Monday, 16 November 2015

Accp (pro) HDSE II Comprehensive Exam Part 2

1)  Which of the following is/are certificate authority?
a)      VeriSign
b)      Thaw ate
c)    Both A and B
d)      None of them
2)  A web server is a software application that uses the _______________ protocol.
a)      Hyper text
b)      Hypertext transform
c)    Hypertext transfer
d)      None of them
3)  _________________ is the main configuration file in apache.
a)   Httpd.conf
b)      http.conf
c)      config
d)      none of them
4)  We must restart the apache web server for the configuration change to take effect.
a)   True
b)      False
5)  The ________________ utility is used to create new password files
a)      Htpasswd
b)   Htpassword
c)      Passwd
6)  We can create or generate indexes using _________________
a)      Mod_auth
b)   mod_autoindex
c)      Both A and B
d)      None of them
7)  Which of them are considered as the types of logs in apache
a)      Errorlog
b)      AccessLog
c)      PID file
d)      Script Log
e)      Piped Log
f)    All of them
8)  ___________________ is about balancing alternatives, making evaluation, deciding on values and living with the consequences.
a)      Cryptography
b)      Security
c)      Firewall
d)   None of them
9)  ___________________ is used to create new password files.
a)      Filter
b)      Firewall
c)    Htpasswd
d)      None of them
10)       The ___________________ host feature in apache tells apache to respond to different IP address, hostnames and ports
a)   Virtual
b)      System
c)      Network
11)       ___________________ provides protection against outside attackers by protecting the network from unnecessary internet traffic.
a)      Filter
b)   Firewall
c)      Proxy server
d)      None of them
12)       There are two typed of firewalls.
a)   Network-level firewalls
b)      System level firewalls
c)    Application-proxy firewall/application gateways
13)       The most commonly used ssl directives are
a)      SSlEngine
b)      SSLCertificateKeyFile
c)      SSLCertificateFile
d)   All of the above
14)       The Apache_______________ feature enable us to specify the location of the log files and the log format to server.
a)      Open source
b)   Log
c)      Proxy server
d)      None of them
15)       A ___________________ is an electronic document that is used for the identification of a person, server or a company.
a)      Digital signature
b)   Certificate
c)      Certificate Authority
d)      None of them
16)       The SSL module in apache is called a ___________________.
a)   Mod_ssl
b)      Mod_autoindex
c)      SSI
d)      None of them
17)       ___________________ is a protocol that specifies the method of information transfer between a server and a CGI program.
a)      HTTP
b)   CGI
c)      Both A and B
d)      None of them
18)       The default directory for storing CGI programs on apache is ___________________.
a)   Cgi-bin
b)      Bin
c)      Config
d)      None of them
19)       The SSI document have a ___________________ extension.
a)      .html
b)   .shtml
c)      .xml
d)      None of them
20)       Apache support SSl by default
a)      True
b)   False
21)       Mod_cache module of apache 2.0 is used to implement ___________________
a)      Caching
b)   Proxy caching
c)      Both A and B
d)      None of them
22)       The ___________________ module of apache enables us to implement the cookies features.
a)      Mod_cache
b)      Mod_SSl
c)    Mode_usertrack
d)      None of them
23)       which of the following directives are used to configure cookies
a)      Cookies Tracking
b)      Cookies Expires
c)      Cookies Name
d)   All of them
24)       Virtual host is configured using the ___________________
a)   Httpd.conf
b)      Htpasswd
c)      Ssl
d)      None of them
25)       The is the core of an operating system.
a)      Root
b)   Kernel
c)      Thread
d)      User
26)       The is referred to as root in Linux.
a)   Superuser
b)      Normal user
c)      Master user
d)      None of them
27)       The terminal is a window where we can enter and execute system commands.
a)   True
b)      False
28)       The shell console is a text interface that enables users to enter and execute commands.
a)   True
b)      False
29)       Vi editor is a visual editor
a)   True
b)      False
30)       The lines that start with a hash (#) symbol are comments and are not executed when the system reads the file.
a)   True
b)      False
31)       The finger command is used to display information of all the users who have currently logged in.
a)   True
b)      False
32)       We can change the ownership of a file to a group using the chgrp command
a)   True
b)      False
33)       The chmod command is used to change the permissions of the files and directories.
a)   True
b)      False
34)       Archiving is a process of storing the files and directories in a single directory.
a)   True
b)      False
35)       The grep command is used to search a file for a specified pattern.
a)   True
b)      False
36)       The ______________ command is used to display the name of the user who has currently logged in.
a)      Who
b)   Whoami
c)      me
d)      whoisthis
37)       Executable file name appears in the ______________ color when the is command is used.
a)      Red
b)      Blue
c)    Green
d)      Yellow
38)       In order to run a PHP script, we need
a)      Web server
b)      PHP installed
c)       MySQL installed
d)   All of them
39)       Binary distribution contains setup programs that install every component for the server to start.
a)   True
b)      False
40)       The environment variable _______________________ locates the MySQL history file.
a)      Home
b)      MYSQL_ PSL
c)    MYSQL_HISTFILE
d)      MYSQL_HOST
41)       An entity is said to be in the _____________ normal form if all the attributes are single valued (atomic).
a)   First
b)      Second
c)      Third
d)      None of these
42)       _________________ A database facilities a faster find and sort operating in the database.
a)   Indexing
b)      Normalization
c)      Compressing
d)      None of them
43)       Referential integrity means that when we have a record in a table that refers to corresponding record in other table then that particular record must exist.
a)   True
b)      False
44)       MEDIUMISTIC data types occupies _____________ bytes.
a)      1
b)      2
c)    3
d)      4
45)       A user is able to specify the name of a table up to ___________characters.
a)      32
b)   64
c)      128
d)      256
46)       MySQL allow up to _______________ index per table.
a)      16
b)   32
c)      8
d)      None of them
47)       The maximum length of a field name is _____________ characters.
a)      32
b)   64
c)      128
d)      256
48)       _________________ is used to remove redundancies.
a)      Referential integrity
b)      Indexing
c)    Normalization
d)      None of them
49)       The CHARACTER SET clause modifies the default collation n of a database.
a)   True
b)      False
50)       The_______________ clause of the DROP command show if any dependencies of the table exist.
a)   IF EXIST
b)      RESTRICT
c)      CASCADE
51)       Grouping facilitates to group rows with similar values for a specific column in to a single row in order to operate on them together.
a)   True
b)      False
52)       While creating a foreign key _______________ option prevent the deletion of parent row if dependent child row exists.
a)   RESTRICT
b)      NO ACTION
c)      ON DELETE
53)       The ______________ option of insert command insertion of records to be postponed unless all clients finished reading from the table.
a)   LOW-PRIORITY
b)      IGNORE
c)      DELAYED
54)       If we used the ______________ option with the UPDATE command then the rows that will conflict are not update.
a)   IGNORE
b)      LIMIT
c)      LOW-PRIORITY
55)       The _____________ option enhances the speed of deletion by suspending the merging of indexes during the delete command.
a)      LOW-PRIORITY
b)   QUICK
c)      ORDER BY
56)       In _______________ join, the comparison is made between two columns that carry same values.
a)   EQUI
b)      OUTER
c)      INNER SELF
57)       A self-join is query that is used to join or compare a table to itself.
a)   True
b)      False
58)       Union is used to combine many result sets used with select command in to a single result set.
a)   True
b)      False
59)       The ______________ clause is used to limit the number of result displayed by the query.
a)   LIMIT
b)      IGNORE
c)      RESTRICT
d)      NONE OF THEM
60)       The ______________ function calculates a cyclic redundancy check value.
a)      EXP
b)      COS
c)    CRC
d)      NONE OF THEM

No comments:

Post a Comment