Quiz All in One
Quiz All in One
Question 1
Correct
Select one:
a. Arcsight
b. Qradar
c. Solarwinds
d. Splunk
Question 2
Correct
Select one:
True 989
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37286&cmid=2726 1/3
2/4/22, 11:45 PM Pre Quiz: Attempt review
Question 3
Correct
Which of the following provides visibility to security professionals and records the actions of their IT environment
Select one:
a. SIEM Software
b. Keylogger
c. MS Office
d. Linux
989
Question 4
Correct
Select one:
a. Security Infromation and Excahnge Management
989 Management
b. Security Infromation and EMail
c. Security Infromation and Event Management
d. Security Infromation and Evidence Management
Question 5
Correct
989
Mark 1.00 out of 1.00
The encryption of data that is addressed in this final security rule standard is
Select one:
a. Transmission Security
b. Security Management Process
c. Information Access Management
d. Audit Controls
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37286&cmid=2726 2/3
2/4/22, 11:45 PM Pre Quiz: Attempt review
◄ Discussion Forum
Jump to...
SIEM Foundations ►
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37286&cmid=2726 3/3
2/4/22, 11:45 PM Post Quiz: Attempt review
Dashboard / SIEM Fundamentals / SIEM SOC and SecOps, Vendors / Post Quiz
Question 1
Correct
Which of the following shows the current state of security-related systems, metrics, and any potential security vulnerabilities.
Select one:
a. Data Backup Plan
b. Data Monitoring
c. Data exploration
d. Dashboard
Question 2
Correct
________ is a set of technologies that enable a security operation centre (SOC) to qualify, analyse, and remediate threats using
standardised procedures and automation to improve SOC efficiency.
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42267&cmid=2731 1/3
2/4/22, 11:45 PM Post Quiz: Attempt review
Question 3
Correct
To find out what happened before, during, and after a hack, ___________ models are utilised.
Select one:
a. investigate
b. files
c. digital forensic
d. manul
989
Question 4
Correct
__________ is a legal framework that establishes criteria for the gathering and processing of personal data from European Union
citizens (EU)
Select one:
a. HIPAA 989
b. Payment Card Industry
c. SOX
d. General Data Protection Regulation
Question 5
Correct 989
In an agentless environment, which solution enables you to automatically collect and aggregate logs from numerous devices
and apps throughout your network?
Select one:
a. Log Collector
b. Log Monitor
c. Log Files
d. Log Events
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42267&cmid=2731 2/3
2/4/22, 11:45 PM Post Quiz: Attempt review
Jump to...
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42267&cmid=2731 3/3
2/4/22, 10:43 PM Pre Quiz: Attempt review
Dashboard / Security Fundamentals / Introduction Video and Pre Quiz / Pre Quiz
Question 1
Correct
Select one:
a. WEP
b. accesspoint
c. WPA
d. Access port
989
Your answer is correct.
Question 2
Correct
Select one:
a. Password
b. UserID
c. Fingerprint
d. OTP
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41992&cmid=2432 1/3
2/4/22, 10:43 PM Pre Quiz: Attempt review
Question 3
Correct
Select one:
a. malicious hardware
b. software
c. malicious software
d. none
Question 4
Incorrect
989
Select one:
a. 2000
b. 1950
c. 1970
d. 1990
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41992&cmid=2432 2/3
2/4/22, 10:43 PM Pre Quiz: Attempt review
Question 5
Correct
Select one:
a. blank
b. 6 charcters
c. 12 charcters
d. 3 charcters
◄ Discussion Forum
Jump to...
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41992&cmid=2432 3/3
2/4/22, 10:44 PM Post Quiz: Attempt review
Question 1
Correct
To protect a computer from virus, you should install -------- in your computer.
Select one:
a. antivirus
b. none
c. firewall
d. defragment
989
Your answer is correct.
Question 2
Correct
Select one:
a. UDP
b. TCP
c. SNMP
d. LDAP
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42003&cmid=2436 1/3
2/4/22, 10:44 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. 80
b. 25
c. 53
d. 23
Question 4
Correct
989
Select one:
a. 25
b. 143
c. 443
d. 80
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42003&cmid=2436 2/3
2/4/22, 10:44 PM Post Quiz: Attempt review
Question 5
Correct
MCAfee is an example of
Select one:
a. none
b. Virus
c. badware
d. Antivirus software
◄ Cyber Attacks
Jump to...
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42003&cmid=2436 3/3
2/4/22, 11:23 PM Pre Quiz: Attempt review
Question 1
Correct
Select one:
a. Validation
b. authentication
c. Verification
d. Identification
989
Your answer is correct.
Question 2
Correct
Which of the following should we do our best to configure your systems and networks?
989
Select one:
a. None of the options
b. protection
c. Reaction
d. Detection
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42158&cmid=2718 1/3
2/4/22, 11:23 PM Pre Quiz: Attempt review
Question 3
Incorrect
Select one:
a. All the options
b. Worms
c. virus
d. Trojan Horses
Question 4
Correct
The integrity and confidentiality of data passing over a network are ensured by?
989
Select one:
a. Penetration Testing
b. Antivirus
c. network-security proctocols
d. Firewall
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42158&cmid=2718 2/3
2/4/22, 11:23 PM Pre Quiz: Attempt review
Question 5
Correct
Today, is commonly used to secure data in transit in a number of applications, like Internet data transfer.
Select one:
a. Data mining
b. encryption
c. Architectural Security
d. Internet Security
◄ Post Quiz
Jump to...
NW Security Overview ►
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42158&cmid=2718 3/3
2/4/22, 11:23 PM Post Quiz: Attempt review
Question 1
Correct
Select one:
a. Audit log
b. Threat monitoring
d. None of these
989
Your answer is correct.
Question 2
Correct
Select one:
a. Virus Attacks
b. Fire Attacks
d. Unauthorized attacks
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42172&cmid=2720#question-42238-2 1/3
2/4/22, 11:23 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. Cracking passwords
b. Information Gathering
c. Covering Tracks
d. Escalating Privileges
Question 4
Correct
Security features that limit who has access to the OS's resources.
989
Select one:
a. Validation
b. Identification
c. Authentication
d. Access control
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42172&cmid=2720#question-42238-2 2/3
2/4/22, 11:23 PM Post Quiz: Attempt review
Question 5
Incorrect
Select one:
a. Gateways
b. Protocols
c. Port
d. Socket
◄ NW Security Overview
Jump to...
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42172&cmid=2720#question-42238-2 3/3
2/5/22, 8:44 PM Post Quiz: Attempt review
Question 1
Correct
Select one:
a. 23
b. 110
c. 143
d. 25
989
Your answer is correct.
Question 2
Correct
Select one:
a. IP
b. DMZ
c. SMTP
d. TCP
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 1/5
2/5/22, 8:44 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. 20ft
b. 100ft
c. 200ft
d. 20m
Question 4
Correct
989
Select one:
a. 01xxxxxx
b. 10xxxxxx
c. 110xxxxx
d. 0xxxxxxx
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 2/5
2/5/22, 8:44 PM Post Quiz: Attempt review
Question 5
Correct
What IP address class has a limit of only 254 host addresses per network ID?
Select one:
a. Class C
b. Class A
c. Class B
d. Class D
Question 6
Correct
Which Protocol facilitates the exchange of management information between network devices ?
989
Select one:
a. SMTP
b. SNMP
c. DNS
d. DHCP
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 3/5
2/5/22, 8:44 PM Post Quiz: Attempt review
Question 7
Correct
What method of switching checks the destination MAC address as the frame is received and then starts to forward the frame
until the entire frame is received?
Select one:
a. cut through
b. Fragment Free
c. None
989
Your answer is correct.
Question 8
Correct
Select one:
a. RARP
b. SMTP
c. ARP
d. SMTP
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 4/5
2/5/22, 8:44 PM Post Quiz: Attempt review
Question 9
Correct
what is the translation scheme used for converting all private ip in a domain to a single public ip.
Select one:
a. PAT
b. None
c. static
d. dynamic
Question 10
Correct
Inside the DoD TCP/IP comparison model, where does routing occur?
989
Select one:
a. Network
b. Transport
c. Application
d. Physical
989
◄ Protocols
Jump to...
Pre Quiz ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 5/5
2/7/22, 11:52 AM Test Your Understanding - Vi Editor: Attempt review
Question 1
Correct
989
Mark 1.00 out of 1.00
yy yank
989
The correct answer is: L → moves the cursor to the last line of the screen., dw → deletes from the character selected
to the end of the word., :wq → save & quit, yy → yank
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42374&cmid=2676 1/2
2/7/22, 11:52 AM Test Your Understanding - Vi Editor: Attempt review
Question 2
Partially correct
$ sed
> UK.txt
United Kingdom/
Country.txt
's/
989
g'
UK/
1. $ sed
2. 's/
3. UK/
4. United Kingdom/ 989
5. g'
6. Country.txt
7. > UK.txt
◄ Vi Editor - Demo
Jump to...
Post-Quiz ►
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42374&cmid=2676 2/2
2/7/22, 11:52 AM Pre-Quiz: Attempt review
989
Question 1
Correct
Select one:
a. save the data for later retrieval
989
b. copy the each line of input
c. both
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 1/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review
Question 2
Correct
Question 3
Correct
989
Select one:
a.
sed reads the data already present in buffer
b.
sed command will not work
d.
sed reads from standard input
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 2/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review
Question 4
Correct
Select one:
a. t or T
b. / or ?
c. f or F
Question 5
Correct
Select one:
a. :w
b. :wq or :q
c. :q
d. :w!
