Dear readers,
This quiz consists of questions from
various Banking entrance exams held during the last few years. Leave your
answers/ responses in the comments section below and we’ll soon let you know
the correct answers!
Directions
(Q. 1-10)
1.
A passive threat to computer security is ________.
(A) Malicious Intent
(B) Sabotage
(C) Accidental Errors
(D) Espionage Agents
2.
The Secure Electronic Transaction (SET) specification __________?
(A) is a notice, issued and verified by a
certificate authority, that guarantees a user or Web site is legitimate
(B) provides private-key encryption of all
data that passes between a client and a server
(C) allows users to choose an encryption
scheme for the data that passes between a client and a server
(D) uses a public-key encryption to secure
credit-card transaction systems
3.
_________ allows wireless mobile devices to access the Internet and its
services such as the Web and e-mail.
(A) TCP/IP
(B) Ethernet
(C) WAP
(D) Token ring
4.
‘DOS’ floppy disk does not have _________.
(A) A Boot Record
(B) A File Allocation Table
(C) A Root Directory
(D) BIOS
5.
‘MICR’ technology used for clearance of cheques by banks refers to _______.
(A) Magnetic Ink Character Recognition
(B) Magnetic Intelligence Character
Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition
6.
All the information collected during database development is stored in a
_______.
(A) repository
(B) data warehouse
(C) RAD
(D) CASE
7.
The _________ component is used by the data analyst to create the queries that
access the database.
(A) data extraction
(B) end-user query tool
(C) end-user presentation tool
(D) data store
8.
A (n) __________ allows network users to
share a single copy of software, which resides on the network server.
(A) single-user license agreement
(B) network site license
(C) end-user license agreement
(D) business software license
9.
A polymorphic virus _________.
(A) modifies its program code each time it
attaches itself to another program or file
(B) is a malicious-logic program that
copies itself repeatedly in memory or on a disk drive until no memory or disk
space remains
(C) a malicious-logic program that hides
within or looks like a legitimate program
(D) infects a program file, but still
reports the size and creation date of the original, uninfected program
10.
Microwave transmission is used in environments where installing physical
transmission media is _________ .
(A) difficult or impossible and where
line-of-sight transmission is unavailable
(B) easy or promising and where
line-of-sight transmission is unavailable
(C) difficult or impossible and where
line-of-sight transmission is available
(D) easy or promising and where
line-of-sight transmission is available
`
To follow our
Banking portal on Facebook and Twitter, click on the following links:
Bank PO:
Facebook: https://www.facebook.com/pagalguybankpo
Twitter: https://twitter.com/PaGaLGuYBankPO
Answers
1(a) 2(d) 3(c)
4(d) 5(a) 6(a)
7(b) 8(b) 9(a)
10(c)