Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

Principles of Operating Systems and its Applications

It is one of the Key Features of


Windows 7 that takes advantage of
modern computing hardware,
Reliability and Performance
running more reliably and providing
more consistent performance than
previous versions of Windows.
It is a tool used to remove system-
specific data from the Windows
operating system, configure windows
to start in audit mode, configure the Sysprep
windows operating system to start
the Windows Welcome phase and
reset Windows Product activation.
It is one of the Options for Installing
Windows 7 where in you install
Windows 7 on a new partition and Clean Installation
replace an existing operating system
on a partition.
It is one of the Key Features of
Windows 7 that simplify a user's
Usability
ability to organize, search for, and
view information.
Which of the following is not an
It supports 16-bit Windows on
advantage of installing a 64-bit
Windows (WOW) environment
edition of Windows 7?
Which of the following is not a
Windows 7 Professional
Specialized version of Windows 7?
It is one of the Options for Installing
Windows 7 where in you replace an
existing version of Windows with Upgrade Installation
Windows 7 but all user applications,
files and settings are retained.
It is one of the Considerations on
Does not require the reinstallation of
why using the option of Upgrade
applications
rather than Migrate
It is a downloadable application that Windows Upgrade Advisor
helps windows user identify which
edition of Windows 7 meets their
needs
Which of the following version of
Windows Vista SP1
Windows are allowed for Upgrade?
What is the IEEE 802 Standards for
IEEE 802.11
Local Wireless Networks?
It is a device that converts
instructions from the network Network Adapter
protocol stack into electric signals
Which of the following is not a
802.11 h
Wireless LAN Standards?
Which of the following is not the
WiMax
common network architecture types?
Which of the following is not a
Network Adapter
Physical WAN Components?
It is a device that provides wiring
concentrator functionality like a hub
but it also enables network traffic
Switch
management, performs firewall
functions and makes routing
decisions based upon traffic priority.
Which of the following is not a LAN
Crown
Physical Topology?
It is a group of services hosted on a
network which is a private structure
Intranet
and has the internet-like service
provision
It is the most common form of
Local Area Network
computer network.
It enables you to manage network
traffic, group physically dispersed
Virtual Local Area Network
nodes into logical area networks and
isolate network traffic.
It is the most common form of
Local Area Network
computer network.
It reduces the complexity and
amount of administrative work by DHCP Server
using automatic TCP/IP configuration
It is one of the Considerations on
Does not require the reinstallation of
why using the option of Upgrade
applications
rather than Migrate.
It enables you to manage network
traffic, group physically dispersed
Virtual Local Area Network
nodes into logical area networks and
isolate network traffic
It provides storage for the users' files
and share folders that contain users' File Server
files.
It a server that is used to access the
corporate resources from outside the Remote Access Serve
corporate network
It holds a copy of AD DS and
responds to request for active Domain Controlle
directory information.
It is a computer that is dedicated to
running network-aware application Application Server
software.
It allows you to control which role
Role Services
functionality is installed and enabled
It is the foundation of the Internet
naming scheme and it supports
DNS Server
accessing resources by using
alphanumeric names.
Which of the following is not an
It supports 16-bit Windows on
advantage of installing a 64-bit
Windows (WOW) environment
edition of Windows 7?
Which of the following version of
Windows Vista SP1
Windows are allowed for Upgrade?
Which of the following is not a Server
Windows Power Shell
Role of Windows Server 2008 R2?
It is a device that converts
instructions from the network Network Adapter
protocol stack into electric signals.
How many bits are there in an IP
128 bits
version 6 address?
What type of notation does IP Hexadecimal
version 6 address uses?
It is a type of IPv4 Address that is
required by the devices and host that
connect directly to the Internet. This
Public IP Address
address must be unique, routable on
the internet and must be assigned by
IANA.
It specifies which part of an IPv4
address is the network ID and which
Subnet Mask
part of the IPv4 address is the Host
ID.
How many bits are there in an IP
32 bits
version 4 address?
172.16.0.0 /12 is what type of IPv4
Private IP Address
Address.
What is the binary notation for the 11111111.11111111.11111111.0000000
255.255.255.0 subnet mask? 0
It is a device, usually a router, on a
TCP/IP internet that forwards IP Default Gateway
packets to other subnets.
APIPA stands for Automatic Private IP Addressing
Which of the following is not an IPv6
Broadcast
Address types?