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 3/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review
Question 6
Correct
Select one:
a. :set nl
b. :set nu
c. :set ln
d. :set li
989
Your answer is correct.
Question 7
Correct
989
Which of the following statements is not true?
Select one:
a. vi stands for visual editor
b.
vi editor commands are not case sensitive
c.
vim editor is the improved version of vi editor
989
d.
vi editor has three modes of operation
◄ Post-Quiz
Jump to...
Vi Editor Intro ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 4/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 5/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 6/6
2/7/22, 11:53 AM Post-Quiz: Attempt review
Question 1
989
Correct
Which command is used to replace word ‘cat’ (already present in the file) with ‘mouse’ at all places in a file ‘old.txt’ and save the
result in a new file ‘new.txt’?
Select one:
a. sed ‘s/cat/mouse/g’ old.txt > new.txt
989
b. sed ‘s/cat/mouse’ old.txt new.txt
Question 2 989
Correct
The substitution command (:s/) helps to quickly replace words or groups of words within your files.
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 1/4
2/7/22, 11:53 AM Post-Quiz: Attempt review
Question 3
Incorrect
Which option will provide the current line number, along with the total number of lines in the file at the bottom of the screen?
Select one:
a. :=
b. :.=
c. ^g
Question 4
Correct
Which cursor movement command is used to move the cursor to the last line in file?
989
Select one:
a. :0<return>
b. $<return>
c. :n<return>
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 2/4
2/7/22, 11:53 AM Post-Quiz: Attempt review
Question 5
Correct
Select one:
a. [address range]/d
b. [address range]/y
c. [address range]/p
d. [address range]/s
989
Your answer is correct.
Question 6
Correct
989
State True / False
Select one:
True
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 3/4
2/7/22, 11:53 AM Post-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 4/4
2/7/22, 8:31 PM Test Your Understanding - Introduction to Unix: Attempt review
Dashboard / Linux Basics / Introduction to Linux / Test Your Understanding - Introduction to Unix
Question 1
Correct
989
Mark 1.00 out of 1.00
Fill the specific date format in the given echo statement, to print the date in dd/mm/yyyy format.
echo `date + %d / %m / %Y `
%y %dd %M
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41859&cmid=2596 1/2
2/7/22, 8:31 PM Test Your Understanding - Introduction to Unix: Attempt review
Question 2
Correct
~]$ dc
5
+
3
989
4 8 5
~]$ dc
5
+
989
3
[3]
Jump to...
989 Calendar1 ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41859&cmid=2596 2/2
2/7/22, 11:47 AM Pre-Quiz: Attempt review
Question 1
989
Correct
The OS decides which process gets the processor, when and for how much time it is called _______.
Select one:
a. multitask
b. multiuser
c. multiprogramming
989
Question 2
Correct
989
What will keep track of the printers and the USB connected to a computer?
Select one:
a. traffic controller
b. I/O controller
c. file system
d. process scheduling
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 1/4
2/7/22, 11:47 AM Pre-Quiz: Attempt review
Question 3
Correct
AIX IBM
Linux Redhat
HP-UX
Hewlett Packard
Solaris
Sun Microsystem
989
Question 4
989
Correct
Select one:
a. HP
989
b. Sun Microsystems
d. IBM
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 2/4
2/7/22, 11:47 AM Pre-Quiz: Attempt review
Question 5
Correct
Which helps us to access the functions provided by the kernel to do the services of the OS?
Select one:
a. command
b. system call
c. shell
989
Your answer is correct.
◄ Discussion Forum
Jump to...
Introduction to Unix ►
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 3/4
2/7/22, 11:47 AM Pre-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 4/4
2/7/22, 11:47 AM Post-Quiz: Attempt review
989
Question 1
Correct
Predict the output for the following command, if the current date is 21-04-2000.
Select one:
989
a. April 21
b. command error
c. 04 21
d. 21 april
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 1/4
2/7/22, 11:47 AM Post-Quiz: Attempt review
Question 2
Correct
What is the option used in ls command to list all entries in the current directory including hidden files?
Select one:
a. -ls
b. -l
c. -a
d. -lh
989
Your answer is correct.
Question 3
Correct
989
Single user mode shell has _____ prompt.
Select one:
a. $ Normal user
b. # Root user
c. % Admin user
d. ~ Home user
989
Your answer is correct.
The correct answer is: # Root user
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 2/4
2/7/22, 11:47 AM Post-Quiz: Attempt review
Question 4
Correct
Write the command to display the current date in the form dd/mm/yyyy.
Select one:
a. date +”/%d/%m/20%y”
b. date +”%d/%m/%y”
c. date +%d/%m/%Y
d. date +/%d/%m/20%y
989
Your answer is correct.
Question 5
Correct
989
What is the default maximum number of processes that can exist in Unix?
Select one:
a. unlimited
b. 32768
c. 1024
d. 4096
989
Your answer is correct.
The correct answer is: 32768
◄ DiskUsage2
Jump to...
Pre-Quiz ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 3/4
2/7/22, 11:47 AM Post-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 4/4
2/7/22, 11:50 AM Test Your Understanding - Filters: Attempt review
Question 1
Incorrect
989
Mark 0.00 out of 1.00
Select one:
a. head
b. cat
c. more
d. grep
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42347&cmid=2650 1/2
2/7/22, 11:50 AM Test Your Understanding - Filters: Attempt review
Question 2
Correct
In Cut command, ______ option is used to identify the column, when the file has fixed length records.
Select one:
a. -s
b. -c
c. -d
d. -f
989
Your answer is correct.
◄ Filters - Demo
Jump to...
Find string1 ►
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42347&cmid=2650 2/2
2/7/22, 11:50 AM Pre-Quiz: Attempt review
Question 1
989
Correct
Select one:
True
False
989
Question 2
Correct
989
What command is used to check the current users?
Select one:
a. ls
b. grep
c. who
d. sed
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 1/4
2/7/22, 11:50 AM Pre-Quiz: Attempt review
Question 3
Correct
Which command will allow the user to search contents of a file for a particular pattern?
Select one:
a. touch
b. grep
c. ls
d. find
989
Your answer is correct.
Question 4
Correct
989
Which symbol is used in pipe command to group two commands?
Select one:
a. /
b. \
c. |
d. ||
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 2/4
2/7/22, 11:50 AM Pre-Quiz: Attempt review
Question 5
Correct
Code Fillup:
Select one:
a. redirection
b. reinsertion
c. redistribution
d. none of these
989
◄ Post-Quiz
Jump to...
Filters Intro ►
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 3/4
2/7/22, 11:50 AM Pre-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 4/4
2/7/22, 11:51 AM Post-Quiz: Attempt review
Question 1
989
Correct
What is the option in filter command grep, which removes any entries from the list by excluding any lines that start with a
leading "d"?
Select one:
a. grep -s "^d"
989
b. grep -n "^d"
c. grep -v "^d"
d. grep -v "d"
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 1/4
2/7/22, 11:51 AM Post-Quiz: Attempt review
Question 2
Correct
Question 3
Incorrect
Select one:
a. -c, -f
b. -d, -f
c. -d, -c
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 2/4
2/7/22, 11:51 AM Post-Quiz: Attempt review
Question 4
Correct
Code FillUp
To refer a field or column in the current line, ___________ symbol is used in awk command.
Select one:
a. -
b. |
c. $
d. .
989
Question 5
Correct
989
Select one:
a. Yes
b. No
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 3/4
2/7/22, 11:51 AM Post-Quiz: Attempt review
Question 6
Correct
In tee command, if the standard input was successfully copied to all output files, it returns ______.
Select one:
a. >0
b. 0
c. <0
Question 7
Correct
989
Select one:
a. list all lines which match with the given pattern with line numbers
b. Number of lines that does not match with the given pattern
c.
nth line
d.
Number of lines that matches with the given pattern
989
The correct answer is: list all lines which match with the given pattern with line numbers
◄ Pattern Search
Jump to...
Pre-Quiz ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 4/4
2/7/22, 11:48 AM Test Your Understanding - File System: Attempt review
Dashboard / Linux Basics / File System / Test Your Understanding - File System
Question 1
Correct
989
Mark 1.00 out of 1.00
Symbolic Notation : r - x r - - r - -
744 644
Question 2
Correct
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42314&cmid=2617 1/2
2/7/22, 11:48 AM Test Your Understanding - File System: Attempt review
Directory Creation - 1 ►
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42314&cmid=2617 2/2
2/7/22, 11:48 AM Pre-Quiz: Attempt review
989
Question 1
Correct
Code Fillup:
989
Select one:
a. rdir
b. rmdir
c. rd
d. dldir
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 1/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
Question 2
Correct
Which command will allow the user to search contents of a file for a particular pattern?
Select one:
a. ls
b. grep
c. touch
d. find
989
Your answer is correct.
Question 3
Correct
989
Code Fillup:
Select one:
a. none of these
b. redistribution
c. redirection
d. reinsertion
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 2/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
Question 4
Correct
Select one:
a. ||
b. \
c. /
d. |
Question 5
Correct
b. File blocks
c. Inode
d. Data blocks
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 3/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
Question 6
Correct
Select one:
a. ls
b. grep
c. sed
d. who
989
Your answer is correct.
Question 7
Correct
989
rm command will remove a file in Unix. Then the file ____________________.
Select one:
a. will be moved to /lost+found directory and can be recovered only by the administrator
b.
can be recovered by an admin
c.
cannot be recovered by a user
989
d.
can be fully recovered provided the system is not rebooted
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 4/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
Question 8
Incorrect
Select one:
a. mv Employee.dat Employee.log
b. cp Employee.dat Employee.log
d. rm Employee.dat Employee.log
989
Your answer is incorrect.
Question 9
Correct
989
A pipe redirects the output of one command as an input to another command.
Select one:
True
False
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 5/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
Question 10
Correct
Choose the umask value which doesn’t allow execute permission for directories by default.
Select one:
a. 444
b. 222
c. 111
d. 000
989
Your answer is correct.
Question 11
Correct
989
Match the Following:
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 6/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
Question 12
Correct
________________ is the command to set the execute permissions to all the files and subdirectories within the directory
/home/client1/temp.
Select one:
a.
chmod –f –r +x /home/client1/temp
b.
chmod –r +x /home/client1/temp
989
c. chmod –F +x /home/client1/temp
d.
chmod –R +x /home/client1/temp
Question 13 989
Correct
Choose the correct symbol which represents the user home directory.
Select one:
a. /
b. ~ 989
c. ..
d. .
◄ Post-Quiz
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 7/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 8/8
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 1
989
Correct
Select one:
a. Number of lines that does not match with the given pattern
989
b. list all lines which match with the given pattern with line numbers
d.
nth line
The correct answer is: list all lines which match with the given pattern with line numbers
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 1/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 2
Correct
cd . current Directory
Question 3
Partially correct
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 2/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 4
Correct
Code FillUp
To refer a field or column in the current line, ___________ symbol is used in awk command.
Select one:
a. |
b. .
c. $
d. -
989
Question 5
Correct
989
In tee command, if the standard input was successfully copied to all output files, it returns ______.
Select one:
a. 0
b. <0
c. >0
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 3/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 6
Correct
__________ stamp is not stamped for a file in a traditional Unix file system.
Select one:
a. Creation Time
b. Access Time
c. Modification Time
d. Change Time
989
Your answer is correct.
Question 7
Correct
989
The last change time of the file is updated, if a user does a chmod operation on a file.
Select one:
True
False
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 4/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 8
Correct
Select one:
a.
revoke write permission to users
b.
grant write permission to users
989
c. revoke write permission to others
d.
grant write permission to others
Question 9 989
Correct
Select one:
a. Yes
989
b. No
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 5/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 10
Incorrect
Select one:
a. -d, -c
b. -c, -f
c. -d, -f
Question 11
Correct
Select one:
a. second.dat
b. first.dat
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 6/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 12
Correct
___________command is used to display only the directory attributes and not its contents.
Select one:
a. ls -F
b. ls -l -d
c. ls -l
d. ls -x
989
Your answer is correct.
Question 13
Correct
989
The Octal notation for the given permission "-rwxr-xr–x" is represented as ________ .
Select one:
a. 666
b. 744
c. 777
d. 755
989
Your answer is correct.
The correct answer is: 755
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 7/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
Question 14
Correct
Consider the directory structure "PARENT/CHILD/GRANDCHILD". Which option in rmdir command will help us to remove all the
directories "PARENT/CHILD/GRANDCHILD"?
Select one:
a. –t
b. –b
c. –p
d. –o
989
Question 15
Incorrect
989
What is the option in filter command grep, which removes any entries from the list by excluding any lines that start with a
leading "d"?
Select one:
a. grep -n "^d"
b. grep -v "d"
c. grep -v "^d"
d. grep -s "^d"
989
◄ File Permission - 8
Jump to...
Pre-Quiz ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 8/9
2/7/22, 11:49 AM Post-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 9/9
2/7/22, 7:25 PM Pre Quiz: Attempt review
Question 1
Correct
ITIL is implemented
Select one:
a. With Customers
d. Within an organization
989
Your answer is correct.
Question 2
Correct
b. A Policy
c. A Framework
d. A Practice
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 1/5
2/7/22, 7:25 PM Pre Quiz: Attempt review
Question 3
Correct
Select one:
a. Japan
b. United Kingdom
c. Germany
d. France
Question 4
Correct
KB stand for
989
Select one:
a. Kilo Bit
b. Knowledge broadcast
c. Kilo Byte
d. Knowledge Base
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 2/5
2/7/22, 7:25 PM Pre Quiz: Attempt review
Question 5
Correct
Select one:
a. No
b. Yes
989
Question 6
Correct
ITIL is …..
c. Perspective
d. Manual Document
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 3/5
2/7/22, 7:25 PM Pre Quiz: Attempt review
Question 7
Correct
Select one:
a. None of these
Question 8
Correct
989
Select one:
a. Internet Technology information list
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 4/5
2/7/22, 7:25 PM Pre Quiz: Attempt review
Question 9
Correct
b. None of these
c. Return on Investment
Question 10
Correct
ITIL Involves
b. Customers
d. Vendors
989
◄ Discussion Forum
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 5/5
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 1
Correct
Select one:
a. Ensuring that services achieve agreed and expected performance levels, satisfying current and future demand in a
cost-effective way
b. Ensuring that services deliver agreed levels of availability or that change can be assessed
c. Protecting an organization by understanding and managing risks to the confidentiality, integrity, and availability of
information
d. Systematically observing services and service components and recording and reporting selected changes of state
identified as events
989
The correct answer is: Protecting an organization by understanding and managing risks to the confidentiality, integrity, and
availability of information
Question 2
Correct
989
Rohan is currently working to create a new service that would allow a customer to purchase a digital product online and have it
delivered to the user's inbox. Rohan is responsible for the payment portion of this service, but Esther is responsible for the
digital product fulfillment portion of the service. Which of the following should John do in order to follow the principle of 'think
and work holistically'?
Select one:
a. Rohan should tell Esther to wait until his portion is done before starting hers to ensure compatibility
b. Rohan should meet with Esther to determine how the digital product fulfillment will occur
c. Rohan should wait until Esther's portion is complete before beginning his to ensure they work together properly
d. Rohan should optimize his code to ensure it runs efficiently
The correct answer is: Rohan should meet with Esther to determine how the digital product fulfillment will occur
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 1/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 3
Correct
Which of these are NOT a key focus of the ‘partners and suppliers’ dimension?
Select one:
a. Security and compliance
b. Workflow management and inventory systems
c. Roles and responsibilities
d. Contracts and agreements
989
Question 4
Correct
Select one:
a. Supporting the agreed quality of a service by handling all pre-defined, user-initiated service requests in an effective and
user-friendly manner 989
b. Ensuring that services deliver agreed levels of availability or that change can be assessed
c. Minimizing the negative impact of incidents by restoring normal service operation as quickly as possible
d. Ensuring that all an organization's projects are successfully delivered
The correct answer is: Minimizing the negative impact of incidents by restoring normal service operation as quickly as possible
Question 5
Correct 989
Which of these are a key focus of the ‘organization and people’ dimension?
Select one:
a. Activities that transform inputs into outputs
b. Security and compliance
c. Roles and responsibilities
d. Contracts and agreements
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 2/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 6
Correct
What term best describes a person or a group of people that has its own functions with responsibilities, authorities, and
relationships to achieve its objectives?
Select one:
a. Customer
b. Consumer
c. Organization
d. Service provider
Question 7
Correct
Select one:
a. Service value system 989
b. Seven guiding principles
c. Four dimensions of service management
d. Practices
Question 8
Correct 989
Select one:
a. The means by which an organization is directed and controlled
b. A means of enabling value co-creation by facilitating outcomes that customers want to achieve, without the
customer having to manage specific costs and risks
c. A set of specialized organizational capabilities for enabling value to customers
d. A method for visualizing work, identifying potential blockages and resource conflicts, and managing work in progress
The correct answer is: A means of enabling value co-creation by facilitating outcomes that customers want to achieve, without
the customer having to manage specific costs and risks
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 3/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 9
Correct
What is defined as the practice of ensuring that accurate and reliable information about the configuration of services, and the
configuration items that support them, is available when and where needed?
Select one:
a. Service configuration management
b. Change control
c. Service level management
d. IT asset management
Question 10
Correct
Identify the missing word(s) in the following sentence. Utility is the [?] offered by a product or service to meet a particular need.
Select one:
a. Outcome 989
b. Assurance
c. Functionality
d. Promise
Question 11
Correct 989
Identify the missing word in the following sentence. The [?] is the practice of capturing demand for incident resolution and
service requests
Select one:
a. Service desk
b. Service request management
c. Service level management
d. Incident management
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 4/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 12
Correct
You are working to design a new service for internal use across your organization. As part of your design efforts, you form a
small team with relevant stakeholders from the human resources, information technology, sales, and other relevant
departments to ensure the service adequately meets each department's needs and hope this results in great acceptance of the
service when delivered. Which guiding principle best describes this scenario?
Select one:
a. Focus on value
b. Keep it simple and practical
c. Collaborate and promote visibility
d. Start where you are
989
The correct answer is: Collaborate and promote visibility
Question 13
Correct
Identify the missing word in the following sentence. [?] is the practice of ensuring that risks are properly assessed, authorizing
changes to proceed, and managing989 a change schedule in order to maximize the number of successful IT changes.
Select one:
a. Service configuration management
b. IT asset management
c. Service level management
d. Change control
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 5/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 14
Correct
Identify the missing word(s) in the following sentence. An event is any change of state that has significance for the
management of a [?] or other configuration items
Select one:
a. Outcome
b. Service
c. Output
d. Product
Question 15
Correct
What operating model outlines the key activities required to respond to demand and facilitate value realization through the
creation and management of products and services?
Question 16
989
Correct
Select one:
a. Results for a stakeholder
b. Configuration of an organization’s resources
c. Tangible or intangible deliverables
d. Functionality offered by a product or service
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 6/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 17
Correct
Select one:
a. Think and work holistically
b. Progress iteratively with feedback
c. Start where you are
d. Focus on value
989
Question 18
Correct
Select one:
a. A guiding principle is specific and only applies to one initiative within the organization
989 and must be used when adopting a new service within the organization
b. A guiding principle is mandatory
c. A guiding principle is a recommendation used as guidance in all circumstances
d. An organization must implement the guiding principles exactly as defined by the ITIL 4 Foundation manual
The correct answer is: A guiding principle is a recommendation used as guidance in all circumstances
Question 19
Correct
989
Mark 1.00 out of 1.00
Select one:
a. Supporting the agreed quality of a service by handling all pre-defined, user-initiated service requests in an effective and
user-friendly manner
b. Minimizing the negative impact of incidents by restoring normal service operation as quickly as possible
c. Systematically observing services and service components and recording and reporting selected changes of state
identified as events
d. Ensuring that all an organization's projects are successfully delivered
The correct answer is: Systematically observing services and service components and recording and reporting selected
changes of state identified as events
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 7/8
2/7/22, 7:26 PM Post Quiz: Attempt review
Question 20
Correct
Which value chain activity includes portfolio decisions for design and transition?
Select one:
a. Engage
b. Deliver and support
c. Plan
d. Improve
989
Jump to...
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 8/8
2/4/22, 10:36 PM Pre Quiz: Attempt review
Question 1
Correct
Select one:
a. Spam
b. Malware
d. Virus
989
Your answer is correct.
Question 2
Correct
Select one:
a. Antivirus
b. Firewall
c. Cookies
d. Malware
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41957&cmid=2382 1/3
2/4/22, 10:36 PM Pre Quiz: Attempt review
Question 3
Correct
Select one:
a. Authorization
b. Authentication
Question 4
Correct
989
Select one:
a. System with vulnerabilities
c. Strong password
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41957&cmid=2382 2/3
2/4/22, 10:36 PM Pre Quiz: Attempt review
Question 5
Correct
_______ is a type of software designed to help the user's computer detect viruses and avoid them.
Select one:
a. Malware
b. Adware
c. None
d. Antivirus
◄ Post Quiz
Jump to...
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41957&cmid=2382 3/3
2/4/22, 10:36 PM Post Quiz: Attempt review
Question 1
Correct
Which cloud infrastructure is operated for the exclusive use of an organizational purpose .
Select one:
a. Private
b. Hybrid
c. Public
d. Community
989
Your answer is correct.
Question 2
Incorrect
Select one:
a. DAS
b. NAS
c. SAN
d. HDD
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 1/5
2/4/22, 10:36 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. HDD
b. NAS
c. DAS
d. SAN
Question 4
Correct
Which delivery model is an example of a cloud computing environment that provides users with a web based email service?
989
Select one:
a. None
b. Iaas
c. SaaS
d. PaaS
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 2/5
2/4/22, 10:36 PM Post Quiz: Attempt review
Question 5
Incorrect
Select one:
a. Laptop
b. Printer
c. Server
d. CD Rom
Question 6
Correct
The elasticity and the flexibility in the Cloud are built on the foundation of
989
Select one:
a. Virtualization
b. Traditional IT
c. Standardization
d. Operating system
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 3/5
2/4/22, 10:36 PM Post Quiz: Attempt review
Question 7
Correct
Which has many of the characteristics of what is now being called cloud computing.
Select one:
a. Internet
b. Software
c. Extranet
d. Web Services
Question 8
Correct
For long-term storage (archival) of data used typically by the following storage equipment
989
Select one:
a. CD Rom
b. Floppy Disk
c. Tape Cartridges
d. Hard Disk
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 4/5
2/4/22, 10:36 PM Post Quiz: Attempt review
Question 9
Correct
The software that lies between an operating system and the programs that run on it is
Select one:
a. Firmware
b. Software
c. Hardware
d. Middleware
Question 10
Correct
989
Select one:
a. HRM
b. Payroll
c. ERP
d. CRM
989
Jump to...
Pre Quiz ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 5/5
2/4/22, 10:35 PM Post Quiz: Attempt review
Question 1
Correct
In an any organization, company or firm the policies of information security come under__________
Select one:
a. cia triad
b. Confidentiality
d. Authenticity
989
Your answer is correct.
Question 2
Correct
Select one:
a. Rootkits
b. Viruses
c. trojans
d. Worms
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41963&cmid=2384 1/3
2/4/22, 10:35 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. Integrity
b. Authentication
c. Availability
d. confidentiality
Question 4
Correct
989
Select one:
a. Reliability
b. security
c. Performance
d. Longevity
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41963&cmid=2384 2/3
2/4/22, 10:35 PM Post Quiz: Attempt review
Question 5
Correct
What of the following concerns the principle violation when a computer is no longer accessible?
Select one:
a. Confidentiality
b. availability
c. Access control
Jump to...
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41963&cmid=2384 3/3
2/4/22, 11:37 PM Pre Quiz: Attempt review
Question 1
Correct
Select one:
a. Digital rights
b. Consent policy
c. GDPR
d. CCPA
Question 2
Correct
_________ is about privacy, rights and people and, us, about data which are personal.
Select one:
a. GDPR 989
b. Consent policy
c. CMP
d. CCPA
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 1/5
2/4/22, 11:37 PM Pre Quiz: Attempt review
Question 3
Correct
Which of the following Digital Identity verifies liveliness using periodic reminders to close ditial accounts once a person passes
away?
Select one:
a. Device Digital Identity
b. Biometric Digital Identity
c. Human Digital Identity
d. Application Digital Identity
Question 4
Correct
7) In which of the following authentication of identities, attacker uses a small list of commonly-used passwords that match the
complexity policy of domain?
Question 5
989
Correct
A digital identity is a form of identification that can be authenticated remotely over digital channels
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 2/5
2/4/22, 11:37 PM Pre Quiz: Attempt review
Question 6
Correct
An identity management system that collects and stores a person’s single fingerprint can be more invasive than a system that
stores a person’s entire credit history.
Select one:
True
False
989
Question 7
Correct
Select one:
True
False
989
Question 8
Incorrect
989
A small amount of identity information which is not properly secured might put an individual’s privacy at less risk than a large
amount of information that is properly secured and accessed only by authorized parties.
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 3/5
2/4/22, 11:37 PM Pre Quiz: Attempt review
Question 9
Incorrect
Whenever the users use a new cloud service, they have to establish their identity
Select one:
True
False
Question 10 989
Correct
In future single Digital ID might be able to do the job of identification in different contexts
Select one:
True
False
989
Jump to...
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 4/5
2/4/22, 11:37 PM Pre Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 5/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 1
Correct
___________ is an authentication method that requires two or more independent ways to identify a user.
Select one:
a. Certificate-based authentication
b. Token-based authentication
c. Biometric –based authentication
d. Multi-factor authentication
Question 2
Correct
_________ is particularly related to the protection and realization of existing rights in the context of digital technologies.
Select one:
a. GDPR 989
b. Consent Policy
c. Digital Rights
d. CCPA
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 1/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 3
Correct
Strong authentication strongly verifies ownership of the account but says nothing about the data it contains .
Select one:
True
False
Question 4 989
Correct
General Data Protection Regulation (GDPR) and CCPA are the major data private policies followed by companies worldwide
Select one:
True
False
989
Question 5
Correct
____________ looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate
989
target.
Select one:
a. Eco system
b. Single Sign On
c. Honey pot
d. Content Management Platform
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 2/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 6
Incorrect
Which of the following are critical to the resilience to the Digital ID Systems?
The correct answers are: Universal Deployment of encryption, Disaggregated data sets, Decentralized attribute stores
989
Question 7
Correct
Which of the following uses one set of login credentials to access multiple applications?
Select one:
a. Social Identity
b. Real Identity 989
c. Personal Identity
d. Single Sign on
Question 8
Correct
989
Mark 1.00 out of 1.00
Which of the following uses information from social networking sites to facilitate logins on third-party applications?
Select one:
a. Identity Provider
b. Social login
c. Personal data identifier
d. Single Sign on
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 3/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 9
Correct
__________ is a platform or a tool to take consent from the visitor to use his/her digital identity for marketing efforts.
Select one:
a. CCPA
b. CMP
c. CMD
d. GDPR
989
Question 10
Correct
Which of the following protects personal data regardless of the technology used for processing that data?
Select one:
a. Digital Rights
b. CCPA 989
c. Consent policy
d. GDPR
Jump to...
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 4/5
2/4/22, 11:37 PM Post Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 5/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 1
Correct
___________ is an authentication method that requires two or more independent ways to identify a user.
Select one:
a. Certificate-based authentication
b. Token-based authentication
c. Biometric –based authentication
d. Multi-factor authentication
Question 2
Correct
_________ is particularly related to the protection and realization of existing rights in the context of digital technologies.
Select one:
a. GDPR 989
b. Consent Policy
c. Digital Rights
d. CCPA
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 1/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 3
Correct
Strong authentication strongly verifies ownership of the account but says nothing about the data it contains .
