Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Accenture Mcq's Cloud NW Msoffice

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Q. 1.

Which of the following is the benefit of the cloud if


you choose Software as a Service?

a.Management of Middleware
b.Management of Data
c.Management of Runtime
d.All of the mentioned options
Q. 2. As an advantage of cloud, we know that data is available over
network. On which of the following network is data available in case of
private cloud?

a. LAN
b. WAN
c. Broad Area Network
d. None of the mentioned
Q. 3. For which of the following attack(s) does the attacker obtain the
physical address to the cryptosystem?

a. Brute Force attacks


b. Classical Mathematical attacks
c. Implementation attacks
d. Social Engineering attacks
Q. 4. What is the minimum size in bits of Authentication, Accounting and
Authorization (AAA) Key?

a. 256
b. 64
c. 128
d. 40
Q. 5. Which of the following are examples of passive
Attacks?

a. Breaking WEP Encryption


b. Man in the Middle Attack
c. Injection of Wireless Traffic
d. Jamming Attacks
Q. 6. Which port number of FTP is used in active mode for
FTP Data Transfer?

a.None of the mentioned.


b.22
c.20
d.21
Q. 7. Which of the following is correct based on below statements?

a. Cloud Computing is not direct and accessible by user at any hour of the day via
particular device.
b. Cloud computing is direct and accessible by the user at any hour of the day via
any device.
c. Small scale businesses with limited capital and resources must opt for data
center.
d. Larger companies that are more extensive and widespread should opt for data
centres.

Choose the correct options:

a. Only a and c
b. Only a and d
Q. 8. Which of the following is incorrectly marked SSH commands to their
description?

a. -v : display version number


b. -A : Enable forwarding of the authentication agent connection
c. -v : verbose mode
d. -a: Disable forwarding of the authentication agent connection
Q. 9. Which of the following is required to calculate Message
Authentication Code?

a. Packet Sequence Number


b. Symmetrical Shared Secret
c. Actual Message Sent
d. All of the above
Q. 10. Which of the following statement is correct for UDP Protocol?

1. UDP supports packet switching

2. UPD is a null protocol if you remove the checksum field

3. SMTP implementation uses UDP as transport layer protocol

a. 2 and 3
b. 1 and 3
c. 1 and 2
d. 1, 2 and 3
Q. 11. A stateful firewall maintains which of the following list of
active connections?

a. Bridging Table
b. State Table
c. Connection Table
d. Routing Table
Q. 12. In TCP/IP model, which of the following protocol
is used in link layer?

a.UDP
b.FTP
c.DNS
d.ARP
Q. 13. The prerequisite for Zone based firewall is stateful firewall and the
traffic is generated by the trusted network in stateful database. To create a zone
based firewall the following steps are followed:
1. Zones are identified and created.
2. Each zone is assigned an interface.
3. Class-Map policy is created to identify the type of traffic.
4. Policy map is created.
Identify the next two steps in this process:

a. 5. Ensure that class map policy and the policy map are not interacting with each
other. 6. Create Zone pair to allow traffic in one direction.
b. 5. Assign Class Map to the policy map 6. Create Zone pair to allow traffic in
both direction.
c. 5. Assign Class Map to the policy map 6. Create Zone pair to allow traffic in
one direction.
d. 5. Ensure that class map policy and the policy map are not interacting with each
other. 6. Create Zone pair to allow traffic in both direction.
Q. 14. Assume that a developer is working on a wireless security scenario where an
attacker breaks the encryption to get the key value. The developer should use the
safest encryption model using WPA2 with respect to the not-breakable AES algorithm
to prevent the attacker from breaking the encryption. Which of the wireless
security concept being referred to here? Select the correct answer:

a. Confidential Attack: CCMP encryption wireless security is being referred here.


b. Confidential Attack: TKIP encryption wireless security is being referred here.
c. Confidential Attack: WEP encryption wireless security is being referred here.
d. Confidential Attack: No encryption wireless security is being referred here.
Q. 15. The filtering service in inbound response for DNS is sometimes difficult as
the hostname to IP address is received from outside network. As a result, it
becomes very difficult to take any security related decision. Which of the
following solutions are incorrect in the context of filtering the DNS?

a. Use a DNS proxy that diverts internal information to the internal DNS Server
b. Use a DNS proxy that blocks the inbound responses.
c. Keep inbound queries to DNS
d. Use DNS proxy that diverts queries for external information to the internal DNS
server
Q. 16. In a cloud network assume that an intruder causes a denial of service
attack and the web application server becomes unavailable for operation. Which
solution from the given choices can help prevent such attacks?

a. Using a remote server to develop and deploy the web applications


b. Configure digital certificates to authorise the client requests.
c. Configure web application firewall rules to monitor the changes in network
traffic
d. Use redundant systems to backup cloud data and restore if after system failure.
Q. 17. Consider a scenario where A wants to send an encrypted email to B. A takes
B’s public key to encrypt the message. When B receives the message, B takes
private key to decrypt the message from A. What happens if attackers try to read
the message by compromising the server? Select the correct answer from given
choices:

a. The attackers will lack the private key to decrypt the encrypted message by
comprising the server.
b. The attackers will lack the public key to decrypt the encrypted message by
comprising the server.
c. The attackers will lack the private key to encrypt the decrypted message by
Q. 18. Assume that a group of users get an email from an online shopping portal
about seasonal sale offers. When the users click on the link provided in the email
to avail the discount code, it leads to the execution of a malware software. What
is the category of this attack?

a. Denial of service attack


b. Social engineering
c. Malware on endpoints
d. Social Media Attack
Q. 19. Consider that a tool development team supported with DevOps and cloud
infrastructure generates containerized applications. During the execution of such
applications in the cloud network, malicious scripts also get executed by hackers.
How can such vulnerabilities be prevented? Select appropriate answer:

a. Including DevOps log monitoring in the development cycle


b. Including AppSec model in development cycle
c. Including security standards in development cycle
d. Including vulnerability testing process for every release.
Q. 20. Which of the following payment options is best suited for small businesses
in cloud?

a. pay-as-you-go
b. pay-and-use
c. pay-per-use
d. None of the mentioned options
Q. 21. Which of the following is correct based on the below statements?
A. Clouds offer limited data storage capacity to users.
B. Clouds offer unlimited data storage capacity to users.
C. In both data center and cloud, there is a third party involved in managing data
but the cloud has more data theft.
D. In both data center and cloud, there is a third party involved in managing data
but the data center has more data theft.
Choose the correct answer from the options given below.

a. Only A and D
b. Only B and C
c. Only B and D
d. Only A and C
Q. 22. Consider the given steps and choose the option that shows the correct
sequence of a metamorphic virus?

A. Analysing of code by Code Analyzer

B. Conversion of the newly produced mutated assembly code of the virus into the
machine

C. Virus finds the location of its code.

D. Transformation of Code

E. Convert the code into assembly instruction binary code

a. ECDBA
b. ECDAB
c. CEADB
d. CDABC
Q. 23. Which of the following key resides on all stations as in AP and
client devices in a 4-way handshake?

a. Pairwise Transient Key


b. Pairwise Master Key
c. Group Master Key
d. Group Temporal Key
Q. 24. The XML-based and macro-ended file format for Excel 2007-2013 which
stores VBA macro code or Excel 4.0 macro sheets should be saved with which
extension?

a. .xlsm
b. .xlsx
c. .xlsb
d. .xltx
Q. 25. Which of the following functions will help to find the number of
working days between two calendar dates?

a. Business days
b. Network days
c. Days
d. None of the mentioned options
Q. 26. Which of the following groups is not present under the Insert tab
in MS-Excel?

a. Charts
b. Text
c. Sort & Filter
d. Tables
Q. 27. Which of the following functions is used to create a drop-down box in
selected cells?

a. Data > Conditional Formatting


b. Data > Data Validation
c. Pivot Table
d. Data > Filter
Q. 28. What is the difference between a Trojan and a Virus?

a. A Virus replicates itself while a Trojan does not


b. They are different names for the same thing
c. None of the mentioned options
d. A Virus starts as a Trojan and spreads later
Q. 29. Which of the following functions are provided by an Antivirus software?

1. It scans the directories or specific files for any malicious pattern and
indicates the presence of malicious software

2. It allows users to schedule scans so that they run automatically

3. If it detects any malicious software, it removes them

Choose the correct answer from the options given below.

a. Only 1
b. Only 1, 2 and 3
c. Only 1 and 2
d. Only 3
Q. 30. Which of the following statements is correct?

1. Colour and Pattern used to fill a closed shape is called WordArt

2. Menu bar is located below the title bar

3. The Select object browser button is located below the vertical scroll bar

4. The thesaurus tool finds Synonyms and antonyms

Choose the correct answer from the options given below.

a. Only 1 & 2
b. Only 2 & 3
c. Only 1 & 4
d. Only 2, 3 & 4
Thank You!!!

You might also like