Where possibilities begin

We’re a leading marketplace platform for learning and teaching online. Explore some of our most popular content and learn something new.
Total 835 Results
ComptiA Security+ Certification Exam Questions and answer - Part 13

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 13

Questions 1. A company has two wireless networks utilizing captive portals. Some employees report getting a trust error in their browsers when connecting to one of the networks. Both captive portals are using the same server certificate for authentication,but the analyst notices the following differences between the two certificate details: Certificate 1 Certificate Path: Geotrust Global CA *company.com Certificate 2 Certificate Path: *company.com Which of the following would resolve the problem?A) Use certificate chaining.B) Use an extended validation certificate.C) Use a trust model.D) Use a wildcard certificate.2. After a security assessment was performed on the enterprise network,it was discovered that: 1. Configuration changes have been made by users without the consent of IT. 2. Network congestion has increased due to the use of social media. 3. Users are accessing file folders and network shares that are beyond the scope of their need to know. Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)(Select 2answers)A) Poorly trained usersB) Improperly configured accountsC) Misconfigured WAP settingsD) Undocumented assetsE) Vulnerable business processes3. A bank uses a wireless network to transmit credit card purchases to a billing system. Which of the following would be MOST appropriate to protect credit card information from being accessed by unauthorized individuals outside of the premises?A) Faraday cageB) Protected distributionsC) Air gapD) Infrared detection4. A company is performing an analysis of the corporate enterprise network with the intent of identifying what will cause losses in revenue,referrals,and/or reputation when out of commission. Which of the following is an element of a BIA that is being addressed?A) Mission-essential functionB) backup and restoration plansC) Single point of failureD) Identification of critical systems5. A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?A) Secretly install a hidden surveillance camera.B) Audit file access times.C) Implement time-of-day restrictions.D) Require swipe-card access to enter the lab. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: A,BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: The BIA is composed of the following three steps: Determine mission/business processes and recovery criticality. Mission/business processes supported by the system are identified and the impact of a system disruption to those processes is determined along with outage impacts and estimated downtime.5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 38

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 38

Questions 1. A technician is upgrading to a 4TB hard drive and wants to have six partitions. Which of the following allows a Windows boot partition to meet these requirements?A) A. PRIMARYB) B. NTFSC) C. FAT32D) D. GPT2. An accountant calls the IT administrator for assistance with a suspicious empty folder named 'stuff.' The administrator determines the folder needs to be removed via the command-line interface. Which of the following Microsoft tools should be used to eliminate the folder from the accountant's PC?A) A. del stuffB) B. kill stuffC) C. clean stuffD) D. rd stuff3. A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?A) A. Repair DiskB) B. SFCC) C. FIXMBRD) D. ASR4. A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer-s issue?A) A. Disconnect power before inspecting the CRT power supplyB) B. CRT monitors should be serviced by qualified personnelC) C. Have compressed air available to clear out the debrisD) D. Wear safety goggles to protect from the cathodes5. A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do?A) A. Create a primary partitionB) B. Use NTFSC) C. Enable PXED) D. Install third-party drivers Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 38

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 38

Questions 1. Which of the following allows for the FASTEST printer connections?A) A. BluetoothB) B. USBC) C. ParallelD) D. Serial2. Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?A) A. GPUB) B. CPUC) C. GUID) D. PSU3. Which of the following has the lowest latency?A) A. SSDB) B. NASC) C. Blu-RayD) D. DVD4. Which of the following is considered an optical storage medium?A) A. SSDB) B. Blu-RayC) C. Flash driveD) D. Memory card5. Which of the following are examples of keyboard connectors? (Select TWO).(Select 2answers)A) A. USBB) B. RJ-11C) C. SerialD) D. FireWireE) E. PS/2 Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: A,EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 14

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 14

Questions 1. A malicious attacker has intercepted HTTP traffic and inserted an ASCII line that sets the referrer URL. Which of the following is the attacker most likely utilizing?A) Cookie hijackingB) Xml injectionC) Header manipulationD) Cross-site scripting2. A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?A) CompensatingB) PreventiveC) DetectiveD) Deterrent3. A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a specific version of a technology the company uses to support many critical application. The CIO wants to know if this reported vulnerability exists in the organization and,if so,to what extent the company could be harmed. Which of the following would BEST provide the needed information?A) Penetration testB) Patching assessment reportC) Active reconnaissanceD) Vulnerability scan4. A company wants to provide centralized authentication for its wireless system. The wireless authentication system must integrate with the directory back end. Which of the following is a AAA solution that will provide the required wireless authentication?A) LDAPB) TACACS+C) MSCHAPv2D) RADIUS5. A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone service and are concerned about their existing data network interfering with the VoIP phone system. The core switches in the existing data network are almost fully saturated. Which of the following options will pro-vide the best performance and availability for both the VoIP traffic,as well as the traffic on the existing data network?A) Put the VoIP network into a different VLAN than the existing data network.B) Physically separate the VoIP phones from the data networkC) Upgrade the edge switches from 10/100/1000 to improve network speedD) Implement flood guards on the data network Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 39

