0% found this document useful (0 votes)
125 views204 pages

Quiz All in One

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views204 pages

Quiz All in One

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 204

2/4/22, 11:45 PM Pre Quiz: Attempt review

 Dashboard / SIEM Fundamentals / SIEM Foundations / Pre Quiz

Started on Friday, 4 February 2022, 11:15 AM


State Finished
Completed on Friday, 4 February 2022, 11:15 AM
Time taken 35 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Select a SIEM tool which is provided by IBM

Select one:
a. Arcsight
b. Qradar 
c. Solarwinds
d. Splunk

The correct answer is: Qradar


989

Question 2
Correct

Mark 1.00 out of 1.00

Which of the following is a feature of the Security Management Process' implementation?

Select one:
True  989

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37286&cmid=2726 1/3
2/4/22, 11:45 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which of the following provides visibility to security professionals and records the actions of their IT environment

Select one:
a. SIEM Software 
b. Keylogger
c. MS Office
d. Linux

The correct answer is: SIEM Software

989

Question 4
Correct

Mark 1.00 out of 1.00

What does the acronym SIEM mean?

Select one:
a. Security Infromation and Excahnge Management
989 Management
b. Security Infromation and EMail
c. Security Infromation and Event Management 
d. Security Infromation and Evidence Management

The correct answer is: Security Infromation and Event Management

Question 5
Correct
989
Mark 1.00 out of 1.00

The encryption of data that is addressed in this final security rule standard is

Select one:
a. Transmission Security 
b. Security Management Process
c. Information Access Management
d. Audit Controls

The correct answer is: Transmission Security

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37286&cmid=2726 2/3
2/4/22, 11:45 PM Pre Quiz: Attempt review

◄ Discussion Forum

Jump to...

SIEM Foundations ►

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37286&cmid=2726 3/3
2/4/22, 11:45 PM Post Quiz: Attempt review

 Dashboard / SIEM Fundamentals / SIEM SOC and SecOps, Vendors / Post Quiz

Started on Friday, 4 February 2022, 11:47 PM


State Finished
Completed on Friday, 4 February 2022, 11:48 PM
Time taken 23 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Which of the following shows the current state of security-related systems, metrics, and any potential security vulnerabilities.

Select one:
a. Data Backup Plan
b. Data Monitoring
c. Data exploration
d. Dashboard 

The correct answer is: Dashboard


989

Question 2
Correct

Mark 1.00 out of 1.00

________ is a set of technologies that enable a security operation centre (SOC) to qualify, analyse, and remediate threats using
standardised procedures and automation to improve SOC efficiency.

Select one: 989


a. PCIDSS
b. SOAR 
c. GDPR
d. IEEE

The correct answer is: SOAR

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42267&cmid=2731 1/3
2/4/22, 11:45 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

To find out what happened before, during, and after a hack, ___________ models are utilised.

Select one:
a. investigate
b. files
c. digital forensic 
d. manul

The correct answer is: digital forensic

989

Question 4
Correct

Mark 1.00 out of 1.00

__________ is a legal framework that establishes criteria for the gathering and processing of personal data from European Union
citizens (EU)

Select one:
a. HIPAA 989
b. Payment Card Industry
c. SOX
d. General Data Protection Regulation 

The correct answer is: General Data Protection Regulation

Question 5
Correct 989

Mark 1.00 out of 1.00

In an agentless environment, which solution enables you to automatically collect and aggregate logs from numerous devices
and apps throughout your network?

Select one:
a. Log Collector 
b. Log Monitor
c. Log Files
d. Log Events

The correct answer is: Log Collector

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42267&cmid=2731 2/3
2/4/22, 11:45 PM Post Quiz: Attempt review

◄ SIEM SOC and SecOps, Vendors

Jump to...

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42267&cmid=2731 3/3
2/4/22, 10:43 PM Pre Quiz: Attempt review

 Dashboard / Security Fundamentals / Introduction Video and Pre Quiz / Pre Quiz

Started on Friday, 4 February 2022, 10:43 PM


State Finished
Completed on Friday, 4 February 2022, 10:45 PM
Time taken 1 min 19 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Which is the central node of 802.11 wireless operations.

Select one:
a. WEP

b. accesspoint 

c. WPA

d. Access port

989
Your answer is correct.

The correct answer is: accesspoint

Question 2
Correct

Mark 1.00 out of 1.00

Which of these is a part of the identification


989 of the network?

Select one:
a. Password

b. UserID 

c. Fingerprint

d. OTP

Your answer is correct.


The correct answer is: UserID

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41992&cmid=2432 1/3
2/4/22, 10:43 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Malware is the short form of ?

Select one:
a. malicious hardware

b. software

c. malicious software 

d. none

Your answer is correct.


989
The correct answer is: malicious software

Question 4
Incorrect

Mark 0.00 out of 1.00

In which year was the first computer worm (virus) created?

989
Select one:
a. 2000 

b. 1950

c. 1970

d. 1990

Your answer is incorrect.

The correct answer is: 1970

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41992&cmid=2432 2/3
2/4/22, 10:43 PM Pre Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

Your password should be atleast

Select one:
a. blank

b. 6 charcters 

c. 12 charcters

d. 3 charcters

Your answer is correct.


989
The correct answer is: 6 charcters

◄ Discussion Forum

Jump to...

Security Fundamentals Intro Video ►

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41992&cmid=2432 3/3
2/4/22, 10:44 PM Post Quiz: Attempt review

 Dashboard / Security Fundamentals / Cyber Attacks / Post Quiz

Started on Friday, 4 February 2022, 10:45 PM


State Finished
Completed on Friday, 4 February 2022, 10:46 PM
Time taken 1 min 7 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

To protect a computer from virus, you should install -------- in your computer.

Select one:
a. antivirus 

b. none

c. firewall

d. defragment

989
Your answer is correct.

The correct answer is: antivirus

Question 2
Correct

Mark 1.00 out of 1.00

Which protocol is the Active Directory database


989 based on?

Select one:
a. UDP

b. TCP

c. SNMP

d. LDAP 

Your answer is correct.


The correct answer is: LDAP

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42003&cmid=2436 1/3
2/4/22, 10:44 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which port does Telnet use?

Select one:
a. 80

b. 25

c. 53

d. 23 

Your answer is correct.


989
The correct answer is: 23

Question 4
Correct

Mark 1.00 out of 1.00

which is the port number used for HTTP

989
Select one:
a. 25

b. 143

c. 443
d. 80 

Your answer is correct.

The correct answer is: 80

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42003&cmid=2436 2/3
2/4/22, 10:44 PM Post Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

MCAfee is an example of

Select one:
a. none

b. Virus

c. badware

d. Antivirus software 

Your answer is correct.


989
The correct answer is: Antivirus software

◄ Cyber Attacks

Jump to...

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42003&cmid=2436 3/3
2/4/22, 11:23 PM Pre Quiz: Attempt review

 Dashboard / Networking Fundamentals & Security / Network Security / Pre Quiz

Started on Friday, 4 February 2022, 11:20 PM


State Finished
Completed on Friday, 4 February 2022, 11:22 PM
Time taken 2 mins 16 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

One of the following procedures is used to verify a user's identity?

Select one:
a. Validation

b. authentication 

c. Verification

d. Identification

989
Your answer is correct.

The correct answer is: authentication

Question 2
Correct

Mark 1.00 out of 1.00

Which of the following should we do our best to configure your systems and networks?
989

Select one:
a. None of the options

b. protection 

c. Reaction

d. Detection

Your answer is correct.


The correct answer is: protection

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42158&cmid=2718 1/3
2/4/22, 11:23 PM Pre Quiz: Attempt review

Question 3
Incorrect

Mark 0.00 out of 1.00

Which is the threats for clients?

Select one:
a. All the options

b. Worms

c. virus

d. Trojan Horses 

Your answer is incorrect.


989
The correct answer is: All the options

Question 4
Correct

Mark 1.00 out of 1.00

The integrity and confidentiality of data passing over a network are ensured by?

989
Select one:
a. Penetration Testing

b. Antivirus

c. network-security proctocols 

d. Firewall

Your answer is correct.

The correct answer is: network-security proctocols

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42158&cmid=2718 2/3
2/4/22, 11:23 PM Pre Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

Today, is commonly used to secure data in transit in a number of applications, like Internet data transfer.

Select one:
a. Data mining

b. encryption 

c. Architectural Security

d. Internet Security

Your answer is correct.


989
The correct answer is: encryption

◄ Post Quiz

Jump to...

NW Security Overview ►

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42158&cmid=2718 3/3
2/4/22, 11:23 PM Post Quiz: Attempt review

 Dashboard / Networking Fundamentals & Security / Network Security / Post Quiz

Started on Friday, 4 February 2022, 11:23 PM


State Finished
Completed on Friday, 4 February 2022, 11:26 PM
Time taken 3 mins 7 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

A system's security can be improved by

Select one:
a. Audit log

b. Threat monitoring 

c. Both (a) and (b)

d. None of these

989
Your answer is correct.

The correct answer is: Threat monitoring

Question 2
Correct

Mark 1.00 out of 1.00

Firewalls are to protect against 989

Select one:
a. Virus Attacks

b. Fire Attacks

c. Data Driven Attacks

d. Unauthorized attacks 

Your answer is correct.


The correct answer is: Unauthorized attacks

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42172&cmid=2720#question-42238-2 1/3
2/4/22, 11:23 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

What is the most crucial activity in the system?

Select one:
a. Cracking passwords 

b. Information Gathering

c. Covering Tracks

d. Escalating Privileges

Your answer is correct.


989
The correct answer is: Cracking passwords

Question 4
Correct

Mark 1.00 out of 1.00

Security features that limit who has access to the OS's resources.

989
Select one:
a. Validation

b. Identification

c. Authentication

d. Access control 

Your answer is correct.

The correct answer is: Access control

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42172&cmid=2720#question-42238-2 2/3
2/4/22, 11:23 PM Post Quiz: Attempt review

Question 5
Incorrect

Mark 0.00 out of 1.00

A ______________is a way for computers to interact with one another.

Select one:
a. Gateways 

b. Protocols

c. Port

d. Socket

Your answer is incorrect.


989
The correct answer is: Port

◄ NW Security Overview

Jump to...

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42172&cmid=2720#question-42238-2 3/3
2/5/22, 8:44 PM Post Quiz: Attempt review

 Dashboard / Networking Fundamentals & Security / Network Protocols / Post Quiz

Started on Friday, 4 February 2022, 11:16 PM


State Finished
Completed on Friday, 4 February 2022, 11:20 PM
Time taken 3 mins 35 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

What is the SMTP protocol port number?

Select one:
a. 23

b. 110

c. 143

d. 25 

989
Your answer is correct.

The correct answer is: 25

Question 2
Correct

Mark 1.00 out of 1.00

A physical or logical subnetwork that includes


989 and exposes the external services of an entity to a wider untrusted network, is
generally referred to as the Internet.

Select one:
a. IP

b. DMZ 

c. SMTP

d. TCP

Your answer is correct.


The correct answer is: DMZ

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 1/5
2/5/22, 8:44 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Bluetooth technology uses radio waves have a range of

Select one:
a. 20ft 

b. 100ft

c. 200ft

d. 20m

Your answer is correct.


989
The correct answer is: 20ft

Question 4
Correct

Mark 1.00 out of 1.00

In binary, what is the address range of a Class B network address?

989
Select one:
a. 01xxxxxx

b. 10xxxxxx 

c. 110xxxxx

d. 0xxxxxxx

Your answer is correct.

The correct answer is: 10xxxxxx

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 2/5
2/5/22, 8:44 PM Post Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

What IP address class has a limit of only 254 host addresses per network ID?

Select one:
a. Class C 

b. Class A

c. Class B

d. Class D

Your answer is correct.


989
The correct answer is: Class C

Question 6
Correct

Mark 1.00 out of 1.00

Which Protocol facilitates the exchange of management information between network devices ?

989
Select one:
a. SMTP

b. SNMP 

c. DNS

d. DHCP

Your answer is correct.

The correct answer is: SNMP

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 3/5
2/5/22, 8:44 PM Post Quiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

What method of switching checks the destination MAC address as the frame is received and then starts to forward the frame
until the entire frame is received?

Select one:
a. cut through 

b. Fragment Free

c. None

d. Store and Forward

989
Your answer is correct.

The correct answer is: cut through

Question 8
Correct

Mark 1.00 out of 1.00

What protocol is used to resolve an IP address to a MAC address?


989

Select one:
a. RARP

b. SMTP

c. ARP 

d. SMTP

Your answer is correct.

The correct answer is: ARP


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 4/5
2/5/22, 8:44 PM Post Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

what is the translation scheme used for converting all private ip in a domain to a single public ip.

Select one:
a. PAT 

b. None

c. static

d. dynamic

Your answer is correct.


989
The correct answer is: PAT

Question 10
Correct

Mark 1.00 out of 1.00

Inside the DoD TCP/IP comparison model, where does routing occur?

989
Select one:
a. Network 

b. Transport

c. Application

d. Physical

Your answer is correct.

The correct answer is: Network

989

◄ Protocols

Jump to...

Pre Quiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42142&cmid=2717 5/5
2/7/22, 11:52 AM Test Your Understanding - Vi Editor: Attempt review

 Dashboard / Linux Basics / Vi Editor / Test Your Understanding - Vi Editor

Started on Saturday, 5 February 2022, 12:37 AM


State Finished
Completed on Saturday, 5 February 2022, 12:40 AM
Time taken 2 mins 32 secs
Marks 1.14/2.00
Grade 57.14 out of 100.00
Feedback Oops! You have scored below 80%... So kindly make necessary preparations and reattempt...

Question 1
Correct
989
Mark 1.00 out of 1.00

Match the following:

L moves the cursor to the last line of the screen. 

dw deletes from the character selected to the end of the word. 

:wq save & quit 

yy yank 
989

Your answer is correct.

The correct answer is: L → moves the cursor to the last line of the screen., dw → deletes from the character selected
to the end of the word., :wq → save & quit, yy → yank

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42374&cmid=2676 1/2
2/7/22, 11:52 AM Test Your Understanding - Vi Editor: Attempt review

Question 2
Partially correct

Mark 0.14 out of 1.00

Arrange the statement.

 $ sed

 > UK.txt

 United Kingdom/

 Country.txt

 's/
989

 g'

 UK/

Your answer is partially correct.


The correct order for these items is as follows:

1. $ sed
2. 's/
3. UK/
4. United Kingdom/ 989
5. g'
6. Country.txt
7. > UK.txt

◄ Vi Editor - Demo

Jump to...

Post-Quiz ►
989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42374&cmid=2676 2/2
2/7/22, 11:52 AM Pre-Quiz: Attempt review

 Dashboard / Linux Basics / Vi Editor / Pre-Quiz

Started on Saturday, 5 February 2022, 9:47 PM


State Finished
Completed on Saturday, 5 February 2022, 9:52 PM
Time taken 5 mins 3 secs
Marks 7.00/7.00
Grade 100.00 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

989
Question 1
Correct

Mark 1.00 out of 1.00

sed maintains the hold space (a buffer) to __________ .

Select one:
a. save the data for later retrieval 
989
b. copy the each line of input

c. both

Your answer is correct.


The correct answer is: save the data for later retrieval

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 1/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

Match the following

yy Copies the current line 

cc Removes the content of the file 

dd Deletes the line 

Your answer is correct.


989
The correct answer is: yy → Copies the current line, cc → Removes the content of the file, dd → Deletes the line

Question 3
Correct

Mark 1.00 out of 1.00

If no file is specified in sed command, then _____________________.

989

Select one:
a.
sed reads the data already present in buffer

b.
sed command will not work

c. it is necessary to provide the filename

d. 
sed reads from standard input

989

Your answer is correct.

The correct answer is: sed reads from standard input

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 2/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which command searches the string in file opened in Vi editor?

Select one:
a. t or T

b. / or ? 

c. f or F

Your answer is correct.


989
The correct answer is: / or ?

Question 5
Correct

Mark 1.00 out of 1.00

Code Fill up:


989
___________ command is used to close the vi editor.

Select one:
a. :w

b. :wq or :q 

c. :q

d. :w!

989

Your answer is correct.

The correct answer is: :wq or :q

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 3/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

Which command sets the number for all lines?

Select one:
a. :set nl

b. :set nu 

c. :set ln

d. :set li

989
Your answer is correct.

The correct answer is: :set nu

Question 7
Correct

Mark 1.00 out of 1.00

989
Which of the following statements is not true?

Select one:
a. vi stands for visual editor

b. 
vi editor commands are not case sensitive

c.
vim editor is the improved version of vi editor

989
d.
vi editor has three modes of operation

Your answer is correct.

The correct answer is:


vi editor commands are not case sensitive

◄ Post-Quiz

Jump to...

Vi Editor Intro ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 4/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 5/6
2/7/22, 11:52 AM Pre-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45329&cmid=2673 6/6
2/7/22, 11:53 AM Post-Quiz: Attempt review

 Dashboard / Linux Basics / Vi Editor / Post-Quiz

Started on Saturday, 5 February 2022, 10:00 PM


State Finished
Completed on Saturday, 5 February 2022, 10:05 PM
Time taken 4 mins 21 secs
Marks 5.00/6.00
Grade 83.33 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
989
Correct

Mark 1.00 out of 1.00

Which command is used to replace word ‘cat’ (already present in the file) with ‘mouse’ at all places in a file ‘old.txt’ and save the
result in a new file ‘new.txt’?

Select one:
a. sed ‘s/cat/mouse/g’ old.txt > new.txt 
989
b. sed ‘s/cat/mouse’ old.txt new.txt

c. sed ‘/s/cat/mouse’ old.txt > new.txt

d. sed ‘/s/cat/mouse/g’ old.txt new.txt

Your answer is correct.


The correct answer is: sed ‘s/cat/mouse/g’ old.txt > new.txt

Question 2 989

Correct

Mark 1.00 out of 1.00

The substitution command (:s/) helps to quickly replace words or groups of words within your files.

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 1/4
2/7/22, 11:53 AM Post-Quiz: Attempt review

Question 3
Incorrect

Mark 0.00 out of 1.00

Which option will provide the current line number, along with the total number of lines in the file at the bottom of the screen?

Select one:
a. := 

b. :.=

c. ^g

Your answer is incorrect.


989
The correct answer is: ^g

Question 4
Correct

Mark 1.00 out of 1.00

Which cursor movement command is used to move the cursor to the last line in file?
989

Select one:
a. :0<return>

b. $<return> 

c. :n<return>

Your answer is correct.

The correct answer is: $<return>


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 2/4
2/7/22, 11:53 AM Post-Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

Which sed command deletes the specified address range?

Select one:
a. [address range]/d 

b. [address range]/y

c. [address range]/p

d. [address range]/s

989
Your answer is correct.

The correct answer is: [address range]/d

Question 6
Correct

Mark 1.00 out of 1.00

989
State True / False

In Vi Editor the / command searches downwards in the file.

Select one:
True 

False

The correct answer is 'True'. 989

◄ Test Your Understanding - Vi Editor

Jump to...

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 3/4
2/7/22, 11:53 AM Post-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=45364&cmid=2678 4/4
2/7/22, 8:31 PM Test Your Understanding - Introduction to Unix: Attempt review

 Dashboard / Linux Basics / Introduction to Linux / Test Your Understanding - Introduction to Unix

Started on Friday, 4 February 2022, 10:12 PM


State Finished
Completed on Friday, 4 February 2022, 10:13 PM
Time taken 1 min 16 secs
Marks 2.00/2.00
Grade 100.00 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
Correct
989
Mark 1.00 out of 1.00

Fill the specific date format in the given echo statement, to print the date in dd/mm/yyyy format.

echo `date + %d  / %m  / %Y  `

%y %dd %M

Your answer is correct.


989
The correct answer is:
Fill the specific date format in the given echo statement, to print the date in dd/mm/yyyy format.
echo `date +[%d]/[%m]/[%Y]`

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41859&cmid=2596 1/2
2/7/22, 8:31 PM Test Your Understanding - Introduction to Unix: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

What will be the output of the given code snippet?

~]$ dc

5
+

3 

989
4 8 5

Your answer is correct.


The correct answer is:
What will be the output of the given code snippet?

~]$ dc

5
+
989
3

[3]

◄ Introduction to Unix Demo

Jump to...

989 Calendar1 ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41859&cmid=2596 2/2
2/7/22, 11:47 AM Pre-Quiz: Attempt review

 Dashboard / Linux Basics / Introduction to Linux / Pre-Quiz

Started on Sunday, 6 February 2022, 4:29 PM


State Finished
Completed on Sunday, 6 February 2022, 4:31 PM
Time taken 1 min 11 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
989
Correct

Mark 1.00 out of 1.00

The OS decides which process gets the processor, when and for how much time it is called _______.

Select one:
a. multitask

b. multiuser

c. multiprogramming 
989

Your answer is correct.

The correct answer is: multiprogramming

Question 2
Correct

Mark 1.00 out of 1.00

989

What will keep track of the printers and the USB connected to a computer?

Select one:
a. traffic controller

b. I/O controller 

c. file system

d. process scheduling

Your answer is correct.

The correct answer is: I/O controller

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 1/4
2/7/22, 11:47 AM Pre-Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Match the following:

AIX IBM 

Linux Redhat 

HP-UX
Hewlett Packard 

Solaris
Sun Microsystem 
989

Your answer is correct.


The correct answer is:
AIX → IBM, Linux → Redhat,
HP-UX → Hewlett Packard,
Solaris → Sun Microsystem

Question 4
989
Correct

Mark 1.00 out of 1.00

Solaris is the name of a flavor of UNIX from _____________.

Select one:
a. HP
989
b. Sun Microsystems 

c. Digital Equipment Corp

d. IBM

Your answer is correct.


The correct answer is: Sun Microsystems

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 2/4
2/7/22, 11:47 AM Pre-Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

Which helps us to access the functions provided by the kernel to do the services of the OS?

Select one:
a. command

b. system call 

c. shell

989
Your answer is correct.

The correct answer is: system call

◄ Discussion Forum

Jump to...

Introduction to Unix ►

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 3/4
2/7/22, 11:47 AM Pre-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=47137&cmid=2594 4/4
2/7/22, 11:47 AM Post-Quiz: Attempt review

 Dashboard / Linux Basics / Introduction to Linux / Post-Quiz

Started on Friday, 4 February 2022, 10:14 PM


State Finished
Completed on Friday, 4 February 2022, 10:18 PM
Time taken 4 mins 53 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

989
Question 1
Correct

Mark 1.00 out of 1.00

Predict the output for the following command, if the current date is 21-04-2000.

date '+%B %H'

Select one:
989
a. April 21 

b. command error

c. 04 21

d. 21 april

Your answer is correct.

The correct answer is: April 21


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 1/4
2/7/22, 11:47 AM Post-Quiz: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

What is the option used in ls command to list all entries in the current directory including hidden files?

Select one:
a. -ls

b. -l

c. -a 

d. -lh

989
Your answer is correct.

The correct answer is: -a

Question 3
Correct

Mark 1.00 out of 1.00

989
Single user mode shell has _____ prompt.

Select one:
a. $ Normal user

b. # Root user 

c. % Admin user

d. ~ Home user

989
Your answer is correct.
The correct answer is: # Root user

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 2/4
2/7/22, 11:47 AM Post-Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Write the command to display the current date in the form dd/mm/yyyy.

Select one:
a. date +”/%d/%m/20%y”

b. date +”%d/%m/%y”

c. date +%d/%m/%Y 

d. date +/%d/%m/20%y

989
Your answer is correct.

The correct answer is: date +%d/%m/%Y

Question 5
Correct

Mark 1.00 out of 1.00

989
What is the default maximum number of processes that can exist in Unix?

Select one:
a. unlimited

b. 32768 

c. 1024

d. 4096

989
Your answer is correct.
The correct answer is: 32768

◄ DiskUsage2

Jump to...

Pre-Quiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 3/4
2/7/22, 11:47 AM Post-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41872&cmid=2613 4/4
2/7/22, 11:50 AM Test Your Understanding - Filters: Attempt review

 Dashboard / Linux Basics / Filters / Test Your Understanding - Filters

Started on Saturday, 5 February 2022, 12:20 AM


State Finished
Completed on Saturday, 5 February 2022, 12:20 AM
Time taken 37 secs
Marks 1.00/2.00
Grade 50.00 out of 100.00
Feedback Oops! You have scored below 80%... So kindly make necessary preparations and reattempt...

Question 1
Incorrect
989
Mark 0.00 out of 1.00

Pick the odd man out:

Select one:
a. head 

b. cat

c. more

d. grep
989

Your answer is incorrect.


Using cat command, content of a file can be modified, but other commands won't effect the original file.

The correct answer is: cat

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42347&cmid=2650 1/2
2/7/22, 11:50 AM Test Your Understanding - Filters: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

In Cut command, ______ option is used to identify the column, when the file has fixed length records.

Select one:
a. -s

b. -c 

c. -d

d. -f

989
Your answer is correct.

The correct answer is: -c

◄ Filters - Demo

Jump to...

Find string1 ►

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42347&cmid=2650 2/2
2/7/22, 11:50 AM Pre-Quiz: Attempt review

 Dashboard / Linux Basics / Filters / Pre-Quiz

Started on Saturday, 5 February 2022, 12:18 AM


State Finished
Completed on Saturday, 5 February 2022, 12:18 AM
Time taken 27 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
989
Correct

Mark 1.00 out of 1.00

A pipe redirects the output of one command as an input to another command.

Select one:
True 

False
989

The correct answer is 'True'.

Question 2
Correct

Mark 1.00 out of 1.00

989
What command is used to check the current users?

Select one:
a. ls

b. grep

c. who 

d. sed

Your answer is correct.

The correct answer is: who

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 1/4
2/7/22, 11:50 AM Pre-Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which command will allow the user to search contents of a file for a particular pattern?

Select one:
a. touch

b. grep 

c. ls

d. find

989
Your answer is correct.

The correct answer is: grep

Question 4
Correct

Mark 1.00 out of 1.00

989
Which symbol is used in pipe command to group two commands?

Select one:
a. /

b. \

c. | 

d. ||

Your answer is correct.


989
The correct answer is: |

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 2/4
2/7/22, 11:50 AM Pre-Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

Code Fillup:

______________ is a form of interprocess communication.

Select one:
a. redirection

b. reinsertion

c. redistribution 

d. none of these
989

Your answer is correct.


The correct answer is: redistribution

◄ Post-Quiz

Jump to...

Filters Intro ►
989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 3/4
2/7/22, 11:50 AM Pre-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42340&cmid=2647 4/4
2/7/22, 11:51 AM Post-Quiz: Attempt review

 Dashboard / Linux Basics / Filters / Post-Quiz

Started on Saturday, 5 February 2022, 12:25 AM


State Finished
Completed on Saturday, 5 February 2022, 12:27 AM
Time taken 1 min 28 secs
Marks 6.00/7.00
Grade 85.71 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
989
Correct

Mark 1.00 out of 1.00

What is the option in filter command grep, which removes any entries from the list by excluding any lines that start with a
leading "d"?

Select one:
a. grep -s "^d"
989
b. grep -n "^d"

c. grep -v "^d" 

d. grep -v "d"

Your answer is correct.


The correct answer is: grep -v "^d"

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 1/4
2/7/22, 11:51 AM Post-Quiz: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

Match the following:

command >> file Output of command is appended to file 

command > file Output of command is redirected to file 

command < file Command reads its input from file 

Your answer is correct.


989
The correct answer is: command >> file → Output of command is appended to file, command > file → Output of command is
redirected to file, command < file → Command reads its input from file

Question 3
Incorrect

Mark 0.00 out of 1.00

In cut, which two options come together?


989

Select one:
a. -c, -f

b. -d, -f

c. -d, -c 

Your answer is incorrect.

The correct answer is: -d, -f


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 2/4
2/7/22, 11:51 AM Post-Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Code FillUp

To refer a field or column in the current line, ___________ symbol is used in awk command.

Select one:
a. -

b. |

c. $ 

d. .
989

Your answer is correct.


The correct answer is: $

Question 5
Correct

Mark 1.00 out of 1.00

989

In ls command -R is the option to list sub directories recursively. Say yes/No.

Select one:
a. Yes 

b. No

Your answer is correct.

The correct answer is: Yes 989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 3/4
2/7/22, 11:51 AM Post-Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

In tee command, if the standard input was successfully copied to all output files, it returns ______.

Select one:
a. >0

b. 0 

c. <0

Your answer is correct.


The correct answer is: 0
989

Question 7
Correct

Mark 1.00 out of 1.00

grep with the option -n prints __________.

989
Select one:
a. list all lines which match with the given pattern with line numbers 

b. Number of lines that does not match with the given pattern

c.
nth line

d.
Number of lines that matches with the given pattern

989

Your answer is correct.

The correct answer is: list all lines which match with the given pattern with line numbers

◄ Pattern Search

Jump to...

Pre-Quiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42361&cmid=2672 4/4
2/7/22, 11:48 AM Test Your Understanding - File System: Attempt review

 Dashboard / Linux Basics / File System / Test Your Understanding - File System

Started on Saturday, 5 February 2022, 12:04 AM


State Finished
Completed on Saturday, 5 February 2022, 12:05 AM
Time taken 1 min 1 sec
Marks 2.00/2.00
Grade 100.00 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
Correct
989
Mark 1.00 out of 1.00

Find the equivalent octal notation for the given permission:

Symbolic Notation : r - x r - - r - -

Octal Notation : 544 

744 644

Your answer is correct.


989
The correct answer is:
Find the equivalent octal notation for the given permission:
Symbolic Notation : r - x r - - r - -

Octal Notation : [544]

Question 2
Correct

Mark 1.00 out of 1.00


989

cp command is like copy‑paste  and mv command is like cut‑paste  .

Your answer is correct.

The correct answer is:


cp command is like [copy‑paste] and mv command is like [cut‑paste] .

