Sie sind auf Seite 1von 19

You are gathering information for the training department.

Consider the
following schema, and select the right query for retrieving records from the
tables COURSES and LOCATIONS with the ON clause:
COURSES(course_code, course_name, trainer);
LOCATIONS(course_code, department_name, location_id, location_name);
Complete this query to retrieve the appropriate records as described above:
SELECT c.course_name, l.department_name, c. trainer, l.location_id,
l.location_name FROM
Select one:
courses c join location l on (c.course_code = l.course_code);
courses c join location l on(course_code);
courses c join location l on c.course_code in l.course_code;
courses c, location l on(course_code);

What is a benefit of a Low Earth Orbit (LEO) satellite system?


Select one:
Low maintenance cost
Low latency
High bandwidth
Easy to start

You are working to secure an internal wireless network. Which one of the following would
accomplish this task?

Select one:

disable DHCP

use a static Internet Protocol IP

use MAC filtering

enable SSID broadcasting

4.

You are working on a project with a goal to reduce the amount of storage space used in an email
back-up system. Which one of the following techniques will best accomplish this goal?
Select one:

Archiving

Compression

Deduplication

Encryption

You support 10 offices in 10 different countries and are planning to implement full
mesh point-to-point Internet Protocol security Virtual Private Network (IPsec VPN)
over the Internet for all sites. Every router needs to contact every other at the
same time. What is the minimum number of tunnels you should configure?
Select one:
10
45
90
100
6

Your office has Border Gateway Protocol (BGP) Multi-Home Internet connections with two Internet
Service Providers (ISP1 and ISP2). Your colleague reported to you that Internet link with ISP1 is
down. You are troubleshooting the down link. An open message has been sent, but a reply has not
been received from the neighbour for more than 5 seconds. Which state below indicates this?

Select one:

active

idle

lost

open confirm

What technology is commonly used to establish a Virtual Private Network (VPN)?

Select one:

Advanced Encryption Standard (AES)

Internet Protocol Security (IPsec)

Triple Data Encryption Standard (DES)


Pretty Good Privacy (PGP)

What is the key advantage of mobile device management (MDM)?

Select one:

Decreased latency

Decreased need for control

Increased performance

Increased security

When a router receives a packet larger than its outgoing link’s maximum transmission unit (MTU),
what does the router do?

Select one:

drops the packet and sends a “too big” message back to the source

forwards the packet as it is and sends a “too big” message back to the source

fragments the packet and forwards the fragments towards the destination

fragments the packet, forwards the fragments, and sends a “too big” message to the source

10

In the context of an information risk assessment, the combination of the likelihood and impact of a
potential event is called the _________________.

Select one:

information security risk

residual riskr

mitigated risk

inherent risk

11

You are working to mount the directory utilities from a server named “secap400” on a local mount
point: /opt/sf. Which one of the following commands would accomplish this?
Select one:

mount -f nfs /sf:secap400 /opt/sf

mount -F nfs secap400:/sf /opt/sf

mount -F nfs secap400:/opt/sf /sf

mount /opt/sf secap400:/sf

12

What types of testing are most important before releasing a web application in production?

Select one:

Graphical user interface and functionality testing

Operating system and compatibility testing

Performance and security testing

Web server and integration testing

13

In the Open Systems Interconnection (OSI) model, when data is transmitted from Device A to Device
B, the header from A's layer 5 is read by B's _______ layer.

Select one:

physical

presentation

session

transport

14

The United Nations (UN) Information Technology department has implemented a new security
policy that stipulates that all UN websites will now use Transport Layer Security (TLS) technology.
What Transmission Control Protocol (TCP) port would one need to use to meet this rule for a
website that previously used port 80 to communicate with a web client?
Select one:

Port 115

Port 443

Port 1023

Port 8080

15

You are preparing for a conference in a high-rise hotel. You need to improve the capacity of the
mobile network. Which type of base station should you use?

Select one:

Femtocell

Macrocell

Microcell

Picocell

16

When the IP address and subnet mask of a host’s Network Interface Card (NIC) are as given below,
which of the following is the appropriate network address of this host?

IP address: 201.170.220.54

Subnet Mask: 255.255.255.240

Select one:

201.170.220.31

201.170.220.48

201.170.220.54

201.170.220.255

17
What mechanism does Transmission Control Protocol (TCP) use for flow control to provide
connection oriented services?

Select one:

cyclic redundancy check and acknowledgment

preamble and sequencing

preamble, sliding window, and checksums

sequencing, acknowledgement, and windowing

18

To mount a Network File System (NFS) at system boot time, which one of the following files would
you edit?

Select one:

/etc/fstab

/etc/dfs/dfstab

/etc/nfs/tab

/etc/nfstab

19

Which one of the following describes one of the benefits of Multiprotocol Label Switching (MPLS)?

MLPS ______________________________.

Select one:

is designed to support only multiple layer 2 protocols

increases the forwarding overhead on the core routers

can support forwarding of non-IP protocols

uses a short 8-byte identifier

20
You need to deploy a wireless solution to cover multiple office buildings by using a mesh Wi-Fi
infrastructure approach. What is required to cover the entire area?

Select one:

Access points and bridge

A wireless controller

A wireless controller and access points

A wireless controller and router

21

A colleague has asked you to explain why you would recommend the use of “responsive design.”
The reason to use “responsive design” is to allow ____________.

Select one:

a customer to personalize his/her experience

an application to adapt to the device of the user

for minimal response time

users to give feedback on the design after each iteration

22

To make a satellite antenna more directional, either its size must be increased or
____________________ must be increased.

Select one:

its effective isotropic radiated power (EIRP)

its footprint

the frequency of its transmission

the number of its feed horns

23

Youare working on an ASP.NET web application and the database login details are not known. Which
file would you check to determine the database connection strings?
Select one:

app config file

database config file

dll config file

web config file

24

You are working on migrating data from a legacy system to a new one. Before you transfer the data,
you are asked to perform data quality checks on the "consistency" of each of the data fields. The
most likely way to complete the initial checks will be to measure the
__________________________.

Select one:

accuracy and completeness of values in a data field

business logic of values in a data field

character count of strings stored in a data field

frequency and uniqueness of values in a data field

25

You are working to create a centralized authentication service. To complete this task, what type of
protocol would be best to use?

Select one:

Active Directory

DNS

LDAP

RADIUM

26

In a database table, what is the Structured Query Language (SQL) command used to avoid selection
of duplicate rows?

Select one:

DISCRETE

DISTINCT

EXCLUSIVE
UNIQUE

27

Use the information below to answer the question. Knowledge of the specific coding language is not
necessary to answer the question.

Your colleague has brought the below to you and wants to know the output of the following
program:

public class Example

static int i = 1;

public static void main(String args[])

System.out.print(i+” , “);

modify(i);

System.out.println(i);

public void modify(int i)

i += 3;                              
}

What is the output?

Select one:

1,4

1,0

1,1

1,3

28

It seems that a web server in your organization has been attacked from the outside and some
content was changed without authorization. Management is concerned about potential data loss.
You first disconnect the server from the network. What is the next immediate step you should take?

Select one:

Analyse the firewall

Apply the latest patches and security setting information

Ensure there is a back-up of the server

Erase the server to avoid the attack from spreading

29

In the context of data storage, which one of the following provides byte level striping?

Select one:

RAID 2

RAID 4

RAID 5

RAID 7
30

Your colleague states he does not know why vendors publish MD5 hash values when they provide
software patches for their customers to download from the Internet. You explain that this is so that
recipients ____________________________.

Select one:

can confirm the authenticity of the site from which they are downloading the patch

can request future updates to the software by using the assigned hash value

can verify the software's integrity after downloading

have the needed hash value to successfully activate the new software

31

Your supervisor has asked you to provide a server with the highest level of availability. Which one of
the following would you select?

Select one:

Clustered server

Cold stand-by server

Hot stand-by server

Server with RAID 5 disks

Question 32

Not flaggedFlag question

Question text

You are given a data analysis task and will need to develop an algorithm. Your algorithm will be
computationally intensive so you need it to perform as efficiently as possible. To assess the
performance of your algorithm, the best approach would be to measure:

Select one:

how long it takes to complete and the memory used

the complexity and number of calculations performed

the frequency and duration of function calls


the sensitivity to small data sets and large data sets

Question 33

Not flaggedFlag question

Question text

You are working to make website images more accessible to those visitors using browsers that
cannot display images or that have image display disabled. Which is the correct html code for the
attribute to use?

Select one:

<img src="ny.jpg" ... alt="Picture of New York City" />

<img src="ny.jpg" ... attribute="Picture of New York City" />

<img src="ny.jpg" ... show="Picture of New York City" />

<img src="ny.jpg" ... text="Picture of New York City" />

Question 34

Not flaggedFlag question

Question text

What is a widely recommended standard for the encryption of electronic data?

Select one:

3DES

AES-256

ROT-13

SHA-256

Question 35

Not flaggedFlag question

Question text

Use the information below to answer the question. Knowledge of the specific coding language is not
necessary to answer the question.
Your colleague has brought this code to you and wants to know what it will return:

int f(unsigned int n)

if (n == 0 || n == 1)

return n;

if (n%5 != 0)

return 0;

return f(n/5);

What does the above code do? It returns ________________.

Select one:

0 when n is a multiple of 5, otherwise returns 1

0 when n is a power of 5, otherwise returns 1

1 when n is a multiple of 5, otherwise returns 0

1 when n is a power of 5, otherwise returns 0

Question 36

Not flaggedFlag question

Question text

You are working to strengthen Internet security in your local United Nations office’s Demilitarized
Zone (DMZ). Which server should you remove first from the DMZ office to strengthen security?
Select one:

Database server

Doman Name System (DNS) server

Proxy gateway server

Web server

Question 37

Not flaggedFlag question

Question text

Which of the following business continuity stages ensures that the continuity strategy remains viable
(i.e., feasible)?

Select one:

Backup, Recovery, and Restoration

Implementation and Testing Strategy Development

Post Recovery Transition Data Development and Testing

Implementation, Testing, and Maintenance

Question 38

Not flaggedFlag question

Question text

Remote Procedure Call (RPC) is used to ________________.

Select one:

control a user’s computer remotely

execute code on a different computer

report on process control

communicate data over the network

Question 39

Not flaggedFlag question


Question text

Which one of the following is NOT a use of an Intrusion Detection System (IDS)?

Select one:

to perform deep packet inspection

to examine the headers of all packets passing through it

to detect port scans, worms, and viruses

to generate an alert on operating system and application vulnerability attacks

Question 40

Not flaggedFlag question

Question text

You are working to verify both the sender of information and the integrity of a message. This can be
achieved through the use of _______________.

Select one:

digital certificates

digital signatures

public key encryption

private key encryption

Question 41

Not flaggedFlag question

Question text

When conducting a test, which IP address (IPv4) would you use to make a copy of a website that
loops back to the same machine/computer/server?

Select one:

0.0.0.1

1.1.1.1

127.0.0.1

192.8.8.8

Question 42
Not flaggedFlag question

Question text

You have decided to use a Network Attached Storage (NAS) solution. This decision is most
appropriate for what type of environment?

Select one:

Secured access

Shared access

Remote access

Parallel access

Question 43

Not flaggedFlag question

Question text

Your colleague is creating a database and is recommending the use of a non-Structured Query
Language (NoSQL) architecture. What is the likely reason for her decision to do so?

Select one:

she anticipates frequent data structure changes

she can use a fixed schema to define all the data fields

the data is structured and suitable for normalization

the data operations need high transaction rates

Question 44

Not flaggedFlag question

Question text

You are given a data table with four fields: Year, Country, Gender, and Population. In a data
warehousing environment, which of these fields would be defined as "dimensions”?

Select one:

Year and Population only

Country and Gender only


Year, Country, and Population

Year, Country, and Gender

Question 45

Not flaggedFlag question

Question text

In which one of these instances would you most strongly recommend the deployment of Virtual
Desktop Infrastructure (VDI) within an organization?

Select one:

To enable access for remote support

To enable users to work from various locations

To replace the need for a physical server

To replace the physical desktop of a user

Question 46

Not flaggedFlag question

Question text

In the context of data integrity, which one of the following is a “detective control” for data entry
errors or inaccuracies?

Select one:

Creation of training manual for data entry

Designing proper access rights to limit the number of persons entering data

Conducting data validation after data entry

Designing the input screen to avoid operational errors

Question 47

Not flaggedFlag question

Question text

You are designing a new system and it is essential that data can be restored with only minimal loss.
Which of the following should be your Recovery Point Objective (RPO)?
Select one:

2 full backups

4 Mbps

2 TB

4 hours

48

You are working on web design, and are considering using Cascading Style Sheets (CSS). What is the
most important aspect of using CSS in web design? Using CSS___________________.

Select one:

enables the flexible design of a website using multiple content management systems

makes websites accessible and user-friendly

enables the sharing of formatting information across html pages

makes it possible to use mark-up languages like html when designing websites

Question 49

Flag question

Question text

You need to set up a network with a proxy appliance to resolve domain name
training.un.org for the training Web Server. The proxy will handle the Transport
Layer Security (TLS) connection with the clients and connect to the back-end
Web Server over hypertext transfer protocol (http). The image below summarizes
the scenario configuration.

In the above scenario the proxy gateway is most likely working as a/an
_____________.
Select one:
explicit-proxy
forward-proxy
reverse-proxy
split-proxy

Question 50

Not flaggedFlag question

Question text

A common standard used by the semantic web for the interchange of data is ____________.

Select one:

Open Database Connectivity (ODBC)

Knowledge Management Framework (KMF)

Resource Description Framework (RDF)

Electronic Data Interchange (EDI)

Das könnte Ihnen auch gefallen