Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 85

Which of the following is not a Physical WAN Components?

Select one:
a.
Backbone

b.
Network Adapter

c.
Leased Lines

d.
Bridge
Feedback
Your answer is correct.

Question 2
Correct
Mark 1 out of 1

Flag question

Question text
What is the IEEE 802 Standards for Local Wireless Networks?

Select one:
a.
IEEE 802.11

b.
IEEE 802.5

c.
IEEE 802.16

d.
IEEE 802.3
Feedback
Your answer is correct.
Question 3
Incorrect
Mark 0 out of 1

Flag question

Question text
Which of the following is not the common network architecture types?

Select one:
a.
WiMax

b.
Ethernet

c.
FDDI (Fiber Distributed Data Interface)

d.
Token Ring
Feedback
Your answer is incorrect.

Question 4
Correct
Mark 1 out of 1

Flag question

Question text
It is a device that converts instructions from the network protocol stack into electric signals.

Select one:
a.
Network Adapter

b.
Firewall
c.
Router

d.
Switch
Feedback
Your answer is correct.

Question 5
Correct
Mark 1 out of 1

Flag question

Question text
It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic.

Select one:
a.
Wireless Local Area Network

b.
Metropolitan Area Network

c.
Visual Local Area Network

d.
Virtual Local Area Network
Feedback
Your answer is correct.

Question 6
Correct
Mark 1 out of 1

Flag question
Question text
It is the most common form of computer network.

Select one:
a.
Local Area Network

b.
Metropolitan Area Network

c.
Wide Area Network

d.
Campus Area Network
Feedback
Your answer is correct.

Question 7
Correct
Mark 1 out of 1

Flag question

Question text
Which of the following is not a LAN Physical Topology?

Select one:
a.
Crown

b.
Hybrid

c.
Mesh

d.
Bus
Feedback
Your answer is correct.
Question 8
Correct
Mark 1 out of 1

Flag question

Question text
Which of the following is not a Wireless LAN Standards?

Select one:
a.
802.11 h

b.
802.11 b

c.
802.11 n

d.
802.11 a
Feedback
Your answer is correct.

Question 9
Correct
Mark 1 out of 1

Flag question

Question text
It is a group of services hosted on a network which is a private structure and has
the internet-like service provision.

Select one:
a.
Extranet

b.
Intranet

c.
Cloud

d.
Internet
Feedback
Your answer is correct.

Question 10
Correct
Mark 1 out of 1

Flag question

Question text
It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority.

Select one:
a.
Firewall

b.
Router

c.
Switch

d.
Hub

Question 1
Correct
Mark 1 out of 1
Flag question

Question text
It a server that is used to access the corporate resources from outside the corporate network.
Select one:
a.
Remote Access Server

b.
None of the Choices

c.
DNS Server

d.
DHCP Server
Feedback
Your answer is correct.

Question 2
Correct
Mark 1 out of 1

Flag question

Question text
It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration.
Select one:
a.
None of the Choices

b.
DNS Server

c.
Remote Access Server
d.
DHCP Server
Feedback
Your answer is correct.

Question 3
Correct
Mark 1 out of 1

Flag question

Question text
It provides storage for the users' files and share folders that contain users' files.
Select one:
a.
File Server

b.
Application Server

c.
Web Server

d.
Domain Controller
Feedback
Your answer is correct.

Question 4
Correct
Mark 1 out of 1

Flag question

Question text
Which of the following is not a Server Role of Windows Server 2008 R2?
Select one:
a.
Active Directory Domain Services

b.
Remote Desktop Services

c.
Windows Power Shell

d.
DHCP Server
Feedback
Your answer is correct.

Question 5
Correct
Mark 1 out of 1

Flag question

Question text
It holds a copy of AD DS and responds to request for active directory information.
Select one:
a.
Application Server

b.
File Server

c.
Domain Controller

d.
Web Server
Feedback
Your answer is correct.

Question 6
Correct
Mark 1 out of 1
Flag question

Question text
It allows you to control which role functionality is installed and enabled.
Select one:
a.
Role

b.
None of the choices

c.
Server Features

d.
Role Services
Feedback
Your answer is correct.

Question 7
Correct
Mark 1 out of 1

Flag question

Question text
It is the foundation of the Internet naming scheme and it supports accessing resources by using
alphanumeric names.
Select one:
a.
DHCP Server

b.
Remote Access Server

c.
DNS Server
d.
None of the Choices
Feedback
Your answer is correct.

Question 8
Correct
Mark 1 out of 1

Flag question

Question text
It is a computer that is dedicated to running network-aware application software.

Select one:
a.
Application Server

b.
File Server

c.
Domain Controller

d.
Web Server

It is a tool used to remove system-specific data from the Windows operating system,
configure windows to start in audit mode, configure the windows operating system to start
the Windows Welcome phase and reset Windows Product activation.

Select one:
a.
Loadstate

b.
Scanstate

c.
Imagex

d.
Sysprep

It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.

Select one:
a.
Migration

b.
None of the Choices

c.
Upgrade Installation

d.
Clean Installation

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following version of Windows are allowed for Upgrade?

Select one:
a.
Windows 95

b.
None of the choices

c.
Windows XP

d.
Windows Vista SP1
Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a downloadable application that helps windows user identify which edition of Windows
7 meets their needs.

Select one:
a.
Windows Upgrade Advisor

b.
User State Migration Tool

c.
Windows Easy Transfer

d.
None of the choices
Which of the following is not a Wireless LAN Standards?

It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for,
and view information.

Select one:
a.
Usability

b.
Security

c.
Deployment

d.
Reliability and Performance
Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a tool used to remove system-specific data from the Windows operating system, configure
windows to start in audit mode, configure the windows operating system to start the Windows
Welcome phase and reset Windows Product activation.

Select one:
a.
Imagex

b.
Scanstate

c.
Loadstate

d.
Sysprep
Feedback
Your answer is correct.

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows.
Select one:
a.
Security

b.
Deployment

c.
Reliability and Performance

d.
Usability
Feedback
Your answer is correct.

Question 22
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which of the following is not a Specialized version of Windows 7?

Select one:
a.
Windows 7 Professional

b.
Windows 7 Ultimate

c.
Windows 7 Home Basic

d.
Windows 7 Enterprise
Feedback
Your answer is incorrect.

Question 23
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
Which of the following is not an advantage of installing a 64-bit edition of Windows 7?

Select one:
a.
More Memory

b.
Improved Security

c.
Improved Performance

d.
It supports 16-bit Windows on Windows (WOW) environment
Feedback
Your answer is incorrect.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.

Select one:
a.
None of the Choices

b.
Upgrade Installation

c.
Migration

d.
Clean Installation
Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained.

Select one:
a.
None of the Choices

b.
Upgrade Installation

c.
Clean Installation

d.
Migration
Feedback
Your answer is correct.

Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is one of the Considerations on why using the option of Upgrade rather than Migrate.

Select one:
a.
Does not require the reinstallation of applications

b.
Typically, requires replacing existing computer hardware

c.
None of the choices

d.
Typically, requires more storage space
Feedback
Your answer is correct.

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following version of Windows are allowed for Upgrade?

Select one:
a.
Windows Vista SP1

b.
Windows XP

c.
None of the choices

d.
Windows 95
Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a downloadable application that helps windows user identify which edition of Windows 7
meets their needs.

Select one:
a.
User State Migration Tool

b.
None of the choices

c.
Windows Easy Transfer

d.
Windows Upgrade Advisor

Question 1
Incorrect

Mark 0 out of 1

Flag question

Question text
It is the measurement of how a system conforms to expected behavior
Select one:

a.

Usability

b.

Reliability
c.

Performance

d.

Security
Feedback
Your answer is incorrect.

Question 2
Correct

Mark 1 out of 1

Flag question

Question text
It enables the IT Administrators to automate one-to-several management of users and
computers.
Select one:

a.

Action Center

b.

Applocker

c.

Group Policy

d.

Control Panel
Feedback
Your answer is correct.

Question 3
Correct
Mark 1 out of 1

Flag question

Question text
It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks
Select one:

a.

User Account Control

b.

Encrypting File Systems

c.

Applocker

d.

Bitlocker
Feedback
Your answer is correct.

Question 4
Correct

Mark 1 out of 1

Flag question

Question text
It is an administrative tool for managing user settings and computer settings across a
network.

a.
None of the choices

b.

Window Update Group Policy

c.

System Restore Points

d.

Windows Backup
Feedback
Your answer is correct.

Question 5
Correct

Mark 1 out of 1

Flag question

Question text
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that
using delete browsing history to maintain privacy because there are no logs kept or tracks
made during browsing
Select one:

a.

InPrivate Filtering

b.

Applocker

c.

Bitlocker

d.
InPrivate Browsing
Feedback
Your answer is correct.

Question 6
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not a Boot-option for troubleshooting startup problems?
Select one:

a.

Last known good configuration

b.

Safe Mode

c.

None of the choices

d.

Boot logging
Feedback
Your answer is correct.

Question 7
Correct

Mark 1 out of 1

Flag question
Question text
It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003.
Select one:

a.

User Account Control

b.

Group Policy

c.

Software Restriction Policies

d.

Advanced Security Settings


Feedback
Your answer is correct.

Question 8
Correct

Mark 1 out of 1

Flag question

Question text
It is one of the feature of Windows 7 that encrypts the computer operating system and data
stored on the operating system volume.
Select one:

a.

User Account Control

b.

Applocker
c.

Bitlocker

d.

Encrypting File Systems


Feedback
Your answer is correct.

Question 9
Correct

Mark 1 out of 1

Flag question

Question text
It is a software that is designed to deliberately harm a computer.
Select one:

a.

None of the Choices

b.

Bitlocker

c.

Malicious Software

d.

Applocker
Feedback
Your answer is correct.

Question 10
Correct

Mark 1 out of 1
Flag question

Question text
Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Select one:

a.

Windows Memory Diagnostics Tool

b.

Reliability Monitor

c.

Windows Network Diagnostics Tool

d.

Performance Monitor

Question 1
Correct

Mark 1 out of 1

Flag question

Question text
It is a type of IPv4 Address that is required by the devices and host that connect directly to
the Internet. This address must be unique, routable on the internet and must be assigned by
IANA.
Select one:

a.

Private IP Address
b.

Network Address

c.

Broadcast Address

d.

Public IP Address
Feedback
Your answer is correct.

Question 2
Correct

Mark 1 out of 1

Flag question

Question text
It specifies which part of an IPv4 address is the network ID and which part of the IPv4
address is the Host ID.
Select one:

a.

Default Gateway

b.

Host ID

c.

Network Address

d.

Subnet Mask
Feedback
Your answer is correct.

Question 3
Correct

Mark 1 out of 1

Flag question

Question text
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES)
encryption used by medium and large organization.
Select one:

a.

IEEE 802.1X

b.

WPA2-Personal

c.

WPA-Enterprise

d.

WPA-Personal
Feedback
Your answer is correct.

Question 4
Correct

Mark 1 out of 1

Flag question

Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:

a.

600mbps

b.

None of the choices

c.

54mbps

d.

11mbps
Feedback
Your answer is correct.

Question 5
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not an IPv6 Address types?
Select one:

a.

Multicast

b.

Anycast

c.

Unicast
d.

Broadcast
Feedback
Your answer is correct.

Question 6
Correct

Mark 1 out of 1

Flag question

Question text
It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files,
presentations or an internet connection among multiple computers and devices.
Select one:

a.

Bluetooth mode

b.

Wired mode

c.

Ad hoc mode

d.

Infrastructure mode
Feedback
Your answer is correct.

Question 7
Correct

Mark 1 out of 1
Flag question

Question text
It is a type of network that interconnect devices by means of radio waves instead of wires
and cables.
Select one:

a.

Wireless Network

b.

Wired Network

c.

Virtual Local Area Network

d.

Campus Area Network


Feedback
Your answer is correct.

Question 8
Correct

Mark 1 out of 1

Flag question

Question text
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Select one:

a.
Network Address

b.

Default Gateway 

c.

Host ID

d.

Subnet Mask
Feedback
Your answer is correct.

Question 9
Correct

Mark 1 out of 1

Flag question

Question text
172.16.0.0 /12 is what type of IPv4 Address.
Select one:

a.

Broadcast Address

b.

Public IP Address

c.

Host ID

d.

Private IP Address
Feedback
Your answer is correct.

Question 10
Correct

Mark 1 out of 1

Flag question

Question text
What type of notation does IP version 6 address uses?
Select one:

a.

Octal

b.

Binary

c.

Hexadecimal

d.

Decimal
Feedback
Your answer is correct.

Question 11
Correct

Mark 1 out of 1

Flag question

Question text
Strong EAP methods provide strong authentication
Select one:

a.

WPA-Enterprise

b.

IEEE 802.1X

c.

WPA2-Personal

d.

WPA-Personal
Feedback
Your answer is correct.

Question 12
Correct

Mark 1 out of 1

Flag question

Question text
How many bits are there in an IP version 6 address?
Select one:

a.

24 bits

b.

128 bits

c.

32 bits

d.
64 bits
Feedback
Your answer is correct.

Question 13
Correct

Mark 1 out of 1

Flag question

Question text
APIPA stands for:
Select one:

a.

Asia Pacific Intellectual Property Association

b.

Automatic Protocol for Internet Public Address

c.

Automatic Private IP Addressing

d.

Association of Pacific Island Public Auditors


Feedback
Your answer is correct.

Question 14
Correct

Mark 1 out of 1

Flag question
Question text
Where will you see the Manage Wireless Networks tool in your PC?
Select one:

a.

Accessories

b.

Control Panel

c.

Program Files

d.

System Tools
Feedback
Your answer is correct.

Question 15
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not a way to improve the signal strength?
Select one:

a.

Ensure close proximity to the Wireless APs

b.

None of the Choices

c.
Check for devices that may cause interference

d.

Check all Physical obstructions


Feedback
Your answer is correct.

Question 16
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following statement is not correct?
Select one:

a.

You can configure the client computer by using the command line: netsh wlan

b.

You can configure the client computer by using the group policy

c.

You can configure the client computer by using the Network Dialog Box and following the
Wizard

d.

You can configure the client computer by going to the accessories in the start menu and
clicking the network options.
Feedback
Your answer is correct.

Question 17
Correct

Mark 1 out of 1
Flag question

Question text
What is the binary notation for the 255.255.255.0 subnet mask?
Select one:

a.

11111111.11111111.11111000.00000000

b.

11111111.11111111.11111110.00000000

c.

11111111.00000000.00000000.00000000

d.

11111111.11111111.11111111.00000000
Feedback
Your answer is correct.

Question 18
Correct

Mark 1 out of 1

Flag question

Question text
How many bits are there in an IP version 4 address?
Select one:

a.

24 bits
b.

128 bits

c.

32 bits

d.

64 bits
Feedback
Your answer is correct.

Question 1
Answer saved

Marked out of 1.00

Flag question

Question text
You are the system administrator for your company. You are configuring the services on a
Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart.
Which tab of the service`s Properties dialog box should you use?
Select one:

a.

Dependencies

b.

Log On

c.

Recovery

d.

General
Clear my choice

Question 2
Answer saved

Marked out of 1.00

Flag question

Question text
Where will you see the Manage Wireless Networks tool in your PC?
Select one:

a.

Program Files

b.

Control Panel

c.

System Tools

d.

Accessories

Clear my choice

Question 3
Answer saved

Marked out of 1.00

Flag question

Question text
How many bits are there in an IP version 6 address?
Select one:

a.

128 bits

b.

24 bits

c.

64 bits

d.

32 bits

Clear my choice

Question 4
Answer saved

Marked out of 1.00

Flag question

Question text
It is a windows 7 feature that enables support staff to connect to a remote desktop computer.
Select one:

a.

Remote Assistance

b.

None of the Choices

c.

Virtual Private Network

d.
Remote Desktop

Clear my choice

Question 5
Answer saved

Marked out of 1.00

Flag question

Question text
You are evaluating the purchase a netbook computer that has the following hardware:
 
1.6-gigahertz (GHz) 32-bit processor
1024-MB RAM
1 video card that uses shared memory
4-G8 solid state drive
 
You need to ensure that you can install Windows 7 Enterprise on the netbook computer. Which
hardware component should you change or add?
Select one:

a.

video card

b.

storage device

c.

ram

d.

processor

Clear my choice
Question 6
Answer saved

Marked out of 1.00

Flag question

Question text
It caches content from remote and web servers in the branch location so users can quickly
access the content. This cache can be hosted centrally in the branch location or distributed
across user PCs.
Select one:

a.

BranchCache

b.

DirectAccess

c.

Remote Desktop

d.

Remote Assistance

Clear my choice

Question 7
Answer saved

Marked out of 1.00

Flag question

Question text
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is
allowed to run on user desktops.
Select one:

a.

Applocker

b.

User Account Control

c.

Bitlocker

d.

Encrypting File Systems

Clear my choice

Question 8
Answer saved

Marked out of 1.00

Flag question

Question text
It is a type of network that interconnect devices by means of radio waves instead of wires and
cables.
Select one:

a.

Campus Area Network

b.

Wired Network

c.
Virtual Local Area Network

d.

Wireless Network

Clear my choice

Question 9
Answer saved

Marked out of 1.00

Flag question

Question text
You are the network administrator for a small company that has just switched its machines from
Windows XP to Windows Vista and Windows 7. One of the users who has Windows Vista asks
you why there is a vertical sidebar on the screen. What feature of Windows Vista is this?
Select one:

a.

Windows Sidebar

b.

Parental controls

c.

Windows Firewall

d.

Jump List

Clear my choice

Question 10
Answer saved

Marked out of 1.00


Flag question

Question text
Which of the following is not a Performance Monitor tool?
Select one:

a.

Reports

b.

Monitoring Tools

c.

Data Collector Sets

d.

Windows Memory Diagnostics Tool

Clear my choice

Question 11
Answer saved

Marked out of 1.00

Flag question

Question text
You are a desktop administrator for an enterprise organization. A user applies a device update
from the manufacturer, and now the computer is displaying error messages. The user has critical
documents on the computer that need to be preserved. You need to restore the computer to an
operating state and preserve applications and data. What should you do?
Select one:

a.
Boot Windows by using the Last Known Good Configuration

b.

Perform a System Image Recovery

c.

Perform a re-installation of Windows

d.

Restore Windows by using the most recent System Restore point

Clear my choice

Question 12
Answer saved

Marked out of 1.00

Flag question

Question text
What type of notation does IP version 6 address uses?
Select one:

a.

Binary

b.

Octal

c.

Decimal

d.

Hexadecimal

Clear my choice
Question 13
Answer saved

Marked out of 1.00

Flag question

Question text
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using
delete browsing history to maintain privacy because there are no logs kept or tracks made
during browsing
Select one:

a.

InPrivate Filtering

b.

Applocker

c.

InPrivate Browsing

d.

Bitlocker

Clear my choice

Question 14
Answer saved

Marked out of 1.00

Flag question

Question text
It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is
the Host ID.
Select one:

a.

Network Address

b.

Default Gateway

c.

Host ID

d.

Subnet Mask

Clear my choice

Question 15
Answer saved

Marked out of 1.00

Flag question

Question text
Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Select one:

a.

Windows Memory Diagnostics Tool

b.

Performance Monitor

c.
Reliability Monitor

d.

Windows Network Diagnostics Tool

Clear my choice

Question 16
Answer saved

Marked out of 1.00

Flag question

Question text
Your company network includes desktop computers that have Windows 7 installed. Microsoft
updates are applied automatically at a scheduled time. A use1- reports that a proprietary
application has stopped working. You need to uninstall the most recent update from Microsoft.
What should you do first?
Select one:

a.

From the Task Scheduler, view the WindowsBackup node.

b.

From the Services console, open the Windows Update service.

c.

From the Action Center, open the Windows Update window.

d.

From the Event Viewer, open the System log.

Clear my choice

Question 17
Answer saved

Marked out of 1.00


Flag question

Question text
You manage a network device by using a web interface. You perform all critical Windows
updates so that the computer now runs Internet Explorer 10. After performing these updates,
the layout of the network device web page displays incorrectly. Other web pages display
correctly. You need to resolve this issue. What should you do?
Select one:

a.

Set the local Intranet security zone to Low

b.

Enable Compatibly Mode for the network device web page

c.

Add the network device web page to the trusted sites zone

d.

Clear Internet Explorer’s browsing history

Clear my choice

Question 18
Answer saved

Marked out of 1.00

Flag question

Question text
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES)
encryption used by medium and large organization.
Select one:
a.

IEEE 802.1X

b.

WPA-Enterprise

c.

WPA-Personal

d.

WPA2-Personal

Clear my choice

Question 19
Answer saved

Marked out of 1.00

Flag question

Question text
It is a security feature that simplifies the ability of users to run as standard users and perform all
neccessary daily tasks
Select one:

a.

Bitlocker

b.

Applocker

c.

Encrypting File Systems

d.

User Account Control


Clear my choice

Question 20
Answer saved

Marked out of 1.00

Flag question

Question text
Your company has asked you to implement Network Access Protection(NAP) on the network.
You already have Windows Server 2008 installed on your servers but your organization wants to
know which client operating systems will support NAP. What operating system does not support
NAP?
Select one:

a.

Windows 7

b.

Windows Vista

c.

Windows XP with SP3

d.

Windows XP with SP2

Clear my choice

Question 21
Answer saved

Marked out of 1.00

Flag question
Question text
Which of the following statement is not correct?
Select one:

a.

You can configure the client computer by using the Network Dialog Box and following the
Wizard

b.

You can configure the client computer by using the group policy

c.

You can configure the client computer by using the command line: netsh wlan

d.

You can configure the client computer by going to the accessories in the start menu and clicking
the network options.

Clear my choice

Question 22
Answer saved

Marked out of 1.00

Flag question

Question text
You are the system administrator for a large organization that uses Windows Server R2 and
Windows 7. You have a Windows 7 machine and have enabled System Protection. You want the
machine to retain only the last System Protection snapshot that was taken. What should you do?
Select one:

a.

Disable Shadow Copies and run System Protection

b.
Run Disk Cleanup for System Restore and then run Shadow Copies

c.

Set the Keep Only Last Shadow Copy option in System Protection

d.

Enable Shadow Copies and then set the Keep Only Last Shadow Copy option

Clear my choice

Question 23
Answer saved

Marked out of 1.00

Flag question

Question text
Which of the following is not a way to improve the signal strength?
Select one:

a.

Ensure close proximity to the Wireless APs

b.

Check all Physical obstructions

c.

None of the Choices

d.

Check for devices that may cause interference

Clear my choice

Question 24
Answer saved

Marked out of 1.00


Flag question

Question text
It is one of the features of Mobile Computers wherein it synchronizes various content including
music, video, contacts, calendar events, web browser favorites and other files between Windows
Mobile devices and Windows 7
Select one:

a.

Sync Center

b.

Windows Mobility Center

c.

Windows Mobile Device Center

d.

Power Options

Clear my choice

Question 25
Answer saved

Marked out of 1.00

Flag question

Question text
It is a software that is designed to deliberately harm a computer.
Select one:

a.
Applocker

b.

Malicious Software

c.

None of the Choices

d.

Bitlocker

Clear my choice

Question 26
Answer saved

Marked out of 1.00

Flag question

Question text
You have a computer that runs Windows 7. The computer is a member of a workgroup. You use
Encrypting File System (EFS) to protect your local files. You need to ensure that you can decrypt
EFS files on the computer if you forget your password. What should you do?
Select one:

a.

From User Accounts, Select Manage your file encryption certificates.

b.

From Authorization manager, Modify the Authorization Manager options.

c.

From BitLocker Drive Encryption, Select Manage BitLocker and Turn On BitLocker

d.

From Credential Manager, select Back up Vault.


Clear my choice

Question 27
Answer saved

Marked out of 1.00

Flag question

Question text
Provides a timeline of system changes and reliability. It also provides a system stability chart and
reports on software installations and software or hardware failures.
Select one:

a.

Windows Memory Diagnosstics Tool

b.

Performance Monitor

c.

Reliability Monitor

d.

Windows Network Diagnostics Tool

Clear my choice

Question 28
Answer saved

Marked out of 1.00

Flag question

Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:

a.

User Account Control

b.

Bitlocker

c.

Encrypting File Systems

d.

Applocker

Clear my choice

Question 29
Answer saved

Marked out of 1.00

Flag question

Question text
You are the network administrator for Stellacon Corporation. User in the sales department have
been complaining that the Sales application is slow to load. Using Performance Monitor, you
create a baseline report for one of the computers, monitoring memory, the processor, the disk
subsystem, and the network subsystem. You notice that the disk subsystem has a high load of
activity. What other subsystem should you monitor before you can know for sure whether you
have a disk subsystem bottleneck?
Select one:

a.

Application

b.
Network

c.

Processor

d.

Memory

Clear my choice

Question 30
Answer saved

Marked out of 1.00

Flag question

Question text
It allows the administrators to identify which software is allowed to run and was initially added
to Windows XP and Windows Server 2003.
Select one:

a.

User Account Control

b.

Advanced Security Settings

c.

Group Policy

d.

Software Restriction Policies

Clear my choice

Question 31
Answer saved
Marked out of 1.00

Flag question

Question text
You are the network administrator for a large organization that uses both Windows Server 2008
R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily. You perform
an image backup on the Windows 7 machine. The Windows 7 machine then gets struck by a
virus and will not start up properly. What can you do to get the Windows 7 machine up and
running the fastest possible way?
Select one:

a.

Because of the virus, the best things is to rebuild the machine from scratch

b.

Use a Windows 7 boot disk and run the Image Restore utility

c.

Start the computer from the Windows 7 DVD and then use the Image Restore utility

d.

Start the computer from the Windows 7 DVD and then use the System Image Recovery tool

Clear my choice

Question 32
Answer saved

Marked out of 1.00

Flag question

Question text
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that
runs Windows 7. You want to deploy a Windows image (WIM) file to other computers in the
domain. You need to capture the operating system, computer configuration, and applications
installed on the computer to a WIM file. What should you do before you capture the image?
Select one:

a.

Run Diskpart.exe

b.

Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk

c.

Run ScanState.exe

d.

Run Defrag.exe

Clear my choice

Question 33
Answer saved

Marked out of 1.00

Flag question

Question text
It provides transparent access to internal network resources whenever they are connected to the
Internet. It also enables the IT Professionals to manage remote computers outside of the office
and does not require a VPN connection.
Select one:

a.

BranchCache

b.

Remote Assistance

c.
DirectAccess

d.

Remote Desktop

Clear my choice

Question 34
Answer saved

Marked out of 1.00

Flag question

Question text
How many bits are there in an IP version 4 address?
Select one:

a.

32 bits

b.

128 bits

c.

64 bits

d.

24 bits

Clear my choice

Question 35
Answer saved

Marked out of 1.00


Flag question

Question text
Alexandria is the payroll manager and stores critical file on her local drive for added security on
her Windows 7 computer. She wants to ensure that she is using the disk configuration with the
most fault tolerance and the highest level of consistent availability. Which of the following
provisions should she use?
Select one:

a.

Mirrored volumes

b.

Spanned volumes

c.

Disk striping

d.

Extended volumes

Clear my choice

Question 36
Answer saved

Marked out of 1.00

Flag question

Question text
APIPA stands for:
Select one:

a.
Association of Pacific Island Public Auditors

b.

Automatic Private IP Addressing

c.

Automatic Protocol for Internet Public Address

d.

Asia Pacific Intellectual Property Association

Clear my choice

Question 37
Answer saved

Marked out of 1.00

Flag question

Question text
You are the network administrator for your organization. You have been asked by the owner of
the company to verify that all drivers installed on the Windows 7 machines are signed drivers.
How do you accomplish this task?
Select one:

a.

Run a scan in Device manager

b.

Run Drivers.exe at the command prompt

c.

Run Sigverif.exe at the command prompt

d.

Run Verify.exe at the command prompt


Clear my choice

Question 38
Answer saved

Marked out of 1.00

Flag question

Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:

a.

None of the choices

b.

600mbps

c.

11mbps

d.

54mbps

Clear my choice

Question 39
Answer saved

Marked out of 1.00

Flag question

Question text
It is an administrative tool for managing user settings and computer settings across a network.
a.

Windows Backup

b.

None of the choices

c.

Window Update Group Policy

d.

System Restore Points

Clear my choice

Question 40
Answer saved

Marked out of 1.00

Flag question

Question text
It enables the IT Administrators to automate one-to-several management of users and
computers.
Select one:

a.

Applocker

b.

Action Center

c.

Control Panel

d.

Group Policy
Clear my choice

Question 41
Answer saved

Marked out of 1.00

Flag question

Question text
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the
keyboard speed and the mouse pointer rate. Which utility should she use to configure the
keyboard and mouse properties?
Select one:

a.

Microsoft Management Console

b.

Registry Editor

c.

Computer Management

d.

Control Panel

Clear my choice

Question 42
Answer saved

Marked out of 1.00

Flag question
Question text
Strong EAP methods provide strong authentication
Select one:

a.

WPA-Enterprise

b.

WPA2-Personal

c.

IEEE 802.1X

d.

WPA-Personal

Clear my choice

Question 43
Answer saved

Marked out of 1.00

Flag question

Question text
It is the built-in encryption tool for Windows file systems
Select one:

a.

User Account Control

b.

Bitlocker

c.

Applocker
d.

Encrypting File Systems

Clear my choice

Question 44
Answer saved

Marked out of 1.00

Flag question

Question text
It is the measurement of how a system conforms to expected behavior
Select one:

a.

Security

b.

Performance

c.

Usability

d.

Reliability

Clear my choice

Question 45
Answer saved

Marked out of 1.00


Flag question

Question text
You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at
your company has a network projector installed on a server within the company network. You
need to connect to the projector from your computer. What should you do?
Select one:

a.

From Accessories, click Connect to a Network Projector

b.

Run the Displayswitch.exe command and select Projector only

c.

From Display, click Connect to a projector

d.

From PowerShell, run the Net Config command

Clear my choice

Question 46
Answer saved

Marked out of 1.00

Flag question

Question text
This Power plan saves power on a mobile computer by reducing system performance. Its
primary purpose is to maximize the battery life.
Select one:

a.
High Performance

b.

None of the Choices

c.

Balanced

d.

Power Saver

Clear my choice

Question 47
Answer saved

Marked out of 1.00

Flag question

Question text
This are equivalents to door locks, employee badges and security systems. It protects the
computer and networks from intrusions.
Select one:

a.

Bitlocker

b.

