached: 1 Year 2 Years 3 Years None of these 4 1

Two methods of analyzing methodology classes are: Information systems Humphrey's Information systems None of these 3 1
methodology maturity framework methodology
framework framework and
Humphrey's maturity
framework

Boilerplate code means that the code: does vary from one is critical to does not vary from meaning not 3 1
program to another maintaining one program to changeable after it is
applications at the another accepted as
functional level complete, motivates
rather than at the users to be as
code level. complete in their
thinking as possible

A ____ test is performed for each of the smallest units of code? Regression System Integration Unit 4 1
In "FIGURE 9-24 Decomposition for Customer and Video Maintenance Rental/Return Accounting Purchasing Personnel/Payroll 1 1
Remove Repeating Groups," which processes are decomposed?

Horizontal (or Subset) Data Partitioning: Complete 'records' Data are copied in Partial 'records' or Different data are 3 1
or tuples of data are more than one tuples of data are completely stored in
stored with different location. stored in more than more than one
data in more than one location. location.Some data
one location. may be accessed by
remote sites.

Table III-3 discusses all but: Document Review Coding Identification 3 1


The specific activities in structured systems analysis: Develop a context Optionally, develop Develop a structured Develop a set of 3 1
diagram a state-transition data dictionary balanced data flow
diagram if building diagrams
an on-line or real-
time application

In the following development project schedule what is the deliverable for the Project proposal Requirements Alpha Release system 4 1
acceptance testing phase: Spec
Which is NOT a phase of project lifecycle (PLC)? Analysis and Project InitiationSystem Retirement Preparation for 3 1
Design Software
Engineering
The Common Vulnerability Scoring System (CVSS) is an open framework Identifying and Identifying and Identifying and None of these 3 1
that addresses what issue? assessing assessing assessing
vulnerabilities vulnerabilities vulnerabilities
across many across many across many
disparate software disparate hardware disparate hardware
platforms platforms and software
platforms

Legacy Systems are in what phase? Design Installation Operations Maintenance 4 1


Environmental Metrics include all the following except: Collateral Damage Target Security Temporal vector's 4 1
Potential(CDP) Distribution(TD) Requirements (CR,
IR, AR)
Software engineers are involved in these activities in which correct order: Development, Operation, Development, Operation, 1 1
operation, development, operation, development,
maintenance or retirement and maintenance and maintenance and
retirement maintenance retirement retirement

A __________work product is a product that is considered complete and Baseline Change request Checklist Change Control File 1 1
that is the basis for other, current work by the project development team.

A Structured Walk-Through does not include which work product? Program code Programmer Test Plan Test design 2 1
A Structured Walk-Through does not include this work product: Program code Programmer Test Plan Test design 2 1
The video store case study in chapter 2 includes requirements for customer, Rental processing Software Hardware Networks 1 1
video and ___________.
There are five rules of scheduling; which of the following is NOT one of Eliminate Pick the right level Take a vacation Analyst/Designer 3 1
them: uncertainty of granularity Toolkit
wherever you can
The list below are useful terms in expressing requirements specifications START STOP SMART None of these 3 1
and can be abbreviated to stand for:
All listed below are examples of stakeholders with the exception of: End user Programmer Executive Expert 2 1

The _______ supports and sells the goals of the project throughout the Project Manager Sponsor Champion User 3 1
organization:
In the following development project schedule what is the deliverable for the Project proposal Requirements Alpha Release system 4 1
acceptance testing phase: Spec
The major activities of structured design are all except: Develop program Transform or Define the logical Refine and complete 3 1
specifications transaction database structure chart
analysis of DFD
Which is NOT a phase of project lifecycle (PLC)? Analysis and Project Initiation System Retirement Preparation for 3 1
Design Software
Engineering
FTR includes _________, walkthroughs inspections round-robin reviews All of above 4 1

The specific activities in structured systems analysis: Develop a context Optionally, develop Develop a structured Develop a set of 3 1
diagram a state-transition data dictionary balanced data flow
diagram if building diagrams
an on-line or real-
time application
See Figure 2: CVSS Metrics and Equations. Which values are considered Base metrics plus Temporal metrics Environmental both 2 and 3 4 1
optional when reflecting the risk posed by the vulnerability to a user's vector metrics
environment?
Jenkins (2005) stated that the critical path is defined as: It is this path that It is this path that The critical path The critical path 2 1
you can traverse in you must traverse represents the ideal represents a set of
order to reach in order to reach set of tasks to be tasks to be complete
completion of your completion of your complete for your for your project
project on time project on time project

Boilerplate code means that the code: does vary from one is critical to does not vary from meaning not 3 1
program to another maintaining one program to changeable after it is
applications at the another accepted as
functional level complete, motivates
rather than at the users to be as
code level. complete in their
thinking as possible

Project Managers must exhibit all these qualities except: Understanding Trust Budgeting Empathy 3 1
The Common Vulnerability Scoring System (CVSS) is an open framework Identifying and Identifying and Identifying and None of these 3 1
that addresses what issue? assessing assessing assessing
vulnerabilities vulnerabilities vulnerabilities
across many across many across many
disparate software disparate hardware disparate hardware
platforms platforms and software
platforms

An important part of the maintainability is to make all which of the following Project Design Supporting material All of above 4 1
available: documentation documentation
Potential distribution of the application. The specific activities in structured Develop a context Optionally, develop Develop a structured Develop a set of 3 1
systems analysis: diagram a state-transition data dictionary balanced data flow
diagram if building diagrams
an on-line or real-
time application

Horizontal (or Subset) Data Partitioning: Complete 'records' Data are copied in Partial 'records' or Different data are 3 1
or tuples of data are more than one tuples of data are completely stored in
stored with different location. stored in more than more than one
data in more than one location. location.
one location.
Which of the following is NOT a major phase of information engineering? Enterprise Analysis Business Area Business System Construction 3 1
Analysis Analysis
The Base Metrics include all the following except: Access Vector Authentication Confidentiality, Confidentiality, 3 1
Integrity, Availability Integrity, Availability
Impacts

The Data Dictionary Process Contents does not include: Process Data Process ID Constraints (e.g., Process Name 1 1
Number concurrence,
sequential with
another process,
time-out, etc.)
Two methods of analyzing methodology classes are: Information systems Humphrey's Information systems None of these 3 1
methodology maturity framework methodology
framework framework and
Humphrey's maturity
framework

Environmental Metrics include all the following except: Collateral Damage Target Security Temporal vector's 4 1
Potential(CDP) Distribution(TD) Requirements (CR,
IR, AR)
The purpose of the Sample Change Request Impact Form: Document the The PM and SE The PM and SE impacts of the 4 1
priority for the define the schedule redefine the change document
action, and the cost and cost. schedule and the the priority for the
and schedule of the cost. action, and the cost
change and schedule of the
change.

A __________work product is a product that is considered complete and Baseline Change request Checklist Change Control File 1 1
that is the basis for other, current work by the project development team.

Which of the following is NOT an element of a project plan: What location is when it needs to be who is to do it how it is to be 1 1
involved done by achieved
The results of structured design are all BUT the following: Programming Plans for testing Conversation Training and 3 1
specifications Installation
Temporal Metrics include all but the following except: Enviornmental Collateral Damage Remediation Level Report Confidence 1 1
Metrics Potential(CDP) (RL) (RC)

Software engineers are involved in these activities in which correct order: Development, Operation, Development, Operation, 1 1
operation, development, operation, development,
maintenance or retirement and maintenance and maintenance and
retirement maintenance retirement retirement
6Which goal is stated in a clear and concise manner and more likely to “To deliver the “To deliver the best “To deliver the “To deliver a sales 2 1
inspire team members to achieve it? cheapest system, in sales and cheapest system, in and marketing
the shortest time, marketing system the shortest time, system on time”
that just about gets on the market” that almost gets the
the job done” job done”

A Structured Walk-Through does not include this work product: Program code Programmer Test Plan Test design 2 1
One Word Question When elements of a module are grouped because the output of one Sequential cohesion 1
element serves as input to another and so on, it is called
In project execution and monitoring, every project is divided into multiple Milestones checklist 1
phases according to which phase of SDLC all major tasks are performed?

The rules of writing 'if-then-else', 'case-switch', 'while-until' and 'for' control Control Structure 1
flow statements are called
IEEE provides a standard as IEEE 830-1993. For which activity this Software requirement specification. 1
standard is recommended standard?
A project risk factor is considered in which model? Spiral model. 1
Which model is not suitable for large software projects but a good one for Big Bang model 1
learning and experimenting?
Activities and action was taken on the data are represented by a circle or Process 1
round-edged rectangles are called
If an application allows executing multiple instances of itself, they appear on Tabs 1
the screen as separate windows are called
Which software enables the program to adequately manipulate information? Data Structures 1

What is a legacy system? A legacy system refers to outdated application software that 1
is used instead of available upgraded versions.

Software Requirement Specification (SRS) is also known as the Black box testing 1
specification of
COCOMO stands for COnstructive COst MOdel 1
RAD Software process model stands for Rapid Application Development 1
compilers, Editors software come under which type of software? System software 1
Abbreviate the term CASE Computer Aided Software Engineering 1
FAST stands for Facilitated Application Specification Technique. 1
Software is defined as Instructions 1
CASE Tool stands for Computer Aided Software Engineering 1
What is a text-based notifier that mostly shows the context in which the user Command prompt 1
is working, and it is also generated by the software system?

Well structured design has low cohesion and high coupling arrangements No 1

Quality of the product comes under which type of measures? Indirect measures 1
Measurements can be categorized in two ways. What are those two ways? Direct and Indirect 1

Which type of DFD shows how the data flow is implemented in the system Physical DFD 1
and it is also more specific and close to the implementation

Which is the way where the CMMI process meta-model can be represented Continuous model & Staged model 1

The evaluation of metrics resulting in insight and the quality of the Interpretation 1
representation is
Abbreviate the term SRS. Software Requirement Specification 1
The measure of reliability is given by Mean Time between failure (MTBF) 1
Which model depicts the profile of the end-users of a computer system? User model 1

System software and application software are important categories of which Software 1
part?
What is a piece of programming code and performs a well-defined task? A computer program 1

Which is a process of software development which is done to improve the Software Re-engineering 1
maintainability of a software system?
Requirements analysis and software architecture is the process of? Software development 1

What does SDLC stand for Software Development Lifecycle(SDLC) 1


Which term refers to the set of activities which ensure that software Verification 1
implements a specific function?

What is the process that results in the removal of error? Debugging 1


What refers to the set of activities which ensure that software that has been Validation 1
built according to the need of clients?
What is to be created to list down the requirements for software? Excel sheet 1
What is a minimal implementation of an interface which generally returns A stub 1
hardcoded data?
What usually verifies outputs against expectations and expectations are set mock 1
in the test?
What is a package which includes a software program? Computer software 1
Who manages risks and resources to deliver the project within time, cost, Project Manager 1
and quality constraints ?
Who is a person responsible for managing the software development project A software project manager 1
?
Wha tis a well-defined boundary that includes all kind of activities that are Software scope 1
done to develop and deliver the software product ?
By counting the lines of delivered code of the software product we can find ? Size 1

Which features are provided by software product Function points 1


Decomposition technique and Empirical technique is mostly used estimation Software product 1
techniques of ?
What is a process of tracking and controlling changes that happen in the Software configuration management 1
software ?
How can you measure project execution? Activity Monitoring, Status Reports, and Milestone 1
Checklists.
What is a function which ensures that all changes made into the software Change control 1
system are consistent ?
What are a functional description of a proposed software system ? Software requirements 1

What finds out how practical and beneficial the software project Feasibility study 1
development will prove to the organization?
Whatare functional features which are expected by users from the proposed Functional requirements 1
software product?

What offers measures for various aspects of software process ? Software Metrics 1
Wha is a technique which is used for dividing a software system into various Modularization 1
discreet modules?
What is a measure that defines the intra-dependability among the elements Cohesion 1
of the module?
What conducts a study to know the economic, technical and operational The software analyzer 1
feasibility of the project
What is Highest abstraction level is called? Level 0 of DFD 1
What is more like to the programming language without syntax of any Pseudo Code 1
specific language ?
What is a conceptualization of problem ? Structured design / 1
What is a programming method, which uses the concepts of a mathematical functional programming 1
function ?
What proper process is followed while developing the software Quality Quality Assurance 1
Assurance vs. Quality Control?
What does CASE stands for Computer Aided Software Engineering 1
What portrays the entire information system as one diagram ? Level 0 of DFD 1
What includes programming code, documentation and user guide? Software 1

Structured design is based on which strategy ? divide and conquer 1


what are related to security, performance, look, and feel of the user interface Non-functional requirements 1
?
Which file extenstion is an executable program .exe file 1
What deals with maintaining the quality of software product. Quality Control 1
Comprehension 0
DataBase RDBMS, NoSQL Fill in the Blanks _________________represents a relationship among a set of values. A Row 1
Management System

Coloum header is known as________________. Attributes 1


DBMS is a collection of _____ that enables user to create and maintain a Program 1
database.
______defines the structure of a relation which consists of a fixed set of Schema 1
attribute-domain pairs.
_____clause is an additional filter that is applied to the result. Having 1
______is a preferred method for enforcing data integrity Constraints 1
A relational database developer refers to a record as A tuple 1
The relational model is based on the concept that data is organized and Relations 1
stored in two-dimensional tables called ______
______ keyword is used to find the number of values in a column. Count 1
______contains information that defines valid values that are stored in a Index 1
column or data type.
An advantage of the database management approach is data is integrated Multiple programs 1
and can be accessed by _____________
Large collection of files are called ______________ Database 1
The rows in the database are often known as Tuples 1
MySQL is a ________________type of Database management system Relational 1

A relational database consists of a collection of Tables 1


In RBDMS a referential intergrity constraint can be specified with the help Foreign Key 1
of_________.
_____________ command is used to delete a table from database. Drop table 1

A Primary key is a _______________ identifier in a column. Unique 1


MySQL is used to organize_______________. Table 1
A number of related records that are treated as a unit is File 1
called_____________.
Using ___________ language can a user request information from a Query 1
database.
_____________represents an ‘attribute’ in a relational database? Column 1

To present relation between tables is called______. Primary Key 1


Rollback is a way to ________ a transaction with all database changes not Terminate 1
saving to the database server.
ODBC stands for Open Database Connectivity 1
In an object-oriented model, one object can access data of another object message 1
by passing
A view of database that appears to an application program Subschema 1
An abstraction concept for building composite object from their component Aggregation 1
object is called
A set of objects that share a common structure and a common behavior is Class 1
called
Every weak entity set can be converted into a strong entity set by adding appropriate attributes 1
Relations produced from an E-R model will always be in Third normal form 1
In ER model the details of the entities are hidden from the user. What is it Abstraction 1
called?
The file organization that provides very fast access to any arbitrary record of Hashed file 1
a file is
In a relational model, relations are termed as Tables 1
The database schema is written in DDL 1
In the architecture of a database system what is the external level? view level 1

In Hierarchical model records are organised as Tree 1


In an E-R diagram attributes are represented by ellipse 1
In case of entity integrity, the primary key maybe not Null 1
Related fields in a database are grouped to form a data record 1
True or False Physical schema is the overall physical structure of the database 1
SQL is not a Turing machine equivalent language 1

Candidate Key provides the tuple-level addressing mechanism in a 1


relational system
A name relation is a variable 1
A view is a named derived table 1
The union of Primary keys of the related entity sets becomes a Super Key of 1
the relation
Maximum height of a B+treeof order m with n key values is log m(n) 1

In a relational database a referential integrity constraint can be specified 1


with the help of primary key
A host language is Query Language 1
Multilevel Indexing uses a Binary Search 1
A primary key is also referred to as a composite key 1
Duplicate data is referred to as redundant data 1
In a relational database a referential integrity constraint can be specified 1
with the help of foreign key
A super key is aa set of one or more attributes that , taken collectively, allow 1
us to identify uniquely an entity in the entity set
'*' Command is used to get all the columns in a table 1
Relational model is a valid record-based data models 1
UNIFY is not a valid relational database 1
A number of related records that aretreated as a unit is called file 1
Tree is a logical database structure 1
Key is a field which is used to access a apecific record 1
The relational model uses some unfamiliar termonology. A tuple is 1
equivalent to a record
The set of all possible values of data items is called Domain 1
Large collection of files are called databases 1
Theset of permitted values for each attribute is called its Domain 1

Primary Key represent relationship between tables 1


NoSQL was designed with security in mind, so developers or security teams 1
don't need to worry about implementing a security layer

NoSQL prohibits structured query language (SQL) 1


Facebook developed NoSQL database Apache Cassandra 1
Relational databases are being phased out as more and more companies 1
make the switch to NoSQL technologies
NoSQL databases are useful for managing large sets of distributed data 1
The adoption level of NoSQL software is lower than that of relational 1
databases, data appliances and columnar database software

NoSQL databases prohibits the use of SQL 1


Field represent a column in NoSQL 1
NoSQL supports Horizontal scaling, simple design, fine controlled 1
availability
Hadoop considered a database 1
Availability is not an out of the box feature of NoSQL 1
Big Data is not a valid NoSQL database 1
NoSQL is a new data format to store large datasets 1
Table basedis not a valid data structure for NoSQL db 1
NoSQL databases have built in security features, so developers need not to worry about security implementation 1

Less scalable is valid for NoSql 1


NoSQL data security in comparison with RDBMS has less features like 1
integrity and availability
Hadoop is enabled by a technology Google created called MapReduce 1

MongoDB is a NoSQL database 1


The indexconsists of a list of keys and pointer to the matter list 1
Read allows reading but not modification of data 1
Index allows creation and deletion of indices 1
each table in nosql databases such as cloud bigtable has a single schema 1
that is enforced by the database engine itself
A flavor of SqlMap exists for NoSQL databases. 1
Graph based data structure is valid data structure for NoSQL db 1
A host language is Query Language 1
Multilevel Indexing uses a Binary Search 1
A primary key is also referred to as a composite key 1
A super key is aa set of one or more attributes that , taken collectively, allow 1
us to identify uniquely an entity in the entity set
'*' Command is used to get all the columns in a table 1
Relational model is a valid record-based data models 1
Tree is a logical database structure 1
Key is a field which is used to access a apecific record 1
The relational model uses some unfamiliar termonology. A tuple is 1
equivalent to a record
The set of all possible values of data items is called Domain 1
Multiple choice Which of the following data types does the SQL standard not support? char(n) String(n) varchar(n) float(n) 2 1

Which command is used to create a new relation in SQL create table( , …) create relation( , new table( , …) new relation( , …) 1 1
…)
Which of the following commands do we use to delete a relation (R) from a drop table R drop relation R delete table R delete from R 1 1
database?
Which of the following commands do we use to delete all the tuples from a delete table R drop table R delete from R drop from R 3 1
relation (R)?
Which of the following logical connectives is not included in SQL? AND OR NOR NOT 4 1
The clause is used to list the attributes desired in the result of a query SELECT FROM WHERE CREATE 1 1

If the value on If the value on If the value on which If the value on which 3 1
which it is applied is which it is applied it is applied is blank it is applied is more
finite is invalid than the allowed
limit

The _____ aggregation operation adds up all the values of the attribute ADD AVG MAX SUM 4 1

The ________ comparison checker is used to check “each and every” ALL AND EVERY EACH 1 1
condition

The _________ construct returns true if the argument in the sub-query is NOT NULL NOT UNIQUE UNIQUE NULL 2 1
void of duplicates

What is the format of entering date into a database while inserting data into YYYY-MM-DD “YYYY-MM-DD” ‘YYYY-MM-DD’ “DD-MM-YYYY” 3 1
it?
Which of the following is a privilege in SQL standard? SELECT INSERT UPDATE All of above 4 1

What is the full form of OLAP? Online Application Online Application Online Analytical Online Analytical 4 1
Programming Processing programming Processing

Data that can be modelled as dimension attributes and measure attributes Mono-dimensional Multi-dimensional Measurable data Efficient data 2 1
are called ___________ data data

Which of the following is not a relational algebra function? SELECT PROJECT MANIPULATE UNION 3 1

Updating, Deleting and Inserting in relational algebra is done using the ASSIGNMENT MODIFICATION ALTERATION INCLUSION 1 1
________ operator

Which of the following is a good database management practice? Adding redundant Removing Not specifying None of these 2 1
attributes redundant primary keys
attributes
An entity set that has a primary key is called as ___________ Strong Entity set Weak Entity Set Complete Entity Set None of these 1 1

Which of the following can affect the placement of the relationship Alphabetical order The data in the Cardinality ratio None of these 3 1
attributes? attribute

Which of the following is not a feature of a good relational design? Specifying primary Specifying foreign Preserving integrity Allowing redundancy 4 1
keys keys constraints of attributes

An instance of a relation that satisfies all real world constraints is known as? Proper relation Ideal relation Perfect relation Legal relation 4 1

The process of making a normalized schema unnormalized is called as Unnormalization Denormalization Renormalization Annormalization 2 1
_________

If an attacker manages to get an application to execute an SQL query SQL attacks SQL injection SQL usage attack SQL destroyer 2 1
created by the attacker, then such attacks are called as _ attacks attack
The URL of the page that had the link that the user clicked to access the Source Linker Leaker Referrer 4 1
page is called as _____

DVD is a form of ______ storage Magnetic Storage USB Storage Tape Storage Optical Storage 4 1

Which of the following is a part of the Magnetic disk assembly? Spindle Read write head arm All of above 4 1

What is buffering? The blocks read The blocks read The blocks read None of these 2 1
from disk are from disk are from disk are
directly accessed temporarily stored organized in a
in a memory particular fashion to
cater requests.

A view whose contents are computed and stored is called as _______ Storage view Backup view Materialized view Advanced view 3 1

The problem of an update affecting the execution of a query associated with Updation problem incremental halloween problem optimization problem 3 1
the update is known as the ________ problem
The set of ________ in a precedence graph consists of all the transactions Vertices Edges Directions None of these 1 1
participating in the schedule
Which of the following is not a NoSQL database? SQL server MongoDB Cassandra None of these 1 1
Which of the following is a NoSQL Database Type? SQL Documents JSON All of above 2 1
databases
“Sharding” a database across many server instances can be achieved with LAN SAN MAN All of above 2 1
______________

Which of the following is a wide-column store? Cassandra Riak MongoDB Redis 1 1

Which of the following are the simplest NoSQL databases? Key-value Wide-column Document All of above 1 1

Bulk indexes may be more efficient for some kinds of content and workloads synchronous asynchronous UNIQUE None of these 2 1
in real time.

Point out the correct statement. An array with a An array with a An array with a None of these 1 1
large number of large number of small number of
elements will incur elements will incur elements will incur
greater indexing smaller indexing greater indexing
costs on insertion costs on updates costs on insertion

Which of the following is related to document that do not provide a way to Stemming Synonyms Ranking None of these 3 1
weight results?

Which of the following is related to document that provide support for Stemming Synonyms Ranking None of these 2 1
synonym or related queries in the application layer?

Which of the following is related to the parsing of document for root? Stemming Synonyms Ranking None of these 1 1

When inserts, updates and deletes have a _________ write concern, write Strong Weak Average Very strong 2 1
operations return quickly.

Which of the following operation can be optionally used for map reduce? Finally Final Static None of these 1 1

A second data center hosts one priority 0 member that cannot become Primary Write View Secondary 1 1
___________

Which of the following method returns a cursor? Find Sort Skip All of above 1 1
Which of the following key is used to denote uniqueness in the collection? _id Id id_ None of these 1 1

Which of the following functionality is used for aggregation framework? $match $project $projectmatch All of above 2 1

Which of the following pattern may provide a suitable solution for storing Child Parent Root None of these 1 1
graphs?

Which of the following pattern is more straightforward to use? Materialized Paths Array of ancestors Nested Sets None of these 2 1

Which of the following relationship uses references to describe documents One-to-One One-to-Many One-to-Many None of these 2 1
between connected data? Relationships with Relationships with Relationships with
Embedded Embedded Document
Documents Documents References
How many does collections GridFS use to store files? 1 2 3 4 2 1
Which of the collection in GridFS stores the binary chunks? Chunks Files Data Log 1 1

Which of the following checks and repairs errors and inconsistencies in data repairDatabase repairedDatabase recoverdatabase All of above 1 1
storage?

Which of the following field allows efficient retrieval of chunks? n name object 2n 1 1

Which of the following data type is depreciated? Double String Object Undefined 4 1
55. WiredTiger can compress collection data using either snappy or zlib Snappy zip lib kit 1 1
compression library.
56.Which of the following collection do not support the TTL property? compound indexes primary indexes composite indexes All of above 1 1

Which of the following parameter denotes name of the shard from which to shard tag chunk None of these 1 1
remove a tag?

Provides all the privileges of the read role. delete update readwrite None of these 3 1

Which data is mainly used for handling large volumes in NOSQL unstructured structured semi-structure All of above 1 1
Database?

Most NoSQL databases support automatic __________ meaning that you processing scalability replication All of above 3 1
get high availability and disaster recovery.
One Word Question In an object-oriented model, one object can access data of another object message 1
by passing
A view of database that appears to an application program Subschema 1
An abstraction concept for building composite object from their component Aggregation 1
object is called
A set of objects that share a common structure and a common behavior is Class 1
called
Every weak entity set can be converted into a strong entity set by adding appropriate attributes 1
Relations produced from an E-R model will always be in Third normal form 1
In ER model the details of the entities are hidden from the user. What is it Abstraction 1
called?
The file organization that provides very fast access to any arbitrary record of Hashed file 1
a file is
What is not true about a view? It is always updatable like any other table 1
In a relational database a referential integrity constraint can be specified foreign key 1
with the help of
4NF is designed to cope with Multi valued dependency 1
Which command is used to remove all rows from a table? Truncate 1
Which of the following is an aggregate function in SQL? Max 1
Which command is used to add a column to an existing table? Alter 1
Prevention of access to the database by unauthorized users is referred to Security 1
as
Cartesian product in relational algebra is a Binary operator 1
ODBC stands for Open Database Connectivity 1
In a relational model, relations are termed as Tables 1
The database schema is written in DDL 1
In the architecture of a database system what is the external level? view level 1

In Hierarchical model records are organised as Tree 1


In an E-R diagram attributes are represented by ellipse 1

In case of entity integrity, the primary key maybe not Null 1


Related fields in a database are grouped to form a data record 1
The method in which records are physically stored in a specified order hash 1
according to a key
A relational database developer refers to a record as A tuple 1
The relational model is based on the concept that data is organized and Relations 1
stored in two-dimensional tables called
A number of related records that are treated as a unit is called File 1
What is a collection of related data organised that can be easily accessed, Database 1
managed and updated ?
What does RDBMS stands for ? Relational Database Management System 1
Which Term are facts and statistics stored or free-flowing over a network Data 1
that is raw and unprocessed?
Hardware, Software, Data, procedures, and Database access language are Database Management System 1
components for which the system?
What organizes data into related rows and columns? Relational Database Management System 1

What is capable of understanding the Database Access Language and DBMS software 1
interpret it into actual database commands to execute them on the DB?

Which Term is known as data about the data? Metadata 1


Which Term refers to general instructions to use a database management DBMS component Procedures 1
system?
Which is a simple language designed to write commands to access, insert, Database Access Language 1
update and delete data stored in any database?
Which Term defines the logical design and structure of a database? Which A Database model 1
defines how data will be stored, accessed and updated in a database
management system?
Write the two types of DBMS Database Models? Hierarchical Model, Entity-relationship Model 1

Which Term is defined to represent the relationships into pictorial form to E-R Models 1
make it easier for different stakeholders to understand?
What is a collection of an organized set of tables related to each other, and Relational database 1
from which data can be accessed easily?
What is the technique of organizing the data in the database? Database Normalization 1
Which process has the purpose of Eliminating redundant data and ensuring Normalization 1
data dependencies?
Which term is a systematic approach of decomposing tables to eliminate Normalization 1
data redundancy(repetition) and undesirable characteristics like Insertion,
Update and Deletion Anomalies?
Which term is a multi-step process that puts data into tabular form, Database Normalization 1
removing duplicated data from the relation tables?
Which term is says system to hide certain details of how data is stored and Data abstraction 1
created and maintained complexity should be hidden from database users?

Which term can be defined as the process of hiding the complexity of data & Data abstraction 1
representing the data which needs to be shown to the user?

Which term is the exploration and analysis of large quantities of data to Data mining 1
discover valid, novel, potentially useful and ultimately understandable
patterns in data?
Which term as features like prediction, identification, classification, and Data mining 1
optimization?
What is an open-source DBMS which is built, supported and distributed by MySQL 1
MySQL AB?
What data mining is also known as? Knowledge Discovery in Databases 1
Which database server is reliable, fast and very easy to use? MySQL 1
Which tables are present in memory and they are used for high-speed HEAP 1
storage on a temporary basis?
What is the default port for MySQL Server? 3306 1
Which software is portable GUI with command prompt and also MySQL 1
administered using MySQL Query browser?
What is a string object used to specify a set of predefined values and that ENUM 1
can be used during table creation in MySQL?
In which term floating-point numbers are stored with eight place accuracy FLOAT 1
and as four bytes?
In which term floating-point numbers are stored with accuracy 18 places and DOUBLE 1
as eight bytes?
Which software is database management systems (DBMS) and is designed SQL Server 1
by Microsoft?
Which software has the objective of capturing and analyzing data and SQL Server 1
managing the definition, querying, creation, updating, and administration of
the database?
Which software provides cross-platform support, a wide range of interfaces MySQL 1
for application programming?
What does DDL stand for? Data Definition Language Data Control Language 1
What is the syntax for concatenating tables in MySQL? CONCAT (string 1, string 2, string 3) 1
What is the limit of indexed columns that can be created for a table? 16 1

What are the different types of strings used in database columns in MySQL? SET, BLOB, VARCHAR, TEXT, ENUM, and CHAR. 1

How can a user get the current SQL version? SELECT VERSION (); 1
Is there an object-oriented version of MySQL library functions? Yes. MySQLi and interfaced in PHP. 1
What does DML stand for? Data Manipulation Language 1
Can you use MySQL with a Linux operating system? Yes. 1
What does DCL stand for Data control language 1
When the data disk is full and overloaded, we create a soft link and which .frm and the .idb files 1
file is to be moved into that link location?
What is an object which can have instances or occurrences that should be An entity 1
capable of being uniquely identified?
Which system is a single-user database, it does not support E.F.Codd rules DBMS 1
and does not allow a relationship between tables?

Which is a multi-user database, it supports E.F.Codd rules and it allows a RDBMS 1


relationship between tables?
Which term is an object, place, person, concept, activity about which an An entity 1
enterprise records data?
What are the data elements that describe an entity? Attributes 1
Which function is a subprogram that returns a value and must have a return User Defined Function (UDF) 1
value?
What does ERD stand for? What is the graphical representation of tables, Entity Relationship Diagram . 1
with the relationship between them?
What Object type is used to store a picture file in the database? ‘Blob’ 1
What is MySQL based on Object-oriented version 1
How Do You Change A Password For An Existing User Via Mysqladmin? mysqladmin -u root -p password "newpassword". 1

Use mysqldump To Create A Copy Of The Database? mysqldump -h mysqlhost -u username -p mydatabasename 1
> dbdump.sql
What is a single column or multiple columns defined to have unique values A primary key 1
that can be used as row identifications?
What is a single column or multiple columns defined to have values that can A foreign key . 1
be mapped to a primary key in another table?
Whatis a single column or multiple columns defined to have values pre- An index . 1
sorted to speed up data retrieval speed?
What does SQL stand for? Structured Query Language 1

In which language MySQL is written? C, and C++ language 1


If SQL is a computer language then MySQL is a? software application or program 1
Comprehension 0
Networking Basics of Data Fill in the Blanks In half-duplex data transmission data can be transmitted in ------------------- Both 1
Communication -.direction.
and Transmission
Media

In digital data transmission baud rate is equal to -------------- Bit rate 1

In simplex transmission data can be Transmitted in --------------direction. One 1

The cost of conveying message, picture or voice over a large distance in a Small 1
communication system should be --------------
In any communication system, the message should be safe and -------------- Secure 1
should reach to the person for whom it is meant.
PCs connected with --------------can also be used for education, Modem 1
entertainment, etc.
sending a message and receiving a response has always been -------------- Necessity 1
for the proper functioning of a business or administration.
Eavesdropping is not possible in…-------------- fiber optics 1
Coaxial cables can be used for………------------ Both in telephone and cable TV networks 1
Data networks for the efficiency of communication reasons, uses--------------. Full-duplex transmission 1

The meaning of a digital channel means that the channel is -----------. Carrying digital data. 1

Data networks for the efficiency of communication reasons, uses-------------- Full-duplex transmission 1

Frequency range of human voice and audible to human ears is usually in 100MHz to 400 MHz 1
the range of--------------…--------------
Fiber optics communication system uses--------------. Full-duplex 1
In satellite communication, up-link frequency and down-link frequencies are interference can be avoided 1
different because……--------------
Higher the band width, the--------------……….is the efficiency response in a Higher 1
stereo system.
STP and --------------…can be used for both Analog and digital data UTP 1
transmission
A balanced modulator can be used to generate-------------- PSK 1
Microwave links are generally preferred o coaxial cable for television Of their greater bandwidth 1
transmission because……--------------
When useful bandwidth of medium exceeds the required bandwidth of Frequency Division Multiplexing 1
signals to be transmitted we use --------------….
The optical fiber transmission there exists --------------repeater spacing. Higher 1

A satellite link introduces large -------------- capacity 1


Start and stop bits are required in --------------communication. Asynchronous 1
Order of frequencies used in satellite communication is -------------- 109 1
Fiber optic communication uses order of -------------- frequencies. 10 14 1
Phase sent for a particular bit is dependent on the previous bit in ------------- DPSK 1
QAM is -------------- PSK combined with AM 1
Digitalization refers to -------------- Sampling and Quantization 1
If R is the bit rate in a digital wave form then the bit period of T is equal to - 1/R 1
-----------
In long distance data transmission system, the most preferable mode of Serial transmission 1
communication is --------------
The sampling interval of a telephone voice signal is -------------- 125*10-6 sec 1
In a telephone channel, Voice signal are band limited to ----------------- 8KHz 1

During transmission, the distortion of the signal depends on -------------- Frequency of the signal 1

Statistic multiplexers may also be classified as -------------- Concentrators 1


The approximate round trip delay in satellite communication is ------------- 256 1
msec.
The difference between the decoded signal and the original is referred to as Quantization error 1
the ------------
Parity checking is used for error -------------- Detection 1
The --------------……process in a PCM modulator introduces an error in the Quantization 1
original signal and the final demodulated signal.
Analog to digital conversion using PCM introduces -------------noise. Quantization 1

Intermodal dispersion is not found in -------------- fibers. Single mode 1


True or False Synchronous Transmission is more efficient than asynchronous 1
Transmission.
CRC is used to verify the integrity of the entire block of data. 1
The best example of TDM is the way we receive various radio stations in a 1
radio.
Maintenance of analog communication systems is costly and difficult as 1
compared to digital systems.
Twisted wire pair is effected by the electromagnetic interference. 1
Single mode used in Fiber optics does not have any dispersion problem. 1

Attenuation is highest in UTP cable. 1


Multipath fading is not a serious problem in Microwave Communication 1
systems.
A satellite in geo-synchronous orbit is a distance of 36000 miles from the 1
equator of the earth.
In single-mode optics fibers, the core is 8 to 10 microns and a micron is one 1
millionth of an inch.
A phase shift keying receiver must incorporate carrier recovery. 1
A phase shift keying signal is less susceptible to noise than amplitude shift 1
keying signal.
FSK scheme requires less bandwidth than PSK. 1
Quantization noise in a PCM system increase when the number of levels of 1
quantization is increased.
In DPSK, the information in the two consecutive bits is used. 1
Higher bit rates can be achieved over voice grade line by employing more 1
complex modulation schemes.
Asynchronous transmission is far more efficient than synchronous 1
transmission.
The peak-to-peak voltage of the carrier wave is varied with signal value in 1
phase modulation.
Single mode fibers are more expensive but can be used for longer 1
distances.
Colocated earth stations are used for frequency diversity. 1
Synchronous transmission is more appropriate for high speed 1
communication.
Sharing of executable files in LAN is not possible. 1
FDD uses two rings. 1
The IEEE 802.3 Standard is for persistent CSMA/CD LAN. 1
Telnet is a Internet Protocol for logging on to remote hosts and processing 1
data locally.
The receiving computer passes the reassembled data to the session layer in 1
a usable form.
A receiving computer copies the data from the packets to a buffer for 1
reassembly.
NetBEUI is a transport protocol that provides data transport services for 1
NetBIOS sessions and applications.
Attenuation in a pair is effected by the electromagnetic interference. 1

When the same numbers of channels are to be multiplexed for transmission, 1


FDM always requires a greater bandwidth than TDM.

Protocols are rules that govern a communication exchange 1


Viruses are a network timing issue 1
Protection of data from a natural disaster such as a tornado is a network 1
management issue.
Data communication is the transfer of data from one device to another via 1
some form of transmission medium
A data communication system must transmit data to the correct destination 1
in an accurate and timely manner
Networks allow shared access to information devices. This is an example of 1
Centralized Processing.
Networks use distributed processing in which a task is divided among 1
multiple computers.
Collaborative processing provides for many computers and users to interact 1
on a task either synchronously or asynchronously
Standards are basic, insignificant rules that standards bodies create for 1
strictly intellectual and not practical reasons
The signal is the physical path over which a message travels 1
Mesh topology always requires a multi-point connection 1
microwave is NOT a type of transmission media? 1
Information can be represented as a sequence of bit patterns 1
Parameter that refers to recording and broadcasting of picture is Image 1

Both station can transmit and receive data simultaneously in Half duplex 1
mode
Data communications are transfer of data through some linear medium 1

Keyboard and traditional monitors are examples of Simplex devices 1

In star topology if central hub goes down, it effects whole system 1


Protocols are, set of rules to govern Communication 1
Parameter that refers to uneven delay of data packets in delivery is Jitter 1

Mode in which each station can send and receive data but not at same time 1
is called Simplex
Word Tele means Near 1
In mesh topology, devices are connected via Multipoint link 1
Performance, reliability and security are criteria of Efficient network 1

Hybrid network includes combination of topologies 1


Delivering data to correct destination is Accuracy 1
Telephone is an example of Simplex 1
An internet is a Network of networks 1
When system delivers data accurately then it is called Delivery 1
Mode that is like a two way street with traffic flowing in both direction 1
simultaneously is Full Duplex
Multiple choice Q.1 What is the minimum number of wires needed to send data over it serial 1 2 3 4 2 1
communication link layer?
Which data communication method is used to send data over a serial Simplex Half duplex Full duplex All of above 3 1
communication link?

Which of the following statements is incorrect? teleprocessing Multiplexers are a half-duplex line is batch processing is 4 1
combing designed to accept a communication the preferred
telecommunication data from several line in which data processing mode for
and DP techniques I/O devices and can move in two telecommunication
in online activities. transmit a unified directions, but not operations.
stream of data on the same time.
one communication
line.

The interactive transmission of data within a time sharing system may be Simplex line Half duplex lines Full duplex line bi-flex lines 2 1
best suited to…..

Teleprinters…. are used for printing offer both high- have a printer for are same as 3 1
at remote locations, speed operation output and a teletypes
not for input and a variety of keyboard for input
formatting controls

Which of the following is an example of a bounded medium? Coaxial cable wave guide fiber optic cable All of above 4 1

Coaxial cable has conductors with…. A common axis Equal resistance the same diameter None of these 1 1

The area of coverage of a satellite radio beam is called its…. Beam width Circular Footprint Identity 3 1
Polarization
The amount of uncertainty in a system of the symbol is called. Bandwidth Entropy Loss Quantum 2 1

Buffering is…. the process of a method to reduce storage of data a method to reduce 1 1
temporarily storing cross-talks within the the routing overhead
the data to allow for transmitting medium
small variation in until the receiver is
device speeds. ready to receive

What is the main difference between synchronous and asynchronous band width required pulse height is clocking is derived clocking is mixed 3 1
transmission? is different. different. from the data in with data in
synchronous asynchronous
transmission. transmission.

The transmission signal coding method for T, the carrier is called….. NRZ Bipolar Manchester Binary 2 1

In a synchronous modem, the digital-to-analog converter sends a signal to Transmission line Modulator Terminal Equalizer 4 1
the……

Which section of a synchronous modem contains the scrambler? Terminal Section Receiver Section Control section Transmission 4 1
section
The synchronous modems are more expensive than the asynchronous they must contain production volume they must operate They are larger 1 1
modems because…. clock recovery is larger on a larger
circuits bandwidth
The receive equalizer reduces delay distortions using a….. Difference engine tapped delay lines Descrambler gear shift 2 1

How much power (approximately) a light-emitting diode can couple into an 1 Picowatt 100 Microwatts 10 Milliwatts 10 Watts 2 1
optical fiber?

Avalanche photodiode receiver can detect bits of transmitted data by 1 Photon 100 Photons 10 Photons 200 Photons 4 1
receiving.

The loss in signal power as light travels down the fiber is called. Propagation Attenuation Scattering Absorption 2 1

Multiple repeaters in communication satellites are called. Detector Modulator Transponders Stations 3 1

how many bits per symbol are used in the Baudot code? 5 7 8 9 1 1

While transmitting odd-parity coded symbols, the number of zeros in each Odd Even Unknown None of these 3 1
symbol is….

Which of the following transmission systems provides the highest data rate Digital PBX Computer Bus LAN Voiceband modem 2 1
to an individual device?

One important characteristic of LAN is… Parallel low cast access for unlimited expansion application 4 1
transmission low bandwidth independent
channel interfaces

Which of the following is possible in a token passing bus network? unlimited number of Unlimited distance In-service expansion Multiple time- 3 1
station divisions channels

Which of the following is not a characteristic of the hub architecture of Arc Directionalized Alternative routing Zero insertion loss RIM port isolation 2 1
net? transmission amplifier

A group of packets from a source through an X.25 packet system to sink. arrive in the same arrive in the same arrive in the same None of these 3 1
order sent for VC, order sent for PVC, order sent for both
but not for PVC but not for VC VC and PVC

How many OSI layers are covered in the X.25 standard? Three four two seven 1 1

A protocol is a rule governing a time sequence of events that must take Between peers across an interface between non-peers None of these 1 1
place.