◄ File System - Demo

Jump to...

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42314&cmid=2617 1/2
2/7/22, 11:48 AM Test Your Understanding - File System: Attempt review

Directory Creation - 1 ►

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42314&cmid=2617 2/2
2/7/22, 11:48 AM Pre-Quiz: Attempt review

 Dashboard / Linux Basics / File System / Pre-Quiz

Started on Friday, 4 February 2022, 10:20 PM


State Finished
Completed on Friday, 4 February 2022, 10:27 PM
Time taken 7 mins 6 secs
Marks 12.00/13.00
Grade 92.31 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

989
Question 1
Correct

Mark 1.00 out of 1.00

Code Fillup:

___________ command is used to remove a directory?

989
Select one:
a. rdir

b. rmdir 

c. rd

d. dldir

Your answer is correct.

The correct answer is: rmdir


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 1/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

Which command will allow the user to search contents of a file for a particular pattern?

Select one:
a. ls

b. grep 

c. touch

d. find

989
Your answer is correct.

The correct answer is: grep

Question 3
Correct

Mark 1.00 out of 1.00

989
Code Fillup:

______________ is a form of interprocess communication.

Select one:
a. none of these

b. redistribution 

c. redirection

d. reinsertion

989

Your answer is correct.

The correct answer is: redistribution

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 2/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which symbol is used in pipe command to group two commands?

Select one:
a. ||

b. \

c. /

d. | 

Your answer is correct.


989
The correct answer is: |

Question 5
Correct

Mark 1.00 out of 1.00

In which structure on the disk are file attribute information stored?


989
Select one:
a. Directory file

b. File blocks

c. Inode 

d. Data blocks

Your answer is correct.


The correct answer is: Inode
989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 3/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

What command is used to check the current users?

Select one:
a. ls

b. grep

c. sed

d. who 

989
Your answer is correct.

The correct answer is: who

Question 7
Correct

Mark 1.00 out of 1.00

989
rm command will remove a file in Unix. Then the file ____________________.

Select one:
a. will be moved to /lost+found directory and can be recovered only by the administrator

b.
can be recovered by an admin

c. 
cannot be recovered by a user

989
d.
can be fully recovered provided the system is not rebooted

Your answer is correct.

The correct answer is: cannot be recovered by a user

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 4/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

Question 8
Incorrect

Mark 0.00 out of 1.00

Which command will take backup of "Employee.dat" file to "Employee.log" file?

Select one:
a. mv Employee.dat Employee.log

b. cp Employee.dat Employee.log

c. move Employee.dat Employee.log

d. rm Employee.dat Employee.log 

989
Your answer is incorrect.

The correct answer is: cp Employee.dat Employee.log

Question 9
Correct

Mark 1.00 out of 1.00

989
A pipe redirects the output of one command as an input to another command.

Select one:
True 

False

The correct answer is 'True'.

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 5/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

Question 10
Correct

Mark 1.00 out of 1.00

Choose the umask value which doesn’t allow execute permission for directories by default.

Select one:
a. 444

b. 222

c. 111 

d. 000

989
Your answer is correct.

The correct answer is: 111

Question 11
Correct

Mark 1.00 out of 1.00

989
Match the Following:

write and execute -wx 

read, write and execute rwx 

read and write


rw- 

read and execute r-x 


989

Your answer is correct.


The correct answer is: write and execute → -wx, read, write and execute → rwx,
read and write → rw-, read and execute → r-x

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 6/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

Question 12
Correct

Mark 1.00 out of 1.00

________________ is the command to set the execute permissions to all the files and subdirectories within the directory
/home/client1/temp.

Select one:
a.
chmod –f –r +x /home/client1/temp

b.
chmod –r +x /home/client1/temp

989
c. chmod –F +x /home/client1/temp

d. 
chmod –R +x /home/client1/temp

Your answer is correct.

The correct answer is: chmod –R +x /home/client1/temp

Question 13 989

Correct

Mark 1.00 out of 1.00

Choose the correct symbol which represents the user home directory.

Select one:
a. /

b. ~ 989 

c. ..

d. .

Your answer is correct.


The correct answer is: ~

◄ Post-Quiz

Jump to...

File system Intro ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 7/8
2/7/22, 11:48 AM Pre-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41899&cmid=2614 8/8
2/7/22, 11:49 AM Post-Quiz: Attempt review

 Dashboard / Linux Basics / File System / Post-Quiz

Started on Saturday, 5 February 2022, 12:05 AM


State Finished
Completed on Saturday, 5 February 2022, 12:15 AM
Time taken 9 mins 31 secs
Marks 12.33/15.00
Grade 82.22 out of 100.00
Feedback Congratulations! You have passed by securing more that 80%.

Question 1
989
Correct

Mark 1.00 out of 1.00

grep with the option -n prints __________.

Select one:
a. Number of lines that does not match with the given pattern

989
b. list all lines which match with the given pattern with line numbers 

c. Number of lines that matches with the given pattern

d.
nth line

Your answer is correct.

The correct answer is: list all lines which match with the given pattern with line numbers
989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 1/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 2
Correct

Mark 1.00 out of 1.00

Match the following:

cd .. will move to immediate parent directory 

cd . current Directory 

cd - will switch to previous visited directory 

Your answer is correct.


989
The correct answer is: cd .. → will move to immediate parent directory, cd . → current Directory, cd - → will switch to previous
visited directory

Question 3
Partially correct

Mark 0.33 out of 1.00

Match the following:


989

command >> file Output of command is redirected to file 

command > file Output of command is appended to file 

command < file Command reads its input from file 

Your answer is partially correct.


You have correctly selected 1.
The correct answer is: command >> file989
→ Output of command is appended to file, command > file → Output of command is
redirected to file, command < file → Command reads its input from file

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 2/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Code FillUp

To refer a field or column in the current line, ___________ symbol is used in awk command.

Select one:
a. |

b. .

c. $ 

d. -
989

Your answer is correct.


The correct answer is: $

Question 5
Correct

Mark 1.00 out of 1.00

989

In tee command, if the standard input was successfully copied to all output files, it returns ______.

Select one:
a. 0 

b. <0

c. >0

Your answer is correct.

The correct answer is: 0 989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 3/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

__________ stamp is not stamped for a file in a traditional Unix file system.

Select one:
a. Creation Time 

b. Access Time

c. Modification Time

d. Change Time

989
Your answer is correct.

The correct answer is: Creation Time

Question 7
Correct

Mark 1.00 out of 1.00

989
The last change time of the file is updated, if a user does a chmod operation on a file.

Select one:
True 

False

The correct answer is 'True'.

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 4/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 8
Correct

Mark 1.00 out of 1.00

Predict the output of the following command.

$ chmod o+w data.txt

Select one:
a.
revoke write permission to users

b.
grant write permission to users

989
c. revoke write permission to others

d. 
grant write permission to others

Your answer is correct.

The correct answer is: grant write permission to others

Question 9 989

Correct

Mark 1.00 out of 1.00

In ls command -R is the option to list sub directories recursively. Say yes/No.

Select one:
a. Yes 
989
b. No

Your answer is correct.

The correct answer is: Yes

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 5/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 10
Incorrect

Mark 0.00 out of 1.00

In cut, which two options come together?

Select one:
a. -d, -c 

b. -c, -f

c. -d, -f

Your answer is incorrect.


989
The correct answer is: -d, -f

Question 11
Correct

Mark 1.00 out of 1.00

When mv first.dat second.dat is executed, the inode of __________ file is freed.


989

Select one:
a. second.dat 

b. first.dat

Your answer is correct.

The correct answer is: second.dat

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 6/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 12
Correct

Mark 1.00 out of 1.00

___________command is used to display only the directory attributes and not its contents.

Select one:
a. ls -F

b. ls -l -d 

c. ls -l

d. ls -x

989
Your answer is correct.

The correct answer is: ls -l -d

Question 13
Correct

Mark 1.00 out of 1.00

989
The Octal notation for the given permission "-rwxr-xr–x" is represented as ________ .

Select one:
a. 666

b. 744

c. 777

d. 755 

989
Your answer is correct.
The correct answer is: 755

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 7/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

Question 14
Correct

Mark 1.00 out of 1.00

Consider the directory structure "PARENT/CHILD/GRANDCHILD". Which option in rmdir command will help us to remove all the
directories "PARENT/CHILD/GRANDCHILD"?

Select one:
a. –t

b. –b

c. –p 

d. –o
989

Your answer is correct.

The correct answer is: –p

Question 15
Incorrect

Mark 0.00 out of 1.00

989

What is the option in filter command grep, which removes any entries from the list by excluding any lines that start with a
leading "d"?

Select one:
a. grep -n "^d"

b. grep -v "d"

c. grep -v "^d"

d. grep -s "^d" 
989

Your answer is incorrect.

The correct answer is: grep -v "^d"

◄ File Permission - 8

Jump to...

Pre-Quiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 8/9
2/7/22, 11:49 AM Post-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42315&cmid=2646 9/9
2/7/22, 7:25 PM Pre Quiz: Attempt review

 Dashboard / ITIL 4 Foundation-sme / ITIL 4 Foundation / Pre Quiz

Started on Friday, 4 February 2022, 10:53 AM


State Finished
Completed on Friday, 4 February 2022, 10:56 AM
Time taken 3 mins 4 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

ITIL is implemented

Select one:
a. With Customers

b. With External Vendors

c. Within the IT Department

d. Within an organization 

989
Your answer is correct.

The correct answer is: Within an organization

Question 2
Correct

Mark 1.00 out of 1.00

ITIL consists of ….. 989

Select one or more:


a. A Process 

b. A Policy 

c. A Framework 

d. A Practice

Your answer is correct.


The correct answers are: A Process, A Framework, A Policy

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 1/5
2/7/22, 7:25 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

From which country did ITIL roll out

Select one:
a. Japan

b. United Kingdom 

c. Germany

d. France

Your answer is correct.


989
The correct answer is: United Kingdom

Question 4
Correct

Mark 1.00 out of 1.00

KB stand for

989
Select one:
a. Kilo Bit

b. Knowledge broadcast

c. Kilo Byte

d. Knowledge Base 

Your answer is correct.

The correct answer is: Knowledge Base

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 2/5
2/7/22, 7:25 PM Pre Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

Is change request and service request the same?

Select one:
a. No 

b. Yes

Your answer is correct.

The correct answer is: No

989

Question 6
Correct

Mark 1.00 out of 1.00

ITIL is …..

Select one or more:


a. Descriptive 

b. User defined 989

c. Perspective 

d. Manual Document

Your answer is correct.


The correct answers are: Descriptive, Perspective

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 3/5
2/7/22, 7:25 PM Pre Quiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

What does SLA stand for?

Select one:
a. None of these

b. Set of Level Agreement

c. Service Law Agreement

d. Service Level Agreement 

Your answer is correct.


989
The correct answer is: Service Level Agreement

Question 8
Correct

Mark 1.00 out of 1.00

What is the full form for ITIL?

989
Select one:
a. Internet Technology information list

b. Information Technology Infrastructure Library 

c. Information Technology internet library

d. Information technology information library

Your answer is correct.

The correct answer is: Information Technology Infrastructure Library

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 4/5
2/7/22, 7:25 PM Pre Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

Branding Value is the type of

Select one or more:


a. Value on Investment 

b. None of these

c. Return on Investment 

Your answer is correct.


The correct answers are: Return on Investment, Value on Investment
989

Question 10
Correct

Mark 1.00 out of 1.00

ITIL Involves

Select one or more:


a. Service Partners 989

b. Customers 

c. Staff of the Organization 

d. Vendors 

Your answer is correct.

The correct answers are: Vendors, Customers, Staff of the Organization

989

◄ Discussion Forum

Jump to...

ITIL 4 intro video ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37043&cmid=2936 5/5
2/7/22, 7:26 PM Post Quiz: Attempt review

 Dashboard / ITIL 4 Foundation-sme / ITIL 4 Foundation / Post Quiz

Started on Friday, 4 February 2022, 10:56 AM


State Finished
Completed on Friday, 4 February 2022, 11:03 AM
Time taken 6 mins 17 secs
Marks 20.00/20.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

What is the purpose of the 'information security management' practice?

Select one:
a. Ensuring that services achieve agreed and expected performance levels, satisfying current and future demand in a
cost-effective way
b. Ensuring that services deliver agreed levels of availability or that change can be assessed
c. Protecting an organization by understanding and managing risks to the confidentiality, integrity, and availability of 
information
d. Systematically observing services and service components and recording and reporting selected changes of state
identified as events
989

The correct answer is: Protecting an organization by understanding and managing risks to the confidentiality, integrity, and
availability of information

Question 2
Correct

Mark 1.00 out of 1.00

989
Rohan is currently working to create a new service that would allow a customer to purchase a digital product online and have it
delivered to the user's inbox. Rohan is responsible for the payment portion of this service, but Esther is responsible for the
digital product fulfillment portion of the service. Which of the following should John do in order to follow the principle of 'think
and work holistically'?

Select one:
a. Rohan should tell Esther to wait until his portion is done before starting hers to ensure compatibility
b. Rohan should meet with Esther to determine how the digital product fulfillment will occur 
c. Rohan should wait until Esther's portion is complete before beginning his to ensure they work together properly
d. Rohan should optimize his code to ensure it runs efficiently

The correct answer is: Rohan should meet with Esther to determine how the digital product fulfillment will occur

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 1/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which of these are NOT a key focus of the ‘partners and suppliers’ dimension?

Select one:
a. Security and compliance
b. Workflow management and inventory systems 
c. Roles and responsibilities
d. Contracts and agreements

The correct answer is: Workflow management and inventory systems

989

Question 4
Correct

Mark 1.00 out of 1.00

What is the purpose of the 'incident management' practice?

Select one:
a. Supporting the agreed quality of a service by handling all pre-defined, user-initiated service requests in an effective and
user-friendly manner 989
b. Ensuring that services deliver agreed levels of availability or that change can be assessed
c. Minimizing the negative impact of incidents by restoring normal service operation as quickly as possible 
d. Ensuring that all an organization's projects are successfully delivered

The correct answer is: Minimizing the negative impact of incidents by restoring normal service operation as quickly as possible

Question 5
Correct 989

Mark 1.00 out of 1.00

Which of these are a key focus of the ‘organization and people’ dimension?

Select one:
a. Activities that transform inputs into outputs
b. Security and compliance
c. Roles and responsibilities 
d. Contracts and agreements

The correct answer is: Roles and responsibilities

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 2/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

What term best describes a person or a group of people that has its own functions with responsibilities, authorities, and
relationships to achieve its objectives?

Select one:
a. Customer
b. Consumer
c. Organization 
d. Service provider

The correct answer is: Organization


989

Question 7
Correct

Mark 1.00 out of 1.00

Which ITIL concept describes the service value chain?

Select one:
a. Service value system 989 
b. Seven guiding principles
c. Four dimensions of service management
d. Practices

The correct answer is: Service value system

Question 8
Correct 989

Mark 1.00 out of 1.00

What is the definition of a service?

Select one:
a. The means by which an organization is directed and controlled
b. A means of enabling value co-creation by facilitating outcomes that customers want to achieve, without the 
customer having to manage specific costs and risks
c. A set of specialized organizational capabilities for enabling value to customers
d. A method for visualizing work, identifying potential blockages and resource conflicts, and managing work in progress

The correct answer is: A means of enabling value co-creation by facilitating outcomes that customers want to achieve, without
the customer having to manage specific costs and risks

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 3/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

What is defined as the practice of ensuring that accurate and reliable information about the configuration of services, and the
configuration items that support them, is available when and where needed?

Select one:
a. Service configuration management 
b. Change control
c. Service level management
d. IT asset management

The correct answer is: Service configuration management


989

Question 10
Correct

Mark 1.00 out of 1.00

Identify the missing word(s) in the following sentence. Utility is the [?] offered by a product or service to meet a particular need.

Select one:
a. Outcome 989
b. Assurance
c. Functionality 
d. Promise

The correct answer is: Functionality

Question 11
Correct 989

Mark 1.00 out of 1.00

Identify the missing word in the following sentence. The [?] is the practice of capturing demand for incident resolution and
service requests

Select one:
a. Service desk 
b. Service request management
c. Service level management
d. Incident management

The correct answer is: Service desk

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 4/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 12
Correct

Mark 1.00 out of 1.00

You are working to design a new service for internal use across your organization. As part of your design efforts, you form a
small team with relevant stakeholders from the human resources, information technology, sales, and other relevant
departments to ensure the service adequately meets each department's needs and hope this results in great acceptance of the
service when delivered. Which guiding principle best describes this scenario?

Select one:
a. Focus on value
b. Keep it simple and practical
c. Collaborate and promote visibility 
d. Start where you are

989
The correct answer is: Collaborate and promote visibility

Question 13
Correct

Mark 1.00 out of 1.00

Identify the missing word in the following sentence. [?] is the practice of ensuring that risks are properly assessed, authorizing
changes to proceed, and managing989 a change schedule in order to maximize the number of successful IT changes.

Select one:
a. Service configuration management
b. IT asset management
c. Service level management
d. Change control 

The correct answer is: Change control

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 5/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 14
Correct

Mark 1.00 out of 1.00

Identify the missing word(s) in the following sentence. An event is any change of state that has significance for the
management of a [?] or other configuration items

Select one:
a. Outcome
b. Service 
c. Output
d. Product

The correct answer is: Service


989

Question 15
Correct

Mark 1.00 out of 1.00

What operating model outlines the key activities required to respond to demand and facilitate value realization through the
creation and management of products and services?

Select one: 989


a. Practices
b. Continual improvement
c. Service value chain 
d. Guiding principles

The correct answer is: Service value chain

Question 16
989
Correct

Mark 1.00 out of 1.00

Which describes outputs?

Select one:
a. Results for a stakeholder
b. Configuration of an organization’s resources
c. Tangible or intangible deliverables 
d. Functionality offered by a product or service

The correct answer is: Tangible or intangible deliverables

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 6/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 17
Correct

Mark 1.00 out of 1.00

Which guiding principle is most affected by the customer experience (CX)?

Select one:
a. Think and work holistically
b. Progress iteratively with feedback
c. Start where you are
d. Focus on value 

The correct answer is: Focus on value

989

Question 18
Correct

Mark 1.00 out of 1.00

Which describes the nature of the guiding principles?

Select one:
a. A guiding principle is specific and only applies to one initiative within the organization
989 and must be used when adopting a new service within the organization
b. A guiding principle is mandatory
c. A guiding principle is a recommendation used as guidance in all circumstances 
d. An organization must implement the guiding principles exactly as defined by the ITIL 4 Foundation manual

The correct answer is: A guiding principle is a recommendation used as guidance in all circumstances

Question 19
Correct
989
Mark 1.00 out of 1.00

What is the purpose of the 'monitoring and event management' practice?

Select one:
a. Supporting the agreed quality of a service by handling all pre-defined, user-initiated service requests in an effective and
user-friendly manner
b. Minimizing the negative impact of incidents by restoring normal service operation as quickly as possible
c. Systematically observing services and service components and recording and reporting selected changes of state 
identified as events
d. Ensuring that all an organization's projects are successfully delivered

The correct answer is: Systematically observing services and service components and recording and reporting selected
changes of state identified as events

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 7/8
2/7/22, 7:26 PM Post Quiz: Attempt review

Question 20
Correct

Mark 1.00 out of 1.00

Which value chain activity includes portfolio decisions for design and transition?

Select one:
a. Engage
b. Deliver and support
c. Plan 
d. Improve

The correct answer is: Plan

989

◄ ITIL V4 Process Part 3

Jump to...

Reference Case Study ►

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=37072&cmid=2947 8/8
2/4/22, 10:36 PM Pre Quiz: Attempt review

 Dashboard / Infrastructure & Security Overview / Infrastructure Security / Pre Quiz

Started on Friday, 4 February 2022, 10:33 PM


State Finished
Completed on Friday, 4 February 2022, 10:34 PM
Time taken 1 min 4 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Which of the following is considered as the unsolicited commercial email?

Select one:
a. Spam 

b. Malware

c. All of the options

d. Virus

989
Your answer is correct.

The correct answer is: Spam

Question 2
Correct

Mark 1.00 out of 1.00

It can be a software programme or a hardware


989 device that filters all data packets sent over the internet, a network, or other
networks. It's classified as the_______________

Select one:
a. Antivirus

b. Firewall 

c. Cookies

d. Malware

Your answer is correct.


The correct answer is: Firewall

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41957&cmid=2382 1/3
2/4/22, 10:36 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which happens first authorization or authentication?

Select one:
a. Authorization

b. Authentication 

c. None of the mentioned

d. Authorization & Authentication are same

Your answer is correct.


989
The correct answer is: Authentication

Question 4
Correct

Mark 1.00 out of 1.00

___________ is a weakness that can be exploited by attackers.

989
Select one:
a. System with vulnerabilities 

b. System without firewall

c. Strong password

d. System with virus

Your answer is correct.

The correct answer is: System with vulnerabilities

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41957&cmid=2382 2/3
2/4/22, 10:36 PM Pre Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

_______ is a type of software designed to help the user's computer detect viruses and avoid them.

Select one:
a. Malware

b. Adware

c. None

d. Antivirus 

Your answer is correct.


989
The correct answer is: Antivirus

◄ Post Quiz

Jump to...

Infrastructure Security Overview ►

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41957&cmid=2382 3/3
2/4/22, 10:36 PM Post Quiz: Attempt review

 Dashboard / Infrastructure & Security Overview / Infrastructure Overview / Post Quiz

Started on Friday, 4 February 2022, 10:29 PM


State Finished
Completed on Friday, 4 February 2022, 10:33 PM
Time taken 3 mins 13 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Which cloud infrastructure is operated for the exclusive use of an organizational purpose .

Select one:
a. Private 

b. Hybrid

c. Public

d. Community

989
Your answer is correct.

The correct answer is: Private

Question 2
Incorrect

Mark 0.00 out of 1.00

What's the most basic level of storage 989

Select one:
a. DAS

b. NAS

c. SAN 

d. HDD

Your answer is incorrect.


The correct answer is: DAS

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 1/5
2/4/22, 10:36 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which is a file level data storage device connected to a TCP/IP network

Select one:
a. HDD

b. NAS 

c. DAS

d. SAN

Your answer is correct.


989
The correct answer is: NAS

Question 4
Correct

Mark 1.00 out of 1.00

Which delivery model is an example of a cloud computing environment that provides users with a web based email service?

989
Select one:
a. None

b. Iaas

c. SaaS 

d. PaaS

Your answer is correct.

The correct answer is: SaaS

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 2/5
2/4/22, 10:36 PM Post Quiz: Attempt review

Question 5
Incorrect

Mark 0.00 out of 1.00

Which is a storage device in a computer that is used for storing files.

Select one:
a. Laptop

b. Printer

c. Server

d. CD Rom 

Your answer is incorrect.


989
The correct answer is: Server

Question 6
Correct

Mark 1.00 out of 1.00

The elasticity and the flexibility in the Cloud are built on the foundation of

989
Select one:
a. Virtualization 

b. Traditional IT

c. Standardization

d. Operating system

Your answer is correct.

The correct answer is: Virtualization

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 3/5
2/4/22, 10:36 PM Post Quiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

Which has many of the characteristics of what is now being called cloud computing.

Select one:
a. Internet 

b. Software

c. Extranet

d. Web Services

Your answer is correct.


989
The correct answer is: Internet

Question 8
Correct

Mark 1.00 out of 1.00

For long-term storage (archival) of data used typically by the following storage equipment

989
Select one:
a. CD Rom

b. Floppy Disk

c. Tape Cartridges 

d. Hard Disk

Your answer is correct.

The correct answer is: Tape Cartridges

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 4/5
2/4/22, 10:36 PM Post Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

The software that lies between an operating system and the programs that run on it is

Select one:
a. Firmware

b. Software

c. Hardware

d. Middleware 

Your answer is correct.


989
The correct answer is: Middleware

Question 10
Correct

Mark 1.00 out of 1.00

The process of handling individuals to achieve better results is

989
Select one:
a. HRM 
b. Payroll
c. ERP

d. CRM

Your answer is correct.

The correct answer is: HRM

989

◄ Cloud Computing edited

Jump to...

Pre Quiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41938&cmid=2381 5/5
2/4/22, 10:35 PM Post Quiz: Attempt review

 Dashboard / Infrastructure & Security Overview / Infrastructure Security / Post Quiz

Started on Friday, 4 February 2022, 10:34 PM


State Finished
Completed on Friday, 4 February 2022, 10:38 PM
Time taken 3 mins 26 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

In an any organization, company or firm the policies of information security come under__________

Select one:
a. cia triad 

b. Confidentiality

c. None of the above

d. Authenticity

989
Your answer is correct.

The correct answer is: cia triad

Question 2
Correct

Mark 1.00 out of 1.00

Which type of the following malware does


989not replicate or clone them self's through infection?

Select one:
a. Rootkits

b. Viruses

c. trojans 

d. Worms

Your answer is correct.


The correct answer is: trojans

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41963&cmid=2384 1/3
2/4/22, 10:35 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

The first step in hacking an IT device is to compromise which security foundation?

Select one:
a. Integrity

b. Authentication

c. Availability

d. confidentiality 

Your answer is correct.


989
The correct answer is: confidentiality

Question 4
Correct

Mark 1.00 out of 1.00

Encryption methods are mainly used in computer networks to improve the .

989
Select one:
a. Reliability

b. security 

c. Performance

d. Longevity

Your answer is correct.

The correct answer is: security

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41963&cmid=2384 2/3
2/4/22, 10:35 PM Post Quiz: Attempt review

Question 5
Correct

Mark 1.00 out of 1.00

What of the following concerns the principle violation when a computer is no longer accessible?

Select one:
a. Confidentiality

b. availability 

c. Access control

d. All of the options

Your answer is correct.


989
The correct answer is: availability

◄ Infrastructure Security Overview

Jump to...

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=41963&cmid=2384 3/3
2/4/22, 11:37 PM Pre Quiz: Attempt review

 Dashboard / Digital Identity Fundamentals / DIGITAL IDENTITY FUNDAMENTALS / Pre Quiz

Started on Friday, 4 February 2022, 11:34 PM


State Finished
Completed on Friday, 4 February 2022, 11:34 PM
Time taken 58 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

_________ are fundamental human rights in the digital environment.

Select one:
a. Digital rights 
b. Consent policy
c. GDPR
d. CCPA

The correct answer is: Digital rights


989

Question 2
Correct

Mark 1.00 out of 1.00

_________ is about privacy, rights and people and, us, about data which are personal.

Select one:
a. GDPR 989 
b. Consent policy
c. CMP
d. CCPA

The correct answer is: GDPR

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 1/5
2/4/22, 11:37 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which of the following Digital Identity verifies liveliness using periodic reminders to close ditial accounts once a person passes
away?

Select one:
a. Device Digital Identity
b. Biometric Digital Identity
c. Human Digital Identity 
d. Application Digital Identity

The correct answer is: Human Digital Identity


989

Question 4
Correct

Mark 1.00 out of 1.00

7) In which of the following authentication of identities, attacker uses a small list of commonly-used passwords that match the
complexity policy of domain?

Select one: 989


a. Attack on Identities
b. Attack on passwords 
c. Attack on data
d. Identity theft

The correct answer is: Attack on passwords

Question 5
989
Correct

Mark 1.00 out of 1.00

A digital identity is a form of identification that can be authenticated remotely over digital channels

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 2/5
2/4/22, 11:37 PM Pre Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

An identity management system that collects and stores a person’s single fingerprint can be more invasive than a system that
stores a person’s entire credit history.

Select one:
True 

False

The correct answer is 'True'.

989
Question 7
Correct

Mark 1.00 out of 1.00

Personal data should be collected with individual’s knowledge or consent.

Select one:
True 

False
989

The correct answer is 'True'.

Question 8
Incorrect

Mark 0.00 out of 1.00

989
A small amount of identity information which is not properly secured might put an individual’s privacy at less risk than a large
amount of information that is properly secured and accessed only by authorized parties.

Select one:
True 

False

The correct answer is 'False'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 3/5
2/4/22, 11:37 PM Pre Quiz: Attempt review

Question 9
Incorrect

Mark 0.00 out of 1.00

Whenever the users use a new cloud service, they have to establish their identity

Select one:
True

False 

The correct answer is 'True'.

Question 10 989
Correct

Mark 1.00 out of 1.00

In future single Digital ID might be able to do the job of identification in different contexts

Select one:
True 

False

989

The correct answer is 'True'.

◄ Introduction to Digital Identity Fundamentals Intro Video

Jump to...

DIGITAL IDENTITY FUNDAMENTALS ►

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 4/5
2/4/22, 11:37 PM Pre Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42225&cmid=2723 5/5
2/4/22, 11:37 PM Post Quiz: Attempt review

 Dashboard / Digital Identity Fundamentals / DIGITAL IDENTITY FUNDAMENTALS / Post Quiz

Started on Friday, 4 February 2022, 11:35 PM


State Finished
Completed on Friday, 4 February 2022, 11:39 PM
Time taken 4 mins 33 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

___________ is an authentication method that requires two or more independent ways to identify a user.

Select one:
a. Certificate-based authentication
b. Token-based authentication
c. Biometric –based authentication
d. Multi-factor authentication 

The correct answer is: Multi-factor authentication


989

Question 2
Correct

Mark 1.00 out of 1.00

_________ is particularly related to the protection and realization of existing rights in the context of digital technologies.

Select one:
a. GDPR 989

b. Consent Policy
c. Digital Rights 
d. CCPA

The correct answer is: Digital Rights

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 1/5
2/4/22, 11:37 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Strong authentication strongly verifies ownership of the account but says nothing about the data it contains .

Select one:
True 

False

The correct answer is 'True'.

Question 4 989

Correct

Mark 1.00 out of 1.00

General Data Protection Regulation (GDPR) and CCPA are the major data private policies followed by companies worldwide

Select one:
True 

False

989

The correct answer is 'True'.

