Classic Jhumka Earrings Silver INR 113.00 Free Shipping Buy Now
Black Jhumka Earrings & Studs INR 94.00 Free Shipping Buy Now
Classic Jhumka Earrings Silver INR 207.00 Free Shipping Buy Now
Beautiful stud earing INR 93.00 Free Shipping Buy Now
Different Size Hoop and Stud Earrings Set INR 243.00 Free Shipping Buy Now
Golden Hoop Earing INR 70.00 Free Shipping Buy Now
Home Solved Question Papers IBPS Indian Bank Computer Officer 2008 : General Awareness
35 Questions
Time Left -

Indian Bank Computer Officer 2008 : General Awareness

  • Question 2 :
  • The Secure Electronic Transaction (SET) specification—

  • Ais a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
  • Bprovides private-key encryption of all data that passes between a client and a server
  • Callows users to choose an encryption scheme for the data that passes between a client and a server
  • Duses a public-key encryption to secure credit-card transaction systems
  • ENone of these
  • Question 9 :
  • A polymorphic virus—

  • Amodifies its program code each time it attaches itself to another program or file
  • Bis a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
  • Ca malicious-logic program that hides within or looks like a legitimate program
  • Dinfects a program file, but still reports the size and creation date of the original, uninfected program
  • ENone of these
  • Question 11 :
  • Which is NOT a good Web security strategy?

  • ARestrict access to the Web server; keep a minimum number of ports open
  • BLimit the users who can load software, edit or add files.
  • CAdd demo programs, so users can test system without accessing production data.
  • DRemove unnecessary compilers and interpreters.
  • ENone of these
  • Question 13 :
  • The word FIP stands for—

  • AFile Translate Protocol
  • BFile Transit Protocol
  • CFile Typing Protocol
  • DFile Transfer Protocol
  • ENone of these
  • Question 14 :
  • Voice mail—

  • Ais the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
  • Bpermits users to converse in real time with each other via the computer while connected to the Internet
  • Cfunctions much like an answering machine, allowing callers to leave a voice message for the called party
  • Dinvolves using video and computer technology to conduct a meeting between participants at geographically separate locations
  • ENone of these
  • Question 18 :
  • RSA is—

  • ASymmetric Cryptosystem
  • BAsymmetric Cryptosystem
  • CBlock Cypher
  • DDigital Signature
  • ENone of these
  • Question 22 :
  • All of the following are basic principles of net works, except—

  • Aeach computer must have a network card
  • Bthere must be communications media connecting the network hardware devices
  • Cthere must be at least one connecting device
  • Deach computer must have software that supports the movement of information
  • ENone of these
  • Question 31 :
  • What is Internet 2?

  • AA new type of cabling system for Wide Area Networks
  • BA second local area network that can connect with another online LAN to share access
  • CA new standard for Internet browsers
  • DAn association to develop advanced Internet technology
  • ENone of these