SBI SO Cut off & Merit list 2015 – 14th June Answer Key Sheet Specialist Officer Download

Latest :- SBI SO Cut Off Expected 2016

Hello friends SBI conduct Specialist Officer Exam Result 2015, recruitment department of State Bank of India. In huge no. candidates applied for the exam & Candidates this is a great opportunity  for all those who preparing for the Bank . Candidates Answer key is available in the site you all can check it. Candidates you all can estimate you result by checking answer with the help of answer key so you all get an idea about your performance .You all also check out your mistakes and make a lesson to improve them next time or make mind to never repeat it again. Soon result also been updated in the site after it cutoff marks & merit list also publish in site so be in linked with the site for all such details regarding to the SBI SO Exam.

Cutoff for SBI SO

SC category- 120+

ST category- 100+

OBC category- 130+

General category- 130+

SBI SO Cut off & Merit list 2015

Hey friends here is a news for you all who gave exam of the SBI SO Answer key is now available in site you all can check it now. Candidates soon result will also publish in site you can check result by the roll number you get while exam in admit cards.You all can check Cutoff marks & Merit list after the declaration of result which updates and information regarding it you all get in site . Below we provide you details how can you all download the answer key,cutoff marks & merit list from website in steps wise ,so be in liked with site for all the details.

Some of the questions which were asked in the examination constitute the following.

  • Encapsulating data inside data link layer with header and trailer
  • Sharing of public keys
  • Oracle procedure does not contain – Begin/ End/ Return/ Into
  • Shutdown method in Oracle for a consistent backup
  • Notify all stations before transmitting data
  • Project Estimation Technique uses standards of prior project experience
  • RSA
  • Cryptography is not concerned with
  • Cryptanalysis
  • What provides network redundancy in a local network environment
  • Security threat associated with Java applet
  • Forcing client package without users knowledge or permission
  • Disaster Recovery Plan
  • VPN also called as
  • Compliance Validation and Compliance Monitoring
  • OLTP real time reporting tool
  • Password/Authentication mechanism

How to Download SBI SO Answer Key, Cut off & Merit list 2015 :-

1. Visit the  website i.e www.sbi.co.in
2. Then Find out Answer Key and Merit List link mentioned on website.
3. After clicking on link, the full PDF fill will open in your browser.
4. Then check your the Cutoff Marks, Answer key, Result & Merit List.
5. Download it & take a print of it.

Disclaimers & Statutory Warnings !
We do not claim and we are not responsible for any official or non official news regarding exam figures, vacancies or number of posts in job advertisement (govt. as well as private agencies),exam dates, paper leak , exam paper cancellation news content & exam graphic images etc. The news & content may be rumors & false. Only visit & consider the official website always as a true source of news. We don’t assure that the data provided here is completely correct. One can use the information at their own risk. We are not responsible for any consequences that occur on applying for any job or walkin data that we provided in our portal. Click any link at your own risk in our portal. We are not responsible for any loss you get on doing so. We don’t have control on the portal as these are maintained by third party people. The Job seekers are advised to be careful and check the information from other websites and official websites make conform regarding any particular advertisement.


6 Comments

Add a Comment
  1. Thank you so much sir, I had also given SBI SO examination and I was waiting for the answer key.

  2. @Neelam Yadav, Answerkey will not be published by SBI.

    Find below the questions asked in SBI SO IT officer with some qns answered.

    1) A firewall is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers.

    2) Oracle 9i lGWR takes input from redo log buffer and writes to online log file

    3) Firewall decision making – Always deny or deny by delay & Accept by exception???

    4) Encapsulating data inside data link layer with header and trailer – Frame

    5) Project estimation techniques uses the standards of prior proj experience-??? (options function point,cocomo…)

    6) RSA – Asymmetric protocol

    7) VPN also called as Tunnel [other options Pipeline,packet switched]

    8) One question about compliance validation and compliance monitoring

    9) OLTP real time reporting tool – Dashboard

    10) Cryptogrphy is not concerned about – Availability [other options Integrity,privacy,confidentiality]

    11) Cryptanalysis refers – to the study of ciphers, ciphertext, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plaintext from the ciphertext

    12) How public keys are shared – via email or digital signature???

    13) Oracle procedure does not contain – RETURN [other options BEGIN END INTO]

    14) Shutdown method in oracle for a consistent backup – Normal [ABORT,Inconsistent..]

    15) encrypt using receiver’s public key decrypt using receiver private key – public key and asymmetric key encryption

    16) Providing application access via third party – Software as a service(saas)

    17) Notify all stations before transmitting data – CSMA/CD or CSMA/CA

    18) Removing redundancy in DB – Normalization

    19) Which of the following provide network redundancy in a local network environment?Dual backbone

    20) best technologies for in indoors are – IEEE 802.11 a/ IEEE 802.11 b/IEEE 802.11 n/???

    21) In the relationship between course and faculty, the course entity would be – Child 22) When overriding a method – method inheritance/method signature/method name ???

    23) In java Objects can communicate with each other – using methods and can call methods in other classes

    24) Security threat associated with java applet – when downloaded and run at client….

    25) Connecoin oriented protocol – TCP

    26) Bridge operated in – data link layer

    27) Forcing client package without users knowledge/permission – PUSH

    28) Which one is NOT a phase of the systems development life cycle? – Post Implementation review

    29) Which is not a information analysis system – DBMS?

    30) DBMS not doing – programming data

    31) A hacker that changes or forges information – altering raw data just before a computer processes it and then changing it back after the processing is completed, is engaging in – Data didling

    32) Not a part of disaster recovery – Proximity of alternate site near primary site???

    33) Most important thing in disaster recovery?personnel safety???

    34) Disaster recovery risk assessment and business impact analysis (BIA) are crucial steps in the development of a disaster recovery plan.

    35) Strong password/authentication mechanism – Hybrid/static/dynamic/brutal???

    36) Which of the following statements is not true about two-tier client-server database architecture? SQL stmnts may be processed on some of the clients

    37) ER diagram presenting minimum and maximum relation – cardinality

    38) what happens when a error is encounterd during online transaction processing? – review and report??

    39) Permissible operation when there is a shared lock on DB? Read

    40) Polymorphic virus – associated with code modified differently each time….

    41) UML Public symbol = +

    42) Realtime ids system – N/w based IDS??

    43) VLAN referred to as – TRUNKS/ SUBNET???

    44) Identification – who is this, authentication – what action he has been authorized to perform

    45) Check digit can detect – transcription error/substitution error..

    46) The entity relationship diagram – Depicts relationship between data objects

    47) Attack done by checking all possible combinations of letters, numbers and symbols – Brute force attack

    48)An OLAP tool provides for

    (a) Multidimensional analysis
    (b) Roll-up and drill-down
    (c) Slicing and dicing
    (d) Rotation
    (e) Setting up only relations.

    49) Which of the below is not an Information system….

    Database Management System.

    50)Which background process performs a checkpoint in the database by writing modified blocks from the database buffer cache in the SGA to the data files? DBWn

    1. hi plz give me book refernce study material for so

  3. Someone Please post answers for afternoon Session..

  4. yr itna bhi nhi smjh rhe kch log ki jo ye 50-55 cut off dikha raha h wo 200 ko 100 m convert krke dikha raha h.kyunki interview nhi h or kch soch rhe h ki 200 m se 50-55 jayegi..kya yr kch to common sense rkho. Hi frnds all ap state and telangana state candidates August h eenadu business main paper choodandi in that news SBI is planning to reduce the no of posts

Leave a Reply

Your email address will not be published. Required fields are marked *

All Exams Answer Key & Cutoff Marks © 2016 About Us | Contact Us | Privacy Policy | Disclaimer
Disclaimers & Statutory Warnings ! We do not claim and we are not responsible for any official or non official news regarding exam figures, vacancies or number of posts in job advertisement (govt. as well as private agencies),exam dates, paper leak , exam paper cancellation news content & exam graphic images etc. The news & content may be rumors & false. Only visit & consider the official website always as a true source of news. We don’t assure that the data provided here is completely correct. One can use the information at their own risk. We are not responsible for any consequences that occur on applying for any job or walkin data that we provided in our portal. Click any link at your own risk in our portal. We are not responsible for any loss you get on doing so. We don’t have control on the portal as these are maintained by third party people. The Job seekers are advised to be careful and check the information from other websites and official websites make conform regarding any particular advertisement.
Sitemap