Professional Documents
Culture Documents
NS and Cloud
NS and Cloud
Q3) In the SSLv3 the padding bits are ____________ with the secret key.
A. Padded
B. XORed
C. Concatenated
D. ANDed
Answer : Option C
Q4) How many processes are there for changing a plaintext piece of data
into encrypted data in AES - 128?
A. 14
B. 8
C. 1
2
D. 1
0
Answer : Option D
Q5) Which of the following cloud service providers does not provide
Hybrid Storage?
A.All of the mentioned options
B.AWS
C.Azure
D.Google Cloud
Answer : Option D
Q2) What command will permit SMTP mail to only host 1.1.1.1 ?
A. access-list 10 permit smtp host 1.1.1.1
B. access-list 110 permit ip smtp host 1.1.1.1
C. access-list 10 permit tcp any host 1.1.1.1 eq smtp
D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
Answer : Option D
Q3) Antivirus scanning devices fall under which type of network security device?
A.Active devices
B.Preventative devices
C.Unified Threat Management devices
D.Passive devices
Answer : Option A
Q4) Which of the following is the correctly mapped relationship between attributes and cloud or
data centre?
A.In house IT professionals: Data center, Co-location makes failures dependent: cloud
B.Instant Scalable: Data Center, Pay as per use: cloud
C.On-premises: Data center, Remote Hardware: Cloud
D.Involves challenges and delay in Scalability: Data Center, Remote Hardware: Cloud
Answer : Option C
Q5) Consider a situation when you have to choose between the major cloud service providers.
Which would you choose if you need a cloud service if you do not want to have backup support?
A.AWS
B.Oracle
C.Azure
D.Google Cloud
Answer : Option D
Q6) Which of the following types of network security ensures that potential attackers cannot
infiltrate your network?
A.Firewall
B.Network Access Control
C.Virtual Private Network
D.Both Network Access Control and Virtual Private Network
Answer : Option C
Q8) Attack in which a user creates a packet that appears to be something else is .
A.Smurfing
B.Trojan
C.E-mail bombing
D.Spoofing
Answer : Option D
Q9) Which of the following statements is true about cloud and data center?
I.In Cloud, owner is responsible for downtime and repairs
II.In Data center, owner is responsible for downtime and repairs
Choose the correct answer from the options given below.
A.Neither 1 nor 2
B.Only 2
C.Only 3
D.Both 1 and 2
Answer : Option B
COrrect B
COrrect B
4. Which IPsec component ensures the integrity and authenticity of the data being transmitted?
a) Authentication header
b) Encapsulating security payload
c) Combining security associations
d) Key management
COrrect A
COrrect C
6. Secure Socket Layer (SSL) is commonly used for securing which type of communication?
a) Email
b) Web
c) Voice
d) File sharing
COrrect B
7. Which of the following is a widely used secure electronic transaction protocol for online
payments?
a) HTTPS
b) SET
c) VPN
d) SSH
COrrect B
COrrect B
9. Which type of security threat is typically characterized by self-replicating malicious code?
a) Intrusion
b) Virus
c) Firewall
d) Authentication
COrrect B
COrrect B
1. The combination of two or more interconnected networks is called
a) Internetwork
b) LAN
c) MAN
d) WAN
Ans: a
2. National Internet Service Provider (ISP) networks are connected to one another by private
switching network is called
a) Peering Points
b) Network Access Points
c) National ISP
d) None of these
Ans: b
a) MAN
b) LAN
c) WAN
d) Internetwork
Ans: b
4. The method of communication in which transmission of data takes place in both directions but
in one direction at a time is
a) Simplex
b) Four-wire circuit
c) Half-duplex
d) Full duplex
Answer: C
5. A set of internetworking protocol that allows communication across multiple diverse networks
is known as
a) TCP
b) IP
c) ISP
d) TCP/IP
Ans: d
Ans: C
4. Which of the following layer isn’t present in the TCP/IP model but is included in the OSI
model?
A.Network layer
B.session layer
C.transport layer
D.application layer
Ans B
A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
Ans: A
8. Cloud computing embraces many concepts that were previously touted as the next big thing
in information technology. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Grid computing
E. Desktop computing
Answer: E
9. IBM, EMC and Boeing Co. were among the companies signing what document whose title is
reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Answer: D
a. I
b. II
c. I and II
d. II and III
e. none of the above
Ans: d
Answer A
10. Which of the following service provider provides the least amount of built-in security?
a. Platform as a service
b.Infrastructure as a service
c. Software as a service
d. All of the above
Ans: b
1. In computing, ________ is a network security system that monitors and controls incoming
and outgoing network traffic based on predetermined security rules.
a. Spyware
b. cookie
c. spam
d. firewall
Ans: d
2. Which among the following network topologies has the highest transmission speed?
a. LAN
b. WAN
c. MAN
d. Both LAN and WAN have equal transmission speeds.
