GAIT Sample Questions

Database

Implementation

Which of the following keywords is used to eliminate duplicated data?


  • MERGE
  • DISTINCT
  • JOIN
  • UNION

Answer

B

Implementation

Which of the following functions is used in Oracle to return the second argument if the first argument is a NULL value and returns the first argument if the first argument is not a NULL value?


  • NVL2
  • NULLIF
  • NVL
  • COALESCE

Answer

C

Management

What is the default port number of a MySQL database server?


  • 3306
  • 3011
  • 3006
  • 3106

Answer

A

Management

Which of the following options specifies the location of the configuration file when starting a MySQL database from the command line?


  • --read-file
  • --verbose-file
  • --include-file
  • --defaults-file

Answer

D

Design

Which of the following is the data modeling technique based on the Entity Relationship Diagram(ER diagram) that integrates information and data?


  • IDEF3
  • IDEF1X
  • IDEF1
  • IDEF0

Answer

B

Design

Which of the following is a document-oriented NoSQL database?


  • MongoDB
  • Apache HBase
  • Apache Cassandra
  • Amazon DynamoDB

Answer

A

OS

Literacy

Which of the following is NOT a name service?


  • NIS
  • NFS
  • DNS
  • LDAP

Answer

B

Literacy

Which of the following is a self-diagnostic function aimed to detect and report failures on disk drives at an early stage?


  • CrystalDiskMark
  • ATAoE
  • S.M.A.R.T
  • DAAP

Answer

C

Windows

Which of the following is a valid Windows Server 2008 R2 edition?


  • Business
  • Ultimate
  • Enterprise
  • Professional

Answer

C

Windows

Which of the following is a backup utility installed in windows by default?


  • ntbackup.exe
  • bkupexec.exe
  • DBBackup.exe
  • OSBackup.exe

Answer

A

UNIX & Linux

Which of the following is a correct way to write the shell declaration in the first line of the shell script file? Assume that the script is executed in a Bourne shell.


  • */bin/sh
  • ##!/bin/sh
  • !/bin/sh
  • #!/bin/sh

Answer

D

UNIX & Linux

Which of the following commands switches to single user mode in Linux?


  • telinit 3
  • init 0
  • init 1
  • reboot

Answer

C

Application

Literacy

Which of the following is a communication protocol for Web services?


  • UDDI
  • WSDL
  • SOAP
  • JAXP

Answer

C

Literacy

Which of the following HTTP status codes indicates “Internal Server Error”?


  • 200
  • 404
  • 500
  • 305

Answer

C

Design

What does SOA stand for?


  • Software Object Architure
  • Service Object Architecture
  • Software Oriented Architecture
  • Service Oriented Architecture

Answer

D

Design

Which of the following design patterns is used in multi-tiered system design to minimize the coupling and hide the access details between the business and web tier?


  • Data Access Object
  • MVC
  • Service Locator
  • Business Delegate

Answer

D

Implementation

XLM design is based upon which of the following languages?


  • XHTML
  • GML
  • HTML
  • SGML

Answer

D

Implementation

In HTML、 which of the following attributes is used to define a text field?


  • type=text
  • type=input
  • type=field
  • type=textfield

Answer

A

Development Process

Which of the following is the engine that is used to load and execute .NET applications?


  • CLR
  • PL/SQL
  • J2EE
  • ABAP

Answer

A

Development Process

Which of the following is NOT a technology made for Web services?


  • UDDI
  • ITIL
  • HTTP
  • XML

Answer

B

Storage

Literacy

Which of the following storages uses NFS or CIFS to access devices via an IP network?


  • LAN
  • DAS
  • SAN
  • NAS

Answer

D

Literacy

Which of the following refers to the situation when the read/write function of the hard disk becomes nonfunctional due to damage to the platter surface caused by its contact with the magnetic head?


  • Error
  • Scratch
  • Hit
  • Crash

Answer

D

Data protection

Which of the following two types of RAID has similarity to RAID Z?


  • RAID 4 and RAID 0
  • RAID 0 and RAID 1
  • RAID 5 and RAID 6
  • RAID 10 and RAID 50

Answer

C

Data protection

Given the case that 6 hard disks is configured with RAID 6 and 2 are prepared for hot spare how many disks can fail without the loss of any data?


  • 3
  • 2
  • 1
  • 4

Answer

D

Data management

What does NDMP stand for?


  • Non Disruption Managing Protocol
  • Network Data Management Protocol
  • Network Direct Migration Protocol
  • Network Direct Management Protocol

Answer

B

Data management

What does VTL one of the backup methods stand for?


  • Virtual Tape Library
  • Visual Tape Library
  • Visualized Tape Library
  • Virtualized Tape Library

Answer

A

Security

Literacy

According to the audit log an unspecified user had accessed the server using his/her own ID and carried out what was only authorized to administrators. Which of the following appears to have been done by that user?


  • Elimination of Policy
  • Elimination of File
  • Installation of Trojan Horse
  • Enhancement of Privilege

Answer

D

Literacy

Which of the following is NOT true about IDS and IPS?


  • IDS detects and blocks illegal access and then reports to administrator
  • IPS is an extended function of IDS
  • There are “Network type” and “Host type” in both IDS and IPS
  • IPS blocks connection in real-time when there is an intrusion

Answer

A

Infrastructure

SSID is used as an identifier of access points in a wireless LAN. However security cannot be ensured only with SSID. Which of the following best describes that reason?


  • The length of SSID is limited to 64 bits
  • The length of SSID is limited to 32 bits
  • SSID is transferred in clear text
  • SSID identifies station not network

Answer

C

Infrastructure

Which of the following is true about the authentication protocol that is extended based on RADIUS for mobile IP?


  • DIAMETER
  • UDP
  • NAS
  • TACACS

Answer

A

Cracking

Which of the following is a public key encryption system based on the presumed difficulty of factoring large integers?


  • 3DES
  • AES
  • SHA-1
  • RSA

Answer

D

Cracking

Which of the following is a technique used to avoid SQL injections by invalidating special characters?


  • Compiling
  • Filtering
  • Sanitizing
  • Translating

Answer

C

Policy

Which of the following authentication approaches matches only with the concerned person himself/herself?


  • Date of Birth
  • Biometric authentication
  • Blood type
  • Psychological authentication

Answer

B

Policy

Who is responsible for implementing physical security?


  • All employees
  • Board members
  • IT administrators
  • Software development staff

Answer

A

Network

Literacy

Which of the following is a protocol that identifies the MAC address from the IP address?


  • DHCP
  • ARP
  • RARP
  • NTP

Answer

B

Literacy

Which of the following classifies the port numbers in the range from 0 to 1023?


  • Well Known Port Number
  • Dynamic Port Number
  • Registered Port Number
  • Static Port Number

Answer

A

Infrastructure

Which of the following devices CANNOT read the information in the TCP/IP protocol header?


  • L2 Switch
  • Hub
  • Firewall
  • Router

Answer

B

Infrastructure

In Cisco switches which of the following commands is used to change to privileged mode?


  • login
  • enable
  • priv
  • su

Answer

B

Mobile

Which of the following is NOT social media?


  • Blog
  • Review site
  • RSS
  • SNS

Answer

C

Mobile

Which of the following is true about femtocell?


  • Extremely-compact base station primarily for indoor use
  • Base station that runs a larger cell than what is conventional
  • Base station that enables high-speed handover
  • Base station for WiMAX

Answer

A

Virtualization

Literacy

Which of the following is a software that duplicates the functions of a hardware on a different hardware environment?


  • Emulator
  • Imitator
  • Simulator
  • Copycat

Answer

A

Literacy

Which of the following is an approach that transfers low-priority programs to the auxiliary storage and executes high-priority programs?


  • Swapping
  • Slashing
  • Paging
  • Peer to peer

Answer

A

Infrastructure

Which of the following is a technology that enables the group’s total disk space to create logical volumes by grouping multiple physical hard disks and partitions?


  • LVM
  • DFS
  • HVM
  • FDS

Answer

A

Infrastructure

Which of the following is a technology to share a single OS resource with multiple applications?


  • Multiload Partitioning
  • Logical Partitioning
  • Shared Processor Partitioning
  • Workload Partitioning

Answer

D