JIB-232-PPB-M-C-E020 MCQ BANKING TECHNOLOGY
PRINCIPALS AND PRACTICE OF BANKING :: MCQ BANKING TECHNOLOGY
TEST No:JIB-232-PPB-M-C-E020 :: No of Questions: 020 :: Time Allowed : 16 Minutes
Directions: Please Tick Appropiate Option and Submit, Inform Serial Number of Questions where you need detailed Explanations to bhagirathprayash@gmail.com or Massage to 9462900411
Question 1: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
The term e-commerce includes ............................
A) Electronic trading of Physical goods and intangibles such as information.
B) The electronic provision of services such as after sales support or online legal advice
C) All the steps involved in trade, such as on-line marketing ordering payment and support for delivery.
D) All of the above.
Answer: D) All of the above
Question 2: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
Which of the following is the largest community in classification of e-commerce?
A) Business to Business (B to B)
B) Business to Consumer (B to C)
C) Business to Government (B to G)
D) Government to Government (G to G)
Answer: A) Business to Business (B to B)
Question 3: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
Which of the following is not the example of business to consumer (B to C) e-commerce?
A) Amazon.com
B) e-bay.com
C) dell.com
D) lastminute.com
Answer: B) e-bay.com
Question 4: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
The types of Business to Business e-commerce are ................
A) Direct selling and support to Business
B) Industry portals
C) Information sites about a industry
D) All of the above
Answer: D) All of the above
Question 5: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
Which of the following are the benefits of E-marketing? i) Speed ii) Reach and Penetration iii) Ease and Efficiency iv) Low Cost v) Targeted audience
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, iii, iv and v only
D) All i, ii, iii, iv and v
Answer: D) All i, ii, iii, iv and v
Question 6: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
Answer: C) Logic Bomb
Question 7: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
Which of the following malicious program do not replicate automatically?
A) Trojan Horse
B) Virus
C) Worm
D) Zombie
Answer: A) Trojan Horse
Question 8: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
…………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb
Answer: C) Trojan Horses
Question 9: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system.
A) True, False
B) False, True
C) True, True
D) False, False
Answer: C) True, True
Question 10: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answer: B) Virus
Question 11: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
...................... is the process of recreating a design by analyzing a final product.
A) Forward Engineering
B) Reverse Engineering
C) Backward Engineering
D) None of the above
Answer: B) Reverse Engineering
Question 12: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
.................. is simply the use of electronic means to transfer funds directly from one account to another, rather than by cheque or cash.
A) M-Banking
B) O-Banking
C) E-Banking
D) D-Banking
Answer: C) E-Banking
Question 13: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
The telephone banking service includes ................... i) Automatic balance voice out ii) Inquiry all term deposit account iii) Direct cash withdraw iv) Utility Bill paymentsv) Voice out last five transactions
A) i, ii, iii and v only
B) i, ii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
Answer: B) i, ii, iv and v only
Question 14: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
Which of the following are the forms of E-banking? i) Internet Banking ii) Telephone Banking iii) Electronic Check conversion iv) Electronic Bill Payment v) Direct Deposit
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, iii, iv and v only
D) All i, ii, iii, iv and v
Answer: D) All i, ii, iii, iv and v
Question 15: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
What is the full form of SWIFT?
A) Society for Worldwide Internet Financial Telecommunications.
B) Secret Wide Interbank Financial Telecommunications
C) Society for Worldwide Interbank Financial Telecommunications
D) None of the Above
Answer: D) None of the Above
Question 16: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
Answer: B) Integrity
Question 17: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
Answer: A) Confidentiality
Question 18: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
The type of threats on the security of a computer system or network are ………………… i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, ii, iii and v only
D) All i, ii, iii, iv and v
Answer: C) i, ii, iii and v only
Question 19: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm
Answer: D) Worm
Question 20: http://nextgenjaiib.blogspot.in/ -JIB-232-PP
The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
Answer: A) Trap doors
SMART LEARNING WITH B M GAUR - A NextGen silent Coaching Environment - https://www.facebook.com/groups/NextGenCareers/ and www.nextgencareers.blogspot.in committed to deliver complete, latest and high quality online test material coupled with one to one guidance
This is really a nice and informative. containing all information and also has a great impact on the new technology. Thanks for sharing it.
ReplyDeletejaiib mock test