0% found this document useful (0 votes)
3 views66 pages

MCQQ

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 66

MCQ’s

You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific
Client-Server application to run on, because the application gets very slow returning query
data. You want to have the fastest possible access for the Client-Server App to the HDD's.
Which Raid should you apply?

• (A) RAID0
• (B) RAID1
• (C) RAID5
• (D) RAID2
You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific
Client-Server application to run on, because the application gets very slow returning query
data. You want to have the fastest possible access for the Client-Server App to the HDD's.
Which Raid should you apply?

• (A) RAID0
• (B) RAID1
• (C) RAID5
• (D) RAID2
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server
for a Branch office. You discover that an incorrect driver was installed during the installation
of the modem. You attempt to remove the modem by using Phone and Modem Options in
Control Panel. After each attempt to remove the modem by using this method, the computer
stops responding. You restart the computer again. You must install the correct driver for the
modem as quickly as possible. What should you do?

• (A) Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
• (B) Shut down the server, remove the modem card, and restart the server. Shut down the
server again, insert the modem card, and restart the server
• (C) Delete all references to modems in the registry
• (D) Run the Modem troubleshooter and remove the modem when prompted. Restart the
server
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server
for a Branch office. You discover that an incorrect driver was installed during the installation
of the modem. You attempt to remove the modem by using Phone and Modem Options in
Control Panel. After each attempt to remove the modem by using this method, the computer
stops responding. You restart the computer again. You must install the correct driver for the
modem as quickly as possible. What should you do?

• (A) Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
• (B) Shut down the server, remove the modem card, and restart the server. Shut down the
server again, insert the modem card, and restart the server
• (C) Delete all references to modems in the registry
• (D) Run the Modem troubleshooter and remove the modem when prompted. Restart the
server
Which of the following is not an advantage of
NAS?
• A NAS has lower latency and higher reliability than a SAN.
• A NAS typically supports multiple RAID methods.
• A NAS supports high throughput.
• Implementing a NAS is inexpensive
Which of the following is not an advantage of
NAS?
• A NAS has lower latency and higher reliability than a SAN.
• A NAS typically supports multiple RAID methods.
• A NAS supports high throughput.
• Implementing a NAS is inexpensive

• ANS( A. On the contrary, a NAS has higher latency and lower


reliability than a SAN.)
Which of the following is used as identifiers
for host bus adapters?
• MAC addresses
• World Wide Names
• IP addresses
• LUNs
Which of the following is used as identifiers
for host bus adapters?
• MAC addresses
• World Wide Names
• IP addresses
• LUNs

Ans( HBAs have World Wide Names (WWNs) that identify them, much
like MAC addresses.)
Which of the following is not a part of
hardening the system?

• Disabling all unused services


• Uninstalling unneeded applications
• Ensuring all patches are installed
• Ensuring sufficient processing power
Which of the following is not a part of
hardening the system?
• Disabling all unused services
• Uninstalling unneeded applications
• Ensuring all patches are installed
• Ensuring sufficient processing power

• Ans (Although a good idea, ensuring the server has sufficient


processing power is not a part of hardening the system as it does
nothing to reduce the attack surface.)
Which statement is true with respect to
hypervisors?
• Type II is called native.
• Type II runs directly on the host’s hardware.
• A Type II hypervisor runs within a conventional operating system
environment.
• VMware Workstation and VirtualBox exemplify Type I hypervisors.
Which statement is true with respect to
hypervisors?
• Type II is called native.
• Type II runs directly on the host’s hardware.
• A Type II hypervisor runs within a conventional operating system
environment.
• VMware Workstation and VirtualBox exemplify Type I hypervisors.
Which technique is used to allocate relative
access to the CPU among VMs?
• Reservations
• Limits
• Shares
• Time slots
Which technique is used to allocate relative
access to the CPU among VMs?
• Reservations
• Limits
• Shares
• Time slots
Which RAID type provides no fault tolerance?

A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5
Which RAID type provides no fault tolerance?

• A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5

RAID 0 is also known as disk striping. This is RAID that doesn't provide fault tolerance. Data
is written across multiple drives, so one drive can be reading or writing while the next
drive's read/write head is moving. This makes for faster data access. However, if any one
of the drives fails, all content is lost.
Which RAID type is also called mirroring?
• RAID 0
• RAID 1
• RAID 3
• RAID 5
Which RAID type is also called mirroring?
• RAID 0
• RAID 1
• RAID 3
• RAID 5
Which server role automates the process of providing an IP configuration to devices
in the
network?

• DNS
• Routing and Remote Access
• DHCP
• NTP
Which server role automates the process of providing an IP configuration to devices
in the
network?

• DNS
• Routing and Remote Access
• DHCP
• NTP
Which of the following protocols is used
when mail servers send email?
• POP3
SMTP
SNMP
IMAP4
Which of the following protocols is used
when mail servers send email?
• POP3
SMTP
SNMP
IMAP4
Which of the following describes a drive that needs to be disconnected from the
software in the server before begin changed out and then reconnected after the
swap is done?

• Hot pluggable
• Warm pluggable
• Cold pluggable
• Hot swappable
Which of the following describes a drive that needs to be disconnected from the
software in the server before begin changed out and then reconnected after the
swap is done?

• Hot pluggable
• Warm pluggable
• Cold pluggable
• Hot swappable
Which type of fault tolerance is recommended for servers running applications that do not
have long-running in-memory state or frequently updated data?

• Load balancing
• Hot site
• Clustering
• Cold site
Which type of fault tolerance is recommended for servers running applications that do not
have long-running in-memory state or frequently updated data?

• Load balancing
• Hot site
• Clustering
• Cold site
Which server role uses HTTP as its transfer
mechanism?
• Web
• Application
• Directory
• Database
Which server role uses HTTP as its transfer
mechanism?
• Web
• Application
• Directory
• Database
Which of the following are the software stubs that allow devices to communicate
with the operating system?

• A. Drivers
• B. Patches
• C. Shims
• D. Manifests
Which of the following are the software stubs that allow devices to communicate
with the operating system?

• A. Drivers
• B. Patches
• C. Shims
• D. Manifests
Which authentication mechanism is an
example of something you have?
• A. Password
• B. Username
• C. Smart card
• D. Retina scan
Which authentication mechanism is an
example of something you have?
• A. Password
• B. Username
• C. Smart card
• D. Retina scan

• Ans(While passwords and usernames are examples of something you


know and a retina scanis an example of something you are,
possessing a smart card is an example of something you have.)
Which of the following is not a drawback of
using active RFID chips?
• A. The tag signal can be read by any reader in range.
• B. The tag signal can only go a few feet.
• C. Multiple readers in an area can interfere with one another.
• D. Multiple devices can interfere with one another when responding.
Which of the following is not a drawback of
using active RFID chips?
• A. The tag signal can be read by any reader in range.
• B. The tag signal can only go a few feet.
• C. Multiple readers in an area can interfere with one another.
• D. Multiple devices can interfere with one another when responding.

• Ans(The tags can be of two types: passive and active. Active tags have batteries whereas
passive tags receive their energy from the reader when the reader interrogates the
device. As you would expect, the passive tags are cheaper but have a range of only a few
meters and the active tags are more expensive but can transmit up to a hundred meters.)
Which of the following offers the most flexibility in reacting to security
events?

• A. Cameras
• B. Security guards
• C. Motion sensors
• D. Intrusion prevention systems
Which of the following offers the most flexibility in reacting to security
events?

• A. Cameras
• B. Security guards
• C. Motion sensors
• D. Intrusion prevention systems

• Ans(Security guards offer the most flexibility in reacting to whatever


occurs. Guards can use discriminating judgment based on the situation,
which automated systems cannot do. This makes guards an excellent
addition to the layers of security you should be trying to create.)
Which of the following statements is false
with respect to safes?
• A. All safes are fireproof.
• B. United Laboratories (UL) assigns ratings to safes that you can use to assess the
suitability of the safe.
• C. Those that are fire resistant will protect a document from being destroyed.
• D. When considering a safe, you should focus on two items: the ease with which the safe
can be compromised and the ability of the safe to withstand a fire.
Which of the following statements is false
with respect to safes?
• A. All safes are fireproof.
• B. United Laboratories (UL) assigns ratings to safes that you can use to assess the
suitability of the safe.
• C. Those that are fire resistant will protect a document from being destroyed.
• D. When considering a safe, you should focus on two items: the ease with which the safe
can be compromised and the ability of the safe to withstand a fire.

• Ans(Security guards offer the most flexibility in reacting to whatever occurs.


Guards can use discriminating judgment based on the situation, which automated
systems cannot do. This makes guards an excellent addition to the layers of
security you should be trying to create.)
Which of the following is true of the
requirements to use SSL on a website?
• A. The web server must have a certificate.
• B. The client must have a certificate.
• C. The web server and the client must have a certificate.
• D. Neither the web server nor the client must have a certificate.
Which of the following is true of the
requirements to use SSL on a website?
• A. The web server must have a certificate.
• B. The client must have a certificate.
• C. The web server and the client must have a certificate.
• D. Neither the web server nor the client must have a certificate.

• Ans(SSL is related to a PKI in that a certificate is required on the


server end and optionally can be used on the client end of an SSL
communication.)
You have two devices that are connected to the same switch with IP addresses in the
same network. After placing the two devices in separate VLANs, they can no longer
ping one another. At what layer of the OSI model are the VLANs providing
separation?

• A. Network
• B. Data link
• C. Session
• D. Transport
You have two devices that are connected to the same switch with IP addresses in the
same network. After placing the two devices in separate VLANs, they can no longer
ping one another. At what layer of the OSI model are the VLANs providing
separation?

• A. Network
• B. Data link
• C. Session
• D. Transport

• Ans(Devices in different VLANs usually have IP addresses in different IP


subnets. However, even if they have IP addresses in the same subnet,
communication cannot occur without routing—if they reside in different
VLANs—because VLANs separate devices at Layer 2, or the Data Link layer,
of the OSI model.)
Which of the following is not true of an HIDS?
• A. A high number of false positives can cause a lax attitude on the part of the security team.
• B. An HIDS cannot address authentication issues.
• C. Encrypted packets cannot be analyzed.
• D. An HIDS monitors all traffic that goes through it looking for signs of attack on any machine in
the network.
Which of the following is not true of an HIDS?
• A. A high number of false positives can cause a lax attitude on the part of the security team.
• B. An HIDS cannot address authentication issues.
• C. Encrypted packets cannot be analyzed.
• D. An HIDS monitors all traffic that goes through it looking for signs of attack on any machine in
the network.

• Ans (When discussing network security, an endpoint is any point of entry into the network.
A typical example of an endpoint is a laptop connected to the network with a remote access
connection. Therefore, the process of providing endpoint security is the process of ensuring
that every endpoint (including servers) has been secured in the same way in which you
would secure the network gateway.)
Which of the following can read the individual commands of the protocols that are
being served?

• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall
Which of the following can read the individual commands of the protocols that are
being served?

• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall

• Ans(The proxy function can occur at either the application level or the
circuit level. Application-level proxy functions read the individual
commands of the protocols that are being served. This type of server
is advanced and must know the rules and capabilities of the protocol
used.)
In which of the following devices are records kept using a table that tracks every
communications
channel?

• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall
In which of the following devices are records kept using a table that tracks every
communications
channel?

• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall

• Ans(In stateful inspection (or stateful packet filtering), records are


kept using a state table that tracks every communications channel.)
Which statement is false with respect to router ACLs?

• A. The order of the rules is important.


• B. An implied deny all rule is located at the end of all ACLs.
• C. It is possible to log all traffic that meets any of the rules.
• D. All rules in the list are considered before the traffic is allowed.
Which statement is false with respect to router ACLs?

• A. The order of the rules is important.


• B. An implied deny all rule is located at the end of all ACLs.
• C. It is possible to log all traffic that meets any of the rules.
• D. All rules in the list are considered before the traffic is allowed.

• Ans(If traffic matches a rule, the action specified by the rule will be
applied, and no other rules will be read.)
Which of the following is true of the
requirements to use SSL on a website?
• A. The web server must have a certificate.
• B. The client must have a certificate.
• C. The web server and the client must have a certificate.
• D. Neither the web server nor the client must have a certificate.
Which of the following is true of the
requirements to use SSL on a website?
• A. The web server must have a certificate.
• B. The client must have a certificate.
• C. The web server and the client must have a certificate.
• D. Neither the web server nor the client must have a certificate.

• Ans(SSL is related to a PKI in that a certificate is required on the


server end and optionally can be used on the client end of an SSL
communication.)
Which of the following cannot be accomplished using port security?

• A. Set the minimum number of MAC addresses that can be seen on a


port.
• B. Take a specific action when a port violation occurs.
• C. Define exactly which MAC addresses are allowed on the port.
• D. Set the maximum number of MAC addresses that can be seen on a
port.
Which of the following cannot be accomplished using port security?

• A. Set the minimum number of MAC addresses that can be seen on a port.
• B. Take a specific action when a port violation occurs.
• C. Define exactly which MAC addresses are allowed on the port.
• D. Set the maximum number of MAC addresses that can be seen on a port.

• Ans(It is not possible to specify a minimum number of MAC addresses allowed on


a port.)
Which of the following would Joe use to encrypt a
message that only Sally could decrypt?
• A. Joe’s private key
• B. Sally’s private key
• C. Joe’s public key
• D. Sally’s public key
Which of the following would Joe use to encrypt a
message that only Sally could decrypt?
• A. Joe’s private key
• B. Sally’s private key
• C. Joe’s public key
• D. Sally’s public key

• Ans(To provide encryption, the data is encrypted with the receiver’s


public key, which results in cipher text that only his private key can
decrypt.)
You have two devices that are connected to the same switch with IP addresses in the
same network. After placing the two devices in separate VLANs, they can no longer
ping one another. At what layer of the OSI model are the VLANs providing
separation?

• A. Network
• B. Data link
• C. Session
• D. Transport
You have two devices that are connected to the same switch with IP addresses in the
same network. After placing the two devices in separate VLANs, they can no longer
ping one another. At what layer of the OSI model are the VLANs providing
separation?

• A. Network
• B. Data link
• C. Session
• D. Transport

• Ans(Devices in different VLANs usually have IP addresses in different IP subnets.


However, even if they have IP addresses in the same subnet, communication
cannot occur without routing—if they reside in different VLANs—because VLANs
separate devices at Layer 2, or the Data Link layer, of the OSI model.)
Which of the following has lost favor to SSH because it sends data—
including passwords— in plain-text format?

• A. POP3
• B. Telnet
• C. RDP
• D. IMAP
Which of the following has lost favor to SSH because it sends data—
including passwords— in plain-text format?

• A. POP3
• B. Telnet
• C. RDP
• D. IMAP

• Ans(Telnet is a protocol that functions at the Application layer of the


OSI model, providing terminal-emulation capabilities. Telnet runs on
port 23, but has lost favor to SSH because Telnet sends data—
including passwords—in plain-text format.)
If a process fails, most operating system write the
error information to a ______
a) new file
b) another running process
c) log file
d) none of the mentioned
Answer: c
Explanation: If a process fails, most operating systems write the error
information to a log file. Log file is examined by the debugger, to find
out what is the actual cause of that particular problem. Log file is useful
for system programmers for correcting errors.
Unit 1
1.Hardware MCQ [Free PDF] - Objective Question Answer for
Hardware Quiz - Download Now! (testbook.com)
2.30+ Computer Hardware MCQ Questions and Answers -
Computer GK (examsegg.com)
3.Switching Network MCQs - Data Communication and
Networking - EXAMRADAR
Unit 2
1.Windows Server Questions and Answers - Set 01 -
ObjectiveBooks
2.Windows Server Quiz Questions And Answers - ProProfs Quiz
3.Access Control questions & answers for quizzes and
worksheets - Quizizz
4.Multiple Choice Questions/Answers for Windows – With
Explanation - Yeah Hub
5.MCQ Tutorial - MCQ Questions in Analysis, SLA & Scenario
Analysis
6.250+ TOP MCQs on Performance Monitoring and Answers
2023 (engineeringinterviewquestions.com)
7.SQL Server Monitoring and Auditing MCQs - SQL Server
Interview Objective Questions and Answers (allindiaexams.in)
Unit 3
1.Test: Firewalls | 10 Questions MCQ Test Computer Networks
Computer Science Engineering (CSE) (edurev.in)
2.Firewalls questions & answers for quizzes and worksheets -
Quizizz
3.Test: Intrusion Detection Systems | 10 Questions MCQ Test
Computer Science Engineering (CSE) (edurev.in)
4.IDS/IPS quiz: Intrusion detection and prevention systems |
TechTarget
5.250+ TOP MCQs on Security – Intrusion Detection and
Answers 2023 (engineeringinterviewquestions.com)
6.Data Security MCQ Questions And Answers - Letsfindcourse
7.Network Security MCQ [Free PDF] - Objective Question
Answer for Network Security Quiz - Download Now!
(testbook.com)
8.Physical Security Quiz | Federal Trade Commission (ftc.gov)
9.05- Physical Security QUIZ Flashcards by James McCarter |
Brainscape
10.75 Virtual LAN Multiple Choice Questions (MCQ) with
Answers (watelectronics.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy