S.B.I. IT Officer Model Paper

50 Questions | Total Attempts: 494

SettingsSettingsSettings
Please wait...
SBI Quizzes & Trivia

Are you a network administrator or networking student? Do you know anything about an I. T officer model and networking in the work place? If yes take this quiz to find out how much you know.


Questions and Answers
  • 1. 
    ___________________refers to a family of IEEE standards dealing with local area network with metropolitan area network
    • A. 

      802

    • B. 

      800

    • C. 

      801

    • D. 

      803

    • E. 

      None of these

  • 2. 
    ______uses a standard called IEEE 802.6 
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      MAN

    • D. 

      Internet

    • E. 

      None of These

  • 3. 
    Repeater operates in which layer of OSI model?
    • A. 

      Application Layer

    • B. 

      Presentation Layer

    • C. 

      Physical Layer

    • D. 

      Transport Layer

    • E. 

      Data link Layer

  • 4. 
    Which is the general network standard for the data link layer in the OSI Reference Model?
    • A. 

      IEEE 802.1

    • B. 

      IEEE 802.2

    • C. 

      IEEE 802.3

    • D. 

      IEEE 802.4

    • E. 

      IEEE 802.6

  • 5. 
    Where does Bridge operate in OSI model?
    • A. 

      Physical Layer

    • B. 

      Data Link Layer

    • C. 

      Both (1) and (2)

    • D. 

      Application Layer

    • E. 

      None of these

  • 6. 
    Which of the following uses the greatest number of layers in OSI model?
    • A. 

      Bridge

    • B. 

      Repeater

    • C. 

      Router

    • D. 

      Gateway

    • E. 

      None of these

  • 7. 
    Routers operate in which layer of OSI?
    • A. 

      Physical layer

    • B. 

      Data Link Layer

    • C. 

      Network Layer

    • D. 

      All of these

    • E. 

      None of these

  • 8. 
    MODEM is a___________that modulates and demodulates signals
    • A. 

      DCE (Data Circuit-Terminating Equipment)

    • B. 

      DTE (Data terminal euipment)

    • C. 

      Both (1) and (2)

    • D. 

      DTE-DCE

    • E. 

      None of these

  • 9. 
    At ___ layer TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
    • A. 

      Transport

    • B. 

      Network

    • C. 

      Physical

    • D. 

      Application

    • E. 

      None of these

  • 10. 
    A communication network which is used by large organizations over regional, national or global area are called
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      MAN

    • D. 

      Internet

    • E. 

      None of These

  • 11. 
    The __________ layer is closest to transmission medium
    • A. 

      Transport

    • B. 

      Network

    • C. 

      Physical

    • D. 

      Application

    • E. 

      None of these

  • 12. 
    End to End connectivity is provided in____layer
    • A. 

      Network

    • B. 

      Session

    • C. 

      Transport

    • D. 

      Data Link

    • E. 

      Application

  • 13. 
    Which of the following Transport layer protocol is used for transferring Electronic mail messages from one machine to anoher
    • A. 

      SNMP

    • B. 

      SMTP

    • C. 

      TCP

    • D. 

      FTP

    • E. 

      POP/IMAP

  • 14. 
    Which of the following is an example of Client/Server Model?
    • A. 

      FTP

    • B. 

      DNS

    • C. 

      TELNET

    • D. 

      All of the above

    • E. 

      None of these

  • 15. 
    IEEE standard for Wi-Fi Systems is_____
    • A. 

      802.11

    • B. 

      802.1

    • C. 

      802.2

    • D. 

      802.3

    • E. 

      802.10

  • 16. 
    Default Subnet mask for class B network is______
    • A. 

      127.0.0.1

    • B. 

      255.0.0.0

    • C. 

      255.255.0.0

    • D. 

      255.255.255.0

    • E. 

      None of these

  • 17. 
    A central computer surrounded by one or more satellite computers is called___ 
    • A. 

      Bus Network

    • B. 

      Ring Network

    • C. 

      Star Network

    • D. 

      All of above

    • E. 

      None of these

  • 18. 
    Internet-like network within enterprises are called________
    • A. 

      Intranets

    • B. 

      Switching alternatives

    • C. 

      Inter-Organizational Network

    • D. 

      Extranets

    • E. 

      None of these

  • 19. 
    What is loopback address?
    • A. 

      127.0.0.0

    • B. 

      127.0.0.1

    • C. 

      127.0.1.0

    • D. 

      127.1.0.0

    • E. 

      127.1.1.1

  • 20. 
    ____________is the continuous ability to send and recieve data between interconnected networks 
    • A. 

      FTP

    • B. 

      SMTP

    • C. 

      TNS

    • D. 

      Network Interoperability

    • E. 

      None of these

  • 21. 
    Encryption/Decryption provides a network with______
    • A. 

      Privacy

    • B. 

      Authenticity

    • C. 

      Integrity

    • D. 

      Non-Repudiation

    • E. 

      None of these

  • 22. 
    With an IP address of 100, you currently have 80 subnets. What subnet mask you should use to maximize number of hosts?
    • A. 

      192

    • B. 

      240

    • C. 

      248

    • D. 

      224

    • E. 

      252

  • 23. 
    The data encrypted at the sender site is called_____. The data to be decrypted at reciever end is called___
    • A. 

      Secret Key,Public Key

    • B. 

      Public Key, Secret Key

    • C. 

      Plaintext, Cipher Text

    • D. 

      Cipher Text, Plaintext

    • E. 

      None of these

  • 24. 
    In digital signature, the private key is used for___________ and public key for________
    • A. 

      Encyption, Decryption

    • B. 

      Decryption, Encryption

    • C. 

      Plain text, Cipher Text

    • D. 

      Cipher Text, Plain text

    • E. 

      None of these

  • 25. 
    A _______'s main purpose if to prohibit unathorized access to your computer via Internet
    • A. 

      PopUp Blocker

    • B. 

      Firewall

    • C. 

      Spyware

    • D. 

      Spam assassin

    • E. 

      None of these

Back to Top Back to top