It is a small software program that
allows a hardware device to Drivers
communicate with a computer
It is a way for you to limit use of disk
space on a volume for each user to Disk Quotas
conserve disk sp
It provides authenticaltion, host
operations of master roles, hosting
Domain Controller
the global catalog and support group
policies and sysvol
It is a Windows Authentication
Method that is used by windows 7
Kerberos v5
clients and server running Microsoft
Windows Server 2000 or later
It is one of the Options for Installing Upgrade Installation
Windows 7 where in you replace an
existing version of Windows with
Windows 7 but all user applications,
files and settings are retained.
It is a feature of Windows 7 that
allows windows 7 to be backward Windows XP mode
compatible
It is a dynamic volume that joins
areas of unallocated space disks into
a single logical disk
It is a collection of user accounts,
computer accounts, contacts and
Groups
other groups that you can manage as
a single unit.
It is the non-contiguous storage of
Disk Fragmentation
data on a volume
It defines the type of access granted
to a user, group, or computer for a NTFS Permission
file or folder.
Which of the following is not a Server
Windows Power Shell
Role of Windows Server 2008 R2?
It is a tool used to remove system-
specific data from the Windows
operating system, configure windows
to start in audit mode, configure the Sysprep
windows operating system to start
the Windows Welcome phase and
reset Windows Product activation.
It is a new authentication features
that controls the ability of online IDs Online Identity Integration
to authenticate to a computer.
It is an object that contains all of the
information that defines a user in User Account
Windows Server 2008 R2.
It contains the partition table for the
disk and a small amount of
Master Boot Record Disk
executable code called as the master
boot code.
It is a collection of Domain Trees. Forest
It is a method of sharing folders that
allow multiple default public folders
for each computer and files shared Public Sharing
with same computer and with same
network.
It is a method of sharing folders that
Basic Sharing
allows you to share folders quickly.
It is a dynamic volume that
encompasses available free-space Simple Volume
from single, dynamic, hard disk drive.
It is a scriptable command line utility
that create scripts to automate disk Diskpart
related task
It allows you to control which role
Role Services
functionality is installed and enabled.
It enables IT Administrator to
automate one-to-many management Group Policy
of users and computers.
It contains an array of partition
entries describing the start and end GUID Partition (GPT)
LBA of each partition on disk.
Which of the following is a main type
Distribution
of group?
It enables the user to log on and
access resources on a specific Local User Accounts
computer and usually reside in SAM
It is the process of verifying the
Authentication
identity of something or someone.
It is a type of printing wherein it is
used by legacy application in pre-
vista version of windows that uses GDI based printing
enhanced metafile format (EMF) as
the spool file format.
It contains the partition table for the
disk and a small amount of
Master Boot Record Disk
executable code called as the master
boot code
It is a group of services hosted on a
network which is a private structure
Intranet
and has the internet-like service
provision.
It is a type of printing wherein it is
used by legacy application in pre-
vista version of windows that uses GDI based printing
enhanced metafile format (EMF) as
the spool file format.
It is the non-contiguous storage of
Disk Fragmentation
data on a volume
It is a downloadable application that
helps windows user identify which
Windows Upgrade Advisor
edition of Windows 7 meets their
needs.
What is the binary notation for the 11111111.11111111.11111111.0000000
255.255.255.0 subnet mask? 0
It is a scriptable command line utility
that create scripts to automate disk Diskpart
related task.
What is the maximum bit rate for the
600mbps
802.11n technologies?
You administer an Active Directory Run the Device Manager by using
domain that includes portable elevated permissions
computers that have Windows 7 SP1
installed. You log on to one of the
portable computers by using a
domain user account and install a
new device for a bar-code scanner.
You restart the portable computer
after installing the new device driver.
You successfully log on to the
computer by using a domain user
account. After logging on, you
discover that the bar-code scanner is
not working due to a driver error. You
try to remove the installed driver, but
the Roll Back Driver option is
unavailable. You need to be able to
roll back the driver to its previous
version. What should you do?
Which of the following is not a Server
Windows Power Shell
Role of Windows Server 2008 R2?
Strong EAP methods provide strong
IEEE 802.1X
authentication
It is the foundation of the Internet
naming scheme and it supports
DNS Server
accessing resources by using
alphanumeric names.
It enables the IT Administrators to
automate one-to-several
Group Policy
management of users and
computers.
You are the network administrator for
Stellacon Corporation. User in the
sales department have been
complaining that the Sales
application is slow to load. Using
Performance Monitor, you create a
baseline report for one of the
computers, monitoring memory, the
Memory
processor, the disk subsystem, and
the network subsystem. You notice
that the disk subsystem has a high
load of activity. What other
subsystem should you monitor
before you can know for sure
whether you have a disk subsystem
bottleneck?
It is one of the Options for Installing
Windows 7 where in you replace an
existing version of Windows with Upgrade Installation
Windows 7 but all user applications,
files and settings are retained.
Which of the following version of
Windows Vista SP1
Windows are allowed for Upgrade?
It reduces the complexity and
amount of administrative work by
DHCP Server
using automatic TCP/IP
configuration.
This are point-to-point connection
across a private or public network. It
uses special protocols, called Virtual Private Network
tunneling protocol to make a virtual
call to a virtual port.
It allows you to control which role
Role Services
functionality is installed and enabled.
Which of the following is not a LAN
Crown
Physical Topology?
It is an enhanced privacy features of
Internet Explorer 8 that inherently
more secure that using delete
InPrivate Browsing
browsing history to maintain privacy
because there are no logs kept or
tracks made during browsing
It is a collection of user accounts,
computer accounts, contacts and
Groups
other groups that you can manage as
a single unit.
It is a small software program that
allows a hardware device to Drivers
communicate with a computer
You are the network administrator for
a small company that has just
switched its machines from Windows
XP to Windows Vista and Windows
7. One of the users who has Windows Sidebar
Windows Vista asks you why there is
a vertical sidebar on the screen.
What feature of Windows Vista is
this?
It is a type of IPv4 Address that is
required by the devices and host that
connect directly to the Internet. This
Public IP Address
address must be unique, routable on
the internet and must be assigned by
IANA
You are the system administrator for Run Disk Cleanup for System Restore
a large organization that uses and then run Shadow Copies
Windows Server R2 and Windows 7.
You have a Windows 7 machine and
have enabled System Protection.
You want the machine to retain only
the last System Protection snapshot
that was taken. What should you do?
It is a security feature that simplifies
the ability of users to run as standard
User Account Control
users and perform all neccessary
daily tasks
You are the network administrator for
a large organization that uses both
Windows Server 2008 R2 and
Windows 7. One of the Windows 7
machines needs to be backed up
Start the computer from the Windows
daily. You perform an image backup
7 DVD and then use the System Image
on the Windows 7 machine. The
Recovery tool
Windows 7 machine then gets struck
by a virus and will not start up
properly. What can you do to get the
Windows 7 machine up and running
the fastest possible way?
You are the system administrator for
your company. You are configuring
the services on a Windows 7
computer. You want to ensure that if
Recovery
a service fails to load, it will attempt
to restart. Which tab of the service`s
Properties dialog box should you
use?
You are the network administrator for
your organization. You have been
asked by the owner of the company
Run Sigverif.exe at the command
to verify that all drivers installed on
prompt
the Windows 7 machines are signed
drivers. How do you accomplish this
task?
This are equivalents to door locks,
employee badges and security
Firewall
systems. It protects the computer
and networks from intrusions.
Which of the following is not an IPv6
Broadcast
Address types?
It is a device that provides wiring
concentrator functionality like a hub
but it also enables network traffic
Switch
management, performs firewall
functions and makes routing
decisions based upon traffic priority
Which of the following is not the
WiMax
common network architecture types?
Which of the following is not a way to
None of the Choices
improve the signal strength?
It is a method of sharing folders that
allow multiple default public folders
for each computer and files shared Basic Sharing
with same computer and with same
network.
It is a tool used to remove system-
specific data from the Windows
operating system, configure windows
to start in audit mode, configure the Sysprep
windows operating system to start
the Windows Welcome phase and
reset Windows Product activation.
It is a new Windows 7 security
feature that enables IT professionals
Applocker
to specify exactly what is allowed to
run on user desktops.
You are evaluating the purchase a
netbook computer that has the
following hardware: 1.6-gigahertz
(GHz) 32-bit processor 1024-MB
RAM 1 video card that uses shared
memory 4-G8 solid state drive You storage device
need to ensure that you can install
Windows 7 Enterprise on the
netbook computer. Which hardware
component should you change or
add?
What type of notation does IP Hexadecimal
version 6 address uses?
It is a strong authentication (with
strong EAP method) and strong
(TKIP) or very strong (AES) WPA-Enterprise
encryption used by medium and
large organization.
Where will you see the Manage
Control Pane
Wireless Networks tool in your PC?
What is the IEEE 802 Standards for
IEEE 802.11
Local Wireless Networks?
It is a windows 7 feature that enables
user to connect to their desktop Remote Desktop
computer from another device.
It holds a copy of AD DS and
responds to request for active Domain Controller
directory information.
Which of the following is not a Boot-
option for troubleshooting startup None of the choices
problems?
It is the measurement of how a
system conforms to expected Reliability
behavior
It is a wireless network modes that
allows a wireless network adapters
connects directly to another wireless
network adapter for the purpose of
Ad hoc mode
temporarily sharing of files,
presentations or an internet
connection among multiple
computers and devices.
Provides a timeline of system
changes and reliability. It also
provides a system stability chart and Reliability Monitor
reports on software installations and
software or hardware failures.
Which of the following is not a
Windows Memory Diagnostics Tool
Performance Monitor tool?
Which of the following statement is You can configure the client computer
by going to the accessories in the start
not correct? menu and clicking the network
options.
It is a type of network that
interconnect devices by means of
Wireless Network
radio waves instead of wires and
cables.
It is an administrative tool for
managing user settings and Window Update Group Policy
computer settings across a network.
It is a collection of Domain Trees. Forest
It provides assistance in resolving
Windows Network Diagnostics Tool
network-related issues
It is the measurement on how quickly
Performance
the computer completes a task
Checks for symptoms of defective
computer memory and usually can
Windows Memory Diagnostics Tool
be started from administratve tools in
the control panel
It is a central location for viewing
messages about your system and
Action Center
the starting point for diagnosing and
solving issues with your system.
It is one of the feature of Windows 7
that encrypts the computer operating
Bitlocker
system and data stored on the
operating system volume.
How many bits are there in an IP
128 bits
version 6 address?
It is a software that is designed to
Malicious Software
deliberately harm a computer
It is a dynamic volume that joins
areas of unallocated space disks into Spanned Volume
a single logical disk
It allows the administrators to identify
which software is allowed to run and
Software Restriction Policies
was initially added to Windows XP
and Windows Server 2003.
It is the built-in encryption tool for
Encrypting File Systems
Windows file systems
It is a type of IPv4 Address that is
required by the devices and host that
connect directly to the Internet. This
Public IP Address
address must be unique, routable on
the internet and must be assigned by
IANA.
It specifies which part of an IPv4
address is the network ID and which
Subnet Mask
part of the IPv4 address is the Host
ID.
How many bits are there in an IP
32 bits
version 4 address?
172.16.0.0 /12 is what type of IPv4
Private IP Address
Address
It is a graphical user interface that is
used to manage disks and volumes
Disk Management
both basic and dynamic, locally or on
remote computers.
It is a device, usually a router, on a
TCP/IP internet that forwards IP Default Gateway
packets to other subnets
APIPA stands for: Automatic Private IP Addressing
Which of the following is a main type
Distribution
of group?
It contains an array of partition
entries describing the start and end GUID Partition (GPT)
LBA of each partition on disk.
It enables the user to log on and
access resources on a specific Local User Accounts
computer and usually reside in SAM
It is one of the Key Features of
Windows 7 that simplify a user's
Usability
ability to organize, search for, and
view information
It is a software that is designed to
Malicious Software
deliberately harm a computer.
It is a computer that is dedicated to
running network-aware application Application Server
software.
It is a dynamic volume that
encompasses available free-space Simple Volume
from single, dynamic, hard disk drive.
It enables IT Administrator to
automate one-to-many management Group Policy
of users and computers.
It defines the type of access granted
to a user, group, or computer for a NTFS Permission
file or folder
It is a Windows Authentication
Method that is used by windows 7
Kerberos v5
clients and server running Microsoft
Windows Server 2000 or late
It is an object that contains all of the
information that defines a user in User Account
Windows Server 2008 R2.
It is a new authentication features
that controls the ability of online IDs Online Identity Integration
to authenticate to a computer.
It is one of the Considerations on
Does not require the reinstallation of
why using the option of Upgrade
applications
rather than Migrate.
Which of the following is not a
802.11 h
Wireless LAN Standards
It is a way for you to limit use of disk
space on a volume for each user to Disk Quota
conserve disk space.
It provides storage for the users' files
and share folders that contain users' File Server
files.
It is a device that provides wiring Switch
concentrator functionality like a hub
but it also enables network traffic
management, performs firewall
functions and makes routing
decisions based upon traffic priority.
It is the measurement on how quickly
Performance
the computer completes a task.
It provides authenticaltion, host
operations of master roles, hosting
Domain Controller
the global catalog and support group
policies and sysvol.
It enables you to manage network
traffic, group physically dispersed
Virtual Local Area Network
nodes into logical area networks and
isolate network traffic.
It is a collection of Domain Trees Forest
It is one of the Options for Installing
Windows 7 where in you install
Windows 7 on a new partition and Clean Installation
replace an existing operating system
on a partition.

You might also like