377-Bca 601N - (D)
377-Bca 601N - (D)
377-Bca 601N - (D)
tk;sxkA
3. ÁR;sd Á’u ds vad leku gSaA vki ds ftrus mRrj lgh gksaxs] mUgha ds vuqlkj vad Ánku fd;s
tk;saxsA
4. lHkh mRrj dsoy vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij gh fn;s tkus
gSaA mRrj i=d esa fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k mRrj ekU; ugha gksxkA
5. vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij dqN Hkh fy[kus ls iwoZ mlesa fn;s
x;s lHkh vuqns’kksa dks lko/kkuhiwoZd i<+ fy;k tk;A
6. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks viuh vksŒ,eŒvkjŒ ‘khV miyC/k djkus ds ckn
gh ijh{kk d{k ls ÁLFkku djsaA
7. fuxsfVo ekfdZax ugha gSA
egRoiw.kZ % & Á’uiqfLrdk [kksyus ij ÁFker% tkWp dj ns[k ysa fd Á’uiqfLrdk ds lHkh i`”B HkyhHkkWfr Nis gq, gSaA ;fn
Á’uiqfLrdk esa dksbZ deh gks] rks d{k fujh{kd dks fn[kkdj mlh lhjht dh nwljh Á’uiqfLrdk ÁkIr dj ysaA
Rough Work / jQ dk;Z
8. To protect the computer system against the hacker and different kind of viruses, one
(A) Antivirus
(B) Firewall
(D) Script
10. Which one of the following refers to the technique used for verifying the integrity
of the message ?
(C) Protocol
11. Which of the following refers to the violation of the principle, if a computer is no
more accessible ?
(B) Confidentiality
(C) Availability
12. Can it be possible that in some cases, hacking a computer or network can be legal ?
(B) It may be possible that in some cases, it can be referred to as a legal task
(D) Never
(A) Antivirus
(B) Firewall
(C) Cookies
(D) Malware
14. Which of the following usually observe each activity on the internet of the victim,
(A) Malware
(B) Spyware
(C) Adware
15. Which protocol is used for the purpose of copying the pending state into the current
state ?
23. Which process will ensure that the issues of the credit card is an approved
transactions ?
24. ________ is used for hiding the payment information from the merchant and order
(A) SET.
(B) SSL.
(C) HTTP.
(D) PGP.
25. Who will be responsible for processing the payment from the customer’s account to
the merchant account ?
(A) Acquirer
(B) Certification authority
(C) Issuer
(D) Payment gateway
99. Which of the following is a type of independent malicious program that never
(B) Worm
(D) Virus
(A) Trojans perform tasks for which they are designed or programmed, need host
program
(B) Trojans, need host program, replicates them self’s or clone them self’s through
an infections
******
1. Examinee should enter his / her roll number, subject and Question Booklet
Series correctly in the O.M.R. sheet, the examinee will be responsible for
the error he / she has made.
2. This Question Booklet contains 100 questions, out of which only 75
Question are to be Answered by the examinee. Every question has 4
options and only one of them is correct. The answer which seems
correct to you, darken that option number in your Answer Booklet
(O.M.R ANSWER SHEET) completely with black or blue ball point
pen. If any examinee will mark more than one answer of a particular
question, then the answer will be marked as wrong.
3. Every question has same marks. Every question you attempt correctly,
marks will be given according to that.
4. Every answer should be marked only on Answer Booklet (O.M.R
ANSWER SHEET).Answer marked anywhere else other than the
determined place will not be considered valid.
5. Please read all the instructions carefully before attempting anything on
Answer Booklet(O.M.R ANSWER SHEET).
6. After completion of examination, please hand over the O.M.R. SHEET to
the Examiner before leaving the examination room.
7. There is no negative marking.
Note: On opening the question booklet, first check that all the pages of the
question booklet are printed properly in case there is an issue please ask the
examiner to change the booklet of same series and get another one.