Вы находитесь на странице: 1из 36

www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.

in 1
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

ALL THE VERY BEST FOR YOUR EXAMS

om
t.c
es
kt
SAMPLE QUESTIONS FOR oc
CERTIFICATE EXAMINATION IN
m
PREVENTION OF CYBER CRIMES AND
iib

FRAUD MANAGEMENT
ca
iib
.ja
w

Though we had taken enough care to go through the questions, we shall not be responsible for
any loss or damage, resulting from any action taken on the basis of the contents. We advise
w

everyone to update yourself with the latest information through RBI website and other
authenticated sources. In case you find any incorrect/doubtful information, kindly update us
w

also (along with the source link/reference for the correct information) as lot of questions were
shared by many people.

January 2019 K Murugan, MCA MBA CAIIB


…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 2
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

PREVENTION OF CYBER CRIMES AND FRAUD MANAGEMENT – GENERAL INFORMATION

PASSING CRITERIA:
Minimum marks for pass in the subject is 50 out of 100.

DIPLOMA IN INFORMATION SYSTEM AUDIT (DISA)

om
Candidates who clear all the following three Certificate examinations under the Revised
Syllabus will be given a "DIPLOMA IN INFORMATION SYSTEM AUDIT (DISA)" from May 2017 :
a) Certificate Examination in IT Security

t.c
b) Certificate Examination in Prevention of Cyber Crimes and Fraud Management
c) Certificate Examination in Information System Banker

es
Candidates who clear all the above three Certificates under revised syllabus will however have
to apply for DISA certificate by paying Rs. 500/- plus taxes as applicable.

kt
For candidates who have already cleared any or all the above three examinations under the old
oc
syllabus, i.e. prior to May 2017 need to apply and clear the examination under revised syllabus
to become eligible for DISA Certificate.
m
EXAMINATION FEES* :
For Members
iib

First attempt - Rs.1,000/- *


Subsequent each attempt - Rs.1,000/- *
ca

For Non-Members
First attempt - Rs.1,500/- *
Subsequent each attempt - Rs.1,500/- *
iib

* Plus convenience charges and Taxes as applicable


.ja

Please Note : Candidates are required to Register for every attempt separately.

As a measure to streamline the traffic for registration, Institute will charge regular examination
w

fee to candidates who registers for the examination during the regular open period of
w

registration. For the extended days of registration, late fee of Rs.200 plus taxes, will be charged
in addition to regular examination fee. This extended days of registration, also gives candidates
w

addition opportunity to register for the examination, having missed the regular open period of
registration.

The fee once paid will NOT be refunded or adjusted on any account.

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 3
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

MEDIUM OF EXAMINATION :
Examination will be conducted in English only.

PATTERN OF EXAMINATION:
(i) Question Paper will contain 120 objective type multiple choice questions for 100 marks.
(ii) The examination will be held in Online Mode only

om
(iii) There will NOT be negative marking for wrong answers.

DURATION OF EXAMINATION:

t.c
The duration of the examination will be of 2 hours.

PERIODICITY AND EXAMINATION CENTRES:

es
a) Examination will be conducted on pre-announced dates published on IIBF Web Site. Institute
conducts examination on half yearly basis, however periodicity of the examination may be

kt
changed depending upon the requirement of banking industry.
b) List of Examination centers will be available on the website. (Institute will conduct
oc
examination in those centers where there are 20 or more candidates.)

STUDY MATERIAL / COURSEWARE


m
The Institute has developed a courseware to cover the syllabus. The courseware (book) for the
subject/s will be available at outlets of publisher/s. Please visit IIBF website www.iibf.org.in
iib

under the menu “Exam Related” for details of book/s and address of publisher/s outlets.
Candidates are advised to make full use of the courseware. However, as banking and finance
ca

fields are dynamic, rules and regulations witness rapid changes. Therefore, the courseware
should not be considered as the only source of information while preparing for the
examinations. Candidates are advised to go through the updates put on the IIBF website from
iib

time to time and go through Master Circulars / Master Directions issued by RBI and publications
of IIBF like IIBF Vision, Bank Quest, etc. All these sources are important from the examination
.ja

point of view. Candidates are also to visit the websites of organizations like RBI, SEBI, BIS, IRDAI,
FEDAI etc. besides going through other books & publications covering the subject / exam
concerned etc. Questions based on current developments relating to the subject / exam may
w

also be asked.
w

Cut-off Date of Guidelines / Important Developments for Examinations


w

The Institute has a practice of asking questions in each exam about the recent developments /
guidelines issued by the regulator(s) in order to test if the candidates keep themselves abreast
of the current developments. However, there could be changes in the developments /
guidelines from the date the question papers are prepared and the dates of the actual
examinations.

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 4
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

In order to address these issues effectively, it has been decided that:


(i) In respect of the examinations to be conducted by the Institute for the period February to
July of a calendar year, instructions / guidelines issued by the regulator(s) and important
developments in banking and finance up to 31st December will only be considered for the
purpose of inclusion in the question papers".
(ii) In respect of the examinations to be conducted by the Institute for the period August to

om
January of a calendar year, instructions / guidelines issued by the regulator(s) and important
developments in banking and finance up to 30th June will only be considered for the purpose of
inclusion in the question papers.

t.c
SYLLABUS
The details of the prescribed syllabus which is indicative are furnished below. However, keeping

es
in view the professional nature of examinations, all matters falling within the realm of the
subject concerned will have to be studied by the candidate as questions can be asked on all

kt
relevant matters under the subject. Candidates should particularly prepare themselves for
answering questions that may be asked on the latest developments taking place under the
oc
various subject/s although those topics may not have been specifically included in the syllabus.
Any alterations made will be notified from time to time. Further, questions based on current
m
developments in banking and finance may be asked.
iib

Candidates are advised to refer to financial news papers / periodicals more particularly “IIBF
VISION” and “BANK QUEST” published by IIBF.
ca

Certificate Examination in Prevention of Cyber Crimes and Fraud Management


iib

Module - A : Cyber Crime Overview

1. Introduction to Cyber Crime : Concepts and Techniques


.ja

2. Channels of Cyber Crimes


3. Cyber Crime Methods
w

• Stalking & Cyber Squatting


• Cyber Extortion & Cyber Cheating
w

• Cyber warfare & Cyber Terrorism


• Phishing & Hacking
w

4. Computer Insecurity
• Internet Crime & Internet fraud
• User Failures & Causes
• Bank Failure
5. Computer Hackers

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 5
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Module - B : Fraud Management

6. Computer Fraud Protection


• Prevention Controls
• Detection Controls
• Mitigation Controls

om
• Encryption / Decryption
7. Incident of Cyber crimes
• Cyber Crime Reporting

t.c
• Cyber Crime Investigation
• Cyber Crime Management
• Evidence Collection & Chain of Custody

es
• Cyber Crime Risk Management
• Cyber Forensics

kt
Module - C : Electronic Transactions oc
8. Online Transactions - (Concepts, Emerging Trends and Legal Implications)
9. Global Payment Processing
m
10. Payment Cards & Data Security
11. Electronic Card Frauds
iib

• ATM Cards
• Credit Cardsa
ca

• Smart Cards

Module - D : Cyber Laws & Regulatory Compliance


iib

12. Cyber Law in India


.ja

• Information Technology Act - 2000


13. Electronic Transactions and Taxation Issues
14. Human traits
w

• Associates
w

• Behaviour
15. Regulatory Compliance
w

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 6
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Prevention of Cyber Crimes and Fraud Management

Credit Card Fraud includes ...... (i) Credit cards are illegally get and used to get movable or immovable
property, (ii) Unauthorized and illegal use of credit cards

om
a. Only (i)
b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)

t.c
Ans - d
.............................................

es
Punishment for Hacking in India is ...... (i) Imprisonment up to 3 years, (ii) Fine (Depend on case to case)

kt
a. Only (i) oc
b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)
m
Ans - d
iib

.............................................

INTER POL stands for ......


ca

a. International Police
b. Internal Polythims
iib

c. Internet Protocol
d. None of These
.ja

Ans - a
.............................................
w

The first computer virus is ......


w

a. I Love You
w

b. Blaster
c. Sasser
d. Creeper

Ans - d
.............................................

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 7
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

MCAfee is an example of ......

a. Photo Editing Software


b. Quick Heal
c. Virus
d. Antivirus

om
Ans - d
.............................................

t.c
To be considered a computer crime, what needs to be involved in the crime?

a. Technology

es
b. Computers
c. Data
d. Networks

kt
Ans - b
.............................................
oc
m
Which among the following is best suitable for term "Software Piracy"? (i) Counterfeiting original
products, (ii) Illegal copying of genuine program
iib

a. Only (i)
b. Only (ii)
ca

c. Either (i) or (ii)


d. Both (i) and (ii)
iib

Ans - d
.............................................
.ja

What is a person called when they try to hurt a group of people with the use of a computer?
w

a. White-hat intruder
b. Cracker
w

c. Social engineer
d. Cyber terrorist
w

Ans - d
.............................................

