Security Primers Mock
Security Primers Mock
2.Which AWS services can host a Microsoft SQL Server database? (Select
TWO)
a.Amazon Relational Database Service (Amazon RDS)
b.Amazon Aurora
c.Amazon Redshift
d.Amazon EC2
7.where will you enable an http port 80 request to allow the incoming traffic
to the system?
a.private
b.inbound
c.public
d.outbound
11.To find the secondary group of a user, what is/are the file/files that need to
be referred to?
a./etc/profile
b./etc/passwd
c./etc/shadow
d./etc/group
14.Restore points save information such as drivers, programs, system files and
registry setting
False
True
20.Many network applications and protocols have security issues that can be
addressed over time with the use of devices such as…
a.Routers
b.Switches
c.Repeaters
d.Firewalls
21.In Which order is the Group policy object processed on client computers?
a.Domain, Local, Site, OU
b.Local,Site,Domain,OU
c.Local, Domain, OU, Site
d.Local, Domain, Site, OU
22.The file that contains the list of users who are not allowed to use the FTP
service is ___
Select one:
a.user_list
b.ftpuser_list
c.ftp_user
d.ftpusers
28.The time based scheduler that helps in scheduling jobs at regular intervals
is __
a.cron
b.at
c.scheduler
d.atcron
29.Which compute service allows users to lease virtual machines for 1 or
3year?
Select one:
a.Azure VirtualMachine
b.Azure Container Service
c.App Service
d.Azure Functions
35.The user will have primary group and secondary group Select one:
a.1,many
b.no,1
c.1, no
d.no, many
38.Where will you identify the hidden shares configured in the system? Select
one:
a.fsmgmt.msc
b.devmgmt.msc
c.dnsmgmt.msc
d.netsh.msc
42.The group of physical partitions that span through the different harddisk
to form a single block of partitions is called
Select one:
a.physical volume
b.volume group
c.logical volume
d.partition group
47.he command to check the syntax of the configuration file in the apache
server is
Select one:
a.apachectl.chkconfig
b.apachectl.configtest
c.apachectl.conftest
d.apachectl.checkconfig
48. Contains formal definitions of each attribute which will exist in the
Active Directory object.
a.Active Directory Users
b.Active Directory Trust
c.Domain Controller
d.Active Directory Schema
49.Which of the group policy files are not stored in the group policy objects?
Select one:
a..admx
b..admn
c..adms
d..adm
52.The concept in the Apache server which enables it to use different IPs for
the same server is called
Select one:
a.ServerHosting
b.Virtualhost Server
c.Slave apache server
d.VirtualHosting
53.We can attach an EBS volume to more than one EC2 instance at the same
time.
True
False
54.What should be done to determine the appropriate metrics for measuring a
new service?
a.Asking customers to provide numerical targets that meet their needs
b.Measuring the performance over the first six months, and basing a solution on
the results
c.Asking customers open questions to establish their requirement
d.Using operational data to provide detailed service reports
55.Where can I configure the data collector set in a windows server operating
system
a.Event Viewer
b.Reliability and Performance Monitor
c.Storaga Analysis
d.Task Manager
60.In the crontab file, the day of the week is specified in the field
a.fifth
b.fourth
c.second
d.first
67. Bitlocker can be encrypted with 128 bit and 256 bit encryption.
True
False
68.Which Amazon service can I use to define a virtual network that closely
resembles
a traditional data center?
Select one:
a.Amazon ServiceBus
b.Amazon VPC
c.Amazon RDS
d.Amazon EMR
71.Which one of the following is used for physical groupings of IP subnets that
are used to replicate information among Domain Controllers?
a.Active Directory Schema
b.Active Directory Trust Service
c.Active Directory Sites
d.Active Directory users and Groups
80.The function acts on each row returned and returns one result per
row.
Select one:
a.Single Row
b.Per Row
c.Each Row
85.Which of the following is a fully managed open source analytics service for
enterprises.
Select one:
a.Azure HDInsight
b.Azure SQL Data Warehouse
c.Azure Data Lake Analytics
d.Azure SQL Database
86.Which group members can perform back up and restore of files and
folders?
Select one:
a.Backup Operators
b.Power Users
c.Guests
d.Users
88.What can access resources in the operating system with limited security
features
a.Authentication
b.Validation
c.Access control
d.Allow
89.Which service uses the name resolution to communicate with the client
machines?
a.VPN
b.DNS
c.DHCP
d.ADDS
90.What is the primary focus of business capacity management?
Select one:
a.Management, control and prediction of the performance, utilization and capacity
of individual elements of IT technology
b.Management, control and prediction of the end-to-end performance and capacity
of the live, operational IT services
c.Review of all capacity supplier agreements and underpinning contracts with
supplier management
d.Future business requirements for IT services are quantified, designed,
planned and implemented in a timely fashion
92.The block devices that are created from the physical extents of the same
volume group is called
Select one:
a.logical volume
b.physical volume
c.physical partition
d.logical partition
93.Importing security templates will get which of the following policies
Select one:
a.Partition policy
b.Account Policy
c.Control Panel
d.Network policy
100.Which AWS characteristics make AWS cost effective for a workload with
dynamic user demand?
(Select TWO.)
Select one or more:
a.High availability
b.Shared security model
c.Pay-as-you-go pricing
d.Elasticity
101: filters let you dynamically detect the scope of Group Policy objects,
based on the attributes of the targeted computer
a.WMI
b.NTDS
c.Group Policy
d.Win3
104: The Swap partition details can be known from the commands
Select one or more:
a.top
b.swapon
c.swapls
d.free
105: The partition id of the LVM partition is .
Select one:
a.fd
b.83
c.82
d.8e
110: When you want a string to have multiple lines, which special character is
preceded and follow the string value?
Select one:
a.#
b.@
c.%
d.$
111: The file that has the list of users who are allowed to schedule the cron
jobs is
Select one:
a./etc/cron.allow
b./etc/cron.users
c./etc/cron_users
d./etc/cron_allow
112: The list of shared files can be viewed with the command
a.showmount -e
b.mount -a
c.mount.nfs
d.mountls
113: is the capacity of a single network to cover several physical networks.
a.Subnetting
b.Fragment
c.Masking
d.Segmenting
115: Which tool generates a notification when unauthorised files are saved?
Select one:
a.File Screening
b.Storage Report
c.Quota Template
d.File Partition
116: After creating the partitions with fdisk command, the command that
informs the partition changes to the kernel is
a.parted
b.partsave
c.partprobe
d.part –update
117: Which log levels are highly fatal and should be given more attention in
the windows 10 operating system?
Select one:
a.Critical
b.Error
c.Verbose
d.Information
118: Which zone resolves the IP addresses to the fully qualified domain name?
Select one:
a.Forward lookup zone
b.Stub zone
c.Reverse lookup zone
d.Secondary zone
119: The hostname for the system can be set permanently in the file
a./etc/hosts
b./etc/hostname
c./etc/network-scripts
d./etc/network
120: The DHCP server reserves an IP address for a system with the help of
a.Network Address
b.System id
c.MAC address
d.Port Address
121: You want to use a network medium that isn't affected by EMI. Which
cabling type should you use?
Select one:
a.Thinnet
b.UTP
c.Fiber optic cable
d.Thicknet
126: If the user is not set with the password, the user is considered as
Select one:
a.not created
b.locked
c.set the password at first login
d.login without password
131: Which group type allows you to assign to the shared resources?
Select one:
a.Universal Group
b.Local Group
c.Global Groups
d.Security Group
132: The command to verify the zone files is
Select one:
a.named-chkzone
b.named-checkconf
c.named-chkconf
d.named-checkzone
133: A Storage pool is a collection of hard disk in which you can create
multiple virtual disks?
Select one:
True
False
134: refers to the fact that the information presented is accurate and has not
been tampered with or changed during transmission by an unauthorised
person or group of individuals.
Select one:
a.Authenticity
b.Data integrity
c.Confidentiality
d.Access
138: Which tool is used to gather information and troubleshoot record events
as logs?
Select one:
a.Event Viewer
b.Performance Monitor
c.Reliablity
d.TaskManager
140: In which location is the Active Directory Database stored in the windows
server operating system?
Select one:
a.c:\windows\ndts
b.c:\windows\system32\etc\ntds
c.c:\windows\system32\ntds
d.c:\windows\ntds
141: Which of the following should IT service continuity strategy be based on?
* 1. Design of the service metrics * 2. Business continuity strategy * 3.
