250+ TOP MCQs on Linking to Other Sites & Email Links and its Decoration

HTML Multiple Choice Questions “Linking to Other Sites & Email Links and its Decoration”.

1. target attribute cannot have?
a) _blank
b) _self
c) _parent
d) _color

Answer: d
Clarification: Target attribute can have values _blank, _self, _parent, _top and filename. _blank opens the linked document in a new tab window or tab, _self opens linked document in the same window, _parent opens linked document in the parent frame.

2. Which of the following opens linked document in full body?
a) _blank
b) _top
c) _parent
d) framename

Answer: b
Clarification: _parent opens linked document in parent frame, _top opens the linked document in full body of the window, framename opens the linked document in a named frame,

e.g. <a href= https://www..com/ target= “_parent”> Visit The site !! </a>.

3. Which attribute is used to link the bookmark?
a) href
b) id
c) target
d)

Answer: a
Clarification: href attribute is used to link the bookmark. The id attribute is for defining bookmarks in a page, target attribute is for specifying where to open linked document i.e. in new tab, same frame, parent frame, full body of the window etc.

4. Which of the following sets the color of a link before it has been clicked on?
a) ALINK
b) LINK
c) VLINK
d) ULINK

Answer: b
Clarification: LINK set the color of a link before it has been clicked on, ALINK set the color of a link when a link is clicked on, VLINK set the color of a link after it has been clicked on, here A and V stands for Active and Visited.

5. What is used for specifying an email to be sent?
a) mailto:
b) target
c) id
d) href

Answer: a
Clarification: Target attribute is for specifying where to open linked document i.e. in a new tab, same frame, parent frame, full body of the window etc. We use mailto: with and href for specifying the email address that we want to be sent to. It will open a new email message and address to a person specified in the link. The email link will appear like a normal link. The id attribute is for defining bookmarks in a page.

6. Which of the following is not the parameter for email link?
a) body
b) bcc
c) cc
d) #

Answer: d
Clarification: There are various parameters used for email links like mailto, bcc, body, cc, subject, ‘&’, ‘?’. mailto: is used for e-mail recipient address, bcc is for blind carbon copy mail address, cc is for carbon copy e-mail address, subject is for the subject of the e-mail, ‘?’ is first parameters delimiter.

7. Which one of the following is used for space character?
a) %50
b) %60
c) %20
d) %10

Answer: c

8. What will add line break in the body of mail?
a) %20
b) %0D%0A
c) %0h%0A
d) %10

Answer: b
Clarification: %20 represents space character. A data link escape is shown by %10. %0D%0A will add a newline in the text of the body.

300+ [UPDATED] StoreKeeper MCQs and Answers [PDF]

StoreKeeper Objective Questions

1. Motivation involves: | Store Keeper Mcqs

A. driving motorised vehicles around the Store.

B. making stores staff work hard for long periods without rest.

C. encouraging stores staff to work well and willingly.

D. telling stores staff what to do and when to do it.

Answer: C

2. Internal recruitment is the process of: | Store Keeper Mcqs

A. making sure stores staff stay in the Store the whole working day.

B. ensuring the Store is clean and tidy at all times.

C. filling a stores post from sources outside the enterprise.

D. filling a stores post with somebody already working in the enterprise.

Answer: D

3. Induction is the process of: | Store Keeper Mcqs

A. inducing stores staff to work hard for long hours.

B. introducing new stores staff to the work environment.

C. introducing customers to new stores staff.

D. introducing new rules and regulations for stores staff.

Answer: B

4. Adequate training of stores personnel is essential to: | Store Keeper Mcqs

A. avoid accidents in the Stores and the deterioration of stock.

B. ensure they can drive vehicles quickly around the Store.

C. help them find their way to work quickly each morning.

D. encourage them to become fit and strong and work hard.

Answer: A

5. Stores personnel recruited must be honest because: | Store Keeper Mcqs

A. they will be handling a great deal of cash.

B. they need to be able to work without constant supervision.

C. they will be entrusted with the care of items worth much money.

D. they should take home from the Store only what they really need.

Answer: C

6.  An important aspect of stock control involves: | Store Keeper Mcqs

A. finding one’s way around the Stores Department.

B. looking after cattle on a ranch or farm.

C. ensuring the right items are always available when needed.

D. counting the number of staff working in the Store.

Answer: C

7. Stores and Sales Departments must work in co-operation to ensure: | Store Keeper Mcqs

A. that the staff of the two departments do not become confused.

B. that Stores does not hold stocks of items which cannot be sold.

C. that customers know which department to order from.

D. that they are not dominated by the Production Department.

Answer: B

8. The Stores Department is said to be “nonproductive” because: | Store Keeper Mcqs

A. its staff are lazy and do very little work.

B. it is of no value to the enterprise of which it forms part.

C. its manager does not produce reports required by top management.

D. it is not directly involved in revenue-earning activities.

Answer: D

9. The essential function of a Stores Department is to provide: | Store Keeper Mcqs

A. an efficient service to all other departments of an enterprise.

B. a retail outlet from which to sell goods to consumers.

C. a reason to employ additional staff.

D. a place in which to house unwanted items.

Answer: A

10. Efficient stores management is vital to ensure that: | Store Keeper Mcqs

A. good production and/or sales and profits are maintained.

B. delays in issuing materials will slow down production.

C. fewer items will be issued and used, so money will be saved.

D. customers will not need to return for further supplies.

Answer: A

300+ [UPDATED] MS Excel MCQs and Answers [PDF] Quiz

MS Excel Objective Questions and Answers

MS Excel Objective Questions and Answers Pdf Download for Exam MS Excel Multiple choice Questions. These Objective type MS Excel Test Questions

 1.    What function displays row data in a column or column data in a row? | Ms Excel Mcqs

a.   Hyperlink

b.   Index

c.   Transpose

d.   Rows

Answer: c

2.    When you insert an Excel file into a Word document, the data are ______. | Ms Excel Mcqs

a.   Hyperlinked

b.   Placed in a word table

c.   Linked

d.   Embedded

Answer: b

3.    Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result. | Ms Excel Mcqs

a.   IF

b.   AND

c.   OR

d.   NOT

Answer: a

4.    Macros are “run” or executed from the ….. Menu. | Ms Excel Mcqs

a.   Insert

b.   Format

c.   Tools

d.   Data

Answer: c

5.    You can open the consolidate dialog box byte choosing Consolidate from the ….. Menu. | Ms Excel Mcqs

a.   Insert

b.   Format

c.   Tools

d.   Data

Answer: d

6.    Each excel file is called a workbook because | Ms Excel Mcqs

a.   It can contain text and data

b.   It can be modified

c.   It can contain many sheets including worksheets and chart sheets

d.   You have to work hard to create it

Answer: c

7.    Which types of charts can excel produce? | Ms Excel Mcqs

a.   Line graphs and pie charts only

b.   Only line graphs

c.   Bar charts, line graphs and pie charts

d.   Bar charts and line graphs only

Answer: c

8.    How are data organized in a spreadsheet? | Ms Excel Mcqs

a.   Lines and spaces

b.   Layers and planes

c.   Rows and columns

d.   Height and width

Answer: c

9.    What does the VLOOKUP function do? | Ms Excel Mcqs

a.   Looks up text that contain ‘v’

b.   Checks whether text is the same in one cell as in the next

c.   Finds related records

d.   All of above

Answer: c

10.    Gridlines | Ms Excel Mcqs

a.   May be turned off for display but turned on for printing

b.   May be turned on or off for printing

c.   The be turned off for display and printing

d.   a, b and c

Answer: d

11.    You can print only an embedded chart by | Ms Excel Mcqs

a.   Moving the chart to a chart sheet before you print.

b.   Formatting the chart before you print

c.   Selecting the chart before you print

d.   a  and c

Answer: d

12.    Which of the following is a correct order of precedence in a formula calculation? | Ms Excel Mcqs

a.   Multiplication and division, exponential positive and negative value

b.   Multiplication and division, positive and negative values, addition and subtraction

c.   Addition and subtraction, positive and negative values, exponentiation

d.   None of above

Answer: d

13.    A function inside another function is called a ….. Function. | Ms Excel Mcqs

a.   Nested

b.   Round

c.   Sum

d.   Text

Answer: a

14.    How should you print a selected area of a worksheet, if you’ll want to print a different area next time? | Ms Excel Mcqs

a.   On the file menu, point to print area, and then click set print area.

b.   On the file menu, click print, and then click selection under print what

c.   On the view menu, click custom views, then click add

d.   All of above

Answer: b

15.    Your German supplier still invoices for parts in deutsche marks. How can you have Excel convert those sums to Euros? | Ms Excel Mcqs

a.   On the Insert menu, click Symbol and from the currency symbols subset, select the Euro sign.

b.   On the tools menu, click Add-Ins, and select the Euro Currency Tools check box

c.   Apply a selected background color

d.   All of above

Answer: b

16.    Which function calculates your monthly mort age payment? | Ms Excel Mcqs

a.   PMT (payments)

b.   NPER (number of periods)

c.   PV (present value)

d.   All of above

Answer: a

17.    If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate this feature? | Ms Excel Mcqs

a.   Point to speech on the tools menu, and then click show text to speech toolbar.

