1.
Which one of the following is not a challenges experienced in network security
Correct Answer
C. Ping
Explanation
Ping is not a challenge experienced in network security. Ping is a network utility used to test the reachability of a host on an Internet Protocol (IP) network. It is a diagnostic tool rather than a security threat. Vandalism, hacking, and denial of service are all examples of challenges experienced in network security. Vandalism refers to deliberate damage or destruction of network resources, hacking involves unauthorized access or manipulation of network systems, and denial of service is an attack that disrupts the availability of network services.
2.
Which of the below is not a e-government service ?
Correct Answer
C. Digital Kenya
Explanation
Digital Kenya is not a e-government service because it refers to the digital transformation and development of Kenya's economy, rather than a specific service provided by the government. IPRS, E citizen, and Itax are all examples of e-government services, which involve the use of technology to deliver government services to citizens electronically.
3.
Which of the following is not an importance of e government ?
Correct Answer
B. Good corporate image
Explanation
Good corporate image is not an importance of e-government because it refers to the perception and reputation of a company or organization in the eyes of the public, stakeholders, and customers. While e-government can contribute to improving transparency, accountability, and service delivery, it does not directly impact the corporate image of a government entity. Other factors such as effective communication, ethical practices, and public trust play a more significant role in shaping a government's corporate image.
4.
Which of the below list only has types of data bases that can be implemented by business.
Correct Answer
A. DB2, Oracle, Microsoft access
Explanation
The correct answer is DB2, Oracle, Microsoft access. These are all types of databases that can be implemented by businesses. DB2 is a relational database management system (RDBMS) developed by IBM, Oracle is another popular RDBMS, and Microsoft Access is a desktop database management system. All three options consist of databases that are commonly used in business settings.
5.
E payment is beneficial to a small business. Which of below is not a benefit?
Correct Answer
B. Increased bank transactions
Explanation
Increased bank transactions is not a benefit of e-payment for a small business. While e-payment does increase the overall number of transactions, this particular benefit does not directly apply to a small business. The other options, such as reduced corruption level, time efficiency, and reduced risk of loss and theft, are all valid benefits that e-payment provides to small businesses.
6.
Below are some of the causes of network connectivity failure. Which one is not?
Correct Answer
F. Non of the choices given
Explanation
The correct answer is "Non of the choices given." This means that none of the causes listed (client server problems, error in configuration, protocol mismatch, user policy and right issue, device may not be plugged in) are the reason for network connectivity failure.
7.
Lisa is a home-based webpage manager. She mostly uploads pictures and video presentations on her web page. Knowing Lisa's needs, how would you present the product to her?
Correct Answer
B. Congratulations Lisa! DSL service is available for you! This is a hassle-free high-speed service that allows you to save time when you manage your website. The upload of 768 kbps best effort speed will allow you to post pictures and video presentations online in no time. On top of that, you get a 3.0 Mbps best effort download speed. And great news you can have this service for only Ksh 1900/mo for the first 3 months and only ksh 4400 thereafter. Let’s go ahead and set you up for this wonderful service
Explanation
The given answer is the most suitable presentation for Lisa because it highlights the specific features of the DSL service that meet her needs as a home-based webpage manager. It emphasizes the hassle-free high-speed service, the fast upload speed for posting pictures and video presentations, and the affordable pricing options. The answer also includes a call to action by suggesting to set up the service, making it a persuasive and tailored offer for Lisa.
8.
Below are aspects to consider when deciding on a digital tool to use to market products and services of small business in Kenya .Which one is not ?
Correct Answer
F. None of the choices
Explanation
The given question asks which aspect is not considered when deciding on a digital tool to market products and services of a small business in Kenya. The correct answer is "None of the choices." This means that all of the listed aspects (cost of tool, customer segmentation, tool accessibility, integration with other systems, and ease of use) are considered when deciding on a digital tool.
9.
In electronic record keeping, espionage is one of the threat ,which of the following is the way to mitigate
Correct Answer
A. User classification and access policy
Explanation
User classification and access policy is a way to mitigate the threat of espionage in electronic record keeping. By implementing user classification, organizations can assign different levels of access privileges to different users based on their roles and responsibilities. This ensures that only authorized individuals have access to sensitive information, reducing the risk of espionage. Additionally, access policies can be enforced to monitor and control user activities, further enhancing security measures.
10.
Jenny called and is looking for an internet service that will allow her to access her work emails while she travels. Knowing Jenny's need for an internet service, how would you position the dial-up service?
Correct Answer
A. Our accelerated Dial-Up service is the best fit Jenny. With its top of the line accelerator software, it will allow you to pull up your work emails up to 5x times faster than any other dial-up service would. Plus we have over 9000 access numbers that you can use to connect to the internet wherever you are in the world. For only Ksh 1400/mo for 12 months, you can never miss a single email. Do you have a Visa or a MasterCard?
Explanation
The correct answer explains that the accelerated Dial-Up service is the best fit for Jenny because it offers top-of-the-line accelerator software that allows her to access her work emails up to 5x faster than other dial-up services. Additionally, it mentions the convenience of having over 9000 access numbers worldwide, ensuring she can connect to the internet wherever she is. The answer also highlights the affordability of the service at Ksh 1400/mo for 12 months, emphasizing that Jenny will never miss a single email. The question is positioning the dial-up service as the best option for Jenny's need to access work emails while traveling.
11.
John wants to have internet service for his family members. What question would be appropriate to ask?
Correct Answer
C. How many computers do you currently have?
Explanation
The question "How many computers do you currently have?" would be appropriate to ask because it helps determine the number of devices that need to be connected to the internet. This information is important in order to choose the appropriate internet service plan that can accommodate the needs of all family members.
12.
Which Windows XP feature provides an underlying service that allows Windows and applications to determine when a machine changes network locations?
Correct Answer
B. Network Location Awareness (NLA)
Explanation
Network Location Awareness (NLA) is the correct answer because it is a Windows XP feature that provides a service allowing Windows and applications to detect and respond to changes in network locations. This feature enables the system to automatically adjust network settings and configurations based on the network the machine is connected to. It helps ensure seamless connectivity and optimal performance by allowing the system to adapt to different network environments.
13.
As an administrator, you find that some unknown IP addresses are trying to make remote desktop connection to your machine and trying to attack it. How will you find which IP addresses are trying to do so?
Correct Answer
B. Command > netstat –a –n –o
Explanation
The correct answer is "Command > netstat -a -n -o". By using this command, the administrator can view all active connections on their machine, including the IP addresses, the corresponding port numbers, and the process ID (PID) of the program that is using the connection. By examining this information, the administrator can identify the IP addresses that are attempting to make remote desktop connections and potentially launch attacks on their machine.
14.
Which of the following is not an operating system?
Correct Answer
E. None of the above
Explanation
All the options provided in the question are operating systems. Windows 7, Linux, MAC OSX, and DOS are all examples of operating systems. Therefore, the correct answer is "None of the above" because all the given options are operating systems.
15.
Which one is the keyboard shortcut for 'paste'?
Correct Answer
B. Ctrl + V
Explanation
Ctrl + V is the correct keyboard shortcut for "paste". This shortcut is commonly used in various applications and operating systems to paste copied or cut content into a document or field. It is a widely recognized and easy-to-remember shortcut, making it a convenient way to quickly paste content without having to use the mouse or navigate through menus.
16.
Which of the following is NOT a browser?
Correct Answer
D. Ubuntu
Explanation
Ubuntu is not a browser; it is an operating system. Google Chrome, Safari, and Firefox are all web browsers that allow users to access and navigate the internet.