Business impact analysis (BIA) * 4. Risk assessment
Select one:
a.1, 3 and 4 only
b.1, 2 and 3 only
c.1, 2 and 4 only
d.2, 3 and 4 only
146: Which static methods of the class is commonly used to convert the value
to an 8-bit unsigned integer?
a.ToChar()
b.ToBoolean()
c.ToString()
d.ToByte()
148: The symbol that identifies the acl is set for a file or a directory is
a.*
b.-
c..
d.+
149: Which command is used to add a new column to the existing table?
Select one:
a.Add column
b.Truncate
c.Alter
d.Update
150: How does information about problems and known errors contribute to
'incident management'?
Select one:
a.It enables the reassessment of known erros
b.It enables quick and efficient diagnosis of incidents
c.It removes the need for regular customer updates
d.It removes the need for collaboration during incident resolution
TFA
1. What are two types of ip addresses that can be allocated?
a. Private and Public
b. Static and Dynamic
c. Short term and long term
d. None of the above
2. DHCP stands for _____
Dynamic Host Configuration Protocol
3. Client server model has the following advantages Centralized, Scalability &
Flexibility
a. True
b. False
4. DNS is responsible for converting domain name to corresponding ip-address.
a. True
b. False
5. What is the best AWS service to store our archived data for long term on
cloud?
a. S3 standard storage
b. S3 Glacier
c. Aws archive service
d. Non persistent data store
6. Which of the below mentioned services would you recommend monitoring
EC2 instances in AWS?
a. CloudWatch
b. CloudTrail
c. EC2 monitor
d. AWS monitoring service
7. Which of the following allows you to bid on spare Amazon EC2 computing
capacity?
a. Autoscaling
b. Spot Instances
c. Convertible Instances
d. Reserved instances
8. Which Azure service can be used to view any failures on azure services
a. Event Viewer
9. Which Service can be used to create OS images?
a. Cloud storage
b. Cloud server
c. Images
d. CD/DVD
10. Under the shared responsibility model which one below is service provider
responsibility?
a. Operating System Patching
b. Firmware Updates for Hardware
c. Antivirus Scanning
d. Data Encryption
11. What are the methods to access azure cloud?
a. Azure portal
b. Azure CLI
c. Azure SDK
d. All of the above
12. Compute Engines can be connected from where?
a. Office
b. Server
c. Anywhere
d. Some Network
13. *Which Services can be used as a bucket?
a. Cloud Storage
b. Compute Engine
c. Storage
d. disk
14. An Amazon EC2 instance running the Amazon Linux 2 AMI is billed in what
increment?
a. Per GB
b. Per Memory
c. Per CPU
d. Per hour
15. What is the purpose of block changing tracking file?
a. Improve the performance of increment database back
b. BCT is not related to backup Operation
16. Which type of backup options are available in Oracle?
a. Complete DB backup
b. Tablespace backup
c. Table level backup (Export)
d. Data file Backup
e. All of the above
17. What types of segments are available in Oracle?
a. Data Segment
b. Index Segment
c. Undo Segment
d. Temporary Segments
e. All of the above
18. What is the finest level granularity in the storage element?
a. Block
b. Segments
c. Tables
d. Tablespace
19. What type of databases are available?
a. Relational Database
b. Object Oriented Database
c. Distributed Database
d. No SQL Database
e. Graph Database
f. Cloud Database
g. All of the above
20. What is CMDB?
a. configuration management database
b. configured management database
c. configuration managementation database
d. configured management data striucture
21. What is Accenture’s IT Dept. known as?
a. EDS (Enterprise Data System)
b. CIO (Chief Information Officer)
c. IIS (Information Infrastructure Services)
d. ITG (Information Technology Group)
22. What is an IT asset?
a. IT asset is any financially valuable component that can contribute to the
delivery of an IT product or service
23. What is response time?
a. The time taken to change the status of ticket from “Assigned” to any
other status on….
24. Why do we need VNET security group?
a. Create a Secure Disk
b. Create a Database
c. To allow or deny access
d. To create a resource group.
25. Which will enable Operating system virtualization
a. Hyper-V
b. Containers
c. Virtual Machines
d. Hyper-V Host
26. Identify the missing word.
A service is defined as a means of enabling value co-creation by facilitating
outcomes that customers want to achieve, without the customer having to
manage specific ______ and risks
Ans: costs
83. What will happen if the default run level is set to 6. - System will be kept
on reboot
84. To reset a forgotten root passwd you need to use - Single user mode
( runlevel 1)
85. What is the command to switch targets in RHEL7 - systemctl isolate
graphical.target
86. What is the command to set a default target to boot in RHEL7 - systemctl
set-default multi-user.target
87. ONBOOT=yes parameter in ifcfg-ifname file means - enable the device when the
system boots up
88. Command to set the hostname - hostnamectl set-hostname
89. location of ifcfg-ifname - /etc/sysconfig/network-scripts/ifcfg-ifname
90. Command to check the IP address - ifconfig
91. mount the directory in the NFS Client using the following command syntax: -
mount -t nfs :
92. How will you start nfs in RHEL7 - systemctl start nfs-server
93. After updating the /etc/exports file, the _______ command must be run for it
to take effect (with option(s)). - exportfs -a.
94. What is the package required for nfs - nfs-utils
95. To view the list of shared directories on NFS server, run the following
command - showmount
96. Forward lookup zone means - resolves name to IP
97. The package required to install DNS - bind
98. Reverse lookup zone means - resolves IP to name
99. DNS used to convert IP adddress to Names and vice versa - true
100. Main configuration file for DNS Server - /etc/named.conf
101. Static IP address means - IP address manually assigned by the administrator
102. client lease database is - var/lib/dhcpd/dhcpd.leases
103. Dynamic IP means - IP address automatically assigned from a DHCP Server
104. Configuration file for DHCP - /etc/dhcp/dhcpd.conf
105. Command to release renew IP address - dhclient -r
106. Apache Configuration file and its location - /etc/httpd/conf/httpd.conf
107. Command to start apache server - systemctl start httpd
108. Package name for apache http server - httpd
109. Command to check the syntax of configuration file - httpd -t
110. Default DocumentRoot location - /var/www/html
111. Configuration files for vsftpd - /etc/vsftpd/vsftpd.conf
112. The protocol used to transfer files -FTP
113. Port number for FTP data transfer - 20
114. Whats the purpose of NTP server - synchronize computer’s clock time in a
network
115. Port number of NTP Server is - 123
116. Configuration file for NTP Server is - /etc/ntp.conf
117. In which command we can use causal words - at
118. which command is use to create one time activity - at
119. How to disable particular user in cron job? - /etc/cron.deny
120. which command is use to create multiple schedule - crontab
121. How to allow particular user in cron job? - /etc/cron.allow
122. Running A CRON Job At 2:30 AM Every Day - 30 2 * * * /your_command
123. How to save a particular at event - ctrl+d
124. How to disable particular user in at job? - /etc/at.deny
125. How Would I Get A Cron Job To Run Every 30 Minutes? - 30 * * * *
/your_command
126. mkswap command is used to - convert a partition to swap
127. In Linux, SWAP memory can be added at any point - true
128. To make the swap available after reboot, an entry should be made in
/etc/fstab - true
129. swapon command is used to Enable files/partition for paging - true
130. SWAP memory can be a file or a partition - true
131. Which of the following are considered as constraints? - Unique , check,
NOT NULL
132. Which of the following represents the degree of the relation? - No of
Attributes
133. Which of the following are DML statements? - INSERT , SELECT
134. Which of the following are data models? - Hierarchical, relational, network
135. Database is a shared collection of logically unrelated data, designed to
meet the needs of an organization. State True or False. - false
136. SQL is a case sensitive language and the data stored inside the table are
case in-sensitive. Say true or false? - false
137. Data is represented in the form of a graph - network
Data is represented in the form of a table - relational
Data is represented in the form of a tree - hierarchical
138. : ______ refers to the columns of the table → Attribute, _______ refers to
number of columns in the table → Degree, ______ refers to the rows of the table
→ Tuples, ________ refers to number of rows in the table → cardinality, _______
refers to the range of values that can be stored for an attribute → Domain
139. Tom has designed a payroll software for XYZ technology.The software will
store the salary details into the database and later he can retrieve the same
for future references. Tom falls under which category of user. - Application
Programmer
140. Which of the following is not a valid relational database?- unify
141. A relational database consists of a collection of - tables
142. In a relational database a referential integrity constraint can be done
using - foreign key
143. Which of the following is not modification of the database - sorting
144. Column header is referred as - attributes
145. _____ is called as meta data. - data dictionary
146. Which of the following options is not correct? - alter table emp drop
column_name;
147. creditcardno → primary key, cardholdername → not null, cardholderphoneno →
unique, creditcardtype should be silver or platinum only → check, validitydate →
not null
148. We need to ensure that the amount withdrawn should be less then the credit
card limit amount, to ensure this integrity what type constraint will be used? -
table level check constraint
149. A table consists of ______ primary keys. - 1
150. An emp table contains fields employ name, desig and salary. How do you drop
column salary? - alter table emp drop column salary;
151. How would you add a foreign key constraint on the dept_no column in the EMP
table, referring to the id column in the DEPT table? - Use the ALTER TABLE
command with the ADD clause on the EMP table
152. When we attempt to create the salary table with this command:
1.CREATE TABLE salary
2.(employee_id NUMBER(9)
3.CONSTRAINT salary_pk PRIMARY KEY,
4.1995_salaryNUMBER(8,2),
5.manager_name VARCHAR2(25)
6.CONSTRAINT mgr_name_nn NOT NULL,
7.$salary_96NUMBER(8,2));
Which two lines of this statement will return errors? - 7
156. Which statement would you use to add a primary key constraint to the
patient table using the id_number column, immediately enabling the constraint?
- ALTER TABLE patient
ADD CONSTRAINT pat_id_pk PRIMARY KEY(id_number);
157.To permanently remove all the data from the STUDENT table, and you need the
table structure in the future. Which single command performs this? - TRUNCATE
TABLE student;
158. The EMPLOYEES table has these columns:
LAST NAMEVARCHAR2(35)
SALARYNUMBER(8,2)
HIRE_DATEDATE
Management wants to add a default value to the SALARY column. You plan to alter
the table by
using this SQL statement:
ALTER TABLE EMPLOYEES
MODIFY (SALARY DEFAULT 5000);
What is true about your ALTER statement? - A change to the DEFAULT value
affects only subsequent insertions to the table.
159. Which CREATE TABLE statement is valid? - CREATE TABLE ord_details
(ord_no NUMBER(2),
item_no NUMBER(3),
ord_date DATE DEFAULT SYSDATE NOT NULL,
CONSTRAINT ord_pk PRIMARY KEY (ord_no,item_no));
160. insert into employee(empid,empname)values('123','John');
When we issue the above insert command and if the statement fails,
what would be the reason. - Value for phoneno is missing.
161. Which statement inserts a new row into the STUDENT table? - INSERT INTO
student (stud_id, address, name, dob)
VALUES (101,'100 Main Street','Smith','17-JUN-99');
162. DELETE FROM dept WHERE dept_id = 901;
The above delete statement throws an integrity constraint error because a child
record was found. What could we do to make the statement execute? - Delete the
child records first.
163. Which SQL statement needs both insert and update privilege on the target
table and select privilege on the source table? - merge
164. Which update statement produces the following error?
ORA-02291: integrity constraint (SYS_C23) violated - parent key not found -
UPDATE Employee SET Deptid=3 WHERE Empid = 101;
165. [select] statement/command would not cause a transaction to end
166. Delete → Removes all or only the rows specified from the table., Drop →
Removes the table itself from the database., Truncate → Removes the entire data
from the table, while the structure remains intact.
167. It is possible to update more than one column with a single UPDATE
statement. State true or false. - true
168. To have all the rows deleted from the table using delete statement, you
must specify the query with WHERE clause that specifies all the rows. State true
or false. - false
169. To change the structure of the table we use [ALTER TABLE] Syntax.
170. The SQL statements executed in a user session as follows:
create table product(pid number(10),pname varchar(10));
Insert into product values(1,'pendrive');
Insert into product values(2,'harddisk');
savepoint a;
update product set pid=20 where pid=1;
savepoint b;
delete from product where pid=2;
commit;
delete from product where pid=10;
Which statements describe the consequence of issuing the ROLLBACK TO SAVE POINT
a command in the session? - No SQL statements are rolled back., The rollback
generates an error.
171. Which statements are true regarding constraints? - A constraint can be
disabled even if the constraint column contains data., A columns with the UNIQUE
constraint can contain NULL values
172. You need to remove all the data from the employee table while leaving the
table definition intact. You want to be able to undo this operation. How would
you accomplish this task? - DELETE FROM employee;
173. Which statement is true when a DROP TABLE command is executed on a table?
- The table structure and its deleted data cannot be rolled back and restored
once the DROP TABLE command is executed.
174. select the student details whose firstname starts with 'A' or whose city is
'Chennai' and firstname ends with 'n' - select * from CSR_STUDENT where
firstname like 'A%' [OR] city ='Chennai' [AND] firstname like '%n';
175. Which statement about SQL is true? - Null values are displayed last in
ascending sequences.
176. How to retrieve department_id column without any duplication from employee
relation? - select distinct department_id from employee;
177. Select the suitable option for retrieving all the employees whose last name
is "kumar"? - select * from employee where empname like '%kumar';
178. Select the suitable option for retrieving all the employees who have a
manager? - select empname, manager_id from employee where manager_id is NOT
NULL;
179. Select the suitable option for retrieving all the employees whose salary
range is between 40000 and 100000? - select name,salary from employee where
salary between 40000 and 100000;, select name,salary from employee where
salary>=40000 and salary<=100000;
180. The SELECT statement is used to describe the table and the table data from
a database. State true or false. - false
181. [*] should be used if you want to select all the fields available in the
table.
182. Which of the following are the correct syntaxses for displaying the
StudentName and Department from Student table? - SELECT STUDENTNAME, DEPARTMENT
FROM Student;, select studentname, department FROM Student;, SELECT StudentName,
Department FROM Student;, select studentname, department FROM STUDENT;
183. Select the suitable option for fetching the output of the following query.
select substr("Oracle World",1,6) from dual; - Oracle
184. To display the names of employees that are not assigned to a department.
Evaluate this SQL statement: SELECT last_name, first_name
FROM employee
WHERE dept_id = NULL;
Which change should you make to achieve the desired result? - Change the
operator in the WHERE condition.
185. ABC company wants to give each employee a $100 salary increment. You need
to evaluate the
results from the EMP table prior to the actual modification. If you do not want
to store the results in the database, which statement is valid? - You need to
give the arithmetic expression that involves the salary increment in the DISPLAY
CUST_INCOME_LEVEL has NULL in the CUSTOMERS table. Which SQL statement will
accomplish the task? - UPDATE customers
SET cust_credit_limit = NULL
WHERE cust_income_level IS NULL;
200. To generate a report that shows an increase in the credit limit by 15% for
all customers. Customers whose credit limit has not been entered should have the
message "Not Available" displayed.
Which SQL statement would produce the required result? - SELECT
NVL(TO_CHAR(cust_credit_limit*.15),'Not Available') "NEW CREDIT"
FROM customers;
201. To calculate the number of days from 1st Jan 2007 till date:
Dates are stored in the default format of dd-mm-rr.
Which SQL statements would give the required output? - SELECT SYSDATE -
TO_DATE('01/JANUARY/2007') FROM DUAL;, SELECT SYSDATE - TO_DATE('01-JANUARY-
2007) FROM DUAL;
202. The PART table contains these columns:
ID NUMBER(7) PK
COST NUMBER(7,2)
PRODUCT_ID NUMBER(7)
Evaluate these two SQL statements:
1.SELECT ROUND(MAX(cost),2),
ROUND(MIN(cost),2),ROUND(SUM(cost),2),
ROUND(AVG(cost),2)
FROM part;
2.SELECT product_id, ROUND(MAX(cost),2),
ROUND(MIN(cost),2),ROUND(SUM(cost),2),
ROUND(AVG(cost),2)
FROM part
GROUP BY product_id;
How will the results differ? - Statement 1 will only display one row of
results; statement 2 could display more than one.
203. We need to analyze how long your orders take to be shipped from the date
that the order is placed. To do this, you must create a report that displays the
customer number, date ordered, date shipped, and the number of months in whole
numbers from the time the order is placed to the time the order is shipped.
Which statement produces the required results? - SELECT custid, orderdate,
shipdate, ROUND(MONTHS_BETWEEN (shipdate, orderdate)) "Time Taken" FROM ORD;
204. All columns in the SELECT list that are not in group functions must be in
the GROUP-BY clause. State True or False. - True
205. SELECT lot_no "Lot Number", COUNT(*) "Number of Cars Available"
FROM cars
WHERE model = 'Fire'
GROUP BY lot_no
HAVING COUNT(*) > 10
ORDER BY COUNT(*);
In the above statement which clause restricts which groups are displayed? -
HAVING COUNT(*) > 10
206. We need to analyze how long your orders take to be shipped from the date
that the order is placed. To do this, you must create a report that displays the
customer number, date ordered, date shipped, and the number of months in whole
numbers from the time the order is placed to the time the order is shipped.
Which statement produces the required results? - SELECT custid, orderdate,
shipdate,
ROUND(MONTHS_BETWEEN (shipdate, orderdate))
"Time Taken" FROM ord;
207. Group functions can be used in the where clause. State True or False. -
false
208. Single row functions can be nested to any level. State true or False. -
true
209. Evaluate these two SQL statements:
1. SELECT CONCAT(first_name, last_name),
LENGTH(CONCAT(first_name, last_name))
FROM employee
WHERE UPPER(last_name) LIKE '%J'
ORUPPER(last_name) LIKE '%K'
ORUPPER(last_name) LIKE '%L';
2. SELECT INITCAP(first_name) || INITCAP(last_name),
LENGTH(last_name) + LENGTH(first_name)
FROM employee
WHERE INITCAP(SUBSTR(last_name, 1, 1)) IN ('J', 'K', 'L');
How will the results differ? - The statements will retrieve different data from
the database.
210. We need to create a report to display the order id, ship date and order
total of your ORDER table. If the order has not been shipped, your report must
display 'Not Shipped'. If the total is not available, your report must display
'Not Available'.
In the ORDER table, the SHIPDATE column has a datatype of DATE. The TOTAL column
has a datatype of INT. Which statement do you use to create this report? -
SELECT ordid, IFNULL(shipdate, 'Not Shipped') SHIPDATE,
IFNULL(total,'Not Available')TOTAL FROM order;
211. Select the suitable option for displaying the average commission percentage
of all employees, where the commission percentage column of certain employees
include NULL value. - select AVG(NVL(commission_pct,0)) from emp;
212. ORDER BY must be the [last] clause in the SELECT statement. You [can]
specify any combination of numeric positions and column names in the order by
clause.
213. Which statement would display the highest credit limit available in each
income level in each city in the Customers table? - SELECT cust_city,
cust_income_level,MAX(cust_credit_limit)
FROM customers
GROUP BY cust_city, cust_income_level;
214. The following query is written to retrieve all those product IDs from the
SALES table that have more than 55000 sold and have been ordered more than 10
times:
SELECT prod_id FROM sales WHERE quantity_sold > 55000 AND COUNT(*)>10
GROUP BY prod_id HAVING COUNT(*)>10;
Which statement is true regarding this SQL statement? - It produces an error
because COUNT (*) should be only in the HAVING clause and not in the
WHERE clause.
215. To create a report displaying employee last names, department names, and
locations. Which query should you use to create an equi-join? - SELECT
e.last_name, d.department_name, d.location_id
FROM employees e, departments d
WHERE e.department_id =d.department_id;
216. Which statements are true regarding the USING and ON clauses in table
joins? - The ON clause can be used to join tables on columns that have
different names but compatible data types., The WHERE clause can be used to
apply additional conditions in SELECT statement
containing the ON or the USING clause.
217. Which statements would execute successfully? - SELECT SUM (DISTINCT
NVL(subject1,0)),MAX(subject1)
FROM marks
WHERE subject1 > subject2;, SELECT SUM (subject1+subject2+subject3)
FROM marks
WHERE student_name IS NULL
218. SELECT cust_city. COUNT(cust_last_name)
FROM customers
WHERE cust_credit_limit > 1000
GROUP BY cust_city
HAVING AVG(cust_credit_limit) BETWEEN 5000 AND 6000;
Which statement is true regarding the outcome of the above query? - It
executes successfully.
219. Which SQL statement produces an error? - None of the statements produce
an error; all are valid.
220. To display the names of employees who earns more than the average salary of
all employees.
SELECT last_name, first_name
FROMemployee
WHEREsalary > AVG(salary);
Which change should you make to achieve the desired results? - Use a subquery
in the WHERE clause to compare the average salary value.
221. Where can subqueries be used? - Field names in the SELECT statement., The
FROM clause in the SELECT statement, The HAVING clause in the SELECT statement,
The WHERE clause in the SELECT as well as all DML statements
222. The NOT operator can be used with IN, ANY, and ALL operators in multiple-
row subqueries. State true or false. - true
223. Main query and subquery can/must get data from [different] tables.
224. Equijoin is called as ______. - Simple join
225. The _______ join is based on all columns in the two tables that have the
same column name. - Natural
226. Mr. John is the president of a company. Five managers report to him. All
other employees report to these managers.
Examine the code:
SELECT employee.ename FROM emp employee
WHERE employee.empno NOT IN (SELECT manager.mgr
FROM emp manager);
The above statement returns no rows selected. as the result. Why? - A NULL
value is returned from the subquery.
227. There is only one customer with the CUST_LAST_NAME column having value
Roberts. Which INSERT statement should be used to add a row into the ORDERS
table for the customer whose CUST_LAST_NAME is Roberts and CREDIT_LIMIT is 600?
- INSERT INTO orders VALUES( 1,'10-mar-2007','direct', (SELECT customer_id FROM
customers WHERE cust_last_name ='Roberts' AND
credit_limit =600) ,1000 );
228. What would be the outcome of executing the below SQL statement?
select prod_name from products where prod_id in(
select prod_id from products where prod_list_price=(
select max(prod_list_price) from products where prod_list_price<(
select max(prod_list_price)from products))); - It shown the names of products
whose list price is the second highest in the table
229. To display names and grades of customers who have the highest credit limit.
Which SQL statements would accomplish the task? - SELECT custname, grade
FROM customers, grades
WHERE cust_credit_limit = (SELECT MAX(cust_credit_limit)
FROM customers)
AND cust_credit_limit BETWEEN startval AND endval;, SELECT custname, grade
FROM customers, grades
WHERE (SELECT MAX(cust_credit_limit)
FROM customers) BETWEEN startval and endval
AND cust_credit_limit BETWEEN startval AND endval;
230. _____ is used to retrieve records that do not meet the join condition -
Outer Join
231. The _______ join produces the cross product of two tables. - cross
232. Joining a table to itself is called as ______. - Self Join
234. To delete rows from the SALES table, where the PROMO_NAME column in the
PROMOTIONS table has either blowout sale or everyday low price as values.
Which DELETE statements are valid? (Choose all that apply.) - DELETE
FROM sales
WHERE promo_id = (SELECT promo_id
FROM promotions
WHERE promo_name = 'blowout sale')
OR promo_id = (SELECT promo_id
FROM promotions
WHERE promo_name = 'everyday low price');, DELETE
FROM sales
WHERE promo_id IN (SELECT promo_id
FROM promotions
WHERE promo_name = 'blowout sale')
OR promo_name = 'everyday low price';, DELETE
FROM sales
WHERE promo_id IN (SELECT promo_id
FROM promotions
WHERE promo_name IN ('blowout sale','everyday low price'));
235. Which object privileges can be granted on a view? - DELETE, INSERT,
SELECT, UPDATE
236. The owner has all the privileges on the object. State true or False. - true
237. Which SQL statement grants a privilege to all the database users? - grant
select on department to PUBLIC;
238. A/an ______ index is based on expressions. - Function Based
239. CREATE INDEX emp_dept_id_idx
ON employee(dept_id);
Which of the following statements are true with respect to the above index? -
May reduce the amount of disk I/O for SELECT statements.
240. You need to create the patient_id_seq sequence to be used with the patient
table's primary key column. The sequence should begin at 1000, have a maximum
value of 999999999, never reuse any numbers, and increment by 1.
