Persistent Previous Years Solved Sample Placement Papers
-
The primary goal of the......................protocol is to provide a private channel between communicating applications, which ensures privacy of data, authentication of the partners, and integrity.
- A) SSL
- B) ESP
- C) TSL
- D) PSL
Answer: A) SSL
-
The................is used to provide integrity check, authentication, and encryption to IP datagram.
- A) SSL
- B) ESP
- C) TSL
- D) PSL
Answer: B) ESP
-
In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
- A) Tunneling
- B) Encapsulation
- C) Both A and B
- D) None of the above
Answer: C) Both A and B
-
The.............................is a collection of protocols designed by Internet Engineering Task Force (IETF) to provide security for a packet at the network level.
- A) IPsec
- B) Netsec
- C) Packetsec
- D) Protocolsec
Answer: A) IPsec
-
At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations is called the ……………….
- A) SSL handshake protocol
- B) SSL authentication protocol
- C) SSL record protocol
- D) SSL cipher protocol
Answer: C) SSL record protocol
-
While initiating an SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server.
- A) 420
- B) 1032
- C) 443
- D) 322
Answer: C) 443
-
On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys is called the …………………
- A) SSL handshake protocol
- B) SSL authentication protocol
- C) SSL record protocol
- D) SSL cipher protocol
Answer: A) SSL handshake protocol
-
State whether the following statements are true.
- i) An application-level gateway is often referred to as a proxy.
- ii) In proxy, a direct connection is established between the client and the destination server.
- A) True, False
- B) False, True
- C) True, True
- D) False, False
Answer: A) True, False
-
If the time quantum is too large, Round Robin scheduling degenerates to:
(A) Shortest Job First Scheduling
(B) Multilevel Queue Scheduling
(C) FCFS
(D) None of the above
Ans: (C) -
Transponders are used for which of the following purposes?
(A) Uplinking
(B) Downlinking
(C) Both (A) and (B)
(D) None of the above
Ans: (C) -
The format specifier “-%d” is used for which purpose in C?
(A) Left justifying a string
(B) Right justifying a string
(C) Removing a string from the console
(D) Used for the scope specification of a char[] variable
Ans: (A) -
Which of the following is an infix expression?
a) (a+b)*(c+d)
b) ab+c*
c) +ab
d) abc+*
Answer: a
Explanation: (a+b)*(c+d) is an infix expression. +ab is a prefix expression and ab+c* is a postfix expression.
-
What is the time complexity of an infix to postfix conversion algorithm?
a) O(N log N)
b) O(N)
c) O(N²)
d) O(M log N)
Answer: b
Explanation: The time complexity of an infix to postfix expression conversion algorithm is mathematically found to be O(N).
-
What is the postfix expression for the corresponding infix expression?
a+b*c+(d*e)
a) abc*+de*+
b) abc+*de*+
c) a+bc*de+*
d) abc*+(de)*+
Answer: a
Explanation: Using the infix to postfix expression conversion algorithm, the corresponding postfix expression is found to be abc*+de*+.
-
Parentheses are simply ignored in the conversion of infix to postfix expression.
a) True
b) False
Answer: b
Explanation: When a parenthesis is encountered, it is placed on the operator stack. When the corresponding parenthesis is encountered, the stack is popped until the other parenthesis is reached and they are discarded.