Solved Question Paper for Lecturer in Computer Engineering in Institute of Technology, GNCTD conducted by UPSC

51. The ability to access the capabilities over the network through standard mechanisms that promote use by heterogeneous thin or thick client platform is:

(a) On demand service

(b) Rapid elasticity

(c) Ubiquitous Network Access

(d) Location Independent Resource Pooling

Answer: (c)

52. A grouping of services or service components that have specific delivery commitments and roles identified with the customer is:


(a) Service Level Agreements

(b) Service Level Management

(c) Service Level Management Objective

(d) Services Portfolio

Answer: (a)

53. The period of time within which systems, applications or functions must be recovered after an outage is:


(a) Mean Time to Recover

(b) Recovery Time Objective

(c) Recovery Point Objective

(d) Mean Time Return Failure

Answer: (b)

54. The chargeback scheme where the IT costs are defined in measurable events, transactions and functions that are relevant to the business and outside the IT organization is:


(a) Resource or usage based

(b) Allocation based

(c) Activity based costing

(d) Product or service based

Answer: (d)

55. The use of distributed computing facilities for application requiring large computing power over a long period of time is:


(a) High-Performance Computing

(b) High-Throughput Computing

(c) Many Tasks Computing

(d) Distributed Computing

Answer: (b)

56. A small change in either the plaintext or the key producing a significant change in the ciphertext is called:


(a) Feistel effect

(b) Claude Shannon effect

(c) Bit independence effect

(d) Avalanche effect

Answer: (d)

57. Finding an effective linear equation between plaintext, ciphertext and the key that holds with probability 𝑝 ≠0.5 is the objective of:


(a) Differential Cryptanalysis

(b) Linear Cryptanalysis

(c) Brute-Force Attack

(d) Feistel Analysis

Answer: (b)

58. During the design of 𝑆 -boxes used in various cryptographic algorithms, if for a 1-bit input change, at least 𝜋 output bits change, then it satisfies:


(a) Strict avalanche criterion

(b) Bit independence criterion

(c) Permutation criterion

(d) Guaranteed avalanche criterion

Answer: (d)

59. The block cipher mode of operation used for encryption of stream-oriented transmission over noisy channel is:


(a) Electronic Codebook

(b) Output Feedback

(c) Cipher Feedback

(d) Cipher Block Chaining

Answer: (b)

60. A popular approach to generating a secure pseudorandom number is known as:


(a) Pseudorandom Number Generator (PRNG)

(b) Linear Congruential Generator (LCG)

(c) True Random Number Generator (TRNG)

(d) Blum, Blum, Shub Generator (BBS)

Answer: (d)

Share:

0 comments:

Post a Comment

Smart Vidya

Featured Post

UPSC Civil Service Preliminary Paper-1 Previous Year Solved Question Papers

Civil Service Preliminary Paper-1 Previous Year Solved Questions for the year 2019 Civil Service Preliminary Paper-1 Previous Year Solved Qu...

Followers

No. of Page Views

Contact Form

Name

Email *

Message *

Blog Archive

Search This Blog

Follow by Email