50% found this document useful (2 votes)
2K views18 pages

It Infrastructure Mcqs

Mcqs

Uploaded by

Masood Ahmad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views18 pages

It Infrastructure Mcqs

Mcqs

Uploaded by

Masood Ahmad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

MCQ’S:

1. What does IT Infrastructure primarily consist of?


A) Software applications
B) Hardware components
C) Network resources
D) All of the above (Correct Answer)
2. Which of the following is a nonfunctional attribute of IT systems?
A) User interface
B) Performance (Correct Answer)
C) Features
D) Functionality
3. What is the primary goal of availability concepts in IT infrastructure?
A) Maximize performance
B) Minimize costs
C) Ensure systems are operational when needed (Correct Answer)
D) Simplify user experience
4. Which of the following is a source of unavailability?
A) System upgrades
B) Hardware failures (Correct Answer)
C) User errors
D) All of the above
5. Availability patterns refer to:
A) Types of software applications
B) Configurations of data storage
C) Frequency and duration of system uptime (Correct Answer)
D) Network protocols used
6. Performance in IT infrastructure is often measured by:
A) Uptime
B) Response time (Correct Answer)
C) Number of users
D) Data storage size
7. What is a common performance metric for databases?
A) Latency (Correct Answer)
B) Downtime
C) Data integrity
D) User satisfaction
8. Which of the following is NOT a core principle of IT security?
A) Confidentiality
B) Availability
C) Usability (Correct Answer)
D) Integrity
9. A security breach can lead to:
A) Data loss
B) Reputation damage
C) Financial loss
D) All of the above (Correct Answer)
10. A data center primarily functions as:
A) A software development hub
B) A physical facility for data storage and processing (Correct Answer)
C) A networking site
D) A user interface design studio
11. Which of the following is a key consideration in data center design?
A) User interface design
B) Cooling and power management (Correct Answer)
C) Software installation
D) Application development
12. Server availability is often enhanced by:
A) Regular updates
B) Load balancing (Correct Answer)
C) User training
D) Increased user access
13. What type of server is typically used for high performance?
A) File server
B) Application server
C) Web server
D) Database server (Correct Answer)
14. The primary building blocks of networking include:
A) Switches, routers, and cables (Correct Answer)
B) Monitors and keyboards
C) Software applications
D) Enduser devices
15. In networking, latency refers to:
A) The time taken for data to travel from source to destination (Correct Answer)
B) The amount of data that can be transmitted
C) The number of connected devices
D) The speed of the processor
16. Which of the following storage solutions is known for high availability?
A) Hard Disk Drives (HDD)
B) Solid State Drives (SSD) (Correct Answer)
C) Optical disks
D) Flash drives
17. Data redundancy is primarily used to:
A) Improve performance
B) Enhance security
C) Ensure availability (Correct Answer)
D) Decrease costs
18. Virtualization technology allows for:
A) Running multiple OSs on a single physical machine (Correct Answer)
B) Improved physical security
C) Faster internet speeds
D) Enhanced user interfaces
19. What is a key benefit of server virtualization?
A) Increased physical space
B) Better resource utilization (Correct Answer)
C) Reduced user access
D) Higher energy consumption
20. The building blocks of an operating system include:
A) Kernel, shell, and file system (Correct Answer)
B) User interface and application software
C) Network drivers and firmware
D) Database management and user access
21. Operating System availability can be ensured through:
A) Regular software updates
B) Redundant systems (Correct Answer)
C) User training
D) Hardware upgrades
22. Which of the following is considered a building block of enduser devices?
A) Battery
B) CPU (Correct Answer)
C) Operating system
D) Network card
23. What impacts the performance of enduser devices the most?
A) User preferences
B) Hardware specifications (Correct Answer)
C) Software updates
D) Network speed
24. IT infrastructure management involves:
A) Only hardware maintenance
B) Ensuring optimal performance and availability of IT resources (Correct Answer)
C) User training
D) Software development
25. Service delivery processes focus on:
A) Enhancing user experience
B) Delivering IT services effectively (Correct Answer)
C) Developing new software
D) Managing hardware
26. Which of the following is a key component of service support processes?
A) Help desk support (Correct Answer)
B) Software testing
C) Network design
D) Hardware purchasing
27. What is a major ethical concern in IT infrastructure?
A) User satisfaction
B) Data privacy (Correct Answer)
C) Software performance
D) Hardware costs
28. One of the current trends in IT infrastructure is:
A) Decreased cloud usage
B) Increased automation (Correct Answer)
C) Reduced network security
D) Less focus on virtualization
29. A common organizational issue related to IT infrastructure is:
A) Budget constraints (Correct Answer)
B) User interface design
C) Hardware performance
D) Application speed
30. Which technical issue can impact system performance?
A) User training
B) Inadequate hardware resources (Correct Answer)
C) Software design
D) Network policies
Here are over 100 MCQs covering your listed topics:

1. Definition of IT Infrastructure

1. What is IT Infrastructure?
a) Hardware components only
b) Software components only
c) The combination of hardware, software, networks, and facilities
d) Just data centers

Answer: c

2. Nonfunctional Attributes

2. Which of the following is a nonfunctional attribute?


a) Security
b) Performance
c) Availability
d) All of the above
Answer: d

3. Availability Concepts

3. Availability is typically measured in terms of:


a) MTBF
b) MTTR
c) Uptime percentage
d) All of the above

Answer: d

4. Sources of Unavailability

4. Which of the following is a common source of unavailability?


a) Power failures
b) Software bugs
c) Human error
d) All of the above

Answer: d

5. Availability Patterns

5. Which of these is an availability pattern?


a) Load balancing
b) Redundancy
c) Replication
d) All of the above

Answer: d

6. Performance

6. Which metric is used to measure system performance?


a) Latency
b) Throughput
c) Bandwidth
d) All of the above

Answer: d

7. Security Concepts

7. What does CIA in security stand for?


a) Confidentiality, Integrity, Availability
b) Confidentiality, Integrity, Access
c) Control, Integrity, Authentication
d) Compliance, Integrity, Availability

Answer: a

8. Data Centres

8. What is the main purpose of a data center?


a) Store large amounts of data
b) Provide computing resources
c) Ensure high availability and security
d) All of the above

Answer: d

9. Servers: Availability, Performance, Security

9. A server’s availability can be improved by:


a) Virtualization
b) Redundancy
c) Increased bandwidth
d) All of the above

Answer: b

10. Which factor does not typically affect server performance?


a) CPU power
b) Hard drive speed
c) Air conditioning
d) RAM

Answer: c

11. Which technique helps secure servers?


a) Data encryption
b) Load balancing
c) DNS management
d) High bandwidth

Answer: a

10. Networking: Building Blocks, Availability, Performance, Security

12. Which of the following is a networking building block?


a) Routers
b) Switches
c) Firewalls
d) All of the above

Answer: d

13. Which concept improves network availability?


a) Failover
b) High latency
c) Low bandwidth
d) All of the above

Answer: a

14. Network performance is mostly impacted by:


a) Bandwidth
b) Latency
c) Packet loss
d) All of the above

Answer: d
15. A network firewall is used for:
a) Data encryption
b) Security
c) Performance improvement
d) None of the above

Answer: b

11. Storage: Availability, Performance, Security

16. RAID is commonly used to enhance:


a) Storage performance
b) Availability
c) Security
d) All of the above

Answer: b

17. Which type of storage is the fastest?


a) HDD
b) SSD
c) Tape drives
d) Optical storage

Answer: b

18. Which method helps secure storage data?


a) Redundancy
b) Encryption
c) Replication
d) Backup

Answer: b

12. Virtualization: Availability, Performance, Security

19. Virtualization can enhance availability through:


a) VM migration
b) Increased CPU power
c) Reduced network traffic
d) Larger data centers

Answer: a

20. Performance in a virtualized environment is affected by:


a) Number of VMs
b) Available hardware resources
c) Network bottlenecks
d) All of the above

Answer: d

21. Virtualization security can be enhanced using:


a) Hypervisor firewalls
b) Encryption
c) Isolation of VMs
d) All of the above

Answer: d

13. Operating Systems: Building Blocks, Implementing Various OSs, OS Availability, OS


Performance, OS Security

22. Which is a core building block of an OS?


a) Kernel
b) File system
c) User interface
d) All of the above

Answer: d

23. OS performance is typically enhanced by:


a) Increasing CPU cores
b) Optimizing the kernel
c) Adding more RAM
d) All of the above

Answer: d

24. Which of the following enhances OS security?


a) Patching
b) User permissions
c) Firewalls
d) All of the above

Answer: d

14. End User Devices: Building Blocks, Device Availability, Performance, Security

25. End user device availability can be improved by:


a) Battery optimization
b) Regular software updates
c) Backup power supplies
d) All of the above

Answer: d

26. Performance of a device can be enhanced by:


a) Faster CPU
b) Clearing RAM
c) SSD storage
d) All of the above

Answer: d

27. Security on enduser devices can be improved through:


a) Encryption
b) Biometrics
c) Firewalls
d) All of the above

Answer: d
15. IT Infrastructure Management

28. IT infrastructure management primarily focuses on:


a) Security
b) Performance
c) Availability
d) All of the above

Answer: d

16. Service Delivery Processes

29. Service delivery processes are part of:


a) ITIL framework
b) ISO standards
c) Project management
d) None of the above

Answer: a

17. Service Support Processes

30. Service support includes:


a) Incident management
b) Problem management
c) Change management
d) All of the above
Answer: d
31. Which of these is an ethical issue in IT infrastructure?
a) Data privacy
b) Security breaches
c) Software licensing
d) All of the above
31. Which of the following best describes cloud computing?
A) Local data storage
B) Internetbased computing (Correct Answer)
C) Hardwarecentric applications
D) Standalone software
32. What is the purpose of a load balancer in IT infrastructure?
A) To store data
B) To distribute network traffic across multiple servers (Correct Answer)
C) To secure user data
D) To create virtual machines
33. Which of the following is NOT typically a component of IT infrastructure?
A) Servers
B) Networking devices
C) Software applications (Correct Answer)
D) Storage systems
34. Scalability in IT infrastructure refers to:
A) The ability to handle more users or workload (Correct Answer)
B) The speed of data processing
C) The security of data
D) The cost of implementation
35. Which nonfunctional attribute relates to system resilience?
A) Availability (Correct Answer)
B) Usability
C) Functionality
D) Compatibility
36. The term "High Availability" typically refers to:
A) Minimal downtime (Correct Answer)
B) High performance
C) Large data storage
D) Low cost
37. What is the common method to measure availability?
A) Uptime percentage (Correct Answer)
B) User satisfaction scores
C) Network speed
D) Data transfer rates
38. Natural disasters are considered a source of:
A) Performance issues
B) Unavailability (Correct Answer)
C) Security breaches
D) Hardware upgrades
39. Human error contributes to unavailability primarily through:
A) Equipment failure
B) Incorrect system configurations (Correct Answer)
C) Network design flaws
D) Software bugs
40. Which availability pattern involves regularly scheduled downtime?
A) Continuous availability
B) Planned maintenance (Correct Answer)
C) Fault tolerance
D) Redundancy
41. An availability pattern that allows for seamless failover is called:
A) Load balancing
B) High availability (Correct Answer)
C) Activepassive
D) Scheduled maintenance
42. Which of the following measures the throughput of a network?
A) Latency
B) Bandwidth (Correct Answer)
C) Packet loss
D) Response time
43. A performance bottleneck typically refers to:
A) A point where system performance is significantly reduced (Correct Answer)
B) A highspeed network connection
C) An increase in user demand
D) Redundant systems
44. What type of attack is designed to overwhelm a system with traffic?
A) Phishing
B) Denial of Service (DoS) (Correct Answer)
C) Malware
D) SQL Injection
45. Which of the following is a method of ensuring data integrity?
A) Data backups
B) Hashing (Correct Answer)
C) Data encryption
D) User training
46. Which of the following is a benefit of a tiered data center design?
A) Simplified maintenance
B) Improved scalability (Correct Answer)
C) Higher energy costs
D) Increased downtime
47. What is a typical component of a cooling system in a data center?
A) UPS
B) HVAC systems (Correct Answer)
C) Firewalls
D) Routers
48. Which server type is primarily used for hosting websites?
A) Database server
B) File server
C) Web server (Correct Answer)
D) Application server
49. A virtual server can be described as:
A) A physical machine
B) A softwarebased emulation of a physical server (Correct Answer)
C) A hardwareonly solution
D) A backup system
50. What does a router primarily do?
A) Connects devices within a network
B) Forwards data packets between networks (Correct Answer)
C) Stores data
D) Monitors network performance
51. Which protocol is used for secure data transmission over the internet?
A) HTTP
B) FTP
C) HTTPS (Correct Answer)
D) SMTP
52. RAID is primarily used for:
A) Improving processing speed
B) Data redundancy and performance enhancement (Correct Answer)
C) Network security
D) User access control
53. What is the primary advantage of cloud storage?
A) High cost
B) Scalability and flexibility (Correct Answer)
C) Limited accessibility
D) Requires physical infrastructure
54. In virtualization, what is a hypervisor?
A) A type of virtual machine
B) Software that creates and manages virtual machines (Correct Answer)
C) A network security device
D) A storage solution
55. Which of the following is a benefit of desktop virtualization?
A) Increased hardware costs
B) Centralized management (Correct Answer)
C) Limited user access
D) Reduced data security
56. Which of the following operating systems is commonly used for servers?
A) Windows 10
B) Ubuntu Server (Correct Answer)
C) macOS
D) Android
57. What is the main function of an operating system's kernel?
A) User interface management
B) Resource management (Correct Answer)
C) Application software development
D) Data storage
58. Which of the following is a common operating system for mobile devices?
A) Windows
B) Linux
C) iOS (Correct Answer)
D) macOS
59. What is the primary concern regarding the security of enduser devices?
A) Hardware compatibility
B) Data breaches (Correct Answer)
C) Network speed
D) Software licensing
60. Effective IT infrastructure management requires:
A) Only technical skills
B) A combination of technical and managerial skills (Correct Answer)
C) No formal training
D) Isolated operations
61. ITIL is a framework primarily used for:
A) Software development
B) IT service management (Correct Answer)
C) Hardware procurement
D) Network design
62. Incident management focuses on:
A) Preventing incidents
B) Responding to and resolving incidents (Correct Answer)
C) Enhancing performance
D) User training
63. Data protection regulations, like GDPR, primarily aim to:
A) Improve network performance
B) Enhance data privacy and security (Correct Answer)
C) Increase software usability
D) Reduce hardware costs
64. A significant trend in IT infrastructure is the rise of:
A) Onpremises solutions
B) Edge computing (Correct Answer)
C) Physical data centers
D) Traditional networking
65. A significant organizational challenge in IT infrastructure is:
A) High user satisfaction
B) Rapid technology changes (Correct Answer)
C) Simple management
D) Minimal data storage
66. Technical debt refers to:
A) Outdated hardware
B) Inefficient code and systems requiring future fixes (Correct Answer)
C) Data loss
D) User dissatisfaction
67. Which of the following enhances the security of cloud infrastructure?
A) Data encryption (Correct Answer)
B) Increased user access
C) Basic firewall settings
D) Single signon only
68. What is a common use of API in IT infrastructure?
A) Data storage
B) Application communication (Correct Answer)
C) User interface design
D) Hardware integration
69. The term “phishing” refers to:
A) Data backup methods
B) A type of social engineering attack (Correct Answer)
C) Network performance monitoring
D) Software licensing
70. Which of the following is a security best practice?
A) Using default passwords
B) Regular software updates (Correct Answer)
C) Ignoring security audits
D) Sharing passwords
71. The main purpose of a firewall is to:
A) Store data
B) Monitor network performance
C) Protect against unauthorized access (Correct Answer)
D) Enhance user experience
72. In a business continuity plan, what is a key component?
A) User interface design
B) Disaster recovery procedures (Correct Answer)
C) Employee satisfaction
D) Marketing strategy
73. Which storage technology offers the fastest access speed?
A) SSD (Correct Answer)
B) HDD
C) Tape drives
D) Optical disks
74. The principle of least privilege in security means:
A) Users should have access to all data
B) Users should have the minimum access necessary to perform their tasks (Correct
Answer)
C) All users are equal
D) Access should be unrestricted
75. Which type of network topology is characterized by a single point of failure?
A) Star topology (Correct Answer)
B) Mesh topology
C) Ring topology
D) Bus topology
76. A VPN is used primarily to:
A) Enhance network speed
B) Secure internet connections (Correct Answer)
C) Store data
D) Monitor user activity
77. Which component is essential for connecting different networks?
A) Switch
B) Router (Correct Answer)
C) Hub
D) Repeater
78. What is the primary function of DNS?
A) Data storage
B) Domain name resolution (Correct Answer)
C) Network security
D) Data encryption
79. In data management, the term "ETL" refers to:
A) Extract, Transform, Load (Correct Answer)
B) Evaluate, Test, Launch
C) Encrypt, Transfer, Log
D) Extract, Transmit, Load
80. Which of the following is a common tool for network monitoring?
A) Wireshark (Correct Answer)
B) Photoshop
C) Excel
D) Visual Studio
81. Which of the following is a characteristic of a hybrid cloud?
A) Only private resources
B) Only public resources
C) Combination of private and public resources (Correct Answer)
D) No data security
82. Data mining is primarily used for:
A) Data storage
B) Analyzing data to discover patterns (Correct Answer)
C) Networking
D) Software development
83. Which of the following describes a "zero trust" security model?
A) Trusting all internal users
B) No user is trusted by default, verification is required (Correct Answer)
C) Full access for all devices
D) Limited access to external users only
84. What is a primary role of a database administrator (DBA)?
A) Software development
B) Network security
C) Managing database performance and availability (Correct Answer)
D) User training
85. Which of the following helps to secure wireless networks?
A) Open access
B) WPA2 encryption (Correct Answer)
C) No password
D) Public access
86. Which cloud service model provides complete control over the underlying
infrastructure?
A) SaaS
B) PaaS
C) IaaS (Correct Answer)
D) DaaS
87. What does the term "latency" refer to in networking?
A) The total amount of data transmitted
B) The time delay in data transmission (Correct Answer)
C) The number of users connected
D) The speed of the internet connection
88. Which of the following best describes "big data"?
A) Small datasets
B) Data that is too large or complex for traditional processing (Correct Answer)
C) Data with low integrity
D) Data that is easily manageable
89. Which of the following is NOT a type of malware?
A) Virus
B) Worm
C) Firewall (Correct Answer)
D) Trojan
90. What does "phishing" aim to do?
A) Protect data
B) Harvest personal information (Correct Answer)
C) Improve performance
D) Enhance security
91. In project management, what is a Gantt chart used for?
A) Data analysis
B) Scheduling tasks (Correct Answer)
C) Financial planning
D) Risk assessment
92. What is the primary purpose of a backup solution?
A) Increase system performance
B) Prevent data loss (Correct Answer)
C) Enhance user experience
D) Simplify software development
93. Which technology allows multiple OSs to run on a single hardware platform?
A) Clustering
B) Virtualization (Correct Answer)
C) Load balancing
D) Data replication
94. What does SSL stand for in the context of security?
A) Secure Socket Layer (Correct Answer)
B) Secure System Layer
C) Simple Socket Layer
D) Standard Security Layer
95. Which of the following is a characteristic of Agile project management?
A) Rigid planning
B) Flexibility and adaptability (Correct Answer)
C) Long release cycles
D) Strict documentation
96. What is the primary benefit of using a Content Delivery Network (CDN)?
A) Lower costs
B) Improved website load times (Correct Answer)
C) Simplified coding
D) Increased downtime
97. Which of the following best describes "data governance"?
A) Managing data quality and security (Correct Answer)
B) Storing data
C) Backing up data
D) Analyzing data
98. What does a certificate authority (CA) do?
A) Issues SSL certificates (Correct Answer)
B) Manages cloud storage
C) Provides IT support
D) Develops software
99. In IT security, what does the term "social engineering" refer to?
A) Hardware manipulation
B) Psychological manipulation to gain confidential information (Correct Answer)
C) Network security protocols
D) Software development practices
100. Which of the following is a benefit of using multifactor authentication (MFA)?
A) Simplified login
B) Enhanced security (Correct Answer)
C) Reduced hardware costs
D) Increased user access
101. Which type of analysis is used to predict future trends in data?
A) Descriptive analysis
B) Predictive analysis (Correct Answer)
C) Diagnostic analysis
D) Prescriptive analysis
102. In the context of IT infrastructure, "failover" refers to:
A) The process of switching to a redundant system when the primary fails (Correct
Answer)
B) Data backup procedures
C) Network optimization techniques
D) User interface enhancements
103. What is the primary purpose of a penetration test?
A) To evaluate software performance
B) To identify security vulnerabilities (Correct Answer)
C) To improve user experience
D) To enhance data storage
