Accenture MS office fundamentals Network and Cloud
Questions 1: Read the two statements and choose the right option.
i. You can translate left to right languages in MS word.
ii. You can not translate right to left languages in MS word.
Options
a : Statements i is false and statements ii is true.
b : Both statements are true.
c : Statements i is true and statements ii is false.
d : Both statements are false.
Answer: b) Both statements are true.
Questions 2: In order to adjust any row's height in a spreadsheet, which of the following key combinations can be used ?
Options
a : Alt+A+O+H
b : Alt+N+O+H
c : Alt+H+O+H
d : Alt+M+O+H
Answer: a) Alt+A+O+H
Questions 3: Which of the following statements is not true about cloud and data center?
Options
a : Business pays directly for planning, people hardware, software and environment in data center.
b : Cloud's location is virtualized and has remote hardware.
c : Data center has the ability of being instabtly scalable.
d : In-house IT professionals are available in case of data centers
Answer: a) Business pays directly for planning, people hardware, software and environment in data center.
Questions 4: Which of the following cloud service provider does not provide application lifecycle management?
Options
a : Azure
b : Google cloud platform
c : AWS
d : All of the mentioned provides this service
Answer: d) All of the mentioned provides this service
Questions 5: Which of the following attacks treats the encryption algorithm as a black box ?
Options
a : Implementation attacks
b : Social engineering attack
c : Brute-foce attack
d : Analytical attack
Answer: d) Analytical attack
Questions 6: The zoom range in MS-Excel is:
Options
a : 10% to 400%
b : 100% to 400%
c : 100% to 200%
d : 10% to 200%
Answer: a) 10% to 400%
Questions 7: Which of the following options shows the correct relationsheep between the command and its description?
Options
a : -D(blind address: port:)connect to the target host using an ssh connection and then establishing a toto
b : -p port: Allows remote hosts to connect to local forwarded ports.
c : -j[user host[:port]: Allow remote hosts to connect to local forwarded ports.
d : None of the mentioned.
Answer: b) -p port: Allows remote hosts to connect to local forwarded ports.
Questions 8: Which of the folowing security standerd has the possiblity of breaking the encryption during the initial 4- way handshake ?
Options
a : WPA2
b : WEP
c : Both WPA and WPA2
d : WPA
Answer: c) Both WPA and WPA2
Questions 9: Which of the following is the incorrect representation of the layer number of an OSI model?
Options
a : Layer 6 is the presentation layer
b : Layer 4 is the session layer
c : Layer 3 is the network layer
d : Layer 2 is the data link layer
Answer: b) Layer 4 is the session layer
Questions 10: Which of the following is not vulnerability of the network layer ?
Options
a : Raute spoofing
b : Identity & Resourse ID Vulnerability
c : IP Address Spoofing
d : Weak or non-existent authentication
Answer: d) Weak or non-existent authentication