Sunday, November 26, 2017

Basic Questions for Windows Administrator



1.Which of the following Windows commands can be used to see processes that are
running and the TCP port that is being used as well? (Choose one answer)

a. psinfo
b. net session
c. ipconfig
d. netstat

2. What protocol can you use on a Windows machine to allow for secure remote
access? (Choose one answer)

a. Bash

b. CMD
c. RSH
d. Telnet
e. SSH

3. As a security administrator for your Windows networked environment, you have been
notified that your systems might have been breached by malware that has modified entries in
the HOSTS file. Which service can be affected by this breach? (Choose one answer)
a.ARP
b. DNS
c. LMHOSTS
d. NetBIOS

4. Which protocol commonly provides the underlying secure authentication in a Windows
Active Directory environment? (Choose one answer)
a. Kerberos
b. LDAP
c. RADIUS
d. TACACS+

5. You are tasked with changing the password policy across all Windows PCs in the
company? Which would be the BEST way for performing this task with the least amount of
overhead? (Choose one answer)

a. Certificate revocation
b. Key escrow
c. Group policy
d. Security group

5. You receive a call that a Windows-based computer is infected with malware and is running
too slowly to boot and run a malware scanner. Which of the following is the BEST way to run
the malware scanner? (Choose one answer)

a. Kill all system processes
b. Enable the firewall
c. Boot from CD/USB
d. Disable the network connection

6. What utility should be used to access the registry on a Windows 7 PC? (Choose one
answer)

a. edit
b. hexedit
c. ifconfig
d. msconfig
e. regedit

7. What command is used to open a command line interpreter within Windows? (Choose
one answer)
a. cmd
b. putty
c. shell
d. term
8. How do you switch between logged-in user accounts in Windows 7? (Choose one answer)
a. Choose Start -> All Programs -> Switch User

b. Reboot
c. Windows 7 does not support multiple users
d. ctl-alt-del, then choose 'Switch User'

9. Performance Monitor (PerfMon) is used for what in the Windows 7 OS? (Choose one
answer)

a. To log inbound TCP connection performance
b. To monitor system and program performance
c. To manage user access and permissions which can negatively impact system performance
d. To set memory limits for hosted services




Ans:
1. D
2.e
3.b
4.a
5. c
6.e
7.a
8. d
9.b

Basic questions for Linux Users




1.  Which two Linux commands can be used to display currently active processes? (Choose
two answers)

a. netstat
b. tcpdump
c. top
d. ifconfig
e. proc

2. What command can you use to determine the MAC address of a Linux-based machine?
(Choose one answer)

a. ipconfig
b. ifconfig
c. getmac
d. intmac

3. What three are valid permissions under Linux? (Choose three answers)
a. read
b. shared
c. execute
d. no permissions
e. full control.

4. What two Linux commands can be used for pattern matching and filtering of output?
(Choose two answers)

a. cat
b. echo
c. find
d. grep
e. more

5. What is the purpose of the 'sudo' command in Linux? (Choose one answer)

a. Provides a stateful 'undue' of the previous command.
b. Enters the administrator or superuser command mode.
c. Configures the pseudowire interface on Linux machines.
d. Allows a logged in user to run Linux commands as the administrator.

6. Where are user-specific passwords stored in a Linux OS? (Choose one answer)
a. /etc/password
b. /etc/shadow
c. /usr/local
d. /usr/password

7.  What command is used to verify disk capacity of Linux hosts? (Choose one answer)
a. chkdsk

b. df
c. du
d. hwinfo

8. What does the linux command 'tar -cvf' do? (Choose one answer)
a. Activates task management and recovery tools.
b. Terminates active running processes specificed by the user.
c. Creates an archive from a set of files without verification.
d. Mounts terminal access ports for use by the Linux kernel.

09. Which command is used to view the contents of a directory within Linux? (Choose one
answer)

a. cat
b. df
c. dir
d. ls

10. What Linux command is used to verify the host network configuration? (Choose one
answer)

a. biff
b. cat /etc/hosts
c. ifconfig
d. netconf

11. What three are characteristics of MAC addresses? (Choose three answers)

a. MAC addresses are used to forward frame in LAN switches.
b. MAC addresses are used by routers to build routing tables and make routing decisions.
c. The first three byes are the OUI which identifies the manufacturer of the network interface card.
d. Dynamic MAC addresses are assigned by DHCP.
e. MAC addresses are unique across the global internet.

12. What function does Snort perform on Linux machines? (Choose one answer)
a. File scanning for malware and virus infections.
b. Simple Network Object management.
c. Real-time traffic analysis and packet logging in IP networks.
d. Simple messaging system for Linux system alerts.



ANSWER:
1=a,c.
2=a.
3=a,c,d.
4=d,e
5=d
6=b
7=b
8=c
9=d
10=c
11=a,c,e
12=c

Monday, November 6, 2017

Basic IT Questions for Computer Engineer Part 2

51. All of the following are examples of real security and privacy risks EXCEPT
a.Spam
b.Spare
c.Phising
d.Stole

Answer a. Spam

52.A byte can represent any number between 0 and _________
a. 255
b. 1024
c. 1025
d. 256
e. 2

Answer a. 255

53.Attributes can be defined as ______________
a.Switch Board
b.Macro
c.None
d.Pages
e.Entity

Answer e. Entity

54.________ would you find on LinkedIn
a. Chat
b. Games
c. Connections
d. Applications
e. None

Answer c. Connections

55.Smart Card is _________
a. Special Purpose Card
b. None
c. Micro Processor Card
d. Processing Unit for Software Handling
e. Processing Unit contains memory for storing data

Answer e. Processing Unit contains memory for storing data

56.Linux is a type of ___________ software
a.Proprietary
b.Open Source
c.Share Ware
d.Hidden type
e.Commercial

Answer c. Share Ware



57.A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
a) hot potato routing
b) flooding
c) static routing
d) delta routing
e) None of the above

Answer a) hot potato routing



58.Frames from one LAN can be transmitted to another LAN via the device
a) Router
b) Bridge
c) Repeater
d) Modem

Answer b) Bridge

59.The synchronous modems are more costly than the asynchronous modems because
a) they produce large volume of data
b) they contain clock recovery circuits
c) they transmit the data with stop and start bits
d) they operate with a larger bandwidth
e) None of the above

Answer b) they contain clock recovery circuits

60.A remote batch-processing operation in which data is solely input to a central computer would require a
a) telegraph line
b) simplex lines
c) mixedband channel
d) All the above
e) None of the above

Answer b) simplex lines

61.With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?
a) 192
b) 224
c) 240
d) 248
e) 252

Answer e) 252

62.Which of the following is not a programming language?
a.Basic
b.Java
c.Knuth

Answer a.Basic

63.When creating a vertical page break _______.
A. The active cell must be A1
B. The active cell can be anywhere in the worksheet
C. The active cell must be in row 1
D. The active cell must be in column A
E. None of these

Answer C.The active cell must be in row 1



64.To drag a selected range of data to another worksheet in the same workbook, use the ______.
A. Tab key
B. Alt key
C. Shift key
D. Ctrl key
E. Pageup/down

Answer D.Ctrl key



65.You can use the format painter multiple times before you turn it off by _______.
A. You can use the format painter button only one time when you click it
B. Double clicking the format painter button
C. Pressing the Ctrl key and clicking the format painter button
D. Pressing Alt key and clicking the format painter button
E. Both 2 and 3

Answer B.Double clicking the format painter button



66.Data marker on a chart are linked to data points in a worksheet, therefore
A. You can automatically apply formatting to a data series
B. You can change the position of a data marker and automatically change the data point value in the worksheet
C. You can change a data print value and automatically are draw the chart
D. 1 and 2
E. None of these

Answer B.You can change the position of a data marker and automatically change the data point value in the worksheet



67.The process of finding errors in a program is called
a.Testing
b.Compiling
c.Debugging
d.none of the above

Answer a.Testing



68. Each pixel is composed of :
a. two mini dots
b. five mini dots
c. six mini dots
d.three mini dots

Answer d.three mini dots



69. 16 bit color, also called
a. 65K or triColor
b. 65K or HiColor
c. 65K or reColor
d. 65K or biColor

Answer b. 65K or HiColorb

70. P55C – MMX is a ——–generation CPU
a.1ST
b.5th—
c.3rd
d.6th

Answer b.5th

71.CMOS stands for:
a. Complimentary Metallugy Oxide Semiconductor
b. Compliment Metal Oxide Semiconductor—
c. Complimentary Metal Oxy Semiconductor
d. Complimentary Metal Oxide Semi

Answer b. Compliment Metal Oxide Semiconductor

72. It enable the PC to coordinate the functions of various computer components:
a.ROM
b.RAM
c.ALU
d.DAM

Answer a.ROM

73.A process known as ____________ is used by large retailers to study trends.
A. Data mining
B. Data selection
C. Data conversion
D. POS Point of Sale

Answer A.Data mining

74.DSL is an example of a(n) ____________ connection.
A. Network
B. Wireless
C. Slow
D. Broadband
E. None of these


Answer D.Broadband

75.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
A. Vice
B. Bug
C. Lice
D. Worm

Answer D.Worm

76. Data (information) is stored in computers as
a.File
b.Directories
c.Discs
d.Txt

Answer a.File

77.The commonly used UNIX commands like date, ls, cat etc. are stored in
(A) /dev directory
(B) /bin directory
(C) /tmp directory
(D) /unix directory
(E) None of these

Answer (B) /bin directory



78. What displays the contents of the active cell in Excel?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these

Answer (C) Formula bar



79.The basic unit of a worksheet into which you enter data in Excel is called a
(A) tab
(B) cell
(C) box
(D) range
(E) None of these

Answer (B) cell



80) Which of the following memory has the shortest access time?
A. Virtual Memory
B. Cache Memory
C. External Memory
D. Register

Answer D) Register



81)What is Unicode?
A. Standard Font
B. Software
C. Character Encoding System
D. Keyboard Layout

Answer C) Character Encoding System



82. A _____ contains specific rules and words that express the logical steps of an algorithm.
a) Syntax
b) Programming structure
c) Programming language
d) Logic chart
e) None of these

Answer c) Programming language



83. To what temporary area can you store text and other data, and later paste them to another location?
a) The clipboard
b) ROM
c) CD-ROM
d) The hard disk
e) None of these

Answer a) The clipboard



84. The ability to find an individual item in a file immediately _____is used.
a) File allocation table
b) Directory
c) Sequential access
d) Direct access
e) None of these


Answer d) Direct access