Archive for Sample Question

Question 19

in inside LAN the enterprise which is connected to Internet, from outside Which those which are used for protecting for illegitimate invasion as for?

1.IDS
2. Firewall
3. Access list
4. Antivirus software

Comments (1)

Question 18

This is the following calculation done with no Shin method?
131-45=75
    
1) 6 Shin method
2) 7 Shin method
3) 8 Shin method
4) 9 Shin method

Comments (1)

Question 17

As the description regarding “the preventive” function of question 3. security measure, suitable distressing which is thing?

 1. Whether or not it checks the access log, there is no illegitimate accessYou watch.
 2. [konteinjienshipuran] is decided, training is executed.
 3. Backup processing of the important file is done periodically.
 4. To execute the education inside the company regarding security, raising the consciousness of the individual

Comments (1)

Question 16

Which those which display question 1.16 Shin decimal 3A.5C with decimal fraction as for?

1) 939/16
2) 3735/64
3) 14939/256
4) 14941/256

Comments (1)

Question 15

Unicode, which appropriate ones as for?

 1.ANSI (the American National Standard association) with it decided, character code system of 7 bits
   So it is.
 2.JIS (the Japanese [e] industry standard) with to be the character code system which is decided, the alphanumeric
   The cord/code of 8 bits which handle katakana and 16 bits which handle full size letter
   There is a cord/code.
 3. Also the extended UNIX cord/code to be called, full size letter and half angle katakana letter
   It expresses at 2 bytes or 3 bytes.
 4. In order to handle multi-national letter, the sentence where shape such as Japanese and Chinese is similar
   Allotting the letter to the identical cord/code, it expresses with the character code of 2 bytes.

Comments (1)

Question 14

It reaches some two times the types of letter which can be expressed at 58 bits, please select the type of letter which can be expressed at 64 bits from midst of the following.

a.16
b.32
c.64
d.128

Comments (1)

Question 13

In order to express the capital letter A~Z of the English letter please select minimum necessary bit number from midst of the following.

a.4
b.5
c.6
d.7

Comments (1)

Question 12

2 n-tuple to do binary A, if A is shifted on the n bit left, it is sought. For example, as for “A×10” it is possible to seek with the below-mentioned arithmetic expression.

 (The value which shifts A on the n bit left) + (the value which shifts A on 1 bit left)

Please select the value which is applicable to the n bit in this arithmetic expression from midst of the following.

a.3
b.4
c.5
d.6

Comments (1)

Question 11

There is a register which houses numerical value with binary. It housed correct integer Y in this register, after that, vis-a-vis this value “shifting on 3 bit left, it did the operation of adding Y”. As for the overflow with shift when does not occur, does value of the register reach some two times the Y? Please select from midst of the following.

a.7
b.8
c.9
d.10

Comments (1)

Question 10

64 to double the correct integer which is displayed with binary, whether no bit shift it should have done on the left please select from midst of the following. However, the overflow with shift (overflow) does not occur.

a.4
b.5
c.6
d.32
e.64

Comments (1)

Older Posts »