0% found this document useful (0 votes)
558 views30 pages

SE (Windows) Dumps

This document contains 13 multiple choice questions related to Python, ITIL, and Powershell. The Python questions cover topics like operator precedence, data types, functions, loops, and output. The ITIL questions test knowledge of key ITIL concepts like the service lifecycle stages and frameworks. The Powershell questions involve identifying cmdlets, aliases, and using commands like Import-Csv and Get-Process.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
558 views30 pages

SE (Windows) Dumps

This document contains 13 multiple choice questions related to Python, ITIL, and Powershell. The Python questions cover topics like operator precedence, data types, functions, loops, and output. The ITIL questions test knowledge of key ITIL concepts like the service lifecycle stages and frameworks. The Powershell questions involve identifying cmdlets, aliases, and using commands like Import-Csv and Get-Process.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

PYTHON

1. Identify the output of the expression given below whose values are : A = 9,
B = 11, C = 10, D =1, where the precedence of the operators from highest to
lowest is +,*, -,/ and all the operators are left associative. B*C+D-B-A*C/D

a) 20
b) 90
c) 110
d) 100

2. Identify the correct statement.


a) List is mutable & Tuple is immutable
b) List is immutable & Tuple is mutable
c) Both are mutable
d) Both are immutable

3.Identify the function that gives the total length of the list?

a. cmp(list)
b. len(list)
c. max(list)
d. length[list]
4. Find the values of X and Y using the following values num1 = -10: n1
= True; num 4; n2 = False
X = num1/num2 - num2-(0- num1)
Y = (ni or (n2 and (not n1))) and n1
a. X = 12.5 , Y = False
b. X = -16.5, Y = True
c. X = -3.5, Y = True
d. Ox = -3.5, Y = True X = 3.5, Y = False
5. count = 10
num = 5
sum = 0
while count > 5:
sum += count*(num-1)
print(sum)
What is the output?
a. Infinite loop
b. 60
c. 55
d. 62

6. Identify the loop whose output contains both the number 10 and 20.

a. for i in range (10,20,2):


print(i,end = "")

b. i=20
while i >= 10:
print(i, end= " ")
i-=2

c. for i in range (20,10,-2):


print(i, end= " ")

d. for i in 10,12,25,17,18:
print(i, end= " ")

7. Select all the right ways for declaring a string?

a. str1 = “str1”
b. str1 = ‘str1’
c. str1 = [str1]
d. str1 = [“str1”]

8. What is the output of the following code


x = 50
def fun1():
x = 25
print(x)
fun1()
print(x)
a. 25 25

b. 50 50

c. 25 50
9. Choose the appropriate conditions to obtain the following output:

Code snippet :

for i in range(condition 1):


for j in range(condition 2):
print(i, end = " ")
print("")

a. Condition1 – 5,0,-1 and condition2 – 0,i


b. Condition1 – 5,0 and condition2 – 0,i
c. Condition1 – 5,1 and condition2 – 1,5
d. Condition1 – 1,5 and condition2 – 1,4

10.Identify the function call which does not result in error.


def fun(vari, var2):
Print(“Yes”)

i) Fun(2,3)
ii) Fun(var2=5,3)
iii) Fun(var2=5,var1=2)
a. iii
b. Both i and iii
c. i, ii, ii
d. ii
11.Identify the output of the following code snippet:

result = 10
def test(num1,num2):
global result
if num1!= num2:
result += num1*num1
else:
result += num2*num2

test(1,3)
print(result)

a. 10
b. 14
c. Error
d. 11

12.What is the data type of print(type(12))?


a) int
b) float
c) integer
d) number

13.Identify the statement which does not result in error:

Sample= {1:”one”,2:”two”,3:”three”}

i. Sample.update({2:”Twenty”,4:”four”})
ii. Print(sample[“four”])
iii. Sample.get(1)
iv. Print(len(sample))

a) i, ii, iii
b) i, iii, iv
c) ii, iii, iv
d) i, ii, iii,iv
14.Identify the function that gives the total length of the list?