Select one:
True
False
Question 4 989
Correct
General Data Protection Regulation (GDPR) and CCPA are the major data private policies followed by companies worldwide
Select one:
True
False
989
Question 5
Correct
____________ looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate
989
target.
Select one:
a. Eco system
b. Single Sign On
c. Honey pot
d. Content Management Platform
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 2/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 6
Incorrect
Which of the following are critical to the resilience to the Digital ID Systems?
The correct answers are: Universal Deployment of encryption, Disaggregated data sets, Decentralized attribute stores
989
Question 7
Correct
Which of the following uses one set of login credentials to access multiple applications?
Select one:
a. Social Identity
b. Real Identity 989
c. Personal Identity
d. Single Sign on
Question 8
Correct
989
Mark 1.00 out of 1.00
Which of the following uses information from social networking sites to facilitate logins on third-party applications?
Select one:
a. Identity Provider
b. Social login
c. Personal data identifier
d. Single Sign on
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 3/5
2/4/22, 11:37 PM Post Quiz: Attempt review
Question 9
Correct
__________ is a platform or a tool to take consent from the visitor to use his/her digital identity for marketing efforts.
Select one:
a. CCPA
b. CMP
c. CMD
d. GDPR
989
Question 10
Correct
Which of the following protects personal data regardless of the technology used for processing that data?
Select one:
a. Digital Rights
b. CCPA 989
c. Consent policy
d. GDPR
Jump to...
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 4/5
2/4/22, 11:37 PM Post Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 5/5
2/4/22, 10:56 PM Pre Quiz: Attempt review
Question 1
Correct
Select one:
a. Double Encryption Standard
b. Digital Encryption System
c. Digital Evaluation System
d. Digital Encryption Standard
Question 2
Correct
Select one:
a. Soliciting 989
b. Phishing
c. Virus
d. DOS Attacks
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 1/5
2/4/22, 10:56 PM Pre Quiz: Attempt review
Question 3
Correct
Select one:
a. Loss of reputation
b. Malicious payload
c. Fraud
d. Increased communication costs
989
Question 4
Correct
Select one:
a. credit card payment
b. electronic cash payments 989
c. cheque payment
d. cash
Question 5
Incorrect
989
Mark 0.00 out of 1.00
Select one:
a. Internet Proctocols
b. Internet Layers
c. Cryptographic Protocols
d. Network Layers
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 2/5
2/4/22, 10:56 PM Pre Quiz: Attempt review
Question 6
Correct
Select one:
a. Hybrid Key.
b. Public Key.
c. Private Key.
d. Pre-shared Secret Key.
989
Question 7
Correct
Select one:
a. MD5
b. DES 989
c. AES
d. PGP
Question 8
Correct
989
Mark 1.00 out of 1.00
Which of the following rules are broken if a computer system is not accessible?
Select one:
a. Availability
b. Access Control
c. Confidentiality
d. Authentication
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 3/5
2/4/22, 10:56 PM Pre Quiz: Attempt review
Question 9
Incorrect
Which of the following are examples of security and privacy risks in the real world?
Select one:
a. SPAM
b. Worm
c. Hackers
d. Virus
989
Question 10
Correct
Select one:
True
989
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 4/5
2/4/22, 10:56 PM Pre Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 5/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 1
Correct
Select one:
a. Decryption
b. Key
c. password
d. Cryptosystem
Question 2
Correct
Select one:
a. User's Private Key 989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 1/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. Wired Equivalent Privacy
b. Wifi Enabled Password
c. Wifi Encrypted Protection
d. Wired Encrypted Protection
989
Question 4
Correct
What is Phishing
Select one:
a. A password building technique
b. An anti-spam technique 989
c. An encryption technique
d. Fradulently acquiring sensitive information
Question 5
Correct
989
Mark 1.00 out of 1.00
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 2/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 6
Correct
Select one:
a. Malware
b. Virus
c. JUNK
d. SPAM
989
Question 7
Correct
Select one:
a. x.500
b. x.100 989
c. x.509
d. x.25
Question 8
Correct
989
Mark 1.00 out of 1.00
Select one:
a. Cipher Text
b. Message Digest
c. Digital signature
d. Protocol
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 3/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 9
Incorrect
Only approved users are given access to information, according to the word used in computer security is
Select one:
a. Responsibility
b. Authentication
c. Integrity
d. Availability
989
Question 10
Correct
Which of the following better identifies programmes that can travel from system to system and cause computer interaction to
be disrupted?
Select one:
a. Worm 989
b. Malware
c. Virus
d. Firmware
◄ Cloud Security
989
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 4/5
2/4/22, 10:56 PM Post Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 5/5
2/4/22, 11:12 PM Pre Quiz: Attempt review
Question 1
Correct
Which of the following service provider provides the least amount of built in security.
Select one:
a. Bpaas
b. PaaS
c. SaaS
d. IaaS
Question 2
Correct
A technique that permits many Operating systems to run on a single hardware at the same time, where the hardware is
virtualized
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 1/5
2/4/22, 11:12 PM Pre Quiz: Attempt review
Question 3
Correct
Find the malicious code that enters the system via a easily distributed game that is purposely installed and played?
Select one:
a. It can enter a system by means of a Trojan horse
b. It can enter a system by means of a logic bomb.
c. It can enter a system by means of an e-mail attachment
d. It can enter a system by means of a worm.
The correct answer is: It can enter a system by means of a Trojan horse
989
Question 4
Correct
The abundant of complex documents that can lead companies through the procedure of planning a
Select one:
a. Datacenter(Secured)
b. Internal Storage 989
c. External Storage
d. None
Question 5
Correct
989
Mark 1.00 out of 1.00
Select one:
a. Thinclient
b. Server
c. Commandline
d. Web browser
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 2/5
2/4/22, 11:12 PM Pre Quiz: Attempt review
Question 6
Incorrect
The organization requires a strictly secure environment, public cloud might not be appropriate
Select one:
a. Small organizations
b. Enterprise Networks
c. None
d. Banking enterprise
989
Question 7
Correct
Data center clouds are formed by joining two or more data center cloud networks over wide area network. When building such
data center clouds, which component is mainly responsible for increasing the network latency?
Select one:
a. network routing protocols 989
b. network servers
c. network interfaces
d. network clients
Question 8
Correct 989
If a computer program is executed by unauthorized user then the user may source severe damage to computer or information
available in it. So a computer system must be secured against unauthorized access, Security can be provided by
Select one:
a. Key
b. None
c. Lock
d. Authentication
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 3/5
2/4/22, 11:12 PM Pre Quiz: Attempt review
Question 9
Correct
Select one:
a. File Security
b. Data Security
c. Folder Security
d. None
989
Question 10
Correct
Many network applications and protocols have security problems that are fixed over time by using devices like…
Select one:
True
989
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 4/5
2/4/22, 11:12 PM Pre Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 5/5
2/4/22, 11:11 PM Post Quiz: Attempt review
Question 1
Incorrect
A distinctive keyword is required every time user attempts to login into the system
Select one:
a. Passkey
b. Key
c. One time password
d. None
Question 2
Correct
________ has many of the characteristics of what is now being called cloud computing.
Select one:
a. Internet 989
b. Webservice
c. Software
d. None
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 1/5
2/4/22, 11:11 PM Post Quiz: Attempt review
Question 3
Incorrect
Select one:
a. Both
b. Symmetric
c. Asymmetric
d. None
989
Question 4
Correct
Select one:
a. Antivirus
b. Attacks 989
c. Denial of Service
d. NAT
Question 5
Correct
989
Mark 1.00 out of 1.00
Select one:
a. Compliance
b. Risk analysis
c. Governance
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 2/5
2/4/22, 11:11 PM Post Quiz: Attempt review
Question 6
Correct
Select one:
a. Virus
b. Threat
c. Worm
d. Vulnerability
989
Question 7
Correct
Select one:
a. Management
b. Sourcing 989
c. Ownership
d. Reliability
Question 8
Correct
989
Mark 1.00 out of 1.00
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 3/5
2/4/22, 11:11 PM Post Quiz: Attempt review
Question 9
Correct
Select one:
a. Plaintect
b. None
c. Cleartext
d. Cipher text
989
Question 10
Correct
What is the benefit of using automation techniques in conjunction with cloud computing?
Select one:
a. Automation reduces human errors.
b. None 989
Jump to...
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 4/5
2/4/22, 11:11 PM Post Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 5/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 1
Correct
Select one:
a. Decryption
b. Key
c. password
d. Cryptosystem
Question 2
Correct
Select one:
a. User's Private Key 989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 1/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 3
Correct
Select one:
a. Wired Equivalent Privacy
b. Wifi Enabled Password
c. Wifi Encrypted Protection
d. Wired Encrypted Protection
989
Question 4
Correct
What is Phishing
Select one:
a. A password building technique
b. An anti-spam technique 989
c. An encryption technique
d. Fradulently acquiring sensitive information
Question 5
Correct
989
Mark 1.00 out of 1.00
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 2/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 6
Correct
Select one:
a. Malware
b. Virus
c. JUNK
d. SPAM
989
Question 7
Correct
Select one:
a. x.500
b. x.100 989
c. x.509
d. x.25
Question 8
Correct
989
Mark 1.00 out of 1.00
Select one:
a. Cipher Text
b. Message Digest
c. Digital signature
d. Protocol
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 3/5
2/4/22, 10:56 PM Post Quiz: Attempt review
Question 9
Incorrect
Only approved users are given access to information, according to the word used in computer security is
Select one:
a. Responsibility
b. Authentication
c. Integrity
d. Availability
989
Question 10
Correct
Which of the following better identifies programmes that can travel from system to system and cause computer interaction to
be disrupted?
Select one:
a. Worm 989
b. Malware
c. Virus
d. Firmware
◄ Cloud Security
989
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 4/5
2/4/22, 10:56 PM Post Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 5/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review
Question 1
Correct
Audit log is the document that records information about the resources accessed.
Select one:
True
False
989
Question 2
Correct
Users can guard against CSRF vulnerabilities by clearing browser cookies periodically.
Select one:
True
False
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 1/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review
Question 3
Correct
__________ is a cyber-attack that involves executing arbitrary commands on a host operating system.
Select one:
a. SQL Injection
b. Cross Site Scripting
c. LDAP Injection
d. Command Injection
989
Question 4
Correct
When using the file system, it is preferable to use a separate partition to record event data than those used by the operating
system.
Select one:
True 989
False
Question 5
Correct
__________ occurs when the volume of data exceeds the storage capacity of the memory buffer.
Select one:
a. Cross Site Request Forgery
b. SQL injection
c. Log Injection
d. Buffer Overflow
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 2/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review
Question 6
Correct
Which of the following Java Security Tools creates and manages key stores?
Select one:
a. jar tool
b. keytool
c. keystore
d. jarsigner
989
Question 7
Correct
Code Access Security restricts what a component is allowed to it , regardless of the logged-in user or security principle.
Select one:
True
989
False
Question 8
Correct
989
XML External Entities attack occurs, when XML input containing a reference to an external entity is processed by a weakly
configured XML parser.
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 3/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review
Question 9
Correct
Which of the following vulnerabilities enable attackers to inject malicious client-side scripts into the application?
Select one:
a. Cross-site scripting
b. XML External Entities
c. Broken Access Control
d. Cross site Request Forgery
989
Question 10
Correct
As per the ASP.Net Security Guidelines, Audit trails or logging is not important.
Select one:
True
989
False
◄ Discussion Forum
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 4/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 5/5
2/7/22, 8:12 PM Post-Quiz: Attempt review
Question 1
Correct
Which of the following Command Injection methods occur against applications that parse user-controlled XML input using a
weakly configured XML parser?
Select one:
a. Arbitrary file uploads
b. Arbitrary command injection
c. XML external entity injection (XXE)
d. Insecure serialization
989
The correct answer is: XML external entity injection (XXE)
Question 2
Incorrect
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 1/5
2/7/22, 8:12 PM Post-Quiz: Attempt review
Question 3
Correct
In which of the following attack types, the client would receive the message twice?
Select one:
a. HTTP Response splitting
b. Session Replay
c. Cross site Request Forgery
d. Session Hijacking
989
Question 4
Correct
Select one:
a. JCE
b. JSSE 989
c. JAAS
d. JMS
Question 5
Correct
989
Mark 1.00 out of 1.00
XSS Vulnerabilities occur if the output to the browser is not HTML encoded.
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 2/5
2/7/22, 8:12 PM Post-Quiz: Attempt review
Question 6
Correct
In which of the following Authentications in .Net, there is no need to retype sign-in name and password when moving from site
to site?
Select one:
a. Form Authentication
b. Window Authentication
c. Custom Authentication
d. Passport Authentication
Question 7
Correct
An application-layer attack targets computers by deliberately causing a fault in a computer’s operating system or applications.
Select one:
True 989
False
Question 8
Correct
Which of the following attack types tests multiple passwords from a dictionary or other source against a single account?
Select one:
a. Password spraying
b. Brute Force
c. Man-in-the-browser attack
d. Credential stuffing
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 3/5
2/7/22, 8:12 PM Post-Quiz: Attempt review
Question 9
Correct
Which of the following uses Trojan Horse to intercept and manipulate calls between the browser and its security mechanisms?
Select one:
a. Session Sniffing
b. Predictable session token
c. Man-in-the-browser attack
d. Man-in-the-middle attack
989
Question 10
Correct
Select one:
True
989
False
Jump to...
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 4/5
2/7/22, 8:12 PM Post-Quiz: Attempt review
989
989
989
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 5/5
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review
Dashboard / Windows Server 2016 / Monitoring, managing, and recovering AD DS / Monitoring, managing, and PreQuiz
Question 1
Correct
Select one:
True
1133
False
Question 2
Correct
1133
Application warning information is stored in the log files
Select one:
True
False
Question 3
Correct
performance details
errors
system information
system check
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 1/2
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review
Question 4
Correct
disk manager
device manager
performance monitor
event viewer
Question 5
Correct
1133
Mark 1.00 out of 1.00
Logon /Logoff events can be logged by default in windows server operating system
Select one:
True
False
1133
◄ Securing Active Directory Domain services Quiz
Jump to...
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 2/2
2/3/22, 11:02 AM Managing user settings with Quiz: Attempt review
Dashboard / Windows Server 2016 / OU and Policies / Managing user settings with Quiz
Question 1
Correct
Where is the .adm and .admx files stored in active directory environment?
Select one:
a. systemvolume
1133
b. sysvol
c. ntds
d. poledit
Question 2
Correct
1133
Mark 1.00 out of 1.00
Control panel is one of the settings available in Administrative templates in user configuration section of Group policy
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25228&cmid=2547 1/3
2/3/22, 11:02 AM Managing user settings with Quiz: Attempt review
Question 3
Correct
Select one:
a. adms
b. admz
c. admv
d. adm
Question 4
Correct
1133
Mark 1.00 out of 1.00
__________ enables you to redirect the location of specific folders within user profiles to a new location, such as a shared network
location
Select one:
a. Folder Redirection
b. gpedit.msc
c. mapping files
d. Folder
1133
Your answer is correct.
The correct answer is: Folder Redirection
Question 5
Correct
1133
.admx files are available for both Microsoft and third-party applications
Select one:
True
False
◄ Admin OU Policy
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25228&cmid=2547 2/3
2/3/22, 11:02 AM Managing user settings with Quiz: Attempt review
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25228&cmid=2547 3/3
2/3/22, 11:02 AM Managing object in ADDS Quiz: Attempt review
Dashboard / Windows Server 2016 / AD User and Group management / Managing object in ADDS Quiz
Question 1
Correct
Which user is created as built-in user in Windows server 2016 operating system?
Select one:
a. administrator
1133
b. admin
c. Leo
d. ramesh
Question 2
Correct
1133
Mark 1.00 out of 1.00
_________ group members can share resources and create user and group accounts
Select one:
a. account operators
b. guests
c. administrators
d. administrator
1133
Your answer is correct.
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25361&cmid=2536 1/3
2/3/22, 11:02 AM Managing object in ADDS Quiz: Attempt review
Question 3
Incorrect
Where will you restrict the logon timings for the domain users?
Select one:
a. Login Hours
b. Logon Hours
c. account timing
d. Log Hours
Question 4
Correct 1133
Mark 1.00 out of 1.00
Which group type allows to assigning the same security permissions for shared resources to users?
Select one:
a. distribution group
b. universal group
c. global group
1133
d. security group
Question 5
Correct
1133
Domain users are created in the domain controller
Select one:
True
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25361&cmid=2536 2/3
2/3/22, 11:02 AM Managing object in ADDS Quiz: Attempt review
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25361&cmid=2536 3/3
2/3/22, 11:02 AM Managing object in ADDS PreQuiz: Attempt review
Dashboard / Windows Server 2016 / AD User and Group management / Managing object in ADDS PreQuiz
Question 1
Correct
guests
guest
1133
admin
user
Question 2
Correct
1133
Mark 1.00 out of 1.00
Select one:
True
False
Question 3
Correct
1133
Mark 1.00 out of 1.00
Can we allocate the specific timing for the users to logon in the non-active directory environment?
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23934&cmid=3910 1/2
2/3/22, 11:02 AM Managing object in ADDS PreQuiz: Attempt review
Question 4
Incorrect
Which user account is disabled once the windows server operting system is installed?
guests
user1
admin
guest
Question 5
Correct
1133
Mark 1.00 out of 1.00
Before configuring the active directory, in which group the user belong to?
user
administrator
guest
users
1133
◄ ADC Quiz
Jump to...
Managing objects in AD DS ►
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23934&cmid=3910 2/2
2/3/22, 11:03 AM Implementing Storage Spaces and Data Deduplication Quiz: Attempt review
Dashboard / Windows Server 2016 / Disk Management / Implementing Storage Spaces and Data Deduplication Quiz
Question 1
Correct
Select one:
a. basic
1133
b. primary
c. RAID
d. mirror
Question 2
Correct
1133
Mark 1.00 out of 1.00
Select one:
a. All options are correct
b. Administrative Tools
c. server manager
d. Admin tools
1133
Your answer is correct.
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26995&cmid=2564 1/3
2/3/22, 11:03 AM Implementing Storage Spaces and Data Deduplication Quiz: Attempt review
Question 3
Correct
Where will you configure storage pool in windows server operating system?
Select one:
a. storage area network
d. Server Manager
Question 4
Correct 1133
Mark 1.00 out of 1.00
Select one:
True
False
Select one:
True
1133
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26995&cmid=2564 2/3
2/3/22, 11:03 AM Implementing Storage Spaces and Data Deduplication Quiz: Attempt review
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26995&cmid=2564 3/3
2/3/22, 11:02 AM Implementing Group Policy Quiz: Attempt review
Dashboard / Windows Server 2016 / OU and Policies / Implementing Group Policy Quiz
Question 1
Correct
Select one:
a. OUSDL
1133
b. SOUDL
c. SDOUL
d. LSDOU
Question 2
Correct
1133
Mark 1.00 out of 1.00
Policy settings in the User Configuration node apply at sign-in and every 90–120 minutes
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25250&cmid=2541 1/3
2/3/22, 11:02 AM Implementing Group Policy Quiz: Attempt review
Question 3
Correct
Administrators can configure the Group Policies to users and computers located in a particular OU or the entire domain, from a
centralized location.
Select one:
True
False
Question 4
Correct
1133
What is the command used to refresh the group policy configuration?
Select one:
a. gpupdate
c. gpedit.msc
d. gpupdate.msc
1133
Your answer is correct.
The correct answer is: gpupdate
Question 5
Correct
_______is that the collection of users and computers which will apply the settings
Select one:
a. GPMC
b. GPO
c. GPCM
1133
d. GOP
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25250&cmid=2541 2/3
2/3/22, 11:02 AM Implementing Group Policy Quiz: Attempt review
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25250&cmid=2541 3/3
2/3/22, 11:01 AM Implementing DNS Quiz: Attempt review
Question 1
Correct
Domain Name Server is used to resolve the hostname into the IP address?
Select one:
True
1133
False
Question 2
Correct
1133
What is the maximum length of characters allowed in Domain Name Server?
Select one:
a. 255
b. 128
c. 256
d. 64
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23816&cmid=2525 1/3
2/3/22, 11:01 AM Implementing DNS Quiz: Attempt review
Question 3
Correct
Select one:
a. subdomain
b. root
d. .com
Question 4
Correct 1133
Mark 1.00 out of 1.00
Which Zone is the read-only copy of the DNS zone in the Domain Name Server?
Select one:
a. forward lookup
b. Secondary
c. stub
1133
d. Primary
Question 5
Correct
1133
What is the name of the file used to resolve the names in each and every computer system?
Select one:
a. hosts
b. host
c. lmhost
d. lmhosts
Jump to
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23816&cmid=2525 2/3
2/3/22, 11:01 AM Implementing DNS Quiz: Attempt review
Jump to...
ADC PreQuiz ►
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23816&cmid=2525 3/3
2/3/22, 11:00 AM Implementing DNS PreQuiz: Attempt review
Question 1
Correct
Select one:
True
1133
False
Question 2
Correct
Question 3
Correct
1133
Mark 1.00 out of 1.00
The correct answer is: Contact DNS server to get various informations
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23765&cmid=3908 1/2
2/3/22, 11:00 AM Implementing DNS PreQuiz: Attempt review
Question 4
Correct
DNS Record
DNS Handler
DNS Resolver
DNS Updater
Question 5
Correct
1133
Mark 1.00 out of 1.00
Host Record
Hostname
File Record
System Record
1133
◄ Planning and implementing on IPv4 Network Quiz
Jump to...
Implementing DNS ►
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23765&cmid=3908 2/2
2/3/22, 11:03 AM Configure local storage Quiz: Attempt review
Dashboard / Windows Server 2016 / Disk Management / Configure local storage Quiz
Question 1
Correct
Select one:
True
1133
False
Question 2
Correct
1133
In which disk, the physical disk can be accessed by MS-DOS?
Select one:
a. Hard disk
b. Dynamic Disk
c. Basic Disk
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26967&cmid=2553 1/3
2/3/22, 11:03 AM Configure local storage Quiz: Attempt review
Question 3
Correct
Select one:
a. RAID 5
b. RADI 1
c. RAID2
d. RAID 0
Question 4
Correct 1133
Mark 1.00 out of 1.00
In which disk, you can connect more than one hard disk and configure fault tolerance volumes?
Select one:
a. GPT Disk
b. MBR Disk
c. Dynamic Disk
1133
d. Basic Disk
Question 5
Correct
1133
Primary partition information is stored in _______.
Select one:
a. GPT
b. Dynamic
c. MBR
d. Basic
Jump to
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26967&cmid=2553 2/3
2/3/22, 11:03 AM Configure local storage Quiz: Attempt review
Jump to...
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26967&cmid=2553 3/3
2/3/22, 11:04 AM Configure access to resource Quiz: Attempt review
Dashboard / Windows Server 2016 / Folder Management - Share / Configure access to resource Quiz
Question 1
Correct
Read permissions in the shared folder will allow the users to modify the files through a network share.
Select one:
True
1133
False
Question 2
Correct
1133
I have a folder called "test" in e:\. Who can change the permissions to the folder "test"?
Select one:
a. Guest user
b. Administrators
c. Backup operators
d. Everyone
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27018&cmid=2572 1/3
2/3/22, 11:04 AM Configure access to resource Quiz: Attempt review
Question 3
Correct
Select one:
a. deny, modify
b. deny, allow
c. allow, deny
d. allow, modify
Question 4
Correct 1133
Mark 1.00 out of 1.00
How will you identify that the share is a hidden share or not?
Select one:
a. %sharename%
b. $Sharename
c. $sharename$
1133
d. sharename$
Question 5
Correct
1133
Sharing is the process of allowing network users to access a shared resource.
Select one:
True
False
◄ Admin Share
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27018&cmid=2572 2/3
2/3/22, 11:04 AM Configure access to resource Quiz: Attempt review
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27018&cmid=2572 3/3
2/3/22, 11:03 AM Configure access to resource PreQuiz: Attempt review
Dashboard / Windows Server 2016 / Folder Management - Share / Configure access to resource PreQuiz
Question 1
Correct
Where will you check the share folder is available in the system?
fsmgmt.msc
devmgmt.msc
1133
sharemgmt.msc
diskmgmt.msc
Question 2
Correct
1133
Mark 1.00 out of 1.00
User1 is creating a folder in his share folder. Who is the owner of that folder?
user1
groups
administrators
users
Question 3
1133
Correct
I have a folder test in d:\ drive. Can I configure sharing for the test folder if my partition file system is FAT32?
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27007&cmid=3911 1/2
2/3/22, 11:03 AM Configure access to resource PreQuiz: Attempt review
Question 4
Correct
Once you enable sharing in a folder, which group has permission by default?
users
administrators
everyone
authorized user
Question 5
Correct
1133
Mark 1.00 out of 1.00
we can configure the share permission to users and groups in the same share folder?
Select one:
True
False
1133
◄ Implementing Storage Spaces and Data Deduplication Quiz
Jump to...
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27007&cmid=3911 2/2
2/3/22, 11:01 AM ADC Quiz: Attempt review
Question 1
Correct
The ___________ is a service in windows server allows users to access domain resources
Select one:
a. domain
1133
b. domain controller
Question 2
Correct
1133
Mark 1.00 out of 1.00
Select one:
a. c:\windows\system32\ntds
b. c:\windows\ntds
c. c:\users\ntds
d. c:\ntds
1133
Your answer is correct.
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23916&cmid=2530 1/3
2/3/22, 11:01 AM ADC Quiz: Attempt review
Question 3
Correct
Sites are physical groupings of IP subnets which are used to replicate information among Domain Controllers
Select one:
True
False
Question 4
Correct
1133
Nested Organizational Unit can be configured in Active Directory Domain Service Environment?
Select one:
True
False
Question 5
1133
Correct
Which one is the logical component in the active directory domain services?
Select one:
a. dns server
b. global catalog
c. domain controller
d. Schema
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23916&cmid=2530 2/3
2/3/22, 11:01 AM ADC Quiz: Attempt review
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23916&cmid=2530 3/3
2/3/22, 11:00 AM Windows Server 2016 installation Quiz: Attempt review
Dashboard / Windows Server 2016 / Windows Server 2016 Installation / Windows Server 2016 installation Quiz
Question 1
Correct
Is it possible to upgrade from windows server 2008 web edition to windows server 2016 datacenter?
Select one:
True
1133
False
Question 2
Correct
1133
To install windows server 2016 operating system in the remote machine, what are the pre-requirements
Select one:
a. Configure USB as first bootable device
b. Enable PXE in BIOS and configure First bootable device as network card
1133
The correct answer is: Enable PXE in BIOS and configure First bootable device as network card
Question 3
Correct
In Windows Server 2016 Server Core operating system, you can install roles and features through command prompt?
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23541&cmid=2516 1/2
2/3/22, 11:00 AM Windows Server 2016 installation Quiz: Attempt review
Question 4
Correct
What is the recommended disk space to install windows server 2016 operating system?
Select one:
a. 32GB
b. 42GB
c. 30GB
d. 40GB
Question 5
Correct 1133
Mark 1.00 out of 1.00
What is the minimum configuration for the processor requirement to install windows server 2016 operating system?
Select one:
a. 1GHz
b. 1.4 GHz
c. 2.4GHz
1133
d. 2GHz
Jump to...
1133
Planning and implementing an IPv4 network ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23541&cmid=2516 2/2
2/3/22, 10:59 AM Windows Server 2016 Installation Pre-Quiz: Attempt review
Dashboard / Windows Server 2016 / Windows Server 2016 Installation / Windows Server 2016 Installation Pre-Quiz
Question 1
Correct
To install windows server 2016 operating system in the remote machine, what are the pre-requirements
1133
All options are correct
PXE should not required
PXE required
Configure BIOS for first bootable device as DVD
Question 2
Correct
1133
Mark 1.00 out of 1.00
What is the minimum configuration for the memory requirement to install windows server 2016 operating system with desktop experience?
2 GB
1 GB
4 GB
512 MB
Question 3
1133
Correct
What is the minimum disk space to install windows server 2016 operating system?
40GB
30GB
42 GB
32 GB
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23507&cmid=3906 1/2
2/3/22, 10:59 AM Windows Server 2016 Installation Pre-Quiz: Attempt review
Question 4
Correct
Upgrading from windows server 2016 standard edition to windows server 2016 datacenter is possible ?
Select one:
True
False
Question 5
Correct
1133
Server core windows server 2016 operating system can be managed through hyper-v management console?
Select one:
True
False
◄ Discussion Forum
Jump to...
1133
Windows 2016 Intro video ►
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23507&cmid=3906 2/2
2/3/22, 11:06 AM Securing network traffic wi Quiz: Attempt review
Dashboard / Windows Server 2016 / Securing network traffic with firewalls and encryption / Securing network traffic wi Quiz
Question 1
Correct
Select one:
a. domain
1133
b. private
c. public
d. hybrid
Question 2
Correct
1133
Mark 1.00 out of 1.00
one of the Connection security rules to authenticate two computers before they begin communicating is not required
Select one:
True
False
Windows firewall with advanced security supports both incoming and outgoing traffic filtering
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29851&cmid=2590 1/2
2/3/22, 11:06 AM Securing network traffic wi Quiz: Attempt review
Question 4
Correct
Select one:
a. 989, 990
b. 990, 991
c. 991992
d. 988, 989
Question 5
Correct 1133
Mark 1.00 out of 1.00
Which software is used to prevent the host computers from the DDOS attack ?
Select one:
a. Local firewall and antivirus software
1133
d. Local firewall and antivirus software is not required for DDOS
Jump to...
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29851&cmid=2590 2/2
2/3/22, 11:06 AM Securing network traffic PreQuiz: Attempt review
Dashboard / Windows Server 2016 / Securing network traffic with firewalls and encryption / Securing network traffic PreQuiz
Question 1
Correct
Port numbers can be mapped with the protocol in the firewall rules?
Select one:
True
1133
False
Question 2
Correct
1133
Which application protects your system and comes with windows server operating system?
Trojan Horse
Symantec
Windows Defender
Bluepink
Question 3
Partially correct
1133
Mark 0.50 out of 1.00
devices number
Port number
disk number
Protocol
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27705&cmid=3915 1/2
2/3/22, 11:06 AM Securing network traffic PreQuiz: Attempt review
Question 4
Correct
8081
443
8080
80
Question 5
Correct
1133
Mark 1.00 out of 1.00
By default, firewall allows both incoming and outgoing request in the systems?
Select one:
True
False
1133
◄ Monitoring, managing, and recovering Quiz
Jump to...
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27705&cmid=3915 2/2
2/3/22, 11:04 AM Securing file services PreQuiz: Attempt review
Question 1
Correct
1133
File system Resource Monitor
File System Resource Manager
File Screening Resource Manager
File Screening Resource Monitor
Question 2
Correct
1133
Mark 1.00 out of 1.00
What is Quota?
Question 3
1133
Correct
Server Management
Service Manager
System Manager
Server Manager
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27031&cmid=3912 1/2
2/3/22, 11:04 AM Securing file services PreQuiz: Attempt review
Question 4
Correct
guests
administrator
administrators
users
Question 5
Correct
1133
Mark 1.00 out of 1.00
FSRM is a role where you can limit the user to store the data in the respective space.
Select one:
True
False
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27031&cmid=3912 2/2
2/3/22, 11:05 AM Securing Active Directory Domain services Quiz: Attempt review
Dashboard / Windows Server 2016 / Securing Active Directory Domain Services / Securing Active Directory Domain services Quiz
Question 1
Correct
Domain controllers are not a primary targets for attacks and the most essential resources to secure
Select one:
True
1133
False
Question 2
Correct
1133
________is to allow a Domain controller to exist in a remote office that may have few users or less physical security
Select one:
a. DC
b. RDOC
c. RODC
d. ADC
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27518&cmid=2584 1/2
2/3/22, 11:05 AM Securing Active Directory Domain services Quiz: Attempt review
Question 4
Correct
which one of the security risks that can affect domain controllers?
Select one:
a. Denial of service attacks
b. network security
d. operation attacks
Question 5
Correct 1133
Mark 1.00 out of 1.00
Select one:
a. Password filtering
b. domain filtering
c. user filtering
1133
d. Credential caching
Jump to...
1133
Monitoring, managing, and PreQuiz ►
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27518&cmid=2584 2/2
2/3/22, 11:04 AM Securing ADDS PreQuiz: Attempt review
Dashboard / Windows Server 2016 / Securing Active Directory Domain Services / Securing ADDS PreQuiz
Question 1
Correct
Domain Controller and the domain are same in Windows Server operating system
Select one:
True
1133
False
Question 2
Incorrect
Question 3
Correct
1133
Mark 1.00 out of 1.00
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27508&cmid=3913 1/2
2/3/22, 11:04 AM Securing ADDS PreQuiz: Attempt review
Question 4
Correct
dbt
ads
nit
dit
Question 5
Correct
1133
Mark 1.00 out of 1.00
Select one:
True
False
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27508&cmid=3913 2/2
2/3/22, 11:04 AM Post Quiz -Securing file services: Attempt review
Dashboard / Windows Server 2016 / FSRM / Post Quiz -Securing file services
Question 1
Correct
Select one:
True
1133
False
Question 2
Correct
1133
File screening audit is done through ________
Select one:
a. storage generate report
d. storage audit
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27040&cmid=2582 1/3
2/3/22, 11:04 AM Post Quiz -Securing file services: Attempt review
Question 3
Correct
Which quota is allowed the files to store by the user even if the quota exceeds?
Select one:
a. name of the file
c. FSRM
d. Soft quota
Question 4
Correct 1133
Mark 1.00 out of 1.00
How will you prevent storing a particular type of file using File screening?
Select one:
a. File Extensions
b. File Groups
c. hard quota
1133
d. quota template
Question 5
Correct
1133
You cannot generate the storage report instantly
Select one:
True
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27040&cmid=2582 2/3
2/3/22, 11:04 AM Post Quiz -Securing file services: Attempt review
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27040&cmid=2582 3/3
2/3/22, 11:00 AM Planning and implementing on IPv4 Network Quiz: Attempt review
Dashboard / Windows Server 2016 / Planning and Implementing an IPv4 Network / Planning and implementing on IPv4 Network Quiz
Question 1
Correct
Select one:
a. 36
1133
b. 24
c. 16
d. 8
Question 2
Correct
1133
Mark 1.00 out of 1.00
Select one:
True
False
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23685&cmid=2519 1/2
2/3/22, 11:00 AM Planning and implementing on IPv4 Network Quiz: Attempt review
Question 3
Correct
Which address is taken by the network card, when there is no DHCP Server?
Select one:
a. Private IP
b. Public Subnet
c. Public IP
d. APIPA
Question 4
Correct 1133
Mark 1.00 out of 1.00
I will not able to communicate directly with the internet using the private IP address?
Select one:
True
False
Select one:
a. 255
1133
b. 32
c. 28
d. 24
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23685&cmid=2519 2/2
2/3/22, 11:05 AM Monitoring, managing, and recovering Quiz: Attempt review
Dashboard / Windows Server 2016 / Monitoring, managing, and recovering AD DS / Monitoring, managing, and recovering Quiz
Question 1
Incorrect
Which log contains the system-related events such as service start-up and shutdown?
Select one:
a. application log
1133
b. security log
c. data log
d. system log
Question 2
Correct
1133
Mark 1.00 out of 1.00
________have been implemented to provide support for performance reports that require data from multiple log files of different types
Select one:
a. delete counter
b. add counter
c. trace
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29375&cmid=2587 1/3
2/3/22, 11:05 AM Monitoring, managing, and recovering Quiz: Attempt review
Question 3
Correct
The Performance Monitor is used to troubleshoot the performance of the operating system and its applications
Select one:
True
False
Question 4
Correct
1133
In which tool, you can add a performance counter in the windows server operating system?
Select one:
a. Performance Monitor
b. Task audit
c. configuration task
d. Task Manager
1133
The correct answer is: Performance Monitor
Question 5
Correct
Event Viewer is not used to Gather information and troubleshoot, Record events as logs
Select one:
True
1133
False
Jump to...
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29375&cmid=2587 2/3
2/3/22, 11:05 AM Monitoring, managing, and recovering Quiz: Attempt review
1133
1133
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29375&cmid=2587 3/3
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review
Dashboard / Windows Server 2016 / Monitoring, managing, and recovering AD DS / Monitoring, managing, and PreQuiz
Question 1
Correct
Select one:
True
1133
False
Question 2
Correct
1133
Application warning information is stored in the log files
Select one:
True
False
Question 3
Correct
performance details
errors
system information
system check
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 1/2
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review
Question 4
Correct
disk manager
device manager
performance monitor
event viewer
Question 5
Correct
1133
Mark 1.00 out of 1.00
Logon /Logoff events can be logged by default in windows server operating system
Select one:
True
False
1133
◄ Securing Active Directory Domain services Quiz
Jump to...
1133
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 2/2