JIB-232-PPB-M-C-E020 MCQ BANKING TECHNOLOGY
 
PRINCIPALS AND PRACTICE OF BANKING   ::   MCQ BANKING TECHNOLOGY  
 
TEST No:JIB-232-PPB-M-C-E020 :: No of Questions:  020   ::   Time Allowed : 16  Minutes  
Directions:  Please Tick Appropiate Option and Submit,  Inform Serial Number of Questions where you need detailed Explanations to bhagirathprayash@gmail.com or Massage to 9462900411 
Question 1:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
The term e-commerce includes ............................  
A) Electronic trading of Physical goods and intangibles such as information.  
B) The electronic provision of services such as after sales support or online legal advice  
C) All the steps involved in trade, such as on-line marketing ordering payment and support for delivery.  
D) All of the above.  
 
Answer: D) All of the above  
Question 2:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
Which of the following is the largest community in classification of e-commerce?  
A) Business to Business (B to B)  
B) Business to Consumer (B to C)  
C) Business to Government (B to G)  
D) Government to Government (G to G)  
 
Answer: A) Business to Business (B to B)  
Question 3:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
Which of the following is not the example of business to consumer (B to C) e-commerce?  
A) Amazon.com  
B) e-bay.com  
C) dell.com  
D) lastminute.com  
 
Answer: B) e-bay.com  
Question 4:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
The types of Business to Business e-commerce are ................  
A) Direct selling and support to Business  
B) Industry portals  
C) Information sites about a industry  
D) All of the above  
 
Answer: D) All of the above  
Question 5:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
Which of the following are the benefits of E-marketing? i) Speed    ii) Reach and Penetration iii) Ease and Efficiency           iv) Low Cost v) Targeted audience  
A) i, ii, iii and iv only  
B) ii, iii, iv and v only  
C) i, iii, iv and v only  
D) All i, ii, iii, iv and v  
 
Answer: D) All i, ii, iii, iv and v  
Question 6:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met.  
A) Trap doors  
B) Trojan horse  
C) Logic Bomb  
D) Virus  
 
Answer: C) Logic Bomb  
Question 7:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
Which of the following malicious program do not replicate automatically?  
A) Trojan Horse  
B) Virus  
C) Worm  
D) Zombie  
 
Answer: A) Trojan Horse  
Question 8:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
…………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.  
A) Zombie  
B) Worm  
C) Trojan Horses  
D) Logic Bomb  
 
Answer: C) Trojan Horses  
Question 9:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system.  
A) True, False  
B) False, True  
C) True, True  
D) False, False  
 
Answer: C) True, True  
Question 10:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.  
A) Worm  
B) Virus  
C) Zombie  
D) Trap doors  
 
Answer: B) Virus  
Question 11:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
...................... is the process of recreating a design by analyzing a final product.  
A) Forward Engineering  
B) Reverse Engineering  
C) Backward Engineering  
D) None of the above  
 
Answer: B) Reverse Engineering  
Question 12:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
.................. is simply the use of electronic means to transfer funds directly from one account to another, rather than by cheque or cash.  
A) M-Banking  
B) O-Banking  
C) E-Banking  
D) D-Banking  
 
Answer: C) E-Banking  
Question 13:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
The telephone banking service includes ................... i) Automatic balance voice out ii) Inquiry all term deposit account iii) Direct cash withdraw iv) Utility Bill paymentsv) Voice out last five transactions  
A) i, ii, iii and v only  
B) i, ii, iv and v only  
C) ii, iii, iv and v only  
D) All i, ii, iii, iv and v  
 
Answer: B) i, ii, iv and v only  
Question 14:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
Which of the following are the forms of E-banking? i) Internet Banking ii) Telephone Banking iii) Electronic Check conversion iv) Electronic Bill Payment v) Direct Deposit
  
A) i, ii, iii and iv only  
B) ii, iii, iv and v only  
C) i, iii, iv and v only  
D) All i, ii, iii, iv and v  
 
Answer: D) All i, ii, iii, iv and v  
Question 15:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
What is the full form of SWIFT?  
A) Society for Worldwide Internet Financial Telecommunications.  
B) Secret Wide Interbank Financial Telecommunications  
C) Society for Worldwide Interbank Financial Telecommunications  
D) None of the Above  
 
Answer: D) None of the Above  
Question 16:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.  
A) Confidentiality  
B) Integrity  
C) Availability  
D) Authenticity  
 
Answer: B) Integrity  
Question 17:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.  
A) Confidentiality  
B) Integrity  
C) Availability  
D) Authenticity  
 
Answer: A) Confidentiality  
Question 18:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
The type of threats on the security of a computer system or network are ………………… i) Interruption    ii) Interception    iii) Modification iv) Creation     v) Fabrication  
A) i, ii, iii and iv only  
B) ii, iii, iv and v only  
C) i, ii, iii and v only  
D) All i, ii, iii, iv and v  
 
Answer: C) i, ii, iii and v only  
Question 19:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
Which of the following is independent malicious program that need not any host program?  
A) Trap doors  
B) Trojan horse  
C) Virus  
D) Worm  
 
Answer: D) Worm  
Question 20:  http://nextgenjaiib.blogspot.in/ -JIB-232-PP     
The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.  
A) Trap doors  
B) Trojan horse  
C) Logic Bomb  
D) Virus  
 
Answer: A) Trap doors  
SMART LEARNING WITH B M GAUR - A NextGen silent Coaching Environment - https://www.facebook.com/groups/NextGenCareers/ and www.nextgencareers.blogspot.in  committed to deliver complete, latest and high quality online test material coupled with one to one guidance  
 
 
 
 
          
      
 
  
 
 
 
 
 
 
 
 
 
 
 
This is really a nice and informative. containing all information and also has a great impact on the new technology. Thanks for sharing it.
ReplyDeletejaiib mock test