0% found this document useful (0 votes)
2K views20 pages

ISA 3.0 E-Learning Assessment Test

The document provides a performance assessment summary for Aniket Jaichand Gangwal. It indicates that his overall score was 6 out of 30, placing him in the "Low" performance category. The summary includes recommendations to improve his conceptual understanding and address specific weaknesses by practicing more questions. Graphs and tables analyze his performance in different sections and the impact of incorrect responses. Suggestions focus on managing time effectively and avoiding guessing to improve his accuracy and score.

Uploaded by

CAAniketGangwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views20 pages

ISA 3.0 E-Learning Assessment Test

The document provides a performance assessment summary for Aniket Jaichand Gangwal. It indicates that his overall score was 6 out of 30, placing him in the "Low" performance category. The summary includes recommendations to improve his conceptual understanding and address specific weaknesses by practicing more questions. Graphs and tables analyze his performance in different sections and the impact of incorrect responses. Suggestions focus on managing time effectively and avoiding guessing to improve his accuracy and score.

Uploaded by

CAAniketGangwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

ANIKET JAICHAND GANGWAL (160618@icai.

org)
Status : Fail
Assessment Date : 10-02-2022 11:19:13 (GMT+05:30)
Performance Level : Low

6.00 30.00 10.00


Your Total Assessment Cut-Off marks
Score
Score (Pass Marks)

20.00 L
Your Performance
Percentage
Category

This report helps you to achieve your targets


as per below stated objectives:
Improve your conceptual understanding
Address specific areas of improvement personalized
to you
Performance Categories
Based on the performance of the students, we have framed the following categories to place you in accordance with your performance

Performance Category Definitions

Excellent
Outstanding level of performance indicates that the candidate has done excellent work and mastered the concepts.
High
High level of performance indicates that the candidate has done above average work and mastered almost all the concepts.
Moderate
Acceptable level of performance indicates that the candidate has done average work and has mastered many of the concepts.
Low
Needs improvement in performance indicates that the candidate has done and mastered very few or none of the concepts.

Performance Criteria

PERFORMANCE CATEGORY RANGE

Excellent 91% to 100% of Max Marks

High 81% to 90% of Max Marks

Moderate 61% to 80% of Max Marks

Low Below 60% of Max Marks

Performance Category based on student marks

SECTION (GROUP) EXCELLENT HIGH MODERATE LOW

Module Test 2 (ISA Module Test2) 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below 18.00
SECTION (GROUP) EXCELLENT HIGH MODERATE LOW

Overall Score 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below and equal to 18.00

Where do you stand?

SECTION (GROUP) SCORE PERFORMANCE CATEGORY

Module Test 2 (ISA Module Test2) 6.00 / 30.00 L

Overall Score 6.00 / 30.00 L

Recommendations and Suggestions


1. Based on your overall scores:
Your overall score falls in the L category.
Please attain more knowledge and practice more number of questions.
2. Based on your section-wise performance:
You seem to be inadequate in all sections. Please attain more knowledge and practice more number of questions.
3. Some general suggestions to optimize your score:
The best performers plan and allocate equal time to each section.

Overall Performance Analysis


The below table shows section-wise analysis of marks scored by you, time spent by you, your percentage, your accuracy and number of correct, incorrect,
unanswered and marked for review questions.

MARKS TIME YOUR YOUR MAX NO OF MARKED


SECTION SPENT BY TOTAL QUESTIONS
(GROUP) SCORED SECTION SECTION QUESTIONS QUESTIONS - TO ATTEMPTED CORRECT INCORRECT UNANSWERED FOR
BY YOU YOU (IN PERCENTAGE ACCURACY ATTEMPT REVIEW
MINS)
MARKS TIME YOUR YOUR MAX NO OF MARKED
SECTION SPENT BY TOTAL QUESTIONS
(GROUP) SCORED SECTION SECTION QUESTIONS QUESTIONS - TO ATTEMPTED CORRECT INCORRECT UNANSWERED FOR
BY YOU YOU (IN PERCENTAGE ACCURACY ATTEMPT REVIEW
MINS)

Module Test
2 (ISA
6.00 13:35 20.00% 20.00% 30 30 17 6 11 13 0
Module

Test2)

Total 6.00 13:35 20.00% 20.00% 30 30 17 6 11 13 0

Note:The percentage (%) and accuracy below the prescribed values (60 %) are shown in red color

Below pie-chart shows section-wise percentage of marks scored

Section-wise marks

Module Test 2, 6

Module Test 2
Impact of Incorrect Responses
Below table provides the marks lost due to incorrect responses.

SECTION(GROUP) NUMBER OF INCORRECT RESPONSES MARKS LOST DUE TO INCORRECT RESPONSES TOTAL SCORE IF INCORRECT RESPONSES WERE NOT MARKED

Module Test 2(grp1) 11 0 6

Overall 11 0 6.00

In order to attempt more accurately, consider the following suggestions while attempting the questions:

1. If you are not able to solve a question correctly or have doubts in your approach towards the solution, skip it for later.
2. Quickly revise the steps for avoiding calculation or casual mistakes.
3. Avoid guesswork.

Overall Preparedness Analysis


The below table represents the percentage of correct questions achieved at the analysis level.
Conceptual errors, for which you would require more reading and understanding of concepts.
Minor or careless mistakes, for which you would require a more composed and calm approach towards solving the question paper.

Time Management
Below table shows the time you spent in each section.
SECTION (GROUP) TIME SPENT BY YOU (IN MINS)

Module Test 2 (ISA Module Test2) 13:35

Total time spent 13:35

Recommendations
1. It is essential for each aspirant to plan and schedule time for each section diligently. This is important to score well in each section and ultimately meet the cut-off.
2. This will also help you in attempting all the questions in each section and hence not missing the opportunity to score more.

Response Change Pattern


Below table provides the number of times you have changed your responses while answering the test and also the nature of those response changes.

SECTION(GROUP) CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED

Module Test 2 (ISA Module Test2) 0 0 0 0 0

Overall 0 0 0 0 0

It is suggested that guesswork should be avoided for any type of response changes. It has been observed that more often than not, guesswork leads to an incorrect
response thereby inviting negative marks which in turn has an adverse effect on the overall rank.
You must use your knowledge, observation and elimination skills to arrive at the correct answer.
Interpretation and Suggestions
1. Incorrect to incorrect response change:
You may need to work more on the concept level, in order to gain confidence.
2. Incorrect to correct response change:
At the first glance you were not very sure about the solution.
You must spend at least 1 minute per question and if you are not able to reach to the solution, you must revisit the question to enhance your score.
Perform this response change only when you are confident or have spotted a mistake in the solution of your first response.
3. Correct to incorrect response change:
You are not sure of the solution and have either applied a wrong concept or made a calculation mistake.
You need to practice more questions on the same concept.
4. Correct to unanswered response change:
You are not sure of the solution
You need to practice more questions on the same concept.
Perform this response change only when you are not confident of your solution.
You must try to spend at least 1 min before leaving it unanswered.
5. Incorrect to unanswered response change:
Your judgment of avoiding negative marks is right.
You must try to spend at least 1 min before leaving it unanswered.

Overview: Module Test 2


The below table provides your marks in Module Test 2 along with the average marks scored by the others (students who cleared this assessment) and the marks
scored by the topper.

MARKS SCORED BY YOU YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TIME SPENT BY YOU (IN MINS)
MARKS SCORED BY YOU YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TIME SPENT BY YOU (IN MINS)

6.00 / 30.00 20.00% 20.00% 13:35

Note:The percentage (%) and accuracy below the prescribed values (60%) are shown in red color

Question wise Analysis

InCorrect, 11 Correct, 6

Marked for Review, 0

UnAnswered, 13

Correct InCorrect UnAnswered Marked for Review

Performance Analysis: Module Test 2


1. The below table analyzes your performance at question level
2. It highlights conceptually strong and improvement areas within the section and areas that require reinforcement of concepts.
3. The accuracy of the response to each question and time spent are correlated and interpreted in terms of expert advice on preparedness level.

Question wise details


Please click on question to view detailed analysis

= Not Evaluated = Evaluated = Correct = Incorrect = Not Attempted = Marked for Review
= Answered = Correct Option = Your Option

Question Details

Q1. Which of the following is the function of processor management?

Status : Answered

Options :

1. Provides mechanism for deadlock handling


2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q2. Security software belongs to which of the following category?

Status : Answered

Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q3. Which of the following database language retrieves, inserts and deletes data of a relational database model?

Status : Answered

Options :

1. Data Definition Language (DDL)


2. DML (Data Manipulation Language
3. TCL (Transmission Control Language)
4. DCL (Data Control Language)

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q4. Cryptography is a branch of which of the following?

Status : Answered

Options :

1. Cryptanalysis
2. Cryptology
3. Hash Function
4. Coding

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q5. Which of the following is the Configuration identification aspect of Configuration Management System?

Status : Answered

Options :

1. Configuration, version of the items


2. Version control
3. All Items are correctly identified
4. Ensures that latest approved version of items are used

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q6. Which of the following services is included in the core of the CBS?

Status : Answered

Options :
1. Internet Banking
2. RTGS
3. Data warehouse
4. Cheque Truncation System

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q7. Which of the following performs stateful packet inspection, enables secure remote access to networks and prevents malicious
payloads and centralised reporting as the basic features?

Status : Answered

Options :

1. Stateful Inspection Firewall


2. Unified Theatre Monitoring (UTM)
3. Intrusion Prevention System (IPS)
4. Intrusion Detection System (IDS)

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q8. In which of the following WAN message transmission technology, once the route is established, all packets follow the route but it
logical connection for fix duration?

Status : Answered

Options :

1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q9. Which of the following is the Configuration Control aspect of Configuration Management System?

Status : Answered

Options :

1. Configuration, version of the items


2. Configuration of components of these Items
3. All Items are correctly identified
4. Ensures that latest approved version of items are used

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q10. Which of the following WAN switching technology known as store-and-forward switching?

Status : Answered

Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q11. Which of the following statement is correct about the firewall?

Status : Answered

Options :

1. Firewalls can enforce password policy and prevent misuse of passwords.


2. Firewalls are effective against non-technical security risks
3. Firewalls cannot stop internal users from accessing websites with malicious code
4. A firewall can prevent users or attackers with modems from dialling-in or dialling-out of the internal network

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q12. Which of the following set of techniques that permit the simultaneous transmission of multiple signals on a single carrier?

Status : Answered

Options :
1. Multiplexing
2. Switching
3. Routing
4. Tunnelling

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q13. Which of the following firewall implementation contains two NICs: one connected to the external network, and other
connected to the internal network?

Status : Answered

Options :

1. Packet filtering routers


2. Single-homed firewalls
3. Dual-homed firewalls
4. Screened subnet firewalls (DMZ)

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q14. Which of the following is most commonly used network topology in the local area network?

Status : Answered

Options :

1. Bus
2. Ring
3. Star
4. Mesh

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q15. Which of the following is the function of memory management?

Status : Answered

Options :

1. Provides mechanism for deadlock handling


2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q16. Which of the following rule relates to relational database model?

Status : Answered

Options :
1. All the entries in any column are of the same type or same domain
2. Ordering of rows and columns is significant.
3. Duplicate rows are allowed.
4. All data items stored in the columns are atomic in nature, that is, they can be split further without loss of information.

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q17. Which of the following statement is correct for public key cryptography (PKI)?

Status : Answered

Options :
1. It is also known as secret key cryptography
2. Identity of the owner of the digital certificate is bind with Public key
3. The key pair consists of one public and one private key that are mathematically unrelated
4. private key of the digital certifivate is known to the owner and Certfying Authority

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q18. Which of the following secondary storage media creates microscopic pits on the surface of a disc?

Status : Unanswered

Options :

1. HDD
2. Flash drive
3. VRAM
4. DVD

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q19. Which of the following is the function of File management?

Status : Unanswered

Options :
1. Provides mechanism for deadlock handling
2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q20. Which of the following statement refers to internal schema of relational database model?

Status : Unanswered

Options :
1. Contains the logical structure of the entire database
2. Individual users are given different views according to the user’s requirement.
3. Represents all entities, their attributes and their relationships
4. Concerned with storage space allocation, Record descriptions, Records placement, Data Compression and Data Encryption Techniques

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q21. Which of the following network topology is having highest fault tolerance?

Status : Unanswered

Options :
1. Bus
2. Ring
3. Star
4. Mesh

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q22. Which of the following operating system is used to run multiple tasks simultaneously by sharing the CPU time?

Status : Unanswered

Options :
1. Multi-tasking OS
2. Real time OS
3. Multi-processing OS
4. Multi-threading OS

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q23. Which of the following is a one-way encryption?

Status : Unanswered

Options :
1. Secret-key cryptography
2. Public key cryptography
3. Asymmetric key cryptography
4. Hash Function

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q24. SAP belongs to which of the following category?

Status : Unanswered

Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q25. Which of the following IDS detection methodology assumes that an intrusion can be detected by observing a deviation from
the normal?

Status : Unanswered

Options :
1. Statistical Anomaly Based
2. Attack signature
3. Task-based
4. Signature-based

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q26. Which of the following is known Root Certifying Authority?

Status : Unanswered

Options :
1. Certifying Authority
2. Controller of Certifying Authority
3. Registering Authority
4. Chief Certifying Authority

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q27. Which of the following manages the Asymmetric Keys, and a means of certifying the authenticity of holder of the key?

Status : Unanswered

Options :

1. PKI
2. SSL
3. HTTPS
4. S/MIME

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q28. The applications which are not a part of the Core Banking Solution have an interface built (through middleware) with CBS.
Which of the following application is having seamless integration with CBS?

Status : Unanswered

Options :
1. Internet Banking
2. Automated Teller Machine (ATM)
3. MPLS
4. NPCI

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q29. Which of the following decides about the route based on the latest routing information gathered from connected routers?

Status : Unanswered

Options :

1. Static router
2. Dynamic router
3. Packet filtering router
4. Gateway

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Q30. Which of the following is Public Key Cryptography (PKI)?

Status : Unanswered

Options :
1. Secret-key cryptography
2. Hash Function
3. Coding
4. Asymmetric key cryptography

Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0

Your Response Change Pattern: Module Test 2


The below table provides the number of times you have changed your responses to the Module Test 2 questions and also the nature of those response changes.

CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED

0 0 0 0 0
Error Identification and Rectification: Module Test 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy