IT Officer Professional knowledge Practice Material -I
1. What type of attack do some firewalls try to limit by
enforcing rules on how long a GET or POST request can be? [A] Smurf
[B] Denial of service [C] Buffer overflow [D] LAND [E] None of
these (Ans):-C 2. This is a documents that states in writing how a
company plans to protect the companys physical and IT assets: [A]
Data Encryption Standard [B] Security Policy [C] Public Key
Certificate [D] Access Control List [E] Copyright (Ans):-B 3. This
is the process of determining whether someone or something os, in
fact, who or what is declared to be? [A] Conditional access [B]
Anonymizer [C] Bypass [D] User profile [E] Authentication
(Ans):-E
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
1|Page
4. This is an agreement a company may ask an employee to sign
that specifies what is considered to be appropriate (or in
appropriate) use of e-mail or web browsing? [A] RSA [B] AUP [C] SET
[D] VPN [E] None of these (Ans):-B 5. Which are examples of IPS
(Intrusion Protection system)?
[A] Solar Open Design Wall [B] Grsecurity [C] LOMAC [D] All of
the above [E] None of these (Ans):-D
6. Which of the following are methods of Network Security? [A]
VPN [B] Encryption [C] Honey pots [D] Firewall [E] All of the above
(Ans):-E 7. This is a set of related programs, usually located at a
network gateway server, that protects the resources of a private
network from other network: [A] Firewall 2|Page
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
[B] Root kit [C] Sandbox [D] Password Cracker [E] None of these
(Ans):-A 8. What happens if you digitally sign and inject footer on
an e-mail message in the order? [A] Nothing [B] The message wont be
sent. [C] The footer will invalidate the signature. [D] The footer
will be illegible. [E] None of these (Ans):-C 9. This is a class of
programs that searches your hard drive and floppy disks for any
known or potential virus: [A] Intrusion Detection [B] Security
identifier [C] Antigen [D] Probe [E] Antivirus software (Ans):-E
10. The basic objective of Audit is: [A] Safeguard and Assets [B]
Maintain Data Integrity [C] Maintain Process Integrity [D] Achieve
the goals organization effectively [E] None of these 3|Page
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
(Ans):-E 11. Which is not true about Computer audit? [A]
Computer audit does not focus on process integrity. [B] It throws
much light on system effectiveness. [C] Scope is limited to system
and procedure being followed. [D] Computer audit is carried done
mostly around the computer. [E] None of these (Ans):-B 12. Which of
them is not an input control type? [A] Unintentional entry of wrong
data [B] Preparation of false input forms [C] Intentional entry of
fraudulent data [D] Use of unauthorized Input forms [E] Password
secrecy (Ans):-E 13. What best defines audit Trail? [A] Trailing of
audit process [B] Chronological record of all events on system are
maintained [C] Chronological record of all events on system are not
maintained [D] Its maintenance of audit process [E] None of these
(Ans):-B 14. Which of them forms a data items for audit trails? [A]
Unique identifier of source code [B] Unique identifier of
person
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
4|Page
[C] Time and Date at which messages are dispatched [D] Unique
identifier for each node of network [E] All the above (Ans):-E 15.
Which of them is not an approach for computer auditing? [A] Audit
around the computer [B] Audit with computer [C] Audit through the
computer [D] Audit on computer [E] None of these (Ans):-D 16.
