Kerala PSC Previous Years Question Paper & Answer

Title : HSST COMPUTER SCIENCE - SR FOR SC/ST
Question Code : A

Page:1


Below are the scanned copy of Kerala Public Service Commission (KPSC) Question Paper with answer keys of Exam Name 'HSST COMPUTER SCIENCE - SR FOR SC/ST' And exam conducted in the year 2016. And Question paper code was '086/2016/OL'. Medium of question paper was in Malayalam or English . Booklet Alphacode was 'A'. Answer keys are given at the bottom, but we suggest you to try answering the questions yourself and compare the key along wih to check your performance. Because we would like you to do and practice by yourself.

page: 1 out of 11
Excerpt of Question Code: 086/2016/OL

FINAL ANSWER KEY

Question Paper Code: 86/2016/OL

Category Code: 099/2015

Exam: HSST Computer Science SR For SC/ST
Medium of Question: English

Date of Test 29-12-2016

Alphacode A

Question1:-The buffer overflow attack is caused by
A:-Vulnerability in the design of a networking protocol
B:-Vulnerability in the implementation of a networking protocol
C:-Vulnerability in human behaviour
D:-Vulnerability in software
Correct Answer:- Option-D

Question2:-Which of the following is not valid IPv4 addresses ?
A:-192.10.14.3
B:-201.172.275.33
C:-65.90.11.00
D:-193.20.250.10
Correct Answer:- Option-B

Question3:-Address resource records are associated with
A:-Routing tables in Internet routers
B:-ARP aches in LAN workstations
C:-DNS servers
D:-None of the above
Correct Answer:- Option-C

Question4:-Which of the following protocols is used in accessing web mail ?
A:-HTTP
B:-SMTP
C:-POP3
0-7۴
Correct Answer:-Question Cancelled

Question5:-If gcd(a, b) = x and gcd(b, c) = y, then gcd(a, c) is
கறு
B:-gcd(x, y)

C:-xy/ged(x, y)
D:-None of these
Correct Answer:- Option-D

Question6:-Assuming the same key is used, two occurrences of the same plaintext characters are encrypted as identical

output symbols in which of the following
A:-Caesar cipher
B:-Vigenere cipher
C:-Hill cipher
D:-One time pad
Correct Answer:- Option-A

Question7:-A product cipher is constructed using a combination of
A:-Symmetric and asymmetric ciphers
B:-Substitution and transposition ciphers
C:-Monoalphabetic and polyalphabetic ciphers
D:-Stream and block ciphers
Correct Answer:- Option-B

Question8:-Which of the following characteristics is most widely used in fingerprint recognition ?
A:-Number and coordinates of arch patterns
B:-Number and coordinates of loop patterns
C:-Coordinates and orientations of fingerprint minutiae
D:-Number and coordinates of whorl patterns
Correct Answer:- Option-C

Similar Question Papers

Ask Question

(Press Ctrl+g to toggle between English and the chosen language)


Questions & Answers

HSST COMPUTER SCIENCE - SR FOR SC/ST : Video