Beruflich Dokumente
Kultur Dokumente
Consider the
following schema, and select the right query for retrieving records from the
tables COURSES and LOCATIONS with the ON clause:
COURSES(course_code, course_name, trainer);
LOCATIONS(course_code, department_name, location_id, location_name);
Complete this query to retrieve the appropriate records as described above:
SELECT c.course_name, l.department_name, c. trainer, l.location_id,
l.location_name FROM
Select one:
courses c join location l on (c.course_code = l.course_code);
courses c join location l on(course_code);
courses c join location l on c.course_code in l.course_code;
courses c, location l on(course_code);
You are working to secure an internal wireless network. Which one of the following would
accomplish this task?
Select one:
disable DHCP
4.
You are working on a project with a goal to reduce the amount of storage space used in an email
back-up system. Which one of the following techniques will best accomplish this goal?
Select one:
Archiving
Compression
Deduplication
Encryption
You support 10 offices in 10 different countries and are planning to implement full
mesh point-to-point Internet Protocol security Virtual Private Network (IPsec VPN)
over the Internet for all sites. Every router needs to contact every other at the
same time. What is the minimum number of tunnels you should configure?
Select one:
10
45
90
100
6
Your office has Border Gateway Protocol (BGP) Multi-Home Internet connections with two Internet
Service Providers (ISP1 and ISP2). Your colleague reported to you that Internet link with ISP1 is
down. You are troubleshooting the down link. An open message has been sent, but a reply has not
been received from the neighbour for more than 5 seconds. Which state below indicates this?
Select one:
active
idle
lost
open confirm
Select one:
Select one:
Decreased latency
Increased performance
Increased security
When a router receives a packet larger than its outgoing link’s maximum transmission unit (MTU),
what does the router do?
Select one:
drops the packet and sends a “too big” message back to the source
forwards the packet as it is and sends a “too big” message back to the source
fragments the packet and forwards the fragments towards the destination
fragments the packet, forwards the fragments, and sends a “too big” message to the source
10
In the context of an information risk assessment, the combination of the likelihood and impact of a
potential event is called the _________________.
Select one:
residual riskr
mitigated risk
inherent risk
11
You are working to mount the directory utilities from a server named “secap400” on a local mount
point: /opt/sf. Which one of the following commands would accomplish this?
Select one:
12
What types of testing are most important before releasing a web application in production?
Select one:
13
In the Open Systems Interconnection (OSI) model, when data is transmitted from Device A to Device
B, the header from A's layer 5 is read by B's _______ layer.
Select one:
physical
presentation
session
transport
14
The United Nations (UN) Information Technology department has implemented a new security
policy that stipulates that all UN websites will now use Transport Layer Security (TLS) technology.
What Transmission Control Protocol (TCP) port would one need to use to meet this rule for a
website that previously used port 80 to communicate with a web client?
Select one:
Port 115
Port 443
Port 1023
Port 8080
15
You are preparing for a conference in a high-rise hotel. You need to improve the capacity of the
mobile network. Which type of base station should you use?
Select one:
Femtocell
Macrocell
Microcell
Picocell
16
When the IP address and subnet mask of a host’s Network Interface Card (NIC) are as given below,
which of the following is the appropriate network address of this host?
IP address: 201.170.220.54
Select one:
201.170.220.31
201.170.220.48
201.170.220.54
201.170.220.255
17
What mechanism does Transmission Control Protocol (TCP) use for flow control to provide
connection oriented services?
Select one:
18
To mount a Network File System (NFS) at system boot time, which one of the following files would
you edit?
Select one:
/etc/fstab
/etc/dfs/dfstab
/etc/nfs/tab
/etc/nfstab
19
Which one of the following describes one of the benefits of Multiprotocol Label Switching (MPLS)?
MLPS ______________________________.
Select one:
20
You need to deploy a wireless solution to cover multiple office buildings by using a mesh Wi-Fi
infrastructure approach. What is required to cover the entire area?
Select one:
A wireless controller
21
A colleague has asked you to explain why you would recommend the use of “responsive design.”
The reason to use “responsive design” is to allow ____________.
Select one:
22
To make a satellite antenna more directional, either its size must be increased or
____________________ must be increased.
Select one:
its footprint
23
Youare working on an ASP.NET web application and the database login details are not known. Which
file would you check to determine the database connection strings?
Select one:
24
You are working on migrating data from a legacy system to a new one. Before you transfer the data,
you are asked to perform data quality checks on the "consistency" of each of the data fields. The
most likely way to complete the initial checks will be to measure the
__________________________.
Select one:
25
You are working to create a centralized authentication service. To complete this task, what type of
protocol would be best to use?
Select one:
Active Directory
DNS
LDAP
RADIUM
26
In a database table, what is the Structured Query Language (SQL) command used to avoid selection
of duplicate rows?
