ITIS Miscellaneous Final Assessment
Q1.The storage that is directly attached to the computer network (LAN) is calledAnswer: NAS
Q2. The disk locally attached to the server is called _________.
Answer: DAS
Q3. Point-in-time copy of source volume is called _____.
Answer: Snapshot
Q4. Port no for SMTP protocol
Answer: 25
Q5. An event that is generated when a service or device is approaching a threshold is called
Answer: Warning
Q6. unsolicited bulk emails messages are known as
Answer: Spam
Q7. Which of the following backup is easy to implement
Answer: None
Q8. Which RAID level is not fault tolerant
Answer: RAID 0
Q9. The backup which takes long time to restore?
Answer: Incremental backup
Q10. Backup is used to ________.
Answer: To restore data, recover files as well as replication data between sites
Q11. Which of the following is example for physical security?
Answer: Motion or Intrusion Detectors
Q12. What is the process of creating an exact copy of data?
Answer: Replication
Q13. Which of the following is not a level security in FC SAN?
Answer: Data Firewall
Q14. Which of the following is a file system used in virtual desktop interface?
Answer: NTFS
Q15. _______ is an example for mail server.
Answer: All of the above
Q16. Which one these are not an email agent?
Answer: MVA
Q17. An attack that redirects users from the legitimate website they intended to visit and lead them to malicious ones.
Answer: Pharming
Q18. Which one is not a messaging protocol.
Answer: SNMP
Q19. Which is the minimum number of hard disk required to setup RAID 1.
Answer: Two
Q20. Display terminal connecting to a hosted virtual desktop is known as
Answer: Thin client
Q21. Software that track your internet browsing habits and send you pop up containing advertisements known as
Answer: Adware
Q22. Which of the following is independent malicious program that need not any host program?
Answer: Trojan horse
Q23. The collection of information stored in the database is called ______.
Answer: Instance of the database
Q24. An attack that redirects users from the legitimate website they intended to visit and lead them to malicious ones.
Answer: Pharming
Q25. Benefits of desktop centralization includes
Answer: All of the above
No comments:
Post a Comment