What is the number of separate protocol layers at the serial interface 2 3 4 7 2 1


gateway specified by the X.25 standard?

Layer one of the OSI model is……. Physical Layer Link layer Transport layer network layer 1 1

Establishing a virtual connection is functionally equivalent to …… physically connecting a virtual placing a telephone None of these 3 1
connecting a DTE memory call prior to a
and DCE conversation

What is the main purpose of a data link content monitor? measurement of bit Determine the type Determine the type Detect problems in 4 1
error rate. of switching used in of transmission used protocols.
a data link. in a data link.

Protocol converters are …… same as same as TDMs ususlly not operated usually operated in 3 1
multiplexers in pairs pairs

Satellite transponders contain …. a receiver and a device that devices that All of above 1 1
transmitter echoes the transform the
designed to relay radiation without message sent from
microwave change from one one location on
transmission from point on earth to earth to a different
one point on earth another code for
to another transmission to
another location
Satellite transponders. use a higher use lower use a single are devices that 1 1
frequency for frequency frequency for echo the radiation
reception of reception of reception and without
radiation from earth radiation from earth transmission from
stations and lower stations and higher one point on earth to
frequency for frequency for another
transmission to transmission to
earth stations earth stations.

What frequency range is most affected by fog and precipitation? 4GHz to 6GHz 6GHz to 10GHz above 10GHz 2GHz to 4GHz 3 1

In OSI network architecture, the routing is performed by …. A data link layer Network layer Transport layer Session layer 2 1

In OSI network architecture, the dialogue control, and token management A data link layer Network layer Transport layer Session layer 4 1
are responsibilities of …...

The standard ASCII …. is version II of the has 128 is a subset of the 8- is used only in the 2 1
ASC standard characters, bit EBCDIC code United States and
including 32 control Canada
characters

Fibre-optic cables operate at frequencies near……. 20 MHz 200 MHz 2 GHz 800 THz 4 1

HF ratio waves follow how many basic paths on leaving the transmitter? two four one Many 1 1

Digital cellular radio systems…… expand the number allow multiple allow multiple extend transmission 3 1
of cells. subscribers to subscribers to share distance of
share the use of the use of a subscribers within a
cells. common channel cell.
within a cell

Transmission of binary signals require…… less bandwidth than more bandwidth same bandwidth as a Licence from the 2 1
analog than analog analog FAA
The standard first-level digital multiplex system in the United States 2.048 Mbps 44.736 Mbps 1.544 Mbps 9600 Mbps 3 1
operates at……

Modulation is……. varying of some utilization of a transmission of None of these 1 1


parameter of a single transmission pulses in DC form
carrier, such as its channel to carrying over a copper wire
amplitude to multiple signals
transmit information

RS-232, RS-449, RS-530, V-24, and X-21 are examples of? standards for standards for two methods of error standards for end- 2 1
various types of interfaces between detection and to-end performance
transmission terminals and correction of data
channels modems communication
systems

V.42 defines…. compatibility with a method of data two methods of error compatibility with 3 1
MNP Class 5 data storage detection and MNP Class 7
compression correction enhanced data
compression
A smart modem can. detect transmission correctly answer accept commands None of these 3 1
errors and correct multiple choice from the terminals
them automatically quizzes Via Rs-232 interface

Extended command sets supported by modern modems. are standardized. are prefixed with use different can be counted on 3 1
the letter E. commands to to provide a high-
control many speed data transfer
advanced modem capability without
features requiring flow control

Binary codes are sometimes transformed in modems into. Hexadecimal Huffman codes Gray codes Complemetary 3 1
codes

A Western Electric 201 modem operates with a carrier frequency of…. 1000 Hz 1200 Hz 1800 Hz 600 Hz 3 1

If a modem packs six bits into each signal change and operates at 14,400 2400 bps 4800 bps 9600 bps 14 400 bps 4 1
bps, it can result in a maximum throughput of.

Multiplexing is…. the process of a technique that mailing letters at the the capability to 2 1
increasing enables more than Post Office share frequency by
bandwidth on a one data source to time
channel share the use of a
common line
When the amplitude of pulses is varied to represent analog information, the PCM PWM PAM PPM 3 1
method is called.

The D4 framing pattern contains a sequence of …. 24 bits 4 terminals and 8 8 terminals and 4 12 bits 4 1
framing bits. framing bits
The residual error rate is the….. number of bit errors probability that one probability that one signal to noise ratio 2 1
per twenty-four or more errors will or more errors will divided by the ratio
hours of continuous be undetected be detected when of energy per bit to
operation on an when an error an error detection noise per hertz
asynchronous line detection scheme mechanism is used
is used

Which layer os international standard organization OSI model is responsible physical layer data link layer transport layer network layer 2 1
for creating and recognizing frame boundaries?

If digital data rate of 9600 bps is encoded using 8-level phase shift keying 1200 bauds 3200 bauds 4800 bauds 9600 bauds 2 1
(PSK) method, the modulation rate is….

The path or channels over which information moves from one location to lines Remote Modems File Transfer 1 1
another make-up is called. Computers

One Word Question The key distinction is that in a distributed system, a collection of MIDDLEWARE 1
independent computers appears to its users as a single coherent system is
called?
Telephone calls between employees may be carried by the computer IP TELEPHONY OR VOICE OVER IP(VoIP). 1
network instead of by the phone company where internet technology is
used, this technology is called?
Which are made up of nodes that gather and wirelessly relay information Sensor networks 1
they sense about the state of the physical world
what lets remote workers see and interact with a graphical computer screen. Desktop sharing 1

Which networks are called to be used to join the individual networks at VPNs (Virtual Private Networks) 1
different sites into one extended network?
Web application 1
In which the server generates Web pages based on its database in Point-to-point 1
response to client requests that may update the database
which links connect individual pairs of machines. unicasting 1
Point-to-point transmission with exactly one sender and exactly one receiver broadcasting 1
is sometimes called
When a packet with its code is transmitted, it is received and processed by LAN 1
every machine on the network. This mode of operation is called

which network is a privately owned network that operates within and nearby WiFi 1
a single building like a home, office or factory
There is a standard for wireless LANs called IEEE 802.11, popularly known Ethernet 1
as
The topology of many wired LANs is built from point-to-point links. IEEE Internet service provider 1
802.3, popularly called
what is full form ISP routing algorithm. 1
the network makes the decision as to which path to use is called the protocol 1

what is an agreement between the communicating parties on how protocol stack 1


communication is to proceed
A list of the protocols used by a certain system, one protocol per layer, is Store-and-forward switching 1
called
the intermediate nodes receive a message in full before sending it on to the Internet Control Message Protocol 1
next node, this is called
what is full form ICMP Advanced Research Projects Agency 1
What is full form ARPA (Digital Subscriber Line Access Multiplexer 1
What is full form DSLAM broadband 1
Internet access at much greater than dial-up speeds is called bandwidth 1
The width of the frequency range transmitted without being strongly chromatic dispersion 1
attenuated is called the
Light pulses sent down a fiber spread out in length as they propagate. This multipath fading 1
spreading is called
The delayed waves may arrive out of phase with the direct wave and thus station keeping 1
cancel the signal. This effect is called
The effects of solar, lunar, and planetary gravity tend to move them away circuit switching 1
from their assigned orbit slots and orientations, an effect countered by
onboard rocket motors. This fine-tuning activity is called

when you or your computer places a telephone call, the switching MAC (Medium Access Control) sublayer 1
equipment within the telephone system seeks out a physical path from your
telephone to the receiver’s telephone. This technique is called

The protocols used to determine who goes next on a multiaccess channel Multiple Access with Collision Avoidance 1
belong to a sublayer of the data link layer called the
what is MACA A network . A network . 1
What is a set of devices connected by physical media links? What is Link 1
recursively is a connection of two or more nodes by a physical link or two or
more networks connected by one or more nodes?

When two or more computers are connected by physical media then that Nodes 1
physical media is called?
When two or more computers are connected by a physical media then the Router or Gateway 1
connected computer at the link end is called as?
When a node that is connected to two or more networks is commonly Point-point link. 1
called?
If the physical links are limited to a pair of nodes it is said to be? Multiple Access. 1

If the physical links are shared by more than two nodes, it is said to be? Distributed processing 1

Encapsulation and distributed database are advantages of? Performance Reliability 1


What can be measured in many ways, including transmit time and response a. Number of Users, b. Type of transmission medium, c. 1
time b? What is measured by frequency of failure, the time it takes a link to Hardware, d. Software
recover from a failure, and the network's robustness?

Name the factors that affect the performance of the network? a. Frequency of failure, b. Recovery time of a network after 1
a failure
Name the factors that affect the reliability of the network? a. Unauthorized Access, b. Viruses 1
Name the factors that affect the security of the network? A protocol 1
What is a set of rules that govern all aspects of information communication? Protocols 1

Syntax-Semantics and timing are key elements of computer Network 1


Connectivity, Cost-effective Resource Sharing, Support for common Bandwidth 1
Services, Performance are all the key design issues of a?

Network performance is measured in? Routing 1


What is the process of determining systematically how to forward messages peer-peer process. 1
toward the destination nodes based on its address
What are the processes on each machine that communicate at a given Delay 1
layer?
how long it takes a message to travel from one end off a network to the Semantic gap. 1
other is known as?
The gap between what applications expects and what the underlying Rounf Trip Time 1
technology can provide is called?
The duration of time it takes to send a message from one end of a network Unicasting 1
to the other and back, is called?
If the message is sent from a source to a single destination node, it is Multiplexing 1
called?
what is the set of techniques that allows the simultaneous transmission of Multicasting 1
multiple signals across a single data link?
If the message is sent to some subset of other nodes, it is called? Frequency Division Multiplexing 1
What is an analog technique that can be applied when the bandwidth of a Wave Division Multiplexing 1
link is greater than the combined bandwidths of the signals to be
transmitted?
What multiplexing and demultiplexing involve light signals transmitted Time Division Multiplexing 1
through the fiber optics channel?
What is a digital process that can be applied when the data rate capacity of Synchronous TDM 1
the transmission medium is greater than the data rate required by the
sending and receiving devices?
What the multiplexer allocates the same time slot to each device at all Physical layer 1
times, whether or not a device has anything to transmit?
what is the lowest layer of OSI Network support layers 1
Physical Layer, Datalink Layer, Network Layers are layers of User support layers 1
Session Layer, Presentation Layer, Application Layer are layers of The Transport layer 1

Which layer links the network support layers and user support layers? Physical layer 1

Which layer coordinates the functions required to transmit a bitstream over Data Link Layer 1
a physical medium?
Which layer transforms the physical layer, a raw transmission facility, to a Network Layer 1
reliable link and is responsible for node-node delivery?

Which layer is responsible for the source-to-destination delivery of packet Transport Layer 1
possibly across multiple networks (links)?

Which layer is responsible for the source-to-destination delivery of the entire Session layer 1
message?
Which layer is the network dialog Controller? Presentation layer 1
Which layer is concerned with the syntax and semantics of the information Application Layer 1
exchanged between two systems?
Which layer enables the user, whether human or software, to access the Nodes and Links. 1
network?
What are the two classes of hardware building blocks? File transfer, access and Management (FTAM) 1
What does FTAM stand for? Terrestrial microwave , Satellite Communication 1
What are the unguided media of Transmission media? Single-Bit error 1
What is termed as in a single-bit error, only one bit in the data unit has The Presentation layer 1
changed?
Which layer is concerned with the syntax and semantics of the information The Application Layer 1
exchanged between two systems?
Which layer provides user interfaces and support for services such as e- Error Detection 1
mail, shared database management and other types of distributed
information services?
What uses the concept of redundancy, which means adding extra bits for Redundancy. 1
detecting errors at the destination?
The concept of including extra information in the transmission solely for Longitudinal Redundancy Check (LRC) 1
comparison. This technique is called?
What does LRC stand for? Burst Error 1
What is termed as where two or more bits in the data have changed? Forward error correction 1

What is the process in which the receiver tries to guess the message by Retransmission 1
using redundant bits.?
What is a technique in which the receiver detects the occurrence of an error Bit stuffing 1
and asks the sender to resend the message?
What is the process of adding one extra 0 whenever five consecutive Is Broadcasting 1
follow a 0 in the data so that the receiver does not mistake the pattern
0111110 for a flag?
If the message is sent to all the m nodes in the network it is called? Stop-and-Wait ARQ 1

What is carried out in error correction by keeping a copy of the sent frame Subnet 1
and retransmitting the frame when the timer expires
what is termed for a section of large networks usually separated by a bridge Vertical Redundancy Check (VRC) 1
or router?
What does VRC stand for NETBIOS 1
Which programming interface that allows I/O requests to be sent to and Media Access Control (MAC) 1
received from a remote computer?
Which address is usually stored in ROM on the network adapter card and is Gateway 1
unique?
Which device operates at the upper levels of the OSI model? Mesh networks 1
Which network in which there are multiple network links between computers OSPF 1
to provide multiple paths for data to travel?
Comprehension 0
ISO/OSI Network Fill in the Blanks The OSI model has _______ layers 7 1
model, Network
Components and
Network
Standards

TCP/IP model does not have ______ layer but OSI model have this layer session layer 1

Transmission data rate is decided by ___________ physical layer 1


__________ layer is responsible for process to process delivery transport 1
__________ layer links the network support layers and user support layers transport 1

Physical or logical arrangement of network is called _________ topology 1


_________ topology requires multipoint connection bus 1
Data communication system within a building or campus is________ LAN 1

________ multiplexing technique transmits digital signals TDM 1


If there are n signal sources of same data rate than TDM link has _______ n 1
slots.
The first line of HTTP request message is called _____________ Request line 1

FTP uses _________ parallel TCP connections to transfer a file 2 1


The underlying Transport layer protocol used by SMTP is ___________ TCP 1

TCP port used by SMTP is __________ 25 1


A DNS client is called ________ DNS resolver 1
Wildcard domain names start with label _______ * 1
The domain name system is maintained by _______ distributed database system 1
DHCP uses UDP port _________ for sending data to the server 67 1
DHCP client and servers on the same subnet communicate via _________ UDP broadcast 1

Communication channel is shared by all the machines on the network in broadcast network 1

A __________ is a device that forwards packets between networks by router 1


processing the routing information included in the packet.

ONT is connected to splitter using ____________ Optical cable 1


HTTP is ________ layer protocol application layer 1
FTP server listens for connection on port number 21 1
A single channel is shared by multiple signals by _____________ multiplexing 1

CRC stands for ____________________ cyclic redundancy check 1


the______________ is a data link protocol? ethernet 1
The network layer concerns with __________ Packets 1
A subset of a network that includes all the routers but contains no loops is spanning tree 1
called __________
The network layer protocol of internet is internet protocol 1
________NetWare protocol works on layer 3–network layer—of the OSI IPX 1
model
Expansion of SMTP is _____________ Simple Mail Transfer Protocol 1
In SMTP, the command to write recievers mail adress is written with this RCPT TO 1
command
Transport layer protocol used by SMTP is ____________ TCP 1
The state when dedicated signals are idle are called __________ Silent period 1

In TDM, slots are further divided into _________ Frames 1


PPP stands for ------------- Point-to-point protocol 1
A conversation on walkie-talkie is a ------------- data flow. Half-Duplex 1
In data communication, the interface between the source and the medium is DCE 1
called -------.
You can host Internet and Intranet websites on a Linux server by -------------. Apache server 1

True or False First three digits of the DNIC (Data Network Identification Code) identify the 1
country
VLAN breaks up broadcast domains in a layer 3 switch internetwork. 1

Main reason the OSI model was created is to communicate with different 1
networks
12 collision domains are created when you segment a network with a 12- 1
port switch
TCP protocol does Ping use 1
802.1Q and ISL protocols are used to configure trunking on a switch 1

Modem is used in data transmission was invented in USA in 1957 1

Computers in a Wireless LAN can be interconnected by radio and infrared 1


technologies
IP address is the address of the router 1
Network services do not include messaging. 1
A server can run on a workstation computer. 1
UTP is the cheapest cabling choice. 1
Today fiber-optic cable is the media of choice for backbone networks. 1

Wireless networking is insecure. 1


The highest capacity wireless media is satellite microware. 1
The OSI model protocol is the standard against which protocols are judged. 1

The standard protocol of the Internet is Ethernet. 1


A hub connects two different LANs. 1
A server can run on a workstation computer 1
Network services do not include messaging. 1
In a peer-to-peer network, any client computer can also be a server. 1

UTP is the cheapest cabling choice. 1


Wireless networking is insecure. 1
Today fiber-optic cable is the media of choice for backbone networks. 1

Wireless networking is insecure. 1


The highest capacity wireless media is satellite microware. 1
The OSI model protocol is the standard against which protocols are judged. 1

The standard protocol of the Internet is TCP/IP. 1


A hub connects two different LANs. 1
Morphing is the process of converting a photograph or a song into digital 1
information, or bits, which then can travel across a network.

Centralized computing is a system of large centralized computers, called 1


mainframes, used to process and store data.
Very large peer-to-peer networks have emerged to take advantage of the 1
Internet.
Network functions are associated with only one layer of the OSI model. 1

Standards assist in network design. 1


Not all Transport layer protocols are concerned with reliability. 1
Ethernet is an example of a baseband system found on many LANs. 1

Modulation can be used to make a signal conform to a specific pathway. 1

The format of ARP tables is the same from one operating system to another. 1
The command used to view IP information on a Windows workstation is 1
ipconfig.
All protocols are routable. 1
ICMP (Internet Control Message Protocol) reports on the success or failure 1
of data delivery.
A serial backbone is the simplest kind of backbone. 1
The most popular method for connecting nodes on a network is circuit 1
switching.
Modern Ethernet networks are based on the star topology. 1
It is best to perform connectivity tests on a computer connected to a live 1
network.
Advances in NIC technology are making this hardware smarter than ever. 1

Bridges are protocol independent. 1


ATM is a WAN technology that functions in the Data Link layer. 1
SONET specifies framing and multiplexing techniques at the Physical layer. 1

In a star topology, a single connection failure will halt all traffic between all 1
sites.
In CIDR, conventional network class distinctions do not exist. 1
IMAP4 servers require less storage space and usually more processing 1
resources than POP servers do.
The MIME standard replaces SMTP. 1
On a network using TCP/IP, some nodes may use multiple IP addresses. 1

The software required to establish VPNs is usually expensive. 1


PPTP and L2TP are the only protocols that can be used to carry VPN traffic. 1

Using a virtualization program, you can create dozens of different VMs. 1

By default, the 802.11 standard offers substantial security. 1


Encryption is the last means of defense against data theft. 1
IP telephones are directly connected to the local loop. 1
Multiple choice What is the minimum number of wires needed to send data over it serial 1 2 3 4 2 1
communication link layer?
Which data communication method is used to send data over a serial Simplex Half Duplex Full Duplex All of the Above 3 1
communication link?
Transmission of binary signals require…… less bandwidth than more bandwidth same bandwidth as a Licence from the 2 1
analog than analog analog FAA
The interactive transmission of data within a time sharing system may be Simplex Lines Half Duplex Lines Full Duplex Lines bi-flex Lines 2 1
best suited to…..
Teleprinters…. are used for printing offer both high- have a printer for are same as 3 1
at remote locations, speed operation output and a teletypes.
not for input. and a variety of keyboard for input
formatting control

Which of the following is an example of a bounded medium? coaxial cable wave guide fiber optic cable all of these 4 1
Coaxial cable has conductors with…. a common axis equal resistance the same diameter none of these 1 1

The area of coverage of a satellite radio beam is called its…. beam width circular polarization footprint identity 3 1

The amount of uncertainty in a system of the symbol is called. bandwidth entropy loss quantum 2 1
Buffering is…. the process of a method to reduce storage of data a method to reduce 1 1
temporarily storing cross-talks within the the routing overhead
the data to allow for transmitting medium
small variation in until the receiver is
device speeds. ready to receive

What is the main difference between synchronous and asynchronous band width required pulse height is clocking is derived clocking is mixed 3 1
transmission? is different. different. from the data in with data in
synchronous asynchronous
transmission. transmission.

The transmission signal coding method for T, the carrier is called….. NRZ Bipolar Manchester Binary 2 1

The synchronous modems are more expensive than the asynchronous they must contain production volume they must operate They are larger 1 1
modems because…. clock recovery is larger on a larger
circuits bandwidth
Which of the following is not a software firewall? Windows Firewall Outpost Firewall Endian Firewall Linksys Firewal 4 1
Pro
A firewall protects which of the following attacks? Windows Firewall Outpost Firewall Endian Firewall Linksys Firewal 3 1
Pro
Which of these comes under the advantage of Circuit-level gateway Phishing Dumpster diving Denial of Service Shoulder surfing 1 1
firewalls? (DoS)
Which of these comes under the advantage of Circuit-level gateway They maintain They are light- They’re expensive They preserve IP 3 1
firewalls? anonymity and also weight yet efficient address privacy yet
inexpensive expensive
Which of the following is a disadvantage of Circuit-level gateway firewalls? They’re expensive They’re complex in They do not filter They’re complex to 3 1
architecture individual packets setup

Stateful Multilayer Inspection firewall cannot perform which of the following? Filter network layer Check for Scans for illicit data Evaluate packets at 3 1
packets legitimate session packets at the application lager
presentation layer

A proxy firewall filters at the Physical layer Application layer Data link layer Network layer 2 1

A packet.filter firewall filters at the Application or Data link layer Physical Layer Network or transport 4 1
transport layer
A firewall is a ______security system: etwork File Program None of These 1 1
A firewall is a network security system ______based that controls incoming Hardware Software Both hardware or None of These 3 1
and outgoing network traffic based on a set of rules: software
Which among the following is correct: A firewall is a Firewalls can be Both of Above None of these 3 1
system designed to implemented in
prevent both hardware and
unauthorized software or a
access to or from a combination of
private network. both.

