#1
10th January 2017, 09:40 AM
| |||
| |||
Old Exam Papers Of Saurashtra University
Please get the BSCIT semester-6 exam paper issued by Saurashtra University, here I will get details for you?
|
#2
10th January 2017, 10:02 AM
| |||
| |||
Re: Old Exam Papers Of Saurashtra University
Don’t worry I will get the Saurashtra University, BSCIT semester-6 exam paper so that you can remember easily. Here is the exam paper (1)_______is the size of MAC address? (a)16-bits (b)32-bits (c)48-bits (d)64-bits (2)What is the use of Ping command? (a)To test a device on the network is reachable. (b)To test a bug in application. (c)To test an application quality. (d)To test a hard disk quality. (3)MAC address is the example of_________. (a)Transport layer. (b)Data link layer. (c)Application layer. (d)Physical layer. (4)In IOS network architecture, the routing is performed by_________. (a)Transport layer. (b)Data link layer. (c)Network layer. (d)session layer. (5)_________of the Transport layer protocol is connectionless. (a)UDP (b)FTP (c)LTP (d)NFS (6)________layer of the OSI determines the interface with system and to the user. (a)Network. (b)Application. (c)Data link. (d)Session. (7)An attempt to make a computer resource unavailable to its intended user is called__________. (a)Virus attack. (b)Worms attack. (c)Bottleneck attack. (d)Denial of service attack (8)In tunnel mode IPsec protects the_______. (a)IP Header (b)IP Payload (c)Entire IP packet (d)None of above (9)_____of the following TCP/IP protocols is used for transferring files from one machine to another? (a)SMTP (b)FTP (c)SNMP (d)ICMP (10)_______of the following protocol is/are defined in Transport layer. (a)FTP (b)TCP (c)UDP (d)Both(b)&(c) (11)In asymmetric key cryptography,the private key is kept by_________. (a)Sender (b)Receiver (c)Both Sender and Receiver (d)All the devices on network (12)What is the address range of a Class B network address in binary? (a)01XXXXXX (b)0XXXXXXX (c)10XXXXXX (d)110XXXXX (13)MTU stands for_______. (a)Maximum Transfer Unit. (b)Minimum Transfer Unit. (c)Modeling Time Unit. (d)Master Trip Unit. (14)Which statement is/are true regarding ICMP packets? (a)ICMP guarantees data-gram delivery. (b)ICMP can provide hosts with information about network problems. (c)ICMP is encapsulated within UDP data-grams. (d)None of these. (15)In asymmetric key cryptography,_________ keys are required per communicating party. (a)2 (b)3 (c)4 (d)5 (16)The __________ is a collection of protocols that provide security for a packet at the network level. (a)IPsec (b)Net-sec (c)Packet-sec (d)Protocol-sec (17)The components of IP security includes___________. (a)Authentication Header (b)Encapsulating Security Payload (c)Internet Key Exchange (d)All of above (18)In Cryptography, the message after transformed is called__________. (a)Text (b)Plain Text (c)Cipher Text (d)Both(a)&(b) (19)VPN stands for_________. (a)Virtual Private Network (b)Virtual Public Network (c)Virtual Ping Network (d)None of these (20)__________Protocol used with TCP/IP and resolve IPv4 address to its physical address. (a)ARP (b)RARP (c)SNMP (d)ICMP Address:- Saurashtra University Saurashtra University Campus, Rajkot, Gujarat 360005 Phone:- 0281 257 8501 |
|