SlideShare a Scribd company logo
28.00
Your Total
Score
30.00
Assessment
Score
10.00
Cut-Off marks
(Pass Marks)
93.33
Your
Percentage
E
Performance
Category
JACKSON ABRAHAM THEKKEKARA .
(237650@icai.org)
Status : Pass
Assessment Date : 20-02-2023 14:11:41 (GMT+05:30)
Performance Level : Excellent
This report helps you to achieve your targets
as per below stated objectives:
Improve your conceptual understanding
Address specific areas of improvement personalized
to you
Performance Categories
Based on the performance of the students, we have framed the following categories to place you in accordance with your performance
Performance Category Definitions
Excellent
Outstanding level of performance indicates that the candidate has done excellent work and mastered the concepts.
High
High level of performance indicates that the candidate has done above average work and mastered almost all the concepts.
Moderate
Acceptable level of performance indicates that the candidate has done average work and has mastered many of the concepts.
Low
Needs improvement in performance indicates that the candidate has done and mastered very few or none of the concepts.
Performance Criteria
Performance Category based on student marks
PERFORMANCE CATEGORY RANGE
Excellent 91% to 100% of Max Marks
High 81% to 90% of Max Marks
Moderate 61% to 80% of Max Marks
Low Below 60% of Max Marks
SECTION (GROUP) EXCELLENT HIGH MODERATE LOW
Module Test 2 (ISA Module Test2) 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below 18.00
Where do you stand?
Overall Performance Analysis
The below table shows section-wise analysis of marks scored by you, time spent by you, your percentage, your accuracy and number of correct, incorrect,
unanswered and marked for review questions.
SECTION (GROUP) EXCELLENT HIGH MODERATE LOW
Overall Score 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below and equal to 18.00
SCORE
28.00 / 30.00
28.00 / 30.00
SECTION (GROUP) PERFORMANCE CATEGORY
Module Test 2 (ISA Module Test2) E
Overall Score E
Recommendations and Suggestions
1. Based on your overall scores:
Your overall score falls in the E category. Congrats and try to increase accuracy and speed to score more.
2. Based on your section-wise performance:
You seem to be strong in Module Test 2. So it is suggested that you attempt Module Test 2 section first
3. Some general suggestions to optimize your score:
The best performers plan and allocate equal time to each section.
Below pie-chart shows section-wise percentage of marks scored
28.00 6:11 93.33% 93.33% 30 30 30 28 2 0 0
28.00 6:11 93.33% 93.33% 30 30 30 28 2 0 0
SECTION
(GROUP)
MARKS
SCORED
BY YOU
TIME
SPENT
BY YOU
(IN MINS)
YOUR SECTION
PERCENTAGE
YOUR
SECTION
ACCURACY
TOTAL
QUESTIONS
MAX NO OF
QUESTIONS -
TO ATTEMPT
QUESTIONS
ATTEMPTED CORRECT INCORRECT UNANSWERED
MARKED
FOR
REVIEW
Module
Test 2 (ISA
Module
Test2)
Total
Note:The percentage (%) and accuracy below the prescribed values (60 %) are shown in red color
Impact of Incorrect Responses
Below table provides the marks lost due to incorrect responses.
Module Test 2, 28
Module Test 2
Section-wise marks
SECTION(GROUP) NUMBER OF INCORRECT RESPONSES MARKS LOST DUE TO INCORRECT RESPONSES TOTAL SCORE IF INCORRECT RESPONSES WERE NOT MARKED
2 0 28
2 0 28.00
Module Test 2(grp1)
Overall
In order to attempt more accurately, consider the following suggestions while attempting the questions:
Overall Preparedness Analysis
The below table represents the percentage of correct questions achieved at the analysis level.
Conceptual errors, for which you would require more reading and understanding of concepts.
Minor or careless mistakes, for which you would require a more composed and calm approach towards solving the question paper.
Time Management
Below table shows the time you spent in each section.
p y g gg p g q
1. If you are not able to solve a question correctly or have doubts in your approach towards the solution, skip it for later.
2. Quickly revise the steps for avoiding calculation or casual mistakes.
3. Avoid guesswork.
TIME SPENT BY YOU (IN MINS)
6:11
6:11
SECTION (GROUP)
Module Test 2 (ISA Module Test2)
Total time spent
Recommendations
1. It is essential for each aspirant to plan and schedule time for each section diligently. This is important to score well in each section and ultimately meet the cut-off.
Response Change Pattern
Below table provides the number of times you have changed your responses while answering the test and also the nature of those response changes.
2. This will also help you in attempting all the questions in each section and hence not missing the opportunity to score more.
SECTION(GROUP) CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED
0 0 0 0 0
0 0 0 0 0
Module Test 2 (ISA Module Test2)
Overall
It is suggested that guesswork should be avoided for any type of response changes. It has been observed that more often than not, guesswork leads to an incorrect
response thereby inviting negative marks which in turn has an adverse effect on the overall rank.
You must use your knowledge, observation and elimination skills to arrive at the correct answer.
Interpretation and Suggestions
1. Incorrect to incorrect response change:
You may need to work more on the concept level, in order to gain confidence.
2. Incorrect to correct response change:
At the first glance you were not very sure about the solution.
You must spend at least 1 minute per question and if you are not able to reach to the solution, you must revisit the question to enhance your score.
Perform this response change only when you are confident or have spotted a mistake in the solution of your first response.
3. Correct to incorrect response change:
You are not sure of the solution and have either applied a wrong concept or made a calculation mistake.
You need to practice more questions on the same concept.
4. Correct to unanswered response change:
You are not sure of the solution
You need to practice more questions on the same concept.
Overview: Module Test 2
The below table provides your marks in Module Test 2 along with the average marks scored by the others (students who cleared this assessment) and the marks
scored by the topper.
Note:The percentage (%) and accuracy below the prescribed values (60%) are shown in red color
Perform this response change only when you are not confident of your solution.
You must try to spend at least 1 min before leaving it unanswered.
5. Incorrect to unanswered response change:
Your judgment of avoiding negative marks is right.
You must try to spend at least 1 min before leaving it unanswered.
28.00 / 30.00 93.33% 93.33% 6:11
MARKS SCORED BY YOU YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TIME SPENT BY YOU (IN MINS)
Performance Analysis: Module Test 2
1. The below table analyzes your performance at question level
2. It highlights conceptually strong and improvement areas within the section and areas that require reinforcement of concepts.
3. The accuracy of the response to each question and time spent are correlated and interpreted in terms of expert advice on preparedness level.
Question wise details
Please click on question to view detailed analysis
Marked for Review, 0
UnAnswered, 0
InCorrect, 2
Correct, 28
Correct InCorrect UnAnswered Marked for Review
Question wise Analysis
= Not Evaluated = Evaluated = Correct = Incorrect = Not Attempted = Marked for Review
= Answered = Correct Option = Your Option
Question Details
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q1. Which of the following WAN switching technology known as store-and-forward switching?
Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q2. Which of the following rule relates to relational database model?
Options :
1. All the entries in any column are of the same type or same domain
2. Ordering of rows and columns is significant.
3. Duplicate rows are allowed.
4. All data items stored in the columns are atomic in nature, that is, they can be split further without loss of information.
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q3. Which of the following services is included in the core of the CBS?
Options :
1. Internet Banking
2. RTGS
3. Data warehouse
4. Cheque Truncation System
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q4. Which of the following manages the Asymmetric Keys, and a means of certifying the authenticity of holder of the key?
Options :
1. PKI
2. SSL
3. HTTPS
4. S/MIME
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q5. Which of the following decides about the route based on the latest routing information gathered from connected routers?
Options :
1. Static router
2. Dynamic router
3. Packet filtering router
4. Gateway
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q6. Which of the following set of techniques that permit the simultaneous transmission of multiple signals on a single carrier?
Options :
1. Multiplexing
2. Switching
3. Routing
4. Tunnelling
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q7. SAP belongs to which of the following category?
Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q8. Which of the following is the Configuration Control aspect of Configuration Management System?
Options :
1. Configuration, version of the items
2. Configuration of components of these Items
3. All Items are correctly identified
4. Ensures that latest approved version of items are used
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q9. Which of the following is the function of File management?
Options :
1. Provides mechanism for deadlock handling
2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q10. In which of the following WAN message transmission technology, once the route is established, all packets follow the route but
it is logical connection for fix duration?
Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q11. Which of the following IDS detection methodology assumes that an intrusion can be detected by observing a deviation from
the normal?
Options :
1. Statistical Anomaly Based
2. Attack signature
3. Task-based
4. Signature-based
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q12. Which of the following firewall implementation contains two NICs: one connected to the external network, and other
connected to the internal network?
Options :
1. Packet filtering routers
2. Single-homed firewalls
3. Dual-homed firewalls
4. Screened subnet firewalls (DMZ)
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q13. Which of the following statement is correct about the firewall?
Options :
1. Firewalls can enforce password policy and prevent misuse of passwords.
2. Firewalls are effective against non-technical security risks
3. Firewalls cannot stop internal users from accessing websites with malicious code
4. A firewall can prevent users or attackers with modems from dialling-in or dialling-out of the internal network
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q14. Which of the following is the Configuration identification aspect of Configuration Management System?
Options :
1. Configuration, version of the items
2. Version control
3. All Items are correctly identified
4. Ensures that latest approved version of items are used
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q15. Which of the following database language retrieves, inserts and deletes data of a relational database model?
Options :
1. Data Definition Language (DDL)
2. DML (Data Manipulation Language
3. TCL (Transmission Control Language)
4. DCL (Data Control Language)
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q16. Which of the following operating system is used to run multiple tasks simultaneously by sharing the CPU time?
Options :
1. Multi-tasking OS
2. Real time OS
3. Multi-processing OS
4. Multi-threading OS
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q17. Which of the following secondary storage media creates microscopic pits on the surface of a disc?
Options :
1. HDD
2. Flash drive
3. VRAM
4. DVD
Status : Incorrect
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q18. The applications which are not a part of the Core Banking Solution have an interface built (through middleware) with CBS.
Which of the following application is having seamless integration with CBS?
Options :
1. Internet Banking
2. Automated Teller Machine (ATM)
3. MPLS
4. NPCI
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q19. Cryptography is a branch of which of the following?
Options :
1. Cryptanalysis
2. Cryptology
3. Hash Function
4. Coding
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q20. Which of the following is Public Key Cryptography (PKI)?
Options :
1. Secret-key cryptography
2. Hash Function
3. Coding
4. Asymmetric key cryptography
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q21. Which of the following performs stateful packet inspection, enables secure remote access to networks and prevents malicious
payloads and centralised reporting as the basic features?
Options :
1. Stateful Inspection Firewall
2. Unified Theatre Monitoring (UTM)
3. Intrusion Prevention System (IPS)
4. Intrusion Detection System (IDS)
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q22. Which of the following network topology is having highest fault tolerance?
Options :
1. Bus
2. Ring
3. Star
4. Mesh
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q23. Which of the following is a one-way encryption?
Options :
1. Secret-key cryptography
2. Public key cryptography
3. Asymmetric key cryptography
4. Hash Function
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q24. Which of the following statement is correct for public key cryptography (PKI)?
Options :
1. It is also known as secret key cryptography
2. Identity of the owner of the digital certificate is bind with Public key
3. The key pair consists of one public and one private key that are mathematically unrelated
4. private key of the digital certifivate is known to the owner and Certfying Authority
Status : Incorrect
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q25. Which of the following statement refers to internal schema of relational database model?
Options :
1. Contains the logical structure of the entire database
2. Individual users are given different views according to the user’s requirement.
3. Represents all entities, their attributes and their relationships
4. Concerned with storage space allocation, Record descriptions, Records placement, Data Compression and Data Encryption Techniques
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q26. Which of the following is the function of processor management?
Options :
1. Provides mechanism for deadlock handling
2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q27. Security software belongs to which of the following category?
Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q28. Which of the following is the function of memory management?
Options :
1. Provides mechanism for deadlock handling
2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time
Your Response Change Pattern: Module Test 2
The below table provides the number of times you have changed your responses to the Module Test 2 questions and also the nature of those response changes.
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q29. Which of the following is most commonly used network topology in the local area network?
Options :
1. Bus
2. Ring
3. Star
4. Mesh
Status : Correct
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q30. Which of the following is known Root Certifying Authority?
Options :
1. Certifying Authority
2. Controller of Certifying Authority
3. Registering Authority
4. Chief Certifying Authority
Error Identification and Rectification: Module Test 2
CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED
0 0 0 0 0

More Related Content

Similar to ISA 3.0 E-Learning Assessment Test.pdf

How to Gather Useful, Usable Customer Satisfaction Feedback
How to Gather Useful, Usable Customer Satisfaction FeedbackHow to Gather Useful, Usable Customer Satisfaction Feedback
How to Gather Useful, Usable Customer Satisfaction Feedback
Naomi Karten
 
30015210472747_report
30015210472747_report30015210472747_report
30015210472747_reportMudassar Khan
 
midterm_fa08.pdf
midterm_fa08.pdfmidterm_fa08.pdf
midterm_fa08.pdf
RavinderKSingla
 
30013124713595_report
30013124713595_report30013124713595_report
30013124713595_reportsiva reddy
 
Providing feedback to individual students on their examination performance
Providing feedback to individual students on their examination performanceProviding feedback to individual students on their examination performance
Providing feedback to individual students on their examination performance
Jisc
 
30001793235465_report
30001793235465_report30001793235465_report
30001793235465_reportAyushi Sinha
 
Assessment Group Managers Training-SMCC1.pptx
Assessment Group Managers Training-SMCC1.pptxAssessment Group Managers Training-SMCC1.pptx
Assessment Group Managers Training-SMCC1.pptx
HctorMurciaForero
 
My AMCAT Test report September-2016
My AMCAT Test report September-2016My AMCAT Test report September-2016
My AMCAT Test report September-2016Subashini Rajan
 
Course Learning OutcomesBy the conclusion of this course, you sh
Course Learning OutcomesBy the conclusion of this course, you shCourse Learning OutcomesBy the conclusion of this course, you sh
Course Learning OutcomesBy the conclusion of this course, you sh
CruzIbarra161
 
30016347107423_report
30016347107423_report30016347107423_report
30016347107423_reportVikash Varma
 
Bus 308
Bus 308Bus 308
Bus 308
Tenny Trumph
 

Similar to ISA 3.0 E-Learning Assessment Test.pdf (20)

amcat_report
amcat_reportamcat_report
amcat_report
 
How to Gather Useful, Usable Customer Satisfaction Feedback
How to Gather Useful, Usable Customer Satisfaction FeedbackHow to Gather Useful, Usable Customer Satisfaction Feedback
How to Gather Useful, Usable Customer Satisfaction Feedback
 
30015210472747_report
30015210472747_report30015210472747_report
30015210472747_report
 
Swatiamcat_report
Swatiamcat_reportSwatiamcat_report
Swatiamcat_report
 
midterm_fa08.pdf
midterm_fa08.pdfmidterm_fa08.pdf
midterm_fa08.pdf
 
30013124713595_report
30013124713595_report30013124713595_report
30013124713595_report
 
Providing feedback to individual students on their examination performance
Providing feedback to individual students on their examination performanceProviding feedback to individual students on their examination performance
Providing feedback to individual students on their examination performance
 
30001793235465_report
30001793235465_report30001793235465_report
30001793235465_report
 
30015227157374_report
30015227157374_report30015227157374_report
30015227157374_report
 
Assessment Group Managers Training-SMCC1.pptx
Assessment Group Managers Training-SMCC1.pptxAssessment Group Managers Training-SMCC1.pptx
Assessment Group Managers Training-SMCC1.pptx
 
My AMCAT Test report September-2016
My AMCAT Test report September-2016My AMCAT Test report September-2016
My AMCAT Test report September-2016
 
amcat
amcatamcat
amcat
 
Course Learning OutcomesBy the conclusion of this course, you sh
Course Learning OutcomesBy the conclusion of this course, you shCourse Learning OutcomesBy the conclusion of this course, you sh
Course Learning OutcomesBy the conclusion of this course, you sh
 
30016347107423_report
30016347107423_report30016347107423_report
30016347107423_report
 
Bus 308
Bus 308Bus 308
Bus 308
 
AMCAT
AMCATAMCAT
AMCAT
 
2
22
2
 
amcat report card
amcat report cardamcat report card
amcat report card
 
amcat report
amcat reportamcat report
amcat report
 
report of amcat
report of amcatreport of amcat
report of amcat
 

Recently uploaded

The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
Softradix Technologies
 
Are Seamless Gutters Worth It? Explore now
Are Seamless Gutters Worth It? Explore  nowAre Seamless Gutters Worth It? Explore  now
Are Seamless Gutters Worth It? Explore now
acadiaborton
 
Business Solutions with .NET Development in Quantum Computing.pdf
Business Solutions with .NET Development in Quantum Computing.pdfBusiness Solutions with .NET Development in Quantum Computing.pdf
Business Solutions with .NET Development in Quantum Computing.pdf
QServices Inc.
 