a. cmp(list)
b. len(list)
c. max(list)
d. length[list]

15.What is the output of the following code snippet?


for i in 10,21,30,40:
if (i%5 == 0 ):
print(i/2, end ="")
else:
print(i/7, end ="")
a. 5.0 10.0 15.0 8.0
b. 3.3 10.5 10.0 13.3
c. 5.0 7.0 15.0 20.0
d. 3.6 10.0 10.5 13.3

ITIL
1. A person or organization which provides raw product or services is

a) Customer
b) Supplier
c) User
d) Service provider

2. The five stages of the service life cycle are?

a) Service Strategy, Service Design, Service Transition, Service


Management, CSI
b) Service Strategy, Service Design, Service Transition, Service
Operation, CSI
c) Service Strategy, Service Design, Service Management, Service
Operation, CSI
d) Service Management, Service Design, Service Transition, Service
Strategy, CSI

3. The framework which is used for managing IT Services with the right use of
People. Process and Information Technology is called:

a. ITSM
b. ITIL
c. Service Mgmt
d. Process Mgmt

4. Service design emphasizes the importance of the “Four Ps”. These “Four Ps”
include partners, People, Processes and other “P”. Which of the following is
the additional “P”?

a. Profit
b. Preparation
c. Products
d. Potential

5. A company xyz works with procurement team to purchase Apple desktops


for a customer requirement. New agreement is created between Company
xyz and Apple and the same will be referred for any procurement
renewals/service for apple desktops. What is the name of this agreement?

a. Service Level Requirement


b. Operational Level Agreement
c. Service Level Agreement
d. Underpinning Contract
POWERSHELL
1. Identify the cmdlet for the alias”pwd”
HINT:pwd displays the current working directory

a) Get-childitem
b) Get-location
c) Get-Password
d) Get-Member
2. If “dir” is alias for “get-childitem‟ cmdlet, Identify the command which will
fetch the command and alias details.

a) Get-Alias-name dir
b) Get-Alias -name get-childitem
c) Get-command -alias dir
d) Get-command | where alias -like “dir”

3. Which of the following cmdlets executes without an error?


a) Get-process where-objects{$name -eq “Powershell”}
b) Get-service | select-object 10 |sort-object -desc
c) Get-childitem |recurse
d) Get-eventlog -logname application

4. Identify the cmdlet that displays only the parent files and folders in your
current working directory.

a) get-childitem – recurse path d:\


b) get-childitem -recurse
c) get-childitem -path d:\
d) get-childitem

5. Which of the following command can be used to create a user defined alias?
a. create-alias
b. start-alias
c. get-alias
d. set-alias
6. You have created an alias "pro" for get-process using set-alias cmdlet.
You close the working PowerShell console to open PowerShell as an
administrator. Will the alias pro fetch all the processes?
a) Yes, because it is an alias for get-process.
b) No, because new-alias should be used to create alias instead of set-
alias.
c) Yes, because an administrative PowerShell console is opened.
d) No, because aliases are not saved between Windows PowerShell
sessions
7. What will be the output of the following PowerShell command?
Copy-Item -Destination C:\Users\User1\Desktop\file1.txt C:\Users\User1\
Desktop\file2.txt
a. Content from file2 is copied to file1
b. content from hilel is copied to file2
c. Error beruse of no parameter for the source file
d. Error because mandatory parameter is not set right

