Dear readers,

This quiz consists of questions from
various Banking entrance exams held during the last few years. Leave your
answers/ responses in the comments section below and we’ll soon let you know
the correct answers!

Directions
(Q. 1-10)

1.
Every host computer on the internet has a

(A) similar IP address

(B) unique 10-digit number

(C) common name and number        

(D) unique IP address

2.
Which of the following are five built-in functions provided by SQL?

(A) SUM, AVG, MIN, MAX, NAME

(B) MIN, MAX, MULT, DIV, NAME

(C) SUM, AVG, MULT, DIV, MIN

(D) COUNT, SUM, AVG, MAX, MIN

3.
Common Gateway Interface (CGI) is which of the following

(A) An interface that accepts and returns
data that may be written in SQL

(B) A small program that executes within
other application and is stared on the server.

(C) A small program that executes within
other application and is stored the client or the server.

(D) An interface that accepts and returns
data that may be written in any language that produces executable file.

4.
Which of the following wildcard masks is most useful for matching all IP
packets in subnet 10.1.128.0, mask 255.255.255.0?

(A) 0.0.0.0

(B) 0.0.0.255

(C) 0.0.0.240

(D) 0.0.0.31

5.
Which of the following is not a testable webApp security element?

(A) Encryption

(B) Authentication and Encryption

(C) Firewalls

(D) Authentication

6.
__________ are two important technologies for developing the Semantic web.

(A) XML and RDF

(B) XML and HTML

(C) RDF and HTML

(D) Wi-Fi and RDF

7.
In what kind of storage can we easily insert, delete, concatenate and rearrange
substrings?

(A) Stack

(B) Linked list

(C) Dedicated list

(D) queue

8.
Web pages can be created using

(A) only Web authoring software

(B) only Macromedia Dreamwaver

(C) any word processor

(D) only Microsoft products

9.
Which of the following techniques provides redundancy by using two disks and
two controllers?

(A) Disk striping

(B) Disk striping with parity

(C) Drive mirroring

(D) Drive duplexing

10.
_________ is the term for the use of deception to get someone’s sensitive
information.

(A) identity theft

(B) personal engineering

(C) spoofing

(D) social engineering

`

To follow our
Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO

Answers 

1(d)    2(d)    3(d)   
4(b)    5(b)      6(a)    
7(b)      8(c)     9(d)     
10(d)    

Write Comment