Processing control procedures have [A] Authorization and
authentication of users [B] Access control for online data [C]
Reporting of before and after images [D] All of these [E] None of
these (Ans):-D 17. Which cannot assure data accuracy in an
application? [A] Control total [B] Limit and reasonableness test
[C] Echo checking [D] All of these [E] None of these (Ans):-C
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
5|Page
18. A computer works faster with [A] GUI [B] Mouse [C] Keyboard
[D] All of these [E] None of these (Ans):-C 19. SMTP protocol is
used for [A] Sending email messages between servers [B] Sits
between client server [C] Transmit news to all clients [D] All of
the above [E] None of these (Ans):-A 20. Which form of job
scheduling uses triggers? [A] Manual scheduling [B] Distributed
scheduling [C] Mainframe scheduling [D] Automated scheduling [E]
None of these (Ans):-C 21. MICR devices can read: [A] Letters [B]
Numbers [C] Both of these
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
6|Page
[D] All of these [E] None of these (Ans):-B 22. Auxiliary
storage consists of [A] Magnetic tapes [B] CDs [C] Both of these
[D] All of these [E] None of these (Ans):-A 23. Who can provides
access rights to users? [A] Data custodian [B] Data owner [C] The
data base administrator [D] Management [E] None of these
(Ans):-C
24. Security policy of an organization need not have [A] The
overall security philosophy of the organization [B] The
authorization procedure for accessing data [C] Security awareness
program [D] Highlights and identity of the sensitive security
features [E] None of these (Ans):-D
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
7|Page
25. In case of a virus getting into computer, which of the
following will help? [A] Encryption [B] NORTON [C] Police complaint
[D] All of these [E] None of these (Ans):-B 26. Which of the
following do you think is NOT necessary for computerization system
in a bank? [A] Effective customer service [B] Effective back office
integration [C] Focus on manual records [D] All of these [E] None
of these (Ans):-C 27. BCNF is needed because: [A] Otherwise tuples
may be duplicated [B] When a data is deleted tuples may be lost [C]
Updating is otherwise is difficult [D] When there is dependent
attributes in two possible composite keys one of the attribute is
unnecessarily duplicated in the tuples [E] None of these (Ans):-D
28. Which of the following is reliable service? [A] TCP 8|Page
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
[B] UDP [C] Both [A] & (2) [D] Either [A] nor (2) [E] None
of these (Ans):-A 29. Firewall is used in PC for [A] Security [B]
Authentication [C] Data transmission [D] All of these [E] None of
these (Ans):-A 30. A transmission in which receiver receives the
data simultaneously as it is relayed is called [A]
Video-conferencing [B] Online transmission [C] Real-time
transmission [D] Offline transmission [E] None of these (Ans):-C
31. A protocol is: [A] Service that helps in communicating [B]
Rules that help computer talk [C] Way of transmission data over the
net [D] All of these [E] None of these 9|Page
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
(Ans):-B 32. Which of the following are relational integrity
constraints? [A] Null value [B] Prim any key [C] Referential
integrity [D] All the above [E] None of these (Ans):-D
33. Which of the following do think is NOT to develop an
application for computer? [A] Feasibility study [B] Designing [C]
Testing [D] All the above [E] None of these (Ans):-D 34. Binary
equivalent to 87 is: [A] 1010111 [B] 1101111 [C] 1011111 [D]
10111111 [E] None of these (Ans):-A 35. In binary system the
highest value of an 8-bit number is [A] 255
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
10 | P a g e
[B] 256 [C] 253 [D] 259 [E] None of these (Ans):-A 36. Which of
them is true? [A] Data can be facts / figures / letters / words
symbols etc. that represent an idea or object [B] Data is raw
material from which information is derived. [C] Data is numbers,
alphabets [D] All the above [E] None of these (Ans):-A
37. Maximum storage space is available on [A] CDs [B] Floppies
[C] ROM [D] Hard disc [E] None of these (Ans):-D 38. ____________
deals with the restructuring of existing source code in reverse
engineering. [A] Abstraction [B] Completeness [C] Users screen 11 |
P a g e
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
[D] Directionality [E] None of these (Ans):-D 39. Which of the
following person should be made responsible for reporting
maintenance problems in a LAN? [A] Network administrator [B] Users
[C] Security officer [D] All the above [E] None of these (Ans):-B
40. Software change management decides: [A] How to manage
alternations, irrespective of the stage of the life cycle of a
product [B] Development stages working [C] Maintenance stages
working [D] All the above [E] None of these (Ans):-A 41. Address
Resolution Protocol (ARP) is used for: [A] Relating IP Address to
Ethernet addresses [B] Preventing two computers from using the same
IP address [C] Enables a workstation to know its IP address by
broad casting its local address [D] All the above [E] None of these
(Ans):-A 12 | P a g e
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
42. How many rollers are actually responsible for movement of
the cursor in the mouse [A] 1 [B] 2 [C] 3 [D] Depends from mouse to
mouse [E] None of these (Ans):-B 43. Which of there can have more
than one value? [A] A composite attribute [B] A multi valued
attribute [C] A Derived attribute [D] All the above [E] None of
these (Ans):-A 44. Which of the following do you think is NOT true
for SNMP? [A] It is connection less protocol [B] It guarantees data
transmission [C] It can accommodate devices from different vendors
[D] All the above [E] None of these (Ans):-C
45. What are the facilities offered by tele banking? [A] Balance
enquiries [B] Enquiries about the specific transaction
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
13 | P a g e
[C] Transfer of funds [D] All the above [E] None of these
(Ans):-C 46. Approval for software projects has to be done by [A]
The project head [B] The user department head [C] The senior
management [D] All the above [E] None of these (Ans):-C 47. The
base line for a software in term if software configuration
management [A] Point of latest release of the software [B] Point of
latest change of the software [C] Point of change approved in the
software and added to the project data base [D] All the above [E]
None of 1these (Ans):-C 48. The purpose of using computer in an
organization is _____________? [A] To produce image , texts,
reports etc. [B] To be able get on the internet [C] To process data
in to information [D] All the above [E] None of these (Ans):-C
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
14 | P a g e
49. Which of the following mandatory parts of complete PC
system? [A] Hardware and software [B] Input and Output [C] Keyboard
and Printer [D] All the above [E] None of these (Ans):-A 50. The
elements of computer processing system are [A] Hardware, software,
information &people [B] Hardware, programs, and people [C]
Hardware, Data, users, and procedures [D] All the above [E] None of
these (Ans):-C 51. Which of the following is to be done the auditor
while internet banking services audit ?
[A] Tour the server room [B] The user is not allowed to login
after defined repeated failed attempts [C] Contract clearly states
the services that will be provided by the vendor [D] All of the
above [E] None of these (Ans):-A 52. ___________ can be one of the
approach used to tax online transactions . [A] Permanent
establishment [B] Residence based
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
15 | P a g e
[C] Income based classification [D] All of the above [E] None of
these (Ans):-D 53. To stop unauthorized access to the computer
systems we should : [A] Have a trust worthy system administrator
[B] Have a sound encryption policy [C] Have as good password policy
[D] All of the above [E] None of these (Ans):-C
54. An attack on network will not bother to do : [A] Network
Investigation [B] Network Management [C] Access Gaining [D]
Escaping [E] None of these (Ans):- B
55.
Which of the following details do you think should be checked on
security breaches? [A] Authorized access to system resources
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
16 | P a g e
[B] Un-authorized access to system [C] Un-authorized attempts to
change security definitions [D] All of the above [E] None of these
(Ans):-D 5 6. The internet is an example of a: [A] Packet switched
network [B] Cell switched network [C] Circuit switched network [D]
All of the above [E] None of the above (Ans):-A 57. Which of the
following methods are NOT used by kerbaos to establish a secure
connection between the client and the target server? [A] OCR [B]
Secret key [C] Password [D] Al of these [E] None of these
(A(Ans):-C 58. ____________ is the process of organizing data in
tables with the object of elimination redundancy and inconsistent
dependency. [A] Data modeling [B] Normalization [C] Data mining [D]
All of these 17 | P a g e
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
[E] None of these (Ans):-B 59. Which can be used for development
for an application? [A] Data [B] Human factor [C] Technology [D]
All of these [E] None of these (Ans):-D 60. The security features
of the application should be the time of [A] Programming phase [B]
Conceptual design [C] Testing phase [D] All of these [E] None of
these (Ans):-B 61. Which of the following statements is FALSE
pegarding selection of hardware / software? [A] Budget allocated
for application is limited to hardware and software cost. [B] The
application should be easy to use by programming rather than by the
end user [C] The requirement for the application should be decided
[D] All of these are false [E] None of these (Ans):-B 62. A good
data base should have [A] Financial stability of the vendor
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
18 | P a g e
[B] Scope for achieves [C] Provision for data integrity and
