2023 2024 EduVark > Education Discussion > Question Papers


  #2  
September 21st, 2017, 10:07 AM
Super Moderator
 
Join Date: Mar 2012
Re: Saurashtra University Last Year Papers

I am providing you the sample question paper of B.Sc Information Technology IT of Saurashtra University

Saurashtra University B.Sc Information Technology IT question paper

Section-A


Answer following MCQ: [20 marks]

(1)_______is the size of MAC address?
(a)16-bits
(b)32-bits
(c)48-bits
(d)64-bits

(2)What is the use of Ping command?
(a)To test a device on the network is reachable.
(b)To test a bug in application.
(c)To test an application quality.
(d)To test a hard disk quality.

(3)MAC address is the example of_________.
(a)Transport layer.
(b)Data link layer.
(c)Application layer.
(d)Physical layer.

(4)In IOS network architecture, the routing is performed by_________.
(a)Transport layer.
(b)Data link layer.
(c)Network layer.
(d)session layer.

(5)_________of the Transport layer protocol is connectionless.
(a)UDP
(b)FTP
(c)LTP
(d)NFS

(6)________layer of the OSI determines the interface with system and to the user.
(a)Network.
(b)Application.
(c)Data link.
(d)Session.

(7)An attempt to make a computer resource unavailable to its intended user is called__________.
(a)Virus attack.
(b)Worms attack.
(c)Bottleneck attack.
(d)Denial of service attack

(8)In tunnel mode IPsec protects the_______.
(a)IP Header
(b)IP Payload
(c)Entire IP packet
(d)None of above

(9)_____of the following TCP/IP protocols is used for transferring files from one machine to another?
(a)SMTP
(b)FTP
(c)SNMP
(d)ICMP

(10)_______of the following protocol is/are defined in Transport layer.
(a)FTP
(b)TCP
(c)UDP
(d)Both(b)&(c)

(11)In asymmetric key cryptography,the private key is kept by_________.
(a)Sender
(b)Receiver
(c)Both Sender and Receiver
(d)All the devices on network

(12)What is the address range of a Class B network address in binary?
(a)01XXXXXX
(b)0XXXXXXX
(c)10XXXXXX
(d)110XXXXX

(13)MTU stands for_______.
(a)Maximum Transfer Unit.
(b)Minimum Transfer Unit.
(c)Modeling Time Unit.
(d)Master Trip Unit.

(14)Which statement is/are true regarding ICMP packets?
(a)ICMP guarantees data-gram delivery.
(b)ICMP can provide hosts with information about network problems.
(c)ICMP is encapsulated within UDP data-grams.
(d)None of these.

(15)In asymmetric key cryptography,_________ keys are required per communicating party.
(a)2
(b)3
(c)4
(d)5

(16)The __________ is a collection of protocols that provide security for a packet at the network level.
(a)IPsec
(b)Net-sec
(c)Packet-sec
(d)Protocol-sec

(17)The components of IP security includes___________.
(a)Authentication Header
(b)Encapsulating Security Payload
(c)Internet Key Exchange
(d)All of above

(18)In Cryptography, the message after transformed is called__________.
(a)Text
(b)Plain Text
(c)Cipher Text
(d)Both(a)&(b)

(19)VPN stands for_________.
(a)Virtual Private Network
(b)Virtual Public Network
(c)Virtual Ping Network
(d)None of these

(20)__________Protocol used with TCP/IP and resolve IPv4 address to its physical address.
(a)ARP
(b)RARP
(c)SNMP
(d)ICMP

Section-B

(A)Write any three out of six: [6 marks]

(1)Explain Cryptography.

(2)Explain Ping command.

(3)What is Biometric?Explain any one technique of it.

(4)What is ARP?Explain working of it.

(5)Explain MIB.

(6)What is Trace-route?

(B)Write any three out of six: [9 marks]

(1)Explain Symmetric & Asymmetric key.

(2)What is DNS?How it works?

(3)Define VPN.

(4)Define :TCP Vs. UDP

(5)What is the Configuration & Fault management with network management system?

(6)Define Components of SNMP.

(C)Write any two uot of five: [10 marks]

(1)Define OSI reference model.

(2)Explain TCP session Hijacking.

(3)Define CIA model. What is the importance of using it?

(4)What is IP?Differentiate IPV4 and IPV6 within it.

(5)What is DDos?Explain Denial of service attacks.

Section-C

(A)Write any Three out of six: [6 marks]

(1)What is PPTP & L2TP?Different it.

(2)Explain MTU.

(3)Explain Tunneling in VPN Technology.

(4)What is meant by Cipher text?Explain it.

(5)Explain how a virus works on internet?

(6)What is TCP Sweeps?

(b)Write any three out of six: [9 marks]

(1)Explain SNMP protocol.

(2)Explain ICMP with all its header types.

(3)Explain RSA algorithm.

(4)Differentiate:Worms Vs.Bacteria

(5)Explain Digital Certificate.

(6)Why is Proxy server?Explain how it works.

(c)Write any two out of five: [10 marks]

(1)Explain different types of Network attacks.

(2)List various attributes of Information security.

(3)Explain False Acceptance and Rejection with Biometrics.

(4)Explain Web tracking.

(5)How Password tracking method works?Explain it.

Contact-

Saurashtra University
Saurashtra University Campus, Rajkot, Gujarat 360005


Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 11:53 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8