8. A batch of 650 trainees recently completed their assessment in various


streams and their score details are saved in thepath E:\ Trainee
Performance.csv. As an administrator which of the following PowerShell
cmdlets will you run to find out the name and score of the qualified trainees
from the IMS track. The qualifying criteria is 65 and above. Which of the
following cmdlet needs to be execute?
a. Import-Csv E:\traineeperformance.csv | Select-Object name, score |
Where-Object
($_.track -eq ""IMS"" -and $_.score
b. Import-Csv E:\traineeperformance.csv | Where-Object {$_.track -eq
""IMS"" and
$_.score -ge "65"}
c. Import-Csv E:\traineeperformance.csv | Where-Object {$_.track -eq
"IMS" -and
$_.score -ge "65"}| Select-Object nan
d. Export-Csv E:\traineeperformance.csv | Where-Object {$_.track-eq
"IMS" -and $_.score-ge "65"}
9. Which of the following commands will execute successfully?
a. Get Process Out-FilePath d: processlist.txt
b. Get Process Out di processlist.txt
c. Get-Process|Out-File -filePath d:\processlist.bet
d. Get-Process Out-File -Path d:\processlist.bet

10. What is the output when the following PowerShell script is executed?
$a=100
$Global:a=200
$Private:a=300
write-host "$a"
a. 100
b. Error
c. 300
d. 200
11. A user working with PowerShell console on a machine is not able to open
applications via GUI. He needs to start the Calculator application from the
console host. Which of the following cmdlet can be used to access the
application?
a. Invoke-Item
b. Start-Command
c. Invoke-Command
d. Start-Job start-process

12. In order to get the latest 3 executed commands out of 18 commands from
the history which commands would you execute

a. get-history | select -last 3


b. get-history 18-Count 3
c. get-history select -newest 3
d. get-history / select-first 3
13. Select the correct answer
$var1= "1", "Julie", "$null", "7"
$var1.length
a) Error
b) 4
c) 11
d) 8

14. What is the output when the following PowerShell script is executed?
$name = "JOHN"
$Global:name ="CHARLES"
$year=1997
$Private year =
2000 function f1
{
$year=1970
Write-Host " $name is the KING during $year."
}
f1

a. JOHN is the KING during 1997


b. CHARLES is the KING during 2000
c. CHARLES is the KING during 1970
d. JOHN is the KING during 1970

15. Which of the following cmdlet can be used to delete an alias named "gps"
that is assigned to the get-process cmdlet?
a. remove alias:\gps
b. remove-item alias: gps
c. It cannot be deleted as it's a pre-defined alias
d. delete-item alias:\gps

16. Identify the wrong statement/s:


I. The Get-Command cmdlet gets all commands that are installed on the
computer, including cmdlets, aliases,functions, filters, scripts, and
applications.
II. The get-command output varies from one system to other.
III. The get-command output is standard and will display the same output on
all systems provided same PowerShell version is
a. i only
b. i and ii only
c. ii only
d. I only

17. You are told to copy the contents in the d:\Materials folder to e: Materials.
You are not sure what would happen if you execute the Copy-item cmdlet
with the source and destination locations. What should you do in this case?
a. Use the risk mitigation parameter -whatif.
b. Use the risk mitigation parameter -confirm.
c. Ask the higher authority regarding the issue.
d. Run the console as administrator and execute the command.

18. Which of the formatting commands help us align output in desired


columns?

a. Format-Table
b. Format-Wide
c. Format-List
d. Format-Column

19. Which of the following statements are correct?


1) Microsoft has provided in-built shorten commands for the existing cmdlets.
ii) Shortening has certain limitations which does not allow every cmdlets to be
truncated or shorten to a single letter or more iii) Alias can be manually created
for existing cmdlets.
iv) Alias is an alternate name for inbuilt cmdlets and even for the native
windows commands

a. (ii), (iii), (iv)


b. (iii) and (iv)
c. (i), (iii), (iv), (ii)
d. (i),(ii) and (iii)

20. Which of the following command displays all the commands that has get in
it?

a. Get-command -Noun Get


b. Get-command -Verb Get
c. Get-command -Name Get
d. All the above

21. Susan wrote a script alias.ps1 for creating an alias named gs1 for “get-
service” command as:
new-alias -name gs1 -value get-service
Later Richard made a modification to the script alias.ps1 , so that it now
read:
new-alias -name gs1 -value get-service
set-alias -name gs1 -value get-process

Will th modification by Richard result in an error?if yes what changes should be


made so that it will execute error free?
a. Only way to make gs1 to refer to get-process is by first removing it and
then reassigning it using new-alias command.
b. It will throw an error. The name gs1 cannot be given as the new alias
name to get-process command
c. It will execute without any error.
d. It will throw an error and the second command should be new-aliase
instead of set-alias

22. What will be the output when the following commands are executed
sequentially?

"Hello World" > Out-File C:\Psest.txt


"Hello World" >> Out-File C:\Psest.txt

a. Error
b. Hello, World
Hello, World
c. Hello, World
Hello, World>
d. Hello, World >>

23. What is the otput of below snippet?


$a = "Zen", "Alto", "Celerio", "Swift"
$a| Sort-Object
a. Alto
Celerio
Swift
Zen

b. Celerio
Alto
Swift
Zen

c. Zen
Swiftn
Celerio
Alto

d. Swift
Alto
Zen
Celerio

24. Milton was asked to write a PowerShell cmdlet to display the name and
status of the services which are running. Which of the following cmdlets
will be most appropriate to achieve the desired result? [select 2 options].

a. get-service | select-object -property Name,Status | where-object


{$_.status -eq "Running"}
b. get-service | select-object -property Name,Status | where-object
{$_.status -like "Running"}
c. get-service | select-object -Expandproperty Name,Status | where-object
{$_.status -eq "Running"}
d. get-service | select-object -Expandproperty Name,Status | where-object
{$_.status -Like "Running"}

25. Zeara wants to identify whether the service named "Bits" is running on the
remote system "DC1" within infotech.in domain. To obtain the desired
output she wrote the command: get-service Bits DC1
But it resulted in an error and hence she checked the syntax of get service
command and found it to be:
Get-Service [[-Name] <string[>][-ComputerName <string[>]
Identify what caused the error in the command written by her?
a. The switch -name and the switch-computername are missing.
b. The switch -name is missing.
c. The switch-computername is missing.
d. The value Bits and DC1 needs to be enclosed within "" as they are
string.

Ansible
1. Eva wants to run a specific part of the playbook without running the whole
playbook. Which of the following will help her in achieving the same?
a. Ansible Triggers
b. Ansible Handlers
c. Ansible Tags
d. Ansible Labels

2. Sam wants to get the ethernet interface(etho) details of all the managed
nodes using Ansible facts variables.
Which of the following is the CORRECT option to get only the
details of etho?
a. where
b. variable
c. setup
d. filter

3. Sergio wants to verify the network reachability of all the nodes that are listed
in his custom inventory file/root/sergio.ini.
Which of the following command can be used to achieve the same?
a. ansible-c/root/sergio.ini-m ping
b. ansible -i /root/sergio.ini-m ping
c. ansible -f /root/sergio.ini -m ping
d. ansible all /root/sergio.ini-m ping

4. The administrator wants to ping all the machines in the inventory file
"custom" using a custom SSH key.
Which of the following command can be used by the admin to ping the machine
using custom SSH key?
(Note: custom ssh key location: -/.ssh/custom_id)
a. ansible all -i custom-m ping --private-key=-/.ssh/custom_id
b. ansible all -i inventory -m ping --ansible-private-keys-/.ssh/custom_id
c. ansible all -i inventory -m ping--private-key-file=-/.ssh/custom_id
d. ansible all-i inventory -m ping --ssh-private-key=-/.ssh/custom_id

5. name: 'ls command execution”


hosts: <param 1>
connection: <param2>
tasks:
- name: "just execute a ls -Irt command"
shell: "Is -Irt”
register. "output”

-debug: var=outputstdout_lines
Which of the following keyword must be substituted in <param1> and
<param2> respectively, so that the playbook will be executed on the
Ansible Control server any not on the node machines?
Ans : localhost and local

6. What is the main advantage/purpose of using Jinja2 templates with Ansible?

a. Modify files before they are distributed to managed hosts.


b. Provide an enhanced alternative to YAML for playbooks
c. Support objective use in templates
d. Add conditional and loop inside the playbook

7. The administrator wants to ping all the machines under the group
"DBGROUP* except the server "mysql" which is also part of the group.
Which of the following command will do the same?

a. ansible all DBGROUP:\!mysql -m ping


b. ansible all DBGROUP!mysql -m ping
c. ansible all DBGROUP:\!mysql -m shell ping
d. ansible all DBGROUP:\!mysql -m shell -a ping

8. The administrator has updated the nginx related packages in the managed
nodes under the group webservers. Nowthe nginx service must be restarted
for the update to take effect.
Which of the following command can be used to restart the nginx
service?
a. ansible webservers -m service -a "name=nginx state=restart" --
become
b. ansible webservers -m service -a "name=nginx state=restarted" --
become
c. ansible webservers -m systemctl -a "name=nginx state=restarted"
--become
d. ansible webservers -m systemctl -a "name=nginx state=restarted" –
become
9. Vicky wants to update the vault password for the playbook roles.yml. Which
of the following command can be change the vault password?
a. ansible-vault rekey roles.yml
b. ansible-vault reset roles.yml
c. ansible-vault update roles.yml
d. ansible-vault change roles.yml

10. The administrator must prepare a report and requires the ipv4 address of all
the managed nodes, he tries to use the ad-hoc command to fetch the required
data. Which of the following ad-hoc command will fetch the ipv4 address of
the managed nodes?

a. ansible all -m setup -a "filter=*ipv4*”


b. ansible all -m setup -a "where==*ipv4*”
c. ansible all -m setup -a "where=*ipv4*"
d. ansible all-m setup -a "filter=*ipv4*”
WINDOWS
1) 2 ways in which user account can be created through CLI.
a) net user Steve
b) netsh Steve user
c) net user Steve /add
d) net user Steve password /add

2) Virtual switch that can be used by virtual machine running on the


physical computer only. Private Switch

3) Which of the following user groups Bob and Ron should be part to get
the highest and the least access privilege on the machine?
a) Bob 🡪 Users Ron 🡪 Direct Access Users

b) Bob 🡪 User Ron 🡪 Contact

c) Bob 🡪User Ron 🡪 Administrator

d) Bob 🡪 Administrators Ron 🡪Guest

4) There are 2 folders “Lily999oo0[t8ty8hi nmk jk” and “Tulips” in C\:


drive with the different NTFS permissions set. The “Lily” folder was
copied to a new folder
C:\Daffodil. Folder “Tulips” was moved to D:\Bluebell.What
permissions exist on these folders now?
a) Lily 🡪 retain its permissions set & Tulips 🡪 Bluebell‟s permission set

b) Lily 🡪 Daffodil permission set & Tulips 🡪 Bluebell permission set

c) Lily 🡪 Daffodil permission set & Tulips 🡪 retain its permission set
d) Both the folders will retain its original permission set.

5) Tom, Hilary and Eddie used same system at different slots as they had
their shifts at different times. After few days, Tom and Hilary found
out that the D\: drive had more of Eddie‟s documents and he was
using majority of the storage space on this drive. What minimum
configuration do you suggest to avoid this problem?
a) Prompt Eddie to delete his unwanted files.
b) Use disk management and create mounted drives and assign it to them.
c) Use disk quota manage storage according to the requirements.
d) Deny access to D\: for the users.

6) A new version of MS Word has been released and you have updated.
You don‟t want the users to use the old version. How do you achieve
this?
a) Configure applocker with allow to new version and select publisher in
condition page.
b) Configure applocker with deny to new version and select suitable file
harsh condition.
c) Configure applocker with deny to older version and select path in the
condition page.
d) Configure applocker with deny to older version and select the file
harsh in condition page.

7) Jespro and Malbro are 2 clients of Derla company. Jespro is already


using Windows 7 but they want to upgrade it to Windows 8.1 version.
Malbro is a start up company and would want to install windows 8.1
OS. Which option of installation would Derla choose?
a) Clean installation of Jespro and Malbro.
b) Upgrade installation of Jespro and automated installation of Malbro.
c) Migration of Jespro and Automated installation of Malbro.
d) Automated installation of Jespro and Malbro.