system integrity [D] All of the above [E] None of these
(Ans):-D
63. To check if data that is being entered does not have blanks,
we have [A] A mathematically calculated check digit [B] Control
check to verify if the data is in accordance to pre-determined
criteria [C] Completeness check [D] All of these [E] None of these
(Ans):-C 64. A detective control is used to check if correct
numbers are keyed in [A] Sequence check [B] Manual check [C] Check
digits [D] All of these [E] None of these ns):-C 65. On August
23,2005, an accounting clerk prepared an invoice dated August
31,2005, Which control can check this ? [A] Size check [B] Hash
total [C] Range check [D] All of the above 19 | P a g e
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
[E] None of these (Ans):-C
66. Which department people can best help in auditing? [A] ERP
[B] EDP [C] Finance [D] Higher Management [E] None of these
(Ans):B
67. Which is not manual technique for computer assisted audit
technique? [A] Interviews [B] Code Reviews [C] Questionnaires [D]
Control Flow Chart [E] None of these (Ans):B
68. Which of the following is not a common standard for service
level management? [A] IEC2000 [B] ISO9000 [C] ISO2000 [D] COBIT [E]
None of these
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
20 | P a g e
(Ans):D
69. Which of the following BEST describes Partnerin the
phrasePeople, Processes, Products and Partners? [A] Suppliers,
manufactures and vendors [B] Custemors [C] Enternal department [D]
The facilities management function [E] None of these (Ans):A
70. Which is the most important of SLM? [A] Customer service [B]
Customer satisfaction [C] 24*7 IT support [D] Meeting the SLAs [E]
None of these (Ans):B
71. Of the following which is not part of service level
management? (1)Service level recruitment [B] Service desk [C]
Service catalog [D] Service improvement plan [E] None of these
(Ans):B 21 | P a g e
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
72. What is the sub-process of capacity planning? [A] Business
capacity planning [B] Service capacity planning [C] Resource
capacity planning [D] All of these [E] None of these (Ans):D
73. Which of the following is not a part of Financial Management
for IT Services? [A] Charging [B] Budgeting [C] Accounting [D]
Procurement [E] None of these (Ans):D
74. Understanding customer usage of services and how this varies
over time is part of which process? [A] Service portfolio
Management [B] Service level management [C] Component capacity
management [D] Demand management [E] None of these (Ans):D
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
22 | P a g e
. 75. Which is not a characteristics of a process? [A] Process
is always measurable [B] Process always delivers specific results
[C] Process always responds to specific events [D] Process always
is necessary [E] None of these (Ans):D
76. What does a service always deliver to customer? [A]
Application [B] Infrastructure [C] Value [D] Resources [E] None of
these (Ans):C
77. Who owns the specific costs and risks associated with
providing a service? [A] The service provider [B] The service level
manger [C] The customer [D] Resources [E] None of these (Ans):A
78. Financial department needs higher security measures is
example for which SLA?
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
23 | P a g e
[A] Corporate level SLA [B] Customer level SLA [C] Service level
SLA [D] All of these [E] None of these (Ans):B
79. Which of the following activities is NOT a part of the
Deming cycle? [A] Act [B] Plan [C] D o [D] Coordinate [E] None of
these (Ans):D
80. E-mail services for a particular department needs encryption
and secure backups is example of: [A] Corporate level SLA [B]
Customer level SLA [C] Service level SLA [D] All of these [E] None
of these (Ans):C
81. Which stage of the service life cycle is MOST concerned with
defining policies and objectives? [A] Service design
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
24 | P a g e
[B] Service transition [C] Service strategy [D] Service
operation [E] None of these (Ans):C
82. Which of the following should a service catelog contain? [A]
The version information of all software [B] The organizational
structure of the company [C] The customer [D] Resources [E] None of
these (Ans):D
83. Which of the following do service metrics measures? [A]
Processes and functions [B] Maturity and cost [C] The end to end
service [D] Infrastructure availability [E] None of these
(Ans):C
84. What are the key issues in choosing the measurement process?
[A] Accuracy [B] Cost
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
25 | P a g e
[C] Visibility [D] All of these [E] None of these (Ans):D
85. Which of these is critical success for service level
agreement? [A] All services are met [B] Users appreciate the costs
of desired service levels [C] Service performance measures are
available [D] All of the above [E] None of these (Ans):B
All The Best
More Download will Comes Soon Stay with us On
www.ibpsexamguru.in
Visit more Updates www.ibpsexamguru.in for Govt jobs alert
www.gurujobalert.com
26 | P a g e