Firewalls are frequently used to prevent unauthorized internet users from Intranets Extranets Both of Above None of These 1 1
accessing private networks connected to the internet especially ____:

Firewalls are used to protect: Home Networks Corporate Both of Above None of These 3 1
Networks
If you have more than one computer connected in the home, it is important Hardware Software HTML None of These 1 1
to protect every computer. You should have a ____firewall (such as a
router) to protect your network:
____intercepts all messages entering and leaving the network. The Circuit Level Proxy Server Packet Filter None of These 2 1
_____effectively hides the true network addresses: Gateway
Which among the following is correct characteristics about proxy server: A proxy server may A proxy server is a It performs its tasks All of the Above 4 1
act as a firewall by gateway from one or functions as a
responding to input network to another proxy on behalf of
packets in the for a specific the network user;
manner of an network
application while application
blocking other
packets.

Application layer firewalls works on the application level of the ____stack TCP IP Both of Above None of These 3 1
(i.e. all browser traffic or all telnet or FTP traffic) and may intercept all
packets travelling to or from an application:
What layer in the TCP/IP stack is equivalent to the Transport layer of the Application Host-to-Host Internet Network Access 2 1
OSI model?
Which class of IP address provides a maximum of only 254 host addresses Class A Class B Class C Class D 3 1
per network ID?
If you use either Telnet or FTP, which is the highest layer you are using to Application Presentation Session Transport 1 1
transmit data?
Which of the following is the decimal and hexadecimal equivalents of the 155, 0x9B 157, 0x9D 159, 0x9F 185, 0xB9 2 1
binary number 10011101?
Which layer 4 protocol is used for a Telnet connection? IP TCP TCP/IP UDP 2 1
Port number 80 is TCP SMTP HTTP none of these 3 1
Port number 21 is TCP SMTP HTTP FTP 4 1
Port number 554 is HTTPS HTTP HTP TCP 1 1
128 bit IP version IPv4 IPv3 IPv6 IP 3 1
No of bits in IPv4 28 16 8 32 4 1
Connection less oriented protocol TCP TCP/IP HTTP UDP 4 1
Connection oriented protocol TCP TCP/IP HTTP UDP 1 1
Which principle works in DHCP DORA DoS DDoS none of these 1 1
12.0.0.1 is example of Class A Class B Public IP Private IP 3 1
192.168.2.3 is example of Class B Class C Public IP Private IP 4 1
In ISO which layer concern with packet Physical Data link Network Transport 3 1
Application layer protocol TCP SMTP HTTP FTP 3 1
Port number 25 is for TCP TCP/IP HTTP UDP 1 1
Which is built on client server architecture TCP SMTP HTTP FTP 4 1
Which layer offers end to end services Session Application Transport Network 2 1
Technique used in TDM division time multipication Multiplexing none of these 3 1

When a Topology is called Hybrid only one topology only two topologies combination of two none of these 3 1
or more topologies

Name the protocol used in transport layer UDP & TCP TCP/IP HTTP All of these 1 1
Which ISO layer has 4 layers UDP & TCP TCP/IP HTTP All of these 2 1
IP Range of 192-223 is Class A Class B Class C Class D 3 1
The Internet model consists of layers 3 5 7 8 2 1
The process to process delivery of the entire message is the responsibility network transport application physical 2 1
of the _____layer
The _______layer is the layer closet to the transmission mediem physical Data link Network Transport 1 1
Mail Services are available to network users through the ___________layer data link Physical Transport Application 4 1

The ______layer lies between the network layer and the application layer Physical Data link Transport None of These 3 1

One Word Question Which One Is Reliable – Tcp Or Udp? TCP 1


What Is The Port Number Of FTP? FTP port number 21 1
Which Layer Provides Logical Addressing That Routers Will Use For Path Network Layer 1
Determination?
Which Layer Specifies Voltage, Wire Speed, And Pinout Cables And Moves Physical 1
Bits Between Devices?
Which Layer Combines Bits Into Bytes And Bytes Into Frames, Uses Mac Data Link Layer 1
Addressing, And Provide Error Detection?
Which Layer Is Responsible For Keeping The Data From Different Session 1
Applications Separate On The Network?
Which Layer Is Responsible For Converting Data Packets From The Data Physical 1
Link Layer Into Electrical Signals?
Which Layer Defines How Data Is Formatted, Presented, Encoded, and Presentation Layer 1
Converted For Use On The Network?
DNS Uses Which Protocol? DNS uses both TCP and UDP 1
How many digits of the DNIC (Data Network Identification Code) identify the first three 1
country?
Frames from one LAN can be transmitted to another LAN via the device Bridge 1

Which of the following condition is used to transmit two packets over a Collision 1
medium at the same time?
What are the most commonly used transmission speeds in BPS used in 9600 1
data communication?
What is the default subnet mask for a class C network? 255.255.255.0 1
Which of the following is used for modulation and demodulation? modem 1
How many hosts are attached to each of the local area networks at your 254 1
site?
Which of the following TCP/IP protocol is used for transferring electronic SMTP 1
mail messages from one machine to another?
Which of the following device is used to connect two systems, especially if repeater 1
the systems use different protocols?
A distributed network configuration in which all data/information pass star network 1
through a central computer is
A remote batch-processing operation in which data is solely input to a simplex lines 1
central computer would require a:
If you get both local and remote echoes, every character you type will twice 1
appear on the screen
What part of 192.168.10.51 is the Network ID, assuming a default subnet 192.68.10 1
mask?
The slowest transmission speeds are those of twisted-pair wire 1
A noiseless 3 kHz Channel transmits bits with binary level signals. What is 6 kbps 1
the maximum data rate?
What can greatly reduce TCP/IP configuration problems? DHCP Sserver 1
Nowadays computers all over the world can talk to each other. Which is one Modem 1
of the special accessories essential for this purpose?

In OSI network architecture, the routing is performed by network layer 1


Which of the following communications lines is best suited to interactive mixed band channels 1
processing applications?
QoS stands for Quality of service 1
Which architecture are reliant on middle-ware? Distributed component architecture 1
Which architecture decentralized architectures in which there are no Peer-to-peer architecture 1
distinguished clients and servers?
Service-Oriented Architecture (SOA) is Loosely Coupled 1
Which architecture will be built on top of a SOA? The Application Architecture 1
Which architecture describes the various elements that support the The Component Architecture 1
implementation of services.
RTOS stands for real-time operating system 1
The times by which stimuli must be processed and some response Deadlines 1
produced by the system is known as
The switch to backup power must be completed within a deadline of 50 ms 1

The average execution time of the power monitor process should be less 1ms 1
than
The transparency that enables multiple instances of resources to be used, is Replication transparency 1
called
A paradigm of multiple autonomous computers, having a private memory, Distributed computing 1
communicating through a computer network, is known as

Cloud computing and web service platforms are focused on applications like HTC 1

Type of architecture that is considered responsible for the success of? n-tier architecture 1
application servers are said to be
A global system of interconnected computer networks is known as Internet 1
CPS stands for Cyber-physical system 1
Grid and cloud platforms are regarded as Utility service providers 1
Connections that grows exponentially into a new dynamic network of Dynamic 1
networks, is known as
In the grid computing model, servers or personal computers run Independently 1
An architecture that moves the client's query to a middle-tier so that Three-tier architecture 1
stateless clients can be used is called
Routing, IP Addressing and Path determination are the main responsibilities Network Layer 1
of Which layer
Which Layer is Responsible for Framing, Error detection, CRC and Physical Data Link Layer 1
Addressing
Multiplexing and De-Multiplexing is responsible for which layer Transport Layer 1
Segmentation and Re-assembly is responsible for which layer Transport Layer 1
Flow Control is responsible for which layer Transport Layer 1
Error Correction is responsible for which layer Transport Layer 1
Connection Establishment is responsible for which layer Transport Layer 1
Sequencing is responsible for which layer Transport Layer 1
Acknowledgment is responsible for which layer Transport Layer 1
3-way Handshake is responsible for which layer Transport Layer 1
Which control provides error detection, using Ethernet trailer field frame Logical Link 1
check sequence (FCS).
What Is The Port No Of Dns And Telnet? DNS = 53, Telnet = 23 1
Which Service Use Both TCP And UDP DNS 1
What Is The Port No Of Smtp SMTP = 25 1
ISO developed a standard model of computer data communication system OSI 1
which is known as
The layer of the computer OSI model which furnishes electrical connections Physical 1
and signaling is known as
The layer of the computer OSI model which performs data compression is Physical 1

The layer of computer OSI model which is concerned with addressing and Network 1
routing is called
The layer of the computer OSI model which provides services that directly Application 1
supports user application is
CMM stands for Capability Maturity Model 1
Which series of standards is a set of documents ISO 9000 1
According to ISO 9001, the causes of a nonconforming product should be eliminated and identified 1

ISO 9001 is not concerned with quality records. Verification 1


Which is not a maturity level in CMM? Managed 1
What states that, where appropriate, adequate statistical techniques are ISO 9000 1
identified and used to verify the acceptability of process capability and
product characteristics.
In an IPv4 datagram, the M bit is 0, the value of HELEN is 10, the value of Last fragment, 2400 and 2759 1
total length is 400 and the fragment offset value is 300. The position of the
datagram, the sequence numbers of the first and the last bytes of the
payload, respectively are
One of the header fields in an IP datagram is the Time to Live(TTL)field. It can be used to prevent packet looping 1
Which of the following statements best explains the need for this field?

Consider the data given in the above question. Suppose the weights of all 1 1
unused links in the previous question are changed to 2 and the distance
vector algorithm is used again until all routing tables stabilize. How many
links will now remain unused?
For which one of the following reasons does Internet Protocol (IP) use the Prevent packets from looping indefinitely 1
time to- live (TTL) field in the IP datagram header
Every host in an IPv4 network has a 1-second resolution real-time clock with 256 1
battery backup. Each host needs to generate up to 1000 unique identifiers
per second. Assume that each host has a globally unique IPv4 address.
Design a 50-bit globally unique ID for this purpose. After what period (in
seconds) will the identifiers generated by a host wrap around?

Station A needs to send a message consisting of 9 packets to Station B 16 1


using a sliding window (window size 3) and go-back-n error control strategy.
All packets are ready and immediately available for transmission. If every
5th packet that A transmits gets lost (but no acks from B ever get lost), then
what is the number of packets that A will transmit for sending the message
to B?

In a packet-switching network, packets are routed from source to destination 9 1


along a single path having two intermediate nodes. If the message size is
24 bytes and each packet contains a header of 3 bytes, then the optimum
packet size is:
Which one of the following fields of an IP header is NOT modified by a Source address 1
typical IP router?
In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP 158 1
address of the network which can be assigned to a host is ________

If a Company requires 60 hosts then What is the best possible subnet 255.255.255.192 1
mask?
In class C, if the subnet mask is 255.255.255.224 then calculate a number 8 1
of subnets?
An IP datagram of size 1000 bytes arrives at a router. The router has to 13 1
forward this packet on a link whose MTU (maximum transmission unit) is
100 bytes. Assume that the size of the IP header is 20 bytes. The number of
fragments that the IP datagram will be divided into for transmission is: Note:
This question was asked as Numerical Answer Type.

Host X has IP address 192.168.1.97 and is connected through two routers 3 1


R1 and R2 to another host Y with IP address 192.168.1.80. Router R1 has
IP addresses 192.168.1.135 and 192.168.1.110. R2 has IP addresses
192.168.1.67 and 192.168.1.155. The netmask used in the network is
255.255.255.224.

The IP address __________ is used by hosts when they are being booted. 0.0.0.0 1

Consider the given network implementation scenario. For the given classful 199.10.20.225 to 199.10.20.238 1
NID 199.10.20.0/24, the requirement is to create 13 subnets. With given
details, find the range of first and last valid IP in the 15th subnet.

Comprehension 0
Internet Protocols Fill in the Blanks Firewalls can be of _______ kinds. 3 1
concepts of
firewall, cloud
technology

_________________ is the kind of firewall is connected between the device Hardware Firewall 1
and the network connecting to internet.
_________ is software that is installed using internet connection or they Software Firewall 1
come by-default with operating systems.
Firewall examines each ____________ that are entering or leaving the data packets 1
internal network.
There are ______ types of firewall. 4 1
Packet filtering firewalls are deployed on ________ routers 1
In the ______________ layer of OSI model, packet filtering firewalls are Network layer 1
implemented.
The __________ defines the packet filtering firewall rules. Access Control List 1
ACL stands for _____________ Access Control List 1
When a packet does not fulfil the ACL criteria, the packet is _________ dropped 1

Network administrators can create their own ACL rules based on _______ Address, Protocols and Packet attributes 1
________ and _______
One advantage of Packet Filtering firewall is __________ less costly 1
Packet filtering firewalls work effectively in _________ networks. smaller 1
Packet filtering firewalls are vulnerable to __________ spoofing 1
Circuit-level gateway firewalls are installed in _______ layer of OSI model. Session layer 1

_____________ gateway firewalls are deployed in application-layer of OSI Application-level Gateway Firewalls 1
model.
Application level gateway firewalls protect the network for specific application layer protocol 1
_____________
___________ firewalls are a combination of other three types of firewalls. Stateful Multilayer Inspection 1

We can also implement ____________ in Stateful Multilayer Inspection algorithms 1


firewall.
One advantage of Stateful Multilayer Inspection firewall is __________ complex internal architecture 1

Packet filtering firewalls are also called ____________ first generation firewalls 1
Stateful Multilayer firewalls are also called ____________ second generation firewalls 1
Application layer firewalls are also called ____________ third generation firewalls 1
PPP stands for -------------. Point-to-point protocol 1
A conversation on walkie-talkie is a ------------- data flow. Half-Duplex 1
In data communication, the interface between the source and the medium is DCE 1
called -------.
You can host Internet and Intranet websites on a Linux server by ------------- Apache server 1

The connection between the modem and terminal/computer is a ------------- Digital 1

Routers are part of the ------------- layer Data link 1


A computer network that spans a relatively large geographical area is called WAN 1
------
WAN stands for ---------- Wide Area Network 1
ISP denotes ------------- Internet service provider 1
Ethernet uses an access method called ------------- CSMA/CD 1
A modem is a ------------- device Bidirectional 1
. ------------- is a protocol which allows users to download E Mail messages IMAP 1
from mail server to a local computer.
. ------------- is used to access and operate a remote computer on a network. Telnet 1
. ------------- is the service in Windows 2000 that allows computers to RAS 1
connect to the server using Dial Up networking facility.
. Gateways used in VPN are called ------------- gateways. Tunneling 1
. -----------is a way of sending several channels over a single line. Multiplexing 1
. -------------_ provides ISP in India. VSNL 1
True or False An ISP is an organization that buys a relatively high-speed live from a 1
telecommunication organization.
DARPA was a group behind internet. 1
Web server is a simple program. 1
The web server does not waits and listens the requests from Web browsers. 1

To access the Web the user opens a program called a Web browser. 1

HTTP is hyper text transfer protocol. 1


FTP is used for transferring files between networks. 1
WWW came into exist in 1980. 1
Tags are used only for mark up language. 1
The mark up language is a programming language. 1
The language used for designing documents is HTML. 1
The full form of HTML is hyper text making language. 1
The process of interaction between the browser and Web server is defined 1
by the HTTP.
Secure Socket Protocol is not a security protocol in WWW. 1
CGI stands for common gateway interaction. 1
Intranets are local network of networks. 1
Internet is not a global phenomenon. 1
When different organizations comes forth to form a unity using network of 1
computers is Extranet.
Web server is software which remains in that computer and so called server. 1

Client is a called module. 1


Yahoo.com is a domain name. 1
A home page is the welcome screen of an organization site. 1
IP addresses are addresses which are numbers by which a computer can 1
be located in the internet.
DNS stands for domain name system. 1
URL denotes uniform resource location. 1
IP address is a sequence of four digit numbers separated by comma. 1

A tag is always in between “<” and “>” symbols. 1


A modem converts digital signals to analog signals only. 1
Google is a search engine. 1
Password is necessary for sending a mail. 1
E mail stands for electronic mail. 1
A virus may get into your computer, only by copying an infected file into your 1
computer.
Fire is an anti-virus software. 1
Parasitic virus is a type of virus. 1
The ARPANET stands for Advanced Research Projects Area. 1
A LAN is connected to large geographical area. 1
In a multipoint network addition of new computers to the network is difficult. 1

In a ring topology nodes are arranged in ring pattern. 1


A very popular LAN is Ethernet. 1
Tim Berners-Lee proposed WWW. 1
A client is the computer that asks for the action. 1
Usenet is a new group. 1
Gopher is not a program. 1
A computer is identified by 64 bit IP address. 1
The domain name .com stands for computational purpose. 1
The domain name .edu stands for educational institutions. 1
ASCII stands for American Standard Code For Interchange Information. 1

The Arpanet was the predecessor of Intranet. 1

Telnet is a newsgroup. 1
Applet program does not support internet. 1
Descriptive and locative are two types of domain names. 1
We cannot use headphone and webcamera for chatting purpose. 1
The finger tells you whether or not a person is on a particular computer. 1

A mailing list is also called mail group. 1


We cannot send a mail message with same contents to several persons at a 1
time.
It is unable to open a webpage without its website. 1
BSNL also provides ISP in India. 1
If we want to get files from the internet it is called downloading. 1
We can purchase and sale goods through Internet. 1
There is only one search engine in internet. 1
Multiple choice Which of the following is not a software firewall? Windows firewall Outpost firewall pro endian firewall Linksys firewall 4 1

A firewall protects which of the following attacks? Phishing Dumpster diving Denial of Shoulder surfing 3 1
Services(DoS)
Which of these comes under the advantage of Circuit-level gateway They maintain They are light- They're expensive They preserve ip 1 1
firewalls? anonymity and also weight yet efficient address privacy yet
inexpensive expensive
Which of the following is a disadvantage of Circuit-level gateway firewalls? They are They are conmplex They do not filter They are comlex to 3 1
expensive in architecture individual packets setup

Stateful Multilayer Inspection firewall cannot perform which of the following? Filter network layer Check for Scans for illicit data Evaluate packets at 3 1
packets legitimate session packets at the application lager
presentation layer

A proxy firewall filters at the physical layer Application layer Data link layer Network layer 2 1

A packet.filter firewall filters at the Application or Data link layer Physical layer Network or 4 1
Transport Transport layer
A firewall is a ______security system: Network File Program None of these 1 1
A firewall is a network security system ______based that controls incoming Hardware Software both 1 and 2 None of these 3 1
and outgoing network traffic based on a set of rules:
Which among the following is correct: A firewall is a Firewalls can be both 1 and 2 None of these 3 1
system designed to implemented in
prevent both hardware and
unauthorized software or a
access to or from a combination of
private network. both.
Firewalls are frequently used to prevent unauthorized internet users from Intranets Extranets both 1 and 2 None of these 1 1
accessing private networks connected to the internet especially ____:

Firewalls are used to protect: Home Networks Corporate both 1 and 2 None of these 3 1
Networks
If you have more than one computer connected in the home, it is important Hardware Software HTML None of these 1 1
to protect every computer. You should have a ____firewall (such as a
router) to protect your network:
____intercepts all messages entering and leaving the network. The Circuit Level Proxy Server Packet Filter None of these 2 1
_____effectively hides the true network addresses: Gateway
Which among the following is correct characteristics about proxy server: A proxy server may A proxy server is a It performs its tasks All of above 4 1
act as a firewall by gateway from one or functions as a
responding to input network to another proxy on behalf of
packets in the for a specific the network user;
manner of an network
application while application
blocking other
packets.
Application layer firewalls works on the application level of the ____stack TCP IP both 1 and 2 None of these 3 1
(i.e. all browser traffic or all telnet or FTP traffic) and may intercept all
packets travelling to or from an application:
Which of the following services use TCP? 1. DHCP 2. SMTP 3. HTTP 4. 1 AND 2 2, 3 and 5 1, 2 and 4 1, 3 and 4 2 1
TFTP 5. FTP
What layer in the TCP/IP stack is equivalent to the Transport layer of the Application Host-to-Host Internet Network access 2 1
OSI model?
Which of the following describe the DHCP Discover message?1. It 1 only 1 and 2 3 and 4 4 only 2 1
uses FF:FF:FF:FF:FF:FF as a layer two broadcast, 2. It uses UDP as the
Transport layer protocol, 3. It uses TCP as the Transport layer protocol, 4 .It
does not use a layer two destination address.

You want to implement a mechanism that automates the IP configuration, SMTP SNMP DHCP ARP 3 1
including IP address, subnet mask, default gateway, and DNS information.
Which protocol will you use to accomplish this?
Which of the following is private IP address? 12.0.0.1 168.172.19.39 172.15.14.36 192.168.24.43 4 1
Which of the following allows a router to respond to an ARP request that is Gateway DP Reverse ARP Proxy ARP Inverse ARP (IARP) 3 1
intended for a remote host? (RARP)

The DoD model (also called the TCP/IP stack) has four layers. Which layer Application Host-to-Host Internet Network access 3 1
of the DoD model is equivalent to the Network layer of the OSI model?
Which of the following services use UDP? 1. DHCP 2. SMTP 3. SNMP 4. 1, 3 and 6 2 and 4 1, 2 and 4 All of above 1 1
FTP 5. HTTP 6. TFTP
Which class of IP address provides a maximum of only 254 host addresses Class A Class B Class C Class D 3 1
per network ID?
If you use either Telnet or FTP, which is the highest layer you are using to Application Presentation Session Transport 1 1
transmit data?
Which of the following is the decimal and hexadecimal equivalents of the 155, 0x9B 157, 0x9D 159, 0x9F 185, 0xB9 2 1
binary number 10011101?
Which statements are true regarding ICMP packets?1. They acknowledge 1 only 2 and 3 3 and 4 2, 3 and 4 3 1
receipt of a TCP segment. , 2. They guarantee datagram delivery. , 3. They
can provide hosts with information about network problems. , 4. They are
encapsulated within IP datagrams.

Which of the following are layers in the TCP/IP model?1. Application , 2. 1 and 2 1, 3 and 4 2, 3 and 5 3, 4 and 5 2 1
Session , 3. Transport , 4. Internet , 5. Data Link , 6. Physical

Which layer 4 protocol is used for a Telnet connection? IP TCP TCP/IP UDP 2 1
Which statements are true regarding ICMP packets? 1. ICMP guarantees 1 only 2 and 3 1 and 4 All of above 2 1
datagram delivery. , 2. ICMP can provide hosts with information about
network problems , 3. ICMP is encapsulated within IP datagrams. , 4. ICMP
is encapsulated within UDP datagrams.

Which of the following are TCP/IP protocols used at the Application layer of 1 and 3 1, 3 and 5 3, 4 and 5 All of above 3 1
the OSI model? 1. IP 2. TCP 3. Telnet 4. FTP 5. TFTP

What protocol is used to find the hardware address of a local device? RARP ARP IP ICMP 2 1
Which of the following protocols uses both TCP and UDP? FTP SMTP TELNET DNS 4 1
What is the address range of a Class B network address in binary? 01xxxxxx 0xxxxxxx 10xxxxxx 110xxxxx 3 1
Which of the following products have SOA management tool? HP Software and IBM Tivoli Oracle BPEL All of above 4 1
Solutions OpenView Framework Process Manager
SOA Manager Composite
Application
Manager
Point out the wrong statement. A service in SOMF An atomic service SOA describes a All of above 2 1
that is granular and can be distributed collection
very narrow in decomposed into of services
scope is referred to smaller services performing business
as an atomic that provide a process functions
service useful function

Point out the wrong statement. The massive scale Soft computing Cloud computing All of above 2 1
of cloud computing represents a real makes the long-held
systems was paradigm shift in dream of utility
enabled by the the way in which computing possible
popularization of systems are with a pay-as-you-
the Internet deployed go, infinitely
scalable, universally
available system

Which of the following is essential concept related to Cloud? Reliabiltiy Productivity Abstraction All of above 3 1

Point out the wrong statement. All applications With cloud Cloud computing is None of these 1 1
benefit from computing, you can revolutionary, even if
deployment in the start very small and the technology it is
cloud become big very built on is
fast evolutionary

Which of the following cloud concept is related to pooling and sharing of Polymorphism Abstraction Virtualization None of these 3 1
resources?
Which of the following can be identified as cloud? Web Applications Intranet Hadoop All of above 3 1

Which of the following is Cloud Platform by Amazon? Azure AWS Cloudera All of above 2 1

A hybrid cloud combines multiple clouds where those clouds retain their Public Private Community Hybrid 4 1
unique identities but are bound together as a unit.

dimension corresponds to two different states in the eight possible cloud Physical location of Ownership Security boundary None of these 4 1
forms. data

Which of the following is not a cloud stakeholder? Cloud providers Clients End users Cloud users 2 1

Which of the following is not a type of cloud? Private Public Protected Hybrid 3 1
Most of the cloud architectures are built on this type of architecture. Skeleton Grid Linear Template 2 1

SaaS stands for? Software as a System Software Software as a System as a service 1 1


service and services system

What tells a firewall how to reassemble a data stream that has been divided The source routing The number in the The destination IP The header 1 1
into packets? future header’s address checksum field in
identification field the packet header

Network layer firewall works as a Frame Filter Packet Filter both 1 and 2 None of these 2 1
Network layer firewall has two sub-categories as State full firewall Bit oriented firewall Frame firewall and None of these 1 1
and stateless and byte oriented packet firewall
firewall firewall
Which of the following is / are the types of firewall? a) Packet Filtering b) Dual Homed c) Screen Host All of above 1 1
Firewall Gateway Firewall Firewall

A proxy firewall filters at? Physical layer Data link layer Network layer or Application layer c 1
Transport layer
What is the format of IP address? 32 bit 64 bit 16 bit 32 bit 4 1
Version 6 of IP address has how many bits. 64 bits 128 bits 32 bits 256 bits 2 1
How many version /s of IP’s are there? 4 versions 3 versions 2 versions 1 versions 3 1
Many desktops and operating systems include which protocol? IPv6 protocol IPv4 protocol both 1 and 2 IPv3 protocol 1 1
IANA stands for __________ Internet Assigned Internal Assigned Internet Associative Internal Associative 1 1
Numbers Authority Numbers Authority Numbers Numbers Authority
Authoritative

Which applications are designed for end-users delivered over the web ? SaaS PaaS LaaS None of these 1 1

One Word Question NAT stands for: Network Address Translation 1

A server that acts like this kind of node often also acts like a proxy server Gateway 1
and a firewall server.
This is a computer host or small network that functions as a neutral zone DMZ 1
between a company's private network and the outside public network

This is a private data network that makes use of the public VPN 1
telecommunication infrastructure, maintaining privacy through the use of a
tunneling protocol and security procedures.
A simple firewall might screen requests to make sure they come from Internet Protocol 1
acceptable (previously identified) domain name and ______ _____
addresses
This is a set of rules that governs what is and what is not allowed through Rule Base 1
the firewall.
This is a protocol that a proxy server can use to accept requests from client Socks 1
users in a company's network so that it can forward them across the
Internet.
This is a firewall facility that can monitor the state of active connections and Dynamic Packet Filter 1
use this information to determine which network packets to allow through
the firewall.
This the only host computer that a company allows be addressed directly Bastion Host 1
from the public network -- it is designed to screen the rest of its network
from security exposure.
which computing refers to applications and services that run on a distributed Cloud 1
network using virtualized resources.
Cloud computing is an abstraction based on the notion of pooling physical Virtual 1
resources and presenting them as a which resource.
What is the name of the Cloud Platform by Amazon? AWS 1
Which model consists of the particular types of services that you can access Service 1
on a cloud computing platform.
Location and management of the cloud’s infrastructure is known as Deployment 1

Name the computer code which will be used to implement load balancing? Apache mod_proxy_balancer 1

The Cloud Cube model is mainly used for secure collaboration. Cloud Cube 1
High encryption of data transfers is carried out preferably end-to-end, but at 128 bit Encryption 1
least for the data that is transferred over the Internet.
The service does not support backup on the Linux platform? Backblaze 1
visualization is most commonly achieved through a mapping mechanism Storage 1
where a logical storage address is translated into a physical storage
address
The image makes a copy or a clone of the entire computer system inside a System Image 1
single container such as a file.
An open standard for storing a system image OVF 1
Cloud standardized in order to appeal to the majority of its audience SLAs 1

The utility is used to monitor traffic in Windows Microsoft Network Monitor 1


Which provides system resource access to virtual machines? VMM 1
One advantage of Packet Filtering firewall is __________ less costly 1
Packet filtering firewalls work effectively in _________ networks. smaller 1
Circuit-level gateway firewalls are installed in _______ layer of OSI model. Session layer 1

Stateful Multilayer firewalls are also called ____________ second generation firewalls 1

What is a system designed to prevent unauthorized access to or from a A firewall 1


private network ?
What Is is a small hardware device that the owner carries to authorize A security token (sometimes called an authentication token) 1
access to a network service?
What is a security mechanism to determine access levels or user/client Authorization . 1
privileges related to system resources including files, services, computer
programs, data and application features?
What occurs when the privileges associated with a particular user account Privileged account abuse . 1
are used inappropriately or fraudulently, either maliciously, accidentally or
through willful ignorance of policies?
What is a server that acts as an intermediary for requests from clients Proxy server 1
seeking resources from other servers?
What is a file that records either events that occur in an operating system or a log file / logging 1
other software?
What are capable of protecting the internal networks of businesses, Network Firewalls 1
educational institutions or homes from external intrusions?
What is a piece of firewall software that runs on an individual computer or A host-based firewall . 1
device connected to a network?
What is a malicious attack perpetrated on a network or computer system by An insider attack . 1
a person with authorized system access?
What is a device that joins together two different networks? A gateway 1
How To Enable Firewall In Windows XP? Using control pannel - windows firewall setting. 1
What is a form of firewall that controls input, output, and/or access from, to, An application firewall . 1
or by an application or service?
What is the transmission of data intended for use only within a private, Tunneling router 1
usually corporate network through a public network?
Which router performs packet-filtering and is used as a firewall? A screening router 1
Which router sits at the periphery of a network? Access router 1
which list in a computer file system, is a list of permissions attached to an Access-control list (ACL) 1
object?
Which authentication is a family of protocols in which one party presents a challenge–response authentication 1
question and another provides a valid answer
What is a type of malware that spreads copies of itself from computer to A computer worm 1
computer.?
What tunneling router is also known as? Port forwarding 1
What is a filter that examines packets against a set of defined rules in order A firewall 1
to decide whether to allow the packets through?
What does TCP/IP stand for ? which is a set of networking protocols that Transmission Control Protocol/Internet Protocol, . 1
allows two or more computers to communicate?
How is communication between computers established using? Internet 1
Which is the protocol used by computers connected to the Internet? TCP/IP 1

What is an identifying number for network hardware connected to a An IP address 1


network? Why is it needed?
What is used for organizing data in a way that ensures the secure Transmission Control Protocol 1
transmission between the server and client?
What also provides controlled access to authorized customers, vendors, An extranet 1
partners, or others outside the company?
What is a connection method used to add security and privacy to private A Virtual Private Network 1
and public networks, like WiFi Hotspots and the Internet?
What are most often used by corporations to protect sensitive data? Virtual Private Networks 1

Bridge devices work at which layer of the OSI model? Data link layer 1
What guarantees the integrity of data sent over the network, regardless of Transmission Control Protocol 1
the amount?
What do we need to access the web? Web Browsers 1
Which term is stated that is a global computer network providing a variety of Internet 1
information and communication facilities?
What does WWW stand for? World Wide Web 1
Which term is used to describe a chunk of IP data? Datagram or Packet 1
Which includes connections through one or more gateway computers to the Intranet 1
outside Internet?
Which access method is used by Ethernet CSMA/CD 1
How many bits is of Standard IP address? 32 bits 1
ATM, Broadband access, Frame relay, PPP, SONET there all are key WAN protocols 1
protocols of?
A group of computers and network devices connected together, usually LAN (Local Area Network) 1
within the same building are known as?
What refers to copying in/out one or more pages of the address space? Paging 1

What is “EUCALYPTUS” stands for? Elastic Utility Computing Architecture 1


Name the applications that work with cloud computing that have low The Low touch applications 1
margins and usually low risk with Reason.
On-demand self-service and Broad network access are the attributes of? Cloud computing 1

Which applications are designed for end-users delivered over the web? SaaS 1
Which is the set of tools and services designed to make the coding and PaaS
deploying those applications quick and efficient?

What are Application and desktop virtualization of? Virtualization technology 1


What is the FC in distributed operations? Master–Slave operations 1
What are Hypervisors also known as? Storage Hypervisors 1
On which stack does Heroku base? SaaS 1
Do we source cloud computing platform databases? MongoDB 1
What are the advantages of cloud services? Cost saving 1
Use of fault Domains is which type of characteristics of cloud computing? reliability 1

What does AMI stand for? Amazon Machine Image 1


On which scale is apache Hadoop being used in cloud computing? large-scale 1

Amazon machine image is a copy of which file system Root file system 1
Identity management comes under which management of cloud security management 1
computing?
What does AWS stand for? Amazon Web Services 1
What type of workloads is managed and handled by cloud architecture? Dynamic 1

In Amazon, the backup storage is maintained by which volumes by Inserting EBS volumes 1
the snapshot facility?
What does Caas stand for? Communications as a Service (CaaS) 1
Which computing is a plug-in managed by an organization which decides Utility computing 1
what type of services has to be deployed from the cloud?

Comprehension 0
Information Security Computer viruses Fill in the Blanks Memory Resident Virus hides in _____ RAM 1

________ virus affects the boot sector of a hard disk by altering the boot Boot Sector VIRUS 1
data
Virus affecting the instructions that are capable of performing series of task Macro VIRUS 1
in a single go are called _________
The virus that encrypt or encode themselves in a different way whenever Polymorphic VIRUS 1
they are executed ,making it difficult for antivirus to catch them are known
as ___________
The virus that hides in the complex codes of webpage’s are called Web Scripting Virus 1
_________
The program which appear to be useful software but will actually do damage Trojans 1
once installed are termed as _____________
A type of virus which replicates very fast without the need of host file is Worms 1
called ___________
The virus that can physically damage computer hardware like processor, No such virus is present 1
chips etc are called ______
A virus which can gather information by conducting human like activity is Bots 1
called ________
______________ will not help in keeping the computer virus free. Use of wireless internet 1

There are _________ types of computer virus. 10 1


Which of the following is not a type of virus Trojans 1
A computer ________ is a malicious code which self-replicates by copying virus 1
itself to other programs.
Which of them is not an ideal way of spreading the virus Official Antivirus CDs 1
In which year Apple II virus came into existence 1981 1
In mid-1981, the 1st virus for Apple computers with the name _________ Apple II 1
came into existence.
The virus hides itself from getting detected by ______ different ways. 3 1

_______________ infects the master boot record and it is challenging and a Boot Sector Virus 1
complex task to remove this virus.
________________ gets installed & stays hidden in your computer’s Direct Action Virus 1
memory. It stays involved to the specific type of files which it infects.

Direct Action Virus is also known as ___________ Non-resident virus 1


______________ infects the executables as well as the boot sectors. Multipartite Virus 1

______________ are difficult to identify as they keep on changing their type Polymorphic Virus 1
and signature.
____________ deletes all the files that it infects. Overwrite Virus 1
_____________ is also known as cavity virus. Space-filler Virus 1
Which of the below-mentioned reasons do not satisfy the reason why Protection 1
people create a computer virus?
A ___________ is a small malicious program that runs hidden on infected Trojan 1
system.
____________ works in background and steals sensitive data. Trojan 1
By gaining access to the Trojaned system the attacker can stage different Trojan 1
types of attack using that ____________ program running in the
background.
Trojan creators do not look for _______________ Securing systems with such programs 1
Which of them is not a proper way of getting into the system Official product sites 1
Which of the following port is not used by Trojans MP 1
Trojans do not do one of the following. What is that Protecting Data 1
Some Trojans carry __________ with them to encrypt the data and ask for Ransomware 1
ransom.
Once activated, ___________ can enable ____________to spy on the trojans, cyber-criminals 1
victim, steal their sensitive information & gain backdoor access to the
system.
Trojans can not ______________ self-replicate 1
A _______________ provides malicious users remote control over the Backdoor Trojan 1
targeted computer.
_______________ programs are specially designed for stealing your Trojan-Banker 1
account data for online banking systems, e-payment services & credit/debit
cards.
______________ perform automated DoS (Denial of Service) attacks on a DDoS-Trojan 1
targeted web address.
Trojan-Downloader is a special type of trojans which can download & install Malicious 1
new versions of ________ programs.
____________ work in background & keeps on downloading other Trojan-Downloader 1
malicious programs when the system is online.
True or False When you include multiple addresses in a message, you should separate 1
each address with a period
You cannot format text in an e-mail message. 1
You must include a subject in any mail message you compose. 1
Linux is an operating system. 1
Sharing of executable files in LAN is not possible. 1
LANs are arranged in star, bus, or ring configurations. 1
When you print a message, it is automatically deleted from your Inbox 1

UNIX is a GUI interface 1


To create a directory in DOS use DIR command 1
You need to delete a contact and creat a new one to change contact 1
information
You must complete all fields in the Contact form before you can save the 1
contact
You cannot edit Contact forms. 1
You should always open and attachment before saving it. 1
DEL command delete a directory in DOS 1
All attachment are safe. 1
It is impossible to send a worm or virus over the Internet using in attachment 1

You can only send one attachment per e-mail message. 1


There is only one way to delete a message. 1
The Delete key is for deleting text, it will not delete messages from your 1
Inbox.
Pressing the Delete key and clicking the Delete button produce the same 1
result.
To display the contents of a file use LIST command. 1
In Outlook, you must store all of your messages in the Inbox 1
Compiler converts Highlevel language. 1
You can only store messages in a new folder if they are received after you 1
creat the folder.
New folders must all be at the same level. 1
There is only one way to create a new folder. 1
Your password should be something others will be able to figured out, such 1
as your birthday or wedding anniversary.
Decimal value of hexadecimal E is 14 1
You cannot send a file from a Web-based e-mail account. 1
Your e-mail address must be unique. 1
You can sign up for Web-based e-mail without accepting the Web site's 1
terms and conditions. true or false
Decimal value of hexadecimal E is 14 1
Web-based e-mail accounts do not required passwords. 1
You can delete e-mails from a Web-based e-mail account. 1
You can store Web-based e-mail messages in online folders. 1
Use keyboard keys to turn on the computer 1
Whaling / Whaling attack is a kind of phishing attacks that target senior 1
executives and other high profile to access valuable information.

Freeware is software that is available for use at no monetary cost 1


IPv6 Internet Protocol address is represented as eight groups of four Octal 1
digits.
The hexadecimal number system contains digits from 1 - 15 1
Octal number system contains digits from 0 - 7. 1
MS Word is a hardware. 1
CPU controls only input data of computer. 1
CPU stands for Central Performance Unit. 1
The Language that the computer can understand is called Machine 1
Language.

