IBPS SO(IT officer) Professional Knowledge Questions – Set 7

Dear Aspirants,
Welcome to the Professional Knowledge Section in Affairscloud.com. Here we are providing sample questions. It will be useful for the IBPS SO IT officer. We have also included some important questions that are repeatedly asked in previous exams.

  1. Which of the following is/are routing protocol(s)?
    A. Appletalk
    B. IPX
    C. TCP/IP
    D. All of the above
    Answer
  2. An assembler that runs on one machine but produces machine code for another machine is called ________
    A. Simulator
    B. Cross Assembler
    C. Boot-strap loader
    D. None of the above
    Answer
  3. The two basic types of record access methods are _______
    A. Direct and indirect
    B. On-line and real-time
    C. Sequential and random
    D. Direct and Sequential
    Answer
  4. Which of the following is/are valid Protocol Data Units(PDU)?
    A. Packets
    B. Frame
    C. Segments
    D. All of the above
    Answer
  5. Which of the following is/are type of UNIX Shell?
    A. Korn Shell
    B. Bourne Shell
    C. C Shell
    D. All of the above
    Answer
  6. Which of the following is/are advantages of Virtual LANs (VLANs)?
    A. They increase switching throughput
    B. They reduce switching overhead
    C. They simplify the adding, moving and changing of users
    D. All of the above
    Answer
  7. If a denormalization situation exists with a one to one binary relationship then all fields are stored in ______
    A. four relations
    B. one relation
    C. three relations
    D. two relations
    Answer
  8. Which of the following is/are advantages of using VLAN Trunking Protocol (VTP) in a switching environment?
    A. It allows switches to read tags
    B. It enables VLANs to span multiple switches.
    C. It simplifies the scalability of the switched work
    D. All of the above
    Answer
  9. When a network has multiple bridges and is using Spanning Tree Protocol, how is the root bridge determined?
    A. The bridge with the lowest ID number assumes the root bridge role.
    B. The bridge with the highest ID number assumes the root bridge role.
    C. The bridge with the lowest MAC address is always the root bridge.
    D. All of the above
    Answer
  10. Which of the following is/are congestion control algorithm(S)?
    A. Resource reSerVation Protocol (RSVP)
    B. Token Bucket
    C. The leaky Bucket
    D. All of the above
    Answer