You are on page 1of 12

6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

BUET CSE MSc Admission Test, April


2021 Part 4 of 4

Part 4 of 4: There are 25 MCQ questions in this part. Answer all the questions.

What was the main reason for WannaCry attack to be successful?

An exploit was stolen from NSA which made it possible to attack successfully

Users did not patch the system even though it was available online

It was an OS vulnerability that the developer did not know

People were not willing to pay the amount asked by the attacker

Clear selection

Which one is used to exchange a shared secret key?

Digital signature

Steganography

Public key cryptosystem

Symmetric key

Clear selection

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 1/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Data point (2) is correctly classified but (1) is incorrectly classified

Both data points are correctly classified

Data point (1) is correctly classified but (2) is incorrectly classified

Both data points are incorrectly classified

Clear selection

Which of the following can be actor of a Use case that describes ATM
transaction?

ATM machine

Core Banking System

Time-based data backup event

All of the above

Clear selection

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 2/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Suppose you are building a decision tree. The tree building algorithm selects an
attribute that has highest information gain as the decision node. For the data
given below, select the attribute which has the highest information gain and
which will be the root node of the decision tree.

Temp

Outlook

Humid

Wind

Clear selection

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 3/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Which of the following can be used by the rootkit to remain stealthy in the
system?

Using function hooking

Using ransomware

Using a Trojan horse

Using the ARP protocol

Clear selection

Given a 3D triangle with coordinate points A(3, 4, 1), B(6, 4, 2), C(5, 6, 3). What are
the new coordinates of point A of the object after the reflection on the XZ plane?

(6,2,8)

(4,3,1)

(3,-4,1)

(3,1,4)

Clear selection

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 4/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

(2^n)B Hz

B/n Hz

nB Hz

2nB Hz

Clear selection

In an Assignment Submission System, a Student cannot deny to have edited


submission after the deadline. Which software security requirement signifies it?

Integrity

Confidentiality

Non-repudiation

Authorization

Clear selection

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 5/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Which among the following error curves indicate faster convergence rate?

Case A

Case B

Case C

Case D

For the Student Management System of BUET, which one is not a Non-functional
requirement?

CGPA cannot be higher than 4

Students other than BUET cannot read or modify course materials

It has to allow 1000 students to register at a time

All of the above

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 6/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

If the bit stream 1110000100110101 is converted using 4B/5B block coding, what
will be the maximum number of consecutive zeros in the output bit stream?

Given a homogeneous point (1, 2, 3). What will be the new coordinate of the point
if a rotation of 90 degree is applied towards the Z axis?

(1,2,-3)

(-2, 1, 3).

(2,1,-3)

(2,-1,-3)

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 7/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Which is the correct bit stream according to the following figure that indicates
differential Manchester line coding scheme?

10000111

01000100

01111000

10111011

Which is the characteristic of a signal g(t), band limited to B Hz, whose Nyquist
sampled values are zero everywhere except at t = 0 where its sampled value is 1?

g(t) is an impulse signal whose impulse location is at t =0.

g(t) is an odd periodic signal.

g(t) = 0 for |t| > 1/2B

g(t) = 0 for t = n/2B, where n is any nonzero integer.

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 8/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

In orthographic projection, the object is placed with one of its faces with
___________ to the picture plane.

Inclined

Parallel

Perpendicular

None of the above

Which statement is true in case of Delta modulation?

Larger threshold of coding decreases granular noise.

Smaller threshold of coding increases slope overload.

Smaller threshold of coding increases granular noise.

Larger threshold of coding increases slope overload.

Suppose, you are working on a binary classification problem with 3 input


features. And you chose to apply a bagging algorithm (X) on this data. You chose
max_features = 2 and the n_estimators = 3. Here, max_features refers to the
maximum number of features to consider at each split and n_estimators refers to
the number of trees to train to be aggregated. Now, assume that each estimator
has 70% accuracy. Also, note that Algorithm X is aggregating the results of
individual estimators based on maximum voting. What will be the maximum
accuracy that you can get?

70%

80%

100%

90%

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 9/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

What are the computed values of precision and sensitivity, if you are given the
following confusion matrix?

0.83, 0.77

0.67, 0.84

0.77, 0.63

0.63, 0.83

Which of the following is not an advantage of Microservice architecture?

Better deployability

Improve maintainability

Low memory requirement

Better testability

Given a triangle with points (1, 1), (0, 0) and (1, 0). If shear parameter 2 is applied
on X axis what will be the new coordinates of the object?

A (3, 1), B(0, 0), C(1, 0).

A (3, 1), B(0, 0), C(1, 1).

A (2, 1), B(0, 0), C(1, 0).

A (2, 1), B(0, 1), C(1, 0).

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 10/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Which of the following takes advantage of the TCP congestion control


algorithm?

TCP blind injection attack

Optimistic ACK attack

TCP Syn flood attack

DDoS attack using TCP reset flag

How can you guess that some machine is probably sniffing the packets in a LAN?

Internet traffic will be blocked by the sniffer machine causing timeouts

A ping response from the suspected machine will be slower than that of others

The suspected machine will launch a lot of ARP requests

There will be huge UDP streaming traffic in the LAN which will disrupt the network

Which of the following is false?

A Sequence diagram shows lifetime of an object.

A Sequence diagram may show condition

A Sequence diagram does not show loop

None of the above

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 11/12
6/24/2021 BUET CSE MSc Admission Test, April 2021 Part 4 of 4

Given two points P1(0, 0, 0) and P2(2, 2, 0) which of the following is the plane
equation equidistant from P1 and P2?

x-y+2=0

x+y+2=0

x+y-2=0

2x-y=0

Page 2 of 2

Back Submit

Never submit passwords through Google Forms.

This form was created inside of Department of Computer Science and Engineering, BUET. Report Abuse

 Forms

https://docs.google.com/forms/d/e/1FAIpQLSeBbx1_xqtRAgwJWblTmSGDepcZii-rQ0iSmcmdjEIh87sm5Q/formResponse 12/12

You might also like