Professional Documents
Culture Documents
BCA601 Set-A
BCA601 Set-A
BCA601 Set-A
O. M. R. Serial No.
B C A 6 0 1 N A
Time : 1:30 Hours ] [ Maximum Marks : 75
1. Do not open the booklet unless you are 1. iz’u&iqfLrdk dks rc rd u [kksyas tc rd vkils dgk
asked to do so. u tk,A
2. The booklet contains 100 questions. 2. iz’u&iqfLrdk esa 100 iz’u gSaA ijh{kkFkhZ dks 75 iz’uksa
Examinee is required to answer 75 dks dsoy nh xbZ OMR vkUlj&’khV ij gh gy djuk
questions in the OMR Answer-Sheet
gS iz’u&iqfLrdk ij ughaA lHkh iz’uksa ds vad leku
provided and not in the question booklet.
All questions carry equal marks. gSaA
3. Examine the Booklet and the OMR Answer- 3. iz’uksa ds mŸkj vafdr djus ls iwoZ iz’u&iqfLrdk rFkk
Sheet very carefully before you proceed. OMR vkUlj&’khV dks lko/kkuhiwod
Z ns[k ysAa nks”kiw.kZ
Faulty question booklet due to missing or
iz’u&iqfLrdk ftlesa dqN Hkkx Nius ls NwV x, gksa ;k
duplicate pages/questions or having any
iz’u ,d ls vf/kd ckj Ni x, gksa ;k mlesa fdlh
other discrepancy should be got
immediately replaced. vU; izdkj dh deh gks rks mls rqjUr cny ysAa
(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
(Only for Rough Work)
(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
5. A digital signature is required :
1. What ensures the security of information
and resources present in the website of (A) for all e-mail sent
(C) spam
7. What does DDOS stand for ?
(D) firewall
(A) Denial Data of Service
3. A computer virus is a :
(B) Denial Distributed of Service
(A) software
(C) Distributed Denial of Service
(B) hardware
(D) freeware
8. PGP stands for :
4. ................... uses PGP application.
(A) Proper Good Privacy
(A) Email
(B) Privacy Good Principle
(B) File encryption
(C) Pretty Good Privacy
(C) E-mail and file encryption
(D) SET
10. ............................... is used for network
12. For distribution of public key, which of internet, creating a secure private
(A) Is the backbone of the Internet. (A) Private data encryption algorithm
(B) Encapsulating Security Payload 21. The process of verifying the identity of a
(ESP) user :
(C) Validation
18. Threat on availability of computer
(D) Verification
resource to its intended users is called
22. The secure authentication connection is
..................... .
known as :
(A) Denial-of-service attack
(A) chisel
(B) Virus attack
(B) handshaking
(C) Worms attack (C) tunnel
(D) Botnet process (D) zeroing
(D) Both SHA and MD5 36. Which of the following is a passive
attack ?
32. Which two types of IPsec can be used to
(A) Masquerade
secure communications between two
(B) Modification of message
LANs ?
(C) Denial of service
(A) AH tunnel mode
(D) Traffic analysis
(B) ESP tunnel mode
37. A mechanism used to encrypt and
(C) Both AH tunnel mode and ESP
decrypt data is known as :
tunnel mode
(A) cryptanalysis
(D) ESP transport mode
(B) cryptography
33. ESP does not provide ........................ . (C) Both (A) and (B)
BCA–601(N) ( 10 ) Set-A
62. Cryptography can be divided into 66. PGP is used in :
....................... types. (A) FTP security
(A) 5 (B) e-mail security
(B) 4
(C) browser security
(C) 3
(D) server security
(D) 2
67. IDEA is a/an :
63. When plaintext is converted to
(A) symmetric cipher
unreadable format, it is termed as .......... .
(B) asymmetric cipher
(A) rotten text
(C) authentication algo
(B) raw text
(D) None of the above
(C) cipher-text
mechanism used for converting ordinary ...................... for access to specific asset.
BCA–601(N) ( 11 ) Set-A
70. .................. means that sender must not 74. The criteria of hash that says we cannot
deny of sending the message. find two message that has same message
BCA–601(N) ( 12 ) Set-A
78. SNMP is the framework for managing 82. The SET protocol is used for :
(D) SMTP
83. In SET protocol, a customer encrypts
security of data that pass over network. (A) his private key
(D) Antivirus
84. In SET, customer sends a purchase order :
80. SSL primarily focuses on : (A) encrypted with his public key
81. ................... theory is very important for 85. SET uses ..................... for secure
BCA–601(N) ( 13 ) Set-A
86. In network management system, the 90. In asymmetric key cryptography, for
predefined policy to control to access to authentication, the public key of
network is called :
.................. is used.
