Site icon PaGaLGuY

Professional Knowledge Quiz for IBPS SO (I.T.)

Dear readers,

This quiz consists of questions from
various Banking entrance exams held during the last few years. Leave your
answers/ responses in the comments section below and we’ll soon let you know
the correct answers!

Directions
(Q. 1-10)

1.
A passive threat to computer security is ________.

(A) Malicious Intent

(B) Sabotage

(C) Accidental Errors

(D) Espionage Agents

2.
The Secure Electronic Transaction (SET) specification __________?

(A) is a notice, issued and verified by a
certificate authority, that guarantees a user or Web site is legitimate

(B) provides private-key encryption of all
data that passes between a client and a server

(C) allows users to choose an encryption
scheme for the data that passes between a client and a server

(D) uses a public-key encryption to secure
credit-card transaction systems

3.
_________ allows wireless mobile devices to access the Internet and its
services such as the Web and e-mail.

(A) TCP/IP

(B) Ethernet

(C) WAP

(D) Token ring

4.
‘DOS’ floppy disk does not have _________.

(A) A Boot Record

(B) A File Allocation Table

(C) A Root Directory

(D) BIOS

5.
‘MICR’ technology used for clearance of cheques by banks refers to _______.

(A) Magnetic Ink Character Recognition

(B) Magnetic Intelligence Character
Recognition

(C) Magnetic Information Cable Recognition

(D) Magnetic Insurance Cases Recognition

6.
All the information collected during database development is stored in a
_______.

(A) repository

(B) data warehouse

(C) RAD

(D) CASE

7.
The _________ component is used by the data analyst to create the queries that
access the database.

(A) data extraction

(B) end-user query tool

(C) end-user presentation tool

(D) data store

8.
A (n)  __________ allows network users to
share a single copy of software, which resides on the network server.

(A) single-user license agreement

(B) network site license

(C) end-user license agreement

(D) business software license

9.
A polymorphic virus _________.

(A) modifies its program code each time it
attaches itself to another program or file

(B) is a malicious-logic program that
copies itself repeatedly in memory or on a disk drive until no memory or disk
space remains

(C) a malicious-logic program that hides
within or looks like a legitimate program

(D) infects a program file, but still
reports the size and creation date of the original, uninfected program

10.
Microwave transmission is used in environments where installing physical
transmission media is _________ .

(A) difficult or impossible and where
line-of-sight transmission is unavailable

(B) easy or promising and where
line-of-sight transmission is unavailable

(C) difficult or impossible and where
line-of-sight transmission is available

(D) easy or promising and where
line-of-sight transmission is available

`

To follow our
Banking portal on Facebook and Twitter, click on the following links:

Bank PO:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO

Answers 

1(a)    2(d)    3(c)   
4(d)    5(a)      6(a)    
7(b)      8(b)     9(a)     
10(c)