Dear readers,

This quiz consists of questions from
various Banking entrance exams held during the last few years. Leave your
answers/ responses in the comments section below and we’ll soon let you know
the correct answers!

Directions
(Q. 1-10)

1.
A passive threat to computer security is ________.

(A) Malicious Intent

(B) Sabotage

(C) Accidental Errors

(D) Espionage Agents

2.
The Secure Electronic Transaction (SET) specification __________?

(A) is a notice, issued and verified by a
certificate authority, that guarantees a user or Web site is legitimate

(B) provides private-key encryption of all
data that passes between a client and a server

(C) allows users to choose an encryption
scheme for the data that passes between a client and a server

(D) uses a public-key encryption to secure
credit-card transaction systems

3.
_________ allows wireless mobile devices to access the Internet and its
services such as the Web and e-mail.

(A) TCP/IP

(B) Ethernet

(C) WAP

(D) Token ring

4.
‘DOS’ floppy disk does not have _________.

(A) A Boot Record

(B) A File Allocation Table

(C) A Root Directory

(D) BIOS

5.
‘MICR’ technology used for clearance of cheques by banks refers to _______.

(A) Magnetic Ink Character Recognition

(B) Magnetic Intelligence Character
Recognition

(C) Magnetic Information Cable Recognition

(D) Magnetic Insurance Cases Recognition

6.
All the information collected during database development is stored in a
_______.

(A) repository

(B) data warehouse

(C) RAD

(D) CASE

7.
The _________ component is used by the data analyst to create the queries that
access the database.

(A) data extraction

(B) end-user query tool

(C) end-user presentation tool

(D) data store

8.
A (n)  __________ allows network users to
share a single copy of software, which resides on the network server.

(A) single-user license agreement

(B) network site license

(C) end-user license agreement

(D) business software license

9.
A polymorphic virus _________.

(A) modifies its program code each time it
attaches itself to another program or file

(B) is a malicious-logic program that
copies itself repeatedly in memory or on a disk drive until no memory or disk
space remains

(C) a malicious-logic program that hides
within or looks like a legitimate program

(D) infects a program file, but still
reports the size and creation date of the original, uninfected program

10.
Microwave transmission is used in environments where installing physical
transmission media is _________ .

(A) difficult or impossible and where
line-of-sight transmission is unavailable

(B) easy or promising and where
line-of-sight transmission is unavailable

(C) difficult or impossible and where
line-of-sight transmission is available

(D) easy or promising and where
line-of-sight transmission is available

`

To follow our
Banking portal on Facebook and Twitter, click on the following links:

Bank PO:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO

Answers 

1(a)    2(d)    3(c)   
4(d)    5(a)      6(a)    
7(b)      8(b)     9(a)     
10(c)    

Write Comment