Tuesday, 19 February 2013

IBPS IT Specialist Officer professional knowledge Practice -3

1. Address Resolution Protocol (ARP) is used for: [A] Relating IP Address to Ethernet addresses [B] Preventing two computers from using the same IP address [C] Enables a workstation to know its IP address by broad casting its local address [D] All the above [E] None of these (Ans):-A   2. How many rollers are actually responsible for movement of the cursor in the mouse [A] 1 [B] 2 [C] 3 [D] Depends from mouse to mouse [E] None of these (Ans):-B   3. Which of there can have more than one value? [A] A composite attribute [B] A multi valued attribute [C] A Derived attribute [D] All the above [E] None of these (Ans):-A   4. Which of the following do you think is NOT true for SNMP? [A] It is connection...

IBPS IT Specialist Officer professional knowledge Practice-2

1. MICR devices can read: [A] Letters [B] Numbers [C] Both of these [D] All of these [E] None of these (Ans):-B   2. Auxiliary storage consists of [A] Magnetic tapes [B] CDs [C] Both of these [D] All of these [E] None of these (Ans):-A   3. Who can provides access rights to users? [A] Data custodian [B] Data owner [C] The data base administrator [D] Management [E] None of these (Ans):-C   4. Security policy of an organization need not have [A] The overall security philosophy of the organization [B] The authorization procedure for accessing data [C] Security awareness program [D] Highlights and identity of the sensitive security features [E] None of these (Ans):-D   5. In case of...

IBPS Specialist IT Officer professional knowledge practice-1

1. Which of the following is to be done the auditor while internet banking services audit ? [A] Tour the server room [B] The user is not allowed to login after defined repeated failed attempts [C] Contract clearly states the services that will be provided by the vendor [D] All of the above [E] None of these (Ans):-A   2. ___________ can be one of the approach used to tax online transactions . [A] Permanent establishment [B] Residence based [C] Income based classification [D] All of the above [E] None of these (Ans):-D   3. To stop unauthorized access to the computer systems we should : [A] Have a trust worthy system administrator [B] Have a sound encryption policy [C] Have as good password policy [D] All...

Twitter Delicious Facebook Digg Stumbleupon Favorites More