0% found this document useful (0 votes)
54 views91 pages

Accenture Networking

Uploaded by

binduvarsha2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views91 pages

Accenture Networking

Uploaded by

binduvarsha2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 91

ACCENTURE

NETWORKING,
SECURITY, AND
CLOUD
What is the primary function of a router in a
network?

• A) To connect devices within a single


network
• B) To forward data packets between
computer networks
• C) To store and retrieve data
• D) To monitor network traffic
What is the primary function of a router in a
network?

• A) To connect devices within a single


network
• B) To forward data packets between
computer networks
• C) To store and retrieve data
• D) To monitor network traffic
What protocol is used for secure data
transmission over the internet?
• A) HTTP
• B) FTP
• C) HTTPS
• D) SMTP
What protocol is used for secure data
transmission over the internet?
• A) HTTP
• B) FTP
• C) HTTPS
• D) SMTP
What is a firewall's main purpose?
• A) To enhance network speed
• B) To block unauthorized access while
permitting outward communication
• C) To store backup data
• D) To manage network addresses
What is a firewall's main purpose?
• A) To enhance network speed
• B) To block unauthorized access while
permitting outward communication
• C) To store backup data
• D) To manage network addresses
Which security method encrypts data to
prevent unauthorized access?
• A) Compression
• B) Encryption
• C) Decryption
• D) Fragmentation
Which security method encrypts data to
prevent unauthorized access?
• A) Compression
• B) Encryption
• C) Decryption
• D) Fragmentation
What does AES stand for in encryption?
• A) Advanced Encryption Standard
• B) Application Encryption System
• C) Automatic Encryption System
• D) Advanced Encoding System
What does AES stand for in encryption?
• A) Advanced Encryption Standard
• B) Application Encryption System
• C) Automatic Encryption System
• D) Advanced Encoding System
Which encryption algorithm uses a 56-bit
key?
• A) RSA
• B) AES
• C) DES
• D) Blowfish
Which encryption algorithm uses a 56-bit
key?
• A) RSA
• B) AES
• C) DES
• D) Blowfish
What type of device is a UTM?
• A) Universal Traffic Monitor
• B) Unified Threat Management device
• C) Universal Transmission Module
• D) Unified Transmission Manager
What type of device is a UTM?
• A) Universal Traffic Monitor
• B) Unified Threat Management device
• C) Universal Transmission Module
• D) Unified Transmission Manager
Which device inspects incoming and
outgoing network traffic and decides
whether to allow or block specific traffic
based on a defined set of security rules?
• A) Switch
• B) Router
• C) Firewall
• D) Hub
Which device inspects incoming and
outgoing network traffic and decides
whether to allow or block specific traffic
based on a defined set of security rules?
• A) Switch
• B) Router
• C) Firewall
• D) Hub
What is a DDoS attack?
• A) Data Decryption Over System
• B) Distributed Denial of Service attack
• C) Direct Data Overwrite Service
• D) Distributed Data Operation Service
What is a DDoS attack?
• A) Data Decryption Over System
• B) Distributed Denial of Service attack
• C) Direct Data Overwrite Service
• D) Distributed Data Operation Service
Which attack involves sending unsolicited
bulk messages?
• A) Phishing
• B) Hacking
• C) Spam
• D) Spoofing
Which attack involves sending unsolicited
bulk messages?
• A) Phishing
• B) Hacking
• C) Spam
• D) Spoofing
What is phishing?
• A) A technique to gain personal
information for identity theft, using
fraudulent emails
• B) A type of malware
• C) A network protocol
• D) A firewall configuration
What is phishing?
• A) A technique to gain personal
information for identity theft, using
fraudulent emails
• B) A type of malware
• C) A network protocol
• D) A firewall configuration
What is a stateful firewall?
• A) A firewall that blocks all incoming traffic
• B) A firewall that inspects each packet
individually
• C) A firewall that monitors the state of active
connections and determines which network
packets to allow through the firewall
• D) A firewall that only allows outgoing traffic
What is a stateful firewall?
• A) A firewall that blocks all incoming traffic
• B) A firewall that inspects each packet
individually
• C) A firewall that monitors the state of active
connections and determines which network
packets to allow through the firewall
• D) A firewall that only allows outgoing traffic
What is a packet-filtering firewall?
• A) A firewall that filters traffic by
examining the header of each packet
• B) A firewall that encrypts all outgoing
traffic
• C) A firewall that monitors user
activities
• D) A firewall that blocks all external
connections
What is a packet-filtering firewall?
• A) A firewall that filters traffic by
examining the header of each packet
• B) A firewall that encrypts all outgoing
traffic
• C) A firewall that monitors user
activities
• D) A firewall that blocks all external
connections
What is cloud computing?
• A) The delivery of computing services
over the internet
• B) A type of computer hardware
• C) A software development method
• D) A network protocol
What is cloud computing?
• A) The delivery of computing services
over the internet
• B) A type of computer hardware
• C) A software development method
• D) A network protocol
What does IaaS stand for?
• A) Information as a Service
• B) Infrastructure as a Service
• C) Internet as a Service
• D) Interface as a Service
What does IaaS stand for?
• A) Information as a Service
• B) Infrastructure as a Service
• C) Internet as a Service
• D) Interface as a Service
What is the primary role of a client in a
client-server architecture?
• A) To request services from a server
• B) To manage network traffic
• C) To store data
• D) To provide services to other clients
What is the primary role of a client in a
client-server architecture?
• A) To request services from a server
• B) To manage network traffic
• C) To store data
• D) To provide services to other clients
What is a server?
• A) A network protocol
• B) A computer or system that provides
resources, data, services, or programs to
other computers, known as clients, over
a network
• C) A type of software application
• D) A security device
What is a server?
• A) A network protocol
• B) A computer or system that provides
resources, data, services, or programs to
other computers, known as clients, over
a network
• C) A type of software application
• D) A security device
What is a cloud data center?
• A) A facility used to house computer
systems and associated components for
cloud computing
• B) A type of cloud storage
• C) A software development platform
• D) A type of network protocol
What is a cloud data center?
• A) A facility used to house computer
systems and associated components for
cloud computing
• B) A type of cloud storage
• C) A software development platform
• D) A type of network protocol
What is a key advantage of using cloud data
centers?
• A) Limited storage capacity
• B) High maintenance cost
• C) Scalability and flexibility in resource
management
• D) Fixed resource allocation
What is a key advantage of using cloud data
centers?
• A) Limited storage capacity
• B) High maintenance cost
• C) Scalability and flexibility in resource
management
• D) Fixed resource allocation
Name a popular cloud service provider.
• A) Oracle
• B) AWS (Amazon Web Services)
• C) SAP
• D) IBM
What is the primary service offered by
Google Cloud?
• A) Cloud computing services
• B) Hardware sales
• C) Internet browsing
• D) Social networking
What is the primary service offered by
Google Cloud?
• A) Cloud computing services
• B) Hardware sales
• C) Internet browsing
• D) Social networking
What is Microsoft Azure primarily known
for?
• A) Providing search engine services
• B) Offering e-commerce solutions
• C) Providing a range of cloud services
including analytics, storage, and
networking
• D) Developing mobile applications
Which cloud platform is known for its
extensive machine learning services?
• A) IBM Cloud
• B) Google Cloud Platform
• C) Oracle Cloud
• D) Salesforce
Which cloud platform is known for its
extensive machine learning services?
• A) IBM Cloud
• B) Google Cloud Platform
• C) Oracle Cloud
• D) Salesforce
What does PaaS stand for?
• A) Program as a Service
• B) Platform as a Service
• C) Protocol as a Service
• D) Process as a Service
What does PaaS stand for?
• A) Program as a Service
• B) Platform as a Service
• C) Protocol as a Service
• D) Process as a Service
Which cloud service model provides on-
demand software applications?
• A) SaaS (Software as a Service)
• B) DaaS (Data as a Service)
• C) CaaS (Content as a Service)
• D) BaaS (Backup as a Service)
Which cloud service model provides on-
demand software applications?
• A) SaaS (Software as a Service)
• B) DaaS (Data as a Service)
• C) CaaS (Content as a Service)
• D) BaaS (Backup as a Service)
What is the function of a VPN?
• A) To increase internet speed
• B) To create a secure connection over a
less secure network
• C) To block unwanted emails
• D) To manage network traffic
What is the function of a VPN?
• A) To increase internet speed
• B) To create a secure connection over a
less secure network
• C) To block unwanted emails
• D) To manage network traffic
Mock 1:1 Interview Session
• Ace Your Interviews
• Expert Feedback
• Real-World Simulation
• Boost Your Confidence

W W W. P R I M E C O D I N G . I N
Which protocol is used to ensure secure
remote login?
• A) FTP
• B) HTTP
• C) SSH (Secure Shell)
• D) SMTP
Which protocol is used to ensure secure
remote login?
• A) FTP
• B) HTTP
• C) SSH (Secure Shell)
• D) SMTP
What does IDS stand for in network
security?
• A) Information Detection System
• B) Internet Data System
• C) Intrusion Detection System
• D) Internal Data System
What does IDS stand for in network
security?
• A) Information Detection System
• B) Internet Data System
• C) Intrusion Detection System
• D) Internal Data System
What is the main benefit of cloud elasticity?
• A) Fixed resource allocation
• B) High maintenance cost
• C) The ability to scale computing
resources up or down as needed
• D) Limited storage capacity
What is the main benefit of cloud elasticity?
• A) Fixed resource allocation
• B) High maintenance cost
• C) The ability to scale computing
resources up or down as needed
• D) Limited storage capacity
What does hybrid cloud refer to?
• A) A private cloud only
• B) A public cloud only
• C) A combination of private and public
cloud environments
• D) A type of cloud storage
What does hybrid cloud refer to?
• A) A private cloud only
• B) A public cloud only
• C) A combination of private and public
cloud environments
• D) A type of cloud storage
What is cloud migration?
• A) The process of moving data,
applications, or other business elements
to a cloud computing environment
• B) The process of creating cloud
applications
• C) The process of securing cloud data
• D) The process of networking cloud
resources
What is cloud migration?
• A) The process of moving data,
applications, or other business elements
to a cloud computing environment
• B) The process of creating cloud
applications
• C) The process of securing cloud data
• D) The process of networking cloud
resources
Which cloud service provider is known for
its simple storage service (S3)?
• A) Google Cloud
• B) Microsoft Azure
• C) IBM Cloud
• D) AWS (Amazon Web Services)
Which cloud service provider is known for
its simple storage service (S3)?
• A) Google Cloud
• B) Microsoft Azure
• C) IBM Cloud
• D) AWS (Amazon Web Services)
What command allows you to determine
whether an IP access list is enabled on a
particular interface?
• A) show ip access-list
• B) show ip interface
• C) show ip route
• D) show ip protocol
What command allows you to determine
whether an IP access list is enabled on a
particular interface?
• A) show ip access-list
• B) show ip interface
• C) show ip route
• D) show ip protocol
What router command will permit SMTP
mail to only host 1.1.1.1?
• A) access-list 110 deny tcp any host
1.1.1.1 eq smtp
• B) access-list 110 permit tcp any host
1.1.1.1 eq smtp
• C) access-list 110 permit udp any host
1.1.1.1 eq smtp
• D) access-list 110 permit icmp any host
1.1.1.1 eq smtp
What router command will permit SMTP
mail to only host 1.1.1.1?
• A) access-list 110 deny tcp any host
1.1.1.1 eq smtp
• B) access-list 110 permit tcp any host
1.1.1.1 eq smtp
• C) access-list 110 permit udp any host
1.1.1.1 eq smtp
• D) access-list 110 permit icmp any host
1.1.1.1 eq smtp
What type of network security device scans
for viruses and malware?
• A) Firewall
• B) IDS
• C) Antivirus scanning devices
• D) VPN
What type of network security device scans
for viruses and malware?
• A) Firewall
• B) IDS
• C) Antivirus scanning devices
• D) VPN
Which cloud service provider should be
chosen for extensive support of Linux,
Windows Server, and SQL Server?
• A) Google Cloud
• B) AWS
• C) Azure
• D) IBM Cloud
Which cloud service provider should be
chosen for extensive support of Linux,
Windows Server, and SQL Server?
• A) Google Cloud
• B) AWS
• C) Azure
• D) IBM Cloud
How can you stop automatic numbering in
MS Word?
• A) Press the Esc key
• B) Press the Enter key twice or click the
Numbering button again
• C) Click the Format menu
• D) Right-click and select Stop
Numbering
How can you stop automatic numbering in
MS Word?
• A) Press the Esc key
• B) Press the Enter key twice or click the
Numbering button again
• C) Click the Format menu
• D) Right-click and select Stop
Numbering
Which key combination is used to select a
word or phrase in MS Word?
• A) Ctrl+Shift
• B) Ctrl+Alt
• C) Shift
• D) Alt+Tab
Which key combination is used to select a
word or phrase in MS Word?
• A) Ctrl+Shift
• B) Ctrl+Alt
• C) Shift
• D) Alt+Tab
What is the shortcut key to open the Find
dialog box in MS Word?
• A) Ctrl+H
• B) Ctrl+G
• C) Ctrl+F
• D) Ctrl+P
What is the shortcut key to open the Find
dialog box in MS Word?
• A) Ctrl+H
• B) Ctrl+G
• C) Ctrl+F
• D) Ctrl+P
How would you close a tab in a browser?
• A) Ctrl+T
• B) Ctrl+W
• C) Ctrl+Q
• D) Ctrl+R
How would you close a tab in a browser?
• A) Ctrl+T
• B) Ctrl+W
• C) Ctrl+Q
• D) Ctrl+R
In Excel, what function finds the highest
value in a range of cells?
• A) SUM
• B) AVG
• C) MAX
• D) MIN
In Excel, what function finds the highest
value in a range of cells?
• A) SUM
• B) AVG
• C) MAX
• D) MIN
Which command takes you two steps
backward from any particular directory in
the command prompt?
• A) cd ..
• B) cd ../..
• C) cd ~
• D) cd /
Which command takes you two steps
backward from any particular directory in
the command prompt?
• A) cd ..
• B) cd ../..
• C) cd ~
• D) cd /
What does a green underline in MS Word
signify?
• A) Spelling error
• B) Contextual error
• C) Grammatical error
• D) Formatting error
What does a green underline in MS Word
signify?
• A) Spelling error
• B) Contextual error
• C) Grammatical error
• D) Formatting error
Which Excel feature quickly applies a set of
formatting choices to a range of cells?
• A) Cell Styles
• B) Conditional Formatting
• C) Data Validation
• D) PivotTable
Which Excel feature quickly applies a set of
formatting choices to a range of cells?
• A) Cell Styles
• B) Conditional Formatting
• C) Data Validation
• D) PivotTable
In a network, what attack involves forging
an IP address to impersonate another
device?
• A) Spoofing
• B) Phishing
• C) Hacking
• D) Spamming
In a network, what attack involves forging
an IP address to impersonate another
device?
• A) Spoofing
• B) Phishing
• C) Hacking
• D) Spamming
RESOURCES

You might also like