Which statement would you use to complete this task? - CREATE SEQUENCE
patient_id_seq
START WITH 1000
MAXVALUE 999999999
NOCYCLE;
241. Which SQL statement would you use to remove a view called EMP_DEPT_VU from
your schema? - DROP VIEW emp_dept_vu;
242. An owner can give specific privileges on the owner's objects to others.
State... - true
243. ITIL consists of ….. - A Process, A Framework, A Policy
245. ITIL is implemented - Within an organization
246. What is the full form for ITIL? - Information Technology Infrastructure
Library
247. Is change request and service request the same? - No
248. From which country did ITIL roll out - United Kingdom
249. ITIL is ….. - Descriptive, Perspective
250. ITIL Involves - Vendors, Customers, Staff of the Organization
251. Branding Value is the type of - Return on Investment, Value on Investment
252. KB stand for - Knowledge Base
253. What does SLA stand for? - Service Level Agreement
254. Which describes outputs? - Tangible or intangible deliverables
255. Identify the missing word(s) in the following sentence. Utility is the [?]
offered by a product or service to meet a particular need. - Functionality
256. What is the purpose of the 'information security management' practice? -
Protecting an organization by understanding and managing risks to the
confidentiality, integrity, and availability of information
257. Which of these are a key focus of the ‘organization and people’ dimension?
- Roles and responsibilities
258. What is defined as the practice of ensuring that accurate and reliable
information about the configuration of services, and the configuration items
that support them, is available when and where needed? - Service configuration
management
259. What is the purpose of the 'incident management' practice? - Minimizing
the negative impact of incidents by restoring normal service operation as
quickly as possible
260. What operating model outlines the key activities required to respond to
demand and facilitate value realization through the creation and management of
products and services? - Service value chain
261. Which describes the nature of the guiding principles? - A guiding principle
is a recommendation used as guidance in all circumstances
262. Which guiding principle is most affected by the customer experience (CX)? -
Focus on value
263. You are working to design a new service for internal use across your
organization. As part of your design efforts, you form a small team with
relevant stakeholders from the human resources, information technology, sales,
and other relevant departments to ensure the service adequately meets each
department's needs and hope this results in great acceptance of the service when
delivered. Which guiding principle best describes this scenario? - Collaborate
and promote visibility
264. Which of these are NOT a key focus of the ‘partners and suppliers’
dimension? - Workflow management and inventory systems
265. What is the definition of a service? - A means of enabling value co-
creation by facilitating outcomes that customers want to achieve, without the
customer having to manage specific costs and risks
267. Identify the missing word in the following sentence. The [?] is the
practice of capturing demand for incident resolution and service requests -
Service desk
268. Which ITIL concept describes the service value chain? - Service value
system
269. What term best describes a person or a group of people that has its own
functions with responsibilities, authorities, and relationships to achieve its
objectives? - Organization
270. Identify the missing word(s) in the following sentence. An event is any
change of state that has significance for the management of a(n) [?] or other
configuration items - Service
271. Rohan is currently working to create a new service that would allow a
customer to purchase a digital product online and have it delivered to the
user's inbox. Rohan is responsible for the payment portion of this service, but
Esther is responsible for the digital product fulfillment portion of the
service. Which of the following should John do in order to follow the principle
of 'think and work holistically'? - Rohan should meet with Esther to determine
how the digital product fulfillment will occur
272. Identify the missing word in the following sentence. [?] is the practice of
ensuring that risks are properly assessed, authorizing changes to proceed, and
managing a change schedule in order to maximize the number of successful IT
changes. - Change control
273. Which value chain activity includes portfolio decisions for design and
transition? - Plan
274. What is the purpose of the 'monitoring and event management' practice? -
Systematically observing services and service components and recording and
reporting selected changes of state identified as events
275. Which statement about known errors and problems is CORRECT? - Known error
is the status assigned to a problem after it has been analysed
276. What is a recommendation of the ‘focus on value’ guiding principle? -
Focus on value at every step of the improvement
277. Which statement BEST describes the value of service strategy to the
business? - It enables the service provider to understand what levels of
service will make their customers successful
278. Which value chain activity communicates the current status of all four
dimensions of service management? - Plan
279. What is defined as a cause, or potential cause, of one or more incidents? -
Problem
280. Which is the purpose of the 'monitoring and event management' practice? -
To systematically observe services and service components, and record and report
selected changes of state
281. How should an organization adopt continual improvement methods? - Select a
few key methods for the types of improvement that the organization handles
282. Which describes a standard change? - A change that is typically implemented
as a service request
283. Which statement about emergency changes is CORRECT? - The assessment and
authorization of emergency changes is expedited to ensure they can be
implemented quickly
284. Which guiding principle helps to ensure that better information is
available for decision making? - Collaborate and promote visibility
285. Which dimension includes a workflow management system? - Value streams and
processes
286. What should all 'continual improvement' decisions be based on? - Accurate
and carefully analysed data
287. Which service catalogue view is considered beneficial when constructing the
relationship between services, SLAs, OLAs, and other underpinning agreement -
Supporting services view
288. Which guiding principle recommends standardizing and streamlining manual
tasks? - Optimize and automate
289. Which guiding principle recommends collecting data before deciding what can
be re-used? - Start where you are
290. Which practice provides a single point of contact for users? - Service desk
291. What is the purpose of service level management? - To ensure that all
current and planned IT services are delivered to agreed achievable targets
292. Which dimension considers how knowledge assets should be protected? -
Information and technology
293. What is the purpose of the 'relationship management' practice? - To
establish and nurture the links between the organization and its stakeholders
294. Where should all master copies of controlled software and documentation be
stored? - In the definitive media library
295. What should be done for every problem? - It should be prioritized based on
its potential impact and probability
296. Which processes are responsible for the regular review of underpinning
contracts? - Supplier management and service level management
297. A customer is a person who defines the requirements for a service and takes
responsibility for the [?] of service consumption - Outcomes
298. Which service transition process provides guidance about converting data
into information? - Knowledge management
300. When should a full risk assessment and authorization be carried out for a
standard change? - When the procedure for the standard change is created
301. Which service level metrics are BEST for measuring user experience?
-Metrics linked to defined outcomes
302. Which practice is the responsibility of everyone in the organization? -
Continual improvement
303. Identify the missing words in the following sentence. The purpose of the
[?] is to ensure that the organization continually co-creates value with all
stakeholders in line with the organization's objectives. - service value system
304. Which guiding principle recommends coordinating all dimensions of service
management? - Think and work holistically
305. Which practice has a purpose that includes helping the organization to
maximize value, control costs and manage risks? - IT asset management
306. Which guiding principle is PRIMARILY concerned with consumer's revenue and
growth? - Focus on value
307. Which is intended to help an organization adopt and adapt ITIL guidance? -
The guiding principles
308. How does a service consumer contribute to the reduction of disk? - By
communicating constraints
309. Which practice identifies metrics that reflect the customer's experience of
a service? - Service level management
310. Which term is used to describe the prediction and control of income and
expenditure within an organization? - Budgeting
311. How should the workflow for a new service request be designed? - Leverage
existing workflows whenever possible
312. In which TWO situations should the ITIL guiding principles be considered?
* 1. In every initiative
* 2. In relationships with all stakeholders
* 3. Only in specific initiatives where the principle is relevant
* 4. Only in specific stakeholder relationships where the principle is relevant
- 1 and 2
313. What should a release policy include? - The naming convention and expected
frequency of each type of release
314. What is the purpose of problem management? - Reduces the likelihood and
impact of incidents
315. What is NOT within the scope of service catalogue management? - Fulfilment
of business service requests
316. Which practice provides visibility of the organization's services by
capturing and reporting on service performance? - Service level management
317. What is the CORRECT definition of service management? - A set of
specialized organizational capabilities for delivering value to customers in the
form of services
318. Which competencies are required by the 'service level management' practice?
- Business analysis and commercial management
319. Which statement about costs is CORRECT? - Costs removed from the consumer
are part of the value proposition
320. Which term describes the functionality offered by a service? - Utility
321. What type of change is MOST likely to be managed by the 'service request
management' practice? - A standard change
322. What considerations influence the supplier strategy of an organization? -
Corporate culture of the organization
324. Which practice provides support for managing feedback, compliments and
complaints from users? - Service request managemen
325. What is a means of enabling value co-creation by facilitating outcomes that
customers want to achieve, without the customer having to manage specific costs
and risks? - A service
325. Which ITIL concept describes governance? - The service value system
326. Which ITIL guiding principle recommends using existing services, processes
and tools when improving services? - Start where you are
327. What are the three phases of 'problem management'? - Problem
identification, problem control, error control
328. What is the expected outcome from using a service value chain? - Value
realization
329. How should automation be implemented? - By replacing human intervention
wherever possible
330. Which of the following is an example of incident? - An application is not
available during the business hours
331. Which statement about the 'service desk1 practice is CORRECT? - It needs a
practical understanding of the business processes
332. What type of change is pre-authorized, low risk, relatively common, and
follows a procedure or work instruction? - A standard change
333. Which guiding principle recommends using the minimum number of steps
necessary to achieve an objective? - Keep it simple and practical
334. Which of the following can be used to access service desks? - All of the
above
335. What takes place in the “Did we get there?” step of the continual service
improvement (CSI) approach? - Verifying that improvement targets have been
achieved
336. What is an IT asset? - Any financially valuable component that can
contribute to delivery of an IT product or service
337. What is the purpose of the ‘deployment management’ practice? - To move new
or changed components to live environments
338. Identify the missing word in the following sentence. The purpose of the
supplier management practice is to ensure that the organization’s suppliers and
their [?] are managed appropriately to support the seamless provision of quality
products and services. - Performances
339. What are the ITIL guiding principles used for? - To help an organization
make good decisions
340. hy should service desk staff detect recurring issues? - To help identify
problems
341. Which statement about change management is CORRECT? - It ensures that all
changes are authorized by the change advisory board (CAB)
342. Which practice identifies metrics that reflect a customer experience of a
service? - Service level management
343. Which value chain activity ensures the availability of service components?
- Obtain/build
344. Which of these is a part of the identification of the network? - UserID
345. In which year was the first computer worm (virus) created? - 1970
346. Your password should be atleast - 6 characters
347. Malware is the short form of ? - malicious software
348. Which is the central node of 802.11 wireless operations. - accesspoint
349. Which protocol is the Active Directory database based on? - LDAP
350. which is the port number used for HTTP - 80
351. MCAfee is an example of - Antivirus Software
352. Which port does Telnet use? - 23
353. To protect a computer from virus, you should install -------- in your
computer. - antivirus
356. WPA2 is used for security in - WIFI
357. Digital signature can provide _________ for a network. - All of the
above( nonrepudiation, integrity, authentication)
358. Which of these uses public key encryption to secure channel over public
Internet? - SSL
359. Which is a longer version of a password, and in theory, a more secured one.
- Passphrase
360. What is data encryption standard (DES)? - block cipher
361. Which protocol provides security at the transport layer level? - TLS
362. One that makes a network service unusable, usually by overloading the
server or networks is - DOS
363. Identify two components of cryptography. - Authentication, Encryption
364. Which of these seems to be a high availability solution? - RAID
365. Which one of the following is an active attack? - Masquerade
366. IPSec is designed to provide protection at the - Network Layer
367. Which process determines whether an entity is allowed access to a given
asset or resource. - Authorization
368. __________ is the encryption which may also be referred to as the shared
key. - Symmetric key
369. A secured way to connect to the remote host is - SSH
370. Which process verifies if the identified user is the real owner of his/her
identity? - Authentication
371. What controls or limits access of critical information to certain
individuals or group of individuals? - Confidentiality
372. Which of the following defines the ability to verify that an e-mail message
received has not been modified in the transit? - Integrity
373. Many network applications and protocols have security problems that are
fixed over time by using devices like… - Firewalls
374. Encrypting plaintext results in an unreadable language called _______. -
Cipher text
375. A private key is maintained in an asymmetric key cryptography by - receiver
376. What can be an accidental or Intentional error. - Human error
377. AWS eliminate guessing on your infrastructure capacity needs. - true
378. Cloud computing is the on-demand delivery of cloud services via the
Internet with pay-as-you-go pricing. - true
379. _______ eliminates the management of the underlying infrastructure (usually
hardware and operating systems) and allows customer to focus on deploying and
managing the applications. - PaaS
380. Which of the following consists of one or more data centres? -Availability
zone
381. Which one of the following is Cloud Platform by Amazon? -AWS
382. __________is a master image which provides the information required for the
creation of virtual servers known as EC2 instances in the AWS environment. - AMI
383. An Amazon EBS volume can be attached to multiple instances at a time. -
false
384. EC2 instance type – _________ for compute-intensive workloads. - Compute
Optimized
385. What is a virtual server platform that allows users to create and run
virtual machines on Amazon’s server farm. - EC2
386. Amazon EC2 Instances utilizes Intel® Xeon® processors for providing
customers with high performance and value. - true
387. What type of storage is S3? - Object storage
389. What feature required to keep multiple variants of an object in the same
bucket? -Versioning
390. When you create a bucket or an object, Amazon S3 creates a default ACL that
grants the resource owner full control over the resource. - true
391. In AMazon S3 a single object size can be ? - 5Terabytes
392. Which of the following storage types suitable for performance sensitive
data? - Amazon S3 Standard
393. In the default VPC, all the necessary network components like subnet,
internet gateway, route table, security settings will be created and configured
by default. - true
394. An _____ acts as a firewall that controls the traffic allowed to reach one
or more instances. - Security group
395. Which component acts as a virtual firewall at subnet level? - Network ACL
396. Which component enable an instance in private subnet to communicate with
the internet. - NAT Gateway
397. Which of the following VPC component determines where the network traffic
should be directed. - Route table
398. Cloudwatch can monitor custom metrics in-addition to built-in metrics. -
true
399. Choose the infrastructure automation service from the given list? - Amazon
CloudFormation
400. Which of the following provides shared storage for Linux workloads - EFS
401. Which of the following database services support dynamic schema. - Amazon
DynamoDB
402. Which of the following is a serverless computing? - Amazon Lambda
403. Which of the following load balancers support content based routing? -
Application Load Balancer
404. Which of the following messaging services is based on pub/sub messaging
model. -SNS
405. Which is the AWS service used for configuring Content Delivery
Network(CDN)? - Amazon CloudFront
406. Which AWS service protects applications running on AWS against DDoS
attacks. - AWS Shield
407. Which of the following entity allow a user to access AWS resources
temporarily? - IAM Role
408. Which AWS service used for automated security assessments - AWS Inspector
409. AWS is responsible for protecting the Global infrastructure based on shared
responsibility model . - true
410. Which AWS service provides access to security and compliance documents? -
AWS Artifact
411. Which of the following are best practices of IAM? - Delete access keys of
root user, Enable Multifactor authentication
412. Which attribute determines the costing of an on-demand EC2 instance? -
Instance type, AMI type, Region
413. Which tool is used for getting the estimated monthly cost for your setup? -
Simple Monthly Calculator
414. Which of the following Amazon EC2 pricing models allow customers to use
existing server-bound software licenses? - Dedicated Hosts
415. Amazon EC2 ________ allow you to request spare Amazon EC2 computing
capacity for up to 90 percent off the On-Demand price. - Spot Instances
416. Now that you have started your migration to the cloud, you want to find out
which service you use the most and where the majority of your traffic is coming
from. Which tool should you use? - AWS Cost Explorer
417. Which pillar is a combination of processes, continuous improvement, and
monitoring system that delivers business value and continuously improve
supporting processes and procedures. - Operational excellence
418. The AWS Well-Architected Tool provides a plan on how to architect for the
cloud using established best practices. - true
419. A pillar focuses on ensuring a system/workload delivers maximum performance
for a set of AWS resources utilized. - Performance efficiency
420. ___________focuses on achieving the lowest price for a system/workload.
Optimize the cost while considering the account needs without ignoring factors
like security, reliability, and performance. - Cost optimization
421. Which of the following is NOT a pillar of the AWS Well-Architected
Framework? - Persistence
422. Which of the following cloud concept is related to pooling and sharing of
resources ? - Virtualization
423. Cloud environment always costly when compared to a traditional desktop
environment. -false
424. Which of the below cloud feature allows the service to change in size or
volume in order to meet a user’s needs. - Scalability
425. In which of the following model in which applications are hosted and made
available by a service provider. - Software-as-a-Service (SaaS)
426. A Cloud environment can be accessed from anywhere in the world as long as
the user has access to the Internet. - true
427. Which of the following are cloud benefits? (Select two) - Reduced IT costs,
Highly Available
428. Which of the statement is true for cloud computing. - Delivering computing
power as a service over Internet
429. The _____________ is that through modern scalable systems involved in cloud
computing and software as a service (SaaS), providers can create a sense of
infinite or immediately available resources by controlling resource adjustments
at a meta level. - Resource pooling
430. Which cloud network operated within a company's firewall? - Private Cloud
431.Lack of control over performance is one of the common risk of cloud
computing. -true
432. Which of the following layers managed by Cloud vendor in IaaS? - Storage,
Servers
433. In IaaS model Customers can increase and decrease the infrastructure
capacity as needed(True or False) - true
434. In which type of virtualization, virtual machine software installed in the
physical server. - Hardware Virtualization
435. Which of the cloud model exposes services only to specific organization? -
Private
436. Which type of IaaS security threats, where data is exposed? - data leaks
437. PaaS offered services may not be flexible enough for user needs(True of
False) - true
438. Which service is an example in PaaS for application deployment? - Elastic
Beanstalk
439. Which of the following is an Open source PaaS? - Cloud Foundry
450. Which of the following layer managed by customer in PaaS model? -
Application, Data
451. Which of the following layers managed by Cloud vendor in PaaS? - Network,
Storage
452. In SaaS model Servers are managed by the customers (True or False) - false
453. Open source software used in a SaaS is called _______ SaaS. - open
454. In SaaS model which of the layers managed by cloud vendor - all of the
options ( Runtime,Network,Application)
455. Low cost of ownership is one the user benefit in SaaS (True or False) -true
456. Which software distribution model in which applications are hosted by a
vendor and made available to customers. - SaaS
457. Which of the following storage is an object storage in Azure ? - blob
458. Which Azure management tool analyzes resources and provides recommendations
to optimize deployments? - Azure Advisor
459. Azure IOT hub is a managed service hosted in the cloud that acts as a
Message Hub? - true
460. Which of the following are azure management tool? - Azure portal, Azure CLI
461. Azure VMs and storage services fall under which of the following cloud
computing models? - IaaS
462. Economies of scale is. - Purchase computing resources in massive quantities
at lower costs
463. Which instance type allows you to choose for one or three years? - Reserved
instance
464. In well-architected framework, which pillar is used to recover from
failures and continue to function? - Reliability
465. In Well architected framework, which pillar is used for protecting
application data from threats? - Security
467. 80 % of fortune 500 companies are using Microsoft Azure as their cloud
computing model - true
468. Which availability sets provide a physical separation of workloads across
different hardware in a data center. - Fault domains (FD)
469. Which service in Azure is used to manage resources in Azure? - Azure
Resource Manager
470. Every resource created in Azure must exist in - Resource group
471. Availability zones allow customers to run mission-critical applications
with high availability and low-latency replication. (True or False) - true
472. Which architectural components contains two or more regions that preserve
data residency and compliance boundaries - Geographies
473. Which virtual machine service also called serverless computing? - Functions
474. Which azure storage is used to store different type of data as object? -
Blob storage
475. Which of the following database service is a NoSQL database? - Azure Cosmos
DB
476. ________________is a distributed network of servers that can efficiently
deliver web content to users? - Content Delivery Network
477. Which of the following is not an azure compute service. - OpenStack
478. Right time to consider for migration to cloud - Server hardware is reaching
end of its lifecycle
479. When migrating to the cloud an organization must evaluate its security and
regulatory compliance needs.(True or False) - true
480. What are the issues with on-premise when compared to cloud? - All of the
options (High maintenance cost, Scalability, Availability)
481. You have to choose the deployment model suitable for your application and
business. They have sensitive data which cannot be move to public cloud. -
Hybrid Cloud
482. Take care of these points while choosing a cloud service - Administration
support, Security practices
483. Which windows version operating system can be upgraded to windows 10 single
edition? - Windows 8 single edition
484. Which installation method is used to install Windows operating systems
concurrently for 100 systems - Network Installation
485. Which windows 10 edition not comes with Hyper-V? - Windows 10 Single
Edition
486. Virtual Desktops are used to keep the opened apps better organized (Say
True or False) - true
487. Which applications can be seen in the taskbar in windows 10 operating
system - Running
488. which one of the feature comes along with windows 10 operating system?
(Select Two) - virtual Desktop, Cortana
489. Where can you find the connected speakers in the system? - devices and
printers
490. Drivers are stored in drive store. In which location the driver store is
located? - c:\windows\system32\driverstore
491. Which command is used to check the driver is signed or not - sigverif.exe
492. Which tool is used to analyse the performance of the system? - Monitoring
tool
493. what is the tool name that the event information is captured in the system?
- Event Veiwer
494. Which log level is highly fatal and needs to give attention? - critical
495. Broadcast IP address can be assigned to the system? (Say True or False) -
true
496. How the communication happens between two computers - ip address
497. What protocol can be used as authentication protocol in VPN? (Choose Two) -
CHAP, PAP
498. What is the command used to create invitations in Remote assistance? - msra
499. Which service is used to manage communication and authentication in
powershell? - WinRM
500. Which tool is used to manage the computer system remotely without user
intervention? - Remote Destop
501.During the installation of windows 10 operating system, the user account is
created. What effective permission is available for the user? - Adminstrators
502. Which method can be used for authentication in Windows 10 Operating system?
( Select Two) - Biometric, Password
503. Where the credential informations are stored for credential manager in
windows 10 operating system? - Vault
504. In bitlocker, the credentials are stored in which location? - TPM Chip
505. What type of mechanism is used if the hard disk is stolen from the system
and the data is protected? - bitlocker
506. Fault tolerance partition can be configured in basic disk of windows 10
operating system?(Say True or False) - false
507. What are the types of storage disks available in windows 10 operating
system? - Basic Disk
508.
509.How many maximum partitions can be created in GPT disk ? - 128
510. Once the folder is shared, how will you access the shared folder in windows
10 operating system?( Select Two) - system name, IP address
511. Folders and files can be deleted, if the user is having read & execute
permission - false
512. Which protocol is used to share the folder in windows 10 operating system?
- SMB
513. Backed up files are stored in the format of ___________ - zip format
514. Select the one which backups only libraries, desktop and favourites -File
History
515. Is there any possibility to use 32 bit operating system recovery drive for
64 bit operating system?(Say True or False) - false
516. Who developed the powershell ? - Microsoft
517. Windows Powershell is a_______ - Scripting Language
518. Windows Powershell isdesigned to______ - Automate Tasks
519. In which year the powershell was introduced? - 2006
520. Windows PowerShell has both a command-line environment and a graphical
environment for running commands and scripts - true
521. PowerShell passes objects from one command to another via what? - Pipeline
522. What naming convention do PowerShell cmdlets adopt that makes them easy to
learn? - Verb-Noun
523. What can you use to find information about a given object? - Get-member
524. How do you use a power shell to show all of the options for a particular
command? - typing "help *command*"
525. Syntax for displaying the methods and properties by which we can pipe our
output to Get-Member by_____ - Get-Process | Ger-Member
526. What is the purpose of a brace bracket {}? - These types of brackets are
used in the blocked statements.
527. What is a string type variable? - A string of text
528. A script is just a set of commands which are stored in a ? - Text file
529. Linux counterpart is referred to as __________ - bash scripting
530. Which perform an action that is available to the file name extension of the
file specified? - verb
531. What is the character that specifies a variable? - $
532. What is the command to write something to the console display? - write-host
533. When you want to enter multiple commands on a single command line which
charcter is used to separate each command. - :
534. Which combination of keys used to clear the command history ? - Alt +F7
535. Which mode is intended to parse arguments and command parameters in a shell
environment ? - Argument mode
536. Which command writes to the standard output stream ? - write-host
537. Which command sends the specified object down the pipeline to the next one?
- write-output
538. Which command's output as a list of properties in which each property is
shown on a separate line? - Format-List
539. Which cmdlet selects the properties of an object or a group of objects ? -
select-object
540. Which command displays objects in groups based on the value of the property
you specified ? - Group-object
541. A list of snapins, .NET assemblies, or both loaded by the module. -
NestedModules
542. Which Imports one or more available modules into the current session. -
Import-module
543. Which removes a module that you added to the current session? - Remove-
Module
544. Which Creates a module based on script blocks, functions, and cmdlets that
you specify ? - New-Module
545. Which command can list the available modules? - get-module -listavailable
546. "*=" is an one of the assignment operator in windows powershell. - true
547. ________is the element of an expression that tells PowerShell how to
perform the calculation. - Operator
548. Which option is used to group collections of statements. The grouped
commands are executed, and then results are returned. - $()
549. Which one matches one character in a specified subset of characters? - []
550. Which one is not a comparison operator? - -rename
551. Which command is used to set the variable value to NULL? - clear-variable
552. Which option lists all or specified variables set in the current session by
name and value? - get-variable
553. $mynumber=1, $mynumber=2. What will the final value of a variable mynumber?
- 2
554. A Boolean value is always either True or False? - true
555. Variables are the placeholders for _____ - values
556. _______ is a series of alphanumeric or non-alphanumeric characters. -
string
557. Which options are used to Joins strings by adding them together with or
without delimiters - -join
558. Which character to force PowerShell to interpret a single quotation mark, a
double quotation mark, or a variable literally. - apostrope
559. Which format specifier is used to convert a numeric format to currency
format? - :c
560. Data strings are one of the type of multiline string - true
561. With multidimensional arrays, you access elements in the array by
specifying ______ index values. - multiple
562. How will you ensure an array can store only strings, numbers, or objects of
a particular type? - array type
563. _______are data structures for storing a series of values - arrays
564. Which array is used like spreadsheet with rows and colums? - two-
dimentional
565. which option is used instead of commas to separate values in cast array
structure? - semicolon
566. Script functions that are made available through_____ - .psm1files
567. The Get-Help cmdlet is the equivalent command of a _____ - shells man
568. Which format specifier is used to convert a numberic value to a percentage?
- :p
569. How Snapins of PowerShell made available in ? - .dll files
570. Which key is used to switch between insert mode and overwrite mode.? -
insert
571. _____ scopes are created automatically each time a function, script, or
filter runs - local
572. Which cmdlet sends the output to a file ? - out-file
573. What is the platform of Powershell? - .NET Framework
574. which scopes are not shared across instances of PowerShell? - global
575. Which operator is used to converts the input to the specified .NET
Framework type.? - -as
576. Which will load the profile of the Windows user for the current user.? -
LocalUserProfiel
577. When using the PowerShell CLI, the basic syntax of a Power-Start cmdlet
is_____ - PS C:\> Start-Process <String>
578. which options is used to separate a string on spaces or a specified
delimiter? - -split
579. Which cmdlet creates a credential object for the specified username and
password ? - get-credential
580. ________ scope applies to an entire PowerShell instance. - global
581. Which character is used to match at the end character? - $
582. In PowerShell, what is the basic command element? - cmdlet
583. what is the command to lists all or specified aliases set in the current
session by name and definition - get-alias
584. Which operator is used when both the statements are true? - AND
585. Which command outputs the entire file of logging.txt to the PowerShell ISE
screen.? - get-content
586. In which format the Powershell scripts are stored in the system? - .ps1
587. What is the default history commands in powershell ? - 50
588. How wil you import the WebAdminstration module? - import-module
webadministration
589. Identify Which sends the output of the first command to be the input of the
second command. - command1 | command2
590. A safer alternative to Command Prompt in windows operating system? -
powershell
591. Which instance member is used to return the character length of the string?
- Length
592. Which operator is used to change the format of the output from any cmdlet?
- pipe
593. What combination of keys use to exit the subprompt or terminate execution?
-Ctrl +C
594. which parameter is used to import aliases that are already defined and set
as read-only? - -force
595. Which variable stores the current object in the pipeline object set? - S_
596. which read-only attribute is set to prevent automatic overwriting of an
existing alias file? - -noclobber
597. In LVM managed setup, the logical volumes can span multiple disks - true
598. Logical volumes are created inside a Volume group - true
599. pvcreate command is used to initialize storage for use by LVM - true
600. Logical extents maps to a physical extents - true
601. A message's content to someone or something that doesn't have a suitable
cryptographic key is _____ - mail
602. Which practice identifies metrics that reflect a customer's experience of a
service? - Service level management
603. The first step in hacking an IT device is to compromise which security
foundation? - Confidentiality
604. Which of the following are the different kinds of scanning? - Network,
vulnerability, and port
605. _____ is the process of determining plain text or a key. - Cryptanalysis
606. A hash function ensures that a message is complete. It ensures that the
message is not ___ - Changed
607. The Secure Socket Layer (SSL) is intended to provide security and
compression services to data granted by_____- Transport Layer
608. TCP's services are used by ___ on the well-known port 80. - HTTP
609. The sender of the message creates cypher text using his or her ___ in the
digital signature technique. - own private key
610. Which of these systems use a timestamp to determine when something is no
longer valid? - Public-Key Certificates
611. To secure data and passwords, one of the following options used is __ -
Encryption
612. HTTP connections use port _, while HTTPS connections use port___and use
SSL. - 80 & 443
613. What should be used to set user expectations for request fulfilment times?
- The time needed to realistically deliver the service
614. Which of the following is an example of workaround? - A server is restarted
to resolve an incident
615. Which service management dimension is focused on activities and how are
these coordinated? -Value streams and processes
616. The plaintext is encrypted with DES as blocks of how many bits. - 64
617. _____ are attempts by people to acquire sensitive information from you by
impersonating someone else. - Phishing scams
618. Since a transposition is a rearrangement of a message's symbols, it's also
known as ? - Permutation
619. Which process works with incident management to ensure that security
breaches are detected and logged? - Access management
620. Which of the following is the most significant activity in system hacking?
- Cracking passwords
621. What are MD4 and MD5? - Hashing algorithms
622. What does the acronym MitM stand for? - Man In The Middle
623. To shield our computer from hackers, we should turn on the ___ - Firewall
624. What security concept is exemplified by "if your manager requests root
access to a system you run, he or she should not be granted the right unless he
or she has a duty that needs that degree of access"? - Least Privilege
625. SSL is an abbreviation for- Secure Socket Layer
626. Which process is used to compare the value that new services offer with the
value of the services they have replaced? - Service portfolio management
627. Which of the following best defines programmes that can travel from system
to system and cause computer communication to be disrupted? -worm
628. What is the purpose of the 'service desk' practice? - To capture demand for
incident resolution and service requests
629. What enables you to connect to and log into a remote computer. Telnet
630. Which are the elements of process control? - Process owner, policy and
objectives
631. Which of the following is a valid technique for encryption? - Public key
encryption
632. The term "virus detection and removal software" refers to a programme that
can detect and remove viruses from a computer called - malware
633. This is a term used to describe when one person pretends to be another. -
Masquerade
634. Which is the most effective method that allows two parties to share a
symmetrical key in a secure manner. - RSA
635. Many applications use ____ authentication, where the user is identified by
two separate factors. - 2-factor
636. Which competencies are required by the 'service level management'
practice?- Business analysis and commercial management
637. Which statement about service desks is CORRECT? - The service desk should
work in close collaboration with support and development teams
639. The user is given a hardware system that creates a secret id that is linked
to the user id. Any time the user logs in, the user needs to provide the secret
id to the system. What is it? - secret key
640. The option of yum command that gives the information of installed packages
is ___ - list
641. Cloud services are delivered______ - Virtaully
642. A cmdlet always consists of a verb and a noun, separated by a hyphen. Pick
up the cmdlet verbs from the options. - put
643. The file resolv.conf contains the information of - DNS Server
644. Which of the files contain the file system details that need to be mounted
on the system boot? - /etc/fstab
645. Which of the cloud computing models offer a complete product for the
customers - SaaS
646. The user with the user id 300 is categorized as - Administrator
647. ____ is a package containing members of the PowerShell, such as cmdlets,
suppliers, features, workflows, variables, and aliases. - module
648. Which type of expressions are supported by a powershell? - arthimetic
expression
649. Which of the storage is a low cost storage used for storing rarely accessed
data? - Archive storage
650. Which feature of the cloud allows users to request for additional space -
rapid elasticity
651. Which of the load Balancers support path based routing - Application
Loadbalancer
652. To a host computer to participate in the network, it should be configured
with ___. - hostname and ip address
653. Which of the following database is offered by the Amazon database. - Aurora
654. What is the limitation for the number of VPCs per region? - 5
655. Which of the following are the benefits of PaaS? - lower total cost of
ownership,
656. ___ is a fully-managed, intelligent event routing service that uses a pub-
sub model for uniform - azure event grid
657. Which option is used as a placeholder for values in a powershell? - string
658. _____ contains two or more regions and preserves data residency. -
geographies
659. Amazon S3 has durability below __ - 99.999999999
660. The command to know the last synchronized time between a client and server
is ___ - ntpq-p
661. In which year was Microsoft Azure released - 2010
662. The services that run in the background is called ____ - background service
663. As an administrator, you need to install the OS for all the machines in the
network through network installation. Which are the services you choose? - DNS
664. Which Well Architected Framework pillars recommend implementing a strong
identity foundation? - security
665. What does the following command do?
who | wc –l - List the number of users logged in
666. Which is the command used to run the executable file from the powershell
command? - start-process <filename.exe>
667. An Example for a SaaS model is____ - Openshift
668. Payment options available for reserved instance are - No upfront, partial
payment
669. Which option provides alternate names for commands, functions, scripts,
files, executables, and other command elements? - module
671. NFS Service helps to share the files between ____ - to all available
network
672. ___ is a series of alphanumeric or non-alphanumeric characters - String
673. What are the points to be consider before migrating your application to
cloud - Consider your application and data, Consider Cloud storage capacity
674. Which command's output has a list of properties in which each property is
shown on a separate line? - Format-list
675. What is the command used to get the content in a file? - Get-content
<Filename.txt>
676. Which of the following AWS services is an example of IaaS? - Amazon EC2
677. Same AMI can be used to create instances in different regions - true
678. What is the powershell version of the Windows Server 2016 Operating system
- Powershell 5.1
679. Which IP address is the globally unique address? - public ip address
680. Which AWS services can host a Microsoft SQL Server database? (Select TWO) -