Wednesday 20 February 2013

professional knowledge Practice Questions for IBPS Specialist IT Set- 5

professional knowledge questions for IBPS Specialist IT Officer

1. Which department people can best help in auditing?

[A] ERP

[B] EDP

[C] Finance

[D] Higher Mnagement

[E] None of these

(Ans):B

 

2. Which is not manual technique for computer assisted audit technique?

[A] Interviews

[B] Code Reviews

[C] Questionnaires

[D] Control Flow Chart

[E] None of these

(Ans):B

 

3. Which of the following is not a common standard for service level management?

[A] IEC2000

[B] ISO9000

[C] ISO2000

[D] COBIT

[E] None of these

(Ans):D

 

4. Which of the following BEST describes ‘Partner’in the phrase’’People, Processes, Products and Partners’’?

[A] Suppliers, manufactures and vendors

[B] Custemors

[C] Enternal department

[D] The facilities management function

[E] None of these

(Ans):A

 

5. Which is the most important of SLM?

[A] Custemer service

[B] Custemer satisfaction

[C] 24*7 IT support

[D] Meeting the SLAs

[E] None of these

(Ans):B

 

6. Of the following which is not part of service lavel manegement?

(1)Service level recritement

[B] Service desk

[C] Service catalog

[D] Service improvement plan

[E] None of these

(Ans):B

 

7. What is the sub-process of capacity planning?

[A] Business capacity planning

[B] Service capacity planning

[C] Resource capacity planning

[D] All of these

[E] None of these

(Ans):D

 

8. Which of the following is not a part of Financial Mangement for IT Services?

[A] Charging

[B] Budgeting

[C] Accounting

[D] Procurement

[E] None of these

(Ans):D

 

9. Understanding customer usage of services and how this varies over time is part of which process?

[A] Service protofolio Management

[B] Service level management

[C] Component capacity management

[D] Demand management

[E] None of these

(Ans):D

 

. 10. Which is not a charectaristics of a process?

[A] Process is always measurable

[B] Process always delivers specific results

[C] Process always responds to specific events

[D] Process always is necessary

[E] None of these

(Ans):D

 

11. What does a service always deliver to customer?

[A] Application

[B] Infrastructure

[C] Value

[D] Resouces

[E] None of these

(Ans):C

 

12. Who owns the specific costs and risks assosiated with providing a service?

[A] The service provider

[B] The service level manger

[C] The customer

[D] Resources

[E] None of these

(Ans):A

 

13. ‘’Financial department needs higher security measures’’ is example for which SLA?

[A] Corporate level SLA

[B] Customer level SLA

[C] Service level SLA

[D] All of these

[E] None of these

(Ans):B

 

14. Which of the following activities is NOT a part of the Deming cycle?

[A] Act

[B] Plan

[C] D o

[D] Coordinate

[E] None of these

(Ans):D

 

15. ‘’E-mail services for a particular department needs encryption and secure backups’’ is example of:

[A] Corporate level SLA

[B] Customer level SLA

[C] Service level SLA

[D] All of these

[E] None of these

(Ans):C

 

16. Which stage of the service life cycle is MOST concerned with defining policies andobjectives?

[A] Service design

[B] Service transition

[C] Service startegy

[D] Service operation

[E] None of these

(Ans):C

 

17. Which of the following should a service catelog contain?

[A] The version information of all software

[B] The organizational structure of the company

[C] The customer

[D] Resources

[E] None of these

(Ans):D

 

18. Which of the following do service metrics measyres?

[A] Processes and functions

[B] Maturity and cost

[C] The end to end service

[D] Infrastructure avalibility

[E] None of these

(Ans):C

 

19. What are the key issues in choosing the measurement process?

[A] Accuracy

[B] Cost

[C] Visibility

[D] All of these

[E] None of these

(Ans):D

 

20. Which of these is critcal success for service level agreement?

[A] All services are met

[B] Users appreciate the costs of desired service levels

[C] Service perfomance measures are available

[D] All of the above

[E] None of these

(Ans):B

professional knowledge Practice Questions for IBPS Specialist IT set-4

Today Set 4 question producing here ,Just Practice and gain All the Best ..

professional knowledge questions for IBPS Specialist-IT

1. What type of attack do some firewalls try to limit by enforcing rules on how long a GET or POST request can be?

[A] Smurf

[B] Denial of service

[C] Buffer overflow

[D] LAND

[E] None of these

(Ans):-C

 

2. This is a documents that states in writing how a company plans to protect the company’s physical and IT assets:

[A] Data Encryption Standard

[B] Security Policy

[C] Public Key Certificate

[D] Access Control List

[E] Copyright

(Ans):-B

 

3. This is the process of determining whether someone or something os, in fact, who or what is declared to be?

[A] Conditional access

[B] Anonymizer

[C] Bypass

[D] User profile

[E] Authentication

(Ans):-E

 

4. This is an agreement a company may ask an employee to sign that specifies what is considered to be appropriate (or in appropriate) use of e-mail or web browsing?

[A] RSA

[B] AUP

[C] SET

[D] VPN

[E] None of these

(Ans):-B

 

5. Which are examples of IPS (Intrusion Protection system)?

[A] Solar Open Design Wall

[B] Grsecurity

[C] LOMAC

[D] All of the above

[E] None of these

(Ans):-D

 

6. Which of the following are methods of Network Security?

[A] VPN

[B] Encryption

[C] Honey pots

[D] Firewall

[E] All of the above

(Ans):-E

 

7. This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other network:

[A] Firewall

[B] Root kit

[C] Sandbox

[D] Password Cracker

[E] None of these

(Ans):-A

 

8. What happens if you digitally sign and inject footer on an e-mail message in the order?

[A] Nothing

[B] The message won’t be sent.

[C] The footer will invalidate the signature.

[D] The footer will be illegible.

[E] None of these

(Ans):-C

 

9. This is a class of programs that searches your hard drive and floppy disks for any known or potential virus:

[A] Intrusion Detection

[B] Security identifier

[C] Antigen

[D] Probe

[E] Antivirus software

(Ans):-E

 

10. The basic objective of Audit is:

[A] Safeguard and Assets

[B] Maintain Data Integrity

[C] Maintain Process Integrity

[D] Achieve the goals organization effectively

[E] None of these

(Ans):-E

 

11. Which is not true about Computer audit?

[A] Computer audit does not focus on process integrity.

[B] It throws much light on system effectiveness.

[C] Scope is limited to system and procedure being followed.

[D] Computer audit is carried done mostly around the computer.

[E] None of these

(Ans):-B

 

12. Which of them is not an input control type?

[A] Unintentional entry of wrong data

[B] Preparation of false input forms

[C] Intentional entry of fraudulent data

[D] Use of unauthorized Input forms

[E] Password secrecy

(Ans):-E

 

13. What best defines audit Trail?

[A] Trailing of audit process

[B] Chronological record of all events on system are maintained

[C] Chronological record of all events on system are not maintained

[D] Its maintenance of audit process

[E] None of these

(Ans):-B

 

14. Which of them forms a data items for audit trails?

[A] Unique identifier of source code

[B] Unique identifier of person

[C] Time and Date at which messages are dispatched

[D] Unique identifier for each node of network

[E] All the above

(Ans):-E

 

15. Which of them is not an approach for computer auditing?

[A] Audit around the computer

[B] Audit with computer

[C] Audit through the computer

[D] Audit on computer

[E] None of these

(Ans):-D

 

Feel Good Drop a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More