Dedicated to the Young and Energetic Force of Bankers
Sign In/Sign Out

WELCOME

   ABM-Case Studies

   ABM-Recollected

   ABM-Last Minute

   BFM-Case Studies

   BFM-Recollected

   BFM-Last Minute

   Important Circulars

   Master Circulars

   Bank DA Rates

   Bank Holidays

   Life Ins Companies

   List of PSBs

   List of Private Banks

   List of Foreign Banks

 

CAIIB - IT- RECOLLECTED QUESTIONS


Some of the commonly asked questions in IT... Let me try to update this as and when I could collect...

1. Questions/ case studies on program given on c, c++, java and sql servers
(Programs were given and asked what is stdio.h, output of program , "meaning of >> in a program' etc. )

2. Networking related questions, layers of networking.
3. Fifo based on rtgs (no. Of rtgs n1,n2 .... n10), pattern as per fifo or as per priority
3. On hacking and viruses (worm, spyware etc. )
4. On cloud based computing.
5. Data abstraction.
6. Moore s law.
7. Ip/subnet based case study
8. What is electronic wallet.
9. PUSH AND POP based
10. EMV full form.

1. Case study on rtgs
FIFO, FIFO by pass, priority in FIFO 5 questions
2. Case study on java program
3. Case study on c++ program
4. Case study on encyption decryption
5. 2 case studies on RDBMS (select, where, from queries)

1. Defintion of A.L.U, CU
2. Group questions on select query based on group by and having clause very easy
3. Group questions on subnetting concept .
4. Group questions on expected output of a given program using +++ concept in c.
5. Real time system definition
.............................................

Information Systems Auditing: Tools and Techniques

COBIT 5 family of products

IS Audit/Assurance Programs

IT Audit Basics

Technical and Risk Management Reference Series

White papers
.............................................

1. Advantages of CMM (Capability Maturity Model)
- Helps to build an understanding of software process.
- Provide a consistent basis for conducting appraisals of software processes.
- To serve blueprint for software process improvement.
.............................................

2. Generation of computers
First Generation: High speed vacuum tube
- Very small memory
- Development of stored program

Second generation: Germanium transistors
- more reliable and faster
- Much cheaper than tubes
- Magnetic core storage and magnetic disk storage

Third Generation: Silicon transistors
- Integrated Circuits (ICs)
- Switching speed and reliability increased
- Semi-conductor Memory

Fourth generation: Microprocessor chip
- VLSI (Very Large Scale Integrated Circuits)
- Computer networks and distributed computer systems
- Highly portable and smaller in size due to improvements in speed, memory size, packing density of ICs

Fifth generation: ULSI (Ultra Large Scale Integrated. chips
- Artificial Intelligence
.............................................

3. Meaning and impact of globalization

4. COBOL (Common Business Oriented Language) mainly used for business data processing (impt.)
5. FORTRAN used for scientific and engineering calculations (impt.)
6. Function of ALU ………… page 14-15
7. CPU consists of ….. page 14
8. Batch processing …. Page 18
9. Function of OLTP (On-Line Transaction Processing)…… page 20
10. Meaning of Grid computing, Real time system, cluster computing, cloud computing
11. Virtualizations of server’s means to run multiple operating systems on same physical servers.
12. Category of software with examples …. Page 35 36 (You will get 2 questions from this section)
13. Open Source Software with example
14. System software and application software examples
15. Unit 4: Networking System (You will get maximum questions from this unit, so concentrate on this chapter from module A)
16. Intranet
(i) Uses Internet-derived communication protocols (TCP/IP), networking and user interface.
(ii) Relatively cost efficient
.............................................

With Information Technology we cannot achieve ......

a. Workforce flexibility
b. Distributed the wealth equally*
c. Globalization
d. Reduce financial frauds
.............................................

In which types of cable composed of two or more copper wirestwisted around each other within a plastic sheath?

a. Coaxial cable
b. Twisted-pair cable*
c. Optical fiber cable
d. None of the above
.............................................

RJ-45 connectors is a type of ......

a. Coaxial cable
b. Twisted-pair cable*
c. Optical fiber cable
d. None of the above
.............................................

Cable used to where very large amount of data need to be transmitted on a regular basis ......?

a. Coaxial cable
b. Twisted-pair cable
c. Optical fiber cable*
d. None of the above
.............................................

10Base-FL and 100Base-FX cable is type of ......

a. Coaxial cable
b. Twisted-pair cable
c. Optical fiber cable*
d. None of the above
.............................................

...... wave are omni directional.

a. Radio wave*
b. Micro wave
c. Radio and Micro both
d. None of the above
.............................................

Which of the following statements are correct?

a. VPN server does not require IP number.
b. Dial-up connectivity is always cheap irrespective of the amount of data transfer.
c. 100 Mbps data rate cannot be achieved over LAN.
d. LAN connection for a printer is not a Network Interface Card. *
.............................................

PPTP (Point-to-Point Tunneling Protocol)
L2TP (Layer 2 Tunneling Protocol)
.............................................

An ISDN Primary rate interface (PRI) connections supports ......

a. 2 B-channels 1 D-channels
b. 1 B-channels 2 D-channels
c. 23 B-channels 1 D-channels*
d. 1 B-channels 23 D-channels
.............................................

An ISDN Basic rate interface (BRI) connection supports ......

a. 2 B-channels 1 D-channels*
b. 1 B-channels 2 D-channels
c. 23 B-channels 1 D-channels
d. 1 B-channels 23 D-channels
.............................................

In which band operates with an uplink frequency of 6 GHz and a downlink frequency of 4 GHz?

a. C band*
b. Ku band
c. Ka band
d. All of the above
.............................................

In which band operates with an uplink frequency of 14 GHz and a downlink frequency of 11 GHz?

a. C band
b. Ku band*
c. Ka band
d. All of the above
.............................................

In which band operates with an uplink frequency of 30 GHz and a downlink frequency of 20 GHz?

a. C band
b. Ku band
c. Ka band*
d. All of the above
.............................................

The most common reason for sub-netting a network is ......

a. To control network traffic*
b. To reduce IP addressing number
c. To manage hubs
d. None of the above
.............................................

LISP, Pascal, PL/1 are develops in which generation?

a. 1st generation
b. 2nd generation
c. 3rd generation*
d. 4th generation
.............................................

Pick the odd one with respect to deployment strategies?

a. Horizontal*
b. Parallel
c. Phased
d. Pilot
.............................................

These systems does not make decision, it helps the user make the decision, providing information and analysis where the user sees fit?

a. Transaction Processing System (TPS)
b. Management Information System (MIS)
c. Decision Support System (DSS) *
d. None of the above
.............................................

In which phase of SDLC involves acquiring the hardware, programming software, developing and distributing the documentation, and training personnel to use the system?

a. Planning and Analysis
b. Design
c. Implementation*
d. Operation and maintenance
.............................................

For medium to high risk project and when risk evaluation is important, which software development model is used? (Choose the most suited model)

a. Waterfall
b. Spiral*
c. Prototype
d. None of the above
.............................................

Full form of PERT ......

a. Program Evaluate and Revised Technique
b. Program Evaluation and Revised Technique
c. Program Evaluate and Review Technique
d. Program Evaluation and Review Technique*
.............................................

The components of CMM includes (Select the odd one) ......

a. Goals
b. Process capability
c. Maturity levels
d. None of the above*
.............................................

Replication management is also known as ......

a. Process Management Layer
b. Application Messaging Layer
c. Data Warehouse Layer
d. Data Staging Layer*
.............................................

Data about data within the enterprise is known as ......

a. Metadata*
b. Data Marts
c. Data Warehouse
d. None of the above
.............................................

Which of the following is used on a business or departmental level?

a. Metadata
b. Data Marts*
c. Data Warehouse
d. None of the above
.............................................

The data mining tool that discovers different groupings within the data depending on the common features or attributes is known as ......

a. Association
b. Classification
c. Clustering*
d. Forecasting
.............................................

...... transforms data from the data warehouse into strategic information.

a. Data Marts
b. Data Mining
c. OLAP*
d. Data warehouse
.............................................

Choose the odd one ......

a. SCORM*
b. IEEE
c. IMS
d. AICC
.............................................

Choose the correct flows of Instructional Design Process ......

a. Analyze-Develop-Design-Evaluate-Implement
b. Analyze-Design-Implement-Develop-Evaluate
c. Analyze-Develop-Design-Implement-Evaluate
d. Analyze-Design-Develop-Implement-Evaluate*
.............................................

Bloom’s taxonomy divides educational objectives into ......

a. 3 domains*
b. 4 domains
c. 5 domains
d. 6 domains
.............................................

A virtual classroom can help to ......

a. Save voice discussion and presentations.
b. Hold live ad-hoc learning discussions and study sessions.
c. Share the advantages of e-learning with the suppliers and strategic partners.
d. All of the above*
.............................................

Score Banking System can manage multiple delivery channels through ......

a. API’s*
b. Different servers
c. Different versions of CBS
d. None of the above
.............................................

Data security includes ......

a. Transaction access of authorized users
b. Message validation
c. Transaction logging
d. All of the above*
.............................................

In India, RTGS uses ...... message flow structure.

a. V-shaped
b. L-shaped
c. T-shaped
d. Y shaped*
.............................................

What is the name of the RTGS system that uses in the USA?

a. CHAPS
b. Fedwire*
c. SIC
d. ELLIPS
.............................................

What is the name of the RTGS system that uses in the UK?

a. CHAPS*
b. Fedwire
c. SIC
d. ELLIPS
.............................................

What is the name of the RTGS system that uses in the Belgium?

a. CHAPS
b. Fedwire
c. SIC
d. ELLIPS*
.............................................

Which message flow structure is generally incompatible with the basic principle of RTGS?

a. V-shaped
b. L-shaped
c. T-shaped*
d. Y-shaped
.............................................

Message flow structure in CHAPS is ......

a. L-shaped*
b. V-shaped
c. T-shaped
d. None of the above
.............................................

The cards used while traveling that is on move are ...... cards.

a. Debit Card
b. Credit Card
c. Magnetic Card
d. Contactless smart Card*
.............................................

The following is a re-loadable card ......

a. Credit Card
b. Smart Card*
c. Magnetic Card
d. Debit Card
.............................................

CRM is the dimensions of the E-business, what is the use of CRM?

a. For on-line purchase
b. For streamlining internal business processes
c. For bringing customers and associates closer*
d. None of the above
.............................................

The technology that can be used to reduce the billing cost is known as ......

a. EBPP*
b. SCM
c. CRM
d. None of the above
.............................................

Which committee emphasis on IS Audit in banks?

a. Jilani Committee
b. Narasimham Committee*
c. Vasudevan Committee
d. Internet Banking Committee
.............................................

Which committee underlined the importance of computerization in the banking industry?

a. Jilani Committee
b. Narasimham Committee
c. Vasudevan Committee*
d. Internet Banking Committee
.............................................

...... is done in and around the computer with the help of manual resources as well as sources from the system.

a. Computer Audit
b. IS Audit
c. System Audit*
d. None of the above
.............................................

...... concerned with holding the sender responsibility for his message.

a. Non repudiation*
b. Authenticity
c. Integrity
d. Atomicity
.............................................

IDEA (International Data Encryption Algorithm) is of _______ bit key length.

a. 56
b. 128*
c. 112
d. 40
.............................................

The possibility of data being read by someone other than the intended recipients is known as ......

a. Impersonation
b. Eavesdropping*
c. Data Alteration
d. Denial-of-service
.............................................

IS Audit and Assurance Standards:
Are a cornerstone of its professional contribution to the audit and assurance community
Comprise the first level of ITAF guidance
Provide information required to meet compliance needs
Supply essential guidance to improve effectiveness and efficiency
Offer a risk-based approach that is aligned with ISACA methodology
Apply to individuals providing assurance over some components of IS systems, applications and infrastructure
May also provide benefits to a wider audience, including users of IS audit and assurance reports
Are issued by the Professional Standards and Career Management Committee Committee of ISACA

IS Audit and Assurance Exposure Documents
The ISACA Professional Standards and Career Management Committee is committed to incorporating your input in the preparation of IS Audit and Assurance Standards and Guidelines.

Exposure drafts are issued internationally and interested professionals are welcome to review the material and share their views.

The Professional Standards and Career Management Committee also welcomes your assistance in the identification of emerging issues that require new standards products. Email to standards@isaca.org or fax (+1.847.253.1443) to the attention of the Director of Professional Standard Development.

IS Audit and Assurance Standards and Guidelines Awaiting Final Approval

There are no documents awaiting approval at this time.

IS Audit Guidelines

http://www.isaca.org/Knowledge-Center/ITAF-IS-Assurance-Audit-/IS-Audit-and-Assurance/Pages/IT-Audit-and-Assurance-Guidelines.aspx

COBIT

ISACA continually updates and expands the practical guidance and product family based on the COBIT framework. COBIT helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business. COBIT is available for download.

Glossary

http://www.isaca.org/Pages/Glossary.aspx

Development of Standards and Guidelines

The ISACA Professional Standards and Career Management Committee is committed to wide consultation in the preparation of IS Audit and Assurance Standards and Guidelines. Prior to issuing any documents, the Professional Standards and Career Management Committee issues exposure drafts internationally for general public comment.

The Professional Standards and Career Management Committee also seeks consultation with those who possess a special expertise or interest in the topic under consideration. We have an on-going development program that welcomes the input of ISACA members and other interested parties to identify emerging issues requiring new standards.

……………………………………………………………………………………………………………………………………………


WEBSITES

  Bank Promotion exams

  Only for Bankers

  RBI

  IIBF

  IRDA

  SEBI

  BCSBI

  CIBIL

  Banking and Insurance

  Ministry of Finance

  Excise & Customs

  Income Tax Department

  NSE

  BSE


       

Copyright @ 2017 : www.jaiibcaiibmocktest.com