• Coming Soon..
  • Coming Soon..
  • Coming Soon..
  • Coming Soon..

Professional Knowledge for IBPS SO (IT)(January 18, 2018)

8 months ago 0 comments

Professional Knowledge for IBPS SO (IT)

1. The penetration tester has full access to almost any information it need: fully detailed scope (urls, IPs, ports), details about the application, and number of tests accounts, the data, source code.

(1) Crystal Box Penetration Testing

(2) Grey Box Penetration Test­ing

(3) Black Box PenetratioJ Testing

(4) White Box Penetratiod Testing

(5) None of these

2. ____________ Architecture is a client-server software archi­tecture pattern in which the user interface functional process logic computer data stor­age and data access are developed and maintained as inde­pendent modules, most often on separate platforms.

(1) Two-tier

(2) Three – tier

(3) Data – tier

(4) Application – tier

(5) None of these

3. In Address Resolution Protocol (ARP), station can send its physical address and ask for a

(1) Long-time lease

(2) Lease

(3) Short time lease

(4) Logical Lease

(5) None of these

4. Which of the following statement, about Radio Frequency Identification is not true?

(1) RFID tags transmit data about a product when scanned.

(2) “Passive” RFID tags do not require a battery to trans­mit data.

(3) RFID tags can be scanned by just being near the scanning device.

(4) RFID codes are not subject to viruses.

(5) None of these

5. _____________ refers to running more than a single operating system (OS) on a computer.

(1) Dual boot

(2) Multi-OS

(3) Virtual Environment

(4) Parallel Computing

(5) None of these

6. GIF and PNG files use an…… format.

(1) Interlacing

(2) Progressive

(3) Regressive

(4) Clear View

(5) None of these

7. If bandwidth of link is greater than bandwidth needed, bandwidth is

(1) Preserved

(2) Utilized for other commu­nications

(3) Wasted

(4) None of Above

(5) Both (1) and (2)

8. In popular technologies, like Internet browsers and audio/video applications, the ability to utilize makes products more versatile and allows transparent and con­venient customization ac­cording to the user’s desired features.

(1) Patches

(2) Plug-ins

(3) Firmware

(4) Cookies

(5) None of these

9. Software project estimation techniques can be broadly classified under one of the following headings –

(1) automated processes

(2) decomposition techniques

(3) empirical models

(4) both (b) and (c)

(5) None of these

 

Answers:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 2
  6. 1
  7. 2
  8. 2
  9. 4

Facts

We work hard day and night to help you succeed.

12,586,479

Total Visitors

100

Books Published

1,85,700

Total Selections

2,500,000

Total Tests Taken