Ans: a
4. Which of the following device is used to connect similar LAN with same protocols?
a. Gateways
b. Routers
c. Switches
d. Bridges
Ans: d
7. Which statement best describes the relationship between application, server, and client in a
multitenancy
environment?
A. Single instance of software running on a server and serves one client.
B. Single instance of software running on a server and serves multiple clients.
C. Multiple instances of software running on a server and serves multiple clients.
D. Multiple instances of software running on multiple servers and serves one client.
Answer: B
8. Which concept aligns business and IT assets, helps provide flexible IT capacity, and provides
real
time allocation of IT resources in line with demand from business processes?
A. elasticity
B. virtualization
C. dynamic infrastructure
D. automated management of resources
Ans: C
9. An enterprise needs highly controlled storage and access to their databases as well as
managing the
infrastructure for web front ends and other applications. They have a large existing IT
infrastructure
and they are continually expanding the capabilities. Which cloud computing model will satisfy all
their current needs and enable them to reduce cost?
A. public cloud
B. hybrid cloud
C. private cloud
D. internal cloud
Answer: B
10. A customer is struggling with inconsistent software builds in the testing and staging
environment.
Which cloud attribute can help resolve the problem?
A. pervasiveness
B. elastic scaling
C. flexible pricing
D. automatic provisioning
Answer: D
1. Which among the following protocols is known as the terminal emulation protocol?
a. HTTP
b. FTP
c. SMTP
d. TELNET
Ans: d
2. Which of the following internet service is appropriate to access the computer of your office
from home?
a. www
b. IRC
c. FTP
d. Telnet
Ans: d
3. The loss in signal power as light travels down the fiber is called .............
A) Attenuation
B) Propagation
C) Scattering
D) Interruption
Ans: A
4. Which of the following TCP/IP protocols is used for transferring files form one machine to
another. A) FTP
B) SNMP
C) SMTP
D) RPC
Ans: A
5. DNS can obtain the ................. of host if its domain name is known and vice versa.
A) Station address
B) IP address
C) Port address
D) Checksum
Ans: B
6. A company needs to provide IT services to a worldwide customer base utilizing a diverse set
of
devices. Which attribute of cloud computing can help the company deliver such services?
A. pervasiveness
B. flexible pricing
C. vertical scaling of application servers
D. horizontal scaling of application servers
Answer: A
7. What advantage is there for an enterprise to adopt a virtual private cloud model?
A. Reduce costs by adopting a flexible pricing model for the entire operation.
B. Reduce infrastructure costs since all data centers will be managed in a third party cloud.
C. Manage sensitive data in a compliant and secure manner and benefit from flexible pricing
models
for select services or infrastructure.
D. Obtain maximum control over aspects such as security and performance since the entire
infrastructure will be managed within the IT department.
Answer: C
8. A company is considering a cloud environment to improve the operating efficiency for their
data and
applications. The company is part of an industry where strict security and data privacy issues
are of
the highest importance. Which type of cloud would be a good choice?
A. hybrid cloud
B. public cloud
C. private cloud
D. governed cloud
Answer: C
9. A company has decided to leverage the web conferencing services provided by a cloud
provider and
to pay for those services as they are used. The cloud provider manages the infrastructure and
any
application upgrades. This is an example of what type of cloud delivery model?
A. Platform as a Service
B. Software as a Service
C. Application as a Service
D. Infrastructure as a Service
Answer: B
10. Which delivery model is an example of a cloud computing environment that provides users
with a
web based email
service?
A. Software as a Service
B. Platform as a Service
C. Computing as a Service
D. Infrastructure as a Service
Answer: A
1. Which virtualization standard does the WebSphere Application Server Hypervisor Edition
use?
A. Common Image Format
B. Open Virtual Appliance
C. Open Virtualization Format
D. Interoperable Image Format
Answer: C
2. What are the common set of technologies used to create a manageable cloud environment?
A. A hypervisor and a hypervisor manager like Virtual Center or VMControl.
B. A hypervisor, a hypervisor manager, automated provisioning, and monitoring.
C. A hypervisor, a hypervisor manager, a self service portal, automated provisioning, and
monitoring.
D. A hypervisor, a hypervisor manager, self service portal, and an automated provisioning tool
like
IBM Tivoli Provisioning Manager.
Answer: C
3. Cloud service providers typically provide web based management consoles that provide
users insight
on the state of cloud services. What is one technology used in client side browser code that
queries
back end systems for data from the cloud services?
A. PHP
B. AJAX
C. HTML
D. XHTML
Ans: B
5. Data center clouds are formed by connecting two or more data center cloud networks over
wide
area network. When building such data center clouds, which component is mainly responsible
for
increasing the network latency?
A. network servers
B. network clients
C. network interfaces
D. network routing protocols
Ans: C
7. The ……………… layer is responsible for resolving access to the shared media or resources.
A) Physical
B) Mac sub layer
C) Network
D) Transport
Ans: B
9. Which of the following is not a mechanism that DHCP supports for IP address allocation?
A) Automatic allocation
B) Static allocation
C) Dynamic allocation
D) Manual allocation
Ans: B
3. What is used to logically assign and separate physical resources such as memory and CPU
in a cloud
computing model?
A. bios
B. a hypervisor
C. a load balancer
D. a blade chassis
Answer: B
8. The primary goal of the ………………….. protocol is to provide a private channel between
communicating application, which ensures privacy of data authentication of the partners, and
integrity.
A) SSL
B) ESP
C) TSL
D) PSL
Ans: A
9. In ………………. Mode, the authentication header is inserted immediately after the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
Ans: A
10. A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as ………………
A) Chocke point
B) meeting point
C) firewall point
D) secure point
Ans: A
1. What type of hypervisor provides the highest efficiency and performance?
A. utility based
B. storage based
C. software based
D. firmware based
Ans. D
2. Cloud service providers typically provide web based management consoles that provide
users insight
on the state of cloud services. What is one technology used in client side browser code that
queries
back end systems for data from the cloud services?
A. PHP
B. AJAX
C. HTML
D. XHTML
Ans: B
4.In the SSLv3 the padding bits are ____________ with the secret key.
A. Padded
B. XORed
C. Concatenated
D. ANDed
Answer : Option C
5.Antivirus scanning devices fall under which type of network security device?
A.Active devices
B.Preventative devices
C.Unified Threat Management devices
D.Passive devices
Answer : Option A
COrrect B
7. A set of internetworking protocol that allows communication across multiple diverse networks
is known as
a) TCP
b) IP
c) ISP
d) TCP/IP
Ans: d
10. Which among the following network topologies has the highest transmission speed?
a. LAN
b. WAN
c. MAN
d. Both LAN and WAN have equal transmission speeds.
Ans: a
31 Correct Ans : D Added By : fc15074 October 17, 2023, 2:14 pm Edit
What type of hypervisor provides the highest efficiency and performance?
A. utility based
B. storage based
C. software based
D. firmware based
a) TCP
b) IP
c) ISP
d) TCP/IP
2. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A hub
B bridge
C gateway
D repeater
E None of the above
Ans C
3. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A cannot talk at once
B can receive and send data simultaneously
C can send or receive data one at a time
D can do one way data transmission only
E. None of the above
Answer: Option B
4. Which IPsec component ensures the integrity and authenticity of the data being transmitted?
a) Authentication header
b) Encapsulating security payload
c) Combining security associations
d) Key management
A
You want to create a standard access list that denies the subnet of the following host:
172.16.50.172/20 . Which of the following would you start your list with ?
A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.48.0 0.0.15.255
Answer : Option D
You are working on a router that has established privilege levels that restric access to certain
functions. You discover that you are not able to execute the command show
running-configuration. How can you view and confirm that the access list that have been apllied
to the Ethernet 0 interface on your router?
A. show access-lists
B. show interface Ethernet 0
C. show ip access-lists
D. show ip interface Ethernet 0
Answer : Option D
a) Internetwork
b) LAN
c) MAN
d) WAN
Ans: a
Ans: C
Secure Socket Layer (SSL) is commonly used for securing which type of communication?
a) Email
b) Web
c) Voice
d) File sharing
Ans: b
Which of the following is a widely used secure electronic transaction protocol for online
payments?
a) HTTPS
b) SET
c) VPN
d) SSH
ans: b
What router command allows you to dertermine whether an IP access list is enabled on a
particular interface ?
A. show ip port
B. show access-lists
C. show ip interface
D. show access-lists interface
Answer : Option C
What command will permit SMTP mail to only host 1.1.1.1 ?
A. access-list 10 permit smtp host 1.1.1.1
B. access-list 110 permit ip smtp host 1.1.1.1
C. access-list 10 permit tcp any host 1.1.1.1 eq smtp
D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
Answer : Option D
COrrect B
National Internet Service Provider (ISP) networks are connected to one another by private
switching network is called
a) Peering Points
b) Network Access Points
c) National ISP
d) None of these
Ans: b