Accenture Network Security and Cloud Questions & Answers | Practice Fundamentals of Networking Security and Cloud MCQ PDF

Accenture Network Security and Cloud Questions & Answers | Accenture Fundamental of Networking Security Questions |  Accenture Fundamental of Networking Security and Cloud Questions

Accenture Network Security and Cloud Questions & Answers: One of the topic questions used for Accenture recruitment process is Fundamental of Networking Security and Cloud. Candidates can solve Accenture Fundamental of Networking Security and Cloud Questions to move for next round. The main recruitment process of Accenture is to qualify some of the tests.

The most recent Accenture questions from the Stage 1 Online Test’s Fundamentals of Networking, Security, and Cloud area are included in this post. This is a must-read if you’re getting ready to take on Accenture Recruitment any time soon. This is the Technical Assessment test.


Which of the following cloud service providers should be preferred if most of your data is of Binary large objects type?

  •  Oracle
  • Azure
  • Google Cloud Platform
  • AWS

Answer: b) Azure

How many processes are there for changing a plaintext piece of data into encrypted data in AES – 128?

  • 14
  • b8
  • 12
  • 10

Answer: d) 10

DES Encryption algorithm is an example of which of the following options?

  • Bit-oriented cipher
  • All of the mentioned options
  • Byte-oriented cipher
  • Key-alternating block ciphers

Answer: a) Bit-oriented cipher

 Which of the following statements is true about cloud and data center?

1. In Cloud, owner is responsible for downtime and repairs
2. In Data center, owner is responsible for downtime and repairs

Choose the correct answer from the options given below.

  • Neither 1 nor 2
  • Only 2
  • Only 3
  • Both 1 and 2

Answer: b) Only 2

 An attack in which the user receives an unwanted amount of emails is _________

  •  Smurfing
  • Denial of Service
  • E-mail bombing
  • Ping storm

Answer: c) E-mail bombing

Consider a situation where you have to choose between the major cloud service providers. Which would you choose if you want support for Linux, Windows Server, and SQL Server and enhanced security?

  • Oracle
  • Google Cloud
  • Azure
  • Alibaba cloud

Answer: d) Azure

Which of the following types of network security ensures that potential attackers cannot infiltrate your network?

  • Firewall
  • Network Access Control
  • Virtual Private Network
  • Both Network Access Control and Virtual Private Network

Answer: c) Virtual Private Network

Consider a situation when you have to choose between the major cloud service providers. Which would you choose if you need a cloud service if you do not want to have backup support?

  • AWS
  • Oracle
  • Azure
  • Google Cloud

Answer: d) Google Cloud

Which of the following is the correctly mapped relationship between attributes and cloud or data centre?

  • In house IT professionals: Data center, Co-location makes failures dependent: cloud
  • Instant Scalable: Data Center, Pay as per use: cloud
  • On-premises: Data center, Remote Hardware: Cloud
  • Involves challenges and delay in Scalability: Data Center, Remote Hardware: Cloud

Answer: c) On-premises: Data center, Remote Hardware: Cloud

Antivirus scanning devices fall under which type of network security device?

  • Active devices
  • Preventative devices
  • Unified Threat Management devices
  • Passive devices

Answer: a) Active devices

Which of the following key resides on all stations as in AP and client devices in a 4-way handshake?

A. Pairwise Transient Key

B. Pairwise Master Key

C. Group Master Key

D. Group Temporal Key

Answer: Option B

Which of the following is not the benefit of the cloud if you chose Platform as a service?

A. Management of Middleware

B. All of the mentioned options

C. Management of Data

D. Management of Runtime

Answer: Option A

Which of the following benefits of cloud makes it easy for a company with a rapid movement to keep the entire system fully functional?

A. Reliability

B. Collaboration

C. Automatic Software Integration

D. Quick Deployment

Answer: Option C

Which of the following payment options is best suited for small businesses in cloud?

A. pay-as-you-go

B. pay-and-use

C. pay-per-use

D. None of the mentioned options

Answer: Option A

Which of the following is correct based on the below statements?

A. Clouds offer limited data storage capacity to users.

B. Clouds offer unlimited data storage capacity to users.

C. In both data center and cloud, there is a third party involved in managing data but the cloud has more data theft.

D. In both data center and cloud, there is a third party involved in managing data but the data center has more data theft.

Choose the correct answer from the options given below.

A. Only A and D

B. Only B and C

C. Only B and D

D. Only A and C

Answer: Option D

Consider the EAP-based 4-way handshake (with WPA/WPA2). Out of the parameters mentioned below, which is/are used to calculate the session keys?

A. Anonce (Anonce is a random number generated by an access point (authenticator))

B. Message Integration Code

C. Pairwise Master Key

D. MAC addresses of Authenticator

E. MAC addresses of Supplicant

Choose the correct answer from the options given below.

A. Only A, C, D, and E

B. Only A, B, and C

C. Only D and E

D. Only A and B

Answer: Option B

Which of the following is the correct order of activities that happens during the connection of the SSH client and SSH server?

A. SSH Server Sends server public key to SSH client.

B. Negotiation of parameters and open a secure channel between client and server.

C. Client contacts the server to create a connection.

D. User login to server host Operating System.

A. ABCD

B. ACBD

C. CBAD

D. CABD

Answer: Option D

If you are interested to get more Fundamentals of Networking Security and Cloud MCQ PDF just visit our website (naukrimessenger.com). Our website provides some of the Accenture Fundamental of Networking Security Questions frequently.