This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
…………….also called part lists or building lists is the document generated at the design stage.a. MRP (Material Requirement Planning) b. BOM (Bill of Materials) c. MPS (Master Production Schedule) |
|
Answer» BOM (Bill of Materials) also called part lists or building lists is the document generated at the design stage. |
|
| 2. |
Procuring an item in staggering deliveries according to the delivery schedule nished to the supplier by the buyer. a. Seasonal Buying b. Hand to mouth buying c. Scheduled Buying d. Tender Buying e. Speculative Buying |
|
Answer» c. Scheduled Buying |
|
| 3. |
1. Describe an experiment to show that waves transfer energy while travelling. |
|
Answer» An electromagnetic wave is emitted by a source attached to a police car. The wave is reflected by a moving vehicle, which acts as a moving source. There is a shift in the frequency of the reflected wave. From the frequency shift, the speed of the car can be determined. This helps to track the over speeding vehicles. (or) In electromagnetic waves, energy is transferred through vibrations of electric and magnetic fields. In sound waves, energy is transferred through vibration of air particles or particles of a solid through which the sound travels. In water waves, energy is transferred through the vibration of the water particles. |
|
| 4. |
At which two traffic layers do most commercial IDSes generate signatures?(a) Application layer and Network layer(b) Network layer and Session Layer(c) Transport layer and Application layer(d) Transport layer and Network layer |
|
Answer» Right choice is (d) Transport layer and Network layer The best explanation: Most commercial IDSes generate signatures at the network and transport layers. These signatures are used to ensure that no malicious operation is contained in the traffic. Nemean generates signature at application and session layer. |
|
| 5. |
“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?(a) Application layer and Transport layer(b) Network layer and Application layer(c) Session layer and Transport layer(d) Application layer and Session layer |
|
Answer» Correct answer is (d) Application layer and Session layer The best explanation: Nemean automatically generates “semantics-aware” signatures based on traffic at the session and application layers. These signatures are used to ensure that no malicious operation is contained in the traffic. |
|
| 6. |
In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.(a) confidentiality(b) integrity(c) availability(d) authenticity |
|
Answer» Right choice is (a) confidentiality The explanation: Confidentiality means that the assets can only be accessed by authorized parties. Integrity means that computer system assets can be modified only by authorized parities. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed. |
|
| 7. |
In computer security _______ means that computer system assets can be modified only by authorized parities.(a) confidentiality(b) integrity(c) availability(d) authenticity |
|
Answer» The correct choice is (b) integrity To explain: Integrity means that computer system assets can be modified only by authorized parities. Confidentiality means that the assets can only be accessed by authorized parties. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed. |
|
| 8. |
WPA2 is used for security in _______(a) Ethernet(b) Bluetooth(c) Wi-Fi(d) Email |
|
Answer» Right choice is (c) Wi-Fi To explain: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network. |
|
| 9. |
Which of the following is used to provide a baseline measure for comparison of IDSes?(a) Crossover error rate(b) False negative rate(c) False positive rate(d) Bit error rate |
|
Answer» Right option is (a) Crossover error rate Easy explanation: As the sensitivity of systems may cause the false positive/negative rates to vary, it’s critical to have some common measure that may be applied across the board. |
|
| 10. |
Which component is included in IP security?(a) Authentication Header (AH)(b) Encapsulating Security Payload (ESP)(c) Internet key Exchange (IKE)(d) All of the mentioned |
|
Answer» The correct choice is (d) All of the mentioned For explanation I would say: AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. IKE is used to make sure that only the intended sender and receiver can access the message. |
|
| 11. |
Which of the following is true of signature-based IDSes?(a) They alert administrators to deviations from “normal” traffic behavior(b) They identify previously unknown attacks(c) The technology is mature and reliable enough to use on production networks(d) They scan network traffic or packets to identify matches with attack-definition files |
|
Answer» Right option is (d) They scan network traffic or packets to identify matches with attack-definition files The explanation is: They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. They then scan network traffic for packets that match the signatures, and then raise alerts to security administrators. |
|
| 12. |
What is the purpose of a shadow honeypot?(a) To flag attacks against known vulnerabilities(b) To help reduce false positives in a signature-based IDS(c) To randomly check suspicious traffic identified by an anomaly detection system(d) To enhance the accuracy of a traditional honeypot |
|
Answer» Correct answer is (c) To randomly check suspicious traffic identified by an anomaly detection system The best I can explain: “Shadow honeypots,” as researchers call them, share all the same characteristics of protected applications running on both the server and client side of a network and operate in conjunction with an ADS. |
|
| 13. |
When discussing IDS/IPS, what is a signature?(a) An electronic signature used to authenticate the identity of a user on the network(b) Attack-definition file(c) It refers to “normal,” baseline network behavior(d) It is used to authorize the users on a network |
|
Answer» The correct answer is (b) Attack-definition file For explanation I would say: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. Nemean is a popular signature generation method for conventional computer networks. |
|
| 14. |
IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?(a) Inspection of password files to detect inadvisable passwords(b) Mechanisms put in place to reenact known methods of attack and record system responses(c) Inspection of system to detect policy violations(d) Inspection of configuration files to detect inadvisable settings |
|
Answer» The correct choice is (b) Mechanisms put in place to reenact known methods of attack and record system responses For explanation I would say: Secondary components of mechanism are set in place to reenact known methods of attack and to record system responses. In passive components, the system I designed just to record the system’s responses in case of an intrusion. |
|
| 15. |
DBD packets are involved during which two states?(a) Exstart and exchange(b) Loading and Two-way(c) Init and Full(d) Down and Loading |
|
Answer» Correct option is (a) Exstart and exchange To explain I would say: DBD stands for Database Descriptor. DBD packets are involved during the two states Exstart and Exchange. In exstart, the master and the slaves are decided and in the exchange state, the DBD is exchanged among the neighbors. |
|
| 16. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?(a) Inside the firewall(b) Outside the firewall(c) Both inside and outside the firewall(d) Neither inside the firewall nor outside the firewall. |
|
Answer» Correct option is (a) Inside the firewall For explanation I would say: There are legitimate political, budgetary and research reasons to want to see all the “attacks” against your connection, but given the care and feeding any IDS requires, do yourself a favor and keep your NIDS sensors on the inside of the firewall. |
|
| 17. |
The local operating system on the server machine passes the incoming packets to the ___________(a) server stub(b) client stub(c) client operating system(d) client process |
|
Answer» The correct answer is (a) server stub To explain: The local operating system on the server machine passes the incoming packets to the server stub which then processes the packets which contain the queries from the client machines for retrieving information. |
|
| 18. |
A false positive can be defined as ________(a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior(b) An alert that indicates nefarious activity on a system that is not running on the network(c) The lack of an alert for nefarious activity(d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network |
|
Answer» The correct option is (d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network Best explanation: A false positive is any alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior. |
|
| 19. |
Which of the following is an advantage of anomaly detection?(a) Rules are easy to define(b) Custom protocols can be easily analyzed(c) The engine can scale as the rule set grows(d) Malicious activity that falls within normal usage patterns is detected |
|
Answer» Right choice is (c) The engine can scale as the rule set grows The explanation is: Once a protocol has been built and a behavior defined, the engine can scale more quickly and easily than the signature-based model because a new signature does not have to be created for every attack and potential variant. |
|
| 20. |
Show that for an ideal gas cp-cv=r |
|
Answer» Cv = Heat capacity at constant volume. Cp = Heat capacity at constant pressure. q, at constant volume qv = CvΔT = ΔU ...(I) at constant volume qp = CpΔT = ΔH ....(II) We know that — for one mole ideal gas — ΔH = ΔU + Δ(PV) = ΔU + Δ(RT) = ΔU + RΔT (R = constant) ΔH = ΔU + RΔT ΔH - ΔU = RΔT ....(III) Subtracting equation (I) from equation (II) — ΔH - ΔU = CpΔT - CvΔT ....(IV) from equation (III) and (IV) — CpΔT - CvΔT = RΔT Cp - Cv = R |
|
| 21. |
From the following information, Compute Debt to Equity Ratio: Long-term Borrowings Rs. 4,00,000 Long-term Provisions Rs. 2,00,000 Current Liabilities Rs. 1,00,000 Non-current Assets Rs. 7,20,000 Current Assets Rs. 1,80,000 |
| Answer» Debt to Equity Ratio = `("Debt")/("Equity")=("Rs. 6,00,000")/("Rs. 2,00,000")=3 : 1` | |
| 22. |
find the distance between the line x=y-1/2=z-2/3 and x+1=y+2/2=z-1/3 |
|
Answer» \(\frac {x- 0} 1 = \frac {y - 1}2 = \frac {z-2}3\) .....(1) \(\frac{x -(-1)}1 = \frac {y - (-2)}2 = \frac {z -1}3\) .....(2) Since, both lines (1) & (2) are parallel to a vector whose direction cosines is same. \(\therefore\) Both lines are parallel. \(\therefore\) Distance between them = Distance between points (0, 1, 2) & (-1, -2, 1) \(= \sqrt{(-1 - 0)^2 + (-2 -1)^2 + (1 - 2)^2}\) \(= \sqrt{1 + 9 + 1}\) \(= \sqrt{11}\) units. |
|
| 23. |
From the following, calculate: (a) Operating Profit Ratio, and (b) Working Capital Turnover Ratio. `{:(,"Rs"),("Revenue from Operations","2,00,000"),("Office Expenses","15,000"),("Interest on Debentures","5,000"),("Income from Rent","2,500"),("Current Assets","60,000"):}:|{:(,"Rs"),("Gross Profit","75,000"),("Selling Expenses","26,000"),("Accidental Losses","12,000"),("Commission Received","2,000"),("Current Liabilities","10,000"):}` |
|
Answer» (a) Operating Profit Ratio = `("Operating Profit")/("Revenue from Operations")xx100 = ("Rs. 34,000")/("Rs. 2,00,000")xx100` (b) Working Capital Turnover Ratio = `("Revenue from Operations")/("Working Capital") = ("Rs. 2,00,000")/("Rs. 50,000")` = 4 Times. Working Notes: 1. Operating Profit = Gross Profit - Operating Expenses (i.e., Office Expenses + Selling Expenses) = Rs. 34,000. 2. Working Capital = Current Assets - Current Liabilities = Rs. 50,000. |
|
| 24. |
From the following information calculate Inventory Turnover Ratio: Revenue from Operation Rs. 16,00,000, Average Inventory Rs. 2,20,000, Gross Loss Ratio 5%. |
|
Answer» Inventory Turnover Ratio = `("Cost of Revenue from Operations")/("Average Inventory")` `= (Rs. 16,80,000)/(Rs. 2,20,000)` = 7.64 Times. Working Note: Cost of Revenue from Operations = Revenue from Operations + Gross Loss = Rs. 16,00,000 + Rs. 80,000 (i.e., 5% of Rs. 16,00,000) = Rs. 16,80,000. |
|
| 25. |
Solve \( \frac{x+1}{x-1}+\frac{2 x-5}{x-3}=\frac{25}{3} \) |
|
Answer» plzzz send th solution |
|
| 26. |
In which compound heat of combustion is highest :A. B. C. D. |
|
Answer» Correct Answer - D C and D have higher no of C atom and C has (e,e) structure in chair conformation which is more stable than D. |
|
| 27. |
Grignard reactions generally occur in dry ether becauseA. The stronger acid diethyl ether will displace the weaker RH acid from its saltB. The stronger acid `H_2O` will displace the weaker acid RH from its saltC. Water slows down the reactionD. Water mixes with ether preventing ether to perform its function |
|
Answer» Correct Answer - B `{:(RMgX+,H_2Oto, RH+,Mg(X)OH),("Stronger base","stronger acid","weaker acid","weaker base"):}` |
|
| 28. |
To write a note is the same as to ______ down something. A) jot B) scale C) tie |
|
Answer» Correct option is A) jot |
|
| 29. |
To make something appear less serious than it is the same as to ______ down something. A) slam B) set C) play |
|
Answer» Correct option is C) play |
|
| 30. |
The manager failed to get his ideas ______ to the employees. A) across B) down C) in |
|
Answer» Correct option is A) across |
|
| 31. |
During Hoppes process for electrolytic refining of `A1`, the middle layer is ofA. cryolite and `NaF_(2)`B. impure aluminiumC. pure `A1`D. alloys of `A1, Ca`and `Si` |
|
Answer» Correct Answer - A In the Hoopes proces the midle layer consists of cryolite and `BaF_(2)`. |
|
| 32. |
Thermite is amixture of iron oxide andA. zinc powderB. aluminium powderC. sodium shavingD. potassium metal |
|
Answer» Correct Answer - B Thermite is a mixture of metallic oxide (Say. `FeO,Cr_(2)O_(3),Mn_(3)O_(4))`etc. and aluminium powder. |
|
| 33. |
I don’t think they can easily get ______ from prison. A) away B) into C) down |
|
Answer» Correct option is A) away |
|
| 34. |
She is very well-paid, so she can get ______ without any help from him. A) about B) over C) by |
|
Answer» Correct option is C) by |
|
| 35. |
The processes used in the refining of aluminium and metals respectively areA. Cupellation and fractional distillationB. Hoopes process and cupellationC. Poling and fractional distillationD. Hoopes process and fractional distillation |
|
Answer» Correct Answer - D The processes used in the refining of aluminium and zinc metals are Hoopes process and fractional distillation. |
|
| 36. |
Which one of the following is the major impurity in pig iron?A. SiliconB. SulphurC. GraphiteD. Phosphorus |
|
Answer» Correct Answer - C It is an impure form of iron cast into blacks (Pigs) obtained from iron over by blast furnace process. Graphite is he major impurity in pig iron. Pig-iron is later converted into cast iron or steel. |
|
| 37. |
Ok. It’s time to get ______ to business. A) in B) down C) away |
|
Answer» Correct option is B) down |
|
| 38. |
A complex reaction take place in two steps (i) NO (g) + O3 (g) \(\longrightarrow \) NO3 (g) + O (g)(ii) NO3 (g) + O (g) \(\longrightarrow \) NO2 (g) + O2 (g) The predicted rate law is rate = k [NO] [03]. Identify the rate determining step. Write the overall reaction. Which is the reaction inter mediate? Why? |
|
Answer» NO (g) + O3 (g) \(\longrightarrow \) NO3 (g) + O (g) ..........(i) NO3 (g) + O (g) \(\longrightarrow \) NO2 (g) + O2 (g) ..........(ii) As given, rate of reaction = K [NO] [O3] it means, rate of reaction depends on the only (concentration) or partial pressure of NO and O3. Therefore, the first reaction is a rate determining step. On adding equation (i) and (ii) we get overall reaction. NO (g) + O3 (g) \(\longrightarrow \) NO2 (g) + O2 (g) And reaction intermediate are NO3 (g) + O (g) |
|
| 39. |
Why are metallic hydrides also called interstitial hydrides. |
|
Answer» In these hydrides, hydrogen occupies interstices in the metal lattice producing distortion without any change in its type so they are also called interstitial hydrides. |
|
| 40. |
Give two uses of hydrogen. |
|
Answer» 1. Dihydrogen is used in the manufacture of vanaspati fat by the hydrogenation of polyunsaturated vegetable oil. 2. Widely used in the manufacture of metal hydrides. |
|
| 41. |
Name the raw materials used in manufacture of Na2CO3 by Solvay process. |
|
Answer» Ammonia, CO2, sodium chloride, ammonium hydrogen carbonate. |
|
| 42. |
Mention biological role of Na and Ca ions. |
|
Answer» Na – are involved in transmission of nerve signals. Ca – 99% of body calcium is present in bones and teeth. |
|
| 43. |
Define catenation and name the element showing maximum property of catenation. |
|
Answer» Self linking of carbon atom to form a long /branched-chain/cyclic ring is called catenation. Carbon has maximum catenation property. |
|
| 44. |
Which alkali metal gives golden yellow colour to the flame? |
|
Answer» Sodium gives golden yellow colour to the flame. |
|
| 45. |
In your nearby area one chemical factory is there. Suddenly, it catches fire and the fire is involved with metals like Aluminum, Magnesium, Potassium, Sodium and Zinc. Which method of extinguishing can be used? |
|
Answer» Smothering method of extinguishing to be used. |
|
| 46. |
Which metal gives golden yellow flame on reaction with water?A. sodiumB. potassiumC. magnesiumD. Calcium |
|
Answer» Correct Answer - A |
|
| 47. |
The IUPAC name of following compound is `:-` `Cl-CH_(2)-C=C-CH_(3)-Br`.A. `1-`Chloro`-4-`bromo but`-2-`yncB. `1-`Bromo`-4-`chloro but`-2-`yneC. `4-`Bromo`-1-`chloro but`-2-`yneD. `1-`Bromomethyl`-2-`chloromethyl ethyne |
| Answer» Correct Answer - B | |
| 48. |
In which of the following compounds `B-O` bond length is shortest?A. `H_(3)BO_(3)`B. `B(OH)_(4)C. Both have sameD. None |
| Answer» Correct Answer - A | |
| 49. |
For how many seats does the parliament hold Elections? |
|
Answer» 543 seats does the parliament hold Elections |
|
| 50. |
Prolonged and severe iron deficiency can cause astrophy of epithelium of (A) Oral cavity (B) Oesophagus (C) Stomach (D) All of these |
|
Answer» (D) All of these |
|