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 39

Questions 1. A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).(Select 2answers)A) A. Configure the workstation for a static IPB) B. Disable all wireless network connectionsC) C. Remove shortcuts to the applicationD) D. Block the application in Windows FirewallE) E. Change network location to WorkF) F. Reroute the web address in HOSTS file2. A technician is noticing extremely slow performance on a computer and would like to see what application is consuming resources. Which of the following tools should the technician use to view the system performance?A) A. msconfigB) B. Task ManagerC) C. Event ViewerD) D. netmon3. Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk?A) A. NFCB) B. Virtual assistantC) C. SDKD) D. Bluetooth4. Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a work PC?A) A. Transfer data via WiFi Direct to the user-s laptop.B) B. Use Bluetooth to share data from the phone.C) C. Connect the iPhone-s USB cable and use iTunes.D) D. Copy the data from the phone to a MicroSD card.5. A technician has upgraded four computers and would like to securely repurpose the hard drives for later use.Which of the following should the technician do to the drives to prepare them for later use?A) A. chkdskB) B. DegaussC) C. Quick formatD) D. Drive wipe Right Answer and Explanation: 1. Right Answer: D,FExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 39

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 39

Questions 1. Which of the following is the function of a CPU?A) A. Encrypts data for remote transmissionB) B. Performs data computationC) C. Supplies electricity to componentsD) D. Provides storage location for files2. Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?A) A. Large USB flash drive connected to a PCB) B. Medium capacity SATA hard driveC) C. Network attached storage applianceD) D. Firewall with security management3. Which of the following is a 15-pin video connection?A) A. DVIB) B. S-videoC) C. ComponentD) D. HDMIE) E. VGA4. Which of the following are considered input devices for a computer? (Select TWO).(Select 2answers)A) A. MouseB) B. PrinterC) C. SpeakersD) D. MicrophoneE) E. Monitor5. Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).(Select 3answers)A) A. Network connectionB) B. MicrophoneC) C. ModemD) D. FirewallE) E. WebcamF) F. Cable connection Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: EExplanation: 4. Right Answer: A,DExplanation: 5. Right Answer: A,B,EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 15

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 15

Questions 1. A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application - s full life cycle. Which of the following software development methodologies is the development team using?A) AgileB) RapidC) WaterfallD) Extreme2. Adhering to a layered security approach,a controlled access facility employs security guards who verify the authorization of all personnel entering the facility. Which of the following terms BEST describes the security control being employed?A) CompensatingB) CorrectiveC) AdministrativeD) Deterrent3. An administrator has configured a new Linux server with the FTP service. Upon verifying that the service was configured correctly,the administrator has several users test the FTP service. Users report that they are able to connect to the FTP service and download their personal files,however,they cannot transfer new files to the server. Which of the following will most likely fix the uploading issue for the users?A) Create an ACL to allow the FTP service write access to user directoriesB) Set the Boolean selinux value to allow FTP home directory uploadsC) Configure the FTP daemon to utilize PAM authentication pass through user permissionsD) Reconfigure the ftp daemon to operate without utilizing the PSAV mode4. A company has purchased a new SaaS application and is in the process of configuring it to meet the company - s needs. The director of security has requested that the SaaS application be integrated into the company - s IAM processes. Which of the following configurations should the security administrator set up in order to complete this request?A) SAMLB) LDAPC) NTLMD) RADIUS5. After discovering the /etc/shadow file had been rewritten,a security administrator noticed an application insecurely creating files in / tmp. Which of the following vulnerabilities has MOST likely been exploited?A) Resource exhaustionB) Privilege escalationC) Pointer dereferenceD) Memory leak Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 40

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 40

Questions 1. Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayed:-Access Denied. Please Enter Encryption Password. Which of the following is the reason that this error is displayed?A) A. The hard drive is experiencing S.M.A.R.T. failure errorsB) B. The TPM security chip inside the bench system is not enabledC) C. The BIOS of the bench system is out of dateD) D. BitLocker is being used2. A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann-s email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?A) A. Social engineeringB) B. PhishingC) C. Spear phishingD) D. Hijacking3. A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to -click here for help. The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase the software. Which of the following should be performed FIRST to resolve the issue?A) A. Create a restore pointB) B. Run O/S updatesC) C. Train the user of malicious softwareD) D. Identify the type of malware4. A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:A) A. close any items of a personal nature.B) B. reboot the computer and log back in.C) C. capture a screen-shot of the error message.D) D. take steps to reproduce the error.5. When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:A) A. CMOS battery.B) B. video card.C) C. IDE cable.D) D. floppy cable. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 40

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 40

Questions 1. Which of the following components is required to send faxes via POTS?A) A. NICB) B. Power supplyC) C. ModemD) D. Wireless adapter2. A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?A) A. Swap the mouse and keyboard to the other PS/2 ports.B) B. Remap the mouse and keyboard in the BIOS.C) C. Update the BIOS to recognize the newer keyboard and mouse.D) D. Configure the keyboard localization settings.3. A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).(Select 2answers)A) A. Use only public computers to access the websiteB) B. Create a complex passwordC) C. Change the default passwordD) D. Write the password downE) E. Use the original password4. A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?A) A. The browser is incompatible with the websiteB) B. The workstation has been infected with malwareC) C. The website is not secured by SSLD) D. The certificate of the website has expired5. A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is theMOST likely source of this issue?A) A. The computer does not have current antivirus software installedB) B. The computer needs to have its components upgradedC) C. The downloaded toolbars are filling the browser screenD) D. The owner was not using complex passwords Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: B,CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs