Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Data Base Security PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

Data Base Security

1. __________ identifies the database platforms within infrastructure and then examines their
risk exposure.
Ans:​ ​Database Risk Assessment (DRA)

2. Which of the following options are consequences of user privilege misuse?


Ans:​ all option (Makes unauthorized alterations(unauthorized access),Views confidential or
sensitive data, Falsifies alert investigations)

3. “No unauthorized disclosure” is an objective of which aspect of database security?


​Ans :​ Integrity(worng ans)

4. DAM architecture in which a lightweight sensor is attached to the protected databases and
continuously polls the system global area (SGA) to collect SQL statements. Choose the
appropriate option that closely matches the given statement.
​Ans : ​Memory-based

5. A method of creating a structurally similar but inauthentic version of an organization's data is


most commonly known as:
Ans:​ Data Masking

6. _______ mechanisms ensure that information contained in objects does not flow explicitly or
implicitly into less protected objects.
Ans : Flow Control

7. ________aims to replace sensitive data in transit leaving the original at-rest data intact and
unaltered.
Ans : Dynamic Data Masking

8. _______ mechanisms are used to protect data from indirect detections.


Ans : Inference Control

9. ____________ allows for the use of certain operations on database objects as authorized by
another user.
Ans : Object Privileges

10. The process in which the application aggregates all user traffic within a few database
connections that are identified only by a generic service account name is called
_______________.

Ans : connection pooling


11. DAM systems that are a hybrid between a true DAM system and a SIEM which relies on data
generated by the database are called ___________.\
Ans :Log-based

12. Which of the following option can be considered a target for SQL injection?
Ans: ​stored procedures and input parameters.

13. ________ is exploited by influencing SQL statements that do not filter input from applications
to a back-end database correctly.
Ans : SQL injection

14.Which of the following options are principal classes of DoS attacks?


Ans : All option

15. Cryptography ensures ____________________.


Ans : CI

16. Which of the following options are consequences of user privilege misuse?
Ans : all option

17. _______ provides means to monitor privileged users and application access independent of
native database logging and audit functions.

18. _________ ensures that all direct accesses to the system objects occur base on modes and
rules fixed by protection policies.

19. The DAM architecture in which the systems collect information regarding database activity by
monitoring the communication between the database client and the database server is called
________.

20. ______________ is used to enforce multilevel security by categorizing the data and users
into various security classes.
SQL QUESTION

Create employee Table


1. CREATE TABLE EMPLOYEE(EMPID INT PRIMARY KEY NOT NULL, EMPNAME
TEXT, AGE INT, ADDRESS CHAR(30), SALARY REAL);

Insert into Employee Table


1. INSERT INTO EMPLOYEE VALUES(123,'JOHN',20,'HYDERABAD',12345.05);
2. INSERT INTO EMPLOYEE VALUES(789,'MARY',50,'CHENNAI',47851.05);
3. INSERT INTO EMPLOYEE VALUES(142,'SARA',22,'MUMBAI',78541.05);
4. INSERT INTO EMPLOYEE VALUES(258,'TINA',30,'KOLKATA',14782.05);
5. INSERT INTO EMPLOYEE VALUES(145, 'SARA', 32, 'BANGLORE', 58941.05);
6. INSERT INTO EMPLOYEE VALUES(147, 'MARY', 57, 'KERALA',148941.050);

Select for Employee


1. select * from EMPLOYEE order by salary asc;

UPDATE EMPLOYEE SET EMPNAME = 'HARRY' WHERE EMPID= 789;

UPDATE EMPLOYEE SET SALARY = 10000 WHERE EMPID= 123;

DELETE FROM EMPLOYEE WHERE EMPID= 258;

select salary from EMPLOYEE group by EMPNAME;

select EMPNAME, SALARY from EMPLOYEE group by EMPNAME having(SALARY >40000);

CREATE TABLE PROJECT(DEPID INT , PROJNAME TEXT, COMPNAME TEXT,EMPID INT,


CONSTRAINT fy_Empid FOREIGN KEY (EMPID) REFERENCES EMPLOYEE(EMPID));

Create table of Project


1. CREATE TABLE PROJECT(​PJID​ ​INT , ​EMPID​ ​INT, ​PROJNAME ​TEXT, ​COMPNAME
TEXT​);

2. CREATE TABLE PROJECT(​DEPTID ​ ​INT , ​EMPID​ ​INT, ​PROJNAME ​TEXT,


COMPNAME TEXT​);

​Insert into project table


1. INSERT INTO PROJECT VALUES(1,123,'SUPPLIES','TCS');
2. INSERT INTO PROJECT VALUES(2,142,'GOODS','IBM');
3. INSERT INTO PROJECT VALUES(3,145,'DEPLOYS','GOOGLE');
Use of Inner Join
1. SELECT EMPLOYEE.EMPID, EMPNAME, SALARY, PROJNAME FROM EMPLOYEE
INNER JOIN PROJECT ON EMPLOYEE.EMPID = PROJECT.EMPID;
Use of left join
1. SELECT EMPLOYEE.EMPID, EMPNAME, SALARY, PROJNAME FROM EMPLOYEE
LEFT JOIN PROJECT ON EMPLOYEE.EMPID = PROJECT.EMPID;

Use of Cross join


1. SELECT * FROM EMPLOYEE CROSS JOIN PROJECT;

Create db
1. sqlite3 Employee.db;

USE OF DISTINCT
1. SELECT DISTINCT EMPNAME FROM EMPLOYEE;

UNION
1. SELECT EMPID FROM EMPLOYEE UNION SELECT EMPID FROM PROJECT;

UNION ALL
1. SELECT EMPID FROM EMPLOYEE UNION ALL SELECT EMPID FROM PROJECT;

Use of LIKE operator


1. SELECT * FROM EMPLOYEE WHERE SALARY LIKE '1200%';
2. SELECT EMPNAME FROM EMPLOYEE WHERE EMPNAME LIKE '__R%';

Use of GLOB operator


1. SELECT * FROM EMPLOYEE ​WHERE ​ADDRESS ​GLOB '*I';

Example : ​For example, "LIMIT 4 OFFSET 4" will ignore the first 4 rows, and returned 4 rows
starting from the fifth rows, so you will get rows 5,6,7, and 8.

Use of LIMIT clause


1. SELECT * FROM EMPLOYEE LIMIT 0,3;

Create table ENTRY


1. CREATE TABLE ENTRY(EMP_ID INT, ENTRY_DATE DATE);

Create trigger AFTER INSERT


1. CREATE TRIGGER after_insert AFTER INSERT ON EMPLOYEE
BEGIN
INSERT INTO ENTRY(EMP_ID,ENTRY_DATE) VALUES(NEW.EMPID ,current_date);
END;
Q) ​Let us consider an example where you want to import a CSV file into a non-existing
table called COMPANY.
Ans:
.​mode csv
.​import /Users/javatpoint1/Desktop/sqlite/employee.csv EMPLOYEE

Q) ​You can check whether the table is created or not and also the content in the table by
executing below commands.
Ans :
.​mode column
SELECT * FROM EMPLOYEE;

Q) ​Create a CSV file called employee.csv with Basic Ubuntu command (Hint: Sudo nano) and
enter the fields like EMPID, EMPNAME, AGE, ADDRESS, SALARY with the below values

1. nano
2. CTRL+O
3. Write file name employee.csv
4. Press ctrl+M
5. Write the statement that you want to write inside file(employee.csv)
6. CTRL+O
7. Press ctrl+M
8. ctrl+X

Q) ​The following commands select data from the EMPLOYEE table and export it to the
after_employee.csv file.

.headers on
.mode csv
.output after_employee.csv
select * from EMPLOYEE;
Azure Question

1. A subnet is a range of IP addresses in a __________.


Ans : Vnet

2. Default Private IP address allocation method is _________.


Ans : Dynamic

3. Microsoft uses industry standard _______________ dynamic routing protocol to


exchange routes between your on-premises network, your instances in Azure, and
Microsoft public addresses.
​ Ans : BGP

4. Which Azure networking component is the core unit from which administrators can have
full control over IP address assignments, name resolution, security settings, and routing
rules?
​Ans : VNET
5. Virtual Machines​ is an IaaS service that allows you to deploy and manage VMs
inside a VNet.
6. App Service​ is a managed service to host mobile app backends, web apps,
RESTful APIs, or automated business processes.
7. Service Fabric ​is known as a distributed systems platform that operates in
numerous environments. Service Fabric is an orchestrator of microservices
across a cluster of machines.
8. Azure Batch​ is called a managed service for operating large-scale parallel and
high-performance computing (HPC) applications.
9. Cloud Services​ is a managed service for operating cloud applications and utilizes
a PaaS hosting model.

10. The VM size determines the number of __________.


​Ans :​ NIC

11. Azure Virtual Machines only support VMs running the Microsoft Windows operating
system.
Ans : ​False

12. Which of the following Windows Server roles is not supported on Azure Virtual Machines?
​Ans :​ Hyper-V

13. ​Each resource can only exist in one resource group.

14. Which of the following VM configurations qualifies for SLA availability?


Ans : Multi-instance VM on an avaliblity set

15 : Which of the following is a non-relational storage system for large-scale storage?


Ans : Data Lake Store

16. Geo-replication is enabled by default in Windows Azure Storage.


Yes

17. What VPN types are supported by Azure?


Ans : VNet to VNet

18 : Is it possible to create a custom Domain name, or use your organization's domain


name, such as fresco.com, in Azure Active Directory?
Ans : yes

19: Which type of storage offering uses SSDs and is intended for use with Virtual machines?
Ans : bob(confused)

20. Azure Storage plays the same role in Azure that ______ plays in Amazon Web Services.
Ans : not lnow

21: Which of the following is also called Compute?


Ans : set of virtual machine instances

22.
Git
Creating Repositry :

1. git log --online --graph(shows history of project)

2. ​git init​ is used for creating an empty repository or for re-initializing an existing repository
3. ​git status​ displays the current status of the staging area and the working directory
​4​. git add​ prepares the new and existing files for staging . It adds all the new and existing
file/directories to the staging area
​5​. git commit​ will take a snapshot and record all the changes into the repository
Angular 2

● Then import the service in root component, which is discussed in Dependency


Injection.
● Create a class with the required function and use the decorator @injectable() to specify
that it is a service.
● Two way binding is defined using _______.
Ans : [()]

● When a service is declared at root module and injected in two components, a separate
instance will be created for each of the components.
Ans : True (not confirm)

● The decorator that is used to indicate a module is _______.


​Ans : @NgModule

● Which Angular module helps you achieve two-way data binding?


​Ans : FormsModule

● There can be only one service in a component. ​Ans (True)

● Templates can also be added using URLs of the file containing code. ​True

● Multiline template should be included within _________. ​Ans = ”....”

● Which of the following are valid metadata properties?​ Ans =All valid

● In-order to bind data from view to component class you can use __________.
Ans : Event Binding

● Which of the following helps you define Metadata for a class?


Ans : Using Component

● NgFor and NgIf are examples of ...? ​Ans : Structure

● Which of the following is an Attribute Directive? ​Ans : ​ ​ngModel

● How many lifecycle methods does Angular offer apart from a Component's construtor()?
Ans : 8

● ______ element property is used to tell angular to insert the instance of component in the
HTML file.
Ans : Template

● Property binding is defined using _________. ​Ans : []


● Angular finds which services are required to the component, by looking at the "type" of
component's ________ parameters.
Ans : Decoder
● Angular 2 uses ______ Dependency Injection.​ Ans Component

● Services are included in components using ______. ​Ans Provider

● ______ are mandatory parameter in components.​ Ans Tempalate

● Angular 2 uses ______ Dependency Injection. ​Ans :​ ​hierarchical

● Which among the following is not a metadata? ​Ans :​ @component

● Which directive lets you modify the behaviour of another Directive?


● Angular2 is written on top of Angular 1.5.x. ​true
● Which of the following is correct usage of template syntax
● <button (click)="deleteHero()">Delete hero</button>
● <ul>
● <li *ngFor="let customer of customers">{{customer.name}}</li>
● </ul>
● Which of the following are valid metadata properties? ​pipe
● Which of the following keywords is used to enable a context manager in Python? Ans
:ContetManager

Sass

1. Which directive is used to used same code with different arguments


Ans : mixins

2. Mixin-exists() is a _________ type of function.


Ans : introspection

3. Which directive is used to import files?


Ans : @import

4. Which selector function is used to select simple selector from compound selector?
Ans : is-superselector() (wrong)

5. which symbol is used to refer parent selector in SASS


Ans : &

6. which string function is used to retrieve specific part of the string


Ans : str-slice()

7. Which directive allows to output styles in a loop?


Ans : @for

8. In how many ways SASS can be used?


Ans 3

9. How many output styles are there in SASS?


Ans 4 (wrong)

10. What is the correct way to define a variable in SASS?


Ans : $primary-color :#fffff

11. Which datatype allows you to represent multiple values using comma or space
seperator?
Ans : List

12. Which datatype allows you to arthimetic operations along with color components?
Ans : Color

13. Which list function is used to return nth element of the list?
Ans : nth()

14. Which map function returns all keys in a map?


Ans : map-key()

15. Which directive is used to style block at top of the document?


Ans : @at-root

16. What does “#{ }” syntax refers?


Ans : interpolation

17. Which string function is used to give quotes to the string?


Ans : quotes

18. Which arguments are used to include arguments in the mixins?


Ans : variable argument (X)

19. Which symbol is used to represent placehoder in SASS?


Ans : %

20. Which command is used to detect the changes that are made to sass file?
Ans : Watch

21. Boolean operations can be performed using the following operators.


Ans : all option

22. How many syntaxes that sass support? Ans 2

23. Which datatype allows you to get result using map functions?
Ans : map

24. Which directive includes media rules in the stylesheet?


Ans @media

25. Which directive allows map and list values to iterate?


Ans : @each

26. Which directive allows to loop through each iteration from start to end?
Ans : @for

27. Which directive displays an error message?


Ans : @error

28. How many types of functions are there in SASS? Ans 4(X)

29. sass expression is a combination of ____________.


Ans all the option
30. SASS is the only CSS preprocessor .
Ans False

31. which numeric function is used to round up the number to whole


Ans Ceil()

32. alpha() comes under which type of color function?


Ans : color creation (X)

33. Which directive executes code based on the condition?


Ans @if

34. How can we set default value to the variable?


Ans !default

35. What are the key features of SASS?


All the option mentioned

36. Which directive is used to convert multiple sass files into single or multiple css files?
Ans @extend
Azure Essential Continuum
1. Azure Iaas Services like : Virtual machine, Vnet and Storage

2. Azure Pass Services like : Web app and Azure Sql

3. Azure is Microsoft’s cloud computing platform that enables individuals and


organizations to create, deploy, and operate cloud-based applications and
infrastructure.

4. Azure offers a number of services and resource offerings as :

a) Infrastructure as a Service (​IaaS​)


b) Platform as a Service (​PaaS​)
c) Software as a Service (​SaaS​)

5. ​Cloud Computing​ is the use of hardware and software to deliver a service over a
network (typically the Internet).

With cloud computing, users can access files and use applications from any device that
can access the Internet. An ​example​ of a ​Cloud Computing​ provider is Google's
Gmail.

6.
7. ​On-premises IT infrastructure is like owning a car. ​When you buy a car,
you’re responsible for its maintenance, and upgrading means buying a new car.

8. ​IaaS is like leasing a car. ​When you lease a car, you choose the car you want
and drive it wherever you wish, but the car isn’t yours. Want an upgrade? Just
lease a different car!

9. ​PaaS is like taking a taxi. ​You don’t drive a taxi yourself, but simply tell the
driver where you need to go and relax in the back seat.

10. ​SaaS is like going by bus. ​Buses have assigned routes, and you share the
ride with other passengers.

11.​ Software as a Service (SaaS):

a) SaaS allows people to use cloud-based web applications.


b) email services such as Gmail and Hotmail are examples of cloud-based
SaaS services

12. ​Platform as a Service (PaaS) :

a) PaaS refers to cloud platforms that provide runtime environments for


developing, testing, and managing applications.

b) Examples of PaaS services are Heroku and Google App Engine.

13.​ Infrastructure as a Service (IaaS) :

a) IaaS is a cloud service that provides basic computing infrastructure:


servers, storage, and networking resources. In other words, IaaS is a virtual
data center.
b) IaaS services can be used for a variety of purposes, from hosting websites
to analyzing big data. Clients can install and use whatever operating
systems and tools they like on the infrastructure they get. Major IaaS
providers include Amazon Web Services, Microsoft Azure, and Google
Compute Engine.
14. ​Azure Services: Compute, Storage, and Identity

​Compute and Networking Services

● Virtual Machines.
● Azure RemoteApp.
● Azure Cloud Services.
● Azure Virtual Networks.
● Azure ExpressRoute.
● Traffic Manager.

Storage and Backup Services

● Azure Storage.
● Azure Import/Export Service.
● Azure Backup.
● Azure Site Recovery.

Identify and Access Management Services

● Azure Active Directory


● Azure Multi-Factor Authentication

15.​ ​Azure Services: App, Data, and Media

​Application Services

● Azure App Services


● API Management
● Notification Hubs
● Event Hubs

Data and Analytics Services

● SQL Database
● HDInsight®
● Azure Redis Cache
● Azure Machine Learning
● DocumentDB
● Azure Search

Media and Content Delivery Services

● Azure Media Services


● Azure CDN
● Azure Service Bus

16. ​Azure offers two deployment ​models and multiple tools​ for you to be able to deploy
and manage your resources.

a) Azure Deployment Tool :

1. Azure Service Management Model (ASM)


.​ using Classic Portal
. ​This was the first approach that was introduced by Microsoft. Here the
resources are coupled and can be deployed using ASM PowerShell
Module.

2. Azure Resource Management Model (ARM)

● using New Portal


● The resources are decoupled and hence can be configured
independently. JSON templates provide simple orchestration and
rollback functions. They have their own ARM PowerShell Module as
well.

17.​ Virtual Machine ​ : ​Virtualization is the fundamental technology that powers cloud
computing. This software separates compute environments from physical infrastructures,
so you can run multiple operating systems and applications simultaneously on the same
machine

18. ​VM Vs Cloud : ​The Cloud computing works on IaaS (Infrastructure as a Service)
while virtualization is based upon SaaS (Software as a Service). Shared computing
resources like software and Hardware provides you cloud computing environment while
Virtualization comes into existence after Machine/Hardware manipulation.

19. ​VMware :

a) VMware is a company which Provide Virtualization on Desktops.


b) Virtualization : ​Virtualization is the creation of a virtual;rather than actual
version of something, such as an operating system, a server, a storage device or
network resources.
c) About virtualization if you Have ever divided your hard drive into different
partitions.

20.
Yaml

Which of the following combinations are used by mapping?


Ans > Colon & Space

A tag is represented with which indicator?


Ans > !
Which of the following document is known as clean document?
Ans > Bare Document
Which of the following is the output of serialization?
Ans > Graph X
Which of the following block nodes are valid?
Ans > Block mapping
Which of the following is defined as giving instructions to YAML procesor?
Ans > Node
Which of the following is defined as giving instructions to YAML procesor?
Ans > Production Parameter
Multiple documents with single streams are separated with\
Ans > Three Hyphen
Which of the following is the shortcut key for comments in YAML?
Ans > CTRL + Q
Associative arrays are represented using
Ans > :
Block sequences are denoted by which of the following indicator?
Ans > “-”
Chomping is interpreted in whiich of the following form?
Ans > All option
Which of the following can be defined as a single data structure?
Scalar X
Generic sequence is represented with which of the following tag?
Ans > !! Seq
Which of the following comes under failsafe schema?
All option

Which of the following is the default schema considered by YAML processor?


Core

Flow collection entries are terminated by

Ans > ,
Which of the following block nodes are valid?
Block scalar collection
Which of the following symbol is representd by aliasing?
*

Web Content
Which property is used to specify a list of one or more strings separated by
commas indicating a set of possible image sources for the user agent to use.
Ans > SrcSet

In CSS, select the property to set an image in a list instead of a standard


bullet?
Ans > list-style-image

The <img> element can use all the ARIA roles.


Ans > False

The order of ​grid-area​ property is ​________​.


Ans > ​grid-row-start

● grid-column-start
● grid-row-end
● grid-column-end

The value/values that “writing-mode” can take is/are ​__________​.


Ans > all option

Which of the following properties are not of a GRID-container?


Ans > Grid-content

In the code ​flex: 1 0 auto​, which property does the second value
represent(here 0)?
Ans > flex-shrink

What is the default orientation within a flex container?


Ans > Horizontal
Which of the Flexbox properties exists?
Ans > Flax-wrap

Which of the following css property allows elements to be offset, rotated,


scaled, and skewed in a variety of different ways?
Ans > ​ transform

Which of the following css property is used to define the number of times an
animation should play?
Ans > ​animation-iteration-count

Which of the following css property is used to indicate if an animation plays in


reverse or repeats itself every other iteration?
Ans > ​animation-direction

Which of the following css property is used to define which properties a


transition will be applied to?
Ans > ​transition-property

Which of the following css property is used to define a delay before an


animation starts?
Ans > ​animation-delay

Which are the different events that the <video> tag generates?
Ans > suspend and ended

Which API makes the user’s current location available to browser-based


application?
Ans > geoloaction api

The ____________ property specifies the stack order of an element.


Ans > Z-index

Which of the following statements is valid for the features of JavaScript?

Ans > all

What are the values that preload attribute can take?


Ans > all

Which CSS 'table-layout' property value renders tables the fastest?

Ans > Fixed

Which method returns an object that contains image data of a specific

ImageData object?

Ans > getImageData()

Which part of a webpage receives most of the users’ fixations?

Ans > left side

A preprocessor is an abstraction layer built on top of CSS.

Ans > true

How to force a word wrap using CSS3?

Ans > ​word-wrap​:​ break-word​;

Which HTML5 attribute can be used with HTML5 date input type to limit date

selection?

Ans > max

Which property defines colour of the text, a line or outline of an element?

Ans > stroke

In REST API interaction is made via HTTP protocol.

Ans > true

JavaScript is a highly secure scripting language.


Ans > false

What is one advantage of sliders for application design?


Ans > They represent ​a more fun and engaging input method compared with other UI
controls

Which function is used to connect to the WEBSQL database?


Ans > openDatabase()

Which of the following method retrieves the current geographic location of the
user?
Ans > ​getCurrentPosition()

What can the 'direction' CSS property be useful for?


Ans > right to left

Which method checks if the browser can play the specified video type?
Ans > canPlayType()

What property will one use to know whether Canvas is supported?


Ans > conves.getContext()

What is the statement to enable ‘strict’ mode in JavaScript?


Ans > use strict

What is the purpose of the event disconnectionEvent?


Ans >when player disconnect from channel

Which of the following does NOT usually appear in a service blueprint?


Ans Customer emaotion(X)

What is the necessity to have API?


Ans > Describe perticular task

Which of the following best describes the false-consensus effect?


Ans people tends to assume that…..

When creating the manifest file and ensuring that the manifest attribute is
correct, which choice shows the correct text for the first line of text?
Ans CACHE MANIFEST

Which CSS 'table-layout' property value renders tables the fastest?


Ans : Fixed
NoSql

Limitations of RDBMS are ______________.


Ans > Database design complexity

Horizontal scaling approach tends to be cheaper as the number of operations


and the size of the data increases.
Ans > True

________ distributes different data across multiple servers.


Ans > Sharding

NoSQL databases are designed to expand _________.


Ans > Horizontal

A Riak convergent replicated data type (CRDT) includes ________.


Ans > Map/Set/counter

The RDBMS 'table' equivalent terminology in Riak is ________.


Ans >Bucket

Key-value pair data storages include all except ________.


​ etwork Attached Storage
Ans > N

A Key-value store does not support Secondary Indexes.


Ans > False

In column-oriented stores, data is stored on a ____________ basis.


Ans > Column Family

In Cassandra, the ___________ determines how many copies of the data will
be maintained across multiple nodes.
Ans > Raplication Factor

Cassandra allows to define composite Primary Keys.


Ans > True

Pre-join projection is equivalent to ________ as in traditional relational


systems.
Ans > ​Materialized View
In Hbase, 'Columns' are named and specified in table definition.
Ans > False

MongoDB read/write performance can be tuned with the help of Stored


Procedures.
Ans > False

An RDBMS equivalent component for a "document" in a Document database:


Ans > Row

An RDBMS equivalent component for a "document identifier" in a Document


database:
Ans : Foreign Key

JSON documents are built up of _________.


Ans > All option

______​ is a syntax for retrieving specific elements from an XML document.


Ans > Xpath

The major components of a Graph include all except _______.


Ans > Json

Only Nodes have properties in Graph database.


Ans > False

Graph databases are generally built for use with ________.


Ans > OLTP

Cypher query language is associated with __________.


Ans > NEO4J

Neo4j architecture is a self-driven and independent architecture because of


________________.
Ans > Both

Some of the common Write Consistency level in Cassandra include all except

___________.
Ans > All option

In a columnar database, the columns are stored together on disk, achieving a


higher compression ratio is an expensive operation.
Ans > False

Cassandra lightweight transactions (LWT) supports ______ pattern.


Ans > Compare and set

In Cassandra, if the replication factor is 5, the coordinator will send replicas of


the data item to the next _________ nodes on the ring.
Ans > 4(not sure) or 5(X)

_________ are replicated to allow failover in MongoDB.


Ans > Shard(not sure)

Hbase main server components include all except _________.


​ base Memstore
Ans > H

The column store need perform _____ IO to insert a new value


Ans > As many disk block

The row store has to perform _____ IO to insert a new value.


Ans > Single

Like most relational databases, Kudu also offers secondary indexes and
uniqueness constraints.
Ans > True

HBase Tables are divided _________ by row key range into ________ .
Ans > h​ orizontally, regions

Riak demonstrates dual nature of _____________.


Ans ​Key/value Store and Graph Database

Hbase Data blocks metadata information are being maintained by _________ .


Ans > Hbase Master
Hbase DDL Operations (create, delete tables) are maintained by
___________.
Ans > Hbase Master

In Cassandra, if the replication factor is 3, the coordinator will send replicas of


the data item to the next _____ nodes on the ring.
Ans > 3(X)

Cassandra has properties of both __________ and ____________.


Ans >​Dynamo and BigTable

In Riak, ________ consistency model is implemented.


Ans > EVENTUAL

An RDBMS equivalent component for a "collection" in a Document database:


Ans> Table

The equivalent Hbase structure of an in-memory tree in Log-structured Merge


Trees is __________.
Ans > MemStore

Read overhead in a Columnar database can be partly reduced by Multicolumn


projection and _____________.
Ans > Caching

In case of an Eventual consistency, reads may not return the most recent
value, but reads will not return values “out of sequence.”
Ans > False(Confrim)

In MongoDB, there is a similar feature of 'like' expression as like RDBMS.


Ans > false

Kudu can be accessed via all except _________.


Ans > Hive

Some of the common Read Consistency level in Cassandra include all except
__________.
Ans > All the option(X)

Document databases split a document into its constituent name/value pairs for
indexing purpose.
Ans > False

Pre-join projection equivalent to ________ as in traditional relational systems.


Ans Store Procedure

The MATCH clause is roughly equivalent to the _______ clause in SQL and
the RETURN clause to a ______ clause.
Ans > Where, select

Columnar databases are preferable for OLTP systems


Ans > False

Transactional integrity is relevant in case of batch-centric Hadoop-based


analytics on warehoused data.
Ans > False

Wiredtiger storage engine is a part of ___________


Ans MangoDB

Cassandra's Gossip Protocol can take care of the heartbeat lost due to
_______ in a widely distributed system.
Ans > Node Failue

Element Of User Expirence

________​ refers to design a product or service by considering a user's


emotions and attitudes about using it.
Ans > User Expirence

________ aid a business grow and attain its objectives.


Ans > Busniess Goal

The experience ​users​ have with your product or service comes through
____________​.
Ans Touch

_________​ help us to understand users in the context of their everyday lives.


Ans > Focus Group

What makes sure that the aesthetic and functional aspects of the button work
in the context of the rest of the product?
Ans > User Experience Design

______ indicators can be traced after the product has been launched to view if
it meets product goals and user requirements.
Ans > Success Matixcs

__________​ makes sure that clicking a button triggers appropriate action on


the device.
Ans > ​AESTHETIC DESIGN(X)

The visual design of a product can be evaluated by means of ​_________​.


Ans > User Testing(X)

A schematic representation of all the components of a screen and how they fit
together is called as ​____________​.
Ans > Wireframe

________​ plane blends content, functionality and aesthetics to produce a


design that pleases senses of the user.
Ans > Surface

________​ deals with presenting information in a way that people understand


effectively and efficiently.
Ans > Information Design

The discipline associated with creating a structured experience for users is termed as
Interaction Design​.

The usage of proper ​________​ is essential to communicate a brand identity.


Ans > Color Pelettes

Error handling mainly deals with ​_________​.


Ans > all the option

________​ navigation is embedded in the content itself.


Ans > Contextual
Which one of the following techniques helps us in understanding user needs?
Ans>All the option

In which architectural approach the nodes have a parent child relationship?


Ans > Hierarchical Structure

__________​ gives an insight how effectively the user experience is meeting


strategic goals.
Ans>Success Matrix

In which architectural approach the nodes are organized in a linear flow


pattern?
Ans > ​sequential

________​ navigation allows the user to access nearby screens in the


architecture.
Ans > Local

The concept of ​__________​ is not just visual but a set of conceptual


associations or emotional reactions.
Ans > Brand Identity

The design should be created for ​_______​.


Ans > End User

The experience ​users​ have with your product or service comes through
____________​.
Ans > All the option

The document created for 'listing product objectives' and 'user needs' is called
__________​.
Ans > Strategy Documents

_________​ is a method used to understand how users categorize information.


Ans > Card Sorting

Which is the topmost plane and visible to human eyes?


Ans> Surface Plane

To determine the requirements, we put our personas into short stories called
________​.
Ans > User Profile(X) I thing ​User Segment

The practice of designing a product or service keeping users in mind is called


__________​.
Ans > User Centeral Design

________​ navigation allows the users to access items that they don’t need on
a regular basis.
Ans > Local(X)

Cloud Computing

Which of the following are cloud characteristics?


Ans > all option(R)

The resilience characteristic of the cloud helps in easy data recovery after any
failure.
Ans > True(R)

Which of the following is cloud computing key enabling technologies?


Ans > all option(R)

What are the components of Cloud?


Ans > Client, Data Center, Distributed Server(R)

Which of the following product implements paravirtualization better?


Ans > Xen (R)

Which of the following are Virtualization Characteristics?


Ans > All option(R)

In full virtualization, the guest operating systems run in isolation.


Ans >True(R)
Which of the following option is not a service model?
Ans >Baas(R)

Salesforce.com​ is the largest service provider of _________.


Ans > Saas(R)

DaaS is utilized for provisioning critical data on demand.


Ans > True(R)

Which of the following option is not an issue with private clouds?


Ans > Oversubscribing(W)

SaaS supports many users and offers a shared data model via ________
model.
Ans > Multi-tendency(R)

What refers to the location and management of clouds infrastructure?


Ans > deployement(R)

Paravirtualization is ideal for __________.


Ans >Data Raplication

Among the following options, which is an example of hypervisor?


Ans > none of the above

Which of the following option is offered by Identity as a Service?


Ans > All the option / Identity of Governances

Reporting services are one of the cloud characteristics.


Ans : False(R)

Better Control, higher security, and privacy can be achieved through which
type of cloud deployment model?
Ans > Private

Which of the following is an essential concept related to the cloud?


Ans > all the option

Which feature is needed to make enterprise application migrate to a private


cloud?
Ans > ​Enablement of ​application​ as SaaS
Infrastructure APIs help in provisioning ________.
Ans > All option

Which clouds are on-premise giving IT managers complete control over the
available resources?
Ans > Private

In which cloud model, several organizations access to the same cloud for a
similar application?
Ans > Private

Full virtualization is ideal for ___________.


Ans >Disaster Recovery

In the public cloud, it incurs high CAPEX and less OPEX.


Ans > False

Which of the following options is cloud computing key enabling technologies?


Ans > All option

________ environment is used to deploy private clouds for critical workloads


and a public cloud to host less critical workloads.
Ans >​Hybrid

Clients access their data in the cloud through web-based protocols.


Ans > True

In paravirtualization, guest operating systems run in isolation.


Ans > True

What are the economic advantages of the cloud?


Ans > All option /Hardware

Which delivery model is an example of a cloud computing environment that


provides users with a web-based email service?
Ans > Saas

In which type of virtualization, you create a virtual machine on top of physical


hardware?
Ans > Desktop
What is the first step in the process of deploying a cloud computing offering?
Ans > none option

Which of the following is an essential concept related to the cloud?


Ans > Abstraction

IDaaS is a ________-based identity and access management offering.


Ans> Saas(R)

__________ is a tool that communicates with the hosts and their virtual
machines.
Ans > Virtual Machine Monitor(R)

Hosted email infrastructure is an example for _________.


Ans > Saas

What are the security risks of cloud computing?


Ans > All

Which of the following cloud client constitute computers without a hard drive?
Ans > None

Which of the following is also known as split testing?


Ans > A/B

Which of the following options are virtualization characteristics


Ans > Partition

For users from other nationalities, it is enough to offer a product translated in


their respective languages.
Ans > False

Two types of benchmarking are


Ans > stand-alone and compitetive

Tree testing is similar to card sorting.


Ans > False

Expert Reviews are conducted during the development phase.


Ans > False
People possessing this cultural trait take initiative and make their own
decisions.
Ans >

Which of the following options are virtualization characteristics?


Ans > All option

What are the cloud cost models?


Ans > all option

What are the cons of cloud computing?


Ans >
User
A Stakeholder is _____________.
Ans > any one

People from this cultural group are not tolerant of new ideas and opinions that
differ from their own.
Ans > ​People with low uncertainty avoidance

A/B Testing involves having an experienced evaluator using his/her knowledge


of testing products.
Ans > Yes

Which technique involves having an experienced evaluator using their


knowledge for testing products?
Ans > ​A/B testing is the technique

What is key in a User Research?


Ans > Detailed survey

'One size fits all' should not be the focus of UX design.


Ans > False

The techniques used to evaluate the hierarchy of a website are


____________________________.
Ans > ​Card Sorting and Tree Testing

The technique used for evaluating findability of topics in a website is


________________________.
Ans > card sorting

A casual form of testing where random users at a social or community location


are asked to use the product and provide informal feedback.
Ans > ​Guerilla testing

A/B testing is done for specific aspects of hierarchy alone.


Ans > false

A fictitious representation of a group of users is


__________________________________.
Ans > ​ User Persona
Surveys and questionnaires are primarily used for collecting information from a
large number of users.
Ans > True

____________ user research method comes from motion picture production.


Ans > Storyboard

Storyboards are illustrations that represent shots to represent a story.


Ans > True

Contextual Interview can be done without users.


Ans > True

Tree testing is not similar to card sorting.


Ans > True

In Usability tests, we test the interface's usability.


Ans > true

Surveys are a quantitative mode of research.


Ans > True

User Research is the first step of a UX design process.


Ans > ture

User Research is the first step of a UX design process.


Ans > all

User Persona is a ___________________________.


Ans > quantitative

Tree testing is similar to card sorting.


Ans > False

Card sorts are used to generate information architecture.


Ans > true

Expert Review is done by end users.


Ans > false

User Research is essential because


_____________________________________.
Ans all

Power Distance Index measures _____________.

A process that emphasizes the tasks users must perform and the situation in
which the tasks are performed is ______________________.
Ans> Task Ananlysis

These are comprehensive reports.


>none

Design should not be changed based on iterations.


Ans > False

People from this cultural group are more tolerant to new ideas and opinions
that differ from their own.
Ams >

Which of these techniques are used exclusively for designing hierarchy?


ANs >

Quick findings are comprehensive reports.


>False

You might also like