April 24, 2019

Data Storage Technologies and Networks - MCQS

Question
Which of the following RAID levels gives maximum usable capacity?

Select one:
A. RAID 0
B. RAID 5
C. RAID 6
D. RAID 1

The correct answer is:  RAID 0

Question
Which logical operation is used for computing parity?

Select one:
A. Exclusive OR
B. Exclusive NOR
C. Inclusive NOR
D. Inclusive OR

The correct answer is: Exclusive OR

Question
Which of the following RAID implementation does not allow data recovery in case of disk failure?

Select one:
A. RAID 5
B. RAID 1
C. RAID 0
D. RAID 10

The correct answer is: RAID 0

Question
What is a hot Spare?

Select one:
A. It is a spare drive within a RAID array.
B. It is a drive that can be plugged in while the Storage array is powered on
C. It is an extra drive provided by the vendor to be plugged in in case of disk failure
D. It is a disk that is over heated

The correct answer is: It is a spare drive within a RAID array.

Question
What is a blast zone in RAID?

Select one:
A. It is the portion of disk burnt due to overheating
B. It is the area of impact when data is lost from a failed RAID set.
C. It is the portion platter damaged due to head crash
D. It is the area of impact when the disk explodes.

The correct answer is:

Question
Which of the following statement is true for RAID 5?

Select one:
A. RAID 5 uses block level striping with distributed parity
B. RAID 5 is a hybrid of mirror sets and stripe sets
C. RAID 5 uses block level striping with double distributed parity
D. RAID 5 uses block level striping with a dedicated parity drive

The correct answer is: RAID 5 uses block level striping with distributed parity

Question
Journaling is preferred for

Select one:
A. Storing metadata
B. Storing logs
C. Faster file system recovery
D. Faster write operation

The correct answer is: Storing Faster file system recovery

Question
Examples of Journaling file system

Select one:
A. JFS
B. Ext2
C. Ext3
D. UFS

The correct answer is: Ext3

Question
Wear leveling affects

Select one:
A. RAM
B. Optical storage
C. Hard disk
D. Flash

The correct answer is: Flash

Question
Every File or directory has unique

Select one:
A. Inode
B. Directory
C. Pathname
D. Inode & pathname

The correct answer is: Inode & pathname

Question
Which of the following is not a non volatile storage device?

Select one:
a. Hard Disk
b. Memory Stick
c. NVRAM
d. Random Access Memory

The correct answer is: Random Access Memory

Question
Solid State devices are best suited for ______________ writes & _________________ reads.

Select one:
A. Frequent Random, Frequent Sequential
B. Frequent Sequential, Infrequent Random
C. Infrequent Sequential , Frequent Random
D. Infrequent Random, Frequent Sequential

The correct answer is:

Question
Which of the following is sequential access storage device?

Select one:
A. CD-ROM
B. Main Memory
C. Hard Disk
D. Tape Cartridge

The correct answer is: Tape Cartridge

Question
A “Logical Volume Manager” helps in

Select one:
A. Virtualizing storage
B. provide direct access to the underlying storage
C. Manage disk space efficiently without having to know the actual hardware details
D. Both storage virtualization and efficient disk space management

The correct answer is: Both storage virtualization and efficient disk space management

Question
Physical Volumes are

Select one:
A. None of these mentioned
B. Disk or disk partitions used to construct logical volumes
C. The space on a physical storage that represent a logical volume
D. A bunch of disks put together that can be made into a logical volume

The correct answer is: Disk or disk partitions used to construct logical volumes

Question
Which of the following are true. Logical Volumes _____

Select one:
A. Can span across multiple volume groups
B. Can span across multiple physical volumes
C. Can be constructed only using a single physical disk
D. None these mentioned

The correct answer is: Can span across multiple physical volumes

Question
Fileystem is created using command

Select one:
A. Mkfs
B. Fsck
C. defrag
D. Format

The correct answer is: Mkfs

Question
Concatenation is the technique of

Select one:
A. Increasing the size of a volume by adding more disks
B. Adding physical volumes together to make a volume group
C. writing a block of data onto one disk and then a block onto another disk in an alternate fashion
D. Filling up a physical volume completely before writing to the next one in a logical volume

The correct answer is: Filling up a physical volume completely before writing to the next one in a logical volume

Question
A MySQL database is involved in persisting random writes to the storage medium quantified by Kilobytes of block data. Which of the below is the suitable metric to measure the performance of the disk operations

Select one:
A. Input Output Operations Per Second
B. Mega Bytes Per Second

The correct answer is: Input Output Operations Per Second  [Doubtful]

Question
Which of the below attributes to the latency in the data transfer between application and storage Hard disks?

Select one:
A. Head Seek Time between the Platters
B. None of these
C. Cache Miss
D. Disk Controller Queuing

The correct answer is:

Question
MLC has _______________ PE cycles and _______________ in performance compared to SLC SSDs. Where - MLC- MultiLevelCell  ; SLC-SingleLevelCell

Select one:
A. More, Low
B. Less , Low
C. Less , High
D. More ,High

The correct answer is: More, Low

Question
In a Flash Memory, how is the content of a cell changed to 1 from 0?

Select one:
A. By erasing the content of the cell
B. By block erase operation and rewriting the content of the block
C. By writing 1 to the cell
D. By erasing the content of the cell before writing 1

The correct answer is:  By block erase operation and rewriting the content of the block

Question
Which of the following statement is true for a Single Level Cell?

Select one:
A. It has the longest life span
B. It allows more data storage
C. Singe level cells are cheap
D. It offers medium performance as compared to other formats

The correct answer is: It has the longest life span

Question
Which of the following is applicable to Enterprise class solid state devices?

Select one:
A. They have more over provisioned capacity
B. Warranty terms are same as all Solid state devices
C. They have the simple controller firmware
D. They have same amount of cache is not less than consumer class devices

The correct answer is: They have more over provisioned capacity

Question
Which of the following statement is true about Striping?

Select one:
A. A stripe is stored on a single disk
B. Striping reduces the disk performance
C. Striping helps in data recovery
D. Striping parallelises I/O operation

The correct answer is: Striping parallelises I/O operation

Question
Do iSCSI storage mandatory to required switch?

Select one:
Yes
No
None
a & b both

The correct answer is: No

Question
Best I/O Technique for low volume data transfer

Select one:
Polling
Interrupt Driven
DMA
b and c

The correct answer is: Interrupt Driven

Question
What is the memory bandwidth requirement of a machine executing 4*105 instructions per second, average instruction size of 3.8 bits and 7.2 bits of average operand size per instruction?

Select one:
1.52 Mbps
0.72 Mbps
2.88 Mbps
4.4 Mbps

The correct answer is: 4.4 Mbps

Question
Which version of NFS Mandates strong security

Select one:
NFSv1
NFSv2
NFSv3
NFSv4

The correct answer is: NFSv4

Question
Estimate the sustained transfer rate of a drive if disk drive spins at 7200 RPM, has a sector size of 512 bytes, and holds 160 sectors per track around

Select one:
9400 KB/s
9600 KB/s
9800 KB/s
10000 KB/s

The correct answer is: 9800 KB/s

Question
Which storage Technology uses low level disk drive access commands like READ block, WRITE block and READ capacity

Select one:
NAS
SAN
DAS
All the above

The correct answer is: SAN

Question
How do we meet memory bandwidth requirements?

Select one:
L1 cache, L2 cache and DRAM
Direct Attached Storage and Network Storage
Archival Storage
All the above

The correct answer is: All the above

Question
PCI Bus Lines contains

Select one:
Control Lines
Data Lines
Address Lines
All the above

The correct answer is: All the above

Question
How many disk failure can disk failure can be withstood by RAID 6?

Select one:
1
2
3
4

The correct answer is: 2

Question
Which of the following model makes the server to keep track of cached copies and notifies them on update

Select one:
Asynchronous writing model
Cache verification model
Callback model
Leasing model

The correct answer is: Callback model

Question
What is the capacity of the disk with 5 platters. 2 surfaces per platter, 20000 tracks per surface, 300 sectors per track and 512 bytes per sector

Select one:
30.72GB
24.40GB
21.40GB
15.16GB

The correct answer is: 30.72GB

Question
If average latency is 2.99 ms and average seeks time is 4.7 ms, then IOPS of the disk will be?

Select one:
129
130
128
131

The correct answer is: 130

Question
A certain hard disk has 16 cylinders, 480 tracks per cylinder, 32 sectors per track, and 512 bytes per sector. What is its storage capacity?

Select one:
125,829,120 bytes
125,929,120 bytes
125,729,120 bytes

125,629,120 bytes

The correct answer is: 125,829,120 bytes

Question
If MTTF of  a disk is 80000hrs what us MTTF of an array of 8 disks

Select one:
640000 hrs
10000 hrs
80000 hrs
40000 hrs

The correct answer is: 10000 hrs

Question
Identify a network file protocol in the below mentioned set

Select one:
FC
CIFS
SCSI
NAS

The correct answer is: CIFS

Question
Which option is dedicated for file sharing?

Select one:
bimodal
network attached storage
stealth
storage area network

The correct answer is: network attached storage

Question
If read and write performance is the only criterion, which would you choose?

Select one:
RAID 0
RAID 1
RAID 5
RAID 50

The correct answer is: RAID 0

Question
Which of the following RAID levels guarantees double disk failure protection?

Select one:
Raid 5
Raid 6
Raid 0+1
Raid 1+0

The correct answer is: Raid 6

Question
In SAN network which type of switch used typically?

Select one:
Director switch
Intelligent switch
IP switch
Hub

The correct answer is: Intelligent switch

April 22, 2019

Cloud Computing - MCQS

Question
Which of these is not a major type of cloud computing usage?

Select one:
a. Hardware as a Service
b. Platform as a Service
c. Software as a Service
d. Software as a Service

The correct answer is: Hardware as a Service

Question
Virtualization facilitates multiple machines on the same physical machine with

Select one:
a. Same OS & different versions
b. All of the above
c. Same OS & same versions
d. Different OS & different versions

The correct answer is: All of the above

Question
Which is not an approach to virtualization

Select one:
a. Partial virtualization
b. Lightweight virtualization
c. Full virtualization
d. Para virtualization

The correct answer is: Lightweight virtualization

Question
Live migration of VMs helps in

Select one:
a. Maintenance
b. Load balancing
c. All of the above
d. Availability

The correct answer is: All of the above

Question
Live migration involves

Select one:
a. Downtime of a few minutes
b. Loss of service
c. Downtime of a few milliseconds
d. No downtime

The correct answer is: No downtime

Question
Full virtualization

Select one:
a. Simulates hardware within software
b. Has VMs with the same OS
c. Clones images
d. Alters the guest OS

The correct answer is: Simulates hardware within software  [ doubtful, kindly verify ]

Question
VMM is

Select one:
a. A virtual machine
b. Hardware
c. Host OS
d. A layer of software

The correct answer is: A layer of software

Question
VMM facilitates sharing of

Select one:
a. Memory & I/O
b. CPU, memory & I/O
c. CPU & memory
d. I/O & CPU

The correct answer is: CPU, memory & I/O

Question
The BEST way to define Virtualization in cloud computing is

Select one:
a. Virtualization enables simulating compute, network, and storage service platforms from the underlying virtual hardware
b. Virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware
c. Virtualization enables realization of compute, network, and storage service platforms from the underlying virtual hardware
d. Virtualization enables emulating compute, network, and storage service platforms from the underlying virtual hardware

The correct answer is: Virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware

Question
Which one of these statement is NOT fully correct

Select one:
a. Cloud is an exact equivalent of grid computing
b. Cloud makes notion of “Pay for what you use”, “infinite availability- use as much you want”.
c. Cloud can exist without Virtualization, although it will be difficult and inefficient.
d. As per NIST, one of the essential charecteristics of a cloud computing infrastructure is "Measured Service".

The correct answer is: Cloud is an exact equivalent of grid computing

Question
Which one of the followings is NOT an essential charecteristics of cloud infrastructure as per NIST?

Select one:
a. Broad Network Access
b. Resources Pooling
c. Rapid Elasticity
d. Independent of devices'form factor

The correct answer is: Independent of devices'form factor

Question
Cloud service consist of

Select one:
a. Software, Hardware, Infrastructure
b. Platform, Software, Infrastructure
c. Platform, Hardware, Infrastructure

The correct answer is: Platform, Software, Infrastructure

Question
What does Virtualization do? Select the BEST answer.

Select one:
a. Each “guest” OS is managed by a Virtual Machine Monitor (VMM), also known as a hypervisor.
b. It is a means of separating hardware from a single operating system.
c. All of the above
d. Virtualization allows multiple operating system instances to run concurrently on a single computer

The correct answer is: All of the above

Question
Which one is NOT generally a change after Virtualization?

Select one:
a. Virtual machines can be provisioned to any system
b. Hardware-independence of operating system and applications
c. Can manage OS and application as a single unit by encapsulating them into virtual machines.
d. Software and hardware tightly coupled

The correct answer is: Software and hardware tightly coupled

Question
A configured client server network is required to be provisioned. You would go for

Select one:
a. SaaS
b. IaaS
c. NaaS
d. PaaS

The correct answer is: NaaS  [doubtful, kindly verify]

Question
What are the goals of Hypervisor design?

Select one:
a. Scalability
b. All of the above
c. Reliability
d. Isolation

The correct answer is: All of the above

Question
Which one of the statement is generally NOT correct for Microkernelized Hypervisor?

Select one:
a. Drivers run within guests
b. Simple partitioning functionality
c. Increase reliability and minimize lowest level of the TCB
d. Contains its own drivers model

The correct answer is: Contains its own drivers model

Question
In multiple VM processing, CPU is alloted to the different processes in form of:

Select one:
a. Space slices by the OS
b. Different CPUs are allocated to different processes
c. Time slices by the OS
d. Frequecy slices by the OS

The correct answer is: Time slices by the OS

Question
Which of the statement is generally NOT correct for Full Virtualization?

Select one:
a. This is known as hardware-assisted virtualization, and improves performance significantly
b. The biggest advantage to this approach is its flexibility.
c. There are significant performance problems in trying to emulate a complete set of hardware in software
d. Hypervisor provides a fully emulated machine in which an operating system can run

The correct answer is: This is known as hardware-assisted virtualization, and improves performance significantly

Question
Which of the following is true of cloud computing?

Select one:
a. It's always going to be less expensive and more secure than local computing.
b. Only a few small companies are investing in the technology, making it a risky venture.
c. You can access your data from any computer in the world, as long as you have an Internet connection.

The correct answer is: You can access your data from any computer in the world, as long as you have an Internet connection.

Question
Which of the following is deployment model?

Select one:
a. Public
b. Private
c. All of the above
d. Hybrid

The correct answer is: All of the above

Question
The ________ cloud infrastructure is operated for the exclusive use of an organization.

Select one:
a. All of the mentioned
b. Public
c. Community
d. Private

The correct answer is: Private

Question
Following is not a feature of Cloud Computing:

Select one:
a. Rapid Provisioning
b. On Demand
c. None of the above
d. Unambiguous
e. Shared Pool

The correct answer is: None of the above

Question
Cloud computing is

Select one:
a. Utility computing
b. Peer to peer computing
c. Mobile computing
d. All of these

The correct answer is: All of these

Question
Bare metal hypervisor sits on top of

Select one:
a. None of the above
b. Physical Hardware
c. Virtualized hardware
d. Operating System

The correct answer is: Physical Hardware

Network Security - MCQS

Question
Consider these statements and state which are true.
i)   Encoding and encryption change the data format.
ii)  Encoding is a reversible process, while encryption is not.
iii) Both Encoding and Encryption are reversible processes.
iv)  Any third party will be able to reverse an encoded data,but not an encrypted data.

Select one:
i), iii) and iv)
ii) and iv)
i) and iv)
i),  ii) and iv)

The correct answer is: i), iii) and iv)

Question
Which of the following attacks is not an attack on Integrity?

Select one:
Modification
Replay
Denial Of Service
Masquerading

The correct answer is:: Denial Of Service

Question
I sent a data set {A,B,C,D} to a recipient which got received as {B,A,D,C}.

Select one:
Data security is compromised
Data integrity is lost
Confidentiality is lost
Data availability is compromised

The correct answer is:: Data integrity is lost

Question
A website login mechanim employs both password and verifying a PIN number sent via SMS to registered mobile.

This scenario provides ______
Select one:
High convenience but low security
High convenience and good security
Low convenience and low security
Low convenience but good security

The correct answer is:: Low convenience but good security

Question
A fake email posing as a legitimate email from bank is 

Select one:
Attack on Availability
Masquerading attack
Denial of Service (DOS) attack
Attack on Confidentiality

The correct answer is:: Masquerading attack

Question
Which of these mechanims provide data integrity ?
i) DES Encryption
ii) Asymmetric encryption
iii) SHA Hashing
iv) Hashed-MAC

Select one:
i and iv
i and iii
ii and iii
iii and iv

The correct answer is:: iii and iv

Question
Email attachments typically employ

Select one:
Base64 encoding
Base16 encoding
UTF-8 encoding
URL encoding

The correct answer is:: Base64 encoding

Question
The combination of key exchange, hash and encryption algorithms is termed as _______ in SSL/TLS.     

Select one:
TLS Handshake
Protocol suite
Cipher suite
TLS Records

The correct answer is:: Cipher suite

Question
The protocol ‘POP’ stands for-

Select one:
Personal Office Protocol
Post Office Protocol
Privacy Overall Protocol
Privacy Over Protocol

The correct answer is:: Post Office Protocol

Question
Which is the most secure way to remote login?

Select one:
SSH with public keys
Telnet with password
SSH with password
Telnet with public keys

The correct answer is:: SSH with public keys

Question
The Application layer protocol required for Electronic Mail is:

Select one:
SMTP
HTTP
FTP
SIP

The correct answer is: SMTP

Question
Which of these statements regarding HTTP is true.

Select one:
HTTPS adds security to HTTP POST and PUT messages as this is where password exchange is done.
HTTPS uses the same HTTP message format but  adds a handshake+encryption mechanism.
HTTPS introduces new messages HANDSHAKE and ALERT for bringing in security in HTTP.
HTTPS does not add security to HTTP GET and HEAD messages

The correct answer is: HTTPS uses the same HTTP message format but  adds a handshake + encryption mechanism.

Question
For SSL which is the advised cryptographic algorithm?

Select one:
twofish 128
aes 192
aes 128
blowfish

The correct answer is:: aes 128

Question
In SSL handshake, Server Hello message typically contains

Select one:
List of ciphers for the session and extensions list
Selected cipher for the session and random bytes
Selected cipher for the session and public key of server
Random bytes and public key of server

The correct answer is:: Selected cipher for the session and random bytes

Question
Pretty Good Privacy (PGP) is employed in

Select one:
FTP and WWW Security
Email and FTP Security
Email security
Email and WWW Security

The correct answer is:: Email security

Question
What is the common term present in HTTP request and status line?

Select one:
HTTP version number
URL
Method
None of the mentioned

The correct answer is:: HTTP version number

Question
A session symmetric key between two keys is used:

Select one:
Only once
Two times
Multiple times
Dependent on other conditions

The correct answer is:: Only once

Question
Which one of the following is a cryptographic protocol used to secure HTTP connection?

Select one:
Stream Control Transmission Protocol (SCTP)
Pretty Good Privacy (PGP)
Secure Mime(SMIME)
Transport Layer Security (TLS)

The correct answer is:: Transport Layer Security (TLS)

Question
The services provided by application layer are:

Select one:
Network virtual terminal
File transfer, access, and management
Mail service
All of the mentioned

The correct answer is:: All of the mentioned

Question
A group having 30 members uses Symmetric Key Encryption for message transmission.   How many secret keys are needed if all the members need to send secret messages to each other?

Select one:
30
60
435
900

The correct answer is: 435

Question
I - me@gmail.com - tried to email a .jar file to Dinesh. dinesh@company.com . But it got blocked by gmail while attaching.Then I tried sending a .txt file to Dinesh which went through fine. What do you infer? .jar files cannot be sent as

Select one:
A. it is blocked by gmail as .jar files are bigger in size
B. Email uses SMTP which is a Text protocol
C. it is blocked by company.com
D. it is blocked by gmail as it could contain viruses.

The correct answer is: it is blocked by gmail as it could contain viruses.

Question
What is the protocol used between Message User Agent (MUA) and Message Transfer Agent (MTA) in email system.

Select one:
A. HTTP
B. SMTP
C. IMAP
D. POP3

The correct answer is: SMTP

Question
IPSec defines these two protocols:

Select one:
A. PGP; ESP
B. AH; ESP
C. AH; SSL
D. PGP: SSL

The correct answer is: AH; ESP

Question
HTTPS implicitly uses Server certificates. These Server certificates contain ______

Select one:
A. Server's public key, algorithm used and digital signature
B. Server's public key and private key
C. Server's private key, algorithm used and digital signature
D. Server's public key and digital signature

The correct answer is: Server's public key and private key

Question
Asymmetric encryption has

Select one:
A. one key for encryption and another key for decryption
B. two keys - one key for public encryption and another for private encryption
C. one public key for doing encryption and decryption and another private key only for decryption
D. only one public key which is shared

The correct answer is: one key for encryption and another key for decryption

Question
IP Header contains

Select one:
A. Source and destination IP addresses and priority numbers
B. Source and destination IP addresses and IP version number
C. Source and destination IP addresses and Port numbers
D. Source and destination IP addresses and sequence numbers

The correct answer is: Source and destination IP addresses and IP version number

Question
Pick the most relevant option. I sent a data set {J,K,L,M,N} to a recipient which got received as {J,K,N}.

Select one:
A. Data integrity is lost
B. Data availability is compromised
C. Both Confidentiality and integrity are compromised
D. Data Confidentiality is compromised

The correct answer is: Data integrity is lost

Question
A data center is secured with 3 outer gates - Og1, Og2, Og3    locked by separate keys - Kog1, Kog2, Kog3 - given to    three personnel - P1, P2, P3. These 3 outer gates lead to 2 inner gates - Ig1, Ig2 - which provide main corridor access. The matching keys - Kig1, Kig2 are given to P2 and P4. The order of acessibility from most access to least access  for the personnel is ____________

Select one:
A. P2, P1, P3, P4
B. P1, P2, P3, P4
C. P4, P3, P2, P1
D. P2, P4, P1, P3

The correct answer is:

Question
The modes  of IP-Sec are

Select one:
A. Padding mode and Non-padding mode.
B. Secure and Unsecure Mode
C. Tunnel Mode and Transport Mode
D. SPD and SAD mode

The correct answer is: Tunnel Mode and Transport Mode

Question
Of these, Which is the most secure way to remote login?

Select one:
A. SSH with public keys
B. Telnet with password
C. Telnet with public keys
D. SSH with password

The correct answer is: SSH with public keys

Question
Megha's uses a 4-digit bank ATM PIN. Guna peeped in,as Megha keyed-in and found the last two digits of her PIN. Knowing that Megha does not use 0 in her PIN, what is the maximum attempts for Guna to get her PIN correct ?

Select one:
A. 18
B. 81
C. 19
D. 90

The correct answer is: 81

April 17, 2019

Network Security - Mid Sem Solution

Mid-Sem Paper Solutions:


Question:
What are the different types of active security attack ?

Answer:
Security Attack: Any action that compromises the security of information owned by an organization. There are 2 types of attack as shown below.

Active Attack:
An Active attack attempts to alter system resources or effect their operations. The attacker changes the data or harms the system.

Passive Attacks:
The attacker’s goal is to just obtain the information. The attack does not harm the system.

Types of active attacks include:
  • Denial of service (DoS) - It prevents normal use of communication facilities. Slowing down or totally interrupt the service of the system. E.g. multiple requests to bring an exam result server down.
  • Session replay - Subsequent retransmission of a captured message to produce an unauthorized effect. E.g. Bill payment fake reminders.
  • Masquerade - Masquerade attack takes place when one entity pretends to be different entity. E.g. Hoax bank sites. 
  • Message modification - It means that some portion of a message is altered or that message is delayed or reordered to produce an unauthorized effect.
  • Repudiation - Sender denies that it sent the message or the receiver denies that it received the message.
  • Trojans - A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.
Types of passive attack include:
  • Snooping - Data is intercepted by an unauthorized person. E.g. Tapping
  • Traffic Analysis - May be the data is masked, so no information can be extracted but some patterns like - sender, receiver, message length, time of the message etc. can be extracted to make intelligent guesses.

April 15, 2019

Office 365 Admin Center - Digital Skill (TrendNXT L1)

Marks: 10
Set: 1
Question:62



Note: Kindly prepare yourself to score good marks in Office 365 Admin Center L1. This is for TrenDNXT level 1 dumps.

MCQS:




Hope you all guys do well in your exam, Feel free to post your concern in comment box in case of any changes in required question/answer template.