Kerala PSC Previous Years Question Paper & Answer

Title : SUB INSPECTOR OF POLICE TRAINEE POLICE KERALA CIVIL POLICE /ARMED POLICE SUB INSPECTOR TRAINEE POLICE ARMED POLICE BN/ASST JAILER GR I /SUPERINTENDENT SUB JAIL /EXCISE INSPECTOR EXCISE
Question Code : A

Page:11


Below are the scanned copy of Kerala Public Service Commission (KPSC) Question Paper with answer keys of Exam Name 'SUB INSPECTOR OF POLICE TRAINEE POLICE KERALA CIVIL POLICE /ARMED POLICE SUB INSPECTOR TRAINEE POLICE ARMED POLICE BN/ASST JAILER GR I /SUPERINTENDENT SUB JAIL /EXCISE INSPECTOR EXCISE' And exam conducted in the year 2015. And Question paper code was '169/2015'. Medium of question paper was in Malayalam or English . Booklet Alphacode was 'A'. Answer keys are given at the bottom, but we suggest you to try answering the questions yourself and compare the key along wih to check your performance. Because we would like you to do and practice by yourself.

page: 11 out of 12
Excerpt of Question Code: 169/2015

91.

92,

93.

94.

95.

96.

Any electronic signature or electronic authentication technique shall be considered reliable :

(^) If the signature creation data or the authentication data are, within the context in
which they are used, linked to the signatory or, as the case may be, the authenticator
and of no other person

(8) If the signature creation data or the authentication data were, at the time of signing,
under the control of the signatory or, as the case may be, the authenticator and of no
other person

(ಲ) Ifany alteration to the information made after its authentication by electronic signature
is detectable

عوط عط الخ ‎(D)‏

Which among the following is a malware programme that replicates itself in order to spread
to other computers ?

(A) Computer virus (18) Computer worm

(^) Trojan D) Rootkit
1

The act of creating misleading websites for the purpose of online identity theft is called :

(ಗಿ) Spoofing (8) Phishing (^) Cheating (D) Hacking

Which of the following is NOT a requirement for operating wi-fi network ?

(^) Wireless router (0) Transponders (0) Antenna (D) Wireless adapter

The activity of creating sectors and tracks on a hard disk is called :

(A) Tracking (B) Sectoring (C) Plattering (D) Formatting

The Indian Computer Emergency Response Team serves as :

(ക) The National Nodal Agency in respect of Critical Information Infrastructure Protection
(B) The Cyber Regulations Advisory Authority

(ര The National Agency for incident response

(D) None of the above

13 169/2015
{P.T.0.)

Similar Question Papers

Ask Question

(Press Ctrl+g to toggle between English and the chosen language)


Questions & Answers

SUB INSPECTOR OF POLICE TRAINEE POLICE KERALA CIVIL POLICE /ARMED POLICE SUB INSPECTOR TRAINEE POLICE ARMED POLICE BN/ASST JAILER GR I /SUPERINTENDENT SUB JAIL /EXCISE INSPECTOR EXCISE : Video