104. Which of the following is NOT a benefit of using virtualization?
A) Resource efficiency
B) Increased hardware costs (Correct Answer)
C) Simplified management
D) Scalability
105. Which of the following is a common vulnerability in web applications?
A) SQL Injection (Correct Answer)
B) Load balancing
C) Redundant storage
D) Cloud computing
1. What is IT Infrastructure?
a) Hardware components only
b) Software components only
c) The combination of hardware, software, networks, and facilities
d) Just data centers
Answer: c
2. Which of the following is a nonfunctional attribute?
a) Security
b) Performance
c) Availability
d) All of the above
Answer: d
3. Availability is typically measured in terms of:
a) MTBF
b) MTTR
c) Uptime percentage
d) All of the above
Answer: d
4. Which of the following is a common source of unavailability?
a) Power failures
b) Software bugs
c) Human error
d) All of the above
Answer: d
5. Which of these is an availability pattern?
a) Load balancing
b) Redundancy
c) Replication
d) All of the above
Answer: d
6. Which metric is used to measure system performance?
a) Latency
b) Throughput
c) Bandwidth
d) All of the above
Answer: d
7. What does CIA in security stand for?
a) Confidentiality, Integrity, Availability
b) Confidentiality, Integrity, Access
c) Control, Integrity, Authentication
d) Compliance, Integrity, Availability
Answer: a
8. What is the main purpose of a data center?
a) Store large amounts of data
b) Provide computing resources
c) Ensure high availability and security
d) All of the above
Answer: d
9. A server’s availability can be improved by:
a) Virtualization
b) Redundancy
c) Increased bandwidth
d) All of the above
Answer: b
10. Which factor does not typically affect server performance?
a) CPU power
b) Hard drive speed
c) Air conditioning
d) RAM
Answer: c
11. Which technique helps secure servers?
a) Data encryption
b) Load balancing
c) DNS management
d) High bandwidth
Answer: a
12. Which of the following is a networking building block?
a) Routers
b) Switches
c) Firewalls
d) All of the above
Answer: d
13. Which concept improves network availability?
a) Failover
b) High latency
c) Low bandwidth
d) All of the above
Answer: a
14. Network performance is mostly impacted by:
a) Bandwidth
b) Latency
c) Packet loss
d) All of the above
Answer: d
15. A network firewall is used for:
a) Data encryption
b) Security
c) Performance improvement
d) None of the above
Answer: b
16. RAID is commonly used to enhance:
a) Storage performance
b) Availability
c) Security
d) All of the above
Answer: b
17. Which type of storage is the fastest?
a) HDD
b) SSD
c) Tape drives
d) Optical storage
Answer: b
18. Which method helps secure storage data?
a) Redundancy
b) Encryption
c) Replication
d) Backup
Answer: b
19. Virtualization can enhance availability through:
a) VM migration
b) Increased CPU power
c) Reduced network traffic
d) Larger data centers
Answer: a
20. Performance in a virtualized environment is affected by:
a) Number of VMs
b) Available hardware resources
c) Network bottlenecks
d) All of the above
Answer: d
21. Virtualization security can be enhanced using:
a) Hypervisor firewalls
b) Encryption
c) Isolation of VMs
d) All of the above
Answer: d
22. Which is a core building block of an OS?
a) Kernel
b) File system
c) User interface
d) All of the above
Answer: d
23. OS performance is typically enhanced by:
a) Increasing CPU cores
b) Optimizing the kernel
c) Adding more RAM
d) All of the above
Answer: d
24. Which of the following enhances OS security?
a) Patching
b) User permissions
c) Firewalls
d) All of the above
Answer: d
25. End user device availability can be improved by:
a) Battery optimization
b) Regular software updates
c) Backup power supplies
d) All of the above
Answer: d
26. Performance of a device can be enhanced by:
a) Faster CPU
b) Clearing RAM
c) SSD storage
d) All of the above
Answer: d
27. Security on enduser devices can be improved through:
a) Encryption
b) Biometrics
c) Firewalls
d) All of the above
Answer: d
28. IT infrastructure management primarily focuses on:
a) Security
b) Performance
c) Availability
d) All of the above
Answer: d
29. Service delivery processes are part of:
a) ITIL framework
b) ISO standards
c) Project management
d) None of the above
Answer: a
30. Service support includes:
a) Incident management
b) Problem management
c) Change management
d) All of the above
Answer: d
31. Which of these is an ethical issue in IT infrastructure?
a) Data privacy
b) Security breaches
c) Software licensing
d) All of the above
answer:d

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy