SE (Windows) Dumps
SE (Windows) Dumps
1. Identify the output of the expression given below whose values are : A = 9,
    B = 11, C = 10, D =1, where the precedence of the operators from highest to
    lowest is +,*, -,/ and all the operators are left associative. B*C+D-B-A*C/D
         a)   20
         b)   90
         c)   110
         d)   100
3.Identify the function that gives the total length of the list?
        a. cmp(list)
        b. len(list)
        c. max(list)
        d. length[list]
 4. Find the values of X and Y using the following values           num1 = -10: n1
    = True; num 4; n2 = False
           X = num1/num2 - num2-(0- num1)
              Y = (ni or (n2 and (not n1))) and n1
       a.   X = 12.5 , Y = False
       b.   X = -16.5, Y = True
       c.   X = -3.5, Y = True
       d.   Ox = -3.5, Y = True X = 3.5, Y = False
 5. count = 10
    num = 5
    sum = 0
    while count > 5:
         sum += count*(num-1)
  print(sum)
What is the output?
      a. Infinite loop
      b. 60
      c. 55
      d. 62
6. Identify the loop whose output contains both the number 10 and 20.
       b. i=20
       while i >= 10:
                 print(i, end= " ")
                 i-=2
       d.    for i in 10,12,25,17,18:
                   print(i, end= " ")
        a. str1 = “str1”
        b. str1 = ‘str1’
        c. str1 = [str1]
        d. str1 = [“str1”]
b. 50 50
      c. 25 50
9. Choose the appropriate conditions to obtain the following output:
Code snippet :
i) Fun(2,3)
ii) Fun(var2=5,3)
iii) Fun(var2=5,var1=2)
     a. iii
     b. Both i and iii
     c. i, ii, ii
        d. ii
11.Identify the output of the following code snippet:
   result = 10
   def test(num1,num2):
    global result
    if num1!= num2:
      result += num1*num1
    else:
      result += num2*num2
   test(1,3)
   print(result)
   a.   10
   b.   14
   c.   Error
   d.   11
Sample= {1:”one”,2:”two”,3:”three”}
    i.      Sample.update({2:”Twenty”,4:”four”})
    ii.     Print(sample[“four”])
    iii.    Sample.get(1)
    iv.     Print(len(sample))
                a) i, ii, iii
                b) i, iii, iv
               c) ii, iii, iv
               d) i, ii, iii,iv
  14.Identify the function that gives the total length of the list?
          a.   cmp(list)
          b.   len(list)
          c.   max(list)
          d.   length[list]
ITIL
  1. A person or organization which provides raw product or services is
          a)   Customer
          b)   Supplier
          c)   User
          d)   Service provider
     3. The framework which is used for managing IT Services with the right use of
        People. Process and Information Technology is called:
           a.   ITSM
           b.   ITIL
           c.   Service Mgmt
           d.   Process Mgmt
     4. Service design emphasizes the importance of the “Four Ps”. These “Four Ps”
        include partners, People, Processes and other “P”. Which of the following is
        the additional “P”?
           a.   Profit
           b.   Preparation
           c.   Products
           d.   Potential
       a) Get-childitem
       b) Get-location
       c) Get-Password
       d) Get-Member
 2. If “dir” is alias for “get-childitem‟ cmdlet, Identify the command which will
    fetch the command and alias details.
       a)   Get-Alias-name dir
       b)   Get-Alias -name get-childitem
       c)   Get-command -alias dir
       d)   Get-command | where alias -like “dir”
 4. Identify the cmdlet that displays only the parent files and folders in your
    current working directory.
 5. Which of the following command can be used to create a user defined alias?
            a. create-alias
            b. start-alias
            c. get-alias
            d. set-alias
6.      You have created an alias "pro" for get-process using set-alias cmdlet.
        You close the working PowerShell console to open PowerShell as an
        administrator. Will the alias pro fetch all the processes?
          a) Yes, because it is an alias for get-process.
          b) No, because new-alias should be used to create alias instead of set-
             alias.
          c) Yes, because an administrative PowerShell console is opened.
          d) No, because aliases are not saved between Windows PowerShell
             sessions
7.      What will be the output of the following PowerShell command?
     Copy-Item -Destination      C:\Users\User1\Desktop\file1.txt      C:\Users\User1\
     Desktop\file2.txt
             a.   Content from file2 is copied to file1
             b.   content from hilel is copied to file2
             c.   Error beruse of no parameter for the source file
             d.   Error because mandatory parameter is not set right
10.   What is the output when the following PowerShell script is executed?
                      $a=100
                   $Global:a=200
                   $Private:a=300
                   write-host "$a"
          a.       100
          b.       Error
          c.       300
          d.       200
11.   A user working with PowerShell console on a machine is not able to open
      applications via GUI. He needs to start the Calculator application from the
      console host. Which of the following cmdlet can be used to access the
      application?
        a. Invoke-Item
        b. Start-Command
        c. Invoke-Command
        d. Start-Job start-process
12.    In order to get the latest 3 executed commands out of 18 commands from
      the history which commands would you execute
14.        What is the output when the following PowerShell script is executed?
      $name = "JOHN"
      $Global:name ="CHARLES"
      $year=1997
      $Private year =
      2000 function f1
      {
      $year=1970
      Write-Host " $name is the KING during $year."
      }
      f1
15.        Which of the following cmdlet can be used to delete an alias named "gps"
           that is assigned to the get-process cmdlet?
              a. remove alias:\gps
              b. remove-item alias: gps
              c. It cannot be deleted as it's a pre-defined alias
            d. delete-item alias:\gps
17.      You are told to copy the contents in the d:\Materials folder to e: Materials.
         You are not sure what would happen if you execute the Copy-item cmdlet
         with the source and destination locations. What should you do in this case?
           a. Use the risk mitigation parameter -whatif.
           b. Use the risk mitigation parameter -confirm.
           c. Ask the higher authority regarding the issue.
           d. Run the console as administrator and execute the command.
            a.   Format-Table
            b.   Format-Wide
            c.   Format-List
            d.   Format-Column
20.      Which of the following command displays all the commands that has get in
         it?
21.      Susan wrote a script alias.ps1 for creating an alias named gs1 for “get-
         service” command as:
             new-alias -name gs1 -value get-service
         Later Richard made a modification to the script alias.ps1 , so that it now
      read:
      new-alias -name gs1 -value get-service
      set-alias -name gs1 -value get-process
22.   What will be the output when the following commands are executed
      sequentially?
            a. Error
            b. Hello, World
               Hello, World
            c. Hello, World
               Hello, World>
            d. Hello, World >>
                    b. Celerio
                       Alto
                       Swift
                          Zen
                       c. Zen
                          Swiftn
                          Celerio
                          Alto
                       d. Swift
                          Alto
                          Zen
                          Celerio
24.      Milton was asked to write a PowerShell cmdlet to display the name and
         status of the services which are running. Which of the following cmdlets
         will be most appropriate to achieve the desired result? [select 2 options].
25.      Zeara wants to identify whether the service named "Bits" is running on the
         remote system "DC1" within infotech.in domain. To obtain the desired
         output she wrote the command: get-service Bits DC1
      But it resulted in an error and hence she checked the syntax of get service
      command and found it to be:
      Get-Service [[-Name] <string[>][-ComputerName <string[>]
      Identify what caused the error in the command written by her?
               a. The switch -name and the switch-computername are missing.
               b. The switch -name is missing.
            c. The switch-computername is missing.
            d. The value Bits and DC1 needs to be enclosed within "" as they are
               string.
Ansible
 1. Eva wants to run a specific part of the playbook without running the whole
    playbook. Which of the following will help her in achieving the same?
          a. Ansible Triggers
          b. Ansible Handlers
          c. Ansible Tags
          d. Ansible Labels
 2. Sam wants to get the ethernet interface(etho) details of all the managed
    nodes using Ansible facts variables.
 Which of the following is the CORRECT option to get only the
       details of etho?
         a. where
         b. variable
         c. setup
         d. filter
 3. Sergio wants to verify the network reachability of all the nodes that are listed
    in his custom inventory file/root/sergio.ini.
 Which of the following command can be used to achieve the same?
       a.   ansible-c/root/sergio.ini-m ping
       b.   ansible -i /root/sergio.ini-m ping
       c.   ansible -f /root/sergio.ini -m ping
       d.   ansible all /root/sergio.ini-m ping
 4. The administrator wants to ping all the machines in the inventory file
    "custom" using a custom SSH key.
     Which of the following command can be used by the admin to ping the machine
     using custom SSH key?
     (Note: custom ssh key location: -/.ssh/custom_id)
           a.   ansible all -i custom-m ping --private-key=-/.ssh/custom_id
           b.   ansible all -i inventory -m ping --ansible-private-keys-/.ssh/custom_id
           c.   ansible all -i inventory -m ping--private-key-file=-/.ssh/custom_id
           d.   ansible all-i inventory -m ping --ssh-private-key=-/.ssh/custom_id
                -debug: var=outputstdout_lines
                Which of the following keyword must be substituted in <param1> and
                <param2> respectively, so that the playbook will be executed on the
                Ansible Control server any not on the node machines?
                Ans : localhost and local
7.      The administrator wants to ping all the machines under the group
        "DBGROUP* except the server "mysql" which is also part of the group.
        Which of the following command will do the same?
8.    The administrator has updated the nginx related packages in the managed
      nodes under the group webservers. Nowthe nginx service must be restarted
      for the update to take effect.
          Which of the following command can be used to restart the nginx
      service?
             a. ansible webservers -m service -a "name=nginx state=restart" --
                become
             b. ansible webservers -m service -a "name=nginx state=restarted" --
                become
             c. ansible webservers -m systemctl -a "name=nginx state=restarted"
                --become
             d. ansible webservers -m systemctl -a "name=nginx state=restarted" –
                become
9.    Vicky wants to update the vault password for the playbook roles.yml. Which
      of the following command can be change the vault password?
          a. ansible-vault rekey roles.yml
          b. ansible-vault reset roles.yml
          c. ansible-vault update roles.yml
          d. ansible-vault change roles.yml
10.   The administrator must prepare a report and requires the ipv4 address of all
      the managed nodes, he tries to use the ad-hoc command to fetch the required
      data. Which of the following ad-hoc command will fetch the ipv4 address of
      the managed nodes?
     3)          Which of the following user groups Bob and Ron should be part to get
                 the highest and the least access privilege on the machine?
             a) Bob 🡪 Users Ron 🡪 Direct Access Users
            c) Lily 🡪 Daffodil permission set & Tulips 🡪 retain its permission set
            d) Both the folders will retain its original permission set.
     5)          Tom, Hilary and Eddie used same system at different slots as they had
                 their shifts at different times. After few days, Tom and Hilary found
           out that the D\: drive had more of Eddie‟s documents and he was
           using majority of the storage space on this drive. What minimum
           configuration do you suggest to avoid this problem?
     a)   Prompt Eddie to delete his unwanted files.
     b)   Use disk management and create mounted drives and assign it to them.
     c)   Use disk quota manage storage according to the requirements.
     d)   Deny access to D\: for the users.
6)         A new version of MS Word has been released and you have updated.
           You don‟t want the users to use the old version. How do you achieve
           this?
     a)   Configure applocker with allow to new version and select publisher in
          condition page.
     b)   Configure applocker with deny to new version and select suitable file
          harsh condition.
     c)   Configure applocker with deny to older version and select path in the
          condition page.
     d)   Configure applocker with deny to older version and select the file
          harsh in condition page.
12)        Packet that is sent to client by the DHCP server after completing the
           client‟s request for least configuration. – DHCPACK
13)         Mike is the administrator in the company where three printer servers
            are deployed and configured with static IPv4 address. Mike need to
            ensure that the IP addresses that are statically assigned to the servers
            are not conflicting to the other hosts. What should Mike do?
      a)   Configure the appropriate scope in the DHCP
      b)   Enable MAC address detection
      c)   Create a new exclusion range in DHCP
      d)   Create reservations for the servers in DHCP
14)        Type of backup which checks for archive bit before backup is taken
           but does not clear the archive bit after backup is taken. – Differential
           backup
     18)        Riya opened Local Users in Users and group management console of
                windows server 2016. She saw 3 accounts already present by default.
                Which of the following is not one of those?
           a)   Administrator
           b)   Default account
           c)   Help Desk
           d)   Guest
     19)        DNS resolves the computer name to an IP address with which the
                computer is identified in a network. Which of the following DNS
                component communicates with the DNS server program running in
                the local machine?
                a. DNS Nameserver
                b. DNS Resolver
                c. Logical namespace
                d. MAC address
20)      Which of the following is not true regarding Nano-server? A. It has
         GUI interface. B. It is optimized for private clouds.
      C. Faster than windows server. D. Takes more disk space.
         a. A Only
         b. D Only
         c. A B&D
         d. A&D
23)      Which tool do you use to determine whether there are any
         malfunctioning devices connected to the system and to disable any
         specific hardware components attached to it?
         a. Device manager
         b. Performance counter
           c. Troubleshooter
           d. Resource monitor
24)        Maria looks after the printers in her company. A user called and
           informed her that he had sent a large print job and there were many
           corrections to be made in the document and the user wants to delete
           the print job which is in the queue. What permission does Maria needs
           to grant the user to accomplish this?
26)       Gin is working on a server core machine and is not able to open the
          run prompt.
       Select the correct option which explains why he is unable to open it.
      a) Run prompt should be opened through command prompt domain
      b) A policy might have been created to disable Run prompt in all the
         machines in the domain
      c) Run prompt is not available in server core edition.
      d) Tom should be an administrator or a member of administrator group to
         run the product
27)        Sam had created a folder named 'Serveradmin' in the C:\ drive. He
           wants to give List folder content permission to Cyril who is a member
           of Students group. Sam had already assigned Write permission to the
           Students group.
  What will be the effective permission Cyril gets, for the folder
    'Serveradmin? a. Write only
    b. List folder content permission
    c. Both Write and list folder content permissions
    d. write allow, Read deny
28)      Which of the below mentioned statements are NOT True?
31)        Which of the below feature is present in a Server 2012R2 GUI but not
           present in a server core machine?
      a.   DNS service
      b.   Control panel applets
      c.   DHCP service
      d.   AD Domain Services
32)        Which parameter should be parameter should be assigned a value of
           32 to ensure the account is locked for 32 minutes after providing max
           wrong password attempts.to ensure the account is locked for 32
           minutes after providing max wrong password attempts.
      a.   Account Lockout duration
      b.   Reset Account Lockout threshold after
      c.   Account lockout threshold
      d.   Minimum password length
35)        Statement 1: When you copying a file "Document1' from location "D:\
           data 1" to "D:\data2" location then Document inherits the permissions
           of the 'D:\data2' folder.
         Statement 2: When you move a file "Document' from location "D:\
         data1" to "D:\data2" location then 'Document1' file retains its access
         permission setting as though it is an explicit permission
            a) Only Statement 1 is True
            b) Only Statement 2 is True
            c) Both Statement 1 and Statement are True
            d) OBoth Statement 1 and Statement are False
36)      What is the total disk space available in case of a Raid-5 volume using
         disk space of 5GB from 4 different hard disks
         Ans : 15 GB
37)      Which of the following is not a command line tool used for network
         troubleshooting?
                  e.   Ipconfig
                  f.   Tracert
                  g.   Pingpath
                  h.   Ping
38)      Joe is setting a new company and planning to use 100 computers,
         which work environment will be a good choice?
         i Workgroup
         ii Domain
         iii Partailly Workgroup and partially domain
         iv Secure environment
39)      Identify the top level domain for the below FQDN?
fransters.lifezone.scholars.edu
         a.   framsters lifezone scholars.edu
         b.   Trepone scholars.edu
         c.   scholars.edu
         d.   edu
40)      Identify the correct statement from below
      a) Windows Server Backup is a feature; it should be installed from Server
         manager.
      b) Windows Server Backup is a role; it should be installed from Server
         manager.
      c) Windows Server Backup can be enabled from Control panel of the
         Server operating system.
      d) Windows Server Backup is an msi package; it should be installed as
         separate software package
41)        Ron has details of sales and vendor in 2 folders namely – Sales and
           Vendors respectively, located in D:\ drive which is NTFS file
           formatted. Ron wants to move Sales folder into Vendors folder, but he
           wasn‟t able to preform it. What kind of permission should Ron have
           to perform this?
      a)   Sales – Modify Vendors – Write
      b)   Sales – Write Vendors – Write
      c)   Sales – Read Vendors – Modify
      d)   Sales – Read Vendors – Write
43)        You want to change the password of one of the users (Rahul). What
           should be the PowerShell command for the that?
      a.   net user Rahul newPassword
      b.   netuser Rahul newPassword
      c.   net user Rahul oldPassword newPassword/change
      d.   net user Rahul oldPassword newPassword
  a. Both 1 and 2
  b. Only 1
  c. Only 2
  d. Both 1 and 3
      a.   Standard
      b.   Data center
      c.   Either A or B
      d.   ONeither A nor B
48)        Which of the following does a DHCP server provide to its clients? i)
           IP address ii) Subnet mask i) DNS address iv) MAC address
           a.   (i) Only
           b.   (ii) and
           c.   (ii) (i) and (iv)
           d.   (i) (ii) and (iii)
49)        Which of the below attributes ensure that a password not be changed
           for at least 45 days.
           a. Minimum Password Age
           b. Maximum Password Age
           c. Minimum Password Length
           d. Maximum Password History
50)     As an administrator, you do not want to assign the IP address
        10.0.0.50 to any of the machines in your organization.
      Which option needs to be udpated while creating a DHCP scope?
a)Reservations
b)Exclusions
c)Router's IP address
d)WINS Server's IP address
51)         Suraj wants unlimited Virtual machines on one Hyper-V host license.
            Which edition of windows server 2016 is suitable for Suraj?
      a)   Standard
      b)   Enterprise
      c)   Datacenter
      d)   Core
52)        If in case of DORA process, Offered IP address is not received by
           client, then we will encounter address.
      a.   100.64.0.1
      b.   127.0.0.1
      c.   169.254.0.1
      d.   172.16.0.0
53)         Ross works in a company and he is part of HR group and
            Management group. An important confidential document has been
            created and the NTFS permissions given to these groups are
           HR group - Read
           Management group - Modify
           What effective permission will Ross get?
           Ans : Modify
54)   Two disks are online and ready to be used by creating a drive. 1st disk
      if of 3GB size and the 2nd is of 2GB size. If Stripped volume needs to
      created what is the maximum size volume that can be created here?
Ans : 5GB