(A) fault management
(A) receiver
(B) security management
(B) sender
(C) active management
(C) Both sender and receiver
(D) passive management
(D) None of the above
87. Communication between end system
is encrypted using a key, known 91. Which is not an asymmetric key
as : cryptography ?
(A) session key
(A) RSA
(B) temporary key
(B) Diffie-Hellman
(C) public key
(C) DSS
(D) private key
(D) IDEA
88. In cryptography, cipher means :
92. What is data encryption standard DES ?
(A) algo for encryption
BCA–601(N) ( 14 ) Set-A
94. In cryptography, changing order of letter 98. An asymmetric key cipher uses :
in message is :
(A) 2 keys
(A) transpositional cipher
(B) TLS
BCA–601(N) ( 15 ) Set-A
4. Four alternative answers are mentioned for 4. iz’u&iqfLrdk esa izR;sd iz’u ds pkj lEHkkfor mŸkj
each question as—A, B, C & D in the booklet. A, B, C ,oa D gSaA ijh{kkFkhZ dks mu pkjksa fodYiksa esa ls
The candidate has to choose the correct
answer and mark the same in the OMR
lgh mŸkj Nk¡Vuk gSA mŸkj dks OMR vkUlj&’khV esa
Answer-Sheet as per the direction : lEcfU/kr iz’u la[;k esa fuEu izdkj Hkjuk gS %
Example : mnkgj.k %
Question : iz’u %
Q. 1 iz’u 1
Q. 2 iz’u 2
Q. 3 iz’u 3
Illegible answers with cutting and viBuh; mŸkj ;k ,sls mŸkj ftUgsa dkVk ;k cnyk x;k
over-writing or half filled circle will be gS ;k xksys esa vk/kk Hkjdj fn;k x;k mUgsa fujLr dj
cancelled.
fn;k tk,xkA
5. Each question carries equal marks. Marks 5. izR;sd iz’u ds vad leku gSaA vkids ftrus mŸkj
will be awarded according to the number of lgh gksxa ]s mUgha ds vuqlkj vad iznku fd;s tk;saxAs
correct answers you have.
6. All answers are to be given on OMR Answer 6. lHkh mŸkj dsoy vks- ,e- vkj- mŸkj&i=d (OMR
sheet only. Answers given anywhere other Answer Sheet) ij gh fn;s tkus gSaA mŸkj&i=d esa
than the place specified in the answer sheet fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k
will not be considered valid.
mŸkj ekU; ugha gksxkA
7. Before writing anything on the OMR Answer 7. vks- ,e- vkj- mŸkj&i=d (OMR Answer Sheet) ij
Sheet, all the instructions given in it should dqN Hkh fy[kus ls iwoZ mlesa fn;s x;s lHkh vuqns’kksa dks
be read carefully. lko/kkuhiwoZd i<+ fy;k tk;sA
8. After the completion of the examination 8. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks
candidates should leave the examination hall viuh OMR Answer Sheet miyC/k djkus ds ckn
only after providing their OMR Answer gh ijh{kk d{k ls izLFkku djsaA ijh{kkFkhZ vius lkFk
Sheet to the invigilator. Candidate can carry
their Question Booklet.
iz’u&iqfLrdk ys tk ldrs gSaA
9. There will be no negative marking. 9. fuxsfVo ekfd±x ugha gSA
10. Rough work, if any, should be done on the 10. dksbZ Hkh jQ dk;Z iz’u&iqfLrdk ds vUr esa jQ&dk;Z
blank pages provided for the purpose in the
booklet.
ds fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A
11. To bring and use of log-book, calculator, 11. ijh{kk&d{k esa ykWx&cqd] dSydqysVj] istj rFkk lsY;qyj
pager and cellular phone in examination hall Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA
is prohibited.
12. In case of any difference found in English 12. iz’u ds fgUnh ,oa vaxszth :ikUrj.k esa fHkUurk gksus dh
and Hindi version of the question, the n’kk esa iz’u dk vaxst
z h :ikUrj.k gh ekU; gksxkA
English version of the question will be held
authentic.
Impt. : On opening the question booklet, first egRoiw.kZ % iz’uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysa
check that all the pages of the question fd iz’u&iqfLrdk ds lHkh i`”B HkyhHkk¡fr Nis gq, gSaA
booklet are printed properly. If there is ny ;fn iz’uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks
discrepancy in the question Booklet, then
after showing it to the invigilator, get
fn[kkdj mlh fljht dh nwljh iz’u&iqfLrdk izkIr
another question Booklet of the same series. dj ysaA