Magnetic Tape used random access method. 1


witter is an online social networking and blogging service. 1
Worms and trojan horses are easily detected and eliminated by antivirus 1
software.
GNU / Linux is a open source operating system. 1
Remote computers work on continuous range of values. 1
ASCII Codes are 10 Bit binary codes 1
Machine language is machine de4pendent while assembly languages are 1
machine independent.
When you link an object, the actual data remains separate from the client 1
data .
Program Counter does not hold the address of next instruction to be 1
executed.
An object program is created by compiler ,from a sources program at run 1
time.
Serial data transfer moves data faster then parallel data transfer. 1
You can embed sound, video clips and animations in t your Power Point 1
presentation.
In Excel, by default, the numbers are left aligned and text values are right 1
aligned.
Antivirus is compulsory of every PC 1
Decimal value of hexadecimal E is 10 1
Multiple choices The first computer virus is -------- Sasser Creeper Blaster none of these 2 1
To protect a computer from virus, you should install -------- in your computer. Antivirus Disk Disk Cleanup Backup Wizard 1 1
Defragmentation

Which malicious program cannot do anything until actions are taken to Trojan Horse Worm Virus Bots 3 1
activate the file attached by the malware.
The attack that focuses on capturing small packets from the network Phishing Eaves dropping Scams Exploits 2 1
transmitted by other computers and reading the data content in search of
any type of information is ____
What are the types of malware? Caterpillars Worms lions Horses 2 1
Which of the following is not a stand-alone program Trojan worm Virus spyware 3 1
Which of the following is a program capable of continually replicating with virus Trojan horse Rootkit Worms 1 1
little or no user intervention
What are the examples of malware spreads social network pirated software Removable media All of the Above 4 1

Which one is not a computer virus? Trojan horse logic bomb Mcafee redlof 3 1
Another name of free computer software is Encrypted software copy protected Public domain shareware 3 1
software software
When computer virus starts to impact the data, it is known as virus infection virus spreading data losing shutting down 1 1
computer virus program is usually hidden in a operating system application disk driver both 1 and 2 4 1
program
Another name of computer antivirus is vaccine worm Trojan Horse DES 1 1
What is Trend Micro It is virus program It is anti-virus It is just a program none of these 2 1
software
What is the name of the viruses that fool a user into downloading and/or Worm Cracker Keylogger Trojan Horses 4 1
executing them by pretending to be useful applications?
How does a Le-Hard virus come into existence? Software Hardware Command.com Friday 13 3 1
What is the virus that spread in computer? it is system it is computer it is windows tool it is hardware 3 1
software program
What kind of attempts is made by individuals to obtain confidential Phishing scams computer viruses spyware scams none of these 1 1
information from a person by falsifying their identity?
Delayed payload of some viruses is also called as Bomb Time Antivirus none of these 1 1
What is the first boot sector virus? Mind Brain ELK cloner none of these 2 1
The acronym of Worm in a computer system is Write only read only Write once read Write once read Write only Read 3 1
memory Many Memory
To Debug the system means Find the correct Find and install find and correct Find the correct 3 1
software correct system errors on system hardware
which of the following is associated with error detector Odd parity bit Even parity bit Both 1 & 2 none of these 3 1
An error in software or hardware is called a bug. What is the alternative computer
slug jargon for it? glitch leech squid 2 1

A honey pot is an example of what type of software intrusion detector virus Encryption Security-audititing 1 1

Which of the following is not anti-viruses software NAV F-Prot Oracle McAfee 3 1
Backup of the source data can be created on the same device on another device at some other All of the Above 4 1
locations
There are _________ types of computer virus. 5 7 10 12 3 1
Which of the following is not a type of virus boot sector polymorphic multipiratite trojans 2 1
A computer ________ is a malicious code which self-replicates by copying Program virus application Worms 2 1
itself to other programs.
Which of them is not an ideal way of spreading the virus infected website Emails Official Antivirus USBs 3 1
CDs
In which year Apple II virus came into existence 1979 1980 1981 1982 3 1
In mid 1981, The virus for Apple computers with the name _______ came Apple I Apple II Apple III Apple virus 2 1
into existence
The virus hides itself from getting detected by ______ different ways. 2 3 4 5 2 1

_______________ infects the master boot record and it is challenging and Boot sector Virus polymorphic multipiratite Trojans 1 1
a complex task to remove this virus.
Boot sector Virus polymorphic multipiratite Direct Action Virus 4 1
________________ gets installed & stays hidden in your computer’s
memory. It stays involved to the specific type of files which it infects.
Direct Action Virus is also known as ___________ Non-resident virus Boot sector Virus polymorphic multipiratite 1 1

_________ infects the executables as well as the boot sectors Non-resident virus Boot sector Virus polymorphic multipiratite 4 1

________ are difficult to identify as they keep on changing their type and Non-resident virus Boot sector Virus polymorphic multipiratite 3 1
signature
________ deletes all the files that it infects Non-resident virus Over-write virus polymorphic multipiratite 2 1

___________ is also known as cavity virus Non-resident virus Over-write virus polymorphic Space-filler virus 4 1

Which of the below-mentioned reasons do not satisfy the reason why Research purpose Pranks identity theft Protection 4 1
people create a computer virus?
A _________ is a small malicious program that runs hidden on infected virus trojan shareware Adware 2 1
system
_______ works in background and steals sensitive data virus shareware Trojan Adware 3 1
By gaining access to the Trojaned system the attacker can stage different Trojan Virus Antivirus Anti-malware 1 1
types of attack using that ____________ program running in the
background.
Trojan creators do not look for _______________ Credit card Confidential data Important Securing systems 4 1
Information documents with such programs

Which of them is not a proper way of getting into the system IM Attachments Official product sites Un-trusted sites, 3 1
freeware and pirated
software
Which of the following port is not used by trojans UDP TCP SMTP MP 4 1
Trojans do not do one of the following. What is that ? Deleting Data Protecting Data Modifying Data Copying Data 2 1
Once activated, ___________ can enable ____________to spy on the virus, cyber- malware, trojans, cyber- virus, penetration 3 1
victim, steal their sensitive information & gain backdoor access to the criminals penetration testers criminals testers
system.
Trojans can not ______________ Steal data Self-replicate Steal financial steal login 2 1
information creadentials
A_______ provides malicious users remote control over the targeted DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 2 1
computer
_______________ programs are specially designed for stealing your DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 3 1
account data for online banking systems, e-payment services & credit/debit
cards.
______________ perform automated DoS (Denial of Service) attacks on a DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 1 1
targeted web address.
____________ work in background & keeps on downloading other DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 4 1
malicious programs when the system is online.
A/an ___________ is a program that steals your logins & passwords for IM-trojans Backdoor Trojan Trojan-downlaoder Ransom-trojan 1 1
instant messaging applications.
_____________ can modify data on your system – so that your system IM-trojans Backdoor Trojan Trojan-downlaoder Ransom-trojan 4 1
doesn’t run correctly or you can no longer access specific data, or it may
even ask for ransom in order to give your access.
The ______________ can cost you money, by sending text messages from IM-trojans Backdoor Trojan SMS Trojan Ransom-trojan 3 1
your mobile phone numbers.
A ___________ is a method in which a computer security mechanism is Front-door backdoor Clickjacking key-logging 2 1
bypassed untraceable for accessing the computer or its information.

A _________________ may be a hidden part of a program, a separate crypter virus backdoor key-logger 3 1
infected program a Trojan in disguise of an executable or code in the
firmware of any system’s hardware.
One word Questions Which of the following is not a type of virus? Trojans 1

Which of them is not an ideal way of spreading the virus? USBs 1


In which year Apple II virus came into existence? 1981 1
Direct Action Virus is also known as ? Non-resident virus 1
Which of the below-mentioned reasons do not satisfy the reason why Protection 1
people create a computer virus?
Which of them is not a proper way of getting into the system? Official product sites 1
Which of the following port is not used by Trojans? MP 1
Trojans do not do one of the following. What is that? Protecting Data 1
Which of the following is a remote Trojan? Troya 1
In which year the term hacking was coined? 1955-60 1
From where the term ‘hacker’ first came to existence? MIT 1
In which year the first popular hacker conference took place? 1993 1
What is the name of the first hacker’s conference? DEFCON 1
Who was the first individual who performed a major hacking in the year John Draper 1
1971?
Which is the legal form of hacking based on which jobs are provided in IT Ethical hacking 1
industries and firms?
Which of the following do not comes under Social Engineering? Spamming 1
Which of the following is not an example of social engineering? Carding 1
Existence of weakness in a system or network is called ? Vulnerability 1
What is an act of hacking by the means of which a political or social Hacktivism 1
message is conveyed ?
Backdoors are also known as ? Trap doors 1
Security bugs are also known as ? security defect 1
In general how many key elements constitute the entire security structure? 4 1

According to the CIA Triad, which of the below-mentioned element is not Authenticity 1
considered in the triad?
One common way to maintain data availability is ? Data backup 1
A firewall protects which of the following attacks? Denial of Service (DoS) 1
Packet filtering firewalls are deployed on ? routers 1
When a packet does not fulfil the ACL criteria, the packet is ? dropped 1
Sniffing is also known as ? wiretapping 1
What is “Trend Micro”? It is anti-virus software 1
What is the name of the viruses that fool a user into downloading and/or Trojan horses 1
executing them by pretending to be useful applications?
The virus that spread in application software is called as Macro virus 1
How does a Le-Hard virus come into existence? Command.Com 1
What is the virus that spread in computer? It is a computer program 1
What kind of attempts is made by individuals to obtain confidential Phishing scams 1
information from a person by falsifying their identity?
When does the time bomb occur? During a particular data or time 1
Delayed payload of some viruses is also called as Bomb 1
What is the first boot sector virus? Brain 1
What is the name of first computer virus? Creeper 1
The difference between a virus and a self-replicating program which is like a Worm 1
virus is that rather than creating copies of itself on only one system it
propagate through computer network.
What is anti-virus? It is a program code 1
What is a type of program designed to prevent and detect unwanted Anti-spyware Program 1
spyware program ?
what tries to identify useless or dangerous messages for you ? Anti-spam software . 1
What are basic function of an anti-Virus ? Scanning 1
Integrity Checking
Interception
In which year Apple II virus came into existence? 1981 1
In mid-1981, the 1st virus for Apple computers came into existence.What Apple II 1
was the name ?
What infects the master boot record and it is challenging and a complex Boot Sector Virus 1
task to remove this virus.
Which gets installed & stays hidden in your computer’s memory. It stays Direct Action Virus 1
involved to the specific type of files which it infects is called.
Direct Action Virus is also known as ? Non-resident virus 1
What infects the executables as well as the boot sectors ? Multipartite Virus 1
What are difficult to identify as they keep on changing their type and Polymorphic Virus 1
signature.
Which deletes all the files that it infects ? Overwrite Virus 1
which is also known as cavity virus. Space-filler Virus 1
How many types of computer virus exists ? 10 1
Name a small malicious program that runs hidden on infected system. Trojan 1

What works in background and steals sensitive data? Trojan 1


By gaining access to the Trojaned system when the attacker can stage when the infected user’s system goes online. 1
different types of attack using that program running in the background.

Which ports are used by Trojan ? UDP,TCP,SMTP 1


What provides malicious users remote control over the targeted computer. Trojan-Banker 1

Name the programs are specially designed for stealing your account data Trojan-Banker 1
for online banking systems, e-payment services & credit/debit cards.

Who perform automated DoS (Denial of Service) attacks on a targeted web DDoS-Trojan 1
address.
Name the attack tries to formulate a web resource occupied or busy its DoS attack 1
users by flooding the URL of the victim with unlimited requests than the
server can handle.
During a DoS attack, what will be either dawdling down or entirely the regular traffic on the target website 1
interrupted?
Which attack is made to overkill the targeted server’s bandwidth and other DoS attack 1
resources of the target website.
DDoS stands for ? Distributed Denial of Service 1
What are unwanted software intended to pitch advertisements upon the Adware 1
user’s screen, most often within a web browser.
What is PUP ? Potentially Unwanted Programs 1
Once adware hijacks your system, what will be effect ? It might perform different kinds of superfluous tasks. 1
Which functions may be intended to analyze a victim’s location & what The adware’s 1
different Internet sites he/she is visiting,also sell your browsing behaviour &
information to 3rd parties.
In how many ways Malicious adware may sneak into your system ? 2 (Two) 1

In which year the term hacking was coined? 1955-60 1


From where the term ‘hacker’ first came to existence? MIT 1
In which year the first popular hacker conference took place? 1993 1
What is the name of the first hacker’s conference? DEFCON 1
Who was the first individual who performed a major hacking in the year John Draper 1
1971?
Which is the legal form of hacking based on which jobs are provided in IT Ethical hacking 1
industries and firms?
Existence of weakness in a system or network is called ? Vulnerability 1
What is an act of hacking by the means of which a political or social Hacktivism 1
message is conveyed ?
Backdoors are also known as ? Trap doors 1
Security bugs are also known as ? security defect 1
In general how many key elements constitute the entire security structure? 4 1

One common way to maintain data availability is ? Data backup 1


Denial of service can be protected by which windows application ? Windows Firewall 1

Packet filtering firewalls are deployed on ? routers 1


When a packet does not fulfil the ACL criteria, the packet is ? dropped 1
Sniffing is also known as ? wiretapping 1
How many types of sniffing are there ? 2 1
Which is a device which secretly collects data from credit / debit cards ? Card Skimmer 1

Which attack is the exploitation of the web-session & its mechanism that is Session Hacking 1
usually managed with a session token?
Comprehension 0
Infosec Monitoring Fill in the blanks _______ is the practice and precautions taken to protect valuable Information Security 1
information from unauthorised access, recording, disclosure or destruction.
_____ platforms are used for safety and protection of information in the Cloud workload protection 1
cloud.
The full form of EDR is _______ Endpoint Detection and response 1
_______ technology is used for analyzing and monitoring traffic in network Network traffic analysis (NTA) 1
and information flow.
Compromising confidential information comes under _________ Threat 1

Lack of access control policy is a _____________ Vulnerability 1


Possible threat to any information cannot be ________________ ignored 1

_________ framework made cracking of vulnerabilities easy like point and Metasploit 1
click.
__________ is a popular tool used for discovering networks as well as in Nmap 1
security auditing.
Wireshark is a ____________ tool. network protocol analysis 1
Aircrack-ng is used for ____________ Wi-Fi attacks 1
_____________ is a popular IP address and port scanner. Angry IP Scanner 1
_______________ is a popular tool used for network analysis in EtterPeak 1
multiprotocol diverse network.
____________ scans TCP ports and resolves different hostnames. SuperScan 1

___________ is a web application assessment security tool. WebInspect 1


________ is a password recovery and auditing tool. LC4 1
___________ is a weakness that can be exploited by attackers. System with vulnerabilities 1
____________ is the cyclic practice for identifying & classifying and then Vulnerability management 1
solving the vulnerabilities in a system.
__________ is a piece of software or a segment of command that usually exploit 1
take advantage of a bug to cause unintended actions and behaviors.

Security bugs are also known as _______ security defect 1


True or False Possible threat to any information cannot be ignored 1
Lack of access control policy is a attack 1
Compromising confidential information comes under threat 1
Network traffic analysis (NTA) technology is used for analyzing and 1
monitoring traffic in network and information flow.
The full form of EDR is Endpoint Detection and response 1
Remote browser access information security technology is used for avoiding 1
browser-based hacking.
Cloud workload protection platforms platforms are used for safety and 1
protection of information in the cloud.
Flood is not a vulnerability to information security. 1
Unchanged default password is not a threat to information security. 1

Information Security is the practice and precautions taken to protect 1


valuable information from unauthorised access, recording, disclosure or
destruction

USB Pratirodh is a free Security Tool to control usage of removable USB 1


storage media launched by the C-DAC
ZEUS is a trojan that targets Microsoft Windows to steal banking information 1
by keystroke logging
Locky is a ransomware malware delivered by email that was allegedly an 1
invoice requiring payment with an attached Microsoft word document that
contains malicious macros
When one participant in a communication pretends to be someone else, it is 1
called Masquerade.
Cryptowall major Ransomware Trojan targeting windows in 2014. 1
Grayware is a term applied to unwanted applications or files that are not 1
classified as malware, but can worsen the performance of computers and
may cause security risks
Trojan horses are very similar to virus in the matter that they are computer 1
programs that replicate copies of themselves
Malware monitors user activity on internet and transmit that information in 1
the background
Spam are the examples of real security and privacy threats. 1
Firewall is a type of virus 1
Unsolicited commercial email is known as Spyware 1
Viruses are Machine made 1
Hacking a computer is always illegal and punishable by law 1
A licensedoes not allows a user to use copyrighted material. 1
Network failure is primarily a perfomance issue 1
Unauthorized access is a network reliability issue. 1
Unauthorized access is a performance reliability issue. 1
Encryption techniques improve a network's Reliability. 1
Protocol is illicitly introduced code that damages a network device. 1

Password are used to improve the longevity of a network. 1


EDI use cannot be done on internet. 1
By encryption of text we mean hashing it. 1
Multiple choices DoS stand for Denial of Service Do of service Both 1 & 2 None of these 1 1

firewall is a type of virus protection nothing worm 2 1


Security Defect are also known as bugs bugger security bugs None of these 3 1
Protocol is illicitly introduced code that damages a . physical device network device security device None of these 3 1
NTA is used for monitoring traffic analyizing Both 1 & 2 None of these 3 1
Lack of ______ control policy is vulnerability access not access process software 1 1
USB pratirodh is launched by Microsoft C-DAC Google Andriod 2 1
For Wi-Fi attacks _________ used Aircrack-ng air-ng Both 1 & 2 None of these 1 1
In EDR, E stands for expert exponential end-point end 3 1
In CIA, I stands for Individuals Integrated intimated integrity 4 1
In CIA, A stands for application action availability None of these 3 1
Threat in infosec monitoring means comprising no threat Both 1 & 2 None of these 1 1
confidentiality of
information
In 2AF, A stand for availability application action authentication 4 1
MITM is a type of attack used with a fraudalent server with a application software address hardware address relay address 4 1

Baza was the first virus to infect win 95 win 98 unix win NT 1 1
symantec company developed a antivirus called quick heal norton symantec None of these 2 1
staog is the first virus to infect win 95 win 98 linux win NT 3 1
To hide malicious activity on a network, we use SQL server Proxy server Proxy chain Windows server 2 1
In NTA, A stands for activity application availability analysis 4 1
In MITM, First M stands for Man Machine Middle None of these 1 1
In XSS, X stands for Xray Xmachine cross all of these 3 1
In DDoS, D before Dos stands for dynamic Distributed Digital none of these 2 1
SSL stands for Secure socket layer system secure secure system layer system socket layer 1 1
layer
SSH stands for secure socket shell system secure secure socket shell system socket shell 3 1
shell
what is ZEUS trojan virus worm malware 1 1
Locky is which malware ransomware virus worm firmware 1 1
Which one is the network protocol analysis wireshark hyper V HTTP TCP 1 1
metaspoilt is firmware ransomware framework software 3 1
superscan scans virus worm trojan TCP ports 4 1
What is LC4 password recovery auditing tool Both 1 & 2 None of these 3 1

Angry IP scanner is IP address scanner port scanner Both 1 & 2 None of these 3 1

webinspect is a web application assessment security tool port scanner tool IP address tool all of these 1 1

one word questions What is the practice and precautions taken to protect valuable information Information Security 1
from unauthorised access, recording, disclosure or destruction.

How vulnerability to information security is done? without deleting data, disposal of storage media 1
Which platforms are used for safety and protection of information in the Cloud workload protection platforms 1
cloud.
Which information security technology is used for avoiding browser-based Remote browser access 1
hacking?
what is full form of EDR? Endpoint Detection and response 1
Which technology is used for analyzing and monitoring traffic in network and Network traffic analysis (NTA) 1
information flow.
Compromising confidential information comes under _________. Threat 1

Lack of access control policy is a _____________. Vulnerability 1


Possible threat to any information cannot be ________________. Ignored 1

What is CIA? Confidentiality, Integrity, and Availability 1


What is SSL? Secure Sockets Layer 1
What is the abbreviation of CSRF? Cross-Site Request Forgery. 1
What is 2FA? Two Factor Authentication. 1
What is the full form of XSS? Cross-site scripting. 1
What is the full form of WAF? Web Application Firewall. 1
What is SSH? Secure Socket Shell. 1
21. Why would HTTP Tunneling be used? To bypass a firewall 1
22. Which Nmap scan is does not completely open a TCP connection? SYN stealth scan 1

MITM stands for Man In The Middle 1


NTA stands for Network traffic analysis 1
which OS based on Knoppix was rewritten by Kali Linux? BackTrack 1
If DoS – Denial of Service, What is DDoS? Distributed Denial of Service 1
If SSL – Secure Socket Layer, What does TLS stand for? Transport Layer Security 1
Who is known as the inventor of computer virus defense techniques? red Cohen 1

The first virus to infect Windows 95 files is? Baza 1


The first virus to infect Linux is? Staog 1
Norton Antivirus was developed by which company? Symantec 1
Why would a hacker use a proxy server? To hide malicious activity on the network. 1
What type of symmetric key algorithm using a streaming cipher to encrypt RC4 1
information?
What type of attack uses a fraudulent server with a relay address? MITM (Man in the Middle) 1

To hide information inside a picture, what technology is used? Steganography 1


What is the purpose of a Denial of Service attack? To overload a system so it is no longer operational 1
What are some of the most common vulnerabilities that exist in a network or Additional unused features on commercial software 1
system? packages
What is the sequence of a TCP connection? SYN-SYN ACK-ACK 1
What tool can be used to perform SNMP enumeration? IP Network Browser 1
Which ports should be blocked to prevent null session enumeration? Ports 135 and 139 1

The first phase of hacking an IT system is compromise of which foundation Confidentiality 1


of security?
Why would a ping sweep be used? To identify live systems 1
Which of the following will allow footprinting to be conducted without ARIN 1
detection?
A packet with no flags set is which type of scan? Null 1
Comprehension 0
Naval IT and Infosec Hardware Fill in the Blanks ___________ is a proprietary which leverages virtualization to expand a Ncomputing 1
Policies methods of desktop PC environment from a single physical machine to a multi-client
procurement,
policies on
laptops, sdrive
Server storage may be purchased as ______ disks or ________ disks. SATA or SAS 1

__________ GB is the minimum RAM to be procured as the minimum OS 4 1


requirement
__________ Monitors are recommended for all PCs being procured LED 1

Officers of the rank of _______ & above and equivalent civilian officers are Captain 1
eligible for laptops
Administative Approval of the __________ as the CFA is mandatory for VCNS 1
procurement of fresh / new laptops
the procurement and issue of laptops for discharge of official work to Defence Secretary 1
elligible officers could be progressed only with specific approval
of_____________
The cost of laptop including standard software (OS, Office suite and AV 80000 1
software should not exceed Rs __________ inclusive of all taxes as per
policy - 01/18
The laptops procurred are permitted to be used for _____________ and Internet and Intranet 1
_________

The laptops used for internet should be installed with ________ NAVIOS 1
Units Directorates under IHQMOD forwarded cases for procurement of APSO to DIT 1
laptops (NEW and Replacement), post approval of _________ to
___________ for technical vetting and further processing

Technical vetting of New and Replacement laptops will be carried by DIT 1


___________
Post Administrative approval of VCNS on Buying new laptop the cases will DOA 1
be forwarded to ______
On procurement of laptop , a copy of the _______________ is to be PLL certificete Ownership 1
forwarded to unit ITO /CITOs/ DIT
_______ is a volume encryption application for PCs SENIC 1
____________ is used to transfer data between naval PC to Internet PC Sdrive 1

