BCA601 Set-A

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Roll No. ....................................

Question Booklet Number

O. M. R. Serial No.

B. C. A. (Sixth Semester) EXAMINATION, 2022-23


COMPUTER NETWORK SECURITY
Questions Booklet
Paper Code Series

B C A 6 0 1 N A
Time : 1:30 Hours ] [ Maximum Marks : 75

Instructions to the Examinee : ijh{kkfFkZ;ksa ds fy, funsZ’k %

1. Do not open the booklet unless you are 1. iz’u&iqfLrdk dks rc rd u [kksyas tc rd vkils dgk
asked to do so. u tk,A

2. The booklet contains 100 questions. 2. iz’u&iqfLrdk esa 100 iz’u gSaA ijh{kkFkhZ dks 75 iz’uksa
Examinee is required to answer 75 dks dsoy nh xbZ OMR vkUlj&’khV ij gh gy djuk
questions in the OMR Answer-Sheet
gS iz’u&iqfLrdk ij ughaA lHkh iz’uksa ds vad leku
provided and not in the question booklet.
All questions carry equal marks. gSaA

3. Examine the Booklet and the OMR Answer- 3. iz’uksa ds mŸkj vafdr djus ls iwoZ iz’u&iqfLrdk rFkk
Sheet very carefully before you proceed. OMR vkUlj&’khV dks lko/kkuhiwod
Z ns[k ysAa nks”kiw.kZ
Faulty question booklet due to missing or
iz’u&iqfLrdk ftlesa dqN Hkkx Nius ls NwV x, gksa ;k
duplicate pages/questions or having any
iz’u ,d ls vf/kd ckj Ni x, gksa ;k mlesa fdlh
other discrepancy should be got
immediately replaced. vU; izdkj dh deh gks rks mls rqjUr cny ysAa

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
(Only for Rough Work)

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
5. A digital signature is required :
1. What ensures the security of information
and resources present in the website of (A) for all e-mail sent

the intranet ? (B) for all FTP transaction


(A) security alarm
(C) for non-repudiation of
(B) firewall
communication by sender
(C) blocker
(D) None of the above
(D) malware

2. In a computing organization 6. Unsolicited electronic message sent for

...................... is a network security marketing purpose are called :


system that monitors and controls the
(A) virus
incoming and outgoing network traffic
(B) zip
based on predetermined security rules.
(C) spam
(A) spyware

(B) cookies (D) URL

(C) spam
7. What does DDOS stand for ?
(D) firewall
(A) Denial Data of Service
3. A computer virus is a :
(B) Denial Distributed of Service
(A) software
(C) Distributed Denial of Service
(B) hardware

(C) bacteria (D) Distribution of Data Service

(D) freeware
8. PGP stands for :
4. ................... uses PGP application.
(A) Proper Good Privacy
(A) Email
(B) Privacy Good Principle
(B) File encryption
(C) Pretty Good Privacy
(C) E-mail and file encryption

(D) None of the above (D) None of the above

BCA–601(N) (3) Set-A


9. PGP may use ................., .................. 13. For message authentication, i.e. integrity

cipher per message authentication and of message, which mechanism is


encryption respectively. used ?
(A) IDEA, DES
(A) MAC
(B) RSA, Triple DES
(B) IPSEC
(C) Triple DES, RSA

(D) RSA, Deffie-Hellman (C) TLS

(D) SET
10. ............................... is used for network

level security. 14. Kerberos is used for :


(A) IPSEC
(A) Authentication and client-server
(B) SSL
environment
(C) TLS
(B) Authentication of e-mail
(D) SET
(C) Confidentiality of message
11. Full form of SET is :
(D) None of the above
(A) Security of E-mail Transaction

(B) Secure Electronic Transaction 15. A ...................... is an extension of an


(C) Select Electronic Type enterprise’s private intranet across
(D) None of the above
a public network such as the

12. For distribution of public key, which of internet, creating a secure private

the following uses trusted third party connection.


interface ?
(A) VNP
(A) Public announcement
(B) VAN
(B) Publicly available directory
(C) VPN
(C) Public key certificate

(D) None of the above (D) VSPN

BCA–601(N) (4) Set-A


16. Which of the following statements is 19. PGP encrypts data by using a block

NOT true concerning VPNs ? cipher is called ....................... .

(A) Is the backbone of the Internet. (A) Private data encryption algorithm

(B) International data encryption


(B) Allows remote workers to access
algorithm
corporate data.
(C) Internet data encryption algorithm
(C) Allows LAN-to-LAN connectivity
(D) Local data encryption algorithm
over public networks.
20. Which is not an objective of network
(D) Financially rewarding compared to
security ?
leased lines.
(A) Secrecy
17. Which component is included in IP (B) Authentication

security ? (C) Access control

(A) Authentication Header (AH) (D) Lock and unlock

(B) Encapsulating Security Payload 21. The process of verifying the identity of a

(ESP) user :

(C) Internet Key Exchange (IKE) (A) Identification

(D) All of the mentioned (B) Authentication

(C) Validation
18. Threat on availability of computer
(D) Verification
resource to its intended users is called
22. The secure authentication connection is
..................... .
known as :
(A) Denial-of-service attack
(A) chisel
(B) Virus attack
(B) handshaking
(C) Worms attack (C) tunnel
(D) Botnet process (D) zeroing

BCA–601(N) (5) Set-A


23. In which of the following there is 27. In system hacking, which of these is

continuous surveillance on target by most important activity ?


another group of people ? (A) information gathering
(A) phishing (B) covering tracks
(B) stalking (C) cracking password
(C) identity crisis (D) None of the above
(D) bullying
28. Which of these can be considered as the
24. Which of these is considered as
element of cyber security ?
unsolicited e-mail ?
(A) Application security
(A) virus
(B) Operational security
(B) malware
(C) Network security
(C) bacteria
(D) All of the above
(D) spam
29. In the computer network, the encryption
25. ..................... is a software to help the
techniques is mainly used for improving :
user computer detect virus.
(A) security
(A) Malware
(B) performance
(B) Antivirus
(C) reliability
(C) Adware
(D) longevity
(D) None of the above

30. Cryptanalysis is used ....................... .


26. Which of these refers to verifying the

integrity of message ? (A) to find some insecurity in a

(A) digital signature cryptographic scheme

(B) message digest (B) to increase the speed

(C) protocol (C) to encrypt the data

(D) decryption algo (D) to make new ciphers

BCA–601(N) (6) Set-A


31. Which two types of encryption protocols 35. Which of the following is not a type of
can be used to secure the authentication symmetric key cryptographic technique ?

of computers using IPsec ? (A) Caeser cipher

(A) Kerberos V5 (B) Data Encryption Standard

(B) SHA (C) Playfair cipher


(D) Diffie Hellman cipher
(C) MD5

(D) Both SHA and MD5 36. Which of the following is a passive
attack ?
32. Which two types of IPsec can be used to
(A) Masquerade
secure communications between two
(B) Modification of message
LANs ?
(C) Denial of service
(A) AH tunnel mode
(D) Traffic analysis
(B) ESP tunnel mode
37. A mechanism used to encrypt and
(C) Both AH tunnel mode and ESP
decrypt data is known as :
tunnel mode
(A) cryptanalysis
(D) ESP transport mode
(B) cryptography
33. ESP does not provide ........................ . (C) Both (A) and (B)

(A) source authentication (D) None of the above

(B) data integrity 38. Conventional encryption and public key


(C) privacy encryption are also called .................. and
(D) error control ............... respectively.

(A) asymmetric encryption, symmetric


34. IP Security operates in which layer of the
encryption
OSI model ?
(B) symmetric encryption, asymmetric
(A) Network
encryption
(B) Transport (C) two-key encryption, one-key
(C) Application encryption
(D) Physical (D) None of the above

BCA–601(N) (7) Set-A


39. Which of the following combination is 43. Why are the factors like confidentiality,
symmetric encryption techniques ? authentication, integrity availability

(A) DES, RSA, Diffie-Hellman considered as fundamental services ?

(B) MD5, SHA-2, DSS (A) to understand hacking process


(B) to understand elements of security
(C) IDEA, CAST, TRIPLE DES
breech
(D) DSS, IDEA, SHA-1
(C) to understand security and its
40. Which is the type of text that is component ib better way
transformed by a cipher at the receiver (D) None of the above
side ?
44. In order to ensure the security of data, we
(A) plaintext need to ............. data.
(B) cipher text (A) decrypt
(C) error text (B) encrypt
(D) scalar text (C) delete
(D) zip
41. Which of the following malware does not
replicate through infection ? 45. RSA ................... be used for digital sign.

(A) rootkit (A) must not

(B) trojan (B) can


(C) cannot
(C) virus
(D) should not
(D) worm
46. A digital signature is :
42. Which of the following is a independent
(A) a unique id of sender
malicious program that never requires
(B) an authorization string for
any host program ?
electronic record by binding with
(A) trojan horse
private key of sender
(B) worm (C) encryption using public key of
(C) trap door sender
(D) virus (D) None of the above

BCA–601(N) (8) Set-A


47. A digital signature uses ................. 51. Digital signature provides .................... .

system of cryptography. (A) authentication

(A) asymmetric key (B) non-repudiation

(B) symmetric key (C) Both (A) and (B)

(C) secret key (D) None of the above


(D) Both (A) and (B)
52. In term of web security threat,
48. Digital signature scheme cannot provide : impersonation of another user is :
(A) confidentiality
(A) an active attack
(B) authentication
(B) a passive attack
(C) integrity
(C) Both (A) and (B)
(D) None of the above
(D) None of the above

49. ..................... is used to create digital


53. Which one is not a protocol of
signature.
SSL ?
(A) Public key of receiver
(A) record
(B) Public key of sender
(B) handshake
(C) Private key of sender
(C) alarm
(D) Private key of receiver
(D) change cipher
50. ..................... is used to verify digital
54. Full form of SSL is :
signature.
(A) Serial Session Layer
(A) Public key of receiver
(B) Secure Session Layer
(B) Public key of sender
(C) Secure Socket Layer
(C) Private key of sender

(D) Private key of receiver (D) Secure Secure Layer

BCA–601(N) (9) Set-A


55. Which protocol is used to give error 59. Denial of service attack is a threat

warning to peer entity ? to :

(A) record (A) confidentiality


(B) handshake
(B) authentication
(C) alert
(C) availability
(D) change cipher
(D) access control
56. Which protocol is used for changing
60. Conventional cryptography is also
pending state to current state ?
known as ...................... or symmetric-
(A) alert
key encryption.
(B) handshake

(C) record (A) public key

(D) change cipher spec (B) protected key

57. IPSec is designed to provide security (C) secret key

at : (D) primary key

(A) application level


61. ........................... cryptography is based
(B) transport layer
on publicly known mathematically
(C) network layer
designed algorithms to encrypt the
(D) session layer
information.
58. In tunnel mode, IPSec protect the :
(A) Modern
(A) IP header
(B) Classic
(B) Entire IP packet
(C) Traditional
(C) IP payload
(D) Primitive
(D) None of the above

BCA–601(N) ( 10 ) Set-A
62. Cryptography can be divided into 66. PGP is used in :
....................... types. (A) FTP security
(A) 5 (B) e-mail security
(B) 4
(C) browser security
(C) 3
(D) server security
(D) 2
67. IDEA is a/an :
63. When plaintext is converted to
(A) symmetric cipher
unreadable format, it is termed as .......... .
(B) asymmetric cipher
(A) rotten text
(C) authentication algo
(B) raw text
(D) None of the above
(C) cipher-text

(D) ciphen-text 68. For a client-server authentication, the

64. ..................... is the process or client requests from a KDC a

mechanism used for converting ordinary ...................... for access to specific asset.

plaintext into garbled non-human (A) ticket


readable text and vice-versa.
(B) user
(A) Malware analysis
(C) token
(B) Exploit writing
(D) card
(C) Cryptography
69. Message ................... means that data
(D) Reverse engineering
must arrive at the receiver as exactly
65. Which one of the following algorithms is
sent.
not used in asymmetric-key cryptography ?

(A) RSA algorithm (A) integrity

(B) Diffie-Helman algorithm (B) confidentiality

(C) Electronic code book algorithm (C) authentication


(D) DSA algorithm (D) None of the above

BCA–601(N) ( 11 ) Set-A
70. .................. means that sender must not 74. The criteria of hash that says we cannot
deny of sending the message. find two message that has same message

(A) Non-repudiation digest is :

(B) Non-sensing (A) one wayness

(C) Confidentiality (B) strong collison resistance

(D) Availability (C) weak collison resistance

(D) None of the above


71. ...................... function creates a message
digest of a message. 75. Which application level protocol uses

(A) Encryption few manager controlling a set of agents ?

(B) Hash (A) HTML

(C) Decryption (B) SNMP

(D) None of the above (C) TCP

(D) All of the above


72. A(n) .................... is a govt. authorised
organization that binds a public key to an 76. The main difference between SNMP V2
entity and issues a certificate. and SNMP V3 :

(A) KDC (A) classification

(B) CA (B) increased security

(C) Kerberos (C) management

(D) None of the above (D) integration

73. The ....................... criteria says that it is 77. SNMP means :


almost impossible to create a message if (A) secure network management
message digest is known. protocol
(A) one wayness (B) set network management protocol
(B) strong collison resistancee (C) simple network management
(C) weak collison protocol

(D) None of the above (D) None of the above

BCA–601(N) ( 12 ) Set-A
78. SNMP is the framework for managing 82. The SET protocol is used for :

devices in the internet using : (A) credit card payment

(A) TCP/IP (B) cheque payement

(B) UDP (C) debit card payement

(C) SNP (D) None of the above

(D) SMTP
83. In SET protocol, a customer encrypts

79. ..................... ensures the integrity and credit card no using :

security of data that pass over network. (A) his private key

(A) Penetrating tool (B) bank private key

(B) Firewall (C) bank public key

(C) Network security protocol (D) merchnat public key

(D) Antivirus
84. In SET, customer sends a purchase order :

80. SSL primarily focuses on : (A) encrypted with his public key

(A) integrity and non-repudiation (B) in plaintext

(B) integrity and authenticity (C) using secure digital signature

(C) authentication and privacy system

(D) confidentiality and integrity (D) using bank public key

81. ................... theory is very important for 85. SET uses ..................... for secure

success of RSA algo. payment info and purchase order.

(A) Integer (A) encryption

(B) Prime no (B) dual signature

(C) Random no (C) MAC

(D) Fraction (D) hashing

BCA–601(N) ( 13 ) Set-A
86. In network management system, the 90. In asymmetric key cryptography, for
predefined policy to control to access to authentication, the public key of
network is called :
.................. is used.
(A) fault management
(A) receiver
(B) security management
(B) sender
(C) active management
(C) Both sender and receiver
(D) passive management
(D) None of the above
87. Communication between end system
is encrypted using a key, known 91. Which is not an asymmetric key
as : cryptography ?
(A) session key
(A) RSA
(B) temporary key
(B) Diffie-Hellman
(C) public key
(C) DSS
(D) private key
(D) IDEA
88. In cryptography, cipher means :
92. What is data encryption standard DES ?
(A) algo for encryption

(B) algo for encryption and decryption (A) block cipher

(C) encrypted message (B) stream cipher


(D) decrypted message (C) asymmeric cipher

89. In asymmetric key cryptography, for (D) string cipher


confidentiality, the private key of
93. Caesar cipher is :
............... is used.
(A) propositional cipher
(A) receiver

(B) sender (B) substitution cipher

(C) Both sender and receiver (C) permutation cipher

(D) None of the above (D) transposition cipher

BCA–601(N) ( 14 ) Set-A
94. In cryptography, changing order of letter 98. An asymmetric key cipher uses :

in message is :
(A) 2 keys
(A) transpositional cipher

(B) substitution cipher (B) 3 keys


(C) Both (A) and (B)
(C) 1 key
(D) Diffie-Hellman algo

95. Cryptanalysis is used to : (D) 4 keys

(A) find key or plaintext or both of the

cryptographic scheme 99. DES uses :

(B) encrypt data


(A) 56 bit block, 64 bit key
(C) make new cipher

(D) None of the above (B) 56 bit block, 56 bit key

96. Which of the following protocols is used


(C) 64 bit block, 64 bit key
to secure HTTP connection ?

(A) IPSec (D) 64 bit block, 56 bit key

(B) TLS

(C) ECN 100. DES uses ...................... rounds of fiestel

(D) FTP cipher structure.

97. Cryptographic hash function takes an


(A) 8
arbitrary block of data and returns :
(B) 12
(A) variable size byte stream

(B) variable size bit stream (C) 16


(C) fixed size bit stream
(D) 32
(D) None of the above

BCA–601(N) ( 15 ) Set-A
4. Four alternative answers are mentioned for 4. iz’u&iqfLrdk esa izR;sd iz’u ds pkj lEHkkfor mŸkj
each question as—A, B, C & D in the booklet. A, B, C ,oa D gSaA ijh{kkFkhZ dks mu pkjksa fodYiksa esa ls
The candidate has to choose the correct
answer and mark the same in the OMR
lgh mŸkj Nk¡Vuk gSA mŸkj dks OMR vkUlj&’khV esa
Answer-Sheet as per the direction : lEcfU/kr iz’u la[;k esa fuEu izdkj Hkjuk gS %
Example : mnkgj.k %
Question : iz’u %
Q. 1 iz’u 1
Q. 2 iz’u 2
Q. 3 iz’u 3
Illegible answers with cutting and viBuh; mŸkj ;k ,sls mŸkj ftUgsa dkVk ;k cnyk x;k
over-writing or half filled circle will be gS ;k xksys esa vk/kk Hkjdj fn;k x;k mUgsa fujLr dj
cancelled.
fn;k tk,xkA
5. Each question carries equal marks. Marks 5. izR;sd iz’u ds vad leku gSaA vkids ftrus mŸkj
will be awarded according to the number of lgh gksxa ]s mUgha ds vuqlkj vad iznku fd;s tk;saxAs
correct answers you have.
6. All answers are to be given on OMR Answer 6. lHkh mŸkj dsoy vks- ,e- vkj- mŸkj&i=d (OMR
sheet only. Answers given anywhere other Answer Sheet) ij gh fn;s tkus gSaA mŸkj&i=d esa
than the place specified in the answer sheet fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k
will not be considered valid.
mŸkj ekU; ugha gksxkA
7. Before writing anything on the OMR Answer 7. vks- ,e- vkj- mŸkj&i=d (OMR Answer Sheet) ij
Sheet, all the instructions given in it should dqN Hkh fy[kus ls iwoZ mlesa fn;s x;s lHkh vuqns’kksa dks
be read carefully. lko/kkuhiwoZd i<+ fy;k tk;sA
8. After the completion of the examination 8. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks
candidates should leave the examination hall viuh OMR Answer Sheet miyC/k djkus ds ckn
only after providing their OMR Answer gh ijh{kk d{k ls izLFkku djsaA ijh{kkFkhZ vius lkFk
Sheet to the invigilator. Candidate can carry
their Question Booklet.
iz’u&iqfLrdk ys tk ldrs gSaA
9. There will be no negative marking. 9. fuxsfVo ekfd±x ugha gSA
10. Rough work, if any, should be done on the 10. dksbZ Hkh jQ dk;Z iz’u&iqfLrdk ds vUr esa jQ&dk;Z
blank pages provided for the purpose in the
booklet.
ds fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A
11. To bring and use of log-book, calculator, 11. ijh{kk&d{k esa ykWx&cqd] dSydqysVj] istj rFkk lsY;qyj
pager and cellular phone in examination hall Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA
is prohibited.
12. In case of any difference found in English 12. iz’u ds fgUnh ,oa vaxszth :ikUrj.k esa fHkUurk gksus dh
and Hindi version of the question, the n’kk esa iz’u dk vaxst
z h :ikUrj.k gh ekU; gksxkA
English version of the question will be held
authentic.
Impt. : On opening the question booklet, first egRoiw.kZ % iz’uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysa
check that all the pages of the question fd iz’u&iqfLrdk ds lHkh i`”B HkyhHkk¡fr Nis gq, gSaA
booklet are printed properly. If there is ny ;fn iz’uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks
discrepancy in the question Booklet, then
after showing it to the invigilator, get
fn[kkdj mlh fljht dh nwljh iz’u&iqfLrdk izkIr
another question Booklet of the same series. dj ysaA

You might also like