• HOME
  • FAQs
  • SAMPLE VIDEOS
  • SHOPPING CART
  • CONTACT US
COMPETZ - Makes You Compete

SOLVED JAIIB COMBINED PAPER 9:

1. The frauds and other kind of crimes that happen on the internet network are called ......
(i) Internet crimes, (ii) Cyber crimes

a. Only (i)
b. Only (ii)
c. Either (i) or (ii)
d. Both (i) and (ii)

Ans - b
2. Banknet was set up in ......
A. 1971
B. 1981
C. 1991
D. 2001

Ans - C


3. The committee that gave its recommendation for drawing a perspective plan of computerization for the period 1990-94:
a. Shere Committee
b. Narasimham Committee
c. Rangarajan Committee
d. Saraf Committee

Ans - c
4. Which of the following is the instrument of payment called Plastic Money?
(i) Debit card, (ii) Credit card, (iii) Banker's cheque

a. Only (i) and (ii)
b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

Ans - a
5. Which of the following incident can be treated as part of the cyber crime activity?
(i) Misusing a credit card,
(ii) Transmitting unlawful data from one part of the globe to another
(iii) Using the network for drug trafficking

a. Only (i) and (ii)
b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

Ans - a
6. Example of Duplex mode of communication is ......
A. Radio broadcast
B. walkie talkie
C. Four-wire modems
D. All of the above

Ans - c

7. 
A settlement system in which the processing and final payment of funds transfer instructions takes place continuously, is called ......
a. debit clearing system
b. credit clearing system
c. national clearing system
d. real time gross settlement

Ans - d
8. The term SWIFT do not stand for which of the following?
(i) Society for world-over international financial transfers,
(ii) Society for world-wide inter-bank financial telecommunication,
(iii) Society for world-wide inter-bank financial transfers

a. Only (i) and (ii)
b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

Ans - b
9.The firewall technology is not used in connection with ......
(i) Physical safety,
(ii) authorized access,
(iii) Protection of computer network from intrusion by hackers

a. Only (i) and (ii)
b. Only (i) and (iii)
c. Only (ii) and (iii)
d. (i), (ii) and (iii)

Ans - a
10. Digital Signature consists of ......
A. Message Only
B. Random Number Only
C. Both A and B
D. None of these

Ans - C

11. 
Bank-net was set up by ......
A. IBA
B. RBI
C. Central Govt
D. None of the above

Ans - b

12. 
IDRBT stands for ......
a. Institute for Development and Research in Banking Technology
b. Institute for Development and Research in Business Technology
c. Institution of Development and Research in Banking Technology
d. Institute for Development of Rural Banking Technology

Ans - a

BACK

BACK TO JAIIB AND CAIIB  HOME PAGE

  For any Queries : Feel Free to get in touch with us in the below -
WhatsApp : 94881 86920
 Mail us at : 
competz.org@gmail.com

COMPETZ@2022. All Rights Reserved.