{"id":8002,"date":"2020-02-20T13:29:37","date_gmt":"2020-02-20T07:59:37","guid":{"rendered":"https:\/\/affairscloud.com\/jobs\/?p=8002"},"modified":"2020-03-09T12:53:23","modified_gmt":"2020-03-09T07:23:23","slug":"upsc-dcio-previous-year-question-paper-answer-key-2018","status":"publish","type":"post","link":"https:\/\/affairscloud.com\/jobs\/upsc-dcio-previous-year-question-paper-answer-key-2018\/","title":{"rendered":"UPSC DCIO Previous Year Question Paper, Answer Key 2018"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>UPSC DCIO Previous Year Question Paper &amp; Answer Key 2018: <\/strong>Union Public Service Commission has released previous year question paper with answer key for Deputy Central Intelligence Officer. We have collected the same and posted for easy reference of the candidates. So candidates can make use of this and prepare for their upcoming UPSC DCIO Computer Based Recruitment Test which is held on 08th March 2020.<\/p>\n<p style=\"text-align: center; font-size: 25px;\"><a href=\"https:\/\/affairscloud.com\/jobs\/upsc-dcio-joint-assistant-director-admit-card-2020-out\/\">UPSC DCIO Admit Card 2020 &#8211; Download here<\/a><\/p>\n<p style=\"text-align: center; font-size: 25px;\"><a href=\"https:\/\/affairscloud.com\/jobs\/upsc-dcio-syllabus-2020\/\">UPSC DCIO Syllabus 2020 &#8211; Check here<\/a><\/p>\n<p style=\"text-align: center; font-size: 25px;\"><a href=\"https:\/\/affairscloud.com\/jobs\/upsc-dcio-previous-year-cut-off-marks-2018\/\">UPSC DCIO Previous Cut-Off Marks 2018 &#8211; Check here<\/a><\/p>\n<h2>UPSC DCIO Previous Year Question Paper:<\/h2>\n<h3 style=\"text-align: center;\">General Aptitude Test (DCIO)<\/h3>\n<p style=\"text-align: center;\"><strong><span style=\"color: #ff0000;\">CBRT- held on 21st January 2018 (A\/N)<\/span><\/strong><\/p>\n<p>1. If twice the Son\u2019s age in years is added to Father\u2019s age, the sum is 70 years. And if twice the Father\u2019s age is added to the Son\u2019s age, the sum is 95 years. The age of Father and Son are:<\/p>\n<p>(a) 45 Years and 15 Years<br \/>\n(b) 40 Years and 15 Years<br \/>\n(c) 40 Years and 20 Years<br \/>\n(d) 45 Years and 20 Years<\/p>\n<p>2. In a Cricket match Kapil took one wicket less than twice the number of wickets taken by Ravi. If the product of the number of wickets taken by these two players is 15, the number of wickets taken by Kapil and Ravi respectively are:<\/p>\n<p>(a) 5 and 3<br \/>\n(b) 3 and 5<br \/>\n(c) 5 and 4<br \/>\n(d) 4 and 5<\/p>\n<p>3. A chord <em>AB<\/em> of a circle of radius 10 <em>cm<\/em> makes a right angle at the centre of the circle. The area of the minor segment is:<\/p>\n<p>(a) 78.5 <em>cm<sup>2<\/sup><\/em><br \/>\n(b) 50.0 <em>cm<sup>2<\/sup><\/em><br \/>\n(c) 40.0 <em>cm<sup>2<\/sup><\/em><br \/>\n(d) 28.5 <em>cm<sup>2<\/sup><\/em><\/p>\n<p>4. A cone of height 24 <em>cm<\/em> has a curved surface area 550 <em>cm<sup>2<\/sup><\/em>. Its volume is:<\/p>\n<p>(a) 1332 <em>cm<sup>3<\/sup><\/em><br \/>\n(b) 1232 <em>cm<sup>3<\/sup><\/em><br \/>\n(c) 1132 <em>cm<sup>3<\/sup><\/em><br \/>\n(d) 1322 <em>cm<sup>3<\/sup><\/em><\/p>\n<p>5. What number must be added to each of the number 7, 16, 43 and 79 to make the numbers in proportion?<\/p>\n<p>(a) 6<br \/>\n(b) 5<br \/>\n(c) 4<br \/>\n(d) 3<\/p>\n<p>6. The area of the curve <em>r<\/em> = <em>a<\/em> (1 \u2212 cos \ud835\udf03) is:<\/p>\n<p>(a) <em>a<sup>2<\/sup>\ud835\udf0b \/ <\/em>2<br \/>\n(b) 5<em>a<sup>2<\/sup>\ud835\udf0b \/ <\/em>2<br \/>\n(c) 4<em>a<sup>2<\/sup>\ud835\udf0b \/ <\/em>2<br \/>\n(d) 3<em>a<sup>2<\/sup>\ud835\udf0b \/ <\/em>2<\/p>\n<p>7. The value of integral <sub>0<\/sub>\u222b<sup>1<\/sup> <em>e<sup>2x<\/sup>.x<sup>2<\/sup>dx<\/em> is:<\/p>\n<p>(a) <em>e<sup>2 <\/sup><\/em>\/ 4<br \/>\n(b) <em>e<sup>2 <\/sup><\/em>\/ 2<br \/>\n(c) <em>e<sup>2<\/sup><\/em>\u22121 \/ 2<br \/>\n(d) <em>e<sup>2<\/sup><\/em>\u22121 \/ 4<\/p>\n<p>8. The distance of the point (1, \u22122, 3) from the plane \ud835\udc65 \u2013 \ud835\udc66 + \ud835\udc67 = 5 measured parallel to the line, \ud835\udc65\/2 = \ud835\udc66\/3 = \ud835\udc67\/\u22126 is:<\/p>\n<p>(a) 1\/2<br \/>\n(b) 1<br \/>\n(c) 1\/3<br \/>\n(d) 2<\/p>\n<p>9. In an <em>LPP<\/em>: Minimize \ud835\udc4d = 3 \ud835\udc65<sub>1<\/sub> + 2 \ud835\udc65<sub>2<\/sub><\/p>\n<p>Subject to: 5\ud835\udc65<sub>1<\/sub> + \ud835\udc65<sub>2 <\/sub>\u2265 10<br \/>\n\ud835\udc65<sub>1<\/sub> + \ud835\udc65<sub>2 <\/sub>\u2265 6<br \/>\n\ud835\udc65<sub>1<\/sub> + \ud835\udc65<sub>2 <\/sub>\u2265 12<br \/>\n\ud835\udc65<sub>1<\/sub>, \ud835\udc65<sub>2 <\/sub>\u2265 0<\/p>\n<p>The values of\ud835\udc65<sub>1 <\/sub>and \ud835\udc65<sub>2 <\/sub>respectively, are:<\/p>\n<p>(a) 5 and 1<br \/>\n(b) 1 and 5<br \/>\n(c) 3 and 2<br \/>\n(d) 2 and 3<\/p>\n<p>10. The energy required for a satellite to leave its orbit around the earth and escape to infinity is called:<\/p>\n<p>(a) Potential energy<br \/>\n(b) Binding energy<br \/>\n(c) Gravitational energy<br \/>\n(d) Positive energy<\/p>\n<p>11. Which of the following characteristics are required by the medium for transfer of energy to take place?<\/p>\n<p>1. Elastic property<br \/>\n2. Property of inertia<br \/>\n3. Large frictional resistance<\/p>\n<p>(a) 1 and 2 only<br \/>\n(b) 1 and 3 only<br \/>\n(c) 2 and 3 only<br \/>\n(d) 1, 2 and 3<\/p>\n<p>12. A substance undergoes a change in pressure or volume but no heat is allowed to enter or leave. Such a change is known as:<\/p>\n<p>(a) Isothermal change<br \/>\n(b) Reversible change<br \/>\n(c) Irreversible change<br \/>\n(d) Adiabatic change<\/p>\n<p>13. Which of the following are non-polar molecules?<\/p>\n<p>1. Oxygen (\ud835\udc42<sub>2<\/sub>)<br \/>\n2. Nitrogen(\ud835\udc41<sub>2<\/sub>)<br \/>\n3. Hydrogen (\ud835\udc3b<sub>2<\/sub>)<\/p>\n<p>(a) 1 and 2 only<br \/>\n(b) 1 and 3 only<br \/>\n(c) 2 and 3 only<br \/>\n(d) 1, 2 and 3<\/p>\n<p>14. A transparent plate of thickness 10<sup>\u22125<\/sup>\ud835\udc5a is placed in the path of interfering beam of bi-prism experiment using light of wavelength 500 \ud835\udc5b\ud835\udc5a. If the central fringe shifts by a distance equal to the width of 10 fringes, then the refractive index of the material of the plate is:<\/p>\n<p>(a) 1.10<br \/>\n(b) 1.35<br \/>\n(c) 1.85<br \/>\n(d) 1.50<\/p>\n<p>15. What is the highest order spectrum which may be seen with monochromatic light of wavelength 600 \ud835\udc5b\ud835\udc5a by means of diffraction grating with 5000 <em>lines<\/em>\/\ud835\udc50\ud835\udc5a?<\/p>\n<p>(a) 1<br \/>\n(b) 2<br \/>\n(c) 3<br \/>\n(d) 4<\/p>\n<p>16. A diffraction grating has 0.15 \ud835\udc5a of surface ruled with 6 \u00d7 10<sup>5<\/sup> <em>lines<\/em>\/\ud835\udc5a, the refractive index of first order is:<\/p>\n<p>(a) 9 \u00d7 106<br \/>\n(b) 6 \u00d7 105<br \/>\n(c) 9 \u00d7 104<br \/>\n(d) 6 \u00d7 103<\/p>\n<p>17. Wavelength \ud835\udf06 associated with a moving particle depends on its mass \ud835\udc5a, velocity of motion \ud835\udc63 and Plank\u2019s constant \u210e . then the wavelength is proportional to:<\/p>\n<p>(a) \u210e<sup>2<\/sup> \/ \ud835\udc5a\ud835\udc63<br \/>\n(b) \u210e \/ \ud835\udc5a\ud835\udc63<sup>2<\/sup><br \/>\n(c) \u210e \/ \ud835\udc5a\ud835\udc63<br \/>\n(d) \u210e \/ \ud835\udc5a<sup>2<\/sup>\ud835\udc63<\/p>\n<p>18. A reversible engine takes in a mixture of fuel and air at 27\u00b0 \ud835\udc36 and the highest temperature after combustion is 427\u00b0 \ud835\udc36. What is the Carnot\u2019s efficiency of the engine working between these two temperature limits?<\/p>\n<p>(a) 52.7 %<br \/>\n(b) 57.1 %<br \/>\n(c) 47.1 %<br \/>\n(d) 42.7 %<\/p>\n<p>19. What resistance must be connected in series with an inductor of 5 <em>millihenry<\/em> so that the circuit has a time constant of 2 \u00d7 10<sup>-3<\/sup><em>sec<\/em>?<\/p>\n<p>(a) 1.5 \u03a9<br \/>\n(b) 4.5 \u03a9<br \/>\n(c) 3.5 \u03a9<br \/>\n(d) 2.5 \u03a9<\/p>\n<p>20. The luminous efficiency of a lamp is 5 <em>lumen\/watt<\/em> and its power is 88 <em>watt<\/em>. What is the illuminance on a surface placed at a distance of 10 \ud835\udc5a, when the light is falling normally?<\/p>\n<p>(a) 0.35 <em>lux<\/em><br \/>\n(b) 0.6 <em>lux<\/em><br \/>\n(c) 0.5 <em>lux<\/em><br \/>\n(d) 0.45 <em>lux<\/em><\/p>\n<p>21. A biconvex lens has a focal length 2\/3 times the radius of curvature of either surface. The refractive index of lens is:<\/p>\n<p>(a) 1.55<br \/>\n(b) 1.65<br \/>\n(c) 1.75<br \/>\n(d) 1.85<\/p>\n<p>22. An audio signal of amplitude 0.1 \ud835\udc49 is used in amplitude modulation of a carrier wave of amplitude 0.2 \ud835\udc49. The modulation index is:<\/p>\n<p>(a) 0.1<br \/>\n(b) 0.3<br \/>\n(c) 0.5<br \/>\n(d) 0.7<\/p>\n<p>23. Consider the following:<\/p>\n<p>1. Byte<br \/>\n2. Double<br \/>\n3. Long<br \/>\n4. Short<\/p>\n<p>Which of the above are the valid integer types of <em>JAVA<\/em>?<\/p>\n<p>(a) 1, 2 and 3 only<br \/>\n(b) 1, 2 and 4 only<br \/>\n(c) 2, 3 and 4 only<br \/>\n(d) 1, 3 and 4 only<\/p>\n<p>24. In <em>JAVA<\/em>, the math class has a powerful method, which generates a random value:<\/p>\n<p>(a) Greater than or equal to 0.0 and less than 1.0<br \/>\n(b) Greater than or equal to 0.0 and less than or equal to 1.0<br \/>\n(c) Greater than 1.0<br \/>\n(d) Less than or equal to 1.0<\/p>\n<p>25. In <em>JAVA<\/em>, \u2018\u2018Welcome\u2019\u2019. replaceFirst (\u201ce\u201d, \u201cAB\u201d) returns a new string:<\/p>\n<p>(a) WABlcomAB<br \/>\n(b) WABlcome<br \/>\n(c) Welcome<br \/>\n(d) WABLCOME<\/p>\n<p>26. An object whose contents cannot be changed once the object is created is called:<\/p>\n<p>(a) Immutable object<br \/>\n(b) Mutable object<br \/>\n(c) Smart object<br \/>\n(d) Rich object<\/p>\n<p>27. Which one of the following fundamental features of the <em>OOPS<\/em> is not supported by \ud835\udc36++?<\/p>\n<p>(a) Persistence<br \/>\n(b) Delegation<br \/>\n(c) Genericity<br \/>\n(d) Data abstraction<\/p>\n<p>28. Which one of the following features is supported by \ud835\udc36++ but not by <em>JAVA<\/em>?<\/p>\n<p>(a) Encapsulation<br \/>\n(b) Multiple inheritance<br \/>\n(c) Concurrency<br \/>\n(d) Garbage collection<\/p>\n<p>29. Consider the following statements regarding <em>JAVA<\/em>:<\/p>\n<p>1. It is a high performance programming language<br \/>\n2. It does not support pointers<br \/>\n3. It omits features that make \ud835\udc36++ complex<br \/>\n4. It provides platform-dependent solution<\/p>\n<p>Which of the above statements are correct?<\/p>\n<p>(a) 1, 2 and 4 only<br \/>\n(b) 1, 3 and 4 only<br \/>\n(c) 1, 2 and 3 only<br \/>\n(d) 2, 3 and 4 only<\/p>\n<p>30. Consider the following features regarding \ud835\udc36++:<\/p>\n<p>1. Emphasis on algorithm rather than data<br \/>\n2. Improvement over the structural programming paradigm<br \/>\n3. Relationship can be created between similar, yet distinct data types<\/p>\n<p>Which of the above features are correct?<\/p>\n<p>(a) 2 and 3 only<br \/>\n(b) 1 and 2 only<br \/>\n(c) 1 and 3 only<br \/>\n(d) 1, 2 and 3<\/p>\n<p>31. A mobile is located 5 <em>km<\/em> away from a base station and makes use of a vertical \u00bc monopole antenna with a gain of 2.55 <em>dB<\/em> to receive cellular radio signals. The E-field at 1 km from the transmitter is measured to be 10<sup>\u22123<\/sup> \ud835\udc49\/\ud835\udc5a . The carrier frequency used for this system is 900 <em>MHz<\/em>, the length and the effective apertures of the receiving antenna are nearly:<\/p>\n<p>(a) 0.05 \ud835\udc5a and 0.01 \ud835\udc5a<sup>2<\/sup><br \/>\n(b) 0.08 \ud835\udc5a and 0.01 \ud835\udc5a<sup>2<\/sup><br \/>\n(c) 0.05 \ud835\udc5a and 0.06 \ud835\udc5a<sup>2<\/sup><br \/>\n(d) 0.08 \ud835\udc5a and 0.06 \ud835\udc5a<sup>2<\/sup><\/p>\n<p>32. What is the far field distance for an antenna with largest dimension 1.5 \ud835\udc5a and the corresponding frequency of 1200 <em>MHz<\/em>?<\/p>\n<p>(a) 12 \ud835\udc5a<br \/>\n(b) 3 \ud835\udc5a<br \/>\n(c) 6 \ud835\udc5a<br \/>\n(d) 8 \ud835\udc5a<\/p>\n<p>33. The block length and size of check code in Reed-Solomon code for \ud835\udc5a = 2 and \ud835\udc61 = 1 are respectively:<\/p>\n<p>(a) 4 bits and 6 bits<br \/>\n(b) 6 bits and 6 bits<br \/>\n(c) 4 bits and 4 bits<br \/>\n(d) 6 bits and 4 bits<\/p>\n<p>34. What is the total power \ud835\udc43<sub>\ud835\udc47<\/sub> in amplitude modulated signal (<em>AM<\/em>) , if the modulation indices are 0.3, 0.2, 0.5 and 0.6, where the carrier signal power is 28 <em>Watts<\/em>?<\/p>\n<p>(a) 38.36 <em>Watts<\/em><br \/>\n(b) 28.26 <em>Watts<\/em><br \/>\n(c) 32.16 <em>Watts<\/em><br \/>\n(d) 18.89 <em>Watts<\/em><\/p>\n<p>35. A telephone voice transmission needs transmission of recurrences up to 3.6 <em>kHz<\/em>, the broadcast video using North American standard needs transmission of frequencies upto 4.5 <em>MHz<\/em>. If certain modulation scheme requires 10 <em>kHz <\/em>for its audio transmission, the bandwidth required to transmit video using the same scheme is:<\/p>\n<p>(a) 08.5 <em>MHz<\/em><br \/>\n(b) 10.0 <em>MHz<\/em><br \/>\n(c) 12.5 <em>MHz<\/em><br \/>\n(d) 15.0 <em>MHz<\/em><\/p>\n<p>36. A vehicle travels through the cellular mobile system at 150 <em>kmph<\/em>. How often handoffs take place if the cell radius is 4 km?<\/p>\n<p>(a) 192.3 sec<br \/>\n(b) 180.3 sec<br \/>\n(c) 163.5 sec<br \/>\n(d) 150.9 sec<\/p>\n<p>37. A truck travels at 65 km in 1 hour and if it uses a PCS phone at 1900 MHz, the time period between the fades is:<\/p>\n<p>(a) 5.9 m\/sec<br \/>\n(b) 4.4 m\/sec<br \/>\n(c) 8.3 m\/sec<br \/>\n(d) 6.1 m\/sec<\/p>\n<p>38. What is the bandwidth efficiency if a \ud835\udf0b\/4 DQ PSK supports data transmission of three various 48.6 kB\/sec digitized voice signal in a bandwidth of 30 kHz?<\/p>\n<p>(a) 6.66 bytes\/sec\/Hz<br \/>\n(b) 5.75 bytes\/sec\/Hz<br \/>\n(c) 4.86 bytes\/sec\/Hz<br \/>\n(d) 3.96 bytes\/sec\/Hz<\/p>\n<p>39. The bandwidth of a network is 1 Gbps, the distance between sender and the receiver is 12,000 km and light travels at 2.4 \u00d7 10<sup>8<\/sup> \ud835\udc5a\/\ud835\udc60, the propagation time and transmission time for a 2.5 kB message (an e-mail) are:<\/p>\n<p>(a) 50 ms and 40 ms<br \/>\n(b) 40 ms and 40 ms<br \/>\n(c) 50 ms and 0.02 ms<br \/>\n(d) 40 ms and 0.02 ms<\/p>\n<p>40. A bandwidth of 100 kHz spans 200 kHz to 300 kHz. If the data is modulated by using ASK with \ud835\udc51 = 1 and \ud835\udc5f = 1 the carrier frequency and bit rates are:<\/p>\n<p>(a) 110 kHz and 30kbps<br \/>\n(b) 100 kHz and 50kbps<br \/>\n(c) 110 kHz and 50kbps<br \/>\n(d) 100 kHz and 30kbps<\/p>\n<p>41. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps. If the system with all stations together produces 1000 frames\/s, the throughput is: (Assuming \ud835\udc46 = 0.135 (13.5%))<\/p>\n<p>(a) 135 frames<br \/>\n(b) 140 frames<br \/>\n(c) 145 frames<br \/>\n(d) 150 frames<\/p>\n<p>42. A network using CSMA\/CD has a bandwidth of 10 Mbps. If the maximum propagation time including the delays in the devices and ignoring the time needed to send a jamming signal is 25.6 \ud835\udf07s, the minimum size of the frame is:<\/p>\n<p>(a) 256 bits<br \/>\n(b) 1024 bits<br \/>\n(c) 128 bits<br \/>\n(d) 512 bits<\/p>\n<p>43. The data rate of an STS-1 signal is:<\/p>\n<p>(a) 155.52 Mbps<br \/>\n(b) 51.84 Mbps<br \/>\n(c) 100 Mbps<br \/>\n(d) 150 Mbps<\/p>\n<p>44. In an IPv4 packet, the value of HLEN is (1000)<sub>2<\/sub>. The number of bytes of options carried by the packet is:<\/p>\n<p>(a) 08 bytes<br \/>\n(b) 16 bytes<br \/>\n(c) 02 bytes<br \/>\n(d) 12 bytes<\/p>\n<p>45. In a stop-and-Wait system, the bandwidth of the line is 1 Mbps, 1 bit takes 20 ms to make a round trip and the system data packets are 1000 bits in length. The bandwidth-delay product and the utilization of the link are:<\/p>\n<p>(a) 10,000 bits and 5 %<br \/>\n(b) 20,000 bits and 10 %<br \/>\n(c) 10,000 bits and 10 %<br \/>\n(d) 20,000 bits and 5 %<\/p>\n<p>46. The frequency \ud835\udc53 , peak-voltage amplitude \ud835\udc49 and phase \ud835\udf03 for the voltage waveform, \ud835\udc63(\ud835\udc61) = 6 sin(2\ud835\udf0b 10,000 \ud835\udc61 + 30) are:<\/p>\n<p>(a) 20 kHz, 6 volts and 45\u00b0<br \/>\n(b) 10 kHz, 6 volts and 30\u00b0<br \/>\n(c) 20 kHz, 3 volts and 30\u00b0<br \/>\n(d) 10 kHz, 3 volts and 45\u00b0<\/p>\n<p>47. For a binary FSK signal with mark frequency of 49 kHz, space frequency of 51 kHz and an input bit rate of 2 kbps, the peak frequency deviation \u2206\ud835\udc53, the minimum bandwidth \ud835\udc35 and the baud, are:<\/p>\n<p>(a) 3 kHz, 9 kHz and 1000<br \/>\n(b) 3 kHz, 9 kHz and 2000<br \/>\n(c) 1 kHz, 6 kHz and 2000<br \/>\n(d) 1 kHz, 6 kHz and 1000<\/p>\n<p>48. What is the length of an ICMP data field for an Ethernet frame that is carrying an IP datagram with a 20 byte header, an ICMP message with a header length of 8 bytes and the Ethernet data field is 480 bytes long?<\/p>\n<p>(a) 452 bytes<br \/>\n(b) 480 bytes<br \/>\n(c) 256 bytes<br \/>\n(d) 280 bytes<\/p>\n<p>49. For a single-channel PCM system with sample rate \ud835\udc53<sub>\ud835\udc60<\/sub> = 6000 samples per second and 7 bit compressed PCM code, the line speed is:<\/p>\n<p>(a) 42,000 bps<br \/>\n(b) 32,000 bps<br \/>\n(c) 22,000 bps<br \/>\n(d) 12,000 bps<\/p>\n<p>50. For an UART receiving data at 1000 bps (\ud835\udc53<sub>\ud835\udc4f<\/sub> ) with a receiver clock 16 times faster than the incoming data, the bit time, the receive clock rate and the maximum detection error are:<\/p>\n<p>(a) 1 \ud835\udc5as, 8 kHz and 62.5 \ud835\udf07s<br \/>\n(b) 3 \ud835\udc5as, 8 kHz and 66.5 \ud835\udf07s<br \/>\n(c) 1 \ud835\udc5as, 16 kHz and 62.5 \ud835\udf07s<br \/>\n(d) 3 \ud835\udc5as, 16 kHz and 66.5 \ud835\udf07s<\/p>\n<p>51. Which one of the following is used in banks, business and networks all over the world for security aspects?<\/p>\n<p>(a) AES<br \/>\n(b) DES<br \/>\n(c) RSA<br \/>\n(d) NIST<\/p>\n<p>52. IDEA stands for:<\/p>\n<p>(a) Information Digital Encryption Agency<br \/>\n(b) International Digital Encryption Algorithm<br \/>\n(c) Information Data Encryption Agency<br \/>\n(d) International Data Encryption Algorithm<\/p>\n<p>53. Pretty Good Privacy (PGP) is a cryptosystem intended for use of:<\/p>\n<p>(a) Voice security<br \/>\n(b) E-mail security<br \/>\n(c) Internet security<br \/>\n(d) Bank security<\/p>\n<p>54. Microsoft cryptographic providers support three hash algorithms are:<\/p>\n<p>(a) MD<sub>2<\/sub>, MD<sub>3<\/sub>\u00a0and secure Hash Algorithm (SHA)<br \/>\n(b) MD<sub>4<\/sub>, MD<sub>5<\/sub> and secure Hash Algorithm (SHA)<br \/>\n(c) MD<sub>1<\/sub>, MD<sub>2 <\/sub>and secure Hash Algorithm (SHA)<br \/>\n(d) MD<sub>3<\/sub>, MD<sub>4 <\/sub>and secure Hash Algorithm (SHA)<\/p>\n<p>55. S\/MIME stands for:<\/p>\n<p>(a) Secure Mobile Internet Mail Extension<br \/>\n(b) Service Mobile Internet Multipurpose Extension<br \/>\n(c) System Multipurpose Internet Mobile Extension<br \/>\n(d) Secure Multipurpose Internet Mail Extension<\/p>\n<p>56. Biometric characteristics cannot be directly used as cryptographic key, because biometric images are:<\/p>\n<p>(a) Difficult to obtain<br \/>\n(b) Difficult to process<br \/>\n(c) Difficult to recognize<br \/>\n(d) Variable by nature<\/p>\n<p>57. The operations performed in AES algorithm for each round are:<\/p>\n<p>1. Substitute bytes<br \/>\n2. Shift columns<br \/>\n3. Mix rows<br \/>\n4. Add round key<\/p>\n<p>(a) 1 and 4 only<br \/>\n(b) 1 and 3 only<br \/>\n(c) 2 and 3 only<br \/>\n(d) 2 and 4 only<\/p>\n<p>58. A stream cipher is designed to operate:<\/p>\n<p>(a) On a block of plain text<br \/>\n(b) One bit or units larger than a byte at a time<br \/>\n(c) One that has a sequence of rounds<br \/>\n(d) One block of data at a time<\/p>\n<p>59. In the Cipher Block Chaining (CBC) mode, the input to the encryption algorithm is:<\/p>\n<p>(a) The each plain text block encoded using same key<br \/>\n(b) The each plain text block encoded using different key<br \/>\n(c) The XOR of the current plain text block and the preceding cipher text block, same key used for each block<br \/>\n(d) The XOR of the current plain text block and the preceding cipher text block, different key used for each block<\/p>\n<p>60. Message Authentification Code (MAC) is:<\/p>\n<p>(a) Accepting a variable size message \ud835\udc40\ud835\udc40 as input and producing a fixed size message digest \ud835\udc3b\ud835\udc3b(\ud835\udc40\ud835\udc40) as output<br \/>\n(b) Using a secret key to generate a small block of data<br \/>\n(c) The statistical structure of the plain text dissipated into long range statistics of the cipher text<br \/>\n(d) A technique in which chosen plain texts with particular XOR difference pattern are encrypted<\/p>\n<p>61. The principal attraction of Elliptical Curve Cryptography is (ECC):<\/p>\n<p>(a) Reducing processing time<br \/>\n(b) A smaller bit size reducing processing overhead<br \/>\n(c) Reducing computation<br \/>\n(d) Increasing security<\/p>\n<p>62. An information security policy provides rules for the protection of:<\/p>\n<p>(a) Internet security<br \/>\n(b) Information assets of an organization<br \/>\n(c) E-mail security<br \/>\n(d) Voice security<\/p>\n<p>63. Design, selection and implementation of all security program elements including policy and risk measurement programs, education and training programs, technological controls and maintenance of the security program is referred as:<\/p>\n<p>(a) Security Blueprint<br \/>\n(b) Security Framework<br \/>\n(c) Security Policy<br \/>\n(d) Security Management<\/p>\n<p>64. Firewalls can be characterized by:<\/p>\n<p>(a) Processing mode, development era and structure<br \/>\n(b) Packet filtering and application gateways<br \/>\n(c) Trusted network and structure<br \/>\n(d) Processing mode and Packet filtering<\/p>\n<p>65. Intrusion Detection and Prevention Systems (IDPS) are:<\/p>\n<p>(a) Host based systems only<br \/>\n(b) Network based systems only<br \/>\n(c) Network based systems or Host based systems<br \/>\n(d) Special security systems<\/p>\n<p>66. Which one of the following statements is correct?<\/p>\n<p>The Company is getting rid of:<\/p>\n<p>(a) Damp squib and retaining only productive workers<br \/>\n(b) Guinea-pig and retaining only productive workers<br \/>\n(c) Warts and all and retaining only productive workers<br \/>\n(d) Dead wood and retaining only productive workers<\/p>\n<p>67. The channel of communication in Science and Technology has which of the following elements?<\/p>\n<p>1. Hearing<br \/>\n2. Touching<br \/>\n3. Tasting<br \/>\n4. Knowledge<\/p>\n<p>(a) 1, 2 and 3 only<br \/>\n(b) 1, 2 and 4 only<br \/>\n(c) 1, 3 and 4 only<br \/>\n(d) 2, 3 and 4 only<\/p>\n<p>68. Which one of the following is the correct meaning of \u2018<strong>Serried<\/strong>\u2019 ?<\/p>\n<p>(a) Notched<br \/>\n(b) Scattered<br \/>\n(c) Pursed<br \/>\n(d) Packed together<\/p>\n<p>69. Which one of the following statement is grammatically correct with usage of words?<\/p>\n<p>(a) My aunt bereaved Rs. 5,00,000 in her will to cancer research<br \/>\n(b) If I remember rightly she had two brothers, both older than her<br \/>\n(c) If you want information about the publisher of this book, you can accede their website<br \/>\n(d) Eating all those Peanuts has attacked my appetite<\/p>\n<p>70. Which one of the following is the opposite meaning of \u2018<strong>Braggart<\/strong>\u2019 ?<\/p>\n<p>(a) Modest<br \/>\n(b) Harangue<br \/>\n(c) Adept<br \/>\n(d) Competent<\/p>\n<p>71. \u2018Tinu is happy <strong>because<\/strong> she scored good marks\u2019. The word \u2018<strong>because<\/strong>\u2019 is:<\/p>\n<p>(a) Interjection<br \/>\n(b) Preposition<br \/>\n(c) Conjunction<br \/>\n(d) Adjective<\/p>\n<p>72. Which one of the following word is correctly spelt?<\/p>\n<p>(a) Ubiquitous<br \/>\n(b) Unasailable<br \/>\n(c) Unanimus<br \/>\n(d) Unenyviable<\/p>\n<p>73. \u2018After the <em><span style=\"text-decoration: underline;\"><strong>approbation<\/strong><\/span> <\/em>by the council, the due procedure would come into play\u2019. Which one of the following correctly sums up the underlined expression?<\/p>\n<p>(a) Proper hearing<br \/>\n(b) Negotiation<br \/>\n(c) Approval<br \/>\n(d) Settlement<\/p>\n<p>74. \u2018He is <span style=\"text-decoration: underline;\"><em><strong>loquacious<\/strong><\/em><\/span>. So people avoid him\u2019. Which one of the following correctly defines the underlined word?<\/p>\n<p>(a) One who hates mankind<br \/>\n(b) One who loves women<br \/>\n(c) One who loves to talk<br \/>\n(d) One who hates to love<\/p>\n<p>75. \u2018It appears that we are going to win\u2019. Which one of the following is the appropriate question tag that should follow the sentence?<\/p>\n<p>(a) Doesn\u2019t it?<br \/>\n(b) Don\u2019t we?<br \/>\n(c) Do we?<br \/>\n(d) Doesn\u2019t we?<\/p>\n<p>76. The judge ordered him to restrain \u2018to\u2019 entering the premises of his office. Which one of the following will improve the sentence?<\/p>\n<p>(a) Off<br \/>\n(b) Of<br \/>\n(c) With<br \/>\n(d) From<\/p>\n<p>77. Consider the following sentences:<\/p>\n<p>1. The introduction to the U.N. Charter expresses<br \/>\n2. Whose Governments joined together to form the U.N.<br \/>\n3. In one long sentence<br \/>\n4. The ideas and common aims of all the people<\/p>\n<p>What is the correct sequence?<\/p>\n<p>(a) 3, 4, 1 and 2<br \/>\n(b) 2, 1, 4 and 3<br \/>\n(c) 3, 1, 4 and 2<br \/>\n(d) 2, 4, 1 and 3<\/p>\n<p>78. Consider the following sentences:<\/p>\n<p>1. The people will make him king<br \/>\n2. Promises should be kept<br \/>\n3. I am sometimes vexed at his behaviour<br \/>\n4. The audience loudly cheered the Mayor\u2019s speech<\/p>\n<p>Which of the above sentences are in Active Voice?<\/p>\n<p>(a) 1 and 3 only<br \/>\n(b) 1 and 4 only<br \/>\n(c) 2 and 3 only<br \/>\n(d) 2 and 4 only<\/p>\n<p>79. The information about the conceptual, external and physical schema is stored in:<\/p>\n<p>(a) System catalogs<br \/>\n(b) System files<br \/>\n(c) File allocation tables<br \/>\n(d) Configuration systems<\/p>\n<p>80. In Entity-Relationship (ER) model, an Aggregation allows to indicate:<\/p>\n<p>(a) A relationship set to participate in another relationship set<br \/>\n(b) The monitor\u2019s relationship set<br \/>\n(c) A weak entity set<br \/>\n(d) The owner of the entity<\/p>\n<p>81. A candidate key for the relation in a Database Management System can be defined as:<\/p>\n<p>(a) The subset of the set of fields in a key which is a unique identifier for a tuple<br \/>\n(b) A set of fields that uniquely identifies a tuple according to the key constant<br \/>\n(c) Two tuples which have identical values in all the fields<br \/>\n(d) A field of relation is a unique identifier for a tuple<\/p>\n<p>82. The conceptual schema is the collection of schemes of the relations stored in:<\/p>\n<p>(a) Tables<br \/>\n(b) Database<br \/>\n(c) Decision tree<br \/>\n(d) Files<\/p>\n<p>83. In Database Management System (DBMS) architecture, the buffer manager is the software layer which is responsible for:<\/p>\n<p>(a) Bringing pages from disk to the main memory<br \/>\n(b) Holding the slot of the page<br \/>\n(c) Transferring the pages to primary memory<br \/>\n(d) Sequencing the pages<\/p>\n<p>84. A data structure that organizes the data records on a disk to optimize certain kinds of retrieval operations is known as:<\/p>\n<p>(a) Decision tree<br \/>\n(b) Indexing<br \/>\n(c) File allocation tables<br \/>\n(d) Records<\/p>\n<p>85. Which of the following operation is\/are used in the equality operators to join the two relations?<\/p>\n<p>1. Normal join<br \/>\n2. Equijoin<\/p>\n<p>(a) 1 only<br \/>\n(b) 2 only<br \/>\n(c) Both 1 and 2<br \/>\n(d) Neither 1 nor 2<\/p>\n<p>86. The query optimization in Database Management System (DBMS) is responsible for identifying:<\/p>\n<p>(a) An efficient execution plan with the least estimated cost<br \/>\n(b) The tuples and fields<br \/>\n(c) The number of records present in database<br \/>\n(d) The non-relationship of the database<\/p>\n<p>87. Which of the following rules is\/are associated with Armstrong\u2019s Axioms for finding the functional dependency(<em>FD<\/em>)?<\/p>\n<p>1. Reflexivity<br \/>\n2. Augmentation<br \/>\n3. Transitivity<\/p>\n<p>(a) 1, 2 and 3<br \/>\n(b) 1 only<br \/>\n(c) 2 only<br \/>\n(d) 3 only<\/p>\n<p>88. Fourth Normal Form (4\ud835\udc41<em>F<\/em>) is designed to cope up with:<\/p>\n<p>(a) Multivalued dependency<br \/>\n(b) Join dependency<br \/>\n(c) Transitive dependency<br \/>\n(d) Both Join and Transitive dependency<\/p>\n<p>89. Information warfare must be dealt with:<\/p>\n<p>(a) Continuously because the potential damage or disruption is so high<br \/>\n(b) Immediately because the potential damage or disruption is so high<br \/>\n(c) Ahead of time because the potential damage or disruption is so high<br \/>\n(d) Diplomatically because the potential damage or disruption is so high<\/p>\n<p>90. While national power grid may be necessary for transmitting huge blocks of power from one region to the other, which one of the following systems would still be required to serve the large number of villages and isolated communities?<\/p>\n<p>(a) Grid connected stand alone<br \/>\n(b) Non- grid connected stand alone<br \/>\n(c) Grid connected service<br \/>\n(d) Non-grid connected service<\/p>\n<p>91. Energy Audit to be made compulsory for industries so that it helps to focus the essential requirements of energy:<\/p>\n<p>(a) Consumption<br \/>\n(b) Conservation<br \/>\n(c) Cost<br \/>\n(d) Generation<\/p>\n<p>92. Which one of the following type of freezing is preferred so that temperatures are rapidly lowered to 0\u00b0\ud835\udc39 (\u221218\u00b0\ud835\udc36) for keeping the ice crystals small, so that upon defrosting, the food is not mushy?<\/p>\n<p>(a) Deep<br \/>\n(b) Slow<br \/>\n(c) Quick<br \/>\n(d) Blast<\/p>\n<p>93. With which one of the following technology, a single disc format is used for computer data, video and audio?<\/p>\n<p>(a) Digital Audio Tape (DAT)<br \/>\n(b) Video Tape (VT)<br \/>\n(c) Compact Disc (CD)<br \/>\n(d) Digital video Disc (DVD)<\/p>\n<p>94. Carbon dioxide lasers do not penetrate into the surfaces; they are used for which one of the following tumors in body sites where underlying structures would otherwise be in danger of damage?<\/p>\n<p>(a) Cutting<br \/>\n(b) Vaporizing<br \/>\n(c) Liquidifying<br \/>\n(d) Crystallizing<\/p>\n<p>95. A method that can be used to transfer information in a manner that violates the system\u2019s security policy is:<\/p>\n<p>(a) Secrete channels<br \/>\n(b) Carrier channels<br \/>\n(c) Co-channels<br \/>\n(d) Covert channels<\/p>\n<p>96. Which one of the following Operating Systems (OS) is the process of security configuring a system to protect it against malicious users and software, but also making the system more reliable?<\/p>\n<p>(a) Design Operating Systems<br \/>\n(b) Security Operating Systems<br \/>\n(c) Hardening Operating Systems<br \/>\n(d) Protocol Operating Systems<\/p>\n<p>97. Which one of the following is the use of specialized techniques for recovery,<br \/>\nAuthentification and analysis of electronic data when a case involves issues relating to reconstruction of computer usage?<\/p>\n<p>(a) Computer Analysis<br \/>\n(b) Image Processing<br \/>\n(c) Wire Trapping<br \/>\n(d) Computer Forensics<\/p>\n<p>98. Which one of the following modes has revolutionized the informational use of crime data?<\/p>\n<p>(a) Digital Imaging<br \/>\n(b) Digital Processing<br \/>\n(c) Data Mining (DM)<br \/>\n(d) Digital Analysis<\/p>\n<p>99. Artificial Intelligence (AI) is the construction of artificial brains &#8211; electronic system:<\/p>\n<p>(a) That replicates the exact functioning of biological neurons, their arrangement and interaction with the brain<br \/>\n(b) Construction of electronic system similar to the human brain<br \/>\n(c) That reacts with interaction with the brain<br \/>\n(d) Similar to brain without interaction with the brain<\/p>\n<p>100. The hydrogen atom is unusual in:<\/p>\n<p>(a) One proton, one neutron and no electron<br \/>\n(b) Not having any neutron<br \/>\n(c) One electron, one neutron and no proton<br \/>\n(d) Only electron, no proton and no neutron<\/p>\n<h2>UPSC DCIO Answer Key 2018:<\/h2>\n<h3><span style=\"color: #ff0000;\">UPSC DCIO Answer Key for CBRT held on 21<sup>st<\/sup> January 2018 AN (2-4) PM:<\/span><\/h3>\n<h4>General Aptitude Test:<\/h4>\n<h5>DCIO Wireless Telegraphy Engineering:<\/h5>\n<p><strong>Max Marks: 300<\/strong><\/p>\n<p><strong>Items Dropped: 01<\/strong><\/p>\n<p><strong>Items for Scoring: 99<\/strong><\/p>\n<div class=\"table\">\n<table>\n<tbody>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>16<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>31<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>46<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>61<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>76<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>91<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>17<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><del><strong>32<\/strong><\/del><\/td>\n<td><del><strong>X<\/strong><\/del><\/td>\n<td><strong>47<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>62<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>77<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>92<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>18<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>33<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>48<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>63<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>78<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>93<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>4<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>19<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>34<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>49<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>64<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>79<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>94<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>5<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>20<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>35<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>50<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>65<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>80<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>95<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>6<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>21<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>36<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>51<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>66<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>81<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>96<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>7<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>22<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>37<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>52<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>67<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>82<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>97<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>8<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>23<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>38<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>53<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>68<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>83<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>98<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>9<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>24<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>39<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>54<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>69<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>84<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>99<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>10<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>25<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>40<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>55<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>70<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>85<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>100<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>11<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>26<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>41<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>56<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>71<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>86<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><strong>12<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>27<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>42<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>57<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>72<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>87<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><strong>13<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>28<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>43<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>58<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><strong>73<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>88<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><strong>14<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>29<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>44<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>59<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>74<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>89<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><strong>15<\/strong><\/td>\n<td><strong>C<\/strong><\/td>\n<td><strong>30<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>45<\/strong><\/td>\n<td><strong>D<\/strong><\/td>\n<td><strong>60<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>75<\/strong><\/td>\n<td><strong>A<\/strong><\/td>\n<td><strong>90<\/strong><\/td>\n<td><strong>B<\/strong><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h4>Important Links of UPSC DCIO Previous Question Paper, Answer Key 2018:<\/h4>\n<p><span style=\"color: #ff0000;\">Note:- Some symbols in above Questions are not supported in Mobile browsers making the questions incomplete, So candidates shall make use of below official PDFs to avoid any confusions.<\/span><\/p>\n<div class=\"table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Official UPSC DCIO Previous Question Paper 2018 PDF<\/strong><\/td>\n<td><a href=\"https:\/\/drive.google.com\/file\/d\/1Bc98Q2LiG_54Ho5TPaIQUCMHoSbLF1Se\/view\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Click here<\/strong><\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Official UPSC DCIO Answer Key 2018 PDF<\/strong><\/td>\n<td><a href=\"https:\/\/drive.google.com\/file\/d\/1nfu2xhG2m0Ke4gwAINOUJDp8FlAeGYIg\/view\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Click here<\/strong><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>UPSC DCIO Previous Year Question Paper &amp; Answer Key 2018: Union Public Service Commission has released previous year question paper with answer key for Deputy Central Intelligence Officer. We have collected the same and posted for easy reference of the candidates. So candidates can make use of this and prepare for their upcoming UPSC DCIO [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8009,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[120,156,28],"tags":[],"class_list":["post-8002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-question-paper","category-result"],"acf":[],"_links":{"self":[{"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/posts\/8002"}],"collection":[{"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/comments?post=8002"}],"version-history":[{"count":0,"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/posts\/8002\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/media\/8009"}],"wp:attachment":[{"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/media?parent=8002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/categories?post=8002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/affairscloud.com\/jobs\/wp-json\/wp\/v2\/tags?post=8002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}