Where possibilities begin

We’re a leading marketplace platform for learning and teaching online. Explore some of our most popular content and learn something new.
Total 835 Results
ComptiA Security+ Certification Exam Questions and answer - Part 19

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 19

Questions 1. A Chief Information Officer (CIO) has decided it is not cost effective to implement safeguards against a known vulnerability. Which of the following risk responses does this BEST describe?A) AcceptanceB) TransferenceC) MitigationD) Avoidance2. An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following configuration options should the administrator select for the new wireless router?A) WPA+CCMPB) WPA2+CCMPC) WPA+TKIPD) WPA2+TKIP3. An administrator is testing the collision resistance of different hashing algorithms. Which of the following is the strongest collision resistance test?A) Find two identical messages with different hashesB) Find two identical messages with the same hashC) Find a common has between two specific messagesD) Find a common hash between a specific message and a random message4. An administrator thinks the UNIX systems may be compromised,but a review of system log files provides no useful information. After discussing the situation with the security team,the administrator suspects that the attacker may be altering the log files and removing evidence of intrusion activity. Which of the following actions will help detect attacker attempts to further alter log files?A) Enable verbose system loggingB) Change the permissions on the user's home directoryC) Implement remote syslogD) Set the bash_history log file to 'read only'5. An analyst is part of a team that is investigating a potential breach of sensitive data at a large financial services organization. The organization suspects a breach occurred when proprietary data was disclosed to the public. The team finds servers were accessed using shared credentials that have been in place for some time. In addition,the team discovers undocumented firewall rules,which provided unauthorized external access to a server. Suspecting the activities of a malicious insider threat,which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?A) KeyloggerB) BotnetC) Crypto-malwareD) BackdoorE) RansomwareF) DLP Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 44

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 44

Questions 1. A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature?A) A. Action CenterB) B. SystemC) C. Display SettingsD) D. Power Options2. An end-user receives an unsolicited and unencrypted email containing a co-worker's birth date and social security number. The end-user should immediately contact the IT department and report a violation of which of the following policies?A) A. DRMB) B. EULAC) C. IRPD) D. PII3. A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?A) A. Disable System RestoreB) B. Schedule scans and run updates in safe modeC) C. Quarantine the systemD) D. Create a System Restore point4. Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?A) A. Social engineeringB) B. SpoofingC) C. Zero-dayD) D. Man-in-the-middle5. A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. -primary drive 0 not found. Press F1 to continue.' Which of the following should the technician check FIRST?A) A. That NTLDR and boot.ini are not missingB) B. Proper drive installation (e.g. cables/jumpers)C) C. If the computer can boot into safe modeD) D. If the BIOS boot settings are correct Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 44

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 44

Questions 1. Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?A) A. HackingB) B. PhishingC) C. SpamD) D. Cracking2. Which of the following are best practices when it comes to using a computer in a public location? (Select TWO).(Select 2answers)A) A. Notify the administrator when finished.B) B. Use strong passwords.C) C. Turn off the computer when finished.D) D. Disable the save password function on web pages.E) E. Make sure to clean the keyboard when finished.F) F. Make sure to log out of websites when done.3. Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?A) A. StandardB) B. GuestC) C. AdministratorD) D. Power user4. A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?A) A. To prevent improper data transmission encryptionB) B. To prevent unauthorized configuration changesC) C. To prevent social engineering attacksD) D. To increase wireless signal strength5. Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?A) A. The company has configured a policy on her computer that forces her to stay on their website.B) B. Her computer is infected with adware and is redirecting her browser to another site.C) C. The memory of the browser is corrupt, and she needs to have the browser reinstalled.D) D. She did not reboot her computer after clearing the temporary files. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: D,FExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 20

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 20

Questions 1. An analyst is using a vulnerability scanner to look for common security misconfigurations on devices. Which of the following might be identified by the scanner? (Select TWO).(Select 2answers)A) The firewall is disabled on workstations.B) SSH is enabled on servers.C) Browser homepages have not been customized.D) Default administrator credentials exist on networking hardware.E) The OS is only set to check for updates once a day.2. An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sending packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue?A) Firewall,implement an ACL on the interfaceB) Router,place the correct subnet on the interfaceC) Switch,modify the access port to trunk portD) Proxy,add the correct transparent interface3. An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?A) PEAPB) EAPC) WPA2D) RADIUS4. An application developer has neglected to include input validation checks in the design of the company - s new web application. An employee discovers that repeatedly submitting large amounts of data,including custom code,to an application will allow the execution of the custom code at the administrator level. Which of the following BEST identifies this application attack?A) Cross-site scriptingB) ClickjackingC) Buffer overflowD) Replay5. An application developer is designing an application involving secure transports from one service to another that will pass over port 80 for a request. Which of the following secure protocols is the developer MOST likely to use?A) FTPSB) SFTPC) SSLD) LDAPSE) SSH Right Answer and Explanation: 1. Right Answer: A,EExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: EAP by itself is only an authentication framework. PEAP (Protected Extensible Authentication Protocol) fully encapsulates EAP and is designed to work within a TLS (Transport Layer Security) tunnel that may be encrypted but is authenticated. The primary motivation behind the creation of PEAP was to help correct the deficiencies discovered within EAP since that protocol assumes that the communications channel is protected. As a result,when EAP messages are able to be discovered in the clear they do not provide the protection that was assumed when the protocol was originally authored. PEAP,EAP-TTLS,and EAP-TLS protect inner EAP authentication within SSL/TLS sessions.4. Right Answer: CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 45

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 45

Questions 1. Data on full-disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies?A) A. USB authentication tokenB) B. Filesystem access controlsC) C. Trusted platform moduleD) D. Fingerprint reader2. A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user-s NEXT step in resolving this issue?A) A. Configure Wake-on-LAN for the NIC on the Work PC.B) B. Configure a firewall exception on the Home PC.C) C. Switch the Work PC network from -Work to -Home.D) D. Disable the Windows firewall on the Home PC.3. A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?A) A. Slow data speedsB) B. Defective SD cardC) C. Unauthorized root accessD) D. Signal drop or weak signal4. A technician opens a customer-s computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer?A) A. Use compressed air to free the dust from the components and remove them with an ESD vacuum.B) B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.C) C. Use a shop vacuum with enough power to ensure all dust has been removed.D) D. Remove as much dust as possible by hand and use compressed air to blow the rest out.5. A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future?A) A. Check the -Reconnect at logon checkbox for the mapped network driveB) B. Connect all computers in the office to UPS devicesC) C. Re-map the mapped network drive with the domain administrator accountD) D. Replace the hard drives on the file server hosting the shared files Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 45

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 45

Questions 1. An attacker cracks a user's password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?A) A. Disable unused browser toolbars.B) B. Clear the browser cache.C) C. Avoid credential reuse.D) D. Delete tracking cookies.2. While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing.Which of the following does this warning indicate about the website?A) A. It stores data in cache or cookies, but not both.B) B. It requires login credentials for some sections.C) C. It contains both secure and non-secure parts.D) D. It is best viewed with a different browser.3. A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed.Which of the following BEST describes this situation?A) A. Dumpster divingB) B. Shoulder surfingC) C. PhishingD) D. Social engineering4. Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?A) A. Change the router administrator username.B) B. Change the router - s broadcasting channel.C) C. Update the unit's firmware.D) D. Use a complex administrator password.5. Which of the following is the BEST security practice to use when configuring the management options of a wireless router?A) A. Disable DHCPB) B. Change the admin passwordC) C. Enable SSIDD) D. Enable remote administration Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 21

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 21

Questions 1. An application team is performing a load-balancing test for a critical application during off-hours and has requested access to the load balancer to review which servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications running on the load balancer. Which of the following is the BEST solution for security analyst to process the request?A) Give the application team administrator access during off-hours.B) Disable other critical applications before granting the team access.C) Give the application team read-only access.D) Share the account with the application team.2. An application was recently compromised after some malformed data came in via web form. Which of the following would MOST likely have prevented this?A) Input validationB) Proxy serverC) Stress testingD) Encoding3. An attachment that was emailed to finance employees contained an embedded message. The security administrator investigates and finds the intent was to conceal the embedded information from public view. Which of the following BEST describes this type of message?A) ObfuscationB) SteganographyC) DiffusionD) BCRYPT4. An attacker captures the encrypted communication between two parties for a week,but is unable to decrypt the messages. The attacker then compromises the session key during one exchange and successfully compromises a single message. The attacker plans to use this key to decrypt previously captured and future communications,but is unable to. This is because the encryption scheme in use adheres to:A) Asymmetric encryptionB) Out-of-band key exchangeC) Perfect forward secrecyD) Secure key escrow5. An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future,Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?A) Certificate pinningB) Certificate staplingC) Certificate chainingD) Certificate with extended validation Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 46

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 46

Questions 1. A technician receives a report that the pages coming out of a laser printer are smearing when touched.Which of the following components should the technician check FIRST to resolve this issue?A) A. DrumB) B. FuserC) C. Pickup rollerD) D. Corona wire2. In order to prevent other users from editing files in -C:\ Files-, which of the following steps should be taken?A) A. Set NTFS permissions to read-onlyB) B. Set the folder to index files for searchC) C. Set the local administrator as the owner of the folderD) D. Set network share permissions to read-only3. Which of the following Windows utilities would MOST likely be used to identify system errors?A) A. System RestoreB) B. Event ViewerC) C. Security CenterD) D. Windows Defender4. The type of security threat that uses computers or other networks to accept and pass on viruses is called:A) A. phishing.B) B. botnets.C) C. logic bomb.D) D. man-in-the-middle.5. An IT manager needs to re-image 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?A) A. Boot from PXE.B) B. Install Windows using DVD.C) C. Reboot computers with USB drive.D) D. Press F8 while rebooting. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 46

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 46

Questions 1. When operating under optimal network conditions, which of the following has the HIGHEST reliability?A) A. BluetoothB) B. WiredC) C. CellularD) D. WiFi2. A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the users browser?A) A. HTTPB) B. HTTPSC) C. SFTPD) D. FTP3. Which of the following are secure network protocols? (Select TWO).(Select 2answers)A) A. IMAPB) B. FTPSC) C. SMTPD) D. HTTPSE) E. DNS4. Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?A) A. Micro SD cardB) B. BluetoothC) C. USB connectionD) D. Infrared5. Which of the following BEST describes the pros and cons of a home wired network?A) A. Low throughput, low mobility, high availability, high latency, high securityB) B. High throughput, high mobility, low availability, low latency, high securityC) C. High throughput, low mobility, high availability, low latency, high securityD) D. Low throughput, high mobility, low availability, high latency, low security Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: B,DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs