ISA 3.0 E-Learning Assessment Test
ISA 3.0 E-Learning Assessment Test
org)
Status : Fail
Assessment Date : 10-02-2022 11:19:13 (GMT+05:30)
Performance Level : Low
20.00 L
Your Performance
Percentage
Category
Excellent
Outstanding level of performance indicates that the candidate has done excellent work and mastered the concepts.
High
High level of performance indicates that the candidate has done above average work and mastered almost all the concepts.
Moderate
Acceptable level of performance indicates that the candidate has done average work and has mastered many of the concepts.
Low
Needs improvement in performance indicates that the candidate has done and mastered very few or none of the concepts.
Performance Criteria
Module Test 2 (ISA Module Test2) 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below 18.00
SECTION (GROUP) EXCELLENT HIGH MODERATE LOW
Overall Score 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below and equal to 18.00
Module Test
2 (ISA
6.00 13:35 20.00% 20.00% 30 30 17 6 11 13 0
Module
Test2)
Note:The percentage (%) and accuracy below the prescribed values (60 %) are shown in red color
Section-wise marks
Module Test 2, 6
Module Test 2
Impact of Incorrect Responses
Below table provides the marks lost due to incorrect responses.
SECTION(GROUP) NUMBER OF INCORRECT RESPONSES MARKS LOST DUE TO INCORRECT RESPONSES TOTAL SCORE IF INCORRECT RESPONSES WERE NOT MARKED
Overall 11 0 6.00
In order to attempt more accurately, consider the following suggestions while attempting the questions:
1. If you are not able to solve a question correctly or have doubts in your approach towards the solution, skip it for later.
2. Quickly revise the steps for avoiding calculation or casual mistakes.
3. Avoid guesswork.
Time Management
Below table shows the time you spent in each section.
SECTION (GROUP) TIME SPENT BY YOU (IN MINS)
Recommendations
1. It is essential for each aspirant to plan and schedule time for each section diligently. This is important to score well in each section and ultimately meet the cut-off.
2. This will also help you in attempting all the questions in each section and hence not missing the opportunity to score more.
SECTION(GROUP) CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED
Overall 0 0 0 0 0
It is suggested that guesswork should be avoided for any type of response changes. It has been observed that more often than not, guesswork leads to an incorrect
response thereby inviting negative marks which in turn has an adverse effect on the overall rank.
You must use your knowledge, observation and elimination skills to arrive at the correct answer.
Interpretation and Suggestions
1. Incorrect to incorrect response change:
You may need to work more on the concept level, in order to gain confidence.
2. Incorrect to correct response change:
At the first glance you were not very sure about the solution.
You must spend at least 1 minute per question and if you are not able to reach to the solution, you must revisit the question to enhance your score.
Perform this response change only when you are confident or have spotted a mistake in the solution of your first response.
3. Correct to incorrect response change:
You are not sure of the solution and have either applied a wrong concept or made a calculation mistake.
You need to practice more questions on the same concept.
4. Correct to unanswered response change:
You are not sure of the solution
You need to practice more questions on the same concept.
Perform this response change only when you are not confident of your solution.
You must try to spend at least 1 min before leaving it unanswered.
5. Incorrect to unanswered response change:
Your judgment of avoiding negative marks is right.
You must try to spend at least 1 min before leaving it unanswered.
MARKS SCORED BY YOU YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TIME SPENT BY YOU (IN MINS)
MARKS SCORED BY YOU YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TIME SPENT BY YOU (IN MINS)
Note:The percentage (%) and accuracy below the prescribed values (60%) are shown in red color
InCorrect, 11 Correct, 6
UnAnswered, 13
= Not Evaluated = Evaluated = Correct = Incorrect = Not Attempted = Marked for Review
= Answered = Correct Option = Your Option
Question Details
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q2. Security software belongs to which of the following category?
Status : Answered
Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q3. Which of the following database language retrieves, inserts and deletes data of a relational database model?
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Status : Answered
Options :
1. Cryptanalysis
2. Cryptology
3. Hash Function
4. Coding
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q5. Which of the following is the Configuration identification aspect of Configuration Management System?
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q6. Which of the following services is included in the core of the CBS?
Status : Answered
Options :
1. Internet Banking
2. RTGS
3. Data warehouse
4. Cheque Truncation System
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q7. Which of the following performs stateful packet inspection, enables secure remote access to networks and prevents malicious
payloads and centralised reporting as the basic features?
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q8. In which of the following WAN message transmission technology, once the route is established, all packets follow the route but it
logical connection for fix duration?
Status : Answered
Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q9. Which of the following is the Configuration Control aspect of Configuration Management System?
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q10. Which of the following WAN switching technology known as store-and-forward switching?
Status : Answered
Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q11. Which of the following statement is correct about the firewall?
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q12. Which of the following set of techniques that permit the simultaneous transmission of multiple signals on a single carrier?
Status : Answered
Options :
1. Multiplexing
2. Switching
3. Routing
4. Tunnelling
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q13. Which of the following firewall implementation contains two NICs: one connected to the external network, and other
connected to the internal network?
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q14. Which of the following is most commonly used network topology in the local area network?
Status : Answered
Options :
1. Bus
2. Ring
3. Star
4. Mesh
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Status : Answered
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Status : Answered
Options :
1. All the entries in any column are of the same type or same domain
2. Ordering of rows and columns is significant.
3. Duplicate rows are allowed.
4. All data items stored in the columns are atomic in nature, that is, they can be split further without loss of information.
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q17. Which of the following statement is correct for public key cryptography (PKI)?
Status : Answered
Options :
1. It is also known as secret key cryptography
2. Identity of the owner of the digital certificate is bind with Public key
3. The key pair consists of one public and one private key that are mathematically unrelated
4. private key of the digital certifivate is known to the owner and Certfying Authority
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q18. Which of the following secondary storage media creates microscopic pits on the surface of a disc?
Status : Unanswered
Options :
1. HDD
2. Flash drive
3. VRAM
4. DVD
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Status : Unanswered
Options :
1. Provides mechanism for deadlock handling
2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q20. Which of the following statement refers to internal schema of relational database model?
Status : Unanswered
Options :
1. Contains the logical structure of the entire database
2. Individual users are given different views according to the user’s requirement.
3. Represents all entities, their attributes and their relationships
4. Concerned with storage space allocation, Record descriptions, Records placement, Data Compression and Data Encryption Techniques
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q21. Which of the following network topology is having highest fault tolerance?
Status : Unanswered
Options :
1. Bus
2. Ring
3. Star
4. Mesh
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q22. Which of the following operating system is used to run multiple tasks simultaneously by sharing the CPU time?
Status : Unanswered
Options :
1. Multi-tasking OS
2. Real time OS
3. Multi-processing OS
4. Multi-threading OS
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q23. Which of the following is a one-way encryption?
Status : Unanswered
Options :
1. Secret-key cryptography
2. Public key cryptography
3. Asymmetric key cryptography
4. Hash Function
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Status : Unanswered
Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q25. Which of the following IDS detection methodology assumes that an intrusion can be detected by observing a deviation from
the normal?
Status : Unanswered
Options :
1. Statistical Anomaly Based
2. Attack signature
3. Task-based
4. Signature-based
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q26. Which of the following is known Root Certifying Authority?
Status : Unanswered
Options :
1. Certifying Authority
2. Controller of Certifying Authority
3. Registering Authority
4. Chief Certifying Authority
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q27. Which of the following manages the Asymmetric Keys, and a means of certifying the authenticity of holder of the key?
Status : Unanswered
Options :
1. PKI
2. SSL
3. HTTPS
4. S/MIME
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q28. The applications which are not a part of the Core Banking Solution have an interface built (through middleware) with CBS.
Which of the following application is having seamless integration with CBS?
Status : Unanswered
Options :
1. Internet Banking
2. Automated Teller Machine (ATM)
3. MPLS
4. NPCI
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Q29. Which of the following decides about the route based on the latest routing information gathered from connected routers?
Status : Unanswered
Options :
1. Static router
2. Dynamic router
3. Packet filtering router
4. Gateway
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Status : Unanswered
Options :
1. Secret-key cryptography
2. Hash Function
3. Coding
4. Asymmetric key cryptography
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED
0 0 0 0 0
Error Identification and Rectification: Module Test 2