IBPS RRB Probationary Officier Exam 2018 : Practice Test Paper (Set-11)

IBPS RRB PO (PRE) Exam - 2018

(Practice Questions)

Directions (71-80): Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you locate them while answering some of the questions. OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”. Some told them, “For the love of God, please close this port”. When the hacker God gave an interview to Motherboard, a technology website, he claimed to be a British secondary-school pupil by the name of “Stackoverflowin”. Annoyed by the parlous state of computer security, he had, he claimed, decided to perform apublic service by demonstrating just how easy it was to seize control. Not all hackers are so public-spirited, and 2016 was a bonanza for those who are not. In February of that year cyber-crooks stole $81m directly from the central bank of Bangladesh—and would have got away with more were it not for a crucial typo.

In August America’s National Security Agency (NSA) saw its own hacking tools leaked all over the internet by a group calling themselves the Shadow Brokers. (The CIA suffered a similar indignity this March.) In October a piece of software called Mirai was used to flood Dyn, an internet infrastructure company, with so much meaningless traffic that websites such as Twitter and Reddit were made inaccessible to many users. And the hacking of  the Democratic National Committee’s e-mail servers and the subsequent leaking of embarrassing communications seems to have been part of an attempt to influence the outcome of the American elections. Away from matters of great scale and grand strategy, most hacking is either show-off vandalism or simply criminal. It is also increasingly easy. Obscure forums oil the trade in stolen credit-card details, sold in batches of thousands at a time. Data-dealers hawk “exploits”: flaws in code that allow malicious attackers to subvert systems.

You can also buy “ransomware”, with which to encrypt photos and documents on victims’ computers before charging them for the key that will unscramble the data. So sophisticated are these facilitating markets that coding skills are now entirely optional. Botnets—flocks of compromised computers created by software like Mirai, which can then be used to flood websites with traffic, knocking them offline until a ransom is paid—can be rented by the hour. Just like a legitimate business, the bot-herders will, for a few dollars extra, provide technical support if anything goes wrong.The total cost of all this hacking is anyone’s guess (most small attacks, and many big ones, go unreported). But all agree it is likely to rise, because the scope for maliceis about to expand remarkably. “We are building a world -sized robot,” says Bruce Schneider, a security analyst, in the shape of the “Internet of Things”. The IoT is a buzz-phrase used to describe the computerisation of everything from cars and electricity meters to children’s toys, medical devices and light bulbs. In 2015 a group of computer -security researchers demonstrated that it was possible to take remote control of certain Jeep cars. When the Mirai malware is used to build a botnet it seeks out devices such as video recorders and webcams; the botnet for fridges is just around the corner.

71. Which is the most appropriate title?
(a) Public spirited hackers.
(b) Broken Computer security.
(c) Hacking: The criminal offence
(d) The Internet of Things
(e) The Growing Artificial Intelligence

72. According to the paragraph, why did ‘the hacker god’ decide to perform a public service?
(a) To hack the NSA server
(b) To show to the people that hacking was very easy
(c) To influence the outcome of the American elections
(d) To aware the people about the computer security threats
(e) None of these

73. Which of the following is false in context of the passage?
(a) The IoT is a buzz-phrase used to describe the computerisation of everything from cars and electricity meters to children’s toys, medical devices and light bulbs.
(b) The hacking of the Democratic National Committee’s e-mail servers was performed with the help of a malware named “Mirai”.
(c) A group called “the Shadow Brokers” leaked hacking tools of America’s National Security Agency all over the internet
(d) Obscure forums oil the trade in stolen credit-card details, sold in batches of thousands at a time.
(e) All of them are true

74. Accordingto the paragraph, what caused the websites like ‘twitter and reddit’ inaccessible to the users?
(a) It was caused due to hacking the security contents of the website.
(b) Due to unscramble of the encrypted Data on the websites.
(c) Due to Dyn, an internet infrastructure company.
(d) Due to surge in the worthless traffic which was forced by the hackers.
(e) All are correct.

75. Which of the following statement(s) is/are correct about ‘Internet of Things’ according to passage?
(i) To take remote control of all digital devices.
(ii) A world sized Robot.
(iii) It means computerization of everything.
(a) Only (i) is correct
(b) Only (ii) is correct
(c) Both (i) and (iii) are correct
(d) Both (ii) and (iii) are correct
(e) All are correct

Directions (76-77): Choose the word/group of words which is most oppositein meaning to the word/group of words printed in bold as used in the passage.

76. Malice
(a) Antipathy
(b) Malevolence
(c) Benignity
(d) Audacity
(e) Valour

77. parlous
(a) Adventurous
(b) fatal
(c) terrible
(d) innocuous
(e) risky

Directions (78-80): Choose the word/group of words which is most similar in meaning to the word/group of words printed in bold as used in the passage.

78. Subsequent
(a) consequent
(b) direct
(c) anterior
(d) foregoing
(e) prior

79. Subvert
(a) vitiate
(b) comply
(c) undermine
(d) betray
(e) overwhelm

80. Typo
(a) advantage
(b) defeat
(c) strength
(d) bug
(e) stain

Directions (81-90):Which of the phrases (a), (b), (c) and (d) given below each sentence should replace the phrase printed in bold letters to make the sentence grammatically correct? If the sentence is correct as it is, mark (e) i.e., "No correction required" as the answer.

81. In the modern day, it is common to say you are bored to death if someone or something is incredibly uninteresting.
(a) bored of death
(b) bored from death
(c) bored till death
(d) bored until death
(e) No correction required

82. We advised them to going toa hill station during the summer vacation.
(a) for going to
(b) that they go to
(c) to go to
(d) that they should have to go to
(e) No correction required

83. They failed in their attempt to repair the demolished portion of the building.
(a) for their attempt
(b) in their attempting
(c) with their attempt
(d) on their attempt
(e) No correction required

84. In Indian democracy, it is necessary for the citizens to beware ofall the political facts about every political party.
(a) be aware of
(b) be aware for
(c) beware for
(d) be aware to
(e) No correction required

85. We’re going to have to put downour summer vacation until July because of the bad weather conditions.
(a) put off
(b) put across
(c) put out
(d) put back
(e) No correction required

86. We calledonbut we weren't able to find the car part we needed to fix the gear system.
(a)called off
(b)called back
(c)called around
(d)called up
(e) No correction required

87. If everyone chipsinthey can get the whole kitchen painted by today afternoon.
(a)chips on
(b)chips up
(c)chip off
(d)chips towards
(e) No correction required

88. Hang up there. I'm sure you'll find a better job very soon because you are very sincere.
(a)hang on
(b)hang back
(c)hang out
(d)hang in
(e) No correction required

89. When I think of on my youth, I wish I had studied harder and had secured good grades.
(a)think over
(b)think about
(c)think out
(d)think back
(e) No correction required

90. A stranger cut through with unsolicited advice on how we could fix our relationship.
(a)cut out
(b)cut about
(c)cut back
(d)cut in
(e) No correction required

Directions(91-100): In the following passage there are blanks, each of which has been numbered and one word has been suggested alongside the blank.

These numbers are printed below the passage and against each, five options are given. In four options, one word is suggested in each option. Find out the appropriate word which fits the blank appropriately. If the word written alongside the blank fits the passage, choose option ‘e’ (No correction required) as the correct choice. As a nation, we are in a great dilemma on the financing of public higher educational institutions. Highly subsidized quality higher education, with admissions based strictly on merit, continues to be a great hope for upwardsocio-economic ___(91)___[alternate]. This public demand has also ensured that there is consensus across the political spectrum on the need for setting up new IITs, IIMs, AIIMSs, NITs, etc. On the other hand, as the number of such institutions increases, the __(92)___[main]requirements for supporting them will prove to be a challenge. What are the alternatives? Globally there is a shift towards charging a higher ____(93)___[fraction]ofeducation costs as fees —even in European countries where, traditionally, higher education was completely free. For the purpose of inclusion ofstudents from economically weaker sections, there is the provision of education loans, often at lower-than-commercial rates. This has resulted in education-loan-driven higher education, which has clear __(94)___[explicit]for blocking the socio-economic mobility of poor people, even in an affluent country like the United States. In a country like India, public-funded institutions where the full fee is financed through loans are undesirable for many reasons.

One, it will make education inaccessible to many who cannot afford to be ____(95)____casted]with such large loans. Second, heavy debt would result in higher education being seen more as capital investment. It would lead to the clear ___(96)__ [graduation] objective of getting a quick return on investment. The netresult would be that graduates would opt for safe career options —even more than they currently do —that provide the “highest package” nd not those choices that may be low-paying but have greater social value and impact and which the graduatee may ___(97)___ [needlessly]want to pursue. Medical education in India has already fallen into this trap; with high cost of education in private and foreign institutions, the increase in volume is not resulting in ____98)_____[producing]access for a significant section of the population. Further, in the Indian socio-economic context where, even today, most students pursue academic programmes and careers that are forced on them by familyand not out of their own choice, there is another great disadvantage. Just when we were seeing some change —in at least a small fraction of students —the increase in fees or a greater loan burden would put the clock back. The“loan model” is gaining ____(99)__[attenuations]in the public ___(100)__[regard] in India primarily driven by the stories of high-paying jobs for IIT graduates.

(a) structure
(d) mobility
(e) No correction required

(a) basic
(b) finance
(c) budgetary
(e) No correction required

(a) rate
(b) part
(c) portions
(d) wealth
(e) No correction required

(a) targets
(c) incarnation
(d) forms
(e) No correction required

(b) debited (c) forced
(d) burdened
(e) No correction required

(a) main
(b) achievable
(c) financial
(d) accessible
(e) No correction required

(a) affordably
(b) alternatively
(c) not
(e) No correction required

(a) cutting
(b) providing
(c) enhanced
(d) fabricating
(e) No correction required

(a) focused
(b) success
(c) traction
(d) force
(e) No correction required

(a) discourse
(b) domain
(c) bodies
(d) opinions
(e) No correction required