11-08-2017, 07:36 PM
A completely solved previous year memory based question paper of IBPS IT officer examination held on 15th May 2016. The question paper and solution is provided by Disha Experts.Â
All the relevant section questions are included with explanations.Â
Some sample questions from the paper
1. ......... is the term for the use of deception to get someone's sensitive information.
(a) Identity theftÂ
(b) Personal engineering
© SpoofingÂ
(d) Social engineering
(e) Hacking
2. Which of the following techniques provides redundancy by using two disks and two controllers?
(a) Disk striping
(b) Disk striping with parity
© Drive mirroring
(d) Drive mirroring and disk striping
(e) Drive duplexing
3. Webpages can be created using
(a) only Web authoring software
(b) only macromedia dreamwaver
© any Word processor
(d) only Microsoft products
(e) only Microsoft frontpage
4. In what kind of storage, we can easily insert, delete, concatenate and rearrange substrings?
(a) StackÂ
(b) Linked list
© Dedicated listÂ
(d) Oueue
(e) Array
5. .......... are two Important technologies for developing the Semantic web.
(a) XML and RDFÂ
(b) XML and HTML
© RDF and HTMLÂ
(d) Wi-Fi and RDF
(e) Wi-Fi and XML
6. Which of the following is not a testable Web App security element?
(a) Encryption
(b) Authentication and Encryption
© Firewalls
(d) Authentication
(e) Penetration
7. Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.255.0?
(a) 0.0.0.0Â
(b) 0.0.0.255
© 0.0.0.240Â
(d) 0.0.0. 31
(e) 0.0.15.0
Download the complete question paper and solutions from
All the relevant section questions are included with explanations.Â
Some sample questions from the paper
1. ......... is the term for the use of deception to get someone's sensitive information.
(a) Identity theftÂ
(b) Personal engineering
© SpoofingÂ
(d) Social engineering
(e) Hacking
2. Which of the following techniques provides redundancy by using two disks and two controllers?
(a) Disk striping
(b) Disk striping with parity
© Drive mirroring
(d) Drive mirroring and disk striping
(e) Drive duplexing
3. Webpages can be created using
(a) only Web authoring software
(b) only macromedia dreamwaver
© any Word processor
(d) only Microsoft products
(e) only Microsoft frontpage
4. In what kind of storage, we can easily insert, delete, concatenate and rearrange substrings?
(a) StackÂ
(b) Linked list
© Dedicated listÂ
(d) Oueue
(e) Array
5. .......... are two Important technologies for developing the Semantic web.
(a) XML and RDFÂ
(b) XML and HTML
© RDF and HTMLÂ
(d) Wi-Fi and RDF
(e) Wi-Fi and XML
6. Which of the following is not a testable Web App security element?
(a) Encryption
(b) Authentication and Encryption
© Firewalls
(d) Authentication
(e) Penetration
7. Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.255.0?
(a) 0.0.0.0Â
(b) 0.0.0.255
© 0.0.0.240Â
(d) 0.0.0. 31
(e) 0.0.15.0
Download the complete question paper and solutions from