Sarkari Exam Study is for SSC exams , railway exams , bank exams , IAS & PCS exam , State exams

Tuesday, March 27, 2018

Professional Knowledge Quiz for IBPS SO IT Officer 2017 Exam



Professional Knowledge Quiz for IBPS SO IT Officer 2017 Exam

Image result for it officer

Q1. Which of the following topologies provides a highly fault-tolerant architecture?
(a) Star
(b) Bus
(c) Ring
(d) Mesh
(e) Tree

Q2. Which of the following statements is incorrect for TELNET?
(a) It is an application layer protocol.
(b) It does not provide security on its own.
(c) It provides encryption feature.
(d) It provides bidirectional text-oriented communication
(e) None of these

Q3. Which of the following techniques is used by unethical hackers to certify fake data over the data over the Internet for stealing confidential information?
(a) Phishing
(b) Spear Phishing
(c) Logic Bomb
(d) Spoofing
(e) Cracking

Q4._______ ensures secure transfer of data over an unsecured network, such as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking
(d) Spoofing
(e) Cryptography

Q5. Which of the following is/are the benefits of subnetting?
(a) Preservation of address space
(b) Reduced network traffic
(c) Better security
(d) Enhanced performance
(e) All of these

Q6. Which of the following techniques minimizes the interference between wireless devices?
(a) FCS
(b) RTFS
(c) HCFS
(d) FSSH
(e) FHSS

Q7. Software that gathers confidential information of a person without his or her permission and sends that information to another person is called?
(a) Antivirus
(b) Spyware
(c) Spam
(d) Trojan Horse
(e) Adware

Q8.Which of the following models does the working of Bluetooth devices depend?
(a) Client/Server
(b) LAN
(c) Master/Slave
(d) Analog/Digital
(e) None of these

Q9. How many IP addresses would be there in a block containing the mask /28?
(a) 16
(b) 32
(c) 64
(d) 128
(e) 256

Q10. Which protocol does ping, the computer network administration software utility use?
(a) TCP
(b) ARP
(c) Telnet
(d) ICMP


(e) BootIP

Solutions
S1. Ans.(d)
Sol. A mesh topology provides a fault tolerant architecture as it has several access routes for each computer in the network

S2. Ans.(c)
Sol. Telnet is an application layer protocol used for providing a bidirectional text-oriented communications through a virtual terminal connection. It allows users on a remote client machine to access the resources of another machine (TELNET server). Telnet does not provide any security or encryption.

S3. Ans.(d)
Sol. The main purpose is to trick the user into releasing sensitive information in order to gain access to one's bank account, computer system or to steal personal information, such as passwords.

S4. Ans.(e)
Sol. The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text.

S5. Ans.(e)
Sol. A sub network or subnet is a logical subdivision of an IP network. The practice of dividing a network into multiple subnetworks is called subnetting.

S6. Ans.(e)
Sol. In telecommunication, a hop is a portion of a signal's journey from source to receiver. Examples include: The excursion of a radio wave from the Earth to the ionosphere and back to the Earth. The number of hops indicates the number of reflections from the ionosphere.

S7. Ans.(b)
Sol. Spyware is a type of malicious software installed on a user's computer to monitor and gather information about his or her activities on that computer. The information is sent to the creator of the spyware.

S8. Ans.(c)
Sol. Master/slave is a model of communication where one device or process has unidirectional control over one or more other devices. In some systems a master is selected from a group of eligible devices, with the other devices acting in the role of slaves.

S9. Ans.(a)
Sol. The number of addresses in a block can be found by using the formula 232-nwhere n represents the mask.

S10. Ans.(d)
Sol. Ping is a diagnostic that checks if your computer is connected to a serve. The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite.

No comments:

Post a Comment