This Organisation is Managed by A Team of NFSU Alumni;
Stay away from Fraudster

M.Tech Cybersecurity-NFAT Mock Test

NFAT Entrance Exam Mock Test for M.Tech Cybersecurity 2025

Technical Subjects (60 Questions)

1. Which layer of the OSI model is responsible for routing?

A) Data Link
B) Network
C) Transport
D) Application

2. The protocol used for secure communication over the internet is:

A) FTP
B) HTTP
C) HTTPS
D) SMTP

3. What is the purpose of a subnet mask?

A) To separate network and host portions of an IP address
B) To encrypt data packets
C) To assign MAC addresses
D) To manage port numbers

4. The process of switching between multiple programs in execution is called:

A) Multiprocessing
B) Multitasking
C) Multithreading
D) Multiprogramming

5. Which scheduling algorithm selects the process with the shortest burst time?

A) Round Robin
B) First Come First Serve
C) Shortest Job First
D) Priority Scheduling

6. Which data structure uses LIFO (Last In, First Out) principle?

A) Stack
B) Queue
C) Linked List
D) Tree

7. The time complexity of binary search in a sorted array is:

A) O(n)
B) O(log n)
C) O(n²)
D) O(n log n)

8. In assembly language, the instruction 'MOV' is used to:

A) Add two numbers
B) Subtract two numbers
C) Move data between registers
D) Multiply two numbers

9. In C++, which keyword is used to define a class?

A) Struct
B) Class
C) Object
D) Interface

10. In Python, which of the following is used to handle exceptions?

A) Try-except
B) If-else
C) For-loop
D) While-loop

11. In Java, the keyword used to inherit a class is:

A) Implements
B) Inherits
C) Extends
D) Super

12. Which SQL command is used to retrieve data from a database?

A) INSERT
B) SELECT
C) UPDATE
D) DELETE

13. The primary key in a database table is used to:

A) Uniquely identify each record
B) Link multiple tables
C) Store duplicate values
D) Index foreign keys

14. The protocol used for email transmission is:

A) HTTP
B) FTP
C) SMTP
D) DNS

15. The output of an AND gate with inputs A=1 and B=0 is:

A) 1
B) 0
C) A
D) B

16. A flip-flop is used to:

A) Store a single bit of data
B) Perform arithmetic operations
C) Amplify signals
D) Convert analog to digital

17. Which HTML tag is used to create a hyperlink?

A) <link>
B) <a>
C) <href>
D) <url>

18. In CSS, the property used to change the background color is:

A) color
B) background-image
C) background-color
D) bg-color

19. Which technology is used in blockchain for secure data storage?

A) Cryptography
B) Machine Learning
C) Data Mining
D) Cloud Computing

20. The term IoT stands for:

A) Internet of Technology
B) Internet of Things
C) Internet of Tools
D) Internet of Transactions

21. The software development model that emphasizes iterative development is:

A) Agile
B) Waterfall
C) V-Model
D) Spiral

22. The process of verifying that a system meets specifications is called:

A) Debugging
B) Testing
C) Validation
D) Compilation

23. A diagram that shows the flow of data in a system is called:

A) ER Diagram
B) Data Flow Diagram
C) UML Diagram
D) Class Diagram

24. The main function of the CPU is to:

A) Execute instructions
B) Store data
C) Manage peripherals
D) Control network traffic

25. Cache memory is used to:

A) Store permanent data
B) Increase processing power
C) Reduce access time to data
D) Manage I/O operations

26. The output of a NOT gate with input 1 is:

A) 1
B) 0
C) Undefined
D) Input-dependent

27. The process of breaking a system into smaller modules is called:

A) Modularization
B) Integration
C) Abstraction
D) Encapsulation

28. A language that can be recognized by a finite automaton is called:

A) Context-Free
B) Context-Sensitive
C) Regular
D) Recursive

29. The Turing machine is used to model:

A) Finite state machines
B) General computation
C) Pushdown automata
D) Context-free grammars

30. In networking, the term DHCP stands for:

A) Dynamic Host Configuration Protocol
B) Distributed Host Control Protocol
C) Dynamic Hyperlink Configuration Protocol
D) Direct Host Communication Protocol

31. In C, the function used to allocate memory dynamically is:

A) free()
B) malloc()
C) calloc()
D) realloc()

32. The time complexity of merge sort is:

A) O(n)
B) O(n²)
C) O(n log n)
D) O(log n)

33. In a relational database, a foreign key is used to:

A) Establish a relationship between tables
B) Uniquely identify a record
C) Store primary data
D) Index a table

34. The main component of a computer’s ALU is:

A) Register
B) Logic gates
C) Cache memory
D) Bus

35. In JavaScript, the function used to convert a string to an integer is:

A) toString()
B) parseFloat()
C) parseInt()
D) eval()

36. The purpose of a firewall in network security is to:

A) Filter incoming and outgoing traffic
B) Encrypt data
C) Store user credentials
D) Manage IP addresses

37. In Python, the keyword used to define a function is:

A) func
B) def
C) function
D) lambda

38. The data structure used to implement recursion is:

A) Queue
B) Array
C) Stack
D) Tree

39. In digital electronics, a multiplexer is used to:

A) Select one of many inputs
B) Amplify signals
C) Store data
D) Convert analog to digital

40. The term 'SQL injection' refers to:

A) A database optimization technique
B) A security vulnerability in web applications
C) A data retrieval method
D) A database backup strategy

41. In software engineering, the term 'SDLC' stands for:

A) Software Development Life Cycle
B) System Design Life Cycle
C) Software Deployment Life Cycle
D) System Development Life Cycle

42. In networking, the term 'MAC' stands for:

A) Media Access Code
B) Memory Access Control
C) Media Access Control
D) Message Authentication Code

43. The algorithm used to encrypt data in AES is:

A) Asymmetric
B) Symmetric
C) Hash-based
D) Public-key

44. In C++, the concept of hiding internal details is called:

A) Encapsulation
B) Inheritance
C) Polymorphism
D) Abstraction

45. The term 'cloud computing' refers to:

A) Local storage solutions
B) Hardware-based computing
C) On-demand computing resources over the internet
D) Offline data processing

46. In a binary tree, the maximum number of nodes at level n is:

A) 2^n
B) 2^(n+1) - 1
C) 2^(n-1)
D) n²

47. The instruction cycle in a CPU consists of:

A) Fetch, decode, execute
B) Fetch, store, execute
C) Decode, store, execute
D) Fetch, decode, store

48. In web development, AJAX stands for:

A) Asynchronous JavaScript and XML
B) Advanced JavaScript and XML
C) Asynchronous JavaScript and XHTML
D) Automated JavaScript and XML

49. The purpose of normalization in a database is to:

A) Increase data redundancy
B) Reduce data redundancy
C) Encrypt data
D) Backup data

50. In digital electronics, a half-adder performs:

A) Addition of two bits
B) Subtraction of two bits
C) Multiplication of two bits
D) Division of two bits

51. In system design, the term 'scalability' refers to:

A) System security
B) System reliability
C) Ability to handle increased load
D) System maintenance

52. In Python, a list is:

A) Immutable
B) Mutable
C) Fixed-length
D) Static

53. The purpose of DNS in networking is to:

A) Translate domain names to IP addresses
B) Encrypt network traffic
C) Assign port numbers
D) Manage routing tables

54. In software engineering, a use case diagram is part of:

A) ER Diagram
B) Data Flow Diagram
C) UML
D) Flowchart

55. In a CPU, the register that holds the address of the next instruction is:

A) Accumulator
B) Program Counter
C) Stack Pointer
D) Instruction Register

56. In Java, the keyword used to create an object is:

A) new
B) create
C) object
D) instance

57. The term 'phishing' in cybersecurity refers to:

A) Encrypting sensitive data
B) Scanning for vulnerabilities
C) Deceiving users to steal credentials
D) Monitoring network traffic

58. In a linked list, the last node points to:

A) First node
B) NULL
C) Next node
D) Previous node

59. In digital logic, the Boolean expression A + A = ?

A) A
B) 0
C) 1
D) A'

60. The term 'big data' refers to:

A) Small datasets
B) Structured data only
C) Large and complex datasets
D) Encrypted data

Reasoning, English Grammar, General Knowledge, and General Awareness (40 Questions)

61. If A is B’s sister and C is B’s mother, then C is A’s:

A) Sister
B) Mother
C) Daughter
D) Wife

62. Complete the series: 2, 6, 12, 20, ?

A) 28
B) 30
C) 30
D) 32

63. If CAT = 24, what is the value of DOG?

A) 41
B) 42
C) 43
D) 44

64. If 5 : 25 :: 7 : ?

A) 35
B) 49
C) 42
D) 56

65. Which number does not belong: 4, 9, 16, 25, 35?

A) 4
B) 9
C) 35
D) 25

66. If the day after tomorrow is Wednesday, today is:

A) Monday
B) Tuesday
C) Sunday
D) Friday

67. Find the missing term: 3, 9, 27, ?, 243

A) 54
B) 81
C) 108
D) 162

68. If P is to Q as R is to S, then S is:

A) P
B) Q
C) R’s partner
D) None

69. Which letter comes next: A, C, I, I, K, ?

A) I
B) J
C) K
D) L

70. If 2 + 3 = 7, 4 + 5 = 23, then 6 + 7 = ?

A) 37
B) 47
C) 57
D) 67

71. Choose the correct sentence:

A) She don’t like coffee.
B) She doesn’t likes coffee.
C) She doesn’t like coffee.
D) She not like coffee.

72. The synonym of “big” is:

A) Small
B) Large
C) Tiny
D) Short

73. The correct form of the verb in “She ___ (go) to school daily” is:

A) goes
B) go
C) going
D) gone

74. The antonym of “expand” is:

A) Grow
B) Increase
C) Shrink
D) Enlarge

75. Choose the correctly spelled word:

A) Recieve
B) Receive
C) Receeve
D) Recive

76. The plural of “child” is:

A) Children
B) Childs
C) Childes
D) Childrens

77. Identify the part of speech of “quickly” in “She runs quickly”:

A) Adjective
B) Verb
C) Adverb
D) Noun

78. The correct form of the sentence “He is more taller than me” is:

A) He is taller than me.
B) He is taller than I.
C) He is more tall than I.
D) He is most taller than me.

79. The past tense of “write” is:

A) Wrote
B) Written
C) Writed
D) Writing

80. Fill in the blank: “The book ___ on the table.”

A) are
B) were
C) is
D) have

81. The capital of India is:

A) Mumbai
B) New Delhi
C) Kolkata
D) Chennai

82. The currency of Japan is:

A) Yen
B) Yuan
C) Won
D) Dollar

83. The largest planet in our solar system is:

A) Earth
B) Mars
C) Jupiter
D) Saturn

84. The inventor of the World Wide Web is:

A) Bill Gates
B) Tim Berners-Lee
C) Steve Jobs
D) Mark Zuckerberg

85. The longest river in the world is:

A) Nile
B) Amazon
C) Yangtze
D) Mississippi

86. The headquarters of the United Nations is located in:

A) Geneva
B) Paris
C) New York
D) London

87. The chemical symbol for gold is:

A) Ag
B) Au
C) Fe
D) Cu

88. The first computer “bug” was an actual:

A) Insect
B) Virus
C) Software error
D) Hardware failure

89. The term ‘GDPR’ in cybersecurity stands for:

A) General Data Privacy Regulation
B) Global Data Protection Rule
C) General Data Protection Regulation
D) Generic Data Privacy Rule

90. The term ‘ransomware’ refers to:

A) A type of antivirus software
B) Malware that encrypts data and demands payment
C) A network protocol
D) A database management system

91. The Paris Agreement is related to:

A) Climate change
B) Trade regulations
C) Cybersecurity
D) Nuclear disarmament

92. The term ‘AI’ stands for:

A) Automated Intelligence
B) Advanced Integration
C) Artificial Intelligence
D) Adaptive Intelligence

93. The term ‘5G’ refers to:

A) Fifth Generation of computers
B) Fifth Generation of mobile networks
C) Fifth Generation of software
D) Fifth Generation of protocols

94. The term ‘cryptocurrency’ refers to:

A) Digital currency secured by cryptography
B) Physical currency
C) Centralized banking system
D) Paper-based currency

95. The term ‘VPN’ stands for:

A) Virtual Private Network
B) Visual Processing Network
C) Virtual Private Network
D) Virtual Public Network

96. The global organization for cybersecurity standards is:

A) WHO
B) ISO
C) UNESCO
D) WTO

97. The term ‘quantum computing’ refers to computing using:

A) Quantum mechanical phenomena
B) Classical algorithms
C) Binary systems
D) Analog signals

98. The term ‘DDoS’ in cybersecurity stands for:

A) Direct Denial of Service
B) Distributed Data Service
C) Distributed Denial of Service
D) Dynamic Data Service

99. The term ‘biometrics’ in security refers to:

A) Password-based authentication
B) Physical or behavioral characteristics
C) Network encryption
D) Token-based systems

100. The term ‘ethical hacking’ refers to:

A) Authorized testing of system vulnerabilities
B) Illegal system access
C) Software piracy
D) Data theft

Test Results

No comments:

Post a Comment

Courses We Offer

Advance Batch

₹6,100
  • Advanced Study Materials
  • Chapterwise Practice Sheets
  • Specialized Guest Lectures
  • Intensive Personal Mentoring
  • 3 Full-Length Mock Tests
Enroll Now
30% OFF

Crash Course

₹5,857 ₹4,100
🔥 Early Bird Offer! Limited Time Only
  • Fast-Track Study Materials
  • Chapterwise Practice Sheets
  • High-Yield Topics Coverage
  • 2 Full-Length Mock Tests
  • Personalized Mentoring
  • Exam Strategy Sessions
Have a coupon code?
Enroll at 30% OFF
Registration Open

Mock Test Series

₹3,500 ₹1,999
🔥 Last Batch Offer! Limited Time Only
⚠️ Limited Seats Only
  • Latest Exam Pattern
  • Separate UG & PG Tests
  • Expert-Designed Questions
  • All India Ranking
  • Time Management Practice
Enroll Now

Foundation Batch

₹11,100
  • Comprehensive Study Materials
  • Weekly Interactive Classes
  • Personalized Mentoring
  • 3 Full-Length Mock Tests
  • Free Access to Club Events
  • Regular Doubt Sessions
  • Guest Expert Lectures
Maximum seat limit reached. Registration Closed