CAIIB IT Recollected
Questions asked in Morning Shift:
1. SDLC phase and definition
2. Normalization definition
3. Threats and attacks in network.
4.Routers/Switch/Firewall
5. Honey Pot
6. Biometrics.
7. Disaster avoidance.
8. Phases of CMM.
9. SQL query commands.
10. DDL/DML
11. NEFT/RTGS/FEDWIRE
12.SLA Negotiation
13. Purging of data.
14. Artificial Intelligence
15. Spamming/Eavesdropping/Phishing
16.Digital Signature
17. IDEA encryption
18. RAID
19.Generalized Audit Software
20. Virtual Classroom concept
21. Web SAFARI
22. Strategic Information
23. Fibre Optic cables.
24. Blooms Taxonomy
25. OLAP
26.Deferred Payment System
27.SFMS
28. Floor Limit ??
29. Software Escrow Management?
30. Types of cards?
31. Call Centre Benchmarks?
32. Hash Function used in Digital Signature?
33. SCORM benifit?
34. Characteristics of BHIM ?
35. Rupay Cards used in ?
Questions asked in Morning Shift:
1. SDLC phase and definition
2. Normalization definition
3. Threats and attacks in network.
4.Routers/Switch/Firewall
5. Honey Pot
6. Biometrics.
7. Disaster avoidance.
8. Phases of CMM.
9. SQL query commands.
10. DDL/DML
11. NEFT/RTGS/FEDWIRE
12.SLA Negotiation
13. Purging of data.
14. Artificial Intelligence
15. Spamming/Eavesdropping/Phishing
16.Digital Signature
17. IDEA encryption
18. RAID
19.Generalized Audit Software
20. Virtual Classroom concept
21. Web SAFARI
22. Strategic Information
23. Fibre Optic cables.
24. Blooms Taxonomy
25. OLAP
26.Deferred Payment System
27.SFMS
28. Floor Limit ??
29. Software Escrow Management?
30. Types of cards?
31. Call Centre Benchmarks?
32. Hash Function used in Digital Signature?
33. SCORM benifit?
34. Characteristics of BHIM ?
35. Rupay Cards used in ?
Thank you.
ReplyDelete