Latest Banking jobs   »   IBPS SO 2018 Professional Knowledge Quiz...

IBPS SO 2018 Professional Knowledge Quiz for IT | 14 January 2019

 
 
IBPS SO IT Officer is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will covers chapters of professional knowledge for IT Officer exam. Practice with the questions based on the most updated pattern. 

 

 

Q1. Ethernet uses how many bit/byte physical address, that is imprinted on the network interface card?

64 bit
64 byte
6 bit
6 byte
32 bit
Solution: 

Ethernet uses a 6 -byte (48-bit) physical address that is imprinted on the network interface card (NIC). The physical address also known as the link address is the address of a node physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer.

Q2. Which type of security attack occurs, when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems?

Compromised key attack
Sniffer Attack
Man-in-the-Middle attack
Denial-of-service attack
Eavesdropping
Solution: 

A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late.

Q3. Which protocols is used to monitor network devices such as hubs, switches, and routes?

SMTP
RIP
SNMP
OSPF
HTTP
Solution: 

Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.

Q4. Which of the following is not the major function of PKI?

Confidentiality
Accessibility
Authentication
Integrity
Non-Repudiation
Solution: 

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke Digital Certificates. A Public Key Infrastructure (PKI) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data using a public and a private cryptographic key pair that is obtained and shared through a trusted authority. There are 4 major function of Public Key Infrastructure (PKI): Confidentiality, Authentication, Integrity, Non-Repudiation.

Q5. Which class of IP address provides a maximum of only 254 host addresses per network ID?

A Class
B Class
C Class
D Class
E Class
Solution: 

Class C network address only has 8 bits for defining hosts..

Q6. PPP used in which layer of network reference model?

Physical layer
Data link layer
Network layer
Application layer
Presentation layer
Solution: 

Point-to-Point Protocol (PPP) is a data link layer (layer 2) communications protocol used to establish a direct connection between two nodes. It connects two routers directly without any host or any other networking device in between. It can provide connection authentication transmission encryption and compression.

Q7. What is SSH?

Routing Protocol
Connection mechanism
Network Model
Cryptographic Protocol
Connector
Solution: 

SSH (Secure Shell) is cryptographic a protocol which define how to connect securely over a network. SSH (Secure Shell) protocol provides the three main ideas of security authentication, confidentiality (via encryption) and integrity of data transfer over a network. SSH supports Authentication to reliably determine the identity of the connecting computer, encryption to scramble data so that only the intended recipient only can read it and Integrity to guarantees the data sent over the network is not changed by a third party.

Q8. Which of the following is the process of splitting a message into multiple packets at transport layer?

Fragmentation
Segmentation
Synchronization
Defragmentation
Framing
Solution: 

packet segmentation is the process of dividing a data packet into smaller units for transmission over the network.

Q9. An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install?

Client server network
Peer-to peer network
Intranet
MAN
None of the above
Solution: 

A peer-to-peer (P2P) network is group of computers, each of which acts as a node for sharing files within the group. Instead of having a central server to act as a shared drive, each computer acts as the server for the files stored upon it.

Q10. End-to-end connectivity is provided from host-to-host in which layer?

Network layer
Session layer
Data link layer
Transport layer
Presentation layer
Solution: 

The transport layer is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components. The transport layer is also responsible for the management of error correction, providing quality and reliability to the end user. This layer enables the host to send and receive error corrected data, packets or messages over a network and is the network component that allows multiplexing.

Q11. IP address 128.167.152.2 is belongs to which class?

A
B
C
D
None
Solution: 

Range of Class B address is 128.0.0.0 to 191.255.255.255

Q12. An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?

RARP
RUDP
ICMP
SNMP
ARP
Solution: 

The ICMP destination unreachable message is generated by a router (which is reachable) to inform the source host that the destination unicast address is unreachable.

Q13. Which type of network consists set of switches connected by physical links?

Circuit Switched Network
Datagram Network
Virtual Circuit Network
All of these
None of these
Solution: 

In Circuit-switched networks, a physical path is dedicated to a single connection between two end-points in the network for the duration of the connection.

Q14. Which of the following layer oversees both error control & flow control at the source to destination level?

Physical
Data link
Transport
Network
None of these
Solution: 

The transport layer in a network model is responsible for process-to-process delivery of the entire message. The transport layer in a network model, ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level.

Q15. Bridge work at which layer of OSI Model?

network layer
Data link layer
Physical layer
application layer
Transport layer
Solution: 

Bridges operate at the Data-Link Layer of the OSI Model. They can distinguish between local and remote data, so data traveling from one workstation to another in the same segment doesn't have to cross the bridge. Bridges operate on MAC-Layer addresses.

               


   


You may also like to read:

 

TOPICS:

Leave a comment

Your email address will not be published. Required fields are marked *