1) What is preferred way of encryption ?
a) pre shared secret key
b) Using key distribution center (KDC)
c) public key-encryption
d) symmetric key
2) What is not a role of encryption ?
a) It is used to protect data from unauthorized access during transmission
b) It is used to ensure user authentication
c) It is used to ensure data integrity
d) It is used to ensure data corruption doesn’t happens
3) What is cipher-block chaining ?
a) Data is logically ‘ANDed’ with previous block
b) Data is logically ‘ORed’ with previous block
c) Data is logically ‘XORed’ with previous block
d) none of the mentioned
4) What is not an encryption standard ?
a) AES
b) TES
c) Triple DES
d) DES
5) Which of following is not a stream cipher?
a) twofish
b) RC5
c) RC4
d) TBONE
6) What is a Hash Function ?
a) It creates a small flexible block of data
b) It creates a small,fixed block of data
c) It creates a encrypted block of data
d) none of the mentioned
7) MD5 produces __ bits hash data ?
a) 128
b) 150
c) 160
d) 112
8) SHA-1 produces __ bit of hash ?
a) 128
b) 160
c) 150
d) 112
9) Which two of the following are authentication algorithms ?
a) MAC
b) AES
c) DES
d) Digital-signature
10) What is role of Key Distribution Center ?
a) It is used to distribute keys to everyone in world
b) It intended to reduce the risks inherent in exchanging keys
c) a and b both
d) none of the mentioned
11. A multimedia file
a) is same as any other regular file
b) must be accessed at specific rate
c) stored on remote server can not be delivered to its client
d) none of the mentioned
12. In which type of streaming multimedia file is delivered to the client, but not shared?
a) real-time streaming
b) progressive download
c) compression
d) none of the mentioned
13. Which one of the following is the characteristic of a multimedia system?
a) high storage
b) high data rates
c) both (a) and (b)
d) none of the mentioned
14. The delay that occur during the playback of a stream is called
a) stream delay
b) playback delay
c) jitter
d) event delay
15. Which algorithm can be optimized to meet the timing deadlines and rate requirements of continuous media?
a) Earliest-Deadline-First scheduling
b) SCAN-EDF scheduling
c) both (a) and (b)
d) none of the mentioned
16. Real time streaming protocol is used
a) to control streaming media servers
b) for establishing and controlling media sessions between endpoints
c) to provide real time control of playback of media files from the server
d) all of the mentioned
17. In teardown state of real time streaming protocol
a) the server resources for client
b) server delivers the stream to client
c) server suspends delivery of stream
d) server breaks down the connection
18. CineBlitz multimedia server supports
a) real time clients
b) non-real time clients
c) both (a) and (b)
d) none of the mentioned
19. Multimedia system require hard real time scheduling
a) to ensure critical tasks will be serviced within timing deadlines
b) to deliver the media file to the client
c) to minimize the delay
d) for security
20. Which one of the following resource is not necessarily required on a file server?
a) secondary storage
b) processor
c) network
b) monitor
21. Which one of the following is not a secondary storage?
a) magnetic disks
b) magnetic tapes
c) RAM
d) none of the mentioned
22. Which private network uses storage protocol rather than networking protocol?
a) storage area network
b) local area network
c) wide area network
d) none of the mentioned
23. The time for the disk arm to move the heads to the cylinder containing the desired sector is called
a) disk time
b) seek time
c) arm time
d) sector time
24. Which algorithm of disk scheduling selects the request with the least seek time from the current head positions?
a) SSTF scheduling
b) FCFS scheduling
c) SCAN scheduling
d) LOOK scheduling
25. Operating system is responsible for
a) disk initialization
b) booting from disk
c) bad-bock recovery
d) all of the mentioned
26. A swap space can reside in
a) separate disk partition
b) RAM
c) cache
d) none of the mentioned
27. RAID level 1 refers to
a) disk arrays with striping
b) disk mirroring
c) both (a) and (b)
d) none of the mentioned
28. When we write something on the disk, which one of the following can not happen?
a) successful completion
b) partial failure
c) total failure
d) none of the mentioned
29. During recovery from a failure
a) each pair of physical block is examined
b) specified pair of physical block is examined
c) first pair of physical block is examined
d) none of the mentioned
30. The replacement of a bad block generally is not totally automatic because
a) data in bad block can not be replaced
b) data in bad block is usually lost
c) bad block does not contain any data
d) none of the mentioned
Answers
1-c | 2-d | 3-c | 4-b | 5-d |
6-b | 7-a | 8-b | 9-a,c | 10-b |
11-b | 12-a | 13-c | 14-c | 15-c |
16-d | 17-c | 18-a | 19-d | 20-d |
21-c | 22-a | 23-b | 24-a | 25-d |
26-a | 27-b | 28-d | 29-a | 30-b |