Академический Документы
Профессиональный Документы
Культура Документы
in 1
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
t.c
es
kt
SAMPLE QUESTIONS FOR oc
CERTIFICATE EXAMINATION IN
m
PREVENTION OF CYBER CRIMES AND
iib
FRAUD MANAGEMENT
ca
iib
.ja
w
Though we had taken enough care to go through the questions, we shall not be responsible for
any loss or damage, resulting from any action taken on the basis of the contents. We advise
w
everyone to update yourself with the latest information through RBI website and other
authenticated sources. In case you find any incorrect/doubtful information, kindly update us
w
also (along with the source link/reference for the correct information) as lot of questions were
shared by many people.
PASSING CRITERIA:
Minimum marks for pass in the subject is 50 out of 100.
om
Candidates who clear all the following three Certificate examinations under the Revised
Syllabus will be given a "DIPLOMA IN INFORMATION SYSTEM AUDIT (DISA)" from May 2017 :
a) Certificate Examination in IT Security
t.c
b) Certificate Examination in Prevention of Cyber Crimes and Fraud Management
c) Certificate Examination in Information System Banker
es
Candidates who clear all the above three Certificates under revised syllabus will however have
to apply for DISA certificate by paying Rs. 500/- plus taxes as applicable.
kt
For candidates who have already cleared any or all the above three examinations under the old
oc
syllabus, i.e. prior to May 2017 need to apply and clear the examination under revised syllabus
to become eligible for DISA Certificate.
m
EXAMINATION FEES* :
For Members
iib
For Non-Members
First attempt - Rs.1,500/- *
Subsequent each attempt - Rs.1,500/- *
iib
Please Note : Candidates are required to Register for every attempt separately.
As a measure to streamline the traffic for registration, Institute will charge regular examination
w
fee to candidates who registers for the examination during the regular open period of
w
registration. For the extended days of registration, late fee of Rs.200 plus taxes, will be charged
in addition to regular examination fee. This extended days of registration, also gives candidates
w
addition opportunity to register for the examination, having missed the regular open period of
registration.
The fee once paid will NOT be refunded or adjusted on any account.
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 3
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
MEDIUM OF EXAMINATION :
Examination will be conducted in English only.
PATTERN OF EXAMINATION:
(i) Question Paper will contain 120 objective type multiple choice questions for 100 marks.
(ii) The examination will be held in Online Mode only
om
(iii) There will NOT be negative marking for wrong answers.
DURATION OF EXAMINATION:
t.c
The duration of the examination will be of 2 hours.
es
a) Examination will be conducted on pre-announced dates published on IIBF Web Site. Institute
conducts examination on half yearly basis, however periodicity of the examination may be
kt
changed depending upon the requirement of banking industry.
b) List of Examination centers will be available on the website. (Institute will conduct
oc
examination in those centers where there are 20 or more candidates.)
under the menu “Exam Related” for details of book/s and address of publisher/s outlets.
Candidates are advised to make full use of the courseware. However, as banking and finance
ca
fields are dynamic, rules and regulations witness rapid changes. Therefore, the courseware
should not be considered as the only source of information while preparing for the
examinations. Candidates are advised to go through the updates put on the IIBF website from
iib
time to time and go through Master Circulars / Master Directions issued by RBI and publications
of IIBF like IIBF Vision, Bank Quest, etc. All these sources are important from the examination
.ja
point of view. Candidates are also to visit the websites of organizations like RBI, SEBI, BIS, IRDAI,
FEDAI etc. besides going through other books & publications covering the subject / exam
concerned etc. Questions based on current developments relating to the subject / exam may
w
also be asked.
w
The Institute has a practice of asking questions in each exam about the recent developments /
guidelines issued by the regulator(s) in order to test if the candidates keep themselves abreast
of the current developments. However, there could be changes in the developments /
guidelines from the date the question papers are prepared and the dates of the actual
examinations.
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 4
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
January of a calendar year, instructions / guidelines issued by the regulator(s) and important
developments in banking and finance up to 30th June will only be considered for the purpose of
inclusion in the question papers.
t.c
SYLLABUS
The details of the prescribed syllabus which is indicative are furnished below. However, keeping
es
in view the professional nature of examinations, all matters falling within the realm of the
subject concerned will have to be studied by the candidate as questions can be asked on all
kt
relevant matters under the subject. Candidates should particularly prepare themselves for
answering questions that may be asked on the latest developments taking place under the
oc
various subject/s although those topics may not have been specifically included in the syllabus.
Any alterations made will be notified from time to time. Further, questions based on current
m
developments in banking and finance may be asked.
iib
Candidates are advised to refer to financial news papers / periodicals more particularly “IIBF
VISION” and “BANK QUEST” published by IIBF.
ca
4. Computer Insecurity
• Internet Crime & Internet fraud
• User Failures & Causes
• Bank Failure
5. Computer Hackers
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 5
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
• Encryption / Decryption
7. Incident of Cyber crimes
• Cyber Crime Reporting
t.c
• Cyber Crime Investigation
• Cyber Crime Management
• Evidence Collection & Chain of Custody
es
• Cyber Crime Risk Management
• Cyber Forensics
kt
Module - C : Electronic Transactions oc
8. Online Transactions - (Concepts, Emerging Trends and Legal Implications)
9. Global Payment Processing
m
10. Payment Cards & Data Security
11. Electronic Card Frauds
iib
• ATM Cards
• Credit Cardsa
ca
• Smart Cards
• Associates
w
• Behaviour
15. Regulatory Compliance
w
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 6
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
Credit Card Fraud includes ...... (i) Credit cards are illegally get and used to get movable or immovable
property, (ii) Unauthorized and illegal use of credit cards
om
a. Only (i)
b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)
t.c
Ans - d
.............................................
es
Punishment for Hacking in India is ...... (i) Imprisonment up to 3 years, (ii) Fine (Depend on case to case)
kt
a. Only (i) oc
b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)
m
Ans - d
iib
.............................................
a. International Police
b. Internal Polythims
iib
c. Internet Protocol
d. None of These
.ja
Ans - a
.............................................
w
a. I Love You
w
b. Blaster
c. Sasser
d. Creeper
Ans - d
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 7
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
Ans - d
.............................................
t.c
To be considered a computer crime, what needs to be involved in the crime?
a. Technology
es
b. Computers
c. Data
d. Networks
kt
Ans - b
.............................................
oc
m
Which among the following is best suitable for term "Software Piracy"? (i) Counterfeiting original
products, (ii) Illegal copying of genuine program
iib
a. Only (i)
b. Only (ii)
ca
Ans - d
.............................................
.ja
What is a person called when they try to hurt a group of people with the use of a computer?
w
a. White-hat intruder
b. Cracker
w
c. Social engineer
d. Cyber terrorist
w
Ans - d
.............................................
a. illegalware
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 8
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
b. badware
c. malware
d. maliciousware
Ans - c
.............................................
om
To protect a computer from virus, you should install ...... in your computer.
a. backup wizard
t.c
b. disk cleanup
c. antivirus
d. disk defragmenter
es
Ans - c
.............................................
kt
Computer crime or Cyber crime is crime that involves ...... (i) Computer, (ii) Network
oc
a. Only (i)
m
b. Only (ii)
c. Either (i) or (ii)
d. Neither (i) nor (ii)
iib
Ans - c
ca
.............................................
a. Resilience refers to the ability of an IT system to identify and defend against a cyber-security threat
b. The only way to build a truly resilient IT system is to ensure that it can repel all types of threat and
.ja
Ans - d
.............................................
w
Having individuals provide personal information to obtain a free offer provided through the Internet is
considered what type of social engineering?
a. Web-based
b. Human-based
c. User-based
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 9
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
d. Computer-based
Ans - d
.............................................
In order to find out Public IP address of your computer, following website can be use?
om
a. Www.whatismyip.com
b. Www.getmyip.com
c. Www.tellmyip.com
t.c
d. Www.routerip.com
Ans - a
es
.............................................
kt
a. Creating domain name for your website
b. Uploading your website on the internet
oc
c. Creating email id's for your website
m
d. Making alteration in your website
Ans - b
iib
.............................................
ca
Which of the following concepts does NOT form part of the technical discourse on cyber-security?
a. Business networks
iib
b. Computer experts
c. Anti-virus industry
d. Computer networks
.ja
Ans - a
w
.............................................
w
What is 'malware'?
w
a. A virus or worm
b. A Trojan horse
c. A hacker tool
d. A corrupted program
Ans - c
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 10
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
Ans - d
.............................................
t.c
What type of symmetric key algorithm using a streaming cipher to encrypt information?
a. RC4
es
b. Blowfish
c. SHA
d. MD5
kt
Ans - a
.............................................
oc
m
Which database is queried by Whois?
a. ICANN
iib
b. ARIN
c. APNIC
ca
d. DNS
Ans - a
iib
.............................................
Ans - c
.............................................
Ans - b
.............................................
om
Rooting of Mobile phone means ......
t.c
c. Formatting the mobile
d. Root cause of mobile
es
Ans - b
.............................................
kt
Section 65(a) is in respect of admissibility of electronic evidence is apart of ......
Ans - c
.............................................
ca
a. No, arms control does not serve any purpose outside the realm of traditional military weapons
b. Yes, successful policies of arms control and deterrence have translated well from other security
realms, such as nuclear weapons control strategies
.ja
c. Effective deterrence requires international cooperation which is achievable in theory, but the
verification required for traditional arms control strategies is impossible in cyber(ed. warfare
w
d. Only arms control is unproblematic, deterrence has failed because international cooperation cannot
be reached and common rules or practices cannot be established
w
Ans - c
w
.............................................
a. 22
b. 80
c. 20
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 12
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
d. 23
Ans - d
.............................................
om
a. Reconnaissance
b. Maintaining Access
c. Gaining Access
t.c
d. Scanning
Ans - c
es
.............................................
kt
a. Spyware
b. Shoulder surfing
oc
c. Trojan
m
d. Social engineering
Ans - a
iib
.............................................
ca
a. Browsers
iib
b. Servers
c. Internet
d. None of These
.ja
Ans - c
w
.............................................
w
Ans - c
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 13
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
Which among the following characteristics are correct about 'Cyberstalking'? (i) Cyberstalking is the use
of the internet or electronics to stalk or harass an individual or any group, (ii) It includes making
harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or
objects, (iii) It may be offline as well as online
om
b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)
t.c
Ans - d
.............................................
es
Which of the following is not an antivirus software?
a. AVG
kt
b. Avast
c. Code Red
d. MCAfee
oc
m
Ans - c
.............................................
iib
a. Bugs
b. Malware
c. Systems software
iib
d. Network snakes
Ans - b
.ja
.............................................
w
What worm emailed people with the words "I LOVE YOU" in the year 2000?
w
Ans - a
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 14
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
a. Zombie
b. Android
c. E-Ogre
d. Dirty bot
om
Ans - a
.............................................
t.c
What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded
temperature and humidity control software worth $1.7 billion?
es
a. Thrill-seeker hacker
b. Black-hat hacker
c. Script kiddie
kt
d. White-hat hacker
Ans - d
oc
.............................................
m
Denial-of-service attack includes ...... (i) a type of attack on a network that is designed to bring the
network to its knees by flooding it with useless traffic, (ii) DoS attacks are included in it.
iib
a. Only (i)
ca
b. Only (ii)
c. Either (i) or (ii)
d. Neither (i) nor (ii)
iib
Ans - c
.............................................
.ja
When did the cyber-security discourse emerge? (When did politicians, academics, and other agents
w
a. 1970s
b. 1990s
w
c. 1960s
d. 1980s
Ans - a
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 15
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
The power of investigations of offences under Information Technology Act are given to ......
om
Ans - c
.............................................
t.c
What is the referent object in contemporary cyber-security?
es
b. Critical Information Infrastructures
c. Government IT systems
d. Telecommunication networks
kt
Ans - b
.............................................
oc
m
Which of the following is not a factor in securing the environment against an attack on security?
Ans - d
iib
.............................................
Attempting to gain access to a network using an employee’s credentials is called the ...... mode of ethical
.ja
hacking.
w
a. Local networking
b. Social engineering
w
c. Physical entry
d. Remote networking
w
Ans - a
.............................................
What is the best statement for taking advantage of a weakness in the security of an IT system?
a. Threat
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 16
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
b. Attack
c. Exploit
d. Vulnerability
Ans - c
.............................................
om
What is short for malicious software (is software designed to disrupt computer operation, gather
sensitive information, or gain unauthorized access to computer systems)?
t.c
a. Malware
b. Moleculewar
c. Malisoft
es
d. Malairasoft
Ans - a
kt
.............................................
oc
Which of the following is/are threats for electronic payment systems?
m
a. Computer worms
b. Computer virus
c. Trojan horse
iib
Ans - d
.............................................
iib
In order to find out IP address details of a computer located in India,you will use following website ......
a. Www.apnic.net
.ja
b. Www.arin.net
c. Www.lacnic.net
w
d. Www.ripe.net
w
Ans - a
.............................................
w
Considering commerce and marketing, which of the following present the most significant obstacle to
developing IT security?
c. There is pressure to reduce the time it takes to get a new IT product or system onto the market, so
security systems are sacrificed in order to reduce the time-to-market
d. All of the above
Ans - d
.............................................
om
Threats to IT systems can be classified in many ways; in this chapter three different categories of threat
are listed. According to this classification, which of the following would be classified as a 'Failure'?
t.c
a. Security systems were not adequate to protect the system against attack from a hacking group, and
sensitive data was lost
b. There is a programming error in the software which causes the system to perform badly
es
c. The IT system has failed due to a random unexpected event, such as a tsunami which destroys key
electronic equipment
d. All of the above
kt
Ans - b
.............................................
oc
m
Which of the following will allow footprinting to be conducted without detection?
a. PingSweep
iib
b. Traceroute
c. War Dialers
ca
d. ARIN
Ans - d
iib
.............................................
Performing hacking activities with the intent on gaining visibility for an unfair situation is called ......
.ja
a. Cracking
w
b. Analysis
c. Hacktivism
w
d. Exploitation
w
Ans - c
.............................................
Ans - d
.............................................
om
What are the types of scanning?
t.c
c. Passive, active, and interactive
d. Server, client, and network
es
Ans - b
.............................................
kt
Which of the following virus overtake computer system, when it boots and destroy information?
a. System infectors
oc
b. Trojan
m
c. Boot infectors
d. Stealth virus
iib
Ans - d
.............................................
ca
a. Firmware
b. Antivirus
c. Spyware
.ja
Ans - c
.............................................
w
Crime through Internet includes ...... (i) Telemarketing, (ii) Internet fraud, (iii) Credit Card account thefts
w
Ans - d
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 19
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded
temperature and humidity control software worth $1.7 billion?
a. Thrill-seeker hacker
b. Black-hat hacker
c. Script kiddie
om
d. White-hat hacker
Ans - d
.............................................
t.c
What is a person called when they try to hurt a group of people with the use of a computer?
es
a. White-hat intruder
b. Cracker
c. Social engineer
kt
d. Cyber terrorist
Ans - d
oc
.............................................
m
In order to find out private IP address of your computer,which of the following command will you use?
iib
a. Ipconfig
b. Tracert
ca
c. Ipconfig /all
d. Ipconfig -all
iib
Ans - c
.............................................
.ja
a. Any crime that uses computers to jeopardise or attempt to jeopardise national security
b. The use of computer networks to commit financial or identity fraud
w
Ans - d
.............................................
a. Rootkits
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 20
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
b. Bitmapping
c. Steganography
d. Image Rendering
Ans - c
.............................................
om
Which phase of hacking performs actual attack on a network or system?
a. Reconnaissance
t.c
b. Maintaining Access
c. Scanning
d. Gaining Access
es
Ans - d
.............................................
kt
What is it called when someone changes the FROM section of an email so that the message you receive
oc
appears to come from a person other than the one who sent it?
m
a. Spoofing
b. DoS
c. Spam
iib
d. Trapper
ca
Ans - a
.............................................
iib
What program would you use to gain administrative rights to someone's computer?
a. Bot
.ja
b. Executive Android
c. Rootkit
w
d. Trojan horse
w
Ans - c
.............................................
w
Which among the following is wrong characteristic of "Phishing"? (i) Fakers, by offering special rewards
or money prize etc asked for personal information such as passwords, credit card information, social
security and bank account numbers or other material information, (ii) Main purpose is theft or misuse
the acquired material
a. Only (i)
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 21
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)
Ans - d
.............................................
om
To protect yourself from computer hacker, you should turn on a ......
a. Script
t.c
b. Firewall
c. VLC
d. Antivirus
es
Ans - b
.............................................
kt
What Term usually describes a person who gains access to computer system illegally?
oc
a. Hacker
m
b. Phisher
c. Con artist
d. Fraudster
iib
Ans - a
ca
.............................................
What term refers to uncovering computer-stored information suitable for use as evidence in courts of
iib
law?
a. Computer Investigation
.ja
b. Computer Detection
c. Computer Forensics
w
d. Computer Probing
w
Ans - c
.............................................
w
Minimum how many copies we should make of "Single source evidence hard disk" for Forensics analysis
purpose ......
a. 1
b. 2
c. 3
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 22
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
d. 4
Ans - b
.............................................
om
a. 1
b. 2
c. 3
t.c
d. 4
Ans - d
es
.............................................
kt
a. data driven attacks
b. fire attacks
oc
c. virus attacks
m
d. unauthorised access
Ans - d
iib
.............................................
ca
What type of virus describes the awful consequences of not acting immediately?
a. Android
iib
b. Spoofing
c. Misleading e-mail
d. Phishing
.ja
Ans - c
w
.............................................
w
Which computer virus records every movement you make on your computer?
w
a. Malware Android
b. Key logger
c. DoS
d. Trapper
Ans - b
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 23
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
Ans - d
.............................................
t.c
1 sector consists of ...... bytes
a. 8
es
b. 1024
c. 512
d. 2048
kt
Ans - c
.............................................
oc
m
Code red is a(n) ......
b. Antivirus
c. Virus
ca
Ans - c
iib
.............................................
a. NTLM
w
b. MITM
c. NetBIOS
w
d. SMB
w
Ans - b
.............................................
a. 80
b. 445
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 24
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
c. 139
d. 389
Ans - d
.............................................
om
Which among the following is correct about "Hacking"? (i) Hacking is an illegal intrusion into a computer
system and/or network, (ii) Cracking term is equivalent to Hacking (In Indian Laws perspective there is
no difference between the term hacking and cracking), (iii) Every act committed towards breaking into a
computer and/or network is hacking
t.c
a. Only (i) and (ii)
b. Only (i) and (iii)
es
c. Only (ii) and (iii)
d. (i), (ii) and (iii)
kt
Ans - d
.............................................
oc
A ...... attack occurs when hackers bombard a site with more request for service than it can possibly
m
handle, preventing legitimate users from accessing the site.
a. Digital Bomb
iib
b. Service error
c. Denial of service
ca
d. Computer
Ans - c
iib
.............................................
Continuous online sexual harrasment by a male to female, comes under which category of cyber crime?
.ja
a. Cyber Harrasment
w
b. Cyber spoofing
c. Cyber Phising
w
d. Cyber Stalking
w
Ans - d
.............................................
a. Cluster
b. Sector
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 25
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
c. Track
d. Byte
Ans - b
.............................................
om
You are working for a large clothing manufacturer as a computer forensics investigator and are called in
to investigate an unusual case of an employee possibly stealing clothing designs from the company and
selling them under a different brand name for a different company.What you discover during the course
of the investigation is that the clothing designs are actually original products of the employee and the
t.c
company has no policy against an employee selling his own designs on his own time. The only thing that
you can find that the employee is doing wrong is that his clothing design incorporates the same graphic
symbol as that of the company with only the wording in the graphic being different. What area of the
es
law is the employee violating?
a. Trademark Law
kt
b. Copyright Law
c. Printright Law
d. Brandmark Law
oc
m
Ans - a
.............................................
iib
a. Information gathering
b. Cracking passwords
c. Escalating privileges
iib
d. Covering tracks
Ans - b
.ja
.............................................
w
a. TCP
b. XMAS
w
c. IDLE
d. NULL
Ans - d
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 26
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
Ans - a
.............................................
t.c
What protocol is the Active Directory database based on?
a. LDAP
es
b. TCP
c. SQL
d. HTTP
kt
Ans - a
.............................................
oc
m
Which among the following is correct about "Child Pornography"? (i) Pedophiles lure the children by
distributing pornographic material, (ii) Pedophiles falsely represent their selves as of same age and win
the confidence of children by chatting and by sending images, (iii) Pedophiles after wining the
iib
Ans - d
.ja
.............................................
w
a. Passive stack
b. Active stack
w
Ans - a
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 27
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
a. Spamming
b. Identify Theft
c. Impersonation
d. Scanning
om
Ans - c
.............................................
t.c
What are some of the most common vulnerabilities that exist in a network or system?
es
b. Additional unused features on commercial software packages.
c. Utilizing open source application code
d. Balancing security concerns with functionality and ease of use of a system.
kt
Ans - b
.............................................
oc
m
What is the sequence of a TCP connection?
a. SYN-ACK-FIN
iib
b. SYN-SYN ACK-ACK
c. SYN-ACK
ca
d. SYN-SYN-ACK
Ans - b
iib
.............................................
a. DNSlookup
w
b. Whois
c. Nslookup
w
d. IP Network Browser
w
Ans - d
.............................................
c. To bypass a firewall
d. HTTP is a easy protocol to work with
Ans - c
.............................................
om
...... software are programs that are installed onto your computer and can scan and remove known
viruses which you may have contracted.
a. Firmmware
t.c
b. Adware
c. Keylogger
d. Antivirus
es
Ans - d
.............................................
kt
Which of the following describes programs that can run independently travel from system to system and
disrupt computer communication?
oc
m
a. Viruses
b. Trojans
c. Droppers
iib
d. Worm
ca
Ans - d
.............................................
iib
A ...... is a computer program that can replicate itself and spread from one computer to another.
a. Antivurs
.ja
b. PenDrive
c. Mouse
w
d. Computer Virus
w
Ans - d
.............................................
w
Which among the following are Malicious Softwares? (i) Virus and Worms, (ii) Trojan Horse and Time
Bomb, (iii) Logic Bomb and Rabbit and Bacterium
Ans - d
.............................................
om
a. Technology
b. Computers
c. Data
t.c
d. Networks
Ans - b
es
.............................................
kt
a. Bugs
b. Malware
oc
c. Systems software
m
d. Network snakes
Ans - b
iib
.............................................
ca
a. Zombie
iib
b. Android
c. E-Ogre
d. Dirty bot
.ja
Ans - a
w
.............................................
w
Ans - a
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 30
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
international cooperation and information exchange in order to reduce threat and increase resilience
d. All of the above.
Ans - c
t.c
.............................................
es
a. Monitor of Deception
b. Master of Deception
kt
c. Management of Deception
d. None of These
oc
Ans - b
m
.............................................
Authentication is ......
iib
a. modification
ca
b. insertion
c. hard to assure identity of user on a remote system
d. none of the above
iib
Ans - c
.............................................
.ja
...... are attempts by individuals to obtain confidential information from you to falsifying their identity.
w
a. Computer viruses
w
b. Phishing scams
c. Phishing trips
w
d. Spyware scams
Ans - b
.............................................
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 31
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
A virus that migrates freely within a large population of unauthorized email user is called a ......
a. flame war
b. worm
c. macro
d. plagiarism
om
Ans - c
.............................................
t.c
Which ports should be blocked to prevent null session enumeration?
es
b. Ports 135 and 136
c. Ports 110 and 137
d. Ports 135 and 139
kt
Ans - d
.............................................
oc
m
The first phase of hacking an IT system is compromise of which foundation of security?
a. Availability
iib
b. Confidentiality
c. Integrity
ca
d. Authentication
Ans - b
iib
.............................................
b. An attempt to crack passwords by replacing characters of a dictionary word with numbers and
symbols.
w
Ans - b
.............................................
What worm emailed people with the words "I LOVE YOU" in the year 2000?
Ans - a
.............................................
om
What type of virus describes the awful consequences of not acting immediately?
a. Android
t.c
b. Spoofing
c. Misleading e-mail
d. Phishing
es
Ans - c
.............................................
kt
Which of the following is not a typical characteristic of an ethical hacker?
oc
a. Excellent knowledge of Windows.
m
b. Understands the process of exploiting network vulnerabilities.
c. Patience, persistence and perseverance.
d. Has the highest level of security for the organization.
iib
Ans - d
ca
.............................................
What is it called when someone changes the FROM section of an email so that the message you receive
iib
appears to come from a person other than the one who sent it?
a. Spoofing
.ja
b. DoS
c. Spam
w
d. Trapper
w
Ans - a
.............................................
w
A ...... is a computer program that can invade computer and perform a variety of functions ranging from
annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files or destroying your hard
disk).
a. Ms Word
b. Ms Access
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 33
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
c. Antivirus
d. Computer Virus
Ans - d
.............................................
om
What is the proper command to perform an Nmap XMAS scan every 15 seconds?
t.c
c. nmap -sX -aggressive
d. nmap -sX -polite
es
Ans - a
.............................................
kt
What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
Ans - a
.............................................
ca
Ans - c
.............................................
w
What program would you use to gain administrative rights to someone's computer?
w
a. Bot
b. Executive Android
c. Rootkit
d. Trojan horse
Ans - c
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 34
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
a. Shared key
b. LEAP
c. TKIP
d. AES
om
Ans - c
.............................................
t.c
...... are often delivered to a PC through an email attachment and are often designed to do harm.
a. Spam
es
b. Email
c. Portals
d. Virus
kt
Ans - d
.............................................
oc
m
The altering of data so that it is not usable unless the changes are undone is ......
a. ergonomics
iib
b. compression
c. biometrics
ca
d. encryption
Ans - d
iib
.............................................
a. virus
w
b. trojan horse
c. time related bomb sequence
w
d. time bomb
w
Ans - d
.............................................
Ans - b
.............................................
om
Why would a ping sweep be used?
t.c
c. To identify open ports
d. To locate firewalls
es
Ans - a
.............................................
kt
Which computer virus records every movement you make on your computer?
a. Malware Android
oc
b. Key logger
m
c. DoS
d. Trapper
iib
Ans - b
.............................................
ca
iib
.ja
w
w
w
…………………………………………………………………………………………………………………………………………………………………
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
www.jaiibcaiibmocktest.com, www.bankpromotionexams.com, www.onlyforbankers.in 36
Facebook Groups -
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
murugan0501@gmail.com, admin@jaiibcaiibmocktest.com, 09994452442
…………………………………………………………………………………………………………………………………………………………………
om
t.c
es
kt
SAMPLE QUESTIONS FOR oc
CERTIFICATE EXAMINATION IN
m
PREVENTION OF CYBER CRIMES AND
iib
FRAUD MANAGEMENT
ca
iib
.ja
w
Though we had taken enough care to go through the questions, we shall not be responsible for
any loss or damage, resulting from any action taken on the basis of the contents. We advise
w
everyone to update yourself with the latest information through RBI website and other
authenticated sources. In case you find any incorrect/doubtful information, kindly update us
w
also (along with the source link/reference for the correct information) as lot of questions were
shared by many people.