Description : Frequencyof failure and network recovery time after a failure are measures of the_______of a network. A) Performance B) Reliability C) Security D) Feasibility
Last Answer : Reliability
Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above
Last Answer : they contain clock recovery circuits
Description : The synchronous modems are more costly than the asynchronous modemsbecause A. they produce largevolumeof data B. they contain clock recovery circuits C. they transmit thedata with stop and start bits. D. they operate witha largerbandwidth E. None of the above
Description : In OSI model, session layer is responsible for a. Recovery b. Check pointing c. Both a and b d. None of the above
Last Answer : c. Both a and b
Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1) Testing 2) Backup and recovery 3) Firewall development 4) Design
Last Answer : 3) Firewall development
Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1 Testing 2 Backup and recovery 3 Firewall development 4 Design
Last Answer : 3 Firewall development
Description : Recovery Testing aims at verifying the system's ability to recover from varying degrees of failure. A. True B. False
Last Answer : A. True
Description : ..... is a black box testing method ? Boundary value analysis Basic path testing Code path analysis None of above
Last Answer : Boundary value analysis
Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system
Last Answer : To uncover errors
Description : Black box testing sometimes called ? Data Flow testing Loop Testing Behavioral Testing Graph Based Testing
Last Answer : Behavioral Testing
Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing
Last Answer : Glass box testing
Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Last Answer : Breaks compliance regulations
Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service
Last Answer : . Quality of service
Description : The behaviour of a metal specimen, which when plastically strained in tension reduces its yield stress in compression and vice versa; is termed as the (A) Work hardening (B) Bauschinger effect (C) Creeping effect (D) Stress recovery effect
Last Answer : (B) Bauschinger effect
Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)
Last Answer : both (a) and (b)
Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov
Last Answer : site local
Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above
Last Answer : link local
Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above
Last Answer : more
Description : An enterprise solution withdata storage, a client interface and a security system isa(n) __________ system. A) 2-tier B) 3-tier C) 4-tier D) n-tier
Last Answer : 3-tier
Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above
Last Answer : Security
Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS
Last Answer : Virtual Private Network
Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site
Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user
Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer
Last Answer : d. Transport layer
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : What is the best home security system based on consumer testing?
Last Answer : The best home security system is called Protect America, which I think can give you the best security and save money
Description : Security falls under _______ A. Compliance testing B. Disaster testing C. Verifying compliance to rules D. Functional testing E. Ease of operations
Last Answer : A. Compliance testing
Description : The testing attempts to violate those procedures, which should test the adequacy of the security procedures. A. Disaster testing B. Functional testing C. Regression testing D. Compliance testing
Last Answer : D. Compliance testing
Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls
Last Answer : a. Avoiding Detection
Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing
Last Answer : C. White-box testing
Description : what is the primary goal of an Ethical Hacker ? Avoiding detection Testing security controls Resolving security vulnerabilities Determining return on investment for security measures
Last Answer : Resolving security vulnerabilities
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing
Last Answer : c. White-box testing
Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan
Last Answer : A. Netcat
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing
Description : Non-ferrous metals and hard steels do not exhibit a definite yield point, when pulled in the testing machine and hence for these cases, a better measure of their elastic properties is defined by the __________ stress. (A) Ultimate (B) Yield point (C) Proof (D) None of these
Last Answer : (C) Proof
Description : While testing a cast iron beam (2.5 cm × 2.5 cm) in section and a metre long simply supported at the ends failed when a 100 kg weight is applied at the centre. The maximum stress induced is: (A) 960 kg/cm2 (B) 980 kg/cm2 (C) 1000 kg/cm2 (D) 1200 kg/c
Last Answer : (A) 960 kg/cm
Description : Consider the following salient points in a stress-strain curve of a mild steel bar: 1. Yield point 2. Braking point 3. Yield plateau 4 . Proportionality limit 5. Ultimate point The correct sequence in which they occur while testing the mild ... , 5 and 2 (c) 4, 1, 3, 5 and 2 (d) 1, 4, 2, 3 and 5
Last Answer : (c) 4, 1, 3, 5 and 2
Description : Load testing emphasizes on performance under load while stress testing emphasizes on _______ A. Breaking load B. Performance under stress C. Performance under load D. There is no such difference, both are same
Last Answer : A. Breaking load
Description : Testing error messages fall under _________category of testing. A. Incremental Testing B. Thread Testing C. Documentation Testing D. Stress Testing
Last Answer : C. Documentation Testing
Description : How many batches should be considered for stress testing under basic conditions testing as per ICH? A. At least 3 B. At least 2 C. At least 1 D. At least 5
Last Answer : A. At least 3
Description : SRS is also known as specification of (A) White box testing (B) Stress testing (C) Integrated testing (D) Black box testing
Last Answer : (D) Black box testing
Description : A fault simulation testing technique is (A) Mutation testing (B) Stress testing (C) Black box testing (D) White box testing
Last Answer : (A) Mutation testing
Description : One of the fault base testing techniques is (A) unit testing. (B) beta testing. (C) Stress testing. (D) mutation testing.
Last Answer : (D) mutation testing.
Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing
Last Answer : (B) Black-box testing
Description : Is Post Traumatic Stress Disorder something that would qualify someone for social security disability?
Last Answer : To receive social security disability for post traumatic stress disorder, it could vary from state to state. To find out if your eligible for social security disability, you should first contact your local social security services.