8) Task that can be performed with AddPrinter wizard?


a) Taking a local printer offline
b) Printing several copies of a document
c) Add print documents with priorities
d) Connecting printer to an existing LPT port

9) Raid – 1 volume is also known as – Mirrored Volume


10) Which parameter should be assigned to 32 to ensure account is locked
for 32 minutes after providing max wrong password attempts? –
Account Lockout Duration

11) Maria encountered some configuration issues regarding a software


which she had recently installed in her PC. She wants to take the
assistance of help desk facility in resolving the issue. Which feature of
Windows Server 2012R2 will help her to communicate with the help
desk more easily and in a cost effective manner?
a) Remote assistance
b) Remote server
c) Disk management
d) File system management

12) Packet that is sent to client by the DHCP server after completing the
client‟s request for least configuration. – DHCPACK

13) Mike is the administrator in the company where three printer servers
are deployed and configured with static IPv4 address. Mike need to
ensure that the IP addresses that are statically assigned to the servers
are not conflicting to the other hosts. What should Mike do?
a) Configure the appropriate scope in the DHCP
b) Enable MAC address detection
c) Create a new exclusion range in DHCP
d) Create reservations for the servers in DHCP

14) Type of backup which checks for archive bit before backup is taken
but does not clear the archive bit after backup is taken. – Differential
backup

15) To increase the invalid login attempt policy from 3 to 8. What we


need to change?
a) Change account lockout threshold value from 3 to 8
b) Change account lockout duration value from 3 to 8
c) Change reset account lockout counter after value from 3 to 8
d) Change account lockout after value from 3 to 8

16) Tom as a system administrator is requested configure complete data


recovery be available in case of a hardware failure. Also, it is
mentioned to use least no. of disks possible and compromising the
disk utilization is not problem. Which of the following is most suited
for the situation?
a) Simple volume
b) Spanned volume
c) Mirrored volume
d) Stripped volume

17) Which of the following statements are true?


i. List folder contents NTFS permission is available only for
folders and not for files.
ii. Individual notepad files can be shared.
iii. When files are copied to FAT file system, all the NTFS
permissions are gone.

18) Riya opened Local Users in Users and group management console of
windows server 2016. She saw 3 accounts already present by default.
Which of the following is not one of those?
a) Administrator
b) Default account
c) Help Desk
d) Guest

19) DNS resolves the computer name to an IP address with which the
computer is identified in a network. Which of the following DNS
component communicates with the DNS server program running in
the local machine?
a. DNS Nameserver
b. DNS Resolver
c. Logical namespace
d. MAC address
20) Which of the following is not true regarding Nano-server? A. It has
GUI interface. B. It is optimized for private clouds.
C. Faster than windows server. D. Takes more disk space.
a. A Only
b. D Only
c. A B&D
d. A&D

21) Maria encountered some configuration issues regarding a software


which she had recently installed in her PC. She
wants to take the assistance of helpdesk facility in resolving the issue.
Which feature of Windows Server 2012R2 will help her to communicate
with the helpdesk more easily and in a cost effective manner?
a. Remote assistance
b. Remote server
c. Disk management
d. File system management
22) Which of the following statements are true?
A. List folder contents NTFS permission is available only for folders and not to
files.
B. Individual notepad files can be shared.
C. When files are copied to FAT file system, all the NTFS permissions are
gone. a. Only B
b. Only C
c. A&C
d. All the above

23) Which tool do you use to determine whether there are any
malfunctioning devices connected to the system and to disable any
specific hardware components attached to it?

a. Device manager
b. Performance counter
c. Troubleshooter
d. Resource monitor
24) Maria looks after the printers in her company. A user called and
informed her that he had sent a large print job and there were many
corrections to be made in the document and the user wants to delete
the print job which is in the queue. What permission does Maria needs
to grant the user to accomplish this?

a) Tell the user to change the priority value to 99.


b) Tell the user to change the priority value to 1.
c) Maria should grant the user, Manage Document permission.
d) The user can delete his print job without any permissions, Maria's has
no role here
25) Server 1 has been configured with DHCP server role. What should be
done, if the client has to renew its lease period?

a. DHCPOFFER packet should be sent by the client


b. DHCPACK packet is sent from server
c. Client should drop the IP
d. Client has to resend a DHCPREQUEST Packet

26) Gin is working on a server core machine and is not able to open the
run prompt.
Select the correct option which explains why he is unable to open it.
a) Run prompt should be opened through command prompt domain
b) A policy might have been created to disable Run prompt in all the
machines in the domain
c) Run prompt is not available in server core edition.
d) Tom should be an administrator or a member of administrator group to
run the product
27) Sam had created a folder named 'Serveradmin' in the C:\ drive. He
wants to give List folder content permission to Cyril who is a member
of Students group. Sam had already assigned Write permission to the
Students group.
What will be the effective permission Cyril gets, for the folder
'Serveradmin? a. Write only
b. List folder content permission
c. Both Write and list folder content permissions
d. write allow, Read deny
28) Which of the below mentioned statements are NOT True?

i) A Spanned Volume has 100% Fault Tolerance


ii) A Stripped with parity volume can provide fault
tolerance when 2 disk fails among 3 disks
iii) A Mirrored Volume has 100% Fault Tolerance
a. i & ii
b. Only i
c. Only ii
d. i & iii

29) Organization wants to block the usage of "Internet Explorer" for


Finance group users. John as administrator which AppLocker policy
he has to create?
a. Create Executable Rule in AppLocker policy with Path option for
the group Finance.
b. Create Executable Rule in AppLocker policy with Publisher option
for the group Finance.
c. Create Executable Rule in AppLocker policy with Hash option for
the group Finance.
d. Create Packaged app Rule in AppLocker policy with Publisher
option for the group Finance.
30) Jane is the administrator of Techwik.org. She had created a folder
named Test' within NTFS formatted volume C with Modify
permission to everyone. In order to manage the space of the formatted
volume she moved the 'Test' folder to 'Sample' folder within another
volume named D having Full control permission to everyone. What
will be the effective permission of everyone for 'Test' once the move
operation is done?
a. Full control
b. Modify
c. Permissions are lost
d. Change

31) Which of the below feature is present in a Server 2012R2 GUI but not
present in a server core machine?
a. DNS service
b. Control panel applets
c. DHCP service
d. AD Domain Services
32) Which parameter should be parameter should be assigned a value of
32 to ensure the account is locked for 32 minutes after providing max
wrong password attempts.to ensure the account is locked for 32
minutes after providing max wrong password attempts.
a. Account Lockout duration
b. Reset Account Lockout threshold after
c. Account lockout threshold
d. Minimum password length

33) Mary has created a site "ftp.example.com. She has configured it in


such a way that the site can also be opened by using the URL
www.example.com, What has Mary done to achieve this?

Ans : A CNAME record is created with the name


"www.example.com" as this will point to existing A record, and not
the IP address

34) Which combination of backup types can be used to reduce backup


time and storage size?
Ans : Incremental, Differential

35) Statement 1: When you copying a file "Document1' from location "D:\
data 1" to "D:\data2" location then Document inherits the permissions
of the 'D:\data2' folder.
Statement 2: When you move a file "Document' from location "D:\
data1" to "D:\data2" location then 'Document1' file retains its access
permission setting as though it is an explicit permission
a) Only Statement 1 is True
b) Only Statement 2 is True
c) Both Statement 1 and Statement are True
d) OBoth Statement 1 and Statement are False

36) What is the total disk space available in case of a Raid-5 volume using
disk space of 5GB from 4 different hard disks
Ans : 15 GB

37) Which of the following is not a command line tool used for network
troubleshooting?

e. Ipconfig
f. Tracert
g. Pingpath
h. Ping

38) Joe is setting a new company and planning to use 100 computers,
which work environment will be a good choice?
i Workgroup
ii Domain
iii Partailly Workgroup and partially domain
iv Secure environment

39) Identify the top level domain for the below FQDN?
fransters.lifezone.scholars.edu
a. framsters lifezone scholars.edu
b. Trepone scholars.edu
c. scholars.edu
d. edu
40) Identify the correct statement from below
a) Windows Server Backup is a feature; it should be installed from Server
manager.
b) Windows Server Backup is a role; it should be installed from Server
manager.
c) Windows Server Backup can be enabled from Control panel of the
Server operating system.
d) Windows Server Backup is an msi package; it should be installed as
separate software package

41) Ron has details of sales and vendor in 2 folders namely – Sales and
Vendors respectively, located in D:\ drive which is NTFS file
formatted. Ron wants to move Sales folder into Vendors folder, but he
wasn‟t able to preform it. What kind of permission should Ron have
to perform this?
a) Sales – Modify Vendors – Write
b) Sales – Write Vendors – Write
c) Sales – Read Vendors – Modify
d) Sales – Read Vendors – Write

42) Default lease period of IP address provided by DHCP server? – 8 days

43) You want to change the password of one of the users (Rahul). What
should be the PowerShell command for the that?
a. net user Rahul newPassword
b. netuser Rahul newPassword
c. net user Rahul oldPassword newPassword/change
d. net user Rahul oldPassword newPassword

44) Which of the below mentioned statements are not true:

1. Simple volume has 100% fault tolerance


2. Spanned volume has 100% fault tolerance
3. Mirrored volume has 100% fault tolerance

a. Both 1 and 2
b. Only 1
c. Only 2
d. Both 1 and 3

45) Which among the following troubleshooting tools can be used to


generate alerts regarding software problem like security maintenance
or hardware issue

a) windows action center


b) Device manager
c) Performance counter
d) Resource monitor

46) Where does the database of the workgroup be present in?


a. Database Accounts Manager
b. Server Accounts Manager
c. security Accounts Manager
d. Centralized server
47) Jane wants to do a POC for a client in which deploying the
configurations across multiple machines are required. She
wishes to do it in a virtual environment, choose which of the following
server edition is required to serve the purpose.

a. Standard
b. Data center
c. Either A or B
d. ONeither A nor B
48) Which of the following does a DHCP server provide to its clients? i)
IP address ii) Subnet mask i) DNS address iv) MAC address

a. (i) Only
b. (ii) and
c. (ii) (i) and (iv)
d. (i) (ii) and (iii)
49) Which of the below attributes ensure that a password not be changed
for at least 45 days.
a. Minimum Password Age
b. Maximum Password Age
c. Minimum Password Length
d. Maximum Password History
50) As an administrator, you do not want to assign the IP address
10.0.0.50 to any of the machines in your organization.
Which option needs to be udpated while creating a DHCP scope?

a)Reservations
b)Exclusions
c)Router's IP address
d)WINS Server's IP address
51) Suraj wants unlimited Virtual machines on one Hyper-V host license.
Which edition of windows server 2016 is suitable for Suraj?
a) Standard
b) Enterprise
c) Datacenter
d) Core
52) If in case of DORA process, Offered IP address is not received by
client, then we will encounter address.
a. 100.64.0.1
b. 127.0.0.1
c. 169.254.0.1
d. 172.16.0.0
53) Ross works in a company and he is part of HR group and
Management group. An important confidential document has been
created and the NTFS permissions given to these groups are
HR group - Read
Management group - Modify
What effective permission will Ross get?
Ans : Modify
54) Two disks are online and ready to be used by creating a drive. 1st disk
if of 3GB size and the 2nd is of 2GB size. If Stripped volume needs to
created what is the maximum size volume that can be created here?

Ans : 5GB

You might also like