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs Replacing
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs ReplacingDon't Wait Until It's Too Late! 5-Signs Your Garage Door Needs Replacing
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs Replacing
CR Garage Doors
 
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi KadaleGet your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Pallavi Makeup Artist
 
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques SupplierAll Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
Trophy-World Malaysia Your #1 Rated Trophy Supplier
 
Importance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime IndustryImportance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime Industry
Blessed Marine Automation
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
maitaicatamaran
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
Truxcargo
 
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Landscape Express
 
Comprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration ServicesComprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration Services
kleenupdisaster
 
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
RNayak3
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
securexukweb
 
Courier & Package Tracking System Actually Works
Courier & Package Tracking System Actually WorksCourier & Package Tracking System Actually Works
Courier & Package Tracking System Actually Works
In Targos
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
RKIMT
 
Maximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management SystemsMaximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management Systems
Irri Design Studio
 
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docxIslamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
amilabibi1
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
AmeliaLauren3
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
Brendon Jonathan
 
Upvc Bathroom Doors Price and Designs In Kerala
Upvc Bathroom Doors Price and Designs In KeralaUpvc Bathroom Doors Price and Designs In Kerala
Upvc Bathroom Doors Price and Designs In Kerala
bpshafeeque
 

Recently uploaded (20)

The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
 
Are Seamless Gutters Worth It? Explore now
Are Seamless Gutters Worth It? Explore  nowAre Seamless Gutters Worth It? Explore  now
Are Seamless Gutters Worth It? Explore now
 
Business Solutions with .NET Development in Quantum Computing.pdf
Business Solutions with .NET Development in Quantum Computing.pdfBusiness Solutions with .NET Development in Quantum Computing.pdf
Business Solutions with .NET Development in Quantum Computing.pdf
 
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs Replacing
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs ReplacingDon't Wait Until It's Too Late! 5-Signs Your Garage Door Needs Replacing
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs Replacing
 
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi KadaleGet your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
 
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques SupplierAll Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
 
Importance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime IndustryImportance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime Industry
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
 
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
 
Comprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration ServicesComprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration Services
 
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
 
Courier & Package Tracking System Actually Works
Courier & Package Tracking System Actually WorksCourier & Package Tracking System Actually Works
Courier & Package Tracking System Actually Works
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
 
Maximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management SystemsMaximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management Systems
 
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docxIslamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
 
Upvc Bathroom Doors Price and Designs In Kerala
Upvc Bathroom Doors Price and Designs In KeralaUpvc Bathroom Doors Price and Designs In Kerala
Upvc Bathroom Doors Price and Designs In Kerala
 

ISA 3.0 E-Learning Assessment Test.pdf

  • 1. 28.00 Your Total Score 30.00 Assessment Score 10.00 Cut-Off marks (Pass Marks) 93.33 Your Percentage E Performance Category JACKSON ABRAHAM THEKKEKARA . (237650@icai.org) Status : Pass Assessment Date : 20-02-2023 14:11:41 (GMT+05:30) Performance Level : Excellent This report helps you to achieve your targets as per below stated objectives: Improve your conceptual understanding Address specific areas of improvement personalized to you
  • 2. Performance Categories Based on the performance of the students, we have framed the following categories to place you in accordance with your performance Performance Category Definitions Excellent Outstanding level of performance indicates that the candidate has done excellent work and mastered the concepts. High High level of performance indicates that the candidate has done above average work and mastered almost all the concepts. Moderate Acceptable level of performance indicates that the candidate has done average work and has mastered many of the concepts. Low Needs improvement in performance indicates that the candidate has done and mastered very few or none of the concepts. Performance Criteria Performance Category based on student marks PERFORMANCE CATEGORY RANGE Excellent 91% to 100% of Max Marks High 81% to 90% of Max Marks Moderate 61% to 80% of Max Marks Low Below 60% of Max Marks SECTION (GROUP) EXCELLENT HIGH MODERATE LOW Module Test 2 (ISA Module Test2) 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below 18.00
  • 3. Where do you stand? Overall Performance Analysis The below table shows section-wise analysis of marks scored by you, time spent by you, your percentage, your accuracy and number of correct, incorrect, unanswered and marked for review questions. SECTION (GROUP) EXCELLENT HIGH MODERATE LOW Overall Score 27.30 and above 24.30 to 27.00 18.30 to 24.00 Below and equal to 18.00 SCORE 28.00 / 30.00 28.00 / 30.00 SECTION (GROUP) PERFORMANCE CATEGORY Module Test 2 (ISA Module Test2) E Overall Score E Recommendations and Suggestions 1. Based on your overall scores: Your overall score falls in the E category. Congrats and try to increase accuracy and speed to score more. 2. Based on your section-wise performance: You seem to be strong in Module Test 2. So it is suggested that you attempt Module Test 2 section first 3. Some general suggestions to optimize your score: The best performers plan and allocate equal time to each section.
  • 4. Below pie-chart shows section-wise percentage of marks scored 28.00 6:11 93.33% 93.33% 30 30 30 28 2 0 0 28.00 6:11 93.33% 93.33% 30 30 30 28 2 0 0 SECTION (GROUP) MARKS SCORED BY YOU TIME SPENT BY YOU (IN MINS) YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TOTAL QUESTIONS MAX NO OF QUESTIONS - TO ATTEMPT QUESTIONS ATTEMPTED CORRECT INCORRECT UNANSWERED MARKED FOR REVIEW Module Test 2 (ISA Module Test2) Total Note:The percentage (%) and accuracy below the prescribed values (60 %) are shown in red color
  • 5. Impact of Incorrect Responses Below table provides the marks lost due to incorrect responses. Module Test 2, 28 Module Test 2 Section-wise marks SECTION(GROUP) NUMBER OF INCORRECT RESPONSES MARKS LOST DUE TO INCORRECT RESPONSES TOTAL SCORE IF INCORRECT RESPONSES WERE NOT MARKED 2 0 28 2 0 28.00 Module Test 2(grp1) Overall In order to attempt more accurately, consider the following suggestions while attempting the questions:
  • 6. Overall Preparedness Analysis The below table represents the percentage of correct questions achieved at the analysis level. Conceptual errors, for which you would require more reading and understanding of concepts. Minor or careless mistakes, for which you would require a more composed and calm approach towards solving the question paper. Time Management Below table shows the time you spent in each section. p y g gg p g q 1. If you are not able to solve a question correctly or have doubts in your approach towards the solution, skip it for later. 2. Quickly revise the steps for avoiding calculation or casual mistakes. 3. Avoid guesswork. TIME SPENT BY YOU (IN MINS) 6:11 6:11 SECTION (GROUP) Module Test 2 (ISA Module Test2) Total time spent Recommendations 1. It is essential for each aspirant to plan and schedule time for each section diligently. This is important to score well in each section and ultimately meet the cut-off.
  • 7. Response Change Pattern Below table provides the number of times you have changed your responses while answering the test and also the nature of those response changes. 2. This will also help you in attempting all the questions in each section and hence not missing the opportunity to score more. SECTION(GROUP) CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED 0 0 0 0 0 0 0 0 0 0 Module Test 2 (ISA Module Test2) Overall It is suggested that guesswork should be avoided for any type of response changes. It has been observed that more often than not, guesswork leads to an incorrect response thereby inviting negative marks which in turn has an adverse effect on the overall rank. You must use your knowledge, observation and elimination skills to arrive at the correct answer. Interpretation and Suggestions 1. Incorrect to incorrect response change: You may need to work more on the concept level, in order to gain confidence. 2. Incorrect to correct response change: At the first glance you were not very sure about the solution. You must spend at least 1 minute per question and if you are not able to reach to the solution, you must revisit the question to enhance your score. Perform this response change only when you are confident or have spotted a mistake in the solution of your first response. 3. Correct to incorrect response change: You are not sure of the solution and have either applied a wrong concept or made a calculation mistake. You need to practice more questions on the same concept. 4. Correct to unanswered response change: You are not sure of the solution You need to practice more questions on the same concept.
  • 8. Overview: Module Test 2 The below table provides your marks in Module Test 2 along with the average marks scored by the others (students who cleared this assessment) and the marks scored by the topper. Note:The percentage (%) and accuracy below the prescribed values (60%) are shown in red color Perform this response change only when you are not confident of your solution. You must try to spend at least 1 min before leaving it unanswered. 5. Incorrect to unanswered response change: Your judgment of avoiding negative marks is right. You must try to spend at least 1 min before leaving it unanswered. 28.00 / 30.00 93.33% 93.33% 6:11 MARKS SCORED BY YOU YOUR SECTION PERCENTAGE YOUR SECTION ACCURACY TIME SPENT BY YOU (IN MINS)
  • 9. Performance Analysis: Module Test 2 1. The below table analyzes your performance at question level 2. It highlights conceptually strong and improvement areas within the section and areas that require reinforcement of concepts. 3. The accuracy of the response to each question and time spent are correlated and interpreted in terms of expert advice on preparedness level. Question wise details Please click on question to view detailed analysis Marked for Review, 0 UnAnswered, 0 InCorrect, 2 Correct, 28 Correct InCorrect UnAnswered Marked for Review Question wise Analysis
  • 10. = Not Evaluated = Evaluated = Correct = Incorrect = Not Attempted = Marked for Review = Answered = Correct Option = Your Option Question Details Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q1. Which of the following WAN switching technology known as store-and-forward switching? Options : 1. Circuit switching 2. Packet switching 3. Message Switching 4. Virtual Circuits Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q2. Which of the following rule relates to relational database model? Options : 1. All the entries in any column are of the same type or same domain 2. Ordering of rows and columns is significant. 3. Duplicate rows are allowed. 4. All data items stored in the columns are atomic in nature, that is, they can be split further without loss of information.
  • 11. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q3. Which of the following services is included in the core of the CBS? Options : 1. Internet Banking 2. RTGS 3. Data warehouse 4. Cheque Truncation System Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q4. Which of the following manages the Asymmetric Keys, and a means of certifying the authenticity of holder of the key? Options : 1. PKI 2. SSL 3. HTTPS 4. S/MIME
  • 12. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q5. Which of the following decides about the route based on the latest routing information gathered from connected routers? Options : 1. Static router 2. Dynamic router 3. Packet filtering router 4. Gateway Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q6. Which of the following set of techniques that permit the simultaneous transmission of multiple signals on a single carrier? Options : 1. Multiplexing 2. Switching 3. Routing 4. Tunnelling
  • 13. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q7. SAP belongs to which of the following category? Options : 1. Application Suite 2. Enterprise Software 3. Enterprise Infrastructure Software 4. Information Worker Software Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q8. Which of the following is the Configuration Control aspect of Configuration Management System? Options : 1. Configuration, version of the items 2. Configuration of components of these Items 3. All Items are correctly identified 4. Ensures that latest approved version of items are used
  • 14. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q9. Which of the following is the function of File management? Options : 1. Provides mechanism for deadlock handling 2. Decides the processes that are to be loaded into memory when memory space becomes available 3. Keeps track of information, location, uses, status etc 4. Decides which process gets the device when and for how much time Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q10. In which of the following WAN message transmission technology, once the route is established, all packets follow the route but it is logical connection for fix duration? Options : 1. Circuit switching 2. Packet switching 3. Message Switching 4. Virtual Circuits
  • 15. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q11. Which of the following IDS detection methodology assumes that an intrusion can be detected by observing a deviation from the normal? Options : 1. Statistical Anomaly Based 2. Attack signature 3. Task-based 4. Signature-based Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q12. Which of the following firewall implementation contains two NICs: one connected to the external network, and other connected to the internal network? Options : 1. Packet filtering routers 2. Single-homed firewalls 3. Dual-homed firewalls 4. Screened subnet firewalls (DMZ)
  • 16. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q13. Which of the following statement is correct about the firewall? Options : 1. Firewalls can enforce password policy and prevent misuse of passwords. 2. Firewalls are effective against non-technical security risks 3. Firewalls cannot stop internal users from accessing websites with malicious code 4. A firewall can prevent users or attackers with modems from dialling-in or dialling-out of the internal network Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q14. Which of the following is the Configuration identification aspect of Configuration Management System? Options : 1. Configuration, version of the items 2. Version control 3. All Items are correctly identified 4. Ensures that latest approved version of items are used
  • 17. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q15. Which of the following database language retrieves, inserts and deletes data of a relational database model? Options : 1. Data Definition Language (DDL) 2. DML (Data Manipulation Language 3. TCL (Transmission Control Language) 4. DCL (Data Control Language) Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q16. Which of the following operating system is used to run multiple tasks simultaneously by sharing the CPU time? Options : 1. Multi-tasking OS 2. Real time OS 3. Multi-processing OS 4. Multi-threading OS
  • 18. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q17. Which of the following secondary storage media creates microscopic pits on the surface of a disc? Options : 1. HDD 2. Flash drive 3. VRAM 4. DVD Status : Incorrect Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer. Q18. The applications which are not a part of the Core Banking Solution have an interface built (through middleware) with CBS. Which of the following application is having seamless integration with CBS? Options : 1. Internet Banking 2. Automated Teller Machine (ATM) 3. MPLS 4. NPCI
  • 19. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q19. Cryptography is a branch of which of the following? Options : 1. Cryptanalysis 2. Cryptology 3. Hash Function 4. Coding Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q20. Which of the following is Public Key Cryptography (PKI)? Options : 1. Secret-key cryptography 2. Hash Function 3. Coding 4. Asymmetric key cryptography
  • 20. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q21. Which of the following performs stateful packet inspection, enables secure remote access to networks and prevents malicious payloads and centralised reporting as the basic features? Options : 1. Stateful Inspection Firewall 2. Unified Theatre Monitoring (UTM) 3. Intrusion Prevention System (IPS) 4. Intrusion Detection System (IDS) Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q22. Which of the following network topology is having highest fault tolerance? Options : 1. Bus 2. Ring 3. Star 4. Mesh
  • 21. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q23. Which of the following is a one-way encryption? Options : 1. Secret-key cryptography 2. Public key cryptography 3. Asymmetric key cryptography 4. Hash Function Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q24. Which of the following statement is correct for public key cryptography (PKI)? Options : 1. It is also known as secret key cryptography 2. Identity of the owner of the digital certificate is bind with Public key 3. The key pair consists of one public and one private key that are mathematically unrelated 4. private key of the digital certifivate is known to the owner and Certfying Authority
  • 22. Status : Incorrect Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer. Q25. Which of the following statement refers to internal schema of relational database model? Options : 1. Contains the logical structure of the entire database 2. Individual users are given different views according to the user’s requirement. 3. Represents all entities, their attributes and their relationships 4. Concerned with storage space allocation, Record descriptions, Records placement, Data Compression and Data Encryption Techniques Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q26. Which of the following is the function of processor management? Options : 1. Provides mechanism for deadlock handling 2. Decides the processes that are to be loaded into memory when memory space becomes available 3. Keeps track of information, location, uses, status etc 4. Decides which process gets the device when and for how much time
  • 23. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q27. Security software belongs to which of the following category? Options : 1. Application Suite 2. Enterprise Software 3. Enterprise Infrastructure Software 4. Information Worker Software Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q28. Which of the following is the function of memory management? Options : 1. Provides mechanism for deadlock handling 2. Decides the processes that are to be loaded into memory when memory space becomes available 3. Keeps track of information, location, uses, status etc 4. Decides which process gets the device when and for how much time
  • 24. Your Response Change Pattern: Module Test 2 The below table provides the number of times you have changed your responses to the Module Test 2 questions and also the nature of those response changes. Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q29. Which of the following is most commonly used network topology in the local area network? Options : 1. Bus 2. Ring 3. Star 4. Mesh Status : Correct Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0 Comments: You are on the right preparation track on this topic. Q30. Which of the following is known Root Certifying Authority? Options : 1. Certifying Authority 2. Controller of Certifying Authority 3. Registering Authority 4. Chief Certifying Authority
  • 25. Error Identification and Rectification: Module Test 2 CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED 0 0 0 0 0