IBPS RRB SO IT Professional Quiz
IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan for IBPS RRB MAINS 2019.
Q1. In which type of security threats, someone tries to steal information that computers, smartphones, or other devices transmit over a network?
(a) Intrusion attack
(b) Network spoofing
(c) Eavesdropping
(d) Impersonation
(e) Packet modification
S1. Ans.(c)
Sol. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission. An eavesdropping attack takes advantage of unsecured network communications in order to access the data being sent and received.
Sol. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission. An eavesdropping attack takes advantage of unsecured network communications in order to access the data being sent and received.
Q2. Which of the following kind of computer virus that hides and stores itself within the computer memory, which then allows it to infect any file that is run by the computer, depending on the virus’ programming?
(a) Encrypted virus(b) Overwriting virus
(c) Polymorphic virus
(d) Resident virus
(e) Self- recognition virus
S2. Ans.(d)
Sol. A resident virus is a computer virus which embeds itself into the memory on a computer, activating whenever the operating system performs a specific function so that it can infect files on the computer.
Q3. Which type of testing strategy deals with the internal logic and structure of the code?
(a) Gray-box testing
(b) Closed-box testing
(c) Black box testing
(d) White box testing
(e) Boundary value Analysis
S3. Ans.(d)
Sol. In white box testing methodology, the tester has the knowledge of the internals of a system and knows how the system is implemented. The tester uses this knowledge to develop test cases that will examine the control flow, information flow, data flow, exception and error handling as well as coding practices of the system.
Q4. Which of the following layer is not User Support layer?
(a)Session layer
(b) Presentation layer
(c) Application layer
(d) Both (b) and (c)
(e)Data Link Layer
S4. Ans.(e)
Sol. Data link layer is network support layer. The network support layers are Physical layer, Data link layer and Network layer. These layers deal with electrical specifications, physical connection, transport timing and reliability. The user support layers are: Session layer, Presentation layer, Application layer. These allow interoperability among unrelated software system. Transport layer provides end to end reliable data transmission.
Q5. Which of the following is a not a necessary condition for deadlock?
(a) Mutual Exclusion
(b) Hold and Wait
(c) Aborted
(d) No Preemption
(e) Circular wait
S5. Ans.(c)
Sol. There are 4 necessary condition for deadlock:
•Mutual Exclusion: At least one un sharable resource – processes claim exclusive control of resources they need
•Hold and Wait: Process holds one resource while waiting for another
•No Preemption: Resources only released voluntarily – no interruption possible (i.e. cannot be forcefully withdrawn by another process)
•Circular Wait: Circular chain of processes – each waiting for a resource held by another
Q6. Which of the following is not a relational database?
(a) Oracle
(b) MySQL
(c) IBM DB2
(d) HBase
(e) SQL
S6. Ans.(d)
Sol. Relational database is also called relational database management systems (RDBMS) or SQL databases. The most popular of these are Microsoft SQL Server, Oracle Database, MySQL, and IBM DB2. HBase is a non-relational database.
Q7. Tuple variables in SQL are defined in which clause?
(a)From clause
(b)Select clause
(c)Where clause
(d)Like clause
(e)All of the above
S7. Ans.(a)
Sol. Tuple variables can be used in SQL, and are defined in the from clause.
Q8. Speed of super computer measure in:
(a) Hertz
(b) Gigahertz
(c) Flops
(d) Rad/sec
(e) Megahertz
S8. Ans.(c)
Sol. A supercomputer is about speed. Its processing speed is measured in floating point operations per second (flops), or the number of calculations a supercomputer can perform in a second.
Q9. Which one of the following is not a Linux distribution?
(a) Debian
(b) Gentoo
(c) Kinoppix
(d) Fedora
(e) Slix
S9. Ans.(e)
Sol. The Linux open source operating system, or Linux OS, is a freely distributable, Cross-platform operating system based on Unix that can be installed on PCs, laptops, netbooks, mobile and tablet devices, video game consoles, servers, supercomputers and more. All are Linux distribution except Slix.
Q10. Which of the following allows you to specify multiple values in a WHERE clause?
(a) Between
(b) In
(c) Like
(d) Joins
(e) Insert
S10. Ans.(b)
Sol. The IN operator allows you to specify multiple values in a WHERE clause.
Syntax:
SELECT column_name(s)
FROM table_name
WHERE column_name IN (value1, value2, …);
Q11. Which type of firewall can provide additional functionality such as content caching and security by preventing direct connections from outside the network?
(a) Packet Filtering Firewalls
(b) Statefull inspection firewalls
(c) Next-gen firewalls
(d) Proxy firewall
(e) Circuit-level gateways
S11. Ans.(d)
Sol. A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A proxy firewall may also be called an application firewall or gateway firewall.
Q12. The default extension for an Oracle SQL*Plus file is:
(a) .txt
(b) .pls
(c) .ora
(d) .sql
(e) .doc
S12. Ans.(d)
Sol. Default extension for oracle SQL*Plus file is .sql .
Q13. Which malware spreads via fake Adobe Flash updates and tricking users into clicking the malware by falsely alerting the user that their Flash player requires an update?
(a) WannaCry
(b) Bad Rabbit
(c) CryptoLocker
(d) KeyLocker
(e) Trojen horse
S13. Ans.(b)
Sol. Bad Rabbit infects a network when one person inadvertently runs a fake Adobe Flash Player installer that has been manipulated to look like the real deal. Bad Rabbit is ransomware—malicious software that infects a computer and restricts user access to the infected machine until a ransom is paid to unlock it.
Q14. What is livelock?
(a) It is a deadlock handling technique
(b) It is useful in page replacement
(c) It is like a deadlock condition
(d) It is used in transaction management
(e) It is used to recover transaction log
S14. Ans.(c)
Sol. This is a situation in which two or more processes continuously change their state in response to changes in the other process(es) without doing any useful work. This is like deadlock in that no progress is made but differs in that neither process is blocked or waiting for anything. Livelock is a special case of resource starvation; the general definition only states that a specific process is not progressing.
Q15. Which command is used to execute compiled java program?
(a)Java
(b)Javac
(c)Run
(d)Javaw
(e) Javavac
S15. Ans.(b)
Sol. javac command is used to compile a java file. You can directly run javac in command prompt if environment variable is set correctly.