Which of the following is known as Malicious software?

a. illegalware
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 8
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

b. badware
c. malware
d. maliciousware

Ans - c
.............................................

om
To protect a computer from virus, you should install ...... in your computer.

a. backup wizard

t.c
b. disk cleanup
c. antivirus
d. disk defragmenter

es
Ans - c
.............................................

kt
Computer crime or Cyber crime is crime that involves ...... (i) Computer, (ii) Network
oc
a. Only (i)
m
b. Only (ii)
c. Either (i) or (ii)
d. Neither (i) nor (ii)
iib

Ans - c
ca

.............................................

In terms of cyber-security, what is meant by 'resilience' and why is it important?


iib

a. Resilience refers to the ability of an IT system to identify and defend against a cyber-security threat
b. The only way to build a truly resilient IT system is to ensure that it can repel all types of threat and
.ja

remain and avoid attack


c. Resilience in an IT system refers to its ability to function when there are no threats to its security
w

d. Resilience refers to the ability of IT systems to recover from attack


w

Ans - d
.............................................
w

Having individuals provide personal information to obtain a free offer provided through the Internet is
considered what type of social engineering?

a. Web-based
b. Human-based
c. User-based
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 9
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

d. Computer-based

Ans - d
.............................................

In order to find out Public IP address of your computer, following website can be use?

om
a. Www.whatismyip.com
b. Www.getmyip.com
c. Www.tellmyip.com

t.c
d. Www.routerip.com

Ans - a

es
.............................................

Webhosting means ......

kt
a. Creating domain name for your website
b. Uploading your website on the internet
oc
c. Creating email id's for your website
m
d. Making alteration in your website

Ans - b
iib

.............................................
ca

Which of the following concepts does NOT form part of the technical discourse on cyber-security?

a. Business networks
iib

b. Computer experts
c. Anti-virus industry
d. Computer networks
.ja

Ans - a
w

.............................................
w

What is 'malware'?
w

a. A virus or worm
b. A Trojan horse
c. A hacker tool
d. A corrupted program

Ans - c
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 10
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Why would a hacker use a proxy server?

a. To create a stronger connection with the target


b. To create a ghost server on the network
c. To obtain a remote access connection
d. To hide malicious activity on the network

om
Ans - d
.............................................

t.c
What type of symmetric key algorithm using a streaming cipher to encrypt information?

a. RC4

es
b. Blowfish
c. SHA
d. MD5

kt
Ans - a
.............................................
oc
m
Which database is queried by Whois?

a. ICANN
iib

b. ARIN
c. APNIC
ca

d. DNS

Ans - a
iib

.............................................

What are the port states determined by Nmap?


.ja

a. Active, inactive, standby


w

b. Open, half-open, closed


c. Open, filtered, unfiltered
w

d. Active, closed, unused


w

Ans - c
.............................................

Wayback machine is used for ......

a. Take back up of database


b. To see snapshots of a website taken previously
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 11
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. To go Wayback in earlier time in the history


d. To clone email box of website

Ans - b
.............................................

om
Rooting of Mobile phone means ......

a. Creating root directory in mobile phone


b. Obtaining administrative access of mobile phone

t.c
c. Formatting the mobile
d. Root cause of mobile

es
Ans - b
.............................................

kt
Section 65(a) is in respect of admissibility of electronic evidence is apart of ......

a. Criminal procedure code


oc
b. Indian Penal code
m
c. Indian Evidence act
d. Information Technology Act
iib

Ans - c
.............................................
ca

Are strategies of Arms Control and Deterrence useful in cyber-security?


iib

a. No, arms control does not serve any purpose outside the realm of traditional military weapons
b. Yes, successful policies of arms control and deterrence have translated well from other security
realms, such as nuclear weapons control strategies
.ja

c. Effective deterrence requires international cooperation which is achievable in theory, but the
verification required for traditional arms control strategies is impossible in cyber(ed. warfare
w

d. Only arms control is unproblematic, deterrence has failed because international cooperation cannot
be reached and common rules or practices cannot be established
w

Ans - c
w

.............................................

What port does Telnet use?

a. 22
b. 80
c. 20
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 12
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

d. 23

Ans - d
.............................................

Enumeration is part of what phase of ethical hacking?

om
a. Reconnaissance
b. Maintaining Access
c. Gaining Access

t.c
d. Scanning

Ans - c

es
.............................................

Keyloggers are a form of ......

kt
a. Spyware
b. Shoulder surfing
oc
c. Trojan
m
d. Social engineering

Ans - a
iib

.............................................
ca

Net crime is criminal exploitation of the ......

a. Browsers
iib

b. Servers
c. Internet
d. None of These
.ja

Ans - c
w

.............................................
w

VIRUS stands for ......


w

a. Very Intelligent Result Until Source


b. Very Interchanged Resource Under Search
c. Vital Information Resource Under Slege
d. Viral Important Record User Searched

Ans - c
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 13
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Which among the following characteristics are correct about 'Cyberstalking'? (i) Cyberstalking is the use
of the internet or electronics to stalk or harass an individual or any group, (ii) It includes making
harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or
objects, (iii) It may be offline as well as online

a. Only (i) and (ii)

om
b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

t.c
Ans - d
.............................................

es
Which of the following is not an antivirus software?

a. AVG

kt
b. Avast
c. Code Red
d. MCAfee
oc
m
Ans - c
.............................................
iib

What category of software is designed to cause detriment to your computer?


ca

a. Bugs
b. Malware
c. Systems software
iib

d. Network snakes

Ans - b
.ja

.............................................
w

What worm emailed people with the words "I LOVE YOU" in the year 2000?
w

a. The Love Bug


b. The Love Letter
w

c. The Valentine Connection


d. The Darling Link

Ans - a
.............................................

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 14
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

What is your computer called when it is infected with a malware bot?

a. Zombie
b. Android
c. E-Ogre
d. Dirty bot

om
Ans - a
.............................................

t.c
What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded
temperature and humidity control software worth $1.7 billion?

es
a. Thrill-seeker hacker
b. Black-hat hacker
c. Script kiddie

kt
d. White-hat hacker

Ans - d
oc
.............................................
m
Denial-of-service attack includes ...... (i) a type of attack on a network that is designed to bring the
network to its knees by flooding it with useless traffic, (ii) DoS attacks are included in it.
iib

a. Only (i)
ca

b. Only (ii)
c. Either (i) or (ii)
d. Neither (i) nor (ii)
iib

Ans - c
.............................................
.ja

When did the cyber-security discourse emerge? (When did politicians, academics, and other agents
w

begin to talk seriously about cyber-security?)


w

a. 1970s
b. 1990s
w

c. 1960s
d. 1980s

Ans - a
.............................................

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 15
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

The power of investigations of offences under Information Technology Act are given to ......

a. Station House Officer


b. Officers of and above the rank of PSI
c. Officers of and above the rank of Police Inspector
d. Dy.S.P. and above

om
Ans - c
.............................................

t.c
What is the referent object in contemporary cyber-security?

a. Digitalised sensitive information

es
b. Critical Information Infrastructures
c. Government IT systems
d. Telecommunication networks

kt
Ans - b
.............................................
oc
m
Which of the following is not a factor in securing the environment against an attack on security?

a. The education of the attacker


iib

b. The system configuration


c. The network architecture
ca

d. The business strategy of the company

Ans - d
iib

.............................................

Attempting to gain access to a network using an employee’s credentials is called the ...... mode of ethical
.ja

hacking.
w

a. Local networking
b. Social engineering
w

c. Physical entry
d. Remote networking
w

Ans - a
.............................................

What is the best statement for taking advantage of a weakness in the security of an IT system?

a. Threat
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 16
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

b. Attack
c. Exploit
d. Vulnerability

Ans - c
.............................................

om
What is short for malicious software (is software designed to disrupt computer operation, gather
sensitive information, or gain unauthorized access to computer systems)?

t.c
a. Malware
b. Moleculewar
c. Malisoft

es
d. Malairasoft

Ans - a

kt
.............................................
oc
Which of the following is/are threats for electronic payment systems?
m
a. Computer worms
b. Computer virus
c. Trojan horse
iib

d. All of the above


ca

Ans - d
.............................................
iib

In order to find out IP address details of a computer located in India,you will use following website ......

a. Www.apnic.net
.ja

b. Www.arin.net
c. Www.lacnic.net
w

d. Www.ripe.net
w

Ans - a
.............................................
w

Considering commerce and marketing, which of the following present the most significant obstacle to
developing IT security?

a. There is no direct return on investment in building security systems


b. Security systems are detrimental to usability and can make IT systems less functional, and therefore
less attractive to the consumer
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 17
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. There is pressure to reduce the time it takes to get a new IT product or system onto the market, so
security systems are sacrificed in order to reduce the time-to-market
d. All of the above

Ans - d
.............................................

om
Threats to IT systems can be classified in many ways; in this chapter three different categories of threat
are listed. According to this classification, which of the following would be classified as a 'Failure'?

t.c
a. Security systems were not adequate to protect the system against attack from a hacking group, and
sensitive data was lost
b. There is a programming error in the software which causes the system to perform badly

es
c. The IT system has failed due to a random unexpected event, such as a tsunami which destroys key
electronic equipment
d. All of the above

kt
Ans - b
.............................................
oc
m
Which of the following will allow footprinting to be conducted without detection?

a. PingSweep
iib

b. Traceroute
c. War Dialers
ca

d. ARIN

Ans - d
iib

.............................................

Performing hacking activities with the intent on gaining visibility for an unfair situation is called ......
.ja

a. Cracking
w

b. Analysis
c. Hacktivism
w

d. Exploitation
w

Ans - c
.............................................

Services running on a system are determined by ......

a. The system’s IP address.


b. The Active Directory
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 18
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. The system’s network name


d. The port assigned

Ans - d
.............................................

om
What are the types of scanning?

a. Port, network, and services


b. Network, vulnerability, and port

t.c
c. Passive, active, and interactive
d. Server, client, and network

es
Ans - b
.............................................

kt
Which of the following virus overtake computer system, when it boots and destroy information?

a. System infectors
oc
b. Trojan
m
c. Boot infectors
d. Stealth virus
iib

Ans - d
.............................................
ca

Key logger is a ......


iib

a. Firmware
b. Antivirus
c. Spyware
.ja

d. All of the above


w

Ans - c
.............................................
w

Crime through Internet includes ...... (i) Telemarketing, (ii) Internet fraud, (iii) Credit Card account thefts
w

a. Only (i) and (ii)


b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

Ans - d
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 19
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded
temperature and humidity control software worth $1.7 billion?

a. Thrill-seeker hacker
b. Black-hat hacker
c. Script kiddie

om
d. White-hat hacker

Ans - d
.............................................

t.c
What is a person called when they try to hurt a group of people with the use of a computer?

es
a. White-hat intruder
b. Cracker
c. Social engineer

kt
d. Cyber terrorist

Ans - d
oc
.............................................
m
In order to find out private IP address of your computer,which of the following command will you use?
iib

a. Ipconfig
b. Tracert
ca

c. Ipconfig /all
d. Ipconfig -all
iib

Ans - c
.............................................
.ja

What is meant by the term 'cyber-crime'?


w

a. Any crime that uses computers to jeopardise or attempt to jeopardise national security
b. The use of computer networks to commit financial or identity fraud
w

c. The theft of digital information


d. Any crime that involves computers and networks
w

Ans - d
.............................................

To hide information inside a picture, what technology is used?

a. Rootkits
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 20
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

b. Bitmapping
c. Steganography
d. Image Rendering

Ans - c
.............................................

om
Which phase of hacking performs actual attack on a network or system?

a. Reconnaissance

t.c
b. Maintaining Access
c. Scanning
d. Gaining Access

es
Ans - d
.............................................

kt
What is it called when someone changes the FROM section of an email so that the message you receive
oc
appears to come from a person other than the one who sent it?
m
a. Spoofing
b. DoS
c. Spam
iib

d. Trapper
ca

Ans - a
.............................................
iib

What program would you use to gain administrative rights to someone's computer?

a. Bot
.ja

b. Executive Android
c. Rootkit
w

d. Trojan horse
w

Ans - c
.............................................
w

Which among the following is wrong characteristic of "Phishing"? (i) Fakers, by offering special rewards
or money prize etc asked for personal information such as passwords, credit card information, social
security and bank account numbers or other material information, (ii) Main purpose is theft or misuse
the acquired material

a. Only (i)
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 21
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)

Ans - d
.............................................

om
To protect yourself from computer hacker, you should turn on a ......

a. Script

t.c
b. Firewall
c. VLC
d. Antivirus

es
Ans - b
.............................................

kt
What Term usually describes a person who gains access to computer system illegally?
oc
a. Hacker
m
b. Phisher
c. Con artist
d. Fraudster
iib

Ans - a
ca

.............................................

What term refers to uncovering computer-stored information suitable for use as evidence in courts of
iib

law?

a. Computer Investigation
.ja

b. Computer Detection
c. Computer Forensics
w

d. Computer Probing
w

Ans - c
.............................................
w

Minimum how many copies we should make of "Single source evidence hard disk" for Forensics analysis
purpose ......

a. 1
b. 2
c. 3
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 22
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

d. 4

Ans - b
.............................................

1 cluster is equivalent to how many sectors?

om
a. 1
b. 2
c. 3

t.c
d. 4

Ans - d

es
.............................................

Firewalls are used to protect against ......

kt
a. data driven attacks
b. fire attacks
oc
c. virus attacks
m
d. unauthorised access

Ans - d
iib

.............................................
ca

What type of virus describes the awful consequences of not acting immediately?

a. Android
iib

b. Spoofing
c. Misleading e-mail
d. Phishing
.ja

Ans - c
w

.............................................
w

Which computer virus records every movement you make on your computer?
w

a. Malware Android
b. Key logger
c. DoS
d. Trapper

Ans - b
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 23
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Which of the following would most likely not be a symptom of a virus?

a. The web browser opens to an unusual home page


b. Odd message or images are displayed on the screen
c. Existing program files and icons disappear
d. The CD–ROM stops functioning

om
Ans - d
.............................................

t.c
1 sector consists of ...... bytes

a. 8

es
b. 1024
c. 512
d. 2048

kt
Ans - c
.............................................
oc
m
Code red is a(n) ......

a. Word Processing Software


iib

b. Antivirus
c. Virus
ca

d. Photo Editing Software

Ans - c
iib

.............................................

What type of attack uses a fraudulent server with a relay address?


.ja

a. NTLM
w

b. MITM
c. NetBIOS
w

d. SMB
w

Ans - b
.............................................

What port is used to connect to the Active Directory in Windows 2000?

a. 80
b. 445
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 24
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. 139
d. 389

Ans - d
.............................................

om
Which among the following is correct about "Hacking"? (i) Hacking is an illegal intrusion into a computer
system and/or network, (ii) Cracking term is equivalent to Hacking (In Indian Laws perspective there is
no difference between the term hacking and cracking), (iii) Every act committed towards breaking into a
computer and/or network is hacking

t.c
a. Only (i) and (ii)
b. Only (i) and (iii)

es
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

kt
Ans - d
.............................................
oc
A ...... attack occurs when hackers bombard a site with more request for service than it can possibly
m
handle, preventing legitimate users from accessing the site.

a. Digital Bomb
iib

b. Service error
c. Denial of service
ca

d. Computer

Ans - c
iib

.............................................

Continuous online sexual harrasment by a male to female, comes under which category of cyber crime?
.ja

a. Cyber Harrasment
w

b. Cyber spoofing
c. Cyber Phising
w

d. Cyber Stalking
w

Ans - d
.............................................

Smallest unit of storage on the Hard Disk is called as ......

a. Cluster
b. Sector
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 25
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. Track
d. Byte

Ans - b
.............................................

om
You are working for a large clothing manufacturer as a computer forensics investigator and are called in
to investigate an unusual case of an employee possibly stealing clothing designs from the company and
selling them under a different brand name for a different company.What you discover during the course
of the investigation is that the clothing designs are actually original products of the employee and the

t.c
company has no policy against an employee selling his own designs on his own time. The only thing that
you can find that the employee is doing wrong is that his clothing design incorporates the same graphic
symbol as that of the company with only the wording in the graphic being different. What area of the

es
law is the employee violating?

a. Trademark Law

kt
b. Copyright Law
c. Printright Law
d. Brandmark Law
oc
m
Ans - a
.............................................
iib

What is the most important activity in system hacking?


ca

a. Information gathering
b. Cracking passwords
c. Escalating privileges
iib

d. Covering tracks

Ans - b
.ja

.............................................
w

A packet with no flags set is which type of scan?


w

a. TCP
b. XMAS
w

c. IDLE
d. NULL

Ans - d
.............................................

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 26
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Which Nmap scan is does not completely open a TCP connection?

a. SYN stealth scan


b. TCP connect
c. XMAS tree scan
d. ACK scan

om
Ans - a
.............................................

t.c
What protocol is the Active Directory database based on?

a. LDAP

es
b. TCP
c. SQL
d. HTTP

kt
Ans - a
.............................................
oc
m
Which among the following is correct about "Child Pornography"? (i) Pedophiles lure the children by
distributing pornographic material, (ii) Pedophiles falsely represent their selves as of same age and win
the confidence of children by chatting and by sending images, (iii) Pedophiles after wining the
iib

confidence of children then offers then monetary as well as physical awards


ca

a. Only (i) and (ii)


b. Only (i) and (iii)
c. Only (ii) and (iii)
iib

d. (i), (ii) and (iii)

Ans - d
.ja

.............................................
w

Sniffing is used to perform ...... finger printing.


w

a. Passive stack
b. Active stack
w

c. Passive banner grabbing


d. Scanned

Ans - a
.............................................

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 27
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Phishing is a form of ......

a. Spamming
b. Identify Theft
c. Impersonation
d. Scanning

om
Ans - c
.............................................

t.c
What are some of the most common vulnerabilities that exist in a network or system?

a. Changing manufacturer, or recommended, settings of a newly installed application.

es
b. Additional unused features on commercial software packages.
c. Utilizing open source application code
d. Balancing security concerns with functionality and ease of use of a system.

kt
Ans - b
.............................................
oc
m
What is the sequence of a TCP connection?

a. SYN-ACK-FIN
iib

b. SYN-SYN ACK-ACK
c. SYN-ACK
ca

d. SYN-SYN-ACK

Ans - b
iib

.............................................

What tool can be used to perform SNMP enumeration?


.ja

a. DNSlookup
w

b. Whois
c. Nslookup
w

d. IP Network Browser
w

Ans - d
.............................................

Why would HTTP Tunneling be used?

a. To identify proxy servers


b. Web activity is not scanned
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 28
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. To bypass a firewall
d. HTTP is a easy protocol to work with

Ans - c
.............................................

om
...... software are programs that are installed onto your computer and can scan and remove known
viruses which you may have contracted.

a. Firmmware

t.c
b. Adware
c. Keylogger
d. Antivirus

es
Ans - d
.............................................

kt
Which of the following describes programs that can run independently travel from system to system and
disrupt computer communication?
oc
m
a. Viruses
b. Trojans
c. Droppers
iib

d. Worm
ca

Ans - d
.............................................
iib

A ...... is a computer program that can replicate itself and spread from one computer to another.

a. Antivurs
.ja

b. PenDrive
c. Mouse
w

d. Computer Virus
w

Ans - d
.............................................
w

Which among the following are Malicious Softwares? (i) Virus and Worms, (ii) Trojan Horse and Time
Bomb, (iii) Logic Bomb and Rabbit and Bacterium

a. Only (i) and (ii)


b. Only (i) and (iii)
c. Only (ii) and (iii)
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 29
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

d. (i), (ii) and (iii)

Ans - d
.............................................

To be considered a computer crime, what needs to be involved in the crime?

om
a. Technology
b. Computers
c. Data

t.c
d. Networks

Ans - b

es
.............................................

What category of software is designed to cause detriment to your computer?

kt
a. Bugs
b. Malware
oc
c. Systems software
m
d. Network snakes

Ans - b
iib

.............................................
ca

What is your computer called when it is infected with a malware bot?

a. Zombie
iib

b. Android
c. E-Ogre
d. Dirty bot
.ja

Ans - a
w

.............................................
w

IRC stands for ......


w

a. Internet Relay Chat


b. Internal Rely Chat
c. Information Relay Chat
d. None of These

Ans - a
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 30
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Which of these is an effective way of securing against cyber threats?

a. Complete eradication of threats


b. Ensure that the severity of cyber war as a threat is recognised, and that instances of cyber warfare are
identified, publicised, and acted upon immediately
c. Acceptance that there can be no absolute security, instead design resilient IT systems and build

om
international cooperation and information exchange in order to reduce threat and increase resilience
d. All of the above.

Ans - c

t.c
.............................................

MOD refers to ......

es
a. Monitor of Deception
b. Master of Deception

kt
c. Management of Deception
d. None of These
oc
Ans - b
m
.............................................

Authentication is ......
iib

a. modification
ca

b. insertion
c. hard to assure identity of user on a remote system
d. none of the above
iib

Ans - c
.............................................
.ja

...... are attempts by individuals to obtain confidential information from you to falsifying their identity.
w

a. Computer viruses
w

b. Phishing scams
c. Phishing trips
w

d. Spyware scams

Ans - b
.............................................

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 31
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

A virus that migrates freely within a large population of unauthorized email user is called a ......

a. flame war
b. worm
c. macro
d. plagiarism

om
Ans - c
.............................................

t.c
Which ports should be blocked to prevent null session enumeration?

a. Ports 120 and 445

es
b. Ports 135 and 136
c. Ports 110 and 137
d. Ports 135 and 139

kt
Ans - d
.............................................
oc
m
The first phase of hacking an IT system is compromise of which foundation of security?

a. Availability
iib

b. Confidentiality
c. Integrity
ca

d. Authentication

Ans - b
iib

.............................................

What are hybrid attacks?


.ja

a. An attempt to crack passwords using words that can be found in dictionary.


w

b. An attempt to crack passwords by replacing characters of a dictionary word with numbers and
symbols.
w

c. An attempt to crack passwords using a combination of characters, numbers, and symbols.


d. An attempt to crack passwords by replacing characters with numbers and symbols.
w

Ans - b
.............................................

What worm emailed people with the words "I LOVE YOU" in the year 2000?

a. The Love Bug


…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 32
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

b. The Love Letter


c. The Valentine Connection
d. The Darling Link

Ans - a
.............................................

om
What type of virus describes the awful consequences of not acting immediately?

a. Android

t.c
b. Spoofing
c. Misleading e-mail
d. Phishing

es
Ans - c
.............................................

kt
Which of the following is not a typical characteristic of an ethical hacker?
oc
a. Excellent knowledge of Windows.
m
b. Understands the process of exploiting network vulnerabilities.
c. Patience, persistence and perseverance.
d. Has the highest level of security for the organization.
iib

Ans - d
ca

.............................................

What is it called when someone changes the FROM section of an email so that the message you receive
iib

appears to come from a person other than the one who sent it?

a. Spoofing
.ja

b. DoS
c. Spam
w

d. Trapper
w

Ans - a
.............................................
w

A ...... is a computer program that can invade computer and perform a variety of functions ranging from
annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files or destroying your hard
disk).

a. Ms Word
b. Ms Access
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 33
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. Antivirus
d. Computer Virus

Ans - d
.............................................

om
What is the proper command to perform an Nmap XMAS scan every 15 seconds?

a. nmap -sX -sneaky


b. nmap -sX -paranoid

t.c
c. nmap -sX -aggressive
d. nmap -sX -polite

es
Ans - a
.............................................

kt
What type of rootkit will patch, hook, or replace the version of system call in order to hide information?

a. Library level rootkits


oc
b. Kernel level rootkits
m
c. System level rootkits
d. Application level rootkits
iib

Ans - a
.............................................
ca

What is the purpose of a Denial of Service attack?


iib

a. Exploit a weakness in the TCP/IP stack


b. To execute a Trojan on a system
c. To overload a system so it is no longer operational
.ja

d. To shutdown services by turning them off


w

Ans - c
.............................................
w

What program would you use to gain administrative rights to someone's computer?
w

a. Bot
b. Executive Android
c. Rootkit
d. Trojan horse

Ans - c
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 34
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

Which form of encryption does WPA use?

a. Shared key
b. LEAP
c. TKIP
d. AES

om
Ans - c
.............................................

t.c
...... are often delivered to a PC through an email attachment and are often designed to do harm.

a. Spam

es
b. Email
c. Portals
d. Virus

kt
Ans - d
.............................................
oc
m
The altering of data so that it is not usable unless the changes are undone is ......

a. ergonomics
iib

b. compression
c. biometrics
ca

d. encryption

Ans - d
iib

.............................................

When a logic bomb is activated by a time related event, it is known as ......


.ja

a. virus
w

b. trojan horse
c. time related bomb sequence
w

d. time bomb
w

Ans - d
.............................................

How is IP address spoofing detected?

a. Installing and configuring a IDS that can read the IP header


b. Comparing the TTL values of the actual and spoofed addresses
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 35
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

c. Implementing a firewall to the network


d. Identify all TCP sessions that are initiated but does not complete successfully

Ans - b
.............................................

om
Why would a ping sweep be used?

a. To identify live systems


b. To locate live systems

t.c
c. To identify open ports
d. To locate firewalls

es
Ans - a
.............................................

kt
Which computer virus records every movement you make on your computer?

a. Malware Android
oc
b. Key logger
m
c. DoS
d. Trapper
iib

Ans - b
.............................................
ca
iib
.ja
w
w
w

…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 36
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………

ALL THE VERY BEST FOR YOUR EXAMS

om
t.c
es
kt
SAMPLE QUESTIONS FOR oc
CERTIFICATE EXAMINATION IN
m
PREVENTION OF CYBER CRIMES AND
iib

FRAUD MANAGEMENT
ca
iib
.ja
w

Though we had taken enough care to go through the questions, we shall not be responsible for
any loss or damage, resulting from any action taken on the basis of the contents. We advise
w

everyone to update yourself with the latest information through RBI website and other
authenticated sources. In case you find any incorrect/doubtful information, kindly update us
w

also (along with the source link/reference for the correct information) as lot of questions were
shared by many people.

January 2019 K Murugan, MCA MBA CAIIB


…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442

Вам также может понравиться