2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
10th January 2017, 10:02 AM
Super Moderator
 
Join Date: Aug 2012
Re: Old Exam Papers Of Saurashtra University

Don’t worry I will get the Saurashtra University, BSCIT semester-6 exam paper so that you can remember easily.

Here is the exam paper


(1)_______is the size of MAC address?
(a)16-bits
(b)32-bits
(c)48-bits
(d)64-bits

(2)What is the use of Ping command?
(a)To test a device on the network is reachable.
(b)To test a bug in application.
(c)To test an application quality.
(d)To test a hard disk quality.

(3)MAC address is the example of_________.
(a)Transport layer.
(b)Data link layer.
(c)Application layer.
(d)Physical layer.

(4)In IOS network architecture, the routing is performed by_________.
(a)Transport layer.
(b)Data link layer.
(c)Network layer.
(d)session layer.

(5)_________of the Transport layer protocol is connectionless.
(a)UDP
(b)FTP
(c)LTP
(d)NFS

(6)________layer of the OSI determines the interface with system and to the user.
(a)Network.
(b)Application.
(c)Data link.
(d)Session.

(7)An attempt to make a computer resource unavailable to its intended user is called__________.
(a)Virus attack.
(b)Worms attack.
(c)Bottleneck attack.
(d)Denial of service attack

(8)In tunnel mode IPsec protects the_______.
(a)IP Header
(b)IP Payload
(c)Entire IP packet
(d)None of above

(9)_____of the following TCP/IP protocols is used for transferring files from one machine to another?
(a)SMTP
(b)FTP
(c)SNMP
(d)ICMP

(10)_______of the following protocol is/are defined in Transport layer.
(a)FTP
(b)TCP
(c)UDP
(d)Both(b)&(c)

(11)In asymmetric key cryptography,the private key is kept by_________.
(a)Sender
(b)Receiver
(c)Both Sender and Receiver
(d)All the devices on network

(12)What is the address range of a Class B network address in binary?
(a)01XXXXXX
(b)0XXXXXXX
(c)10XXXXXX
(d)110XXXXX

(13)MTU stands for_______.
(a)Maximum Transfer Unit.
(b)Minimum Transfer Unit.
(c)Modeling Time Unit.
(d)Master Trip Unit.

(14)Which statement is/are true regarding ICMP packets?
(a)ICMP guarantees data-gram delivery.
(b)ICMP can provide hosts with information about network problems.
(c)ICMP is encapsulated within UDP data-grams.
(d)None of these.

(15)In asymmetric key cryptography,_________ keys are required per communicating party.
(a)2
(b)3
(c)4
(d)5

(16)The __________ is a collection of protocols that provide security for a packet at the network level.
(a)IPsec
(b)Net-sec
(c)Packet-sec
(d)Protocol-sec

(17)The components of IP security includes___________.
(a)Authentication Header
(b)Encapsulating Security Payload
(c)Internet Key Exchange
(d)All of above

(18)In Cryptography, the message after transformed is called__________.
(a)Text
(b)Plain Text
(c)Cipher Text
(d)Both(a)&(b)

(19)VPN stands for_________.
(a)Virtual Private Network
(b)Virtual Public Network
(c)Virtual Ping Network
(d)None of these

(20)__________Protocol used with TCP/IP and resolve IPv4 address to its physical address.
(a)ARP
(b)RARP
(c)SNMP
(d)ICMP

Address:-
Saurashtra University
Saurashtra University Campus, Rajkot, Gujarat 360005

Phone:-
0281 257 8501


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 08:27 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4