USB ports should not be enabled on more than __________% of total pc's 2 1
in a unit
________ is to be used only for transfer of data not storage of data Sdrive 1

________ PCs is used for sanitization Stand-alone NAV-IOS 1


All instances of use COTS/ unauthorised USB drives are to be treated as INFOSEC Violations 1
__________
True or False The defective hard disks can be returned to the OEM/Vendor during the 1
period of Warranty/Maintenance
It is not recommended to use Thin Clients in Completely Networked 1
environment
Procurement of antivirus for NUD PCs / NAViOS based Internet PCs is not 1
required
Laptops weight not more than 2.5KG can be only used in navy 1
Rugged Laptops are less expensive than regular LAPTOPs 1
High end servers are provided Rack Mounted only 1
Minimum raw storage capacity of Server Storage Device is 10TB 1
Policy 01/18 is used for Procurement and maintenance of personal and 1
system laptops
Officers of the rank of captain and above and equivalent civilian officers are 1
eligible for laptops?
Administative Approval of the DCNS as the CFA is mandatory for 1
procurement of fresh / new laptops
the procurement and issue of laptops for discharge of official work to 1
elligible officers could be progressed only with specific approval of Defence
Secretary
The cost of laptop including standard software (OS, Office suite and AV 1
software should not exceed Rs 80,000/- inclusive of all taxes

The laptop will have service life of six years as per policy - 01/18 1
Particulars of officer along with designation for whom the laptop is proposed 1
is to be send for new procurement of laptop
Budgetary quotation from GEM/ vendor is to be attached for new 1
procurement of laptop
The laptops used for internet should be installed with NAV-IOS 1
All Cases of procurement of laptops (New and Replacement) are to be 1
forwarded to CITOs
Post Administrative approval of VCNS on Buying new laptop commands are 1
to initiate the procurement action under delegated financial powers as per
DFPDS/ NSP-2014
Officers holding Laptops has the liberty to get the device insured at his 1
personal cost
SFTC enables multiple user logging in a server 1
PLL and certificete Ownership is to be forwded to authority on purchasing of 1
new laptops
A rugged laptop is not designed to reliably operate in harsh usage 1
conditions such as strong vibrations , extreme temperatures, wet or dusty
environments
The High End servers are provided Rack Mounted only 1
SENIC Guard is an application that allows usage of USB ports to Sdrive 1
alone.
All external interfaces are to be disabled in laptops
Five years will be the service life of laptop as per policy - 01/18 1
There are 2 parts of s-drive
IGBT is used to switch devices for online UPS for single server
NavIOS is should as a internet PC in Indian Navy
s-drive is used to transfer data within the naval networks
DIT is to keep a centeralised record of all Laptops procured at command
level
Before diposal of harddisk, hard disk is not to be degaussed
Multiple choice Naval PCs should have at least __________ no of USB Ports five threee four six 4 1
_____________ OS is to be loaded on Internet PCs Win 7 Win 10 UBUNTU NAV-IOS 4 1
switching device for online UPS for single server is MOSFET IGBT SOFT HARDWARE 1 1
Administative Approval of the __________ as the CFA is mandatory for VCNS DCNS CNS CNC 1 1
procurement of fresh / new laptops

The procurement and issue of laptops for discharge of official work to Defence Minister Defence Secreatry CNS DCNS 2 1
elligible officers could be progressed only with specific approval of
_____________
The laptop will have service life of _________ years as per policy - 01/18 Five Four Six Seven 1 1

The laptops used for internet should be installed with ________ Win 7 Win 10 UBUNTU NAV-IOS 4 1
Technical vetting of New and Replacement laptops will be carried by FMO IHQ MOD(N) Hedquarters DIT 4 1
___________
For purchasing new Laptop DIT will obtain Administrative Approval DIT CNS DCNS VCNS 4 1
of_________ on a Quartely basis
Post Administrative approval of VCNS on Buying new laptop the cases will DOA DIT DCNS VCNS 1 1
be forwarded to ______
DIT is to keep a centeralised record of all Laptops procured at FMO IHQ MOD(N)/ DIT Hedquarters VCNS 2 1
______________
All Cases of procurement of laptops (New and Replacement) are to be DCNS VCNS CITOs DIT 3 1
forwarded to _________
Who will maintain the centralised database of all LAPTOPs DIT CITO IHQ MOD(N)/ DIT Headquartes 2 1

__________ is the latest SENIC used in navy at present SENIC III SENIC II SENIC IV SENIC I 1 1
_________ is to be installed on all Computers and laptops for administrative Firefox Internet Explorer VLC SENIC GUARD 4 1
and offcial work
____________ is used to shredding of secured files Recycle Bin Shredder SENIC IV SENIC LITE 4 1
____________ is used to transfer data between naval PC to Internet PC Pendrive S Drive Hard Disk D drive 2 1

_________are to be regularly scaned for potential malware Sdrives Antivirus Sequrite Pendrive 1 1
Senic Guard/ S-Drives logs are to be presented are to be presented to audit Workup CSAT Audit Computer Audit Sdrive audit 2 1
team during_________
Only a standalone NAV-IOS pcs should be used for__________ sanitiztation file transfer Entry Exit Pendrive 1 1
In the absence of dedicated sanitization PC _____________ Pc with NAV- Windows PC LINUX PC Internet PC Server PC 3 1
IOS can be used as sanitization PC with approval
What is the name of InBuilt Anti Virus in NAV-IOS ClamAV Sequrite Macafee Norton 1 1
What is the short cut key in NAV-IOS to scan unwanted files ctrl+h ctrl+r ctrl+q ctrl+s 1 1
Sdrives will be issued on the request basis by _________ CAPO CITO DIT WESEE 2 1
Sdrive are to be centrally held with __________ and to be issued to CAPO DIT Head of CITO 3 1
individuals by name Organisation
Two associated components on loss of any IT assets are classified into Loss of Digital Loss of data and Loss of information Loss of Classified 1 1
___________ and _______ Information and Loss Of contents and Loss of
Loss of Naval Store restricted
Information

The impact assesment rules out the possibility of loss of informationthen the DFPDS 13 DFPDS 15 DFPDS 16 DFPDS 18 2 1
loss may be treated as_______
Defect of Sdrive are to be categorised as________ and ___________ Loss of Classified Hardware and Physical Damage physical and 3 1
and Loss of software Damage and Corruption of hardware damage
restricted Software
Information

Sdrives which are being detected by the device manager utility of MS Damaged Corrupted Formated Error 2 1
Window based OS, but not functioning appropriately can be considered
as___________
__________ is the properietery hardware based firewall of Indian Navy AGSB ABGS ABSD ABSG 4 1

Repairable Sdrive would be re-Customised at _________ DIT CITO IHQ MOD(N)/ DIT WESEE 4 1

Sdrive under warranty, a new Sdrive would be sought from the DIT CITO IHQ MOD(N)/ DIT OEM 4 1

One Word questions Upto how many number of users can be serve in entry level servers? 30 1

the procurement and issue of laptops for discharge of official work to Defence Secretary 1
elligible officers could be progressed only with specific approval of

What will be the service life of laptop as per policy - 01/18 Five Years 1
Who will obtain Administrative Approval of VCNS on a Quartely basis DIT 1

Post Administrative approval of VCNS on Buying new laptop commands are DFPDS/ NSP-2016 1
to initiate the procurement action under delegated financial powers as per

Who will maintain the centralised database of all LAPTOPs CITO 1


Who has designed S-Drive WESEE 1
What is WESEE stands for ? Weapon Electronics System Engineering and Establishment 1

SFTC Stands for Senic for Thin Clients 1


Policy on use IT resources of Indian Navy States that loss portable devices Infosec Incident 1
must be treated as
The impact assesment rules out the possibility of loss of informationthen the Loss of Stores 1
loss may be treated as
Sdrives which are being detected by the device manager utility of MS Corrupted 1
Window based OS, but not functioning appropriately can be considered
as___________

ABSG Stands for Application Based security Gateway 1


All corrupted Sdrives are to be transferred centrally by CITOs to WESEE 1
What are the two version of Hardware based firewall Desktop version and rack Mounted version 1
The hardware and software of Firewall is indegenously designed by WESEE 1

AMC of ABSG is Concluded with M/s Inventum Technologies pvt ltd 1


Repairable Sdrive would be re-Customised at WESEE 1
All Laptops should be hardened and audited as per extant Infosec polices 1
Any theft/ loss of the device will be treated as a security Incident 1
Overall Custody and accounting of the Computer Systems including the IT CELL 1
hardware, software, data, network, storage media, peripherals and related
IT products this duties are carried out by
SENIC stands for : Secure Environment for Naval Information Computers 1
What is designed to reliably operate in harsh usage conditions such as A rugged laptop 1
strong vibrations , extreme temperatures, wet or dusty environments ?

Which servers are meant for small datbase, workgroup applications, for Entry Level servers 1
managing small network, file servers ?
Which servers are used for controlling large networks , running of MID-level servers 1
application and as database or web servers for medium sized application ?

Which servers are provided Rack Mounted only ? The High End Servers 1
What is to be forwaded on procurement of new laptops to ITO/ CITOs/ DIT PLL and Certificete Ownership 1

Who is responsible for physical safety, acoounting and handling as well as Officer 1
security of data/ information stored in laptop handled by officer ?

what is an application that restricts usage of USB ports to Sdrive alone ? SENIC Guard. 1

What enables multiple user logging in a server ? SFTC 1


Which RAM memory capacity varies from 64 bit to 1 Mega bit static RAM 1
The input data bit is written into the cell by setting Both the flip-flop for 1 and flip-flop 1
resetting the
When the READ/(WRITE) line is HIGH then the flip-flop is Unaffected 1
The flip-flop in which cell can be constructed using BJT or MOSFET static memory 1

IC 7489 is TTL based static RAM 1


IC 7489 is of ____________ 64 bit 1
The first practical form of what was the Memory tube Random Access Memory 1
Which memory was invented in 1947 Magnetic-core 1
Both SRAM and DRAM are Volatile in nature 1
CPU and RAM acts between Cache memory 1
Comprehension 0
Software, Naval Fill in the blanks ____ and reliable desktop connectivity for end users Seamless 1
Applications

BOSS is a flavour of ------------- Linux 1


BOSS belongs to ---------- Linux OS 1
Malware is a ---------- Virus 1
Linux is a ---------- Operating System 1
Spyware is a type of-------- Virus 1
Worm is a type of ----- Virus 1
Sequrite is a ------- Anit-virus 1
AVG is a ------- Anit-virus 1
Java is a ------ Programming Language 1
Perl is a ----- Programming Language 1
WESEE stands for -- Weapon and electronic system engineering establishment 1

NUD stands for ------- Naval Unified Domain 1


RMN stands for --- Registered Mobile Number 1
NIC stands for ---- National Informatics Center 1
What is INWS -- Indian Naval Website 1
Services for critical websites to ensure fail safe opration in the event of site Free NIC Disaster Recovery 1
outage
In case of site compomise, as an immediate action, the website is to be Side under maintenance 1
withdrawn and a ---- page to be hosted
Refinement is a process of ----- Elaboration 1
Requirment specification for a ----- is a complete description of the Software system 1
behaviour of a system to be developed.
True or False ASP is a Operating System False 1
ASP is used for web designing True 1
RDBMS is used for data management True 1
Oracle is a part of RDBMS True 1
C++ is a simple language False 1
MS SQL is used for programming language False 1
MS SQL is a RDBMS True 1
Dream weaver is used as a OS False 1
Front Page related to Web designing software True 1
Macro Media Flash is a web designing software True 1
MS SQL Server works as a front end software False 1
Oracle is a back end software True 1
Linux is a Operating Software True 1
Malware is a type of viurs True 1
We can not use internet in Linux based operating system PC False 1
Windows is a command based OS False 1
Linux OS more sequre than Windows OS True 1
In Linux OS we used only command line True 1
A program that surreptitiously allows access to a computer's resources via a True 1
network connection is knowns as a backdoor
A software development process is not known as a software development False 1
life cycle
Vendor will not provied a phone line near the equipment rack for False 1
troubleshooting on a required basis
Audit trail is must for all data updates/ amendments and deletion for security True 1
audit
In service suport vendor will provied hand holding for period of three to six True 1
months
The vendor will provied warranty for three year on the developed system True 1
and customised porduct
Vendor shall not maintain 99% uptime for the application driving warranty False 1
and AMC period
There is no web based application for Navy wide updation VA status on IT False 1
portal
As personal security no critical positions to be reviewed for sensitivity level False 1

Audit trails are used for receipt of sensitive input output True 1
Contigency plan are to be approved by key affected parties True 1
Security control should be able to detect unauthorised access attempts True 1

Audit trail should provide a trace of user actions True 1


Structural requirements does not explains what has to be done by False 1
identifying the necessary structure of a system
Multiple Choices Part of a s-Drive is 2 4 3 0 3 1

For a internet PC which operating system is required in Indian Navy Windows Java Nav-IOS none of these Nav-IOS 1

IT Steering Committee - Apex Body chaired by ACOM(IT&) CSO (Tech) VCNS COM VCNS 1
Naval IT Technical committee - IHQMoD(N) chaired by VCNS ACOM(IT&S) CSO (Tech) DIT ACOM(IT&S) 1
_____ are responsible for saving email messages as they deem All Indian Navy Individuals none of these Individuals 1
appropriate.
Max message size can be attached using outlook express/ web browser to 8MB 2MB 5MB 6MB 8MB 1
the mail is___
Max size ofa decompressed file is ________ 35MB 42MB 40MB 38MB 40MB 1
Max decompressed file count is _______ 100 105 110 115 100 1
______ is not responsible for the contents that are being sent as part of the Individuals self Indian Navy Unit Indian Navy 1
mail.
E-mail password shall not be shared even for ______ official purpose individual purpose friendly none of these official purpose 1

User shall ensure that ________software and the virus pattern files are up- OS patches anti-virus programm anti-virus 1
to-date.
Proposals for implementing ERP solutions are to be processed like any NO 21/06 NO 25/06 NO 24/06 NO 22/06 NO 21/06 1
other IT porjects iaw
ERP is available both as__ Free and open proprietary both 1 &2 none of these both 1 &2 1
source software
Features of audit is Process invocation Data deletion authentication of all of these all of these 1
clients and uses
Strong password should contain how many characters 8 to 14 8 to 12 8 14 8 to 14 1
Microsoft announced end of product support for Windows XP OS by--- 10-Apr-14 12-Apr-15 8-Apr-14 8-Apr-15 8-Apr-14 1

The development philoshophy for software applicatin is laid down in --- NO 21/06 NO 24/05 NO 21/07 NO 20/10 NO 21/06 1

NIC e-mail accounts is laid in IT policy ---- Policy 05/2015 Policy 10/2015 Policy 05/2014 Policy 20/2015 Policy 05/2015 1
NIC e-maill accounts shall be used by all personnels for ---- Official Personal both 1 &2 none of these Official Communication 1
Communication Communication
NIC e-mail accounts will be deactivated if inactive for period of --- 60 days 45 days 90 days 120 days 90 days 1
NIC e-mail account logs will be maintained for a period of --- 6 months 2 years 3 years 1 years 2 years 1
Which policy contains hosting and security of naval websites on internet --- Policy 01/2016 Policy 01/2017 Policy 02/2017 None of these Policy 01/2017 1

Design considerations consists of these aspects Compatibility Extensibility fault tolerance all of these all of these 1
Design concepts are ------ abstraction refinement both 1 &2 None of these both 1 &2 1
Examples of modelling language is -- Business process fundamental both 1 &2 None of these both 1 &2 1
modelling notation modelling concepts

Software testing depends on ---- Testing method Scope both 1 &2 None of these Testing method 1
types of white box testing-- API Testing Code Coverage Fault Injection all of these all of these 1
Method
Black box testing includes Equivalence Fuzz testing exploratory testing all of these all of these 1
partitioning
Testing levels are classified as --- Unit testing integration testing either 1 or 2 both 1 and 2 both 1 and 2 1

Categories of maintenance in ISO/ IEC 14764 are Corrective Adaptive perfective all of these all of these 1
maintenance maintenance maintenance
which documents are required to be prepared/ filled prior undertaking VA VA documentation form 1 acceptance form none of these VA documentation 1

Who notifies vulnerability and release the software patches and upgrades company OEM Vendor none of these OEM 1

One word question Virus stands for ___ Vital informantion resources under seize 1

NEWN Stands for Navy Enterprise Wide Area Network 1


What is Firefox Application 1
Which type of language is Java Programming Language 1
RDBMS Stands for Relation Database Management System 1
What is HTML Web designing software 1
What is Oracle RDBMS 1
What is ASP Web designing software 1
What is the use of ASP web designing 1
What is web designing software HTML, ASP 1
All subsites will have to be developed in ----as per the policy 01/2017 Drupal Content Management System with MY SQL 1

Limited static content requires -- Text and image based content 1


Limited content website-- Text and image based content and web pages 1
NICSI stands for -- National Informatics Center Services Inc 1
GIGW stands for --- Government of India guidelines for websites 1
HSP stants for --- Hosting Service Provider 1
Software development process is also known as --- SDLC(Software Development Life Cycle) 1
Which website are excluded in policy 01/2017 MSIS and IONS 1
What focuses on the processing of each modules individually Software procedure 1
A program structure that represents the organization of a program Control hierarchy 1
components and implies a hierarchy of control
What is a tool or set of utilities that may be used by an attacker to gain Root kit 1
administrator level privileges and then maintain undetectable presence on
an affected machine.
which any software program that employs a users network connection in the Spyware 1
background without their permission or knowledge

Which Software programs that do something their programmers intended Trojans 1


but that the user would not approve of if they knew about it are known as ?

What is is a self-replicating program that explicitly copies itself ? A computer virus 1


Which term is to distinguish self-contained programs that break into a WORM 1
system via remotely exploitable security flaws and self -instantiate ?

Requirements specification for a software system is a complete description Software Requirements Specification (SRS) 1
of the behaviour of a system to be developed is known as ?

Which requirements explain what has to be done by identifying the Behavioural Requirements 1
necessary behaviour of a system ?
Which process or result of generalization by reducing the information Abstraction 1
content of a concept or an observable phenomenon is known as

A program structure that represent the organization of a program control Hierachy 1


components and implies a hierachy of control known as
It is a representation of the logical relationship among individual elements of Data structure 1
data is known as
What defines, where the software is able to operate under stress or tolerate Robustness 1
unpredictable or invalid input.
Which software is able to perform a required function under stated Reliabiltiy 1
conditions or a specified period of time
What makes improve the coverage of a test by introducing faults to test Fault-injection methods 1
code paths
What is needed to check if the user interface is easy to use and understand Usability testing 1
?
What is a table that correlates requirements or design documents to test A traceability matrix . 1
documents ?
Modification of a software product performed after delivery to keep a Adaptive maintenance 1
software product usable in a changed or changing enviornment is called ?

What is is a computer program licensed under exclusive legal right of the Proprietary software 1
copyright holder known as
Which Web based application has been developed for navy wide updation VA application 1
of VA status and can be accessed through IT portal ?
What is provides an additional protection to web sites and web services ? A Web Application Firewall 1

Success of the vision of an Effective knowledge management depends to a Tacit knowledge 1


great extent on the organisational culture that promotes sharing of
information related to personal experiencies, expert opinions, recommended
solutions is known as ?
Comprehension 0
Information Fill in the blanks ___________is required to coordinate cyber security activities across the The Chief Information Security Officer of the Navy 1
Security Navy (CISONavy)
Technical and Directorate 1
secretarial support for the CISO will be provided by the ________ of Information Warfare (DIW)

EPABX stand for __________ Electronic Private Automatic Branch Exchanges 1


IPMS stands for__________ Integrated Platform Management Systems 1
IMCS stands for _____________ Integrated Machinery Control Systems 1
_________________, comprising a set of rules applied by the owner of a Acceptable Usage Policy 1
cyber-system that defines the way in which the system may be used by
authorized users.
A formal Risk Management process yields the list of security measures cyber threats 1
(controls) that are required to protect the system from ___________

CSAT stands for Computer Security Audit Team 1


_________________ lay down specifics of operation of the cyber System to Standard Operating Procedures (SOPs) 1
meet these higher level objectives
SCADA stands for ________________ Supervisory Control and Data Acquisition 1
______________computer systems include all programmable devices Embedded 1
where functionality is provided through a set of software instructions

_________________ whose program code can be altered are most Embedded computer systems 1
susceptible to cyber-attacks
___________ in software comprise the single largest cause Weaknesses 1
of vulnerabilities of cyber systems
_____________ should be taken into account during the procurement Software security 1
phase, and relevant security standards are to be included in the NSQRs.