Question 5
Correct

Mark 1.00 out of 1.00

____________ looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate
989
target.

Select one:
a. Eco system
b. Single Sign On
c. Honey pot 
d. Content Management Platform

The correct answer is: Honey pot

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 2/5
2/4/22, 11:37 PM Post Quiz: Attempt review

Question 6
Incorrect

Mark 0.00 out of 1.00

Which of the following are critical to the resilience to the Digital ID Systems?

Select one or more:


a. Digital adversaries 
b. Decentralized attribute stores
c. Universal Deployment of encryption
d. Disaggregated data sets 

The correct answers are: Universal Deployment of encryption, Disaggregated data sets, Decentralized attribute stores

989

Question 7
Correct

Mark 1.00 out of 1.00

Which of the following uses one set of login credentials to access multiple applications?

Select one:
a. Social Identity
b. Real Identity 989

c. Personal Identity
d. Single Sign on 

The correct answer is: Single Sign on

Question 8
Correct
989
Mark 1.00 out of 1.00

Which of the following uses information from social networking sites to facilitate logins on third-party applications?

Select one:
a. Identity Provider
b. Social login 
c. Personal data identifier
d. Single Sign on

The correct answer is: Social login

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 3/5
2/4/22, 11:37 PM Post Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

__________ is a platform or a tool to take consent from the visitor to use his/her digital identity for marketing efforts.

Select one:
a. CCPA
b. CMP 
c. CMD
d. GDPR

The correct answer is: CMP

989

Question 10
Correct

Mark 1.00 out of 1.00

Which of the following protects personal data regardless of the technology used for processing that data?

Select one:
a. Digital Rights
b. CCPA 989

c. Consent policy
d. GDPR 

The correct answer is: GDPR

◄ The Age of Digital Identity -Reference Video

Jump to...
989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 4/5
2/4/22, 11:37 PM Post Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 5/5
2/4/22, 11:37 PM Post Quiz: Attempt review

 Dashboard / Digital Identity Fundamentals / DIGITAL IDENTITY FUNDAMENTALS / Post Quiz

Started on Friday, 4 February 2022, 11:35 PM


State Finished
Completed on Friday, 4 February 2022, 11:39 PM
Time taken 4 mins 33 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

___________ is an authentication method that requires two or more independent ways to identify a user.

Select one:
a. Certificate-based authentication
b. Token-based authentication
c. Biometric –based authentication
d. Multi-factor authentication 

The correct answer is: Multi-factor authentication


989

Question 2
Correct

Mark 1.00 out of 1.00

_________ is particularly related to the protection and realization of existing rights in the context of digital technologies.

Select one:
a. GDPR 989

b. Consent Policy
c. Digital Rights 
d. CCPA

The correct answer is: Digital Rights

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 1/5
2/4/22, 11:37 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Strong authentication strongly verifies ownership of the account but says nothing about the data it contains .

Select one:
True 

False

The correct answer is 'True'.

Question 4 989

Correct

Mark 1.00 out of 1.00

General Data Protection Regulation (GDPR) and CCPA are the major data private policies followed by companies worldwide

Select one:
True 

False

989

The correct answer is 'True'.

Question 5
Correct

Mark 1.00 out of 1.00

____________ looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate
989
target.

Select one:
a. Eco system
b. Single Sign On
c. Honey pot 
d. Content Management Platform

The correct answer is: Honey pot

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 2/5
2/4/22, 11:37 PM Post Quiz: Attempt review

Question 6
Incorrect

Mark 0.00 out of 1.00

Which of the following are critical to the resilience to the Digital ID Systems?

Select one or more:


a. Digital adversaries 
b. Decentralized attribute stores
c. Universal Deployment of encryption
d. Disaggregated data sets 

The correct answers are: Universal Deployment of encryption, Disaggregated data sets, Decentralized attribute stores

989

Question 7
Correct

Mark 1.00 out of 1.00

Which of the following uses one set of login credentials to access multiple applications?

Select one:
a. Social Identity
b. Real Identity 989

c. Personal Identity
d. Single Sign on 

The correct answer is: Single Sign on

Question 8
Correct
989
Mark 1.00 out of 1.00

Which of the following uses information from social networking sites to facilitate logins on third-party applications?

Select one:
a. Identity Provider
b. Social login 
c. Personal data identifier
d. Single Sign on

The correct answer is: Social login

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 3/5
2/4/22, 11:37 PM Post Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

__________ is a platform or a tool to take consent from the visitor to use his/her digital identity for marketing efforts.

Select one:
a. CCPA
b. CMP 
c. CMD
d. GDPR

The correct answer is: CMP

989

Question 10
Correct

Mark 1.00 out of 1.00

Which of the following protects personal data regardless of the technology used for processing that data?

Select one:
a. Digital Rights
b. CCPA 989

c. Consent policy
d. GDPR 

The correct answer is: GDPR

◄ The Age of Digital Identity -Reference Video

Jump to...
989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 4/5
2/4/22, 11:37 PM Post Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42229&cmid=2725 5/5
2/4/22, 10:56 PM Pre Quiz: Attempt review

 Dashboard / Cybersecurity Fundamentals / Introduction to Information Security / Pre Quiz

Started on Friday, 4 February 2022, 10:49 PM


State Finished
Completed on Friday, 4 February 2022, 10:54 PM
Time taken 4 mins 38 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

The Acronym DES stands for

Select one:
a. Double Encryption Standard
b. Digital Encryption System
c. Digital Evaluation System
d. Digital Encryption Standard 

The correct answer is: Digital Encryption Standard


989

Question 2
Correct

Mark 1.00 out of 1.00

Which of the following is an example of a computer threat?

Select one:
a. Soliciting 989

b. Phishing
c. Virus
d. DOS Attacks 

The correct answer is: DOS Attacks

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 1/5
2/4/22, 10:56 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which of the following are examples of spam's indirect effects?

Select one:
a. Loss of reputation 
b. Malicious payload
c. Fraud
d. Increased communication costs

The correct answer is: Loss of reputation

989

Question 4
Correct

Mark 1.00 out of 1.00

For these purpose, the Secure Electronic Transaction protocol is used.

Select one:
a. credit card payment 
b. electronic cash payments 989
c. cheque payment
d. cash

The correct answer is: credit card payment

Question 5
Incorrect
989
Mark 0.00 out of 1.00

What are TLS and SSL ?

Select one:
a. Internet Proctocols
b. Internet Layers
c. Cryptographic Protocols
d. Network Layers 

The correct answer is: Cryptographic Protocols

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 2/5
2/4/22, 10:56 PM Pre Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

In PKI, which key is used to decode the message?

Select one:
a. Hybrid Key.
b. Public Key.
c. Private Key. 
d. Pre-shared Secret Key.

The correct answer is: Private Key.

989

Question 7
Correct

Mark 1.00 out of 1.00

Which of the following is the Hashing Algorithm?

Select one:
a. MD5 
b. DES 989

c. AES
d. PGP

The correct answer is: MD5

Question 8
Correct
989
Mark 1.00 out of 1.00

Which of the following rules are broken if a computer system is not accessible?

Select one:
a. Availability 
b. Access Control
c. Confidentiality
d. Authentication

The correct answer is: Availability

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 3/5
2/4/22, 10:56 PM Pre Quiz: Attempt review

Question 9
Incorrect

Mark 0.00 out of 1.00

Which of the following are examples of security and privacy risks in the real world?

Select one:
a. SPAM
b. Worm
c. Hackers
d. Virus 

The correct answer is: SPAM

989

Question 10
Correct

Mark 1.00 out of 1.00

For internet-based secure EDI (Electronic Data Interchange) transmission

Select one:
True 
989
False

The correct answer is 'True'.

◄ Cyber Security Fundamentals Intro Video

Jump to...

Introduction to Information Security ►


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 4/5
2/4/22, 10:56 PM Pre Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42025&cmid=2479 5/5
2/4/22, 10:56 PM Post Quiz: Attempt review

 Dashboard / Cybersecurity Fundamentals / Cloud Security / Post Quiz

Started on Friday, 4 February 2022, 10:55 PM


State Finished
Completed on Friday, 4 February 2022, 10:58 PM
Time taken 2 mins 57 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

If you would like to secure a message, use

Select one:
a. Decryption
b. Key
c. password
d. Cryptosystem 

The correct answer is: Cryptosystem


989

Question 2
Correct

Mark 1.00 out of 1.00

The certificate Authority signs the digital certificate with

Select one:
a. User's Private Key 989

b. User's public key


c. It's own private key 
d. It's own public key

The correct answer is: It's own private key

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 1/5
2/4/22, 10:56 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

What does WEP stands for ?

Select one:
a. Wired Equivalent Privacy 
b. Wifi Enabled Password
c. Wifi Encrypted Protection
d. Wired Encrypted Protection

The correct answer is: Wired Equivalent Privacy

989

Question 4
Correct

Mark 1.00 out of 1.00

What is Phishing

Select one:
a. A password building technique
b. An anti-spam technique 989
c. An encryption technique
d. Fradulently acquiring sensitive information 

The correct answer is: Fradulently acquiring sensitive information

Question 5
Correct
989
Mark 1.00 out of 1.00

Which server is used to create a secure tunnel connection.?

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 2/5
2/4/22, 10:56 PM Post Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

Unsolicited commercial email is known as ____________.

Select one:
a. Malware
b. Virus
c. JUNK
d. SPAM 

The correct answer is: SPAM

989

Question 7
Correct

Mark 1.00 out of 1.00

Which of the following is digital certificate standard?

Select one:
a. x.500
b. x.100 989

c. x.509 
d. x.25

The correct answer is: x.509

Question 8
Correct
989
Mark 1.00 out of 1.00

Any of the techniques which is used to ensure the message's integrity?

Select one:
a. Cipher Text
b. Message Digest 
c. Digital signature
d. Protocol

The correct answer is: Message Digest

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 3/5
2/4/22, 10:56 PM Post Quiz: Attempt review

Question 9
Incorrect

Mark 0.00 out of 1.00

Only approved users are given access to information, according to the word used in computer security is

Select one:
a. Responsibility
b. Authentication 
c. Integrity
d. Availability

The correct answer is: Availability

989

Question 10
Correct

Mark 1.00 out of 1.00

Which of the following better identifies programmes that can travel from system to system and cause computer interaction to
be disrupted?

Select one:
a. Worm 989 
b. Malware
c. Virus
d. Firmware

The correct answer is: Worm

◄ Cloud Security
989
Jump to...

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 4/5
2/4/22, 10:56 PM Post Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 5/5
2/4/22, 11:12 PM Pre Quiz: Attempt review

 Dashboard / Cloud & Cloud Security Fundamentals / Unit 1 / Pre Quiz

Started on Friday, 4 February 2022, 11:05 PM


State Finished
Completed on Friday, 4 February 2022, 11:10 PM
Time taken 5 mins 4 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Which of the following service provider provides the least amount of built in security.

Select one:
a. Bpaas
b. PaaS
c. SaaS
d. IaaS 

The correct answer is: IaaS


989

Question 2
Correct

Mark 1.00 out of 1.00

A technique that permits many Operating systems to run on a single hardware at the same time, where the hardware is
virtualized

Select one: 989


a. Hypervisor 
b. Client
c. Server
d. Cloud

The correct answer is: Hypervisor

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 1/5
2/4/22, 11:12 PM Pre Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Find the malicious code that enters the system via a easily distributed game that is purposely installed and played?

Select one:
a. It can enter a system by means of a Trojan horse 
b. It can enter a system by means of a logic bomb.
c. It can enter a system by means of an e-mail attachment
d. It can enter a system by means of a worm.

The correct answer is: It can enter a system by means of a Trojan horse

989

Question 4
Correct

Mark 1.00 out of 1.00

The abundant of complex documents that can lead companies through the procedure of planning a

Select one:
a. Datacenter(Secured) 
b. Internal Storage 989

c. External Storage
d. None

The correct answer is: Datacenter(Secured)

Question 5
Correct
989
Mark 1.00 out of 1.00

How do users access Software as a Service cloud services?

Select one:
a. Thinclient
b. Server
c. Commandline
d. Web browser 

The correct answer is: Web browser

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 2/5
2/4/22, 11:12 PM Pre Quiz: Attempt review

Question 6
Incorrect

Mark 0.00 out of 1.00

The organization requires a strictly secure environment, public cloud might not be appropriate

Select one:
a. Small organizations
b. Enterprise Networks 
c. None
d. Banking enterprise

The correct answer is: Banking enterprise

989

Question 7
Correct

Mark 1.00 out of 1.00

Data center clouds are formed by joining two or more data center cloud networks over wide area network. When building such
data center clouds, which component is mainly responsible for increasing the network latency?

Select one:
a. network routing protocols 989
b. network servers
c. network interfaces 
d. network clients

The correct answer is: network interfaces

Question 8
Correct 989

Mark 1.00 out of 1.00

If a computer program is executed by unauthorized user then the user may source severe damage to computer or information
available in it. So a computer system must be secured against unauthorized access, Security can be provided by

Select one:
a. Key
b. None
c. Lock
d. Authentication 

The correct answer is: Authentication

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 3/5
2/4/22, 11:12 PM Pre Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

The primary anxiety for IT professionals when it comes to cloud computing.

Select one:
a. File Security
b. Data Security 
c. Folder Security
d. None

The correct answer is: Data Security

989

Question 10
Correct

Mark 1.00 out of 1.00

Many network applications and protocols have security problems that are fixed over time by using devices like…

Select one:
True 
989
False

The correct answer is 'True'.

◄ Cloud and Cloud Security Fundamentals Intro video

Jump to...

Cloud & Cloud Security Fundamentals ►


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 4/5
2/4/22, 11:12 PM Pre Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42086&cmid=2703 5/5
2/4/22, 11:11 PM Post Quiz: Attempt review

 Dashboard / Cloud & Cloud Security Fundamentals / Unit 5 / Post Quiz

Started on Friday, 4 February 2022, 11:10 PM


State Finished
Completed on Friday, 4 February 2022, 11:14 PM
Time taken 3 mins 49 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00

Question 1
Incorrect

Mark 0.00 out of 1.00


989

A distinctive keyword is required every time user attempts to login into the system

Select one:
a. Passkey 
b. Key
c. One time password
d. None

The correct answer is: One time password


989

Question 2
Correct

Mark 1.00 out of 1.00

________ has many of the characteristics of what is now being called cloud computing.

Select one:
a. Internet 989 
b. Webservice
c. Software
d. None

The correct answer is: Internet

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 1/5
2/4/22, 11:11 PM Post Quiz: Attempt review

Question 3
Incorrect

Mark 0.00 out of 1.00

___________ Encryption is used to provide confidentiality of the message.

Select one:
a. Both 
b. Symmetric
c. Asymmetric
d. None

The correct answer is: Symmetric

989

Question 4
Correct

Mark 1.00 out of 1.00

Make a network service unusable, usually by overloading the server or networks is

Select one:
a. Antivirus
b. Attacks 989

c. Denial of Service 
d. NAT

The correct answer is: Denial of Service

Question 5
Correct
989
Mark 1.00 out of 1.00

Policies and procedures are developed based on ________

Select one:
a. Compliance
b. Risk analysis 
c. Governance

The correct answer is: Risk analysis

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 2/5
2/4/22, 11:11 PM Post Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

The absence or weakness in a system that may possibly be exploited is called a ?

Select one:
a. Virus
b. Threat
c. Worm
d. Vulnerability 

The correct answer is: Vulnerability

989

Question 7
Correct

Mark 1.00 out of 1.00

Which of the following is related to service provided by Cloud Technologies?

Select one:
a. Management
b. Sourcing 989 
c. Ownership
d. Reliability

The correct answer is: Sourcing

Question 8
Correct
989
Mark 1.00 out of 1.00

PGP is a method for providing secure email transmission.

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 3/5
2/4/22, 11:11 PM Post Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

Encrypting plaintext results in unreadable language is called _

Select one:
a. Plaintect
b. None
c. Cleartext
d. Cipher text 

The correct answer is: Cipher text

989

Question 10
Correct

Mark 1.00 out of 1.00

What is the benefit of using automation techniques in conjunction with cloud computing?

Select one:
a. Automation reduces human errors. 
b. None 989

c. Automation reduces costs by increasing asset utilization


d. Automation allows for sharing of computer resources

The correct answer is: Automation reduces human errors.

◄ Digital Signatures and Digital Certificates

Jump to...
989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 4/5
2/4/22, 11:11 PM Post Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42117&cmid=2709#question-42183-9 5/5
2/4/22, 10:56 PM Post Quiz: Attempt review

 Dashboard / Cybersecurity Fundamentals / Cloud Security / Post Quiz

Started on Friday, 4 February 2022, 10:55 PM


State Finished
Completed on Friday, 4 February 2022, 10:58 PM
Time taken 2 mins 57 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

If you would like to secure a message, use

Select one:
a. Decryption
b. Key
c. password
d. Cryptosystem 

The correct answer is: Cryptosystem


989

Question 2
Correct

Mark 1.00 out of 1.00

The certificate Authority signs the digital certificate with

Select one:
a. User's Private Key 989

b. User's public key


c. It's own private key 
d. It's own public key

The correct answer is: It's own private key

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 1/5
2/4/22, 10:56 PM Post Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

What does WEP stands for ?

Select one:
a. Wired Equivalent Privacy 
b. Wifi Enabled Password
c. Wifi Encrypted Protection
d. Wired Encrypted Protection

The correct answer is: Wired Equivalent Privacy

989

Question 4
Correct

Mark 1.00 out of 1.00

What is Phishing

Select one:
a. A password building technique
b. An anti-spam technique 989
c. An encryption technique
d. Fradulently acquiring sensitive information 

The correct answer is: Fradulently acquiring sensitive information

Question 5
Correct
989
Mark 1.00 out of 1.00

Which server is used to create a secure tunnel connection.?

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 2/5
2/4/22, 10:56 PM Post Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

Unsolicited commercial email is known as ____________.

Select one:
a. Malware
b. Virus
c. JUNK
d. SPAM 

The correct answer is: SPAM

989

Question 7
Correct

Mark 1.00 out of 1.00

Which of the following is digital certificate standard?

Select one:
a. x.500
b. x.100 989

c. x.509 
d. x.25

The correct answer is: x.509

Question 8
Correct
989
Mark 1.00 out of 1.00

Any of the techniques which is used to ensure the message's integrity?

Select one:
a. Cipher Text
b. Message Digest 
c. Digital signature
d. Protocol

The correct answer is: Message Digest

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 3/5
2/4/22, 10:56 PM Post Quiz: Attempt review

Question 9
Incorrect

Mark 0.00 out of 1.00

Only approved users are given access to information, according to the word used in computer security is

Select one:
a. Responsibility
b. Authentication 
c. Integrity
d. Availability

The correct answer is: Availability

989

Question 10
Correct

Mark 1.00 out of 1.00

Which of the following better identifies programmes that can travel from system to system and cause computer interaction to
be disrupted?

Select one:
a. Worm 989 
b. Malware
c. Virus
d. Firmware

The correct answer is: Worm

◄ Cloud Security
989
Jump to...

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 4/5
2/4/22, 10:56 PM Post Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42051&cmid=2485 5/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review

 Dashboard / Application Security Fundamentals / Introduction to Application Security Fundamentals. / Pre-Quiz

Started on Friday, 4 February 2022, 11:53 PM


State Finished
Completed on Friday, 4 February 2022, 11:58 PM
Time taken 5 mins 11 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Audit log is the document that records information about the resources accessed.

Select one:
True 

False

The correct answer is 'True'.

989
Question 2
Correct

Mark 1.00 out of 1.00

Users can guard against CSRF vulnerabilities by clearing browser cookies periodically.

Select one:
True 

False
989

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 1/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

__________ is a cyber-attack that involves executing arbitrary commands on a host operating system.

Select one:
a. SQL Injection
b. Cross Site Scripting
c. LDAP Injection
d. Command Injection 

The correct answer is: Command Injection

989

Question 4
Correct

Mark 1.00 out of 1.00

When using the file system, it is preferable to use a separate partition to record event data than those used by the operating
system.

Select one:
True  989

False

The correct answer is 'True'.

Question 5
Correct

Mark 1.00 out of 1.00


989

__________ occurs when the volume of data exceeds the storage capacity of the memory buffer.

Select one:
a. Cross Site Request Forgery
b. SQL injection
c. Log Injection
d. Buffer Overflow 

The correct answer is: Buffer Overflow

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 2/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

Which of the following Java Security Tools creates and manages key stores?

Select one:
a. jar tool
b. keytool 
c. keystore
d. jarsigner

The correct answer is: keytool

989

Question 7
Correct

Mark 1.00 out of 1.00

Code Access Security restricts what a component is allowed to it , regardless of the logged-in user or security principle.

Select one:
True 
989
False

The correct answer is 'True'.

Question 8
Correct

Mark 1.00 out of 1.00

989

XML External Entities attack occurs, when XML input containing a reference to an external entity is processed by a weakly
configured XML parser.

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 3/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

Which of the following vulnerabilities enable attackers to inject malicious client-side scripts into the application?

Select one:
a. Cross-site scripting 
b. XML External Entities
c. Broken Access Control
d. Cross site Request Forgery

The correct answer is: Cross-site scripting

989

Question 10
Correct

Mark 1.00 out of 1.00

As per the ASP.Net Security Guidelines, Audit trails or logging is not important.

Select one:
True
989
False 

The correct answer is 'False'.

◄ Discussion Forum

Jump to...

Application Security Intro video ►


989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 4/5
2/7/22, 8:12 PM Pre-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42281&cmid=2795 5/5
2/7/22, 8:12 PM Post-Quiz: Attempt review

 Dashboard / Application Security Fundamentals / Software_Security Part 2 / Post-Quiz

Started on Friday, 4 February 2022, 11:58 PM


State Finished
Completed on Saturday, 5 February 2022, 12:02 AM
Time taken 4 mins 7 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00


989

Which of the following Command Injection methods occur against applications that parse user-controlled XML input using a
weakly configured XML parser?

Select one:
a. Arbitrary file uploads
b. Arbitrary command injection
c. XML external entity injection (XXE) 
d. Insecure serialization

989
The correct answer is: XML external entity injection (XXE)

Question 2
Incorrect

Mark 0.00 out of 1.00

Which of the following authentications in .Net is a single sign-on authentication?

Select one: 989


a. Window based authentication
b. SAML
c. JWT 
d. Multipass

The correct answer is: Multipass

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 1/5
2/7/22, 8:12 PM Post-Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

In which of the following attack types, the client would receive the message twice?

Select one:
a. HTTP Response splitting
b. Session Replay 
c. Cross site Request Forgery
d. Session Hijacking

The correct answer is: Session Replay

989

Question 4
Correct

Mark 1.00 out of 1.00

________ refers to SSL-related services in Java.

Select one:
a. JCE
b. JSSE 989 
c. JAAS
d. JMS

The correct answer is: JSSE

Question 5
Correct
989
Mark 1.00 out of 1.00

XSS Vulnerabilities occur if the output to the browser is not HTML encoded.

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 2/5
2/7/22, 8:12 PM Post-Quiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

In which of the following Authentications in .Net, there is no need to retype sign-in name and password when moving from site
to site?

Select one:
a. Form Authentication
b. Window Authentication
c. Custom Authentication
d. Passport Authentication 

The correct answer is: Passport Authentication


989

Question 7
Correct

Mark 1.00 out of 1.00

An application-layer attack targets computers by deliberately causing a fault in a computer’s operating system or applications.

Select one:
True  989

False

The correct answer is 'True'.

Question 8
Correct

Mark 1.00 out of 1.00


989

Which of the following attack types tests multiple passwords from a dictionary or other source against a single account?

Select one:
a. Password spraying
b. Brute Force 
c. Man-in-the-browser attack
d. Credential stuffing

The correct answer is: Brute Force

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 3/5
2/7/22, 8:12 PM Post-Quiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

Which of the following uses Trojan Horse to intercept and manipulate calls between the browser and its security mechanisms?

Select one:
a. Session Sniffing
b. Predictable session token
c. Man-in-the-browser attack 
d. Man-in-the-middle attack

The correct answer is: Man-in-the-browser attack

989

Question 10
Correct

Mark 1.00 out of 1.00

LDAP is based on client/server model.

Select one:
True 
989
False

The correct answer is 'True'.

◄ Software Security part 2

Jump to...

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 4/5
2/7/22, 8:12 PM Post-Quiz: Attempt review

989

989

989

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=42297&cmid=2810 5/5
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / Monitoring, managing, and recovering AD DS / Monitoring, managing, and PreQuiz

Started on Wednesday, 2 February 2022, 5:59 PM


State Finished
Completed on Thursday, 3 February 2022, 9:41 AM
Time taken 15 hours 42 mins
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Application logs can be seen from performance monitor

Select one:
True
1133
False 

The correct answer is 'False'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
Application warning information is stored in the log files

Select one:
True 

False

The correct answer is 'True'.

Question 3
Correct

Mark 1.00 out of 1.00 1133


What informations are stored in the log files?

performance details
errors 
system information
system check

The correct answer is: errors

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 1/2
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which tool is used to view the log information in the system?

disk manager
device manager
performance monitor
event viewer 

The correct answer is: event viewer

Question 5
Correct

1133
Mark 1.00 out of 1.00

Logon /Logoff events can be logged by default in windows server operating system

Select one:
True 

False

The correct answer is 'True'.

1133
◄ Securing Active Directory Domain services Quiz

Jump to...

Monitoring, managing, and recovering AD DS ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 2/2
2/3/22, 11:02 AM Managing user settings with Quiz: Attempt review

 Dashboard / Windows Server 2016 / OU and Policies / Managing user settings with Quiz

Started on Wednesday, 2 February 2022, 11:06 AM


State Finished
Completed on Wednesday, 2 February 2022, 3:50 PM
Time taken 4 hours 43 mins
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Where is the .adm and .admx files stored in active directory environment?

Select one:
a. systemvolume
1133
b. sysvol 

c. ntds

d. poledit

Your answer is correct.

The correct answer is: sysvol

Question 2
Correct
1133
Mark 1.00 out of 1.00

Control panel is one of the settings available in Administrative templates in user configuration section of Group policy

Select one:
True 

False

The correct answer is 'True'.


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25228&cmid=2547 1/3
2/3/22, 11:02 AM Managing user settings with Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

What is the extension of the group policy file?

Select one:
a. adms

b. admz

c. admv

d. adm 

Your answer is correct.

The correct answer is: adm

Question 4
Correct
1133
Mark 1.00 out of 1.00

__________ enables you to redirect the location of specific folders within user profiles to a new location, such as a shared network
location

Select one:
a. Folder Redirection 

b. gpedit.msc

c. mapping files

d. Folder
1133
Your answer is correct.
The correct answer is: Folder Redirection

Question 5
Correct

Mark 1.00 out of 1.00

1133
.admx files are available for both Microsoft and third-party applications

Select one:
True 

False

The correct answer is 'True'.

◄ Admin OU Policy

Jump to...

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25228&cmid=2547 2/3
2/3/22, 11:02 AM Managing user settings with Quiz: Attempt review

Configure local storage Quiz ►

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25228&cmid=2547 3/3
2/3/22, 11:02 AM Managing object in ADDS Quiz: Attempt review

 Dashboard / Windows Server 2016 / AD User and Group management / Managing object in ADDS Quiz

Started on Wednesday, 2 February 2022, 11:26 AM


State Finished
Completed on Wednesday, 2 February 2022, 11:29 AM
Time taken 3 mins 14 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Which user is created as built-in user in Windows server 2016 operating system?

Select one:
a. administrator
1133 

b. admin

c. Leo

d. ramesh

Your answer is correct.

The correct answer is: administrator

Question 2
Correct
1133
Mark 1.00 out of 1.00

_________ group members can share resources and create user and group accounts

Select one:
a. account operators 

b. guests

c. administrators

d. administrator
1133
Your answer is correct.

The correct answer is: account operators

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25361&cmid=2536 1/3
2/3/22, 11:02 AM Managing object in ADDS Quiz: Attempt review

Question 3
Incorrect

Mark 0.00 out of 1.00

Where will you restrict the logon timings for the domain users?

Select one:
a. Login Hours 

b. Logon Hours

c. account timing

d. Log Hours

Your answer is incorrect.


The correct answer is: Logon Hours

Question 4
Correct 1133
Mark 1.00 out of 1.00

Which group type allows to assigning the same security permissions for shared resources to users?

Select one:
a. distribution group

b. universal group

c. global group

1133
d. security group 

Your answer is correct.

The correct answer is: security group

Question 5
Correct

Mark 1.00 out of 1.00

1133
Domain users are created in the domain controller

Select one:
True 

False

The correct answer is 'True'.

◄ Group Creation and moving Users

Jump to...

Implementing Group Policy Quiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25361&cmid=2536 2/3
2/3/22, 11:02 AM Managing object in ADDS Quiz: Attempt review

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25361&cmid=2536 3/3
2/3/22, 11:02 AM Managing object in ADDS PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / AD User and Group management / Managing object in ADDS PreQuiz

Started on Tuesday, 1 February 2022, 6:39 PM


State Finished
Completed on Tuesday, 1 February 2022, 6:40 PM
Time taken 1 min 33 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

which group is available by default in a standalone windows server?

guests
guest
1133 

admin
user

The correct answer is: guests

Question 2
Correct

1133
Mark 1.00 out of 1.00

We can able to disable the user during the user creation?

Select one:
True 

False

The correct answer is 'True'.

Question 3
Correct
1133
Mark 1.00 out of 1.00

Can we allocate the specific timing for the users to logon in the non-active directory environment?

Select one:
True

False 

The correct answer is 'False'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23934&cmid=3910 1/2
2/3/22, 11:02 AM Managing object in ADDS PreQuiz: Attempt review

Question 4
Incorrect

Mark 0.00 out of 1.00

Which user account is disabled once the windows server operting system is installed?

guests 
user1
admin
guest

The correct answer is: guest

Question 5
Correct

1133
Mark 1.00 out of 1.00

Before configuring the active directory, in which group the user belong to?

user
administrator
guest
users 

The correct answer is: users

1133
◄ ADC Quiz

Jump to...

Managing objects in AD DS ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23934&cmid=3910 2/2
2/3/22, 11:03 AM Implementing Storage Spaces and Data Deduplication Quiz: Attempt review

 Dashboard / Windows Server 2016 / Disk Management / Implementing Storage Spaces and Data Deduplication Quiz

Started on Wednesday, 2 February 2022, 3:55 PM


State Finished
Completed on Wednesday, 2 February 2022, 3:57 PM
Time taken 1 min 34 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

What type of volumes can be configured in storage spaces?

Select one:
a. basic
1133
b. primary

c. RAID

d. mirror 

Your answer is correct.

The correct answer is: mirror

Question 2
Correct
1133
Mark 1.00 out of 1.00

How will you manage the storage spaces ?

Select one:
a. All options are correct

b. Administrative Tools

c. server manager 

d. Admin tools
1133
Your answer is correct.

The correct answer is: server manager

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26995&cmid=2564 1/3
2/3/22, 11:03 AM Implementing Storage Spaces and Data Deduplication Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Where will you configure storage pool in windows server operating system?

Select one:
a. storage area network

b. network attached storage

c. Directly attached storage

d. Server Manager 

Your answer is correct.


The correct answer is: Server Manager

Question 4
Correct 1133
Mark 1.00 out of 1.00

Storage spaces can be used in windows pc.

Select one:
True 

False

The correct answer is 'True'.


1133
Question 5
Correct

Mark 1.00 out of 1.00

Virtual disk is a single or set of files that acts as a physical disk.

Select one:
True 

1133
False

The correct answer is 'True'.

◄ Implementing Storage Spaces Code Demo

Jump to...

Configure access to resource PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26995&cmid=2564 2/3
2/3/22, 11:03 AM Implementing Storage Spaces and Data Deduplication Quiz: Attempt review

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26995&cmid=2564 3/3
2/3/22, 11:02 AM Implementing Group Policy Quiz: Attempt review

 Dashboard / Windows Server 2016 / OU and Policies / Implementing Group Policy Quiz

Started on Wednesday, 2 February 2022, 11:09 AM


State Finished
Completed on Wednesday, 2 February 2022, 3:48 PM
Time taken 4 hours 39 mins
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

GPOs are processed on client computers within the following order

Select one:
a. OUSDL
1133
b. SOUDL

c. SDOUL

d. LSDOU 

Your answer is correct.

The correct answer is: LSDOU

Question 2
Correct
1133
Mark 1.00 out of 1.00

Policy settings in the User Configuration node apply at sign-in and every 90–120 minutes

Select one:
True 

False

The correct answer is 'True'.


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25250&cmid=2541 1/3
2/3/22, 11:02 AM Implementing Group Policy Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Administrators can configure the Group Policies to users and computers located in a particular OU or the entire domain, from a
centralized location.

Select one:
True 

False

The correct answer is 'True'.

Question 4
Correct

Mark 1.00 out of 1.00

1133
What is the command used to refresh the group policy configuration?

Select one:
a. gpupdate 

b. all options will work

c. gpedit.msc

d. gpupdate.msc

1133
Your answer is correct.
The correct answer is: gpupdate

Question 5
Correct

Mark 1.00 out of 1.00

_______is that the collection of users and computers which will apply the settings

Select one:
a. GPMC

b. GPO

c. GPCM
1133 

d. GOP

Your answer is correct.


The correct answer is: GPO

◄ Managing object in ADDS Quiz

Jump to...

Implementing Group Policy ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25250&cmid=2541 2/3
2/3/22, 11:02 AM Implementing Group Policy Quiz: Attempt review

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=25250&cmid=2541 3/3
2/3/22, 11:01 AM Implementing DNS Quiz: Attempt review

 Dashboard / Windows Server 2016 / DNS / Implementing DNS Quiz

Started on Tuesday, 1 February 2022, 5:26 PM


State Finished
Completed on Tuesday, 1 February 2022, 5:27 PM
Time taken 1 min 18 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Domain Name Server is used to resolve the hostname into the IP address?

Select one:
True 
1133
False

The correct answer is 'True'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
What is the maximum length of characters allowed in Domain Name Server?

Select one:
a. 255 

b. 128

c. 256

d. 64

Your answer is correct.

The correct answer is: 255


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23816&cmid=2525 1/3
2/3/22, 11:01 AM Implementing DNS Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

The top level domain in the domain name server is _________?

Select one:
a. subdomain

b. root

c. All options are correct

d. .com 

Your answer is correct.

The correct answer is: .com

Question 4
Correct 1133
Mark 1.00 out of 1.00

Which Zone is the read-only copy of the DNS zone in the Domain Name Server?

Select one:
a. forward lookup

b. Secondary 

c. stub

1133
d. Primary

Your answer is correct.

The correct answer is: Secondary

Question 5
Correct

Mark 1.00 out of 1.00

1133
What is the name of the file used to resolve the names in each and every computer system?

Select one:
a. hosts 

b. host

c. lmhost

d. lmhosts

Your answer is correct.

The correct answer is: hosts

◄ DNS Record Creation

Jump to
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23816&cmid=2525 2/3
2/3/22, 11:01 AM Implementing DNS Quiz: Attempt review
Jump to...

ADC PreQuiz ►

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23816&cmid=2525 3/3
2/3/22, 11:00 AM Implementing DNS PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / DNS / Implementing DNS PreQuiz

Started on Tuesday, 1 February 2022, 5:04 PM


State Finished
Completed on Tuesday, 1 February 2022, 5:06 PM
Time taken 1 min 14 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

DNS Server is used to resolve the hostname into the ip address?

Select one:
True 
1133
False

The correct answer is 'True'.

Question 2
Correct

Mark 1.00 out of 1.00

What is the expansion of DNS? 1133


Domain Name Server 
Domain Name Sample
Domain Name Secret
Domain Name Security

The correct answer is: Domain Name Server

Question 3
Correct
1133
Mark 1.00 out of 1.00

What is the basic function of nslookup application?

Contact DNS server to get various informations 


Contact DNS server to get only NS Record
Contact DNS server to get only MX Record
Contact DNS server to get only SOA Record

The correct answer is: Contact DNS server to get various informations

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23765&cmid=3908 1/2
2/3/22, 11:00 AM Implementing DNS PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

DNS Client is also called as ____________

DNS Record
DNS Handler
DNS Resolver 
DNS Updater

The correct answer is: DNS Resolver

Question 5
Correct

1133
Mark 1.00 out of 1.00

What is the most common record available in DNS?

Host Record 
Hostname
File Record
System Record

The correct answer is: Host Record

1133
◄ Planning and implementing on IPv4 Network Quiz

Jump to...

Implementing DNS ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23765&cmid=3908 2/2
2/3/22, 11:03 AM Configure local storage Quiz: Attempt review

 Dashboard / Windows Server 2016 / Disk Management / Configure local storage Quiz

Started on Wednesday, 2 February 2022, 3:51 PM


State Finished
Completed on Wednesday, 2 February 2022, 3:53 PM
Time taken 2 mins
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Operating system bootable files can be reside in Extended partition?

Select one:
True
1133
False 

The correct answer is 'False'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
In which disk, the physical disk can be accessed by MS-DOS?

Select one:
a. Hard disk

b. Dynamic Disk

c. Basic Disk 

d. All options are correct

Your answer is correct.

The correct answer is: Basic Disk


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26967&cmid=2553 1/3
2/3/22, 11:03 AM Configure local storage Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which RAID volume required minimum 3 hard disk?

Select one:
a. RAID 5 

b. RADI 1

c. RAID2

d. RAID 0

Your answer is correct.

The correct answer is: RAID 5

Question 4
Correct 1133
Mark 1.00 out of 1.00

In which disk, you can connect more than one hard disk and configure fault tolerance volumes?

Select one:
a. GPT Disk

b. MBR Disk

c. Dynamic Disk 

1133
d. Basic Disk

Your answer is correct.

The correct answer is: Dynamic Disk

Question 5
Correct

Mark 1.00 out of 1.00

1133
Primary partition information is stored in _______.

Select one:
a. GPT

b. Dynamic

c. MBR 

d. Basic

Your answer is correct.

The correct answer is: MBR

◄ Managing user settings with Quiz

Jump to
https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26967&cmid=2553 2/3
2/3/22, 11:03 AM Configure local storage Quiz: Attempt review
Jump to...

Configuring Local Storage ►

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=26967&cmid=2553 3/3
2/3/22, 11:04 AM Configure access to resource Quiz: Attempt review

 Dashboard / Windows Server 2016 / Folder Management - Share / Configure access to resource Quiz

Started on Wednesday, 2 February 2022, 3:59 PM


State Finished
Completed on Wednesday, 2 February 2022, 4:00 PM
Time taken 1 min 10 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Read permissions in the shared folder will allow the users to modify the files through a network share.

Select one:
True
1133
False 

The correct answer is 'False'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
I have a folder called "test" in e:\. Who can change the permissions to the folder "test"?

Select one:
a. Guest user

b. Administrators 

c. Backup operators

d. Everyone

Your answer is correct.

The correct answer is: Administrators


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27018&cmid=2572 1/3
2/3/22, 11:04 AM Configure access to resource Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

______permissions override _________permissions in windows operating system.

Select one:
a. deny, modify

b. deny, allow 

c. allow, deny

d. allow, modify

Your answer is correct.

The correct answer is: deny, allow

Question 4
Correct 1133
Mark 1.00 out of 1.00

How will you identify that the share is a hidden share or not?

Select one:
a. %sharename%

b. $Sharename

c. $sharename$

1133
d. sharename$ 

Your answer is correct.

The correct answer is: sharename$

Question 5
Correct

Mark 1.00 out of 1.00

1133
Sharing is the process of allowing network users to access a shared resource.

Select one:
True 

False

The correct answer is 'True'.

◄ Admin Share

Jump to...

Securing file services PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27018&cmid=2572 2/3
2/3/22, 11:04 AM Configure access to resource Quiz: Attempt review

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27018&cmid=2572 3/3
2/3/22, 11:03 AM Configure access to resource PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / Folder Management - Share / Configure access to resource PreQuiz

Started on Wednesday, 2 February 2022, 3:57 PM


State Finished
Completed on Wednesday, 2 February 2022, 3:58 PM
Time taken 1 min
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Where will you check the share folder is available in the system?

fsmgmt.msc
devmgmt.msc
1133 

sharemgmt.msc
diskmgmt.msc

The correct answer is: fsmgmt.msc

Question 2
Correct

1133
Mark 1.00 out of 1.00

User1 is creating a folder in his share folder. Who is the owner of that folder?

user1 
groups
administrators
users

The correct answer is: user1

Question 3
1133
Correct

Mark 1.00 out of 1.00

I have a folder test in d:\ drive. Can I configure sharing for the test folder if my partition file system is FAT32?

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27007&cmid=3911 1/2
2/3/22, 11:03 AM Configure access to resource PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Once you enable sharing in a folder, which group has permission by default?

users
administrators
everyone 
authorized user

The correct answer is: everyone

Question 5
Correct

1133
Mark 1.00 out of 1.00

we can configure the share permission to users and groups in the same share folder?

Select one:
True 

False

The correct answer is 'True'.

1133
◄ Implementing Storage Spaces and Data Deduplication Quiz

Jump to...

Configure access to resources ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27007&cmid=3911 2/2
2/3/22, 11:01 AM ADC Quiz: Attempt review

 Dashboard / Windows Server 2016 / Active Directory Configuration / ADC Quiz

Started on Tuesday, 1 February 2022, 6:29 PM


State Finished
Completed on Tuesday, 1 February 2022, 6:33 PM
Time taken 3 mins 55 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

The ___________ is a service in windows server allows users to access domain resources

Select one:
a. domain
1133
b. domain controller 

c. All options are correct

d. Domain Name system

Your answer is correct.

The correct answer is: domain controller

Question 2
Correct
1133
Mark 1.00 out of 1.00

Where is Active Directory database is stored?

Select one:
a. c:\windows\system32\ntds

b. c:\windows\ntds 

c. c:\users\ntds

d. c:\ntds
1133
Your answer is correct.

The correct answer is: c:\windows\ntds

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23916&cmid=2530 1/3
2/3/22, 11:01 AM ADC Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Sites are physical groupings of IP subnets which are used to replicate information among Domain Controllers

Select one:
True 

False

The correct answer is 'True'.

Question 4
Correct

Mark 1.00 out of 1.00

1133
Nested Organizational Unit can be configured in Active Directory Domain Service Environment?

Select one:
True 

False

The correct answer is 'True'.

Question 5

1133
Correct

Mark 1.00 out of 1.00

Which one is the logical component in the active directory domain services?

Select one:
a. dns server

b. global catalog

c. domain controller

d. Schema 

Your answer is correct.


1133
The correct answer is: Schema

◄ ADDS Installation and Configuration

Jump to...

Managing object in ADDS PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23916&cmid=2530 2/3
2/3/22, 11:01 AM ADC Quiz: Attempt review

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23916&cmid=2530 3/3
2/3/22, 11:00 AM Windows Server 2016 installation Quiz: Attempt review

 Dashboard / Windows Server 2016 / Windows Server 2016 Installation / Windows Server 2016 installation Quiz

Started on Tuesday, 1 February 2022, 4:01 PM


State Finished
Completed on Tuesday, 1 February 2022, 4:02 PM
Time taken 1 min 13 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Is it possible to upgrade from windows server 2008 web edition to windows server 2016 datacenter?

Select one:
True
1133
False 

The correct answer is 'False'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
To install windows server 2016 operating system in the remote machine, what are the pre-requirements

Select one:
a. Configure USB as first bootable device

b. Enable PXE in BIOS and configure First bootable device as network card 

c. PXE not required

d. Configure BIOS for first bootable device as DVD

Your answer is correct.

1133
The correct answer is: Enable PXE in BIOS and configure First bootable device as network card

Question 3
Correct

Mark 1.00 out of 1.00

In Windows Server 2016 Server Core operating system, you can install roles and features through command prompt?

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23541&cmid=2516 1/2
2/3/22, 11:00 AM Windows Server 2016 installation Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

What is the recommended disk space to install windows server 2016 operating system?

Select one:
a. 32GB

b. 42GB

c. 30GB

d. 40GB 

Your answer is correct.


The correct answer is: 40GB

Question 5
Correct 1133
Mark 1.00 out of 1.00

What is the minimum configuration for the processor requirement to install windows server 2016 operating system?

Select one:
a. 1GHz

b. 1.4 GHz 

c. 2.4GHz

1133
d. 2GHz

Your answer is correct.

The correct answer is: 1.4 GHz

◄ Windows Server 2016 Installation Demo Video

Jump to...

1133
Planning and implementing an IPv4 network ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23541&cmid=2516 2/2
2/3/22, 10:59 AM Windows Server 2016 Installation Pre-Quiz: Attempt review

 Dashboard / Windows Server 2016 / Windows Server 2016 Installation / Windows Server 2016 Installation Pre-Quiz

Started on Tuesday, 1 February 2022, 3:53 PM


State Finished
Completed on Tuesday, 1 February 2022, 3:54 PM
Time taken 49 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

To install windows server 2016 operating system in the remote machine, what are the pre-requirements

1133
All options are correct
PXE should not required
PXE required 
Configure BIOS for first bootable device as DVD

The correct answer is: PXE required

Question 2
Correct

1133
Mark 1.00 out of 1.00

What is the minimum configuration for the memory requirement to install windows server 2016 operating system with desktop experience?

2 GB 
1 GB
4 GB
512 MB

The correct answer is: 2 GB

Question 3
1133
Correct

Mark 1.00 out of 1.00

What is the minimum disk space to install windows server 2016 operating system?

40GB
30GB
42 GB
32 GB 

The correct answer is: 32 GB

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23507&cmid=3906 1/2
2/3/22, 10:59 AM Windows Server 2016 Installation Pre-Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Upgrading from windows server 2016 standard edition to windows server 2016 datacenter is possible ?

Select one:
True 

False

The correct answer is 'True'.

Question 5
Correct

Mark 1.00 out of 1.00

1133
Server core windows server 2016 operating system can be managed through hyper-v management console?

Select one:
True 

False

The correct answer is 'True'.

◄ Discussion Forum

Jump to...
1133
Windows 2016 Intro video ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23507&cmid=3906 2/2
2/3/22, 11:06 AM Securing network traffic wi Quiz: Attempt review

 Dashboard / Windows Server 2016 / Securing network traffic with firewalls and encryption / Securing network traffic wi Quiz

Started on Thursday, 3 February 2022, 10:45 AM


State Finished
Completed on Thursday, 3 February 2022, 10:48 AM
Time taken 2 mins 47 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

_______ profile is used for a trusted home or office network?

Select one:
a. domain
1133
b. private 

c. public

d. hybrid

Your answer is correct.

The correct answer is: private

Question 2
Correct
1133
Mark 1.00 out of 1.00

one of the Connection security rules to authenticate two computers before they begin communicating is not required

Select one:
True

False 

The correct answer is 'False'.


1133
Question 3
Correct

Mark 1.00 out of 1.00

Windows firewall with advanced security supports both incoming and outgoing traffic filtering

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29851&cmid=2590 1/2
2/3/22, 11:06 AM Securing network traffic wi Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which port number is used to securely transfer files in the internet?

Select one:
a. 989, 990 

b. 990, 991

c. 991992

d. 988, 989

Your answer is correct.


The correct answer is: 989, 990

Question 5
Correct 1133
Mark 1.00 out of 1.00

Which software is used to prevent the host computers from the DDOS attack ?

Select one:
a. Local firewall and antivirus software 

b. remote firewall and remote antivirus software

c. All options are correct

1133
d. Local firewall and antivirus software is not required for DDOS

Your answer is correct.

The correct answer is: Local firewall and antivirus software

◄ Securing network traffic with firewalls and encryption

Jump to...

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29851&cmid=2590 2/2
2/3/22, 11:06 AM Securing network traffic PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / Securing network traffic with firewalls and encryption / Securing network traffic PreQuiz

Started on Wednesday, 2 February 2022, 5:50 PM


State Finished
Completed on Wednesday, 2 February 2022, 5:52 PM
Time taken 1 min 25 secs
Marks 4.50/5.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Port numbers can be mapped with the protocol in the firewall rules?

Select one:
True 
1133
False

The correct answer is 'True'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
Which application protects your system and comes with windows server operating system?

Trojan Horse
Symantec
Windows Defender 
Bluepink

The correct answer is: Windows Defender

Question 3
Partially correct
1133
Mark 0.50 out of 1.00

What are the things require to configure the firewall rules?

devices number
Port number 
disk number
Protocol

The correct answers are: Port number, Protocol

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27705&cmid=3915 1/2
2/3/22, 11:06 AM Securing network traffic PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which secure port number is used for webserver?

8081
443 
8080
80

The correct answer is: 443

Question 5
Correct

1133
Mark 1.00 out of 1.00

By default, firewall allows both incoming and outgoing request in the systems?

Select one:
True

False 

The correct answer is 'False'.

1133
◄ Monitoring, managing, and recovering Quiz

Jump to...

Securing network traffic with firewalls and encryption ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27705&cmid=3915 2/2
2/3/22, 11:04 AM Securing file services PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / FSRM / Securing file services PreQuiz

Started on Wednesday, 2 February 2022, 4:01 PM


State Finished
Completed on Wednesday, 2 February 2022, 4:02 PM
Time taken 1 min 18 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

What is the expansion of FSRM?

1133
File system Resource Monitor
File System Resource Manager
File Screening Resource Manager 
File Screening Resource Monitor

The correct answer is: File Screening Resource Manager

Question 2
Correct

1133
Mark 1.00 out of 1.00

What is Quota?

Limits the local access to the users


Limits the diskspace to the users 
Limits the shared access to users
Limits the system access

The correct answer is: Limits the diskspace to the users

Question 3
1133
Correct

Mark 1.00 out of 1.00

How will you install the FSRM?

Server Management
Service Manager
System Manager
Server Manager 

The correct answer is: Server Manager

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27031&cmid=3912 1/2
2/3/22, 11:04 AM Securing file services PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Who has permission to install FSRM?

guests
administrator 
administrators 
users

The correct answers are: administrator, administrators

Question 5
Correct

1133
Mark 1.00 out of 1.00

FSRM is a role where you can limit the user to store the data in the respective space.

Select one:
True 

False

The correct answer is 'True'.

◄ Configure access to resource Quiz 1133


Jump to...

Securing file services ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27031&cmid=3912 2/2
2/3/22, 11:05 AM Securing Active Directory Domain services Quiz: Attempt review

 Dashboard / Windows Server 2016 / Securing Active Directory Domain Services / Securing Active Directory Domain services Quiz

Started on Wednesday, 2 February 2022, 5:14 PM


State Finished
Completed on Wednesday, 2 February 2022, 5:15 PM
Time taken 1 min 21 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Domain controllers are not a primary targets for attacks and the most essential resources to secure

Select one:
True
1133
False 

The correct answer is 'False'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
________is to allow a Domain controller to exist in a remote office that may have few users or less physical security

Select one:
a. DC

b. RDOC

c. RODC 

d. ADC

Your answer is correct.

The correct answer is: RODC


1133
Question 3
Correct

Mark 1.00 out of 1.00

Deploy the domain controllers, where the phycial security is ensured?

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27518&cmid=2584 1/2
2/3/22, 11:05 AM Securing Active Directory Domain services Quiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

which one of the security risks that can affect domain controllers?

Select one:
a. Denial of service attacks 

b. network security

c. logical security threats

d. operation attacks

Your answer is correct.


The correct answer is: Denial of service attacks

Question 5
Correct 1133
Mark 1.00 out of 1.00

What is the main feature available in Read only domain controller?

Select one:
a. Password filtering

b. domain filtering

c. user filtering

1133
d. Credential caching 

Your answer is correct.

The correct answer is: Credential caching

◄ Securing Active Directory Domain Services

Jump to...

1133
Monitoring, managing, and PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27518&cmid=2584 2/2
2/3/22, 11:04 AM Securing ADDS PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / Securing Active Directory Domain Services / Securing ADDS PreQuiz

Started on Wednesday, 2 February 2022, 5:12 PM


State Finished
Completed on Wednesday, 2 February 2022, 5:13 PM
Time taken 1 min 10 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Domain Controller and the domain are same in Windows Server operating system

Select one:
True 
1133
False

The correct answer is 'True'.

Question 2
Incorrect

Mark 0.00 out of 1.00

What is the expansion of ADDS? 1133


Active Domain Display Services
Active Directory Domain Services
Active Directory Display Services
Active Domain Directory Services 

The correct answer is: Active Directory Domain Services

Question 3
Correct
1133
Mark 1.00 out of 1.00

Domain controllers are managing the domain objects centrally.

Select one:
True 

False

The correct answer is 'True'.

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27508&cmid=3913 1/2
2/3/22, 11:04 AM Securing ADDS PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

What is the extension name of active directory database?

dbt
ads
nit
dit 

The correct answer is: dit

Question 5
Correct

1133
Mark 1.00 out of 1.00

Active Directory maintains a separate database by its own?

Select one:
True 

False

The correct answer is 'True'.

◄ Post Quiz -Securing file services1133


Jump to...

Securing Active Directory Domain Services ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27508&cmid=3913 2/2
2/3/22, 11:04 AM Post Quiz -Securing file services: Attempt review

 Dashboard / Windows Server 2016 / FSRM / Post Quiz -Securing file services

Started on Wednesday, 2 February 2022, 4:03 PM


State Finished
Completed on Wednesday, 2 February 2022, 4:04 PM
Time taken 1 min 23 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Quota notification in FSRM will be sent through email.

Select one:
True 
1133
False

The correct answer is 'True'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
File screening audit is done through ________

Select one:
a. storage generate report

b. storage area network

c. Storage report data 

d. storage audit

Your answer is correct.

The correct answer is: Storage report data


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27040&cmid=2582 1/3
2/3/22, 11:04 AM Post Quiz -Securing file services: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which quota is allowed the files to store by the user even if the quota exceeds?

Select one:
a. name of the file

b. size of the file

c. FSRM

d. Soft quota 

Your answer is correct.

The correct answer is: Soft quota

Question 4
Correct 1133
Mark 1.00 out of 1.00

How will you prevent storing a particular type of file using File screening?

Select one:
a. File Extensions

b. File Groups 

c. hard quota

1133
d. quota template

Your answer is correct.

The correct answer is: File Groups

Question 5
Correct

Mark 1.00 out of 1.00

1133
You cannot generate the storage report instantly

Select one:
True

False 

The correct answer is 'False'.

◄ Admin Quota Template

Jump to...

Securing ADDS PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27040&cmid=2582 2/3
2/3/22, 11:04 AM Post Quiz -Securing file services: Attempt review

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27040&cmid=2582 3/3
2/3/22, 11:00 AM Planning and implementing on IPv4 Network Quiz: Attempt review

 Dashboard / Windows Server 2016 / Planning and Implementing an IPv4 Network / Planning and implementing on IPv4 Network Quiz

Started on Tuesday, 1 February 2022, 4:38 PM


State Finished
Completed on Tuesday, 1 February 2022, 4:40 PM
Time taken 1 min 32 secs
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

How many bits of host ID is available in Class B network?

Select one:
a. 36
1133
b. 24

c. 16 

d. 8

Your answer is correct.

The correct answer is: 16

Question 2
Correct
1133
Mark 1.00 out of 1.00

Public IP address can be used in the local area network

Select one:
True

False 

The correct answer is 'False'.


1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23685&cmid=2519 1/2
2/3/22, 11:00 AM Planning and implementing on IPv4 Network Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

Which address is taken by the network card, when there is no DHCP Server?

Select one:
a. Private IP

b. Public Subnet

c. Public IP

d. APIPA 

Your answer is correct.


The correct answer is: APIPA

Question 4
Correct 1133
Mark 1.00 out of 1.00

I will not able to communicate directly with the internet using the private IP address?

Select one:
True 

False

The correct answer is 'True'.


1133
Question 5
Correct

Mark 1.00 out of 1.00

How many bits are there in the IP address?

Select one:
a. 255

1133
b. 32 

c. 28

d. 24

Your answer is correct.

The correct answer is: 32

◄ Network Management code demo

Jump to...

Implementing DNS PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=23685&cmid=2519 2/2
2/3/22, 11:05 AM Monitoring, managing, and recovering Quiz: Attempt review

 Dashboard / Windows Server 2016 / Monitoring, managing, and recovering AD DS / Monitoring, managing, and recovering Quiz

Started on Thursday, 3 February 2022, 8:49 AM


State Finished
Completed on Thursday, 3 February 2022, 8:51 AM
Time taken 2 mins 11 secs
Marks 4.00/5.00
Grade 80.00 out of 100.00

Question 1
Incorrect

Mark 0.00 out of 1.00

Which log contains the system-related events such as service start-up and shutdown?

Select one:
a. application log
1133 

b. security log

c. data log

d. system log

Your answer is incorrect.

The correct answer is: system log

Question 2
Correct
1133
Mark 1.00 out of 1.00

________have been implemented to provide support for performance reports that require data from multiple log files of different types

Select one:
a. delete counter

b. add counter

c. trace

d. Data collector set


1133 

Your answer is correct.

The correct answer is: Data collector set

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29375&cmid=2587 1/3
2/3/22, 11:05 AM Monitoring, managing, and recovering Quiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

The Performance Monitor is used to troubleshoot the performance of the operating system and its applications

Select one:
True 

False

The correct answer is 'True'.

Question 4
Correct

Mark 1.00 out of 1.00

1133
In which tool, you can add a performance counter in the windows server operating system?

Select one:
a. Performance Monitor 

b. Task audit

c. configuration task

d. Task Manager

Your answer is correct.

1133
The correct answer is: Performance Monitor

Question 5
Correct

Mark 1.00 out of 1.00

Event Viewer is not used to Gather information and troubleshoot, Record events as logs

Select one:
True

1133
False 

The correct answer is 'False'.

◄ Monitoring, managing, and recovering AD DS

Jump to...

Securing network traffic PreQuiz ►

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29375&cmid=2587 2/3
2/3/22, 11:05 AM Monitoring, managing, and recovering Quiz: Attempt review

1133

1133

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=29375&cmid=2587 3/3
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review

 Dashboard / Windows Server 2016 / Monitoring, managing, and recovering AD DS / Monitoring, managing, and PreQuiz

Started on Wednesday, 2 February 2022, 5:59 PM


State Finished
Completed on Thursday, 3 February 2022, 9:41 AM
Time taken 15 hours 42 mins
Marks 5.00/5.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Application logs can be seen from performance monitor

Select one:
True
1133
False 

The correct answer is 'False'.

Question 2
Correct

Mark 1.00 out of 1.00

1133
Application warning information is stored in the log files

Select one:
True 

False

The correct answer is 'True'.

Question 3
Correct

Mark 1.00 out of 1.00 1133


What informations are stored in the log files?

performance details
errors 
system information
system check

The correct answer is: errors

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 1/2
2/3/22, 11:05 AM Monitoring, managing, and PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which tool is used to view the log information in the system?

disk manager
device manager
performance monitor
event viewer 

The correct answer is: event viewer

Question 5
Correct

1133
Mark 1.00 out of 1.00

Logon /Logoff events can be logged by default in windows server operating system

Select one:
True 

False

The correct answer is 'True'.

1133
◄ Securing Active Directory Domain services Quiz

Jump to...

Monitoring, managing, and recovering AD DS ►

1133

https://accenturelearning.tekstac.com/2022/mod/quiz/review.php?attempt=27758&cmid=3914 2/2

You might also like