Accenture Network Security & Cloud Computing Questions

Accenture Network Security & Cloud Computing Questions

31 August 2023

31 August 2023

Accenture Network Security & Cloud Computing Previous Year Questions


Get 30 minutes free mentorship by TalentBattle Placement Experts

 

Q1) You are working on a router that has established privilege levels that restric access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm that the access list that have been apllied to the Ethernet 0 interface on your router?

A. show access-lists

B. show interface Ethernet 0

C.  show ip access-lists  

D. show ip interface Ethernet 0
 
Answer : Option D

 

Q2) What command will permit SMTP mail to only host 1.1.1.1 ?

A. access-list 10 permit smtp host 1.1.1.1 

B. access-list 110 permit ip smtp host 1.1.1.1

C.  access-list 10 permit tcp any host 1.1.1.1 eq smtp

D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
 
Answer : Option D

 

Q3) You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20 . Which of the following would you start your list with ? 

A. access-list 10 deny 172.16.48.0 255.255.240.0

B. access-list 10 deny 172.16.0.0 0.0.255.255   

C.  access-list 10 deny 172.16.64.0 0.0.31.255

D. access-list 10 deny 172.16.48.0 0.0.15.255
 
Answer : Option D

 

Q4) What router command allows you to dertermine whether an IP access list is enabled on a particular interface ?

A. show ip port

B. show access-lists

C.  show ip interface

D. show access-lists interface
 
Answer : Option C

 

Q5) In the SSLv3 the padding bits are ____________ with the secret key.

A. Padded

B. XORed

C.  Concatenated

D. ANDed
 
Answer : Option C

 

Q6) Antivirus scanning devices fall under which type of network security device?

A.Active devices

B.Preventative devices

C.Unified Threat Management devices

D.Passive devices

Answer : Option A

 

Q7) Which of the following is the correctly mapped relationship between attributes and cloud or data centre?

A.In house IT professionals: Data center, Co-location makes failures dependent: cloud

B.Instant Scalable: Data Center, Pay as per use: cloud

C.On-premises: Data center, Remote Hardware: Cloud

D.Involves challenges and delay in Scalability: Data Center, Remote Hardware: Cloud

Answer : Option C

 

Q8) Consider a situation when you have to choose between the major cloud service providers. Which would you choose if you need a cloud service if you do not want to have backup support?

A.AWS

B.Oracle

C.Azure

D.Google Cloud

Answer : Option D

 

Q9) Which of the following types of network security ensures that potential attackers cannot infiltrate your network?

A.Firewall

B.Network Access Control

C.Virtual Private Network

D.Both Network Access Control and Virtual Private Network

Answer : Option C

 

Q9) Consider a situation where you have to choose between the major cloud service providers. Which would you choose if you want support for Linux, Windows Server, and SQL Server and enhanced security?

A.Oracle

B.Google Cloud

C.Alibaba Cloud

D.Azure

Answer : Option D

 

Q10) An attack in which the user receives an unwanted amount of emails is   .

A.Smurfing

B.Denial of Service

C.E-mail bombing

D.Ping storm

Answer : Option C

 

Q11) Attack in which a user creates a packet that appears to be something else is   .

A.Smurfing

B.Trojan

C.E-mail bombing

D.Spoofing

Answer : Option D

 

Q12) Which of the following statements is true about cloud and data center?

I.In Cloud, owner is responsible for downtime and repairs

II.In Data center, owner is responsible for downtime and repairs

Choose the correct answer from the options given below.

A.Neither 1 nor 2

B.Only 2

C.Only 3

D.Both 1 and 2

Answer : Option B

 

Q13) DES Encryption algorithm is an example of which of the following options?

A.Bit-oriented cipher

B.All of the mentioned options

C.Byte-oriented cipher

D.Key-alternating block ciphers

Answer : Option A

 

Q14) How many processes are there for changing a plaintext piece of data into encrypted data in AES - 128?

A. 14

B. 8

C. 1

    2

D. 1

    0

Answer : Option D

 

Q15) Which of the following cloud service providers does not provide Hybrid Storage?

A.All of the mentioned options

B.AWS

C.Azure

D.Google Cloud

Answer : Option D

 

Q16) Which of the following cloud service providers should be preferred if most of your data is of Binary large objects type?

A.Oracle

B.Azure

C.Google Cloud Platform

D.AWS

Answer : Option B



Related Articles

Ask Us Anything !