Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

UGRD-IT6201C PRINCIPLES OF

OPERATING SYSTEM

Quiz #1
1. Which of the following is not one of the common network architecture types? Answer: WiMax
2. It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic. Answer: Virtual Local Area Network
3. What is the IEEE 802 Standards for Local Wireless Networks? Answer: IEEE 802.11
4. It is the most common form of computer network. Answer: Local Area Network
5. Which of the following is not a LAN Physical Topology? Answer: Crown
6. Which of the following is not a Physical WAN Component? Answer: Network Adapter
7. Which of the following is not a Wireless LAN Standards? Answer: 802.11 h
8. It is a group of services hosted on a network which is a private structure and has the internet-
like service provision. Answer: Intranet
9. It is a device that converts instructions from the network protocol stack into electric signals.
Answer: Network Adapter
10. It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority. Answer: switch

Quiz #2
1. Which of the following is not a Server Role of Windows Server 2008 R2?
Answer: Windows Power Shell
2. It allows you to control which role functionality is installed and enabled.
Answer: Role Services
3. It provides storage for the users' files and share folders that contain users' files.
Answer: File Server
4. It holds a copy of AD DS and responds to request for active directory information.
Answer: Domain Controller
5. It is a computer that is dedicated to running network-aware application software.
Answer: Application server
6. It a server that is used to access the corporate resources from outside the corporate network.
Answer: Remote Access Server
7. It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration. Answer: DHCP Server
8. It is the foundation of the Internet naming scheme and it supports accessing resources by
using alphanumeric names. Answer: DNS Server
Quiz #3
1. It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search
for, and view information. Answer: Usability
2. It is a tool used to remove system-specific data from the Windows operating system,
configure windows to start in audit mode, configure the windows operating system to start the
Windows Welcome phase and reset Windows Product activation.
Answer: Sysprep
3. It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows.
Answer: Reliability and Performance
4. Which of the following is not a Specialized version of Windows 7?
Answer: Windows 7 Professional
5. Which of the following is not an advantage of installing a 64-bit edition of Windows 7?
Answer: It supports 16-bit Windows on Windows (WOW) environment
6. It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
Answer: Clean Installation
7. It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained.
Answer: Upgrade Installation
8. It is one of the Considerations on why using the option of Upgrade rather than Migrate.
Answer: Does not require the reinstallation of applications
9. Which of the following version of Windows are allowed for Upgrade?
Answer: Windows Vista SP1
10. It is a downloadable application that helps windows user identify which edition of Windows 7
meets their needs.
Answer: Windows Upgrade Advisor

Quiz #4
1. It enables IT Administrator to automate one-to-many management of users and
computers. Answer: Group Policy
2. It enables the user to log on and access resources on a specific computer and usually
reside in SAM. Answer: Local User Accounts
3. It enables users to log on to the domain to gain access to the network resources and it
is reside in Active Directory. Answer: Domain User Accounts
4. It is an object that contains all of the information that defines a user in Windows
Server 2008 R2.Answer: User Account
5. It is a collection of user accounts, computer accounts, contacts and other groups that
you can manage as a single unit. Answer: Groups
6. It is a collection of Domain Trees. Answer: Forest
7. Which of the following is a main type of group? Answer: Distribution
8. It provides authenticaltion, host operations of master roles, hosting the global catalog
and support group policies and sysvol. Answer: Domain Controller
2. Quiz #5
1. It contains the partition table for the disk and a small amount of executable code
called as the master boot code. Answer: Master Boot Record Disk
2. It contains an array of partition entries describing the start and end LBA of each
partition on disk. Answer: GUID Partition (GPT)
3. It is a graphical user interface that is used to manage disks and volumes both basic
and dynamic, locally or on remote computers. Answer: Disk Management
4. It is a scriptable command line utility that create scripts to automate disk related task.
Answer: Diskpart
5. It is a dynamic volume that encompasses available free-space from single, dynamic,
hard disk drive. Answer: Simple Volume
6. It is a dynamic volume that joins areas of unallocated space disks into a single logical
disk Answer: Spanned Volume
7. It is the non-contiguous storage of data on a volume Answer: Disk Fragmentation
8. It is a way for you to limit use of disk space on a volume for each user to conserve
disk space. Answer: Disk Quotas
9.It is a small software program that allows a hardware device to communicate with a
computer Answer: Drivers

Quiz #6
1. It is the process of verifying the identity of something or someone.
Answer: Authentication
2. It is the process of determining whether something or someone has permission to
access the resources Answer: Authorization
3. It is a Windows Authentication Method that is used by windows 7 clients and server
running Microsoft Windows Server 2000 or later Answer: Kerberos v5
4. It is a new authentication features that controls the ability of online IDs to authenticate
to a computer. Answer: Online Identity Integration
5. It defines the type of access granted to a user, group, or computer for a file or folder.
Answer: NTFS Permission
6. It is a method of sharing folders that allows you to share folders quickly. Answer:
Basic Sharing
7. It is a method of sharing folders that allow multiple default public folders for each
computer and files shared with same computer and with same network.
Answer: Public Sharing
8. It is a type of printing wherein it is used by legacy application in pre-vista version of
windows that uses enhanced metafile format (EMF) as the spool file format. Answer:
GDI based printing
9. It is a feature of Windows 7 that allows windows 7 to be backward compatible Answer:
Windows XP Mode
Quiz #7
1. How many bits are there in an IP version 4 address? Answer: 32 bits 2. APIPA stands
for: Answer: Automatic Private IP Addressing
3. What is the binary notation for the 255.255.255.0 subnet mask?
Answer: 11111111.11111111.11111111.00000000
4. It specifies which part of an IPv4 address is the network ID and which part of the IPv4
address is the Host ID. Answer: Subnet Mask
5. It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other
subnets. Answer: Default Gateway
6. It is a type of IPv4 Address that is required by the devices and host that connect
directly to the Internet. This address must be unique, routable on the internet and must
be assigned by IANA. Answer: Public IP Address
7. 172.16.0.0 /12 is what type of IPv4 Address. Answer: Private IP Address
8. How many bits are there in an IP version 6 address? Answer: 128 bits
9. What type of notation does IP version 6 address uses? Answer: Hexadecimal
10. Which of the following is not an IPv6 Address types? Answer: Broadcast

Quiz #8
1. It is a type of network that interconnect devices by means of radio waves instead of
wires and cables. Answer: Wireless Networks
2. It is a strong authentication (with strong EAP method) and strong (TKIP) or very
strong (AES) encryption used by medium and large organization.
Answer: WPA-Enterprise
3. Strong EAP methods provide strong authentication Answer: IEEE 802.1X
4. Where will you see the Manage Wireless Networks tool in your PC? Answer: Control
Panel
5. Which of the following statement is not correct?
Answer: You can configure the client computer by going to the accessories in the
start menu and clicking the network options
6. What is the maximum bit rate for the 802.11n technologies? Answer: 600mbps
7. Which of the following is not a way to improve the signal strength?
Answer: None of the choices
8. It is a wireless network modes that allows a wireless network adapters connects
directly to another wireless network adapter for the purpose of temporarily sharing of
files, presentations or an internet connection among multiple computers and devices.
Answer: Ad hoc mode
Quiz #9
1. It is a central location for viewing messages about your system and the starting point
for diagnosing and solving issues with your system. Answer: Action Center
2. It is a software that is designed to deliberately harm a computer.
Answer: Malicious Software
3. It enables the IT Administrators to automate one-to-several management of users and
computers. Answer: Group Policy
4. It is the built-in encryption tool for Windows file systems Answer: Encrypting File
Systems
5. It is one of the feature of Windows 7 that encrypts the computer operating system and
data stored on the operating system volume. Answer: Bitlocker
6. It is a new Windows 7 security feature that enables IT professionals to specify exactly
what is allowed to run on user desktops. Answer: Applocker
7. It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks Answer: User Account Control
8. It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003. Answer: Software Restriction
Policies 9. This are equivalents to door locks, employee badges and security systems. It
protects the computer and networks from intrusions. Answer: Firewall
10. It is an enhanced privacy features of Internet Explorer 8 that inherently more secure
that using delete browsing history to maintain privacy because there are no logs kept or
tracks made during browsing Answer: InPrivate Browsing

Quiz #10
1. It is the measurement on how quickly the computer completes a task.
Answer: Performance
2. It is the measurement of how a system conforms to expected behavior
Answer: Reliability
3. Which of the following is not a Performance Monitor tool?
Answer: Windows Memory Diagnostics Tool
4. It provides assistance in resolving network-related issues
Answer: Windows Network Diagnostics Tool
5. Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Answer: Windows Memory Diagnostics Tool
6. Provides a timeline of system changes and reliability. It also provides a system
stability chart and reports on software installations and software or hardware failures.
Answer: Reliability Monitor
7. Which of the following is not a Boot-option for troubleshooting startup problems?
Answer: None of the choices
8. It is an administrative tool for managing user settings and computer settings across a
network. Answer: Windows Update Group Policy

You might also like