Q. 51. Which of the following is a symmetric key cryptographic algorithm?
(a) RSA
(b) DSA
(c) AES
(d) Diffie-Hellman
Answer:-(c) AES
AES (Advanced Encryption Standard) is a symmetric key algorithm, meaning the same key is used for both encrypting and decrypting the data.
Q. 52. In OSI model, which layer is responsible for logical addressing and routing?
(a) Data Link Layer
(b) Network Layer
(c) Transport Layer
(d) Session Layer
Answer:-(b) Network Layer
The Network Layer is responsible for logical addressing (IP addresses) and routing packets across different networks.
Q. 53. What is the primary function of a TLB (Translation Lookaside Buffer)?
(a) To cache frequently used data
(b) To cache recently accessed instructions
(c) To cache recent virtual-to-physical address translations
(d) To manage disk I/O operations
Answer:-(c) To cache recent virtual-to-physical address translations
A TLB acts as a memory cache that stores recent translations of virtual memory to physical memory, speeding up memory access.
Q. 54. Which of the following sorting algorithms has the worst-case time complexity of O(n log n)?
(a) Quick Sort
(b) Merge Sort
(c) Bubble Sort
(d) Insertion Sort
Answer:-(b) Merge Sort
Merge Sort consistently divides the array in half and takes linear time to merge, guaranteeing an O(n log n) time complexity in all cases.
Q. 55. In relational databases, what does the ACID property ‘Isolation’ guarantee?
(a) Transactions are executed fully or not at all
(b) Data remains valid after transaction completion
(c) Concurrent transactions run as if they were executed sequentially
(d) Completed transactions are permanently saved
Answer:-(c) Concurrent transactions run as if they were executed sequentially
Isolation ensures that concurrent execution of transactions leaves the database in the same state that would have been obtained if the transactions were executed sequentially.
Q. 56. What is the purpose of the ‘BGP’ (Border Gateway Protocol)?
(a) To map IP addresses to MAC addresses
(b) To assign dynamic IP addresses
(c) To route data between autonomous systems on the internet
(d) To translate private IP addresses to public IPs
Answer:-(c) To route data between autonomous systems on the internet
BGP is the core routing protocol of the internet, designed to exchange routing and reachability information among autonomous systems (AS).
Q. 57. Which of the following scheduling algorithms can suffer from ‘Starvation’?
(a) Round Robin
(b) First-Come, First-Served (FCFS)
(c) Shortest Job Next (SJN)
(d) Multi-level Feedback Queue
Answer:-(c) Shortest Job Next (SJN)
In SJN, a continuous stream of short CPU bursts could cause a long process to wait indefinitely, resulting in starvation.
Q. 58. In cryptography, what is a ‘Salt’?
(a) A secret key used in symmetric encryption
(b) Random data added to a password before hashing
(c) A technique to compress secure data
(d) A type of digital signature algorithm
Answer:-(b) Random data added to a password before hashing
A salt is random data that is used as an additional input to a one-way function that hashes data, primary used to defend against dictionary attacks and pre-computed rainbow tables.
Q. 59. What is the main difference between TCP and UDP?
(a) TCP is connectionless, UDP is connection-oriented
(b) TCP provides reliable delivery, UDP does not
(c) TCP is faster than UDP
(d) UDP operates at the Network layer, TCP at the Transport layer
Answer:-(b) TCP provides reliable delivery, UDP does not
TCP establishes a connection and ensures reliable, ordered data delivery. UDP is connectionless and sends packets without guaranteeing delivery or order, making it faster but less reliable.
Q. 60. Which normal form (NF) in database normalization deals with multi-valued dependencies?
(a) 2NF
(b) 3NF
(c) BCNF
(d) 4NF
Answer:-(d) 4NF
Fourth Normal Form (4NF) aims to eliminate independent multi-valued dependencies, ensuring that a relation is in at least BCNF and contains no non-trivial multi-valued dependencies.
Q. 61. Advanced Operating Systems Concept Q61: Which page replacement algorithm suffers from Belady’s Anomaly?
(a) FIFO
(b) LRU
(c) LFU
(d) Optimal
Answer:-(a) FIFO
Belady’s Anomaly occurs in FIFO where increasing the number of page frames results in an increase in the number of page faults.
Q. 62. Advanced Security Concept Q62: Which attack involves sending forged ARP messages to a LAN?
(a) IP Spoofing
(b) MAC Spoofing
(c) ARP Spoofing
(d) DNS Poisoning
Answer:-(c) ARP Spoofing
ARP spoofing or ARP poisoning involves sending forged ARP messages to associate an attacker’s MAC address with the IP address of a legitimate node.
Q. 63. Advanced Databases Concept Q63: What is the highest isolation level in SQL standards?
(a) Repeatable Read
(b) Read Uncommitted
(c) Read Committed
(d) Serializable
Answer:-(d) Serializable
Serializable is the highest isolation level, ensuring complete isolation from other concurrent transactions.
Q. 64. Advanced Security Concept Q64: Which attack involves sending forged ARP messages to a LAN?
(a) MAC Spoofing
(b) DNS Poisoning
(c) ARP Spoofing
(d) IP Spoofing
Answer:-(c) ARP Spoofing
ARP spoofing or ARP poisoning involves sending forged ARP messages to associate an attacker’s MAC address with the IP address of a legitimate node.
Q. 65. Advanced Operating Systems Concept Q65: Which page replacement algorithm suffers from Belady’s Anomaly?
(a) FIFO
(b) Optimal
(c) LFU
(d) LRU
Answer:-(a) FIFO
Belady’s Anomaly occurs in FIFO where increasing the number of page frames results in an increase in the number of page faults.
Q. 66. Advanced Databases Concept Q66: What is the highest isolation level in SQL standards?
(a) Serializable
(b) Read Committed
(c) Repeatable Read
(d) Read Uncommitted
Answer:-(a) Serializable
Serializable is the highest isolation level, ensuring complete isolation from other concurrent transactions.
Q. 67. Advanced Software Eng Concept Q67: In SDLC, which model emphasizes risk analysis?
(a) Waterfall
(b) Spiral
(c) V-Model
(d) Agile
Answer:-(b) Spiral
The Spiral model combines iterative development with risk management, focusing heavily on risk analysis at each phase.
Q. 68. Advanced Architecture Concept Q68: Which architectural feature introduces overlapping execution of multiple instructions?
(a) Virtual Memory
(b) Pipelining
(c) Multithreading
(d) Caching
Answer:-(b) Pipelining
Pipelining allows multiple instructions to be overlapped in execution to increase instruction throughput.
Q. 69. Advanced Compilers Concept Q69: Which phase of a compiler deals with parsing?
(a) Code Generation
(b) Lexical Analysis
(c) Syntax Analysis
(d) Semantic Analysis
Answer:-(c) Syntax Analysis
Syntax Analysis (parsing) checks if the stream of tokens forms a valid structure according to the language’s grammar.
Q. 70. Advanced Operating Systems Concept Q70: Which page replacement algorithm suffers from Belady’s Anomaly?
(a) Optimal
(b) LRU
(c) FIFO
(d) LFU
Answer:-(c) FIFO
Belady’s Anomaly occurs in FIFO where increasing the number of page frames results in an increase in the number of page faults.
Q. 71. Advanced Web Tech Concept Q71: Which HTTP status code indicates ‘Forbidden’?
(a) 403
(b) 404
(c) 401
(d) 400
Answer:-(a) 403
403 Forbidden means the server understood the request but refuses to authorize it.
Q. 72. Advanced Compilers Concept Q72: Which phase of a compiler deals with parsing?
(a) Lexical Analysis
(b) Semantic Analysis
(c) Code Generation
(d) Syntax Analysis
Answer:-(d) Syntax Analysis
Syntax Analysis (parsing) checks if the stream of tokens forms a valid structure according to the language’s grammar.
Q. 73. Advanced Networking Concept Q73: What is the size of an IPv6 address?
(a) 32 bits
(b) 64 bits
(c) 256 bits
(d) 128 bits
Answer:-(d) 128 bits
IPv6 addresses are 128 bits long, compared to 32 bits for IPv4.
Q. 74. Advanced Operating Systems Concept Q74: Which page replacement algorithm suffers from Belady’s Anomaly?
(a) LRU
(b) FIFO
(c) LFU
(d) Optimal
Answer:-(b) FIFO
Belady’s Anomaly occurs in FIFO where increasing the number of page frames results in an increase in the number of page faults.
Q. 75. Advanced Software Eng Concept Q75: In SDLC, which model emphasizes risk analysis?
(a) Agile
(b) Waterfall
(c) Spiral
(d) V-Model
Answer:-(c) Spiral
The Spiral model combines iterative development with risk management, focusing heavily on risk analysis at each phase.







