1. What is command to know the IP and MAC address of your machine in
    windows platform?
    a) ifconfig b)Ipconfig/all c)ping d) All the above
  2. MTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows
    file system?
    a) FAT32 and EXT3 b)EXT3 c) NTFS and FAT32 d) CDFS and EXT2
  3. The completion and base lining of the users manual and installation
    instructions should be an entry criteria into which of the following phase
    gate reviews.
    a) Critical design review b) System test readiness review c) Ready to
    ship review d) Post project review
  4. The product quality risk from testing point of view is highest when the
    system under test is a
    a) Standalone b) Distributed System c) Client and server d) None of the
    above
  5. Http is based on which underline protocal
    a) TCP b) SNMP c) FTP d) IP
  6. When can you say that performance of your application is high.
    a) High through put low latency b) Low through put high latency c) High
    through put High latency d) Low through put low latency
  7. Which is the last/terminate state of a bug?
    a) Re-open b) Defered c) Enhanced d) None of the above
  8. Which of the following is a testing technique?
    a) White box b) System testing c) unit testing d) Regression
  9. How can you force the client to give up the dhcp lease if you have
    access to the client PC?
    a) ipconfig/release b) ipconfig/renew c) ipconfig/delete d)
    ipconfig/new
  10. Testing of Non-Functional requirements does not involove
    a) Performance tests b) Reliability tests c) usability tests d)
    Configuration tests
  11. DNS is used to
    a) MAP IP address to machine names b) MAP IP address to MAC address c)
    MAP IP address to domain names d) None of the above
  12. Based on risk exposure, which of the following risks would have the
    highest priority?
    a) Risk A that has a 25% probability of a problem occuring that would
    cost $30,000
    b) Risk B that has a 15% probability of a problem occuring that would
    cost $400,000
    c) Risk C that has a 25% probability of a problem occuring that would
    cost $180,000
    d) Risk D that has a 25% probability of a problem occuring that would
    cost $250,000
  13. When a varaible is deleted using "my" in perl, then
    a) It can be accessed only within the block it is declared
    b) It can be accessed outside the block it is declared
    c) It is visible in routines called from the block in which it is
    declared
    d) It can be accessed globally across the program
  14. what is the output of this perl statement
    print join(':',split(/*/,'hi there'));
    a) h:i:t:h:e:r:e
    b) h:i: t:h:e:r:e
    c) :h:i:t:h:e:r:e
    d) h:i: :t:h:e:r:e
  15. Which of these is reliable protocal?
    a) UDP b) SNMP c) FTP d) TCP