b.   Click validation on the data menu

c.   Point to speech on the tools menu, and then click speech recognition

d.   All of above

Answer: a

18.    Which of the following methods cannot be used to enter data in a cell? | Ms Excel Mcqs

a.   Pressing an arrow key

b.   Pressing the tab key

c.   Pressing the Esc key

d.   Clicking the enter button to the formula bar

Answer: c

19.    Which of the following will not set text in selected cells to italics? | Ms Excel Mcqs

a.   Pressing Ctrl + I on the keyboard

b.   Using the Tools – Wizard – Web Form menu item

c.   Using the Format – Cells – Font menu item

d.   None of the above

Answer: b

20.    Which of the following methods cannot be used to edit the content of cell? | Ms Excel Mcqs

a.   Pressing the Alt key

b.   Clicking the formula bar

c.   Pressing F2

d.   Double clicking the cell

Answer: a

21. Which of the following is not an option in the spelling dialog box?

a.   Edit

b.   Ignore

c.   Ignore all

d.   Change

Answer: a

22. You can quickly change the appearance of your work by choosing Auto Format from the …. Menu

a.   Edit

b.   View

c.   Format

d.   Tools

Answer: c

23. To protect a worksheet, you can choose Protection and the Protect Sheet from the ….. menu

a.   Edit

b.   Format

c.   Tools

d.   Data

Answer: c

24. You can open the Highlight Changes dialog box by choosing Track Changes from the …. Menu.

a.   Edit

b.   Insert

c.   Format

d.   Tools

Answer: d

25. Which of the following is not a worksheet design criterion?

a.   Efficiency

b.   Audit ability

c.   Description

d.   Clarity

Answer: c

26. To copy cell contents using drag and drop, press the

a.   End key

b.   Shift key

c.   Esc key

d.   None of above

Answer: d

27. If you press …., the cell accepts your typing as its contents.

a.   Enter

b.   Ctrl + Enter

c.   TAB

d.   Insert

Answer: a

28. The auto fill feature

a.   Extends a sequential series of data

b.   Automatically adds a range of cell values

c.   Applies a boarder around selected cells

d.   None of above

Answer: a

29. What is the keyboard shortcut (button or buttons to be pressed) for creating a chart from the selected cells?

a.   F3

b.   F5

c.   F7

d.   F11

Answer: d

30. you can use the formula palette to

a.   format cells containing numbers

b.   create and edit formulas containing functions

c.   entered assumptions data

d.   copy a range of cells

Answer: b

31. What Pivot Table toolbar button updates the data in a Pivot Table or Pivot Chart report if the source data chas changed?

a.   Format Report

b.   Pivot Table

c.   Refresh Data

d.   Show Detail

Answer: c

32. What is an expression that tells how the numbers in a determined set of cells are to be calculated?

a.   Formula

b.   Field

c.   Data

d.   Query Correct Answer:

Answer: a

33. “Qtr 1, Qtr 2, Qtr 3” is an example of a

a.   Formula

b.   Function

c.   Series

d.   Syntax

Answer: c

34. You can edit existing Excel data by pressing the

a.   F1 key

b.   F2 key

c.   F3 key

d.   F4 key

Answer: b

35. The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is ….

a.   G1-G10

b.   B1.G10

c.   B1;G10

d.   B1:G10

Answer: d

36. A user wishes to remove a spreadsheet from a workbook. Which is the correct sequence of events that will do this?

a.   Go to File-Save As – Save As Type – Excel worksheet

b.   Right click on the spreadsheet tab and select DELETE

c.   Right click on the spreadsheet and select Insert – Entire Column

d.   None of above

Answer: b

37. What feature enables you to adjust or back solve the value in a cell to reach a desired outcome in a formula?

a.   Goal Seek

b.   Scenario Summary report

c.   Forecasting

d.   Trend line

Answer: d

38. What term describes a background that appears as a grainy, non smooth surface

a.   gradient

b.   pattern

c.   solid

d.   texture

Answer: a

39. Excel is a

a.   Graphic program

b.   None of these

c.   Word processor

d.   A spreadsheet

Answer: d

40.    To create an interactive Pivot Table for the web, you use a Microsoft Office Web component called

a.   HTML

b.   Pivot Table Field List

c.   Pivot Table List

d.   Pivot Table Report

Answer: d

41. When integrating Word and Excel, Word is usually the

a. Server

b. Client

c. Source

d. None of these

Answer: b

42. The number of rows in a worksheet is

a. 36500

b. 65536

c. 256

d. 64536

Answer: b

43. With which of the following all formulas in excel starts?

a. /

b. *

c. $

d. =

Answer: d

44. On an excel sheet the active cell in indicated by ?

a. A dotted border

b. A dark wide border

c. A blinking border

d. By italic text

Answer: b

45. What term describes explanatory text attached to a cell?

a. Context

b. Callout

c. Comment

d. Dialog

Answer: c

46. How we can view a cell comment?

a. Position the mouse pointer over the cell

b. click the comment command on the view menu

c. click the edit comment commands on the Insert menu

d. click the Display comment command on the window menu

Answer: a

47. Which of these will not select all the cells in a document?

a. Using the Edit  Select All menu

b. Pressing Ctrl + A on the keyboard

c. Clicking three times with the right mouse button in the spreadsheet

Answer: c

48. The default style for new data keyed in a new workbook is ?

a. Comma

b. Normal

c. Currency

d. Percent

Answer: b

49. If you press ___, the cell accepts your typing as its contents ?

a. Tab

b. Ctrl+Enter

c. Enter

d. Alt+Enter

Answer: c

50. Which of the following is an absolute cell reference?

a. !A!1

b. $A$1

c. #a#1

d. A1

Answer: b

300+ [UPDATED] Fortran MCQs and Answers [PDF]

Fortran Objective Questions and Answers

Fortran Objective Questions and Answers Pdf Download for Exam Fortran Multiple choice Questions. Quiz Fortran Test Questions

1. Which of the following is not a valid property of a PARAMETER statement? | Fortran Questions

A. Can combine other parameters with FORTRAN arithmetic operators to compute the value of a new parameter

B. Parameters can be set anywhere in a program

C. Integer parameters can be used to set array dimensions

D. Parameters can be used as bounds on do loops.

Ans: B

2. For the following FORTRAN operations give the rank from fastest to slowest in terms of computer time required | Fortran Questions

A. x*0.5

B. x+0.5

C. x**0.5

D. sqrt(x)

Ans: C

3. Which of the following is not a valid property of a PARAMETER statement? | Fortran Questions

A. Can combine other parameters with FORTRAN arithmetic operators to compute the value of a new parameter

B. Parameters can be set anywhere in a program

C. Integer parameters can be used to set array dimensions

D. Parameters can be used as bounds on do loops.

Ans: B

4. In a FORTRAN program I have set x=2.0, a=2.0 and b=4.0. What is the value of y if: y = a*x+b**2/x ? | Fortran Questions

A. 8.0

B. 12.0

C. 16.0

D. 64.0

Ans: B

5. In a FORTRAN program I have set x=1.5,i=3, and j=2. What is the value of y if: | Fortran Questions

A. 3.0

B. 3.5

C. 4.0

D. 4.5

Ans: C

6. In a FORTRAN program x=4.5, y=3.0, and w=1.5, What is the value of z if: z = x+w/y+1 | Fortran Questions

A. 1.5

B. 3.0

C. 4.5

D. 6.0

Ans: D

7. In a FORTRAN program x=1.0, y=2.0 and w=3.0. What is the value of z if: z=2.0(x(y+3.0)+w) | Fortran Questions

A. 12.0

B. 16.0

C. 18.0

D. not determined due to a FORTRAN syntax error

Ans: D

8. After compiling the FORTRAN statement: y = c/d + a*x**2-5 Which operation is performed first by the computer? | Fortran Questions

A. /

B. +

C. *

D. **

Ans: D

9. For the following FORTRAN operations give the rank from fastest to slowest in terms of computer time required:  | Fortran Questions

1)x*0.5

2)x+0.5

3)x**0.5

4)sqrt(x)

A. 1-2-3-4

B. 1-2-4-3

C. 2-1-3-4

D. 2-1-4-3

Ans: D

10. On the Hammond machines, a single percision floating point (REAL*4) number uses how many bits of memory? | Fortran Questions

A. 4

B. 7

C. 15

D. 32

Ans: D

11. A number stored in Double Precision Floating Point (REAL*8) format can have at most approximately how many decimal digits of precision? | Fortran Questions

A. 3

B. 7

C. 31

D. 15

Ans: D

12. A real number established with “selected_real_kind(6,30)” uses how many bits? | Fortran Questions

A. 4

B. 6

C. 30

D. 32

Ans: D

13. What is the first number in the following list that can not be represented with a Fortran INTEGER*4 ( the default setting on the Hammond machines )data type? | Fortran Questions

A. 0

B. 1025

C. 2,000,000

D. 2,000,000,000,000

Ans: D

14. What is the first number in the following list that can not be represented with a FORTRAN REAL*8 ( Double Precision ) variable? | Fortran Questions

A. -3.0*1050

B. 3.0*101000

C. 3.0*10-80

D. 3.0*10100

Ans: B

15. Which of the following is an “executable” statement (takes an action when “a.out” is executed)? | Fortran Questions

A. ALLOCATE

B. DIMENSION

C. EXTERNAL

D. PARAMETER

Ans: A

16. Which of the following is an executable statement ( takes action when “a.out” is executeed)? | Fortran Questions

A. INTRINSIC

B. DIMENSION

C. EXTERNAL

D. CLOSE

Ans: D

17. A FORTRAN WHERE statement: | Fortran Questions

A. Provides the current line number in the input file being processed

B. Returns the name of the current Subroutine or Function

C. Conditionally executes one or more Fortran 90 vector (array) statements

D. Provides the current cursor position on the terminal screen

Ans: C

18. The statement “read(10,end=100) mm ” will: | Fortran Questions

A. branch to the statement with label 100 when the end of the file is reached on unit 10

B. branch to the statement label with 100 when the struing “end” is read from unit 10

C. branch to the end of the program when a value of 100 is read from unit 10

D. Set the variable mm = 100 when the end of the file is reached

Ans: A

19. Which of the following statements is a valid way to open the file test.data and associate it with unit 10? | Fortran Questions

A. open(10,test.data)

B. open(10,’test.data’)

C. open(10, file= test.data )

D. open(10,file=’test.data’)

Ans: D

20. On the Hammond machines, a single percision floating point (REAL*4) number uses how many bits of memory? | Fortran Questions

A. 4

B. 7

C. 32

D. 15

Ans: D

21. What are the basic datatypes in Fortran?

A. Integer, Real, Double Precision, Character

B. Integer, Real, Character, Logical

C. INteger, Real, Complex, Character

Ans: B

22. In which column does the code start in Fortran 77 fixed format?

A. 6

B. 9

C. 7

Ans: C

23. What signals a comment in Fortran 95?

A. An exclamationmark ! anywhere on the line

B. A C in column one

C. An asterisk * in column six?

Ans: A

24. How can we continue source code from one line to the next in Fortran 95?

A. by an asterisk * in column 6

B. An ampersand & at the end of a line

C. By using brackets

Ans: B

25. What is the purpose of a number in column 2 to 5 in Fortran 77 fixed format

A. A jump label or format label

B. Just a jump label

C. Just a format label

Ans: A

26. Which of the following is not a valid property of a PARAMETER statement?

A. Can combine other parameters with FORTRAN arithmetic operators to compute the value of a new parameter

B. Parameters can be set anywhere in a program

C. Integer parameters can be used to set array dimensions

D. Parameters can be used as bounds on do loops.

E. Can be passed as arguments to subroutines

Ans: B

27. In a FORTRAN program I have set x=2.0, a=2.0 and b=4.0. What is the value of y if: y = a*x+b**2/x ?

A. 8.0

B. 12.0

C. 16.0

D. 32.0

E. 64.0

Ans: B

28. In a FORTRAN program I have set x=1.5,i=3, and j=2. What is the value of y if:

y = 2*x + i/j

A. 3.0

B. 3.5

C. 4.0

D. 4.5

E. 5.0

Ans: C

29. In a FORTRAN program x=4.5, y=3.0, and w=1.5, What is the value of z if: z = x+w/y+1

A. 1.5

B. 3.0

C. 4.5

D. 6.0

Ans: D

30. not determined due to a Fortran Syntax error

In a FORTRAN program x=1.0, y=2.0 and w=3.0. What is the value of z if:

z=2.0(x(y+3.0)+w)

A. 12.0

B. 16.0

C. 18.0

D. 22.0

E. not determined due to a FORTRAN syntax error

Ans: E

31. After compiling the FORTRAN statement:

y = c/d + a*x**2-5

Which operation is performed first by the computer?

A. /

B. +

C. *

D. **

E. –

Ans: D

32. When using vi, which of the following commands will delete a full line?

A. d

B. dd

C. dl

D. r

E. x

Ans: B

33. The command ” man ls > more ” will:

A. Provide help on the command “ls” as text in a file called “more”

B. Provide help on the command “ls” viewed with the utility “more”

C. Provide help on commands alphabetically between ls and more

D. Provide a more detailed help on the command “ls” than is usually given

E. Result in a system message: “Command not found”

Ans: A

34. When working on a Unix workstation without any special aliases, which of the following commands should be used to delete a file?

A. del

B. dd

C. df

D. rf

E. rm

300+ [UPDATED] CISSP MCQs and Answers [PDF]

CISSP Objective Questions and Answers

CISSP Objective Questions and Answers Pdf Download for Exam CISSP Multiple choice Questions. Quiz CISSP Test Questions

 

1. When an attacker sends unsolicited communication, it is an example of:

A. Spoofing

B. Spamming

C. Crackers

D. Sniffers

Ans: B

Mcqs on CISSP

2. Masquerading is:

 

  A. Attempting to hack a system through backdoors to an operating system or application

  B. Pretending to be an authorized user 

  C. Always done through IP spoofing

  D. Applying a subnet mask to an internal IP range

Ans: B

3. Integrity is protection of data from all of the following EXCEPT:

 

  A. Unauthorized changes

  B. Accidental changes

  C. Data analysis 

  D. Intentional manipulation

Ans: C

4. A security program cannot address which of the following business goals?

 

  A. Accuracy of information 

  B. Change control

  C. User expectations

  D. Prevention of fraud

Ans: A

5. In most cases, integrity is enforced through:

 

  A. Physical security

  B. Logical security

  C. Confidentiality

  D. Access controls 

Ans: D

6. A “well-formed transaction” is one that:

 

  A. Has all the necessary paperwork to substantiate the transaction.

  B. Is based on clear business objectives.

  C. Ensures that data can be manipulated only by a specific set of programs. 

  D. Is subject to duplicate processing.

Ans: C

 

7. In an accounting department, several people are required to complete a financial process. This is most likely an example of:

 

  A. Segregation of duties 

  B. Rotation of duties

  C. Need-to-know

  D. Collusion

Ans: A

 

8. Risk Management is commonly understood as all of the following EXCEPT:

 

  A. Analyzing and assessing risk

  B. Identifying risk

  C. Accepting or mitigation of risk

  D. Likelihood of a risk occurring 

Ans: D

9. The percentage or degree of damage inflicted on an asset used in the calculation of single loss expectancy can be referred to as:

 

  A. Exposure Factor (EF) 

  B. Annualized Rate of Occurrence (ARO)

  C. Vulnerability

  D. Likelihood

Ans: A

10. The absence of a fire-suppression system would be best characterized as a(n):

 

  A. Exposure

  B. Threat

  C. Vulnerability 

  D. Risk

Ans: C

11. Risk Assessment includes all of the following EXCEPT:

 

  A. Implementation of effective countermeasures 

  B. Ensuring that risk is managed

  C. Analysis of the current state of security in the target environment

  D. Strategic analysis of risk

Ans: A

12. A risk management project may be subject to overlooking certain types of threats. What can assist the risk management team to prevent that?

 

  A. Automated tools 

  B. Adoption of qualitative risk assessment processes

  C. Increased reliance on internal experts for risk assessment

  D. Recalculation of the work factor

Ans: A

13. Data classification can assist an organization in:

 

  A. Eliminating regulatory mandates

  B. Lowering accountability of data classifiers

  C. Reducing costs for protecting data 

  D. Normalization of databases

Ans: C

 

14. Who “owns” an organization’s data?

 

  A. Information technology group

  B. Users

  C. Data custodians

  D. Business units 

Ans: D

 

15. An information security policy does NOT usually include:

 

  A. Authority for information security department

  B. Guidelines for how to implement policy 

  C. Basis for data classification

  D. Recognition of information as an asset of the organization

Ans: B

 

16. The role of an information custodian should NOT include:

 

  A. Restoration of lost or corrupted data

  B. Regular backups of data

  C. Establishing retention periods for data 

  D. Ensuring the availability of data

Ans: C

 

17. A main objective of awareness training is:

 

  A. Provide understanding of responsibilities 

  B. Entertaining the users through creative programs

  C. Overcoming all resistance to security procedures

  D. To be repetitive to ensure accountability

Ans: A

 

18. What is a primary target of a person employing social engineering?

 

  A. An individual 

  B. A policy

  C. Government agencies

  D. An information system

Ans: A

19. Social engineering can take many forms EXCEPT:

 

  A. Dumpster diving

  B. Coercion or intimidation

  C. Sympathy

  D. Eavesdropping 

Ans: D

20. Incident response planning can be instrumental in:

 

  A. Meeting regulatory requirements

  B. Creating customer loyalty

  C. Reducing the impact of an adverse event on the organization 

  D. Ensuring management makes the correct decisions in a crisis

Ans: C

21) A high profile company has been receiving a high volume of attacks on their web site. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implemented?

 

  A. DMZ (Demilitarized Zone)

  B. A honey pot 

  C. A firewall

  D. A new subnet

Ans: B

 

22) You are running cabling for a network through a boiler room where the furnace and some other heavy machinery reside. You are concerned about interference from these sources. Which of the following types of cabling provides the best protection from interference in this area?

 

  A. STP

  B. UTP

  C. Coaxial

  D. Fiber-optic 

 

Ans:  D

23) In order for a user to obtain a certificate from a trusted CA Certificate Authority), the user must present proof of identity and a?

  A. Private Key

  B. Public Key  

  C. Password

  D. Kerberos Key

Ans: B

24) while performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you just become a victim of?

 

  A. Piggybacking

  B. Masquerading

  C. Man-in-da-middle attack

  D. Social Engineering  

Ans: D

25) when visiting an office adjacent to the server room, you discover the lock to the window is broken. Because it is not your office you tell the resident of the office to contact the maintenance person and have it fixed. After leaving, you fail to follow up on whether the windows were actually repaired. What affect will this have on the likelihood of a threat associated with the vulnerability actually occurring? 

 

  A. If the window is repaired, the likelihood of the threat occurring will increase. 

  B. If the window is repaired, the likelihood of the threat occurring will remain constant.

  C. If the window is not repaired the, the likelihood of the threat occurring will decrease.

  D. If the window is not repaired, the likelihood of the threat occurring will increase.

 

Ans: A

 

26) a company consists of a main building with two smaller branch offices at opposite ends of the city. The main building and branch offices are connected with fast links so that all employees have good connectivity to the network. Each of the buildings has security measures that require visitors to sign in, and all employees are required to wear identification badges at all times. You want to protect servers and other vital equipment so that the company has the best level of security at the lowest possible cost. Which of the following will you do to achieve this objective?

  A. Centralize servers and other vital components in a single room of the main building, and add security measures to this room so that they are well protected. 

  B. Centralize most servers and other vital components in a single room of the main building, and place servers at each of the branch offices. Add security measures to areas where the servers and other components are located.

  C. Decentralize servers and other vital components, and add security measures to areas where the servers and other components are located.

  D. main building. Because the building prevents unauthorized access to visitors and other persons, there is no need to implement physical security in the server room.

Ans: A

27) You are explaining SSL to a junior administrator and come up to the topic of handshaking. How many steps are employed between the client and server in the SSL handshake process?

  A. Five

  B. Six  

  C. Seven

  D. Eight

Ans: B

 

28) You have been alerted to the possibility of someone using an application to capture and manipulate packets as they are passing through your network. What type of threat does this represent?

  A. DDos

  B. Trojan Horse

  C. Logic Bomb

  D. Man-in-the-middle 

Ans: D

 

29) A problem with air conditioning is causing fluctuations in temperature in the server room. The temperature is rising to 90 degrees when the air conditioner stops working, and then drops to 60 degrees when it starts working again. The problem keeps occurring over the next two days. What problem may result from these fluctuations?

  A. Electrostatic discharge

  B. Power outages

  C. Chip creep 

  D. Poor air quality

Ans: C

 

30) While connected from home to an ISP (Internet Service Provider), a network administrator performs a port scan against a corporate server and encounters four open TCP (Transmission Control Protocol) ports: 25, 110, 143 and 389. Corporate users in the organization must be able to connect from home, send and receive messages on the Internet, read e-mail by beams of the IMAPv.4 (Internet Message Access Protocol version 4) protocol, and search into a directory services database for user e-mail addresses, and digital certificates. All the e-mail relates services, as well as the directory server, run on the scanned server. Which of the above ports can be filtered out to decrease unnecessary exposure without affecting functionality?

  A. 25

  B. 110  

  C. 143

  D. 389

  Ans: B

 

31) Asymmetric key cryptography is used for all of the following except:

  A. Encryption of data

  B. Access control

  C. Nonrepudiation

  D. Steganography 

 Ans: D

32) The most common forms of asymmetric key cryptography include

  A. Diffie–Hellman 

  B. Rijndael

  C. Blowfish

  D. SHA-256

 Ans: A

33) What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?

  A. A symmetric algorithm provides better access control.

  B. A symmetric algorithm is a faster process. 

  C. A symmetric algorithm provides nonrepudiation of delivery.

  D. A symmetric algorithm is more difficult to implement.

Ans: B

 

34) When a user needs to provide message integrity, what options may be best?

  A. Send a digital signature of the message to the recipient

  B. Encrypt the message with a symmetric algorithm and send it

  C. Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

  D. Create a checksum, append it to the message, encrypt the message, then send to recipient. 

Ans: D

 

35) A certificate authority provides what benefits to a user?

  A. Protection of public keys of all users

  B. History of symmetric keys

  C. Proof of nonrepudiation of origin

  D. Validation that a public key is associated with a particular user 

Ans: D

36) What is the output length of a RIPEMD-160 hash?

  A. 160 bits 

  B. 150 bits

  C. 128 bits

  D. 104 bits

 Ans:  A

37) ANSI X9.17 is concerned primarily with

  A. Protection and secrecy of keys 

  B. Financial records and retention of encrypted data

  C. Formalizing a key hierarchy

  D. The lifespan of key-encrypting keys (KKMs)

Ans: A

 

38) When a certificate is revoked, what is the proper procedure?

  A. Setting new key expiry dates

  B. Updating the certificate revocation list 

  C. Removal of the private key from all directories

  D. Notification to all employees of revoked keys

 Ans: B

39) What is not true about link encryption?

  A. Link encryption encrypts routing information.

  B. Link encryption is often used for Frame Relay or satellite links.

  C. Link encryption is suitable for high-risk environments. 

  D. Link encryption provides better traffic flow confidentiality.

Ans: C

40) A_________ is the sequence that controls the operation of the cryptographic algorithm.

  A. Encoder

  B. Decoder wheel

  C. Cryptovariable 

  D. Cryptographic routine

 Ans:  C  

 

41) The process used in most block ciphers to increase their strength is

  A. Diffusion

  B. Confusion

  C. Step function

  D. SP-network 

 Ans: D

 

42) The two methods of encrypting data are

  A. Substitution and transposition

  B. Block and stream

  C. Symmetric and asymmetric 

  D. DES and AES

Ans: C

43) Cryptography supports all of the core principles of information security except

  A. Availability

  B. Confidentiality

  C. Integrity

  D. Authenticity 

Ans: D

44) A way to defeat frequency analysis as a method to determine the key is to use

  A. Substitution ciphers

  B. Transposition ciphers

  C. Polyalphabetic ciphers 

  D. Inversion ciphers

Ans: C

 

45) The running key cipher is based on

  A. Modular arithmetic 

  B. XOR mathematics

  C. Factoring

  D. Exponentiation

Ans: A

46) The only cipher system said to be unbreakable by brute force is

  A. AES

  B. DES

  C. One-time pad 

  D. Triple DES

 Ans: C

47) Messages protected by steganography can be transmitted to

  A. Picture files

  B. Music files

  C. Video files

  D. All of the above 

Ans: D

 

48) a significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include:

  A. Violations of security policy.

  B. Attempted violations of security policy.

  C. Non-violations of security policy.

  D. Attempted violations of allowed actions. 

Ans: D

 

49) Which of the following embodies all the detailed actions that personnel are required to follow?

  A. Standards

  B. Guidelines

  C. Procedures 

  D. Baselines

Ans: C

 

50) which of the following choices is NOT part of a security policy?

  A. definition of overall steps of information security and the importance of security

  B. statement of management intend, supporting the goals and principles of information security

  C. definition of general and specific responsibilities for information security management

  D. .description of specific technologies used in the field of information security 

Ans: D

Top 300 Photoshop MCQ Multiple Choice Questions Quiz

Adobe Photoshop MCQs and Answers

Dear readers, these Adobe Photoshop Multiple choice Questions Pdf Download for Exam Adobe Photoshop. As per my experience good interviewers hardly plan to ask any particular question during your Job interview, normally questions start with some basic concept of the subject and later they continue based on further discussion and what you answer:

1) Microsoft created Adobe Photoshop?

A.True

B.False

Answer: B

2) The Image title bar states the name of the application.

A.True

B.False

Answer: B

3) The toolbox is located on the left side of the interface and houses many tools that a revisible and hidden.

A.True

B.False

Answer: A

4) The default colors for the foreground and background colors are black and white. 

A.True

B.False

Answer: A

5) Every tool can be activated by a letter key stroke.

A.True

B.False

Answer: B

6) Only certain tools display a tools option bar where you can change the settings of a tool.

A.True

B.False

Answer: B

7) The rights side of the interface is occupied by panels.

A.True

B.False

Answer: A

8) There are 3 panels that are visible in the default workspace environment. 

A.True

B.False

Answer: A

9) The zoom tool and the navigator palette work to gether in zooming in/out on an image.

A.True

B.False

Answer: A

10) A layer is a separate image to an overall image.

A.True

B.False

Answer: A

11) The magicw and works with a setting called to lerance to determine the sensitivity level of what is being selected by this tool.

A.True

B.False

Answer: A

12) Layers cannot be deleted once they’ve been created. 

A.True

B.False

Answer: B

13) Layers are viewed from bottom to top.

A.True

B.False

Answer: B

14) Holding the shift button will allow you to add to as election.

A.True

B.False

Answer: A 

15) As election can be made with as so, marquee, magicwand, and quick selection tools.

A.True

B.False

Answer: B

16) Hue,Saturation and Brightnes saretermsused with color.

A.True

B.False

Answer: A

17) In the foreground color picker box there are 7 characters in a hexidecial color code combination.

A.True

B.False

Answer: B

18) The tool that will take lookout off ocusis the sharpen tool.

A.True

B.False

Answer: B

19)The letter “S” key can be pressed to change the screen mode.

A.True

B.False

Answer: B

20) A layer that is active must be visible.

A.True

B.False

Answer: B

21) An item located under a main menu is called a sub menu item.

A.True

B.False

Answer: A

22)A Photoshop file(.psd) can be uploaded to your flickr account.

A.True

B.False

Answer: B

23) To change the name of a layer you can double-click on the words on the layer.

A.True

B.False

Answer: A

24) The Photoshop version we are currently using in cs5.

A.True

B.False

Answer: B

25)The History panel can be found/opened from under the Window main menu.

A.True

B.False

Answer: A

26) When you copy/paste an image from the Web into a Photoshop file a new layer is made.

A.True

B.False

Answer: A

27) AS mart Object Thumb nail on a layer means you can edit that layer.

A.True

B.False

Answer: B

28) Control+R is the short cut for hiding/showing your rulers.

A.True

B.False

Answer: A

29)Rule of Third suses a 4×4 grid for determing where to place the focal point in an image.

A.True

B.False

Answer: B

30) _______ are small squares on the computer screen that reflect the colors Red, Green, Blue.

A. Possible

B. Pixels

Answer: A

31) Filter Effects are the ways in which pixels in an image are affected by color.(base,blend,result)

A.True

B.False

Answer: B

32) Many photographers and graphi cart is tusetherule of thirds when placing the of cusofinterest.

A.True

B.False

Answer: A

33) Editing is the process of changing the photo to make it most effective for its purpose.

A.True

B.False

Answer: A

34) After you are finished making trans formations you commit changes by pressing the enter key

A.True

B.False

Answer: A

35)Layer____________include things such as drop shadow, bevel and emboss,and stroke.

A. Possible

B. Styles

Answer: A

36) The shortcut to activate the Free Trans form box.

A.Control+D

B.Control+T

C.Control+V

Answer: B

37) The key to press when using the Clone Stamping Tool.

A.Alt

B.Shift

C.Control

Answer: A

38) The setting with a selection tool that allows the edges to be soft.

A.radius

B.feather

C.tolerance

Answer: B

39) The term that describes the range of color. 

A.Hue

B.Saturation

C.Lightness

Answer: A

40) The term that describes the purity of color.

A.Hue

B.Saturation

C.Lightness

Answer: B

41)The short cut key to activate the pen tool.

A.M

B.N

C.O

D.P

Answer: D

42)The term to change a smart object in to aeditable layer.

A.transformation

B.rendering

C.rasterize

D.none of the above

Answer: C

43) The shortcut for duplicating a layer.

A.Control+J

B.Control+T

C.Control+D

D.Control+N

Answer: A

44)The 4 key stroke used to turn some thing into Black & White.

A.Window+Control+Shift+B

B.Alt+Control+Shift+S

C.Alt+Control+Shift+B

D.Tab+Control+Shift+B

Answer: C

45)The name of the points that are made with the pen tool when it is making a path.

A.anchor points

B.markers

C.spotters

D.clusters

Answer: A