Accenture MS office fundamentals Network and Cloud

Questions 1: Read the two statements and choose the right option.

i. You can translate left to right languages in MS word.
ii. You can not translate right to left languages in MS word.

  • Options
  • a : Statements i is false and statements ii is true.
  • b : Both statements are true.
  • c : Statements i is true and statements ii is false.
  • d : Both statements are false.
  • Answer: b) Both statements are true.

    Questions 2: In order to adjust any row's height in a spreadsheet, which of the following key combinations can be used ?

  • Options
  • a : Alt+A+O+H
  • b : Alt+N+O+H
  • c : Alt+H+O+H
  • d : Alt+M+O+H
  • Answer: a) Alt+A+O+H

    Questions 3: Which of the following statements is not true about cloud and data center?

  • Options
  • a : Business pays directly for planning, people hardware, software and environment in data center.
  • b : Cloud's location is virtualized and has remote hardware.
  • c : Data center has the ability of being instabtly scalable.
  • d : In-house IT professionals are available in case of data centers
  • Answer: a) Business pays directly for planning, people hardware, software and environment in data center.

    Questions 4: Which of the following cloud service provider does not provide application lifecycle management?

  • Options
  • a : Azure
  • b : Google cloud platform
  • c : AWS
  • d : All of the mentioned provides this service
  • Answer: d) All of the mentioned provides this service

    Questions 5: Which of the following attacks treats the encryption algorithm as a black box ?

  • Options
  • a : Implementation attacks
  • b : Social engineering attack
  • c : Brute-foce attack
  • d : Analytical attack
  • Answer: d) Analytical attack

    Questions 6: The zoom range in MS-Excel is:

  • Options
  • a : 10% to 400%
  • b : 100% to 400%
  • c : 100% to 200%
  • d : 10% to 200%
  • Answer: a) 10% to 400%

    Questions 7: Which of the following options shows the correct relationsheep between the command and its description?

  • Options
  • a : -D(blind address: port:)connect to the target host using an ssh connection and then establishing a toto
  • b : -p port: Allows remote hosts to connect to local forwarded ports.
  • c : -j[user host[:port]: Allow remote hosts to connect to local forwarded ports.
  • d : None of the mentioned.
  • Answer: b) -p port: Allows remote hosts to connect to local forwarded ports.

    Questions 8: Which of the folowing security standerd has the possiblity of breaking the encryption during the initial 4- way handshake ?

  • Options
  • a : WPA2
  • b : WEP
  • c : Both WPA and WPA2
  • d : WPA
  • Answer: c) Both WPA and WPA2

    Questions 9: Which of the following is the incorrect representation of the layer number of an OSI model?

  • Options
  • a : Layer 6 is the presentation layer
  • b : Layer 4 is the session layer
  • c : Layer 3 is the network layer
  • d : Layer 2 is the data link layer
  • Answer: b) Layer 4 is the session layer

    Questions 10: Which of the following is not vulnerability of the network layer ?

  • Options
  • a : Raute spoofing
  • b : Identity & Resourse ID Vulnerability
  • c : IP Address Spoofing
  • d : Weak or non-existent authentication
  • Answer: d) Weak or non-existent authentication


    If you find any question wrong, please send your solution to [email protected]