This Organisation is Managed by A Team of NFSU Alumni;
Stay away from Fraudster

M.Tech Cybersecurity -NFAT Mock Test

NFAT Entrance Exam Mock Test for M.Tech Cybersecurity 2025

Technical Subjects (60 Questions)

1. Which protocol is used for assigning IP addresses dynamically?

A) FTP
B) SNMP
C) DHCP
D) SMTP

2. What does ARP stand for in networking?

A) Address Resolution Protocol
B) Application Routing Protocol
C) Access Restriction Protocol
D) Authentication Request Protocol

3. Which layer of the OSI model handles error detection and correction?

A) Physical
B) Data Link
C) Network
D) Transport

4. Which of the following is a real-time operating system?

A) Windows
B) Linux
C) VxWorks
D) Ubuntu

5. The technique of swapping data between RAM and disk is called:

A) Paging
B) Buffering
C) Caching
D) Spooling

6. A binary tree with n nodes has how many edges?

A) n
B) n-1
C) n+1
D) 2n

7. The space complexity of a recursive factorial algorithm is:

A) O(1)
B) O(n²)
C) O(n)
D) O(log n)

8. In assembly language, the 'PUSH' instruction is used to:

A) Add data to the stack
B) Remove data from the stack
C) Move data to a register
D) Compare two values

9. In Java, which access modifier allows access only within the same package?

A) Public
B) Private
C) Default
D) Protected

10. In Python, which method is used to initialize a class?

A) __initiate__
B) __init__
C) __new__
D) __start__

11. In C++, the operator used for dynamic memory allocation is:

A) new
B) malloc
C) alloc
D) create

12. Which SQL clause is used to sort query results?

A) GROUP BY
B) WHERE
C) ORDER BY
D) HAVING

13. In a database, a candidate key is:

A) A minimal set of attributes that uniquely identifies a tuple
B) A foreign key
C) A non-unique key
D) A composite key only

14. The protocol used for resolving domain names is:

A) HTTP
B) DNS
C) FTP
D) TCP

15. The output of an OR gate with inputs A=0 and B=1 is:

A) 1
B) 0
C) A
D) B

16. A register is used to:

A) Perform arithmetic operations
B) Store large data sets
C) Hold data temporarily during processing
D) Control I/O devices

17. In HTML, the tag used to define a table row is:

A)
B)
C)
D)

18. In CSS, the property to align text to the center is:

A) text-position
B) text-align
C) align-text
D) center-text

19. Which technology is primarily used for machine learning models?

A) Blockchain
B) IoT
C) Neural Networks
D) Cryptography

20. The term ‘AR’ in technology stands for:

A) Augmented Reality
B) Artificial Reality
C) Automated Response
D) Adaptive Robotics

21. The software development model with a single sequential flow is:

A) Spiral
B) Waterfall
C) Agile
D) Scrum

22. The process of finding and fixing defects in software is called:

A) Debugging
B) Compilation
C) Validation
D) Integration

23. A diagram that represents entities and their relationships is:

A) ER Diagram
B) Data Flow Diagram
C) Flowchart
D) Sequence Diagram

24. The component that connects CPU and memory is:

A) Cache
B) Bus
C) Register
D) ALU

25. The purpose of pipelining in CPU design is to:

A) Reduce memory usage
B) Increase cache size
C) Improve instruction execution speed
D) Manage I/O operations

26. The output of an XOR gate with inputs A=1 and B=1 is:

A) 0
B) 1
C) A
D) B

27. The principle of hiding data and showing only necessary details is:

A) Modularization
B) Encapsulation
C) Abstraction
D) Inheritance

28. A pushdown automaton is used to recognize:

A) Context-Free Languages
B) Regular Languages
C) Context-Sensitive Languages
D) Recursive Languages

29. The halting problem is associated with:

A) Finite Automata
B) Turing Machines
C) Pushdown Automata
D) Regular Expressions

30. In networking, NAT stands for:

A) Network Address Translation
B) Network Authentication Token
C) Network Address Translation
D) Network Access Terminal

31. In C, the function to release dynamically allocated memory is:

A) free()
B) delete()
C) release()
D) clear()

32. The time complexity of quicksort in the average case is:

A) O(n)
B) O(n log n)
C) O(n²)
D) O(log n)

33. In a database, the JOIN operation is used to:

A) Delete records
B) Update records
C) Combine records from multiple tables
D) Sort records

34. The main function of a computer’s control unit is to:

A) Coordinate operations
B) Perform arithmetic
C) Store data
D) Manage memory

35. In JavaScript, the method to add an element to the end of an array is:

A) append()
B) push()
C) add()
D) insert()

36. In cybersecurity, a honeypot is used to:

A) Encrypt sensitive data
B) Store user credentials
C) Attract and detect attackers
D) Filter network traffic

37. In Python, the keyword for creating a loop is:

A) for
B) loop
C) iterate
D) cycle

38. The data structure used for breadth-first search is:

A) Stack
B) Queue
C) Array
D) Tree

39. In digital electronics, a demultiplexer is used to:

A) Combine multiple inputs
B) Amplify signals
C) Route one input to multiple outputs
D) Store data

40. The term 'XSS' in web security stands for:

A) Cross-Site Scripting
B) Cross-Server Scripting
C) Cross-System Security
D) Cross-Site Storage

41. In software engineering, the term 'SRS' stands for:

A) Software Requirement System
B) Software Requirement Specification
C) System Resource Specification
D) Software Resource Standard

42. In networking, the term 'LAN' stands for:

A) Local Area Network
B) Large Area Network
C) Logical Access Network
D) Limited Access Network

43. The algorithm used in RSA encryption is:

A) Symmetric
B) Hash-based
C) Asymmetric
D) Block-based

44. In C++, the concept of multiple functions with the same name is called:

A) Encapsulation
B) Polymorphism
C) Inheritance
D) Abstraction

45. The term 'SaaS' in cloud computing stands for:

A) Software as a Service
B) System as a Service
C) Storage as a Service
D) Security as a Service

46. In a binary search tree, the left child of a node contains:

A) Larger values
B) Equal values
C) Smaller values
D) Random values

47. In a CPU, the register that holds temporary results is:

A) Program Counter
B) Accumulator
C) Stack Pointer
D) Instruction Register

48. In web development, JSON stands for:

A) JavaScript Object Notation
B) JavaScript Online Notation
C) Java Object Notation
D) JavaScript Offline Notation

49. In a database, the process of dividing a table into smaller tables is:

A) Indexing
B) Partitioning
C) Normalization
D) Aggregation

50. In digital electronics, a full-adder adds:

A) Two bits
B) Three bits
C) Four bits
D) One bit

51. In system design, the term 'load balancing' refers to:

A) Distributing workload across multiple servers
B) Encrypting network traffic
C) Compressing data
D) Backing up data

52. In Python, a tuple is:

A) Mutable
B) Dynamic
C) Immutable
D) Resizable

53. In networking, the term 'IP' stands for:

A) Internet Provider
B) Internet Protocol
C) Internal Process
D) Integrated Packet

54. In software engineering, a class diagram is part of:

A) UML
B) ER Diagram
C) Data Flow Diagram
D) Flowchart

55. In a CPU, the register that points to the top of the stack is:

A) Program Counter
B) Accumulator
C) Stack Pointer
D) Instruction Register

56. In Java, the keyword for implementing an interface is:

A) Extends
B) Implements
C) Inherits
D) Uses

57. In cybersecurity, the term 'malware' refers to:

A) Malicious software
B) Monitoring software
C) Management software
D) Maintenance software

58. In a doubly linked list, each node points to:

A) Only the next node
B) Only the previous node
C) Both next and previous nodes
D) The head node

59. In digital logic, the Boolean expression A . A = ?

A) 0
B) A
C) 1
D) A'

60. The term 'edge computing' refers to:

A) Centralized data processing
B) Cloud-based storage
C) Processing data closer to its source
D) Virtualized networking

Reasoning, English Grammar, General Knowledge, and General Awareness (40 Questions)

61. If X is Y’s brother and Z is Y’s father, then Z is X’s:

A) Brother
B) Son
C) Father
D) Husband

62. Complete the series: 1, 4, 9, 16, ?

A) 20
B) 25
C) 30
D) 36

63. If BAT = 23, what is the value of GAP?

A) 20
B) 21
C) 22
D) 23

64. If 3 : 9 :: 5 : ?

A) 15
B) 20
C) 25
D) 30

65. Which number does not belong: 2, 4, 8, 16, 31?

A) 31
B) 8
C) 16
D) 4

66. If tomorrow is Tuesday, today is:

A) Sunday
B) Monday
C) Wednesday
D) Thursday

67. Find the missing term: 2, 6, 18, ?, 162

A) 36
B) 48
C) 54
D) 72

68. If M is to N as P is to Q, then Q is:

A) M
B) P’s partner
C) N
D) None

69. Which letter comes next: B, E, I, K, I, ?

A) I
B) J
C) I
D) K

70. If 1 + 2 = 5, 3 + 4 = 25, then 5 + 6 = ?

A) 35
B) 61
C) 71
D) 81

71. Choose the correct sentence:

A) He don’t like tea.
B) He doesn’t like tea.
C) He not likes tea.
D) He doesn’t likes tea.

72. The synonym of “small” is:

A) Large
B) Big
C) Tiny
D) Huge

73. The correct form of the verb in “They ___ (play) football daily” is:

A) play
B) plays
C) playing
D) played

74. The antonym of “increase” is:

A) Grow
B) Decrease
C) Expand
D) Enlarge

75. Choose the correctly spelled word:

A) Occurence
B) Occurrance
C) Occurrence
D) Occurance

76. The plural of “mouse” (animal) is:

A) Mouses
B) Mice
C) Mouse
D) Mices

77. Identify the part of speech of “beautiful” in “She is beautiful”:

A) Adjective
B) Adverb
C) Noun
D) Verb

78. The correct form of the sentence “She is more smarter than him” is:

A) She is smarter than him.
B) She is smarter than he.
C) She is more smart than he.
D) She is most smarter than him.

79. The past tense of “run” is:

A) Runned
B) Running
C) Ran
D) Run

80. Fill in the blank: “The books ___ on the shelf.”

A) is
B) are
C) was
D) has

81. The capital of France is:

A) Paris
B) London
C) Berlin
D) Madrid

82. The currency of the United States is:

A) Euro
B) Dollar
C) Pound
D) Yen

83. The smallest planet in our solar system is:

A) Venus
B) Mars
C) Mercury
D) Pluto

84. The inventor of the telephone is:

A) Alexander Graham Bell
B) Thomas Edison
C) Nikola Tesla
D) Guglielmo Marconi

85. The highest mountain in the world is:

A) K2
B) Mount Everest
C) Kangchenjunga
D) Lhotse

86. The headquarters of NATO is located in:

A) Brussels
B) Washington D.C.
C) London
D) Paris

87. The chemical symbol for oxygen is:

A) O2
B) Ox
C) O
D) Oxy

88. The first programmable computer was called:

A) ENIAC
B) Z1
C) Colossus
D) UNIVAC

89. The term ‘HIPAA’ in cybersecurity stands for:

A) Health Insurance Portability and Accountability Act
B) Health Information Privacy and Access Act
C) Healthcare Information Protection Act
D) Health Insurance Privacy Act

90. The term ‘trojan’ in cybersecurity refers to:

A) A firewall system
B) An antivirus software
C) Malware disguised as legitimate software
D) A network protocol

91. The Kyoto Protocol is related to:

A) Nuclear energy
B) Climate change
C) Cybersecurity
D) Trade agreements

92. The term ‘ML’ in technology stands for:

A) Machine Learning
B) Mobile Learning
C) Modular Language
D) Multi-Level

93. The term ‘4G’ refers to:

A) Fourth Generation of computers
B) Fourth Generation of software
C) Fourth Generation of mobile networks
D) Fourth Generation of protocols

94. The term ‘blockchain’ refers to:

A) A centralized database
B) A decentralized ledger
C) A network protocol
D) A cloud storage system

95. The term ‘SSL’ in web security stands for:

A) Secure System Layer
B) System Security Layer
C) Secure Sockets Layer
D) Safe System Link

96. The global organization for internet standards is:

A) IETF
B) ISO
C) IEEE
D) W3C

97. The term ‘deep learning’ refers to:

A) Basic machine learning
B) A subset of machine learning with neural networks
C) Database management
D) Network optimization

98. The term ‘botnet’ in cybersecurity refers to:

A) A network of bots for automation
B) A secure network
C) A network of compromised devices
D) A cloud-based system

99. The term ‘two-factor authentication’ refers to:

A) Using two methods to verify identity
B) Encrypting data twice
C) Using two firewalls
D) Backing up data twice

100. The term ‘penetration testing’ refers to:

A) Developing secure software
B) Simulating attacks to find vulnerabilities
C) Encrypting network traffic
D) Monitoring system performance

Test Results

No comments:

Post a Comment

Transform Your Future
Choose the perfect course to accelerate your learning journey
Advance Batch
₹10,000
₹6,100
39% OFF
🚀 Premium Learning Experience - Limited Seats!
Premium Study Materials & E-books
Advanced Practice Sheets & Solutions
Expert Guest Lectures & Masterclasses
1-on-1 Personal Mentoring Sessions
5 Full-Length Mock Tests with Analysis
24/7 Doubt Resolution Support
Performance Analytics Dashboard
Enroll Now
37% OFF
Starter Batch
₹8,100
₹5,100
🔥 Perfect for Quick Start - Early Bird Pricing!
Curated Study Materials & Notes
Topic-wise Practice Questions
High-Yield Topics & Quick Revision
Group Mentoring & Study Sessions
3 Mock Tests with Solutions
Exam Strategy & Time Management
Weekly Progress Tracking
Have a coupon code?
Enroll at 37% OFF
Registration Open
Mock Test Series
₹3,500
₹1,999
43% OFF
🔥 Final Batch Alert - Limited Seats Available!
⚠️ Only 50 Seats Remaining
Latest 2025 Exam Pattern Coverage
Separate UG & PG Level Tests
Expert-Crafted Questions Bank
All India Ranking & Percentile
Advanced Time Management Tools
Detailed Performance Analytics
Register Now
Foundation Batch
₹11,100
Comprehensive Study Materials
Weekly Interactive Live Classes
Personal Academic Mentoring
5 Comprehensive Mock Tests
Free Access to All Club Events
Daily Doubt Resolution Sessions
Industry Expert Guest Lectures
Study Group & Peer Learning
🚫 Enrollment Closed - Maximum Capacity Reached
Powered by Blogger.

Blog Archive