Tuesday, 23 June 2020

TCS XPLORE ITIS Miscellaneous Linkedin Courses

ITIS Miscellaneous Final Assessment

Q1.The storage that is directly attached to the computer network (LAN) is called

Answer: NAS

Q2. The disk locally attached to the server is called _________.

Answer: DAS

Q3. Point-in-time copy of source volume is called _____.

Answer: Snapshot

Q4. Port no for SMTP protocol

Answer: 25

Q5. An event that is generated when a service or device is approaching a threshold is called

Answer: Warning

Q6. unsolicited bulk emails messages are known as

Answer: Spam

Q7. Which of the following backup is easy to implement

Answer: None

Q8. Which RAID level is not fault tolerant

Answer: RAID 0

Q9. The backup which takes long time to restore?

Answer: Incremental backup

Q10. Backup is used to ________.

Answer: To restore data, recover files as well as replication data between sites

Q11. Which of the following is example for physical security?

Answer: Motion or Intrusion Detectors

Q12. What is the process of creating an exact copy of data?

Answer: Replication

Q13. Which of the following is not a level security in FC SAN?

Answer: Data Firewall

Q14. Which of the following is a file system used in virtual desktop interface?

Answer: NTFS

Q15. _______ is an example for mail server.

Answer: All of the above

Q16. Which one these are not an email agent?

Answer: MVA

Q17. An attack that redirects users from the legitimate website they intended to visit and lead them to malicious ones.

Answer: Pharming

Q18. Which one is not a messaging protocol.

Answer: SNMP

Q19. Which is the minimum number of hard disk required to setup RAID 1.

Answer: Two

Q20. Display terminal connecting to a hosted virtual desktop is known as

Answer: Thin client

Q21.  Software that track your internet browsing habits and send you pop up containing advertisements known as 

Answer: Adware

Q22. Which of the following is independent malicious program that need not any host program?

Answer: Trojan horse

Q23. The collection of information stored in the database is called ______.

Answer: Instance of the database

Q24. An attack that redirects users from the legitimate website they intended to visit and lead them to malicious ones.

Answer: Pharming

Q25. Benefits of desktop centralization includes

Answer: All of the above