Accenture Network Security and Cloud Quiz-1

Question 1

Time: 00:00:00
Which is not an objective of network security?

Identification

Identification

Authentication

Authentication

lock

lock

Access Control

Access Control

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 2

Time: 00:00:00
An algorithm in encryption is called _____________

Algorithm

Algorithm

Procedure

Procedure

Cipher

Cipher

Module

Module

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 3

Time: 00:00:00
What is ransomware?

A nickname for the types of spyware that require a password on boot

A nickname for the types of spyware that require a password on boot

Software that steals files from your computer and is used by blackmailers

Software that steals files from your computer and is used by blackmailers

A software that hijacks your computer and asks you to pay in order for it to be removed

A software that hijacks your computer and asks you to pay in order for it to be removed

viruses that infect files and won't let you open them unless you know a certain pass code

viruses that infect files and won't let you open them unless you know a certain pass code

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 4

Time: 00:00:00
Which of the following has network reliability issues?

frequency of failures

frequency of failures

recovery time after failure

recovery time after failure

catastrophe

catastrophe

All of the above

All of the above

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 5

Time: 00:00:00
A digital signature scheme consists of which of the following typical algorithms?

Key generation, Signing and Signature Verifying Algorithm

Key generation, Signing and Signature Verifying Algorithm

Signature Verifying Algorithm

Signature Verifying Algorithm

Key Generation Algorithm

Key Generation Algorithm

Signing Algorithm

Signing Algorithm

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 6

Time: 00:00:00
The type of encoding in which manipulation of bit streams without regard to what the bits mean is .....................

Destination encoding

Destination encoding

Entropy encoding

Entropy encoding

Source encoding

Source encoding

Differential encoding

Differential encoding

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 7

Time: 00:00:00
The protocol used to provide security to e-mails?

POP

POP

PGP

PGP

SNMP

SNMP

HTTP

HTTP

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 8

Time: 00:00:00
The ................... portion of LAN management software restricts access, records user activities and audit data etc.

Configuration management

Configuration management

Security management

Security management

Performance management

Performance management

None of these

None of these

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 9

Time: 00:00:00
Caesar cipher with key 3, is represented as ................

C = (p+3)mod3

C = (p+3)mod3

C = (p+26)mod3

C = (p+26)mod3

C = (p*3)mod26

C = (p*3)mod26

C = (p+3)mod26

C = (p+3)mod26

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 10

Time: 00:00:00
Number of rounds in Data Encryption Standard algorithm?

8 rounds

8 rounds

12 rounds

12 rounds

16 rounds

16 rounds

24 rounds

24 rounds

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

["0","40","60","80","100"]
["Need more practice!","Keep trying!","Not bad!","Good work!","Perfect!"]

Personalized Analytics only Availble for Logged in users

Analytics below shows your performance in various Mocks on PrepInsta

Your average Analytics for this Quiz

Rank

-

Percentile

0%

Completed

0/10

Accuracy

0%

Prime

PrepInsta Prime Video

Complete video course for Accenture

(For Accenture)
Get Prime Video

Prime

PrepInsta Prime Mock

Topic wise mocks and much more...

(For Accenture)
Get prime mock
Get Prepinsta Prime

Get all 200+ courses offered by Prepinsta

Never Miss an OffCampus Update

Get OffCampus Updates on Social Media from PrepInsta

Follow us on our Media Handles, we post out OffCampus drives on our Instagram, Telegram, Discord, Whatsdapp etc.

Get Hiring Updates
Amazon,Google,Delottie & 30+companies are hiring ! Get hiring Updates right in your inbox from PrepInsta

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.

Get PrepInsta Prime Subscription

Get access to all the courses that PrepInsta offers, check the out below -

Companies

TCS, Cognizant, Delloite, Infosys, Wipro, CoCubes, KPMG, Amazone, ZS Associates, Accenture, Congnizant & other 50+ companies

Programming

Data Structures, Top 500 Codes, C, C++, Java Python & other 10+ subjects

Skills

Full Stack Web Development, Data Science, Machine Learning, AWS Cloud, & other 10+ skills and 20+ projects