1) Which of the
following is/are certificate authority?
a) VeriSign
b) Thaw ate
c) Both
A and B
d) None of them
2) A web server
is a software application that uses the _______________ protocol.
a) Hyper text
b) Hypertext
transform
c) Hypertext
transfer
d) None of them
3) _________________
is the main configuration file in apache.
a) Httpd.conf
b) http.conf
c) config
d) none of them
4) We must
restart the apache web server for the configuration change to take effect.
a) True
b) False
5) The
________________ utility is used to create new password files
a) Htpasswd
b) Htpassword
c) Passwd
6) We can
create or generate indexes using _________________
a) Mod_auth
b) mod_autoindex
c) Both A and B
d) None of them
7) Which of
them are considered as the types of logs in apache
a) Errorlog
b) AccessLog
c) PID file
d) Script Log
e) Piped Log
f) All
of them
8) ___________________
is about balancing alternatives, making evaluation, deciding on values and
living with the consequences.
a) Cryptography
b) Security
c) Firewall
d) None
of them
9) ___________________
is used to create new password files.
a) Filter
b) Firewall
c) Htpasswd
d) None of them
10) The
___________________ host feature in apache tells apache to respond to different
IP address, hostnames and ports
a) Virtual
b) System
c) Network
11) ___________________
provides protection against outside attackers by protecting the network from
unnecessary internet traffic.
a) Filter
b) Firewall
c) Proxy server
d) None of them
12) There are
two typed of firewalls.
a) Network-level
firewalls
b) System level
firewalls
c) Application-proxy
firewall/application gateways
13) The most
commonly used ssl directives are
a) SSlEngine
b) SSLCertificateKeyFile
c) SSLCertificateFile
d) All
of the above
14) The
Apache_______________ feature enable us to specify the location of the log
files and the log format to server.
a) Open source
b) Log
c) Proxy server
d) None of them
15) A
___________________ is an electronic document that is used for the
identification of a person, server or a company.
a) Digital
signature
b) Certificate
c) Certificate
Authority
d) None of them
16) The SSL
module in apache is called a ___________________.
a) Mod_ssl
b) Mod_autoindex
c) SSI
d) None of them
17) ___________________
is a protocol that specifies the method of information transfer between a
server and a CGI program.
a) HTTP
b) CGI
c) Both A and B
d) None of them
18) The default
directory for storing CGI programs on apache is ___________________.
a) Cgi-bin
b) Bin
c) Config
d) None of them
19) The SSI
document have a ___________________ extension.
a) .html
b) .shtml
c) .xml
d) None of them
20) Apache
support SSl by default
a) True
b) False
21) Mod_cache
module of apache 2.0 is used to implement ___________________
a) Caching
b) Proxy
caching
c) Both A and B
d) None of them
22) The
___________________ module of apache enables us to implement the cookies
features.
a) Mod_cache
b) Mod_SSl
c) Mode_usertrack
d) None of them
23) which of the
following directives are used to configure cookies
a) Cookies
Tracking
b) Cookies
Expires
c) Cookies Name
d) All
of them
24) Virtual host
is configured using the ___________________
a) Httpd.conf
b) Htpasswd
c) Ssl
d) None of them
25) The is the
core of an operating system.
a) Root
b) Kernel
c) Thread
d) User
26) The is
referred to as root in Linux.
a) Superuser
b) Normal user
c) Master user
d) None of them
27) The terminal
is a window where we can enter and execute system commands.
a) True
b) False
28) The shell
console is a text interface that enables users to enter and execute commands.
a) True
b) False
29) Vi editor is
a visual editor
a) True
b) False
30) The lines
that start with a hash (#) symbol are comments and are not executed when the
system reads the file.
a) True
b) False
31) The finger
command is used to display information of all the users who have currently
logged in.
a) True
b) False
32) We can
change the ownership of a file to a group using the chgrp command
a) True
b) False
33) The chmod
command is used to change the permissions of the files and directories.
a) True
b) False
34) Archiving is
a process of storing the files and directories in a single directory.
a) True
b) False
35) The grep
command is used to search a file for a specified pattern.
a) True
b) False
36) The
______________ command is used to display the name of the user who has
currently logged in.
a) Who
b) Whoami
c) me
d) whoisthis
37) Executable
file name appears in the ______________ color when the is command is used.
a) Red
b) Blue
c) Green
d) Yellow
38) In order to
run a PHP script, we need
a) Web server
b) PHP
installed
c) MySQL installed
d) All
of them
39) Binary
distribution contains setup programs that install every component for the
server to start.
a) True
b) False
40) The
environment variable _______________________ locates the MySQL history file.
a) Home
b) MYSQL_ PSL
c) MYSQL_HISTFILE
d) MYSQL_HOST
41) An entity is
said to be in the _____________ normal form if all the attributes are single
valued (atomic).
a) First
b) Second
c) Third
d) None of
these
42) _________________
A database facilities a faster find and sort operating in the database.
a) Indexing
b) Normalization
c) Compressing
d) None of them
43) Referential
integrity means that when we have a record in a table that refers to
corresponding record in other table then that particular record must exist.
a) True
b) False
44) MEDIUMISTIC
data types occupies _____________ bytes.
a) 1
b) 2
c) 3
d) 4
45) A user is
able to specify the name of a table up to ___________characters.
a) 32
b) 64
c) 128
d) 256
46) MySQL allow
up to _______________ index per table.
a) 16
b) 32
c) 8
d) None of them
47) The maximum
length of a field name is _____________ characters.
a) 32
b) 64
c) 128
d) 256
48) _________________
is used to remove redundancies.
a) Referential
integrity
b) Indexing
c) Normalization
d) None of them
49) The
CHARACTER SET clause modifies the default collation n of a database.
a) True
b) False
50) The_______________
clause of the DROP command show if any dependencies of the table exist.
a) IF
EXIST
b) RESTRICT
c) CASCADE
51) Grouping
facilitates to group rows with similar values for a specific column in to a
single row in order to operate on them together.
a) True
b) False
52) While
creating a foreign key _______________ option prevent the deletion of parent
row if dependent child row exists.
a) RESTRICT
b) NO ACTION
c) ON DELETE
53) The
______________ option of insert command insertion of records to be postponed
unless all clients finished reading from the table.
a) LOW-PRIORITY
b) IGNORE
c) DELAYED
54) If we used
the ______________ option with the UPDATE command then the rows that will
conflict are not update.
a) IGNORE
b) LIMIT
c) LOW-PRIORITY
55) The _____________
option enhances the speed of deletion by suspending the merging of indexes
during the delete command.
a) LOW-PRIORITY
b) QUICK
c) ORDER BY
56) In
_______________ join, the comparison is made between two columns that carry
same values.
a) EQUI
b) OUTER
c) INNER SELF
57) A self-join
is query that is used to join or compare a table to itself.
a) True
b) False
58) Union is
used to combine many result sets used with select command in to a single result
set.
a) True
b) False
59) The
______________ clause is used to limit the number of result displayed by the
query.
a) LIMIT
b) IGNORE
c) RESTRICT
d) NONE OF THEM
60) The
______________ function calculates a cyclic redundancy check value.
a) EXP
b) COS
c) CRC
d) NONE OF THEM
No comments:
Post a Comment