Accenture Networking
Accenture Networking
NETWORKING,
SECURITY, AND
CLOUD
What is the primary function of a router in a
network?
W W W. P R I M E C O D I N G . I N
Which protocol is used to ensure secure
remote login?
• A) FTP
• B) HTTP
• C) SSH (Secure Shell)
• D) SMTP
Which protocol is used to ensure secure
remote login?
• A) FTP
• B) HTTP
• C) SSH (Secure Shell)
• D) SMTP
What does IDS stand for in network
security?
• A) Information Detection System
• B) Internet Data System
• C) Intrusion Detection System
• D) Internal Data System
What does IDS stand for in network
security?
• A) Information Detection System
• B) Internet Data System
• C) Intrusion Detection System
• D) Internal Data System
What is the main benefit of cloud elasticity?
• A) Fixed resource allocation
• B) High maintenance cost
• C) The ability to scale computing
resources up or down as needed
• D) Limited storage capacity
What is the main benefit of cloud elasticity?
• A) Fixed resource allocation
• B) High maintenance cost
• C) The ability to scale computing
resources up or down as needed
• D) Limited storage capacity
What does hybrid cloud refer to?
• A) A private cloud only
• B) A public cloud only
• C) A combination of private and public
cloud environments
• D) A type of cloud storage
What does hybrid cloud refer to?
• A) A private cloud only
• B) A public cloud only
• C) A combination of private and public
cloud environments
• D) A type of cloud storage
What is cloud migration?
• A) The process of moving data,
applications, or other business elements
to a cloud computing environment
• B) The process of creating cloud
applications
• C) The process of securing cloud data
• D) The process of networking cloud
resources
What is cloud migration?
• A) The process of moving data,
applications, or other business elements
to a cloud computing environment
• B) The process of creating cloud
applications
• C) The process of securing cloud data
• D) The process of networking cloud
resources
Which cloud service provider is known for
its simple storage service (S3)?
• A) Google Cloud
• B) Microsoft Azure
• C) IBM Cloud
• D) AWS (Amazon Web Services)
Which cloud service provider is known for
its simple storage service (S3)?
• A) Google Cloud
• B) Microsoft Azure
• C) IBM Cloud
• D) AWS (Amazon Web Services)
What command allows you to determine
whether an IP access list is enabled on a
particular interface?
• A) show ip access-list
• B) show ip interface
• C) show ip route
• D) show ip protocol
What command allows you to determine
whether an IP access list is enabled on a
particular interface?
• A) show ip access-list
• B) show ip interface
• C) show ip route
• D) show ip protocol
What router command will permit SMTP
mail to only host 1.1.1.1?
• A) access-list 110 deny tcp any host
1.1.1.1 eq smtp
• B) access-list 110 permit tcp any host
1.1.1.1 eq smtp
• C) access-list 110 permit udp any host
1.1.1.1 eq smtp
• D) access-list 110 permit icmp any host
1.1.1.1 eq smtp
What router command will permit SMTP
mail to only host 1.1.1.1?
• A) access-list 110 deny tcp any host
1.1.1.1 eq smtp
• B) access-list 110 permit tcp any host
1.1.1.1 eq smtp
• C) access-list 110 permit udp any host
1.1.1.1 eq smtp
• D) access-list 110 permit icmp any host
1.1.1.1 eq smtp
What type of network security device scans
for viruses and malware?
• A) Firewall
• B) IDS
• C) Antivirus scanning devices
• D) VPN
What type of network security device scans
for viruses and malware?
• A) Firewall
• B) IDS
• C) Antivirus scanning devices
• D) VPN
Which cloud service provider should be
chosen for extensive support of Linux,
Windows Server, and SQL Server?
• A) Google Cloud
• B) AWS
• C) Azure
• D) IBM Cloud
Which cloud service provider should be
chosen for extensive support of Linux,
Windows Server, and SQL Server?
• A) Google Cloud
• B) AWS
• C) Azure
• D) IBM Cloud
How can you stop automatic numbering in
MS Word?
• A) Press the Esc key
• B) Press the Enter key twice or click the
Numbering button again
• C) Click the Format menu
• D) Right-click and select Stop
Numbering
How can you stop automatic numbering in
MS Word?
• A) Press the Esc key
• B) Press the Enter key twice or click the
Numbering button again
• C) Click the Format menu
• D) Right-click and select Stop
Numbering
Which key combination is used to select a
word or phrase in MS Word?
• A) Ctrl+Shift
• B) Ctrl+Alt
• C) Shift
• D) Alt+Tab
Which key combination is used to select a
word or phrase in MS Word?
• A) Ctrl+Shift
• B) Ctrl+Alt
• C) Shift
• D) Alt+Tab
What is the shortcut key to open the Find
dialog box in MS Word?
• A) Ctrl+H
• B) Ctrl+G
• C) Ctrl+F
• D) Ctrl+P
What is the shortcut key to open the Find
dialog box in MS Word?
• A) Ctrl+H
• B) Ctrl+G
• C) Ctrl+F
• D) Ctrl+P
How would you close a tab in a browser?
• A) Ctrl+T
• B) Ctrl+W
• C) Ctrl+Q
• D) Ctrl+R
How would you close a tab in a browser?
• A) Ctrl+T
• B) Ctrl+W
• C) Ctrl+Q
• D) Ctrl+R
In Excel, what function finds the highest
value in a range of cells?
• A) SUM
• B) AVG
• C) MAX
• D) MIN
In Excel, what function finds the highest
value in a range of cells?
• A) SUM
• B) AVG
• C) MAX
• D) MIN
Which command takes you two steps
backward from any particular directory in
the command prompt?
• A) cd ..
• B) cd ../..
• C) cd ~
• D) cd /
Which command takes you two steps
backward from any particular directory in
the command prompt?
• A) cd ..
• B) cd ../..
• C) cd ~
• D) cd /
What does a green underline in MS Word
signify?
• A) Spelling error
• B) Contextual error
• C) Grammatical error
• D) Formatting error
What does a green underline in MS Word
signify?
• A) Spelling error
• B) Contextual error
• C) Grammatical error
• D) Formatting error
Which Excel feature quickly applies a set of
formatting choices to a range of cells?
• A) Cell Styles
• B) Conditional Formatting
• C) Data Validation
• D) PivotTable
Which Excel feature quickly applies a set of
formatting choices to a range of cells?
• A) Cell Styles
• B) Conditional Formatting
• C) Data Validation
• D) PivotTable
In a network, what attack involves forging
an IP address to impersonate another
device?
• A) Spoofing
• B) Phishing
• C) Hacking
• D) Spamming
In a network, what attack involves forging
an IP address to impersonate another
device?
• A) Spoofing
• B) Phishing
• C) Hacking
• D) Spamming
RESOURCES