Accenture Network Security and Cloud Questions & Answers | Accenture Fundamental of Networking Security Questions | Accenture Fundamental of Networking Security and Cloud Questions
Accenture Network Security and Cloud Questions & Answers: One of the topic questions used for Accenture recruitment process is Fundamental of Networking Security and Cloud. Candidates can solve Accenture Fundamental of Networking Security and Cloud Questions to move for next round. The main recruitment process of Accenture is to qualify some of the tests.
The most recent Accenture questions from the Stage 1 Online Test’s Fundamentals of Networking, Security, and Cloud area are included in this post. This is a must-read if you’re getting ready to take on Accenture Recruitment any time soon. This is the Technical Assessment test.
Which of the following cloud service providers should be preferred if most of your data is of Binary large objects type?
- Oracle
- Azure
- Google Cloud Platform
- AWS
Answer: b) Azure
How many processes are there for changing a plaintext piece of data into encrypted data in AES – 128?
- 14
- b8
- 12
- 10
Answer: d) 10
DES Encryption algorithm is an example of which of the following options?
- Bit-oriented cipher
- All of the mentioned options
- Byte-oriented cipher
- Key-alternating block ciphers
Answer: a) Bit-oriented cipher
Which of the following statements is true about cloud and data center?
1. In Cloud, owner is responsible for downtime and repairs
2. In Data center, owner is responsible for downtime and repairs
Choose the correct answer from the options given below.
- Neither 1 nor 2
- Only 2
- Only 3
- Both 1 and 2
Answer: b) Only 2
An attack in which the user receives an unwanted amount of emails is _________
- Smurfing
- Denial of Service
- E-mail bombing
- Ping storm
Answer: c) E-mail bombing
Consider a situation where you have to choose between the major cloud service providers. Which would you choose if you want support for Linux, Windows Server, and SQL Server and enhanced security?
- Oracle
- Google Cloud
- Azure
- Alibaba cloud
Answer: d) Azure
Which of the following types of network security ensures that potential attackers cannot infiltrate your network?
- Firewall
- Network Access Control
- Virtual Private Network
- Both Network Access Control and Virtual Private Network
Answer: c) Virtual Private Network
Consider a situation when you have to choose between the major cloud service providers. Which would you choose if you need a cloud service if you do not want to have backup support?
- AWS
- Oracle
- Azure
- Google Cloud
Answer: d) Google Cloud
Which of the following is the correctly mapped relationship between attributes and cloud or data centre?
- In house IT professionals: Data center, Co-location makes failures dependent: cloud
- Instant Scalable: Data Center, Pay as per use: cloud
- On-premises: Data center, Remote Hardware: Cloud
- Involves challenges and delay in Scalability: Data Center, Remote Hardware: Cloud
Answer: c) On-premises: Data center, Remote Hardware: Cloud
Antivirus scanning devices fall under which type of network security device?
- Active devices
- Preventative devices
- Unified Threat Management devices
- Passive devices
Answer: a) Active devices
Which of the following key resides on all stations as in AP and client devices in a 4-way handshake?
A. Pairwise Transient Key
B. Pairwise Master Key
C. Group Master Key
D. Group Temporal Key
Answer: Option B
Which of the following is not the benefit of the cloud if you chose Platform as a service?
A. Management of Middleware
B. All of the mentioned options
C. Management of Data
D. Management of Runtime
Answer: Option A
Which of the following benefits of cloud makes it easy for a company with a rapid movement to keep the entire system fully functional?
A. Reliability
B. Collaboration
C. Automatic Software Integration
D. Quick Deployment
Answer: Option C
Which of the following payment options is best suited for small businesses in cloud?
A. pay-as-you-go
B. pay-and-use
C. pay-per-use
D. None of the mentioned options
Answer: Option A
Which of the following is correct based on the below statements?
A. Clouds offer limited data storage capacity to users.
B. Clouds offer unlimited data storage capacity to users.
C. In both data center and cloud, there is a third party involved in managing data but the cloud has more data theft.
D. In both data center and cloud, there is a third party involved in managing data but the data center has more data theft.
Choose the correct answer from the options given below.
A. Only A and D
B. Only B and C
C. Only B and D
D. Only A and C
Answer: Option D
Consider the EAP-based 4-way handshake (with WPA/WPA2). Out of the parameters mentioned below, which is/are used to calculate the session keys?
A. Anonce (Anonce is a random number generated by an access point (authenticator))
B. Message Integration Code
C. Pairwise Master Key
D. MAC addresses of Authenticator
E. MAC addresses of Supplicant
Choose the correct answer from the options given below.
A. Only A, C, D, and E
B. Only A, B, and C
C. Only D and E
D. Only A and B
Answer: Option B
Which of the following is the correct order of activities that happens during the connection of the SSH client and SSH server?
A. SSH Server Sends server public key to SSH client.
B. Negotiation of parameters and open a secure channel between client and server.
C. Client contacts the server to create a connection.
D. User login to server host Operating System.
A. ABCD
B. ACBD
C. CBAD
D. CABD
Answer: Option D
If you are interested to get more Fundamentals of Networking Security and Cloud MCQ PDF just visit our website (naukrimessenger.com). Our website provides some of the Accenture Fundamental of Networking Security Questions frequently.