0% found this document useful (0 votes)
34 views24 pages

Accenture Networking Cloud Computing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views24 pages

Accenture Networking Cloud Computing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

1 Which of the following attacks treats the encryption algorithms as


a black box?
Implementation attacks
Social Engineering attack
C Brute – Force attacks
Analytical Attacks

2 Which of the following encryption algorithm is based on the RC4


algorithm and 24 bits of Initialization vector?
None of the mentioned options
C WEP
WPA 2
WPA

3 Which of the following ports can be used to connect the


following devices to your laptop?

1. Pen drive
2. Key board
3. External hard drive
C 1,2,3-USB
1,3-USB
2-HDMI
1,2-HDMI
3-USB
1-USB
2-HDMI
3-PS/2

4 Which of the following option is the incorrect relationship


between the character of the cloud and its description?
C All of the mentioned option
Resource poofing: Multiple clients are provided service
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

Measured Service: Resource utilization is tracked


Rapid Elasticity: More usage of resources at regular time period

5 Which of the following allows any business to reduce time delays


and reduce energy consumption as well?
None of the mentioned options
Both Data Center and cloud
C Cloud
Data center

6 Which of the following are present in the Message Integrity


Code’s tagging function to result a particular tag?
Bit swapping
XOR operation
Bit addition
C All of the mentioned option

7 Which of the following are the least expensive type of Firewall?


C Packet Filter Firewall
Stateful inspection Firewalls
Proxy Firewalls
Cloud Firewalls

8 Consider a situation where a person runs a website where work


comes up in an unpredicted manner, which of the following bene
should consider while choosing the cloud as a Service for his
business?
No Upfront costs and Broad Access Network
C No Upfront costs
Broad Access Network
Scalability
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

9 Consider a situation where you have to choose between the


major cloud service providers. Which would you choose if you
need a cloud service which focuses on kubernetes and has a
simplest UI?
Google Cloud
C AWS
Oracle
Azure

10 Consider a situation where you have to choose between the


major cloud service providers. Which would you choose if you
need a cloud service which provides Cloud Bigtable and Cloud
Datastore options under NoSQL?
Azure
C Google Cloud
Oracle
AWS

11 Which of the following cloud service provider provides the


following computations services?
A. Kubernetes
B. Graphics Processing Unit
C. Knative
D. Container Security
C AWS
Oracle
Google Cloud
Azure

12 Map true (T) and false(F) for the following statements:


Statement I : Google Cloud platform does not have backup and
archive services.
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

Statement II : Google Cloud platform databases services like


Cloud SQL and Cloud Spanner
Statement III : Google Cloud platform has three SQL-based
options : relational database, SQL Database
Statement IV : Google Cloud platform provides Simple Storage
Service, Transfer Service, and Transfer Service as storage
TFTF
TTFF
C FFTT
TFFT

13 What is the primary work of SSH in hashing encryption and


decryption?
Ensure that the received message text is intact and unmodified
Authenticate a client to a server
C Packet integrity
Utilize a variety of different symmetrical cipher systems

14 Which of the following option is correct based on the following


statements?
Statement I: Out of all the security algorithms, Wired Equivalent
privacy is the oldest one.
Statement II : Wi-Fi protected Access’s most common
configuration is pre-shared key.
Statement III : WPA2 uses CCMP encryption algorithm user
which is based on Rivest Cipher 4 encryption algorithm.
Statement IV : WPA uses TKIP encryption algorithm user which
is based on Rivest Cipher 5 encryption algorithm.
All statements are true
Only II and IV are true
Except II, all are true
C Only I and III are true
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

15 Which of the following is the incorrect r


representation of the layer number and name of an OSI model?
Layer 2 is the data link layer
C Layer 4 is the session layer
Layer 3 is the network layer
Layer 6 is the presentation layer

16 Which of the following statements is not true about cloud and data
center?
Cloud is better which it comes to economically maintaining data
security
Data center is better when it comes to maintaining data security
Internal Management team is required to run the data center
C Cloud is better when it comes to maintaining data security

17 Which of the following is the benefit of Enterprise Data


WareHouse?
Houses data for individual business units
None of the mentioned options
C Data is accessible in one place
Scattered datasets for data prevention

18 Which of the following type of DES key causes the encryption to


become self-inverting?
Key which consists of a pattern of two 1’s and one 0
Key which consists of a pattern of two 0’s and one 1
Key which consists of a pattern of two 0’s and two 1’s
Key which consists of alternating 1’s and 0’s

19 Which of the following subfield of IEEE 802.11 frame control


hare single bit sube5
A Retry
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

B. Power Management
C. More Fragments
D. Subtype
Choose the correct answer from the options given below.
C Only B, C, and D
Only A and B
Only A, B and C
Only C and D

20
Which of the following is correct based on the below statements?

A Clouds offer limited data storage capacity to use.


B. Clouds offer unlimited data storage capacity to users
C In both data center and cloud, there is a third party involved in
managing data but the cloud has more data theft
D. In both data certer and cloud, there is a third party involved in
managing data but the cloud has more data theft
Choose the correct from the options gven below
Only A and D
C Only B and C
Only B and D
Only C and D

21 Which the following benefits of the cloud is the biggest security


threat also?
Scalability
Data availability over the Internet and Scalability
Sentamablity
C Data availability over the Internet

22 which of the following factors determine the speed of a data


centre?
1. Network of the organization
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

2. Internet Connection speed of the organisation


3. Amount of data stored in the servers
Choose the correct answer from the options given below.
Only 3
Only 1
C Only 2
Only 1 and 3

23 Which of the following key can become a pairwise master key in


suitable environment
Pre-shared key
C Authentication, accounting, and authorization key
Group master key
Pair wise transient key

24 According to IEEE 802.11 standard, which of the follwing is


used as ISM radio band can be used by wifi to operate
1.5Hz
2.2.4Gz
C Neither 1 or 2
Both 1 and 2
Only 1
Only 2

25 What is the default value of subtype which is subfield of frame


control of IEEE 802.11
1
1111
C 0
1
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

26 Which of the following load balancer of AWS is best suited for


load balancing across multiple amazon EC2 instance and operates
at both request and connection level
None of the mentioned
Application load balancer
Classic load balancer
C Network load balancer

27 Which of the following hardware component is typically a circuit


board or a chip installed on a computer so that it can connect to a
network
C NIC
PCB
EC
Modem

28

Which of the following is charactertics of cloud allow ease to


access standardized mechanisms?

Broad network access


On demand self servie
Measure service
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

C Resource pooling

29 Which of the following cloud service provider is very strong in


Software as a Service?
Azure
Oracle
AWS
C Google Cloud Platform

30 Consider the situation given below and choose which of the


following firewall would be the best situated
SITUATION :
You are working for a XYZ company and your organization is
intreseted in network security. It requires protection that has
ability to verify the transmission control protocol (TCP)
handshake.
List of firewall
1.Packet-filtering firewall
2.statedful inspection firewall
3.Circuit-level firewall
4.Application-level firewall
5.Next-Generation firewall

Only 1,2,3 and 4


Only 2,3,4 and 5
C Only 1,2,4 and 5
Only 1

31 Which of the following cloud service provider provides the


following services?
A. Virtual Private cloud
B. AR and VR
C. Application Lifecycle Management
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

D. Cloud Monitoring
Azure
C Google Cloud
Oracle
AWS

32 Consider a situation where you have to choose between the major


cloud service providers. Which would you choose if you need a
cloud service which focuses on Kubernetes and has a simplest
UI?
Azure
AWS
C Google Cloud
Oracle

33 Which of the following is/are the difference between the TKIP


and WEP?
C TKIP uses shorter key and IV lengths
All of the mentioned options
TKIP uses Rivest Cipher 4 algorithm
TKIP guard against integrity attacks

34 Which of the following encryption algorithm is based on the RC4


algorithm and 24 bits of initialization vector?
WPA 2
C WEP
WPA
None of the mentioned options

35 Consider a situation where you have to choose between the major


cloud service providers. Which would you choose if you
should not choose if you are looking for a virtual private cloud?
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

C Azure
AWS
Google Cloud
All of the mentioned options

36 How many rounds of processing are there to change a plaintext


piece of data into encrypted data in AES-192?
12
8
C 10
14

37 Which of the following characteristic of cloud allows you to make


out the effective use of resources?
Resource pooling
Measured Service
C On-demand self-services
Rapid Elasticity

38 Which of the following is responsible for obfuscating the code


and changing the virus’s binary sequence in the metamorphic
mutation engine?
Assembler
C Code transformer
Disassembler
Code analyzer

39 Which of the following cloud services provider should be


preferred if most of your data is binary large objects type?
AWS
Oracle
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

C Google cloud platform


Azure

40 Which of the following statements are correct regrading TKIP?


1. TKIP is based on RC5 stream cipher, but it uses long IV and
encryption/authentication keys
2. TKIP uses 24-bits IV,32 bits authentication key, and 64-bit
encryption key
Choose the correct answer from the options given below
Only 1
Both 1 and 2
Only 2
C Neither 1 nor 2

41 Which of the following obfuscation techniques revise the program


structure keeping the execution flow using unconditional or
conditional branches?
C Instruction permutation
Instruction replacement
Code transposition
Dead code Insertion

42 When you send a document to someone, you want to protect it so


that any changes they make are marked as changes .For what
type of changes can you enable this?
You can protect it for Tracked Changes or for commands, but not
both at the same time
C You can protect it for Tracked Changes and comments
simultaneously
You can protect it for tracked changes
You can protect it for comments
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

43 Which of the following option is correct based on the below


statements?
Statement I:Google cloud provides cloud speech API, translation
API, video intelligence
Statement II: It offers IOT and serverless services , but both are
still in beta previews
C Both statements are true and Statement II is the incorrect
explanation of Statement I
Statement I is true and Statement II is false
Both statements are false
Statement I is true and Statement II is correct explanation of
Statement I

44 Which of the following option is correct on the basis of below


statements?
Statement I:Using cloud as a data center ,it provides the flexibility
of work practices to employees
Statement II: Cloud allows user to access from anywhere and also
provides heterogeneous clients
Both statements are true and Statement II is the incorrect
explanation of Statement I
Both statements are false
C Statement I is true and Statement II is correct explanation of
Statement I
Statement I is true and Statement II is false

45 DES encryption algorithm is an example of which of the following


options?
Byte-oriented cipher
All of the mentioned options
Bit-oriented cipher
C Key alternating block ciphers
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

46 How many number of processes are there for changing a


plaintext piece of data into encrypted data in AES-126?
12
C 8
10
14

47 Which of the following is the second stage of establishing an SSH


session?
Agree upon encryption to protect future communication
Establish encryption to protect future communication
C Authenticate the user
Agree upon encryption and establish encryption to protect future
communication

48 which of the following types of cryptography's strength depends


on the number of key bits?

Asymmetric key cryptography

symmetric key cryptography

Hashing
None of these

49 DES encryption algorithm is an example of which of the following


option?
C Byte-oriented cipher
Bit-oriented cipher
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

All of the above mentioned


Key-alternating block ciphers

50 What will be the sum of port numbers of telnet and internet relay
chat?
200
C 217
213
221

51 which of the following is/are the correct option(s) in which the


Intrusion detection system helps?
Resetting the connection to save the IP address from any blockage

Correction of Cyclic Redundancy errors

C
Sending an alarm against any malicious activity in the network

All of the mentioned options

52 Map true (T) and false (F) for the following statements:
Statement I: Google Cloud has a Data lake storage which is useful
for Big Data Applications.
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

Statement II: Google Cloud does not have a backup and archive
services.
Statement III: Google Cloud has two SQL-based options: Cloud
SQL and Cloud Spanner.
Statement IV: AWS provides simple storage service, snow ball
edge, snow mobile as storage services.

FTFF
TFFT
T F TF
C F T TT

53 Which of the following option is correct based on the below


statements?
Statement I: Google Cloud provides cloud speech API, translation
API, Video Intelligence, and Natural Language.
Statement II: It offers IoT and serverless services, but both are
still in beta previews.

Statement I is true and Statement II is false


C Both statements are true and Statement II is the incorrect
explanation of Statement I
Both statements are falSE
Both statements are true and Statement II is the correct explanation
of Statement I

54 which of the following cloud service provider should be preferred


if most of your data is of Binary large objects type?
C Azure
AWS
Oracle
Goole cloud
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

55 Which of the following allows any business to reduce time delays


and reduce energy consumption as well?
Data centre
Cloud
C Both
None of the mentioned options

56 Fill in the blank with the most suitable option.


My phone keeps ringing, so I for an assistant lately.
C have been looking
was looking
had looked
has been looking

57 If loss incurred by selling a car is one-third of its cost price, then


find the loss percentage?
20%
25.60%
23.25%
C 33.33%

58 Which of the following is the incorrect representation of the layer


number and name of an OSI model?
Layer 6 the presentation layer
C Layer 4 the session layer
Layer 3 is the network layer
Layer 2 is the data-link layer

59 Which of the following option is the incorrect relationship between


the cloud and its description?
All of the mentioned options
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

C Resourcing pooling : Multiple clients are provided service.


Measuring service : Resource utilization is tracked
Rapid elasticity : more usage of resources at regular time period

60 Which of the following allows any business to reduce time delays


and reduce energy consumption as well?
None of the mentioned options
C Both data center and cloud
Cloud
Data center

61 Which of the following encryption algorithm can be encountered


with a Reinjection attack?
C WEP
WPA
WPA 2
None of the mentioned options

62 Which of the following is/are the difference between the TKIP


and WEP?
TKIP guard against integrity attacks
TKIP uses Rivest cipher 4 algorithm
TKIP uses shorter key and IV lengths
C All of the mentioned options

63 Which of the following encryption algorithm is based on RC4


algorithm and 24 bits of initialization vector?
C WEP
WEP 2
None of the mentioned options
WPA
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

64 Which of the following are the least expensive type of firewall?


C Packet filter firewall
Cloud firewalls
Stateful inspection firewalls
Proxy firewalls

65 What is the difference between metamorphic and polymorphic


viruses?
Metamorphic virus mutates the variables only
Metamorphic virus mutates the decryptor loop
C Metamorphic virus mutates all its body
None of the mentioned options

66 Which of the following is the incorrect representation of the


layer number and name of an OSI model?
Layer 2 is the data-link layer
C Layer 4 is the session layer
Layer 3 is the network layer
Layer 6 is the presentation layer

67 Consider a situation where you have to choose between the


major cloud service providers. Which would you choose, if you
need a cloud service that focuses on Kubernetes and has a
simplest UI ?
Azure
Oracle
AWS
C Google Cloud
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

68 Which of the following cloud service provider provides the


following computational services?
A . Kubernetes
B . Graphics processing unit
C .Knative
D . Container Security
Azure
AWS
C Google Cloud
Oracle

69 Which of following options checks the document for content that


people with disabilities might find it difficult to read?
Check compatibility
Inspect document
Restrict access
C Check accessibility

70 When you click on the chart option in MS Word, various types of


chart appear. Which of these would you not find in the list?
Radar
C Balloon
Doughnut
Bubble

71
Tom notices that when he runs several programs simultaneously
on his computer, the performance of the programs slows down
considerably. What is the reason for this ?

C Insufficient RAM
Not enough space on the hard drive
Poorly written programs
Low monitor speed
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

72 In data structures, which of the following statements about


recursion is correct

1. Recursion is always better solution than iteration


2. Recursion uses more memory as compared to iteration
3. Recursion uses less memory as compared to iteration
1
2
C 3
None of these

73 Which of the following subfield of IEEE 802.11 frame control


is/are single bit subfields?

A. Retry
B. Power Management
C. More Fragments
D. Subtype

Choose the correct answer from the options given below.


Only B, C and D
Only A and B
C Only A, B and C
Only C and D

74 What will be the sum of the port numbers of the HTTP protocol
and Secure Shell protocol (SSH) ?
101
C 102
100
103
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

75 Which of the following service(s) is/are provided by Google Cloud


Platform?
Hybrid Storage
C Offline Data transfer
Batch Processing
File Storage

76 Which of the following benefit of the cloud is the biggest security


threat also?
Scalability
Data availability over the Internet and Scalability
C Sustainability
Data availability over the Internet

77 Hackers look out for Pairwise Master key to break network


encryption scheme, but it is not shared in transit. Which of the
following components know the Pairwise Master Key?

1. Supplicant
2. Authenticator
Both 1 and 2
Only 1
Neither 1 nor 2
C Only 2

78 According to IEEE 802.11 standards, which of the following ISM


radio bands can be used by Wi-Fi to operate?

1. 5 Hz
2. 2.4 GHz

Choose the correct answer from the options given below.


NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

Both 1 and 2
C Only 2
Neither 1 nor 2
Only 1

79 Which of the following keys are type of root key?

A. Pre-shared Key
B. Authentication, Accounting and Authorization Key
C. Group Master Key
D. Pairwise Master Key

Choose the correct answer from the options given below.


Only A and B
Only A and D
C Only B and C
Only C and D

80 A modem is connected to:


a telephone line
C a monitor
a VGA
a digital connector

81 Which of the following is correct based on the below


statements?

A. Cloud computing is not direct and accessible by the user at


any hour of the day via particular device.
B. Cloud Computing is direct and accessible by the user at any
hour of the day via any device.
C. Small-scale businesses with limited capital and resources
must opt for data centre
NETWORKING & CLOUD COMPUTING HANDBOOK _ ACCENTURE

D. Larger companies that are more extensive and widespread


should opt for in-house data centres

Choose the correct answer from the options given below.


Only B and C
C Only A and D
Only B and D
Only A and C

82 Which of the following cloud service provider is very strong in


Software as a Service?
Azure
Oracle
AWS
C Google Cloud Platform

You might also like