Select one:
DISCRETE
DISTINCT
EXCLUSIVE
UNIQUE
27
Use the information below to answer the question. Knowledge of the specific coding language is not
necessary to answer the question.
Your colleague has brought the below to you and wants to know the output of the following
program:
static int i = 1;
System.out.print(i+” , “);
modify(i);
System.out.println(i);
i += 3;
}
Select one:
1,4
1,0
1,1
1,3
28
It seems that a web server in your organization has been attacked from the outside and some
content was changed without authorization. Management is concerned about potential data loss.
You first disconnect the server from the network. What is the next immediate step you should take?
Select one:
29
In the context of data storage, which one of the following provides byte level striping?
Select one:
RAID 2
RAID 4
RAID 5
RAID 7
30
Your colleague states he does not know why vendors publish MD5 hash values when they provide
software patches for their customers to download from the Internet. You explain that this is so that
recipients ____________________________.
Select one:
can confirm the authenticity of the site from which they are downloading the patch
can request future updates to the software by using the assigned hash value
have the needed hash value to successfully activate the new software
31
Your supervisor has asked you to provide a server with the highest level of availability. Which one of
the following would you select?
Select one:
Clustered server
Question 32
Question text
You are given a data analysis task and will need to develop an algorithm. Your algorithm will be
computationally intensive so you need it to perform as efficiently as possible. To assess the
performance of your algorithm, the best approach would be to measure:
Select one:
Question 33
Question text
You are working to make website images more accessible to those visitors using browsers that
cannot display images or that have image display disabled. Which is the correct html code for the
attribute to use?
Select one:
Question 34
Question text
Select one:
3DES
AES-256
ROT-13
SHA-256
Question 35
Question text
Use the information below to answer the question. Knowledge of the specific coding language is not
necessary to answer the question.
Your colleague has brought this code to you and wants to know what it will return:
if (n == 0 || n == 1)
return n;
if (n%5 != 0)
return 0;
return f(n/5);
Select one:
Question 36
Question text
You are working to strengthen Internet security in your local United Nations office’s Demilitarized
Zone (DMZ). Which server should you remove first from the DMZ office to strengthen security?
Select one:
Database server
Web server
Question 37
Question text
Which of the following business continuity stages ensures that the continuity strategy remains viable
(i.e., feasible)?
Select one:
Question 38
Question text
Select one:
Question 39
Which one of the following is NOT a use of an Intrusion Detection System (IDS)?
Select one:
Question 40
Question text
You are working to verify both the sender of information and the integrity of a message. This can be
achieved through the use of _______________.
Select one:
digital certificates
digital signatures
Question 41
Question text
When conducting a test, which IP address (IPv4) would you use to make a copy of a website that
loops back to the same machine/computer/server?
Select one:
0.0.0.1
1.1.1.1
127.0.0.1
192.8.8.8
Question 42
Not flaggedFlag question
Question text
You have decided to use a Network Attached Storage (NAS) solution. This decision is most
appropriate for what type of environment?
Select one:
Secured access
Shared access
Remote access
Parallel access
Question 43
Question text
Your colleague is creating a database and is recommending the use of a non-Structured Query
Language (NoSQL) architecture. What is the likely reason for her decision to do so?
Select one:
she can use a fixed schema to define all the data fields
Question 44
Question text
You are given a data table with four fields: Year, Country, Gender, and Population. In a data
warehousing environment, which of these fields would be defined as "dimensions”?
Select one:
Question 45
Question text
In which one of these instances would you most strongly recommend the deployment of Virtual
Desktop Infrastructure (VDI) within an organization?
Select one:
Question 46
Question text
In the context of data integrity, which one of the following is a “detective control” for data entry
errors or inaccuracies?
Select one:
Designing proper access rights to limit the number of persons entering data
Question 47
Question text
You are designing a new system and it is essential that data can be restored with only minimal loss.
Which of the following should be your Recovery Point Objective (RPO)?
Select one:
2 full backups
4 Mbps
2 TB
4 hours
48
You are working on web design, and are considering using Cascading Style Sheets (CSS). What is the
most important aspect of using CSS in web design? Using CSS___________________.
Select one:
enables the flexible design of a website using multiple content management systems
makes it possible to use mark-up languages like html when designing websites
Question 49
Flag question
Question text
You need to set up a network with a proxy appliance to resolve domain name
training.un.org for the training Web Server. The proxy will handle the Transport
Layer Security (TLS) connection with the clients and connect to the back-end
Web Server over hypertext transfer protocol (http). The image below summarizes
the scenario configuration.
In the above scenario the proxy gateway is most likely working as a/an
_____________.
Select one:
explicit-proxy
forward-proxy
reverse-proxy
split-proxy
Question 50
Question text
A common standard used by the semantic web for the interchange of data is ____________.
Select one: