IBPS/SBI Specialist IT Officer 2016-2017 – Professional Knowledge Quiz – Set 1



Hello and welcome to exampundit . Here is the first Set of IBPS/SBI Specialist IT Officer Professional Knowledge Quiz.

1. Which of the following is to be done the auditor while internet banking services audit ?
1) Tour the server room
2) The user is not allowed to login after defined repeated failed attempts
3) Contract clearly states the services that will be provided by the vendor
4) All of the above
5) None of these
2. ___________ can be one of the approach used to tax online transactions .
1) Permanent establishment 
2) Residence based
3) Income based classification 
4) All of the above
5) None of these
3. To stop unauthorized access to the computer systems we should :
1) Have a trust worthy system administrator 
2) Have a sound encryption policy
3) Have as good password policy 
4) All of the above
5) None of these
4. An attack on network will not bother to do :
1) Network Investigation 
2) Network Management
3) Access Gaining 
4) Escaping
5) None of these
5. Which of the following details do you think should be checked on security breaches?
1) Authorized access to system resources 
2) Un-authorized access to system
3) Un-authorized attempts to change security definitions
4) All of the above
5) None of these
6. The internet is an example of a:
1) Packet switched network 
2) Cell switched network
3) Circuit switched network 
4) All of the above
5) None of the above
7. Which of the following methods are NOT used by Kerberos to establish a secure connection between the client and the target server?
1) OCR 
2) Secret key
3) Password 
4) Al of these
5) None of these

Sponsored


(adsbygoogle = window.adsbygoogle || []).push({});

8. ____________ is the process of organizing data in tables with the object of elimination redundancy and inconsistent dependency.’
1) Data modeling 
2) Normalization
3) Data mining 
4) All of these
5) None of these
9. Which can be used for development for an application?
1) Data 
2) Human factor
3) Technology 
4) All of these
5) None of these
10. The security features of the application should be the time of
1) Programming phase 
2) Conceptual design
3) Testing phase 
4) All of these
5) None of these
11. Which of the following statements is ‘’FALSE’’ regarding selection of hardware / software?
1) Budget allocated for application is limited to hardware and software cost.
2) The application should be easy to use by programming rather than by the end user
3) The requirement for the application should be decided
4) All of these are false
5) None of these
12. A good data base should have
1) Financial stability of the vendor 
2) Scope for achieves
3) Provision for data integrity and system integrity 
4) All of the above
5) None of these
13. To check if data that is being entered does not have blanks, we have
1) A mathematically calculated check digit 
2) Control check to verify if the data is in accordance to predetermined criteria
3) Competeness check 
4) All of these
5) None of these
14. A detective control is used to check if correct numbers are keyed in
1) Sequence check 
2) Manual check
3) Check digits 
4) All of these
5) None of these
15. On August 23,2005, an accounting clerk prepared an invoice dated August 31,2005,
Which control can check this ?
1) Size check 
2) Hash total
3) Range check 
4) All of the above
5) None of these

Regards

Team ExamPundit