Page:1
Below are the scanned copy of Kerala Public Service Commission (KPSC) Question Paper with answer keys of Exam Name 'HSST COMPUTER SCIENCE - SR FOR SC/ST' And exam conducted in the year 2016. And Question paper code was '086/2016/OL'. Medium of question paper was in Malayalam or English . Booklet Alphacode was 'A'. Answer keys are given at the bottom, but we suggest you to try answering the questions yourself and compare the key along wih to check your performance. Because we would like you to do and practice by yourself.
FINAL ANSWER KEY
Question Paper Code: 86/2016/OL
Category Code: 099/2015
Exam: HSST Computer Science SR For SC/ST
Medium of Question: English
Date of Test 29-12-2016
Alphacode A
Question1:-The buffer overflow attack is caused by
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Correct Answer:- Option-D
Question2:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Correct Answer:- Option-B
Question3:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Correct Answer:- Option-C
Question4:-Which of the following protocols is used in accessing web mail ?
A:-HTTP
B:-SMTP
C:-POP3
0-7۴
Correct Answer:-Question Cancelled
Question5:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
கறு
B:-gcd(x, y)
C:-xy/ged(x, y)
D:-None of these
Correct Answer:- Option-D
Question6:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical
output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Correct Answer:- Option-A
Question7:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Correct Answer:- Option-B
Question8:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Correct Answer:- Option-C