Accenture Mcq's Cloud NW Msoffice
Accenture Mcq's Cloud NW Msoffice
Accenture Mcq's Cloud NW Msoffice
a.Management of Middleware
b.Management of Data
c.Management of Runtime
d.All of the mentioned options
Q. 2. As an advantage of cloud, we know that data is available over
network. On which of the following network is data available in case of
private cloud?
a. LAN
b. WAN
c. Broad Area Network
d. None of the mentioned
Q. 3. For which of the following attack(s) does the attacker obtain the
physical address to the cryptosystem?
a. 256
b. 64
c. 128
d. 40
Q. 5. Which of the following are examples of passive
Attacks?
a. Cloud Computing is not direct and accessible by user at any hour of the day via
particular device.
b. Cloud computing is direct and accessible by the user at any hour of the day via
any device.
c. Small scale businesses with limited capital and resources must opt for data
center.
d. Larger companies that are more extensive and widespread should opt for data
centres.
a. Only a and c
b. Only a and d
Q. 8. Which of the following is incorrectly marked SSH commands to their
description?
a. 2 and 3
b. 1 and 3
c. 1 and 2
d. 1, 2 and 3
Q. 11. A stateful firewall maintains which of the following list of
active connections?
a. Bridging Table
b. State Table
c. Connection Table
d. Routing Table
Q. 12. In TCP/IP model, which of the following protocol
is used in link layer?
a.UDP
b.FTP
c.DNS
d.ARP
Q. 13. The prerequisite for Zone based firewall is stateful firewall and the
traffic is generated by the trusted network in stateful database. To create a zone
based firewall the following steps are followed:
1. Zones are identified and created.
2. Each zone is assigned an interface.
3. Class-Map policy is created to identify the type of traffic.
4. Policy map is created.
Identify the next two steps in this process:
a. 5. Ensure that class map policy and the policy map are not interacting with each
other. 6. Create Zone pair to allow traffic in one direction.
b. 5. Assign Class Map to the policy map 6. Create Zone pair to allow traffic in
both direction.
c. 5. Assign Class Map to the policy map 6. Create Zone pair to allow traffic in
one direction.
d. 5. Ensure that class map policy and the policy map are not interacting with each
other. 6. Create Zone pair to allow traffic in both direction.
Q. 14. Assume that a developer is working on a wireless security scenario where an
attacker breaks the encryption to get the key value. The developer should use the
safest encryption model using WPA2 with respect to the not-breakable AES algorithm
to prevent the attacker from breaking the encryption. Which of the wireless
security concept being referred to here? Select the correct answer:
a. Use a DNS proxy that diverts internal information to the internal DNS Server
b. Use a DNS proxy that blocks the inbound responses.
c. Keep inbound queries to DNS
d. Use DNS proxy that diverts queries for external information to the internal DNS
server
Q. 16. In a cloud network assume that an intruder causes a denial of service
attack and the web application server becomes unavailable for operation. Which
solution from the given choices can help prevent such attacks?
a. The attackers will lack the private key to decrypt the encrypted message by
comprising the server.
b. The attackers will lack the public key to decrypt the encrypted message by
comprising the server.
c. The attackers will lack the private key to encrypt the decrypted message by
Q. 18. Assume that a group of users get an email from an online shopping portal
about seasonal sale offers. When the users click on the link provided in the email
to avail the discount code, it leads to the execution of a malware software. What
is the category of this attack?
a. pay-as-you-go
b. pay-and-use
c. pay-per-use
d. None of the mentioned options
Q. 21. Which of the following is correct based on the below statements?
A. Clouds offer limited data storage capacity to users.
B. Clouds offer unlimited data storage capacity to users.
C. In both data center and cloud, there is a third party involved in managing data
but the cloud has more data theft.
D. In both data center and cloud, there is a third party involved in managing data
but the data center has more data theft.
Choose the correct answer from the options given below.
a. Only A and D
b. Only B and C
c. Only B and D
d. Only A and C
Q. 22. Consider the given steps and choose the option that shows the correct
sequence of a metamorphic virus?
B. Conversion of the newly produced mutated assembly code of the virus into the
machine
D. Transformation of Code
a. ECDBA
b. ECDAB
c. CEADB
d. CDABC
Q. 23. Which of the following key resides on all stations as in AP and
client devices in a 4-way handshake?
a. .xlsm
b. .xlsx
c. .xlsb
d. .xltx
Q. 25. Which of the following functions will help to find the number of
working days between two calendar dates?
a. Business days
b. Network days
c. Days
d. None of the mentioned options
Q. 26. Which of the following groups is not present under the Insert tab
in MS-Excel?
a. Charts
b. Text
c. Sort & Filter
d. Tables
Q. 27. Which of the following functions is used to create a drop-down box in
selected cells?
1. It scans the directories or specific files for any malicious pattern and
indicates the presence of malicious software
a. Only 1
b. Only 1, 2 and 3
c. Only 1 and 2
d. Only 3
Q. 30. Which of the following statements is correct?
3. The Select object browser button is located below the vertical scroll bar
a. Only 1 & 2
b. Only 2 & 3
c. Only 1 & 4
d. Only 2, 3 & 4
Thank You!!!