Indian Bank Computer Officer 2008 : General Awareness

  • Question 2 :
  • The Secure Electronic Transaction (SET) specification—

  • is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
  • provides private-key encryption of all data that passes between a client and a server
  • allows users to choose an encryption scheme for the data that passes between a client and a server
  • uses a public-key encryption to secure credit-card transaction systems
  • None of these
  • Question 9 :
  • A polymorphic virus—

  • modifies its program code each time it attaches itself to another program or file
  • is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
  • a malicious-logic program that hides within or looks like a legitimate program
  • infects a program file, but still reports the size and creation date of the original, uninfected program
  • None of these
  • Question 11 :
  • Which is NOT a good Web security strategy?

  • Restrict access to the Web server; keep a minimum number of ports open
  • Limit the users who can load software, edit or add files.
  • Add demo programs, so users can test system without accessing production data.
  • Remove unnecessary compilers and interpreters.
  • None of these
  • Question 13 :
  • The word FIP stands for—

  • File Translate Protocol
  • File Transit Protocol
  • File Typing Protocol
  • File Transfer Protocol
  • None of these
  • Question 14 :
  • Voice mail—

  • is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
  • permits users to converse in real time with each other via the computer while connected to the Internet
  • functions much like an answering machine, allowing callers to leave a voice message for the called party
  • involves using video and computer technology to conduct a meeting between participants at geographically separate locations
  • None of these
  • Question 18 :
  • RSA is—

  • Symmetric Cryptosystem
  • Asymmetric Cryptosystem
  • Block Cypher
  • Digital Signature
  • None of these
  • Question 22 :
  • All of the following are basic principles of net works, except—

  • each computer must have a network card
  • there must be communications media connecting the network hardware devices
  • there must be at least one connecting device
  • each computer must have software that supports the movement of information
  • None of these
  • Question 31 :
  • What is Internet 2?

  • A new type of cabling system for Wide Area Networks
  • A second local area network that can connect with another online LAN to share access
  • A new standard for Internet browsers
  • An association to develop advanced Internet technology
  • None of these
Indian Bank Computer Officer 2008 : General Awareness
Home Ask Questions Study Current Affairs Previous Papers Kerala PSCIBPSUPSCRBITNPSCMPSCSSCCBSEUnited StatesModel Tests News More Answers Coaching Centres Careers Downloads Colleges