________________ should take security into consideration, from the design Software architecture 1
stage itself.
Data of security classification __________ and above are to be stored in SECRET 1
encrypted manner on portable media only.
Network security in respect of large networks is handled by ___________ Security Operations Centres (SOC) 1

Intranet traffic that is required to pass over public infrastructure is to be encrypted 1


___________ using an authorized encryption mechanism
_______ traffic that is required to pass over public infrastructure is to be Intranet 1
encrypted using an authorized encryption mechanism
Local Area Networks that are connected to the Internet Network Address Translation (NAT) 1
should employ _______________ at the gateways.
True or False Computer Security Audits are to examine official PCs for compliance of the 1
above policies, and ensure that naval intranets are air-gapped from the
global Internet.
Only unauthorised Internet connections provided by the Navy are permitted 1
to be used on official PCs
LANs and PCs that connect to the Internet are to be interconnected with 1
naval PCs or intranets
The IP Address assigned to each of the machines of such networks is not to 1
be maintained, to enable trace-back in case of any breach/ incident.

Offline encryption systems are not to be installed on 1


PCs connected to the Internet.
Networked applications are to adhere to the security 1
policies of the underlying networks.
Indian Navy’s intranets are not to be connected to the 1
global Internet
Data of security classification RESTRICTED and above are to be stored in 1
encrypted manner on portable media only.
Access to data should be restricted to authenticated users who are 1
authorised for such access.
Unauthorised hardware is not to be connected to any 1
naval cyber system.
Unusual activity by cyber devices is to be reported 1
and investigated to rule out any malicious intent.
Security Audits are to be undertaken by custodians 1
of cyber systems to avoid conflict of interest
Audits of IT systems such as desktop PCs and servers are not to be 1
undertaken by teams with working knowledge of IT Systems
Electronic audit trails are not to be stored in protected locations that are 1
accessible only to authorised users.
Incident Response for cyber security incidents reported by naval units will 1
be undertaken by the Computer Incident Response Team (CIRT-Navy).

Personnel are not to be accorded the minimum level of access required for 1
them to carry out their duties
Automated monitoring systems and logging is not to be carried out on all 1
administrative tasks undertaken.
Civilian personnel are not to be supervised by naval personnel during the 1
period that they have access to the system
Activities undertaken by civilian personnel are to be recorded by the person 1
supervising such activities.
Unusual activity by cyber devices is to be reported and investigated to rule 1
out any malicious intent.
Human-Machine Interface are susceptible to cyber-attacks 1
Embedded computer systems whose program code can 1
be altered are most susceptible to cyber-attacks.
Embedded systems that can be accessed from outside 1
Stand-alone networks and PCs employed for machinery/ equipment control 1
can be subject to cyber-attacks.
Software security should be taken into account during the procurement 1
phase.
Use of open source systems is not to be encouraged, where possible 1

Comprehensive input validation is to be performed whenever the 1


application/ program takes external inputs.
Software of unknown origins is prohibited to be installed/ used on naval 1
systems.
Software to detect malware (eg anti-virus) is not to be 1
installed on all naval systems
process to frequently and periodically update malware is not to be 1
undertaken.
Operating Systems and commercial programs are to 1
be updated regularly through an established process.
Critical data is not to be backed-up regularly 1
Multiple Choices which navy order is infosec order referred to NO 28/15 NO 25/16 NO 28/17 NO 25/18 1 1

Types of computer networks LAN WAN MAN All of these 4 1


ILMS stands for Integrated Integrated both 1 &2 None of these 1 1
Logistics Electrical
Management Management
System System
Which systems use embedded computers Weapons sensors both 1 &2 None of these 3 1
what includes in asset list Hardware Software both 1 &2 None of these 3 1
what are the elements of cyber security physical security Personnel security Hardware security All of these 4 1

what are the requirements of physical security To protect the To protect the To prevent an All of these 4 1
components of an components of an unauthorized user
IT system from IT system from from accessing
damage theft
What are the physical security measures of cyber security Asset management Access control physical security both 1 and 2 4 1
measures
What are end-users computing devices desktops PCs laptop All of these 4 1
which of the following is not personnel security Personnel are to be To protect the Duties and None of these 2 1
accorded the components of an responsibilities of
minimum level of IT system from users accessing the
access required for damage, theft or system are to be
them to carry out destruction clearly laid down in
their duties the policies/ SOPs

what is a hardware security as per option Unauthorised To protect the both 1 &2 All of these 1 1
hardware is not to components of an
be connected to IT system from
any naval cyber damage
system
when software security should be taken into account. leasing phase procurement both 1 &2 None of these 2 1
phase
Adequate security measures need to be incorporated Hardware phase Software both hardware and none of these 2 1
during Development software life cycle
Lifecycle (SDLC)

What peripherals are to be sourced from trusted agencies/ repositories only Device drivers proprietary both 1 &2 All of these 4 1
software
when does Software to detect malware to be updated monthly yearly frequent and weekly 3 1
periodically
Official data at rest to be stored in unsecured manner secured manner not to be stored should not have 2 1
official data on any
PC
Critical data is not backedup daily regularly periodically All of these 4 1
Which security classification of data to be stored in encrypted manner Secret top secret confidential restricted 1 1

Network security in respect of large SOC AOC COC None of these 1 1


networks is handled by
What are the measures for safe network security Indian Navy’s Networked Networks are to be All of these 4 1
intranets are not to applications are to protected by means
be connected to the adhere to the of firewalls
global Internet security and intrusion
policies of the detection
underlying
networks
Wireless networks, if employed are to be adequately Authentication Authorisation Strong Encryption All of these 4 1
protected
Internet is to be accessed only using Standalone PCs NUD PCs both 1 &2 none of these 1 1
Which data is to be store/ processed through internet PC Classified data No Classified data restricted data confidential data 2 1

which data is not be transferred or sent through internet on internet PC Encrpyted data not Encrpyted data both 1 &2 none of these 1 1

which OS is to be installed on Internet PCs UNIX LINUX BOSS LINUX WINDOWS 3 1


open standards and architecture should be preferred over proprietary facilitate reduce training All of these 4 1
systems interoperability requirements
Vision of information security is to ensure apprenhensive comprehensive both 1 &2 None of these 2 1
cyber security cyber security
Upto which security classification data is to be send on NUD by encryption restricted confidential secret top secret 2 1
using SENIC lite/SECLORE
Every data transferred onto internet PC is to be encrypted in SECEM SENIC lite SECLORE None of these 1 1
A Risk management require periodic VA and CSAT VA CSAT All of these 1 1
Risk Management is the process of , identifying analyzing assessing none of these 1 1
and
IM stands for _____________ Instant Messaging intent Messaging intended Message Inline Message 1 1

One word question who is required to coordinate cyber security activities across the The Chief Information Security Officer of the Navy 1
Navy (CISONavy)
who provides Technical and secretarial support for the CISO Directorate of Information Warfare (DIW). 1
HRMS stands for Human Resource Management Systems 1
Adequate security measures need to be incorporated Software Development Lifecycle(SDLC) 1
during
Interface are susceptible to cyber-attacks. Human-Machine 1
What data Security deals with the official data Protection 1
Duration of backing up of critical data Regularly 1
what are the methods for deleting data in a storage media Shredding/ degaussing/ overwriting 1
Data stored on portable media should be protected using an approved cryptography system. 1

who handles Network security in respect of large network Security Operations Centres (SOC) 1
By what means network should be protected Firewalls 1
which encryption systems are not be connected to PCs those connected to Offline encryption systems 1
internet
what shd be employed at the gateways when LANs are connected to Network Address Translation (NAT) 1
internet
VA stands for Vulnerability assessment 1
which process is undertaken along with SOPs of the cyber system while Examination of cyber security policy 1
performing VA
which agencies are not suppose to undertake the vulnerability assessment Civilian Agencies 1
test of operational networks
VA process is to be repeated periodically at not intervals not exceeding 3 years 1

who will undertaken the incidents reports for cyber security incidents CIRT-NAVY 1
reported by naval units
NCIIPC stands for National Critical Information Infrastructure Protection 1
Committee

NCCC stands for National Cyber Command and Control 1


Centre
What does CERT Stands for ? Computer Emergency Response Team 1
What is IRC ? Internet Relay Chat 1
Which security ensures through a holistic approach that involves people, Cyber security 1
processes and technology ?
Who gives the technical and secretarial support to CISO ? DIW 1
What capability is built in mission to protect the information and its capabilities to prevent and respond to cyber threat 1
infrastructure in cyber space ?
list down the IT assets to be accorded as per the Cyber security is PCs, Laptops, tablets, Printers, scanners, multi-functional 1
concerned ? devices,digital camera, storage devices
Which telecommunication is used within Navy at Naval Exchanges ? Electronic Private Automatic Branch Exchanges (EPABX) 1

Which embedded systems are used at operational front in Indian Navy? Combat Management Systems (CMS), Fire Control 1
Systems (FCS), data-link systems and Maritime Domain
Awareness (MDA) systems
Which systems are used for machinery and equipment control systems ? Integrated Platform Management Systems (IPMS), 1
Integrated Machinery Control Systems (IMCS)
Who are responsible for issue of Standard Operating Procedures to ensure Individual units 1
implementation of system level policies ?

What is the main purpose of the cyber security policy ? to state the protection needed for the cyber system 1
In which list all hardware and software components are included ? Assets List 1
Which process yields the list of security measures (controls) that A formal Risk Management 1
are required to protect the system from cyber threats ?
Which policy comprises a set of rules applied by the owner of a cyber Acceptable Usage Policy 1
system that defines the use of system by authorized users?
What does Risk management provides in cyber system Periodic Vulnerability assessment and Computer Security 1
Audit
Where is specification laid down of how to operate in the cyber system to Standard Operating Procedures (SOPs) 1
meet higher level objectives?
Which security is accounted to protect the components of an IT system from Physical security 1
damage, theft or destruction ?
Which attacks are susceptible to Human-Machine Interface ? cyber-attacks 1
During which occasions software security is to be taken in account ? during the procurement phase, and relevant security 1
standards
Which testing of application software is to be undertaken at the induction Static and dynamic security testing 1
stage of software to eliminate potential software vulnerabilities ?

Comprehension 0
Information Fill in the blanks __________ is the process to determine the security status of information Vulenerability Assessment 1
Warfare system
RACL Stands for Router Access Control List 1
_______ is the process of identifying weakness in security configuration System Configuration Review 1
controls
________ meathod is used to discover active and responding hosts on a Network Discovery 1
network and identifying weakness
________ and _________ techniques are used for discovering devices on a Passive and Active 1
network
__________techniques use a network sniffer to monitor network traffic and Pasive 1
record the IP address of the active hosts
ICMP stand for Internet Control Message Protocol 1
_________ and __________ involves using a port scanner to identify Network port and service identification 1
network ports potentially vulnerable services
Port Scaning and Service Identification examine all _________ and TCP and UDP 1
_________ ports for open, close and filter states
Additional information gathered during port scan can assist in identifying the OS Fingerprinting 1
target OS through a process called____________
WIPDS stands for Wireless Intrusion Detection and Preventation System 1

SSID stands for Service Set Identifier 1


________ Is the core of an OS Kernal 1
SQL commands that runs to malicious changes that user has requested is SQL Injection Attack 1
known as
_________ is a term for any file that contains a reference to another file or Symbolic Links 1
directory in the form of an absolute or relative path
____________ can occur during the time a program or process has Race Condition 1
entered into a privelaged mode
OWASP stands for Open Web Application Security Project 1
_________Concerns the use of a broad range of information security DataBase Security 1
controls to protect database
_________ System provide the essential services of Authorization, Acess Control 1
Identification and Authentication
__________comprise external systems/ data on which the cyber system is System Dependencies 1
dependent for its functioning
True or False Confidentiality is the property that information is available only to authorised 1
personnel and not available or disclosed to unauthorised individuals

Integrity is the property that information is accurate, reliable and 1


untampered by authorised personnel
Availability is the property that information and information systems are 1
accessible to authorised personnel when needed and available for the
intended purpose of the system
Weakness in an information system, system security procedures, internal 1
controls or implementation that could be exploited by a threat is called Risk

Risk is defined as the probability of an adverse impact on an organisation as 1


a result of a threat triggering or exploiting vulnerability

PLC stands for Programmable Logic Controller 1


Physical security measures are those that ensure the security of cyber 1
systems and their constituent components from unauthorised access and
compromise
User accounts are not permitted, for normal operation of systems 1
Default Password is to be changed prior to introduction of any 1
programmable components into the system
All hardware and software should be introduced into the system in a 1
deliberate organised manner to ensure that they do not get connected with
factory defaults
Sensitive and Operational data not to be secured through encryption both at 1
rest and while in transit, as far as possible.
Avaliability is the property that information and information systems are 1
accessible to unauthorised personnel when needed and available for the
intended purpose of the system
Access controls are physical and procedural measures implemented to 1
restrict access to the system to legitimate, authorised users

All users are to be given specific login credentials with the aim of trace-back 1
in case of any incident
SCDA stands for Supervisory Control and Data Acquisition 1
ICS stands for Industrial Computer Systems 1
Platform Information Technology (PIT) Systems embedded computer 1
systems are not used for platform management, combat management,
machinery control, fire control etc
PIT Stands for Platform Information Technology 1
The aim of network survey is to find the number of non reachable system 1
which can be tested and to map the topology of the network

User accounts are permitted, for normal operation of systems 1


Network access should be controlled through defining legitimate 1
connections to the system, by specifying IP and MAC
Default Password is not to be changed prior to introduction of any 1
programmable components into the system
Network Access should be controlled through defining legitimate 1
connections to the system, by specifying IP and MAC addresses, ports,
protocols
Sensitive and Operational data need to be secured through encryption both 1
at rest and while in transit, as far as possible.
Port Scanning is the invasive probing of ports on a inactive system 1

Probing for services will reveal the services that are running, which could 1
have potential vulnerabilities
Automated vulnerability scans using scanning tools is the easiest means to 1
identify system vulnerabilities that apply to common applications and
operating systems
Port Scanning is the invasive probing of ports on a live system 1
Access controls are physical and procedural measures implemented to 1
restrict access to the system to legitimate, unauthorised users

All hardware and software should be introduced into the system in a 1


deliberate organised manner to ensure that they do get connected with
factory defaults
To enable trace-back post an incident, it is essential that logs of 1
administrators are preserved in a secure manner
Patch Management is the process of updating a system with patches and 1
upgrades provided by the OEM/ maintainer
Multiple Choices Operating system security can be ensured by ? Performing regualr Installing Updated Scrutinizing all All of the above 4 1
OS Path Updates antivirus engines incomin and
and softwares outgoing network
through firewall
PLC stands for Physical Layer Programmable Programmable Line Programmable Logic 2 1
Computer Logic Controller Controller Computer
___________ that is used for actuation of machinery controls in the engine PLC TLC ATU PLI 1 1
room may have a USB port for maintenance
Passive techniques use a network sniffer to monitor _________ Internet Traffic Network traffic Speed Data 2 1
Kernal Is the core of an _________ Cache CPU Processor Operating System 4 1

DataBase Security concerns the use of a broad range of information Copy Database Sell Database protect database Control Database 3 1
security controls to _________
SSID stands for System Set Service Set Sysytem Set Identity Service set Identity 2 1
Identifier Identifier
WIPDS stands for Wireless Intrusion Wireless Wired Intrusion Wireless Intrusion 1 1
Detection and Information Detection and Developing and
Preventation Detection and Preventation System Preventation System
System Preventation
System
Network Port and Service Identification involves using a port scanner to Worms Viruses vulnerable services Adware 3 1
identify network ports potentially __________
OWASP stands for Open Web Address Open World Open Web Open Web 4 1
Security Project Application Application Service Application Security
Security Project Project Project
____________ can occur during the time a program or process has Security Mode Privacy Mode Security Condition Race Condition 4 1
entered into a privelaged mode
RACL Stands for Read Access Router Access Router Address Router Access 2 1
Control List Control List Control List Computer List
Vulnerability assessment is the process to determine the ___________ Health System security Service 3 1
status of information system

_________ is the property that information is available only to authorised Confidentiality Integerity Security Availability 1 1
personnel and not available or disclosed to unauthorised individuals

_______ is the property that information is accurate, reliable and Confidentiality Integerity Security Availability 2 1
untampered by unauthorised personnel
__________ is the property that information and information systems are Confidentiality Integerity Security Availability 4 1
accessible to authorised personnel when needed and available for the
intended purpose of the system
__________ is defined as the probability of an adverse impact on an Weakness Cisc Risk unauthorisation 3 1
organisation as a result of a threat triggering or exploiting vulnerability

__________is the systematic process of identifying threats, vulnerabilities Weakness Cisc assessment Risk assessment Unauthorise 3 1
and risks to a cyber-system. assessment assessment
_________ should be controlled through defining legitimate connections to Data Access Internet Access Network Access Process 3 1
the system, by specifying IP and MAC addresses, ports, protocols

___________ data need to be secured through encryption both at rest and Sensitive Important Sensitive and confidential 3 1
while in transit, as far as possible. operational
All hardware and software should be introduced into the system in a OEM Factory defaults Model PATT Num 2 1
deliberate organised manner to ensure that they do not get connected
with_________
________ is to be changed prior to introduction of any programmable Default Password Admin Password User Password Default settings 1 1
components into the system
__________accounts are not permitted, for normal operation of systems Individual accounts Administrator and user accounts Designation Based 2 1
Guest accounts
What is IDS/ IPS stands for Information Intrusion Detection Intrusion Intrusion Detection 4 1
Detection and and Protecting Development and and Prevention
Prevention Systems Systems Prevention Systems Systems

UTM stands for Uniform Threat Unified Through Unified Threat Unified Threat 2 1
Management Management Management Material
Physical security measures are those that ensure the security of cyber authorised access authorised access unauthorised access unauthorised access 3 1
systems and their constituent components from _____________ and compromise and compromise and authorised
access

_________are physical and procedural measures implemented to restrict Access controls Access Denied Access Point Access entry 1 1
access to the system to legitimate, authorised users
All users are to be given specific login credentials with the aim of _______ Evaesdropping Snooping Hacking trace-back 4 1
in case of any incident
To enable trace-back post an incident, it is essential that _______ of Data logs List Passwords 2 1
administrators are preserved in a secure manner
___________ is the process of updating a system with patches and Patch Uploading Patch Updating Patch Management Patch Installing 3 1
upgrades provided by the OEM/ maintainer
Documentation pertaining to each process is to be reviewed and updated on validity and authorised access unauthorised access unauthorised access 1 1
a periodic basis in order to ensure their _______ and _________ accuracy and compromise and compromise and accuracy

SCDA stands for Supervisory Supervisory Supervisory Control Supervisory Control 4 1


Computerl and Data Control and and Data Access and Data Acquisition
Acquisition Dynamic
Acquisition
One word question What techniques are used for discovering devices on a network Passive and Active 1

What is used as a network sniffer Pasive Technique 1


ICMP stand for Internet Control Message Protocol 1
Which Port involves port scanner to identify network Network port 1
Which Protocols are used for port Scaning and Service Identification TCP and UDP 1

Which process gathers information during port scan can assist in identifying OS Fingerprinting 1
the target OS
WIPDS stands for Wireless Intrusion Detection and Preventation System 1

What is the core of an OS Kernal 1


SQL commands that runs to malicious changes that user has requested is SQL Injection Attack 1
known as
A link to a file that contain reference to another file or directory in the form of Symbolic Links 1
an absolute or relative path is called
Which system provides the essential services of Authorization, Identification Acess Control 1
and Authentication
OWASP stands for Open Web Application Security Project 1
The use of a broad range of information security controls to protect DataBase Security 1
database is known as
The process to transform plain text into cipher text is called Encryption 1
RDBMS stands for Relational Database Management System 1
Rule which states that every table should have primary key which is not null Entity Integrity 1
and unique is called
SSH stands for Secure Shell 1
HTTPS stands for Hyper Text Transfer Protocol Secure 1
EPABX Electronic private Automatic Branch Exchanges 1
What are the components of Cyber Security Confidentiality Integrity Avaliablity 1
Who is responsible for issue of Standard Operating Procedures to ensure Individual Units 1
implementation of system level policies.
What should be controlled through defining legitimate connections to the Network Access 1
system, by specifying IP and MAC addresses, ports, protocols

Network access should be controlled through defining legitimate IP and MAC 1


connections to the system, by specifying
What data need to be secured through encryption both at rest and while in Sensitive and operational 1
transit, as far as possible.
All hardware and software should be introduced into the system in a Factory defaults 1
deliberate organised manner to ensure that they do not get connected with.

What is to be changed prior to introduction of any programmable Default passwords 1


components into the system
Which type of accounts are not permitted, for normal operation of systems Administrator and Guest 1
Physical security measures are those that ensure the security of cyber unauthorised access and compromise 1
systems and their constituent components from
in case of any incident all users are to be given specific login credentials Trace-Back 1
with the aim of
The process of updating a system with patches and upgrades provided by Patch Management 1
the OEM/ maintainer
Documentation pertaining to each process is to be reviewed and updated on Validity and Accuracy 1
a periodic basis in order to ensure their
SCDA stands for Supervisory Control and Data Acquisition 1
ICS stands for Industrial Control Systems 1
Which Systems embedded computer systems used for platform PIT Platform Information Technology 1
management, combat management, machinery control, fire control etc

PIT Stands for Platform Information Technology 1


To find the number of reachable system which can be tested and to map the Network survey 1
topology of the network what is used
FTP stands for File Transfer Protocol 1
HTTPs Stands for Hyper Text Transfer Protocol 1
URL stands for Uniform Resource Locator 1
DIW stands for Directorate of Information Warfare (DIW). 1
Comprehension 0

You might also like