Group Policy

c.

Firewall

d.

Internet

Clear my choice
Question 48
Answer saved

Marked out of 1.00

Flag question

Question text
Which of the following is not a Boot-option for troubleshooting startup problems?
Select one:

a.

Safe Mode

b.

Last known good configuration

c.

None of the choices

d.

Boot logging

Clear my choice

Question 49
Answer saved

Marked out of 1.00

Flag question

Question text
It is a method of turning a computer on or off wherein the system state is saved to memory.
Select one:
a.

Restart

b.

Shut Down

c.

Sleep or Standby

d.

Hibernate

Clear my choice

Question 50
Answer saved

Marked out of 1.00

Flag question

Question text
You are the network manager for a small company. You have a junior IT administrator who did
some installations last week on a Windows 7 machine. How can you see what applications were
installed last week on the Windows 7 machine?
Select one:

a.

View the informational events of Reliability Monitor

b.

Check Event Viewer system logs

c.

Open Control Panel, Add/Remove programs

d.
View the data collector sets

Clear my choice

Question 51
Answer saved

Marked out of 1.00

Flag question

Question text
This are point-to-point connection across a private or public network. It uses special protocols,
called tunneling protocol to make a virtual call to a virtual port.
Select one:

a.

None of the Choices

b.

Remote Desktop

c.

Remote Assitance

d.

Virtual Private Network

Clear my choice

Question 52
Answer saved

Marked out of 1.00

Flag question
Question text
It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files, presentations
or an internet connection among multiple computers and devices.
Select one:

a.

Ad hoc mode

b.

Bluetooth mode

c.

Infrastructure mode

d.

Wired mode

Clear my choice

Question 53
Answer saved

Marked out of 1.00

Flag question

Question text
It is a central location for viewing messages about your system and the starting point for
diagnosing and solving issues with your system.
Select one:

a.

Applocker

b.

Control Panel
c.

Action Center

d.

Group Policy

Clear my choice

Question 54
Answer saved

Marked out of 1.00

Flag question

Question text
It provides assistance in resolving network-related issues
Select one:

a.

Reliability Monitor

b.

Windows Memory Diagnostic Tool

c.

Windows Network Diagnostics Tool

d.

Performance Monitor

Clear my choice

Question 55
Answer saved

Marked out of 1.00


Flag question

Question text
You are the network administrator for a large organization. You are in charge of implementing
company policies. One company policy states that you have to prevent Internet Explorer from
saving any data during a user`s browsing session. How do you accomplish this?
Select one:

a.

Set the Internet Security setting to disabled

b.

InPrivate sessions should be disabled

c.

Run the browsers in the InPrivate session

d.

Private sessions should be enabled

Clear my choice

Question 56
Answer saved

Marked out of 1.00

Flag question

Question text
What is the binary notation for the 255.255.255.0 subnet mask?
Select one:

a.
11111111.00000000.00000000.00000000

b.

11111111.11111111.11111111.00000000

c.

11111111.11111111.11111000.00000000

d.

11111111.11111111.11111110.00000000

Clear my choice

Question 57
Answer saved

Marked out of 1.00

Flag question

Question text
You are the administrator for a large organization with multiple Windows Server 2008 domain
controllers and multiple domains. You have a Windows 7 machine that is set up for all users to
access. You have an application called StellApp.exe that everyone on this Windows 7 computer
can use except for the sales group. How do you stop the sales group from accessing this one
application?
Select one:

a.

Give the Everyone group full control of the application

b.

Create an executable rule from the Application Control Policy

c.

Create a security role from the Application Control Policy

d.
Deny the Everyone group the rights to the application

Clear my choice

Question 58
Answer saved

Marked out of 1.00

Flag question

Question text
It is a type of IPv4 Address that is required by the devices and host that connect directly to the
Internet. This address must be unique, routable on the internet and must be assigned by IANA.
Select one:

a.

Network Address

b.

Public IP Address

c.

Broadcast Address

d.

Private IP Address

Clear my choice

Question 59
Answer saved

Marked out of 1.00

Flag question
Question text
It is a windows 7 feature that enables user to connect to their desktop computer from another
device.
Select one:

a.

None of the Choices

b.

Remote Assistance

c.

Remote Desktop

d.

Virtual Private Network

Clear my choice

Question 60
Answer saved

Marked out of 1.00

Flag question

Question text
It is the measurement on how quickly the computer completes a task.
Select one:

a.

Security

b.

Usability

c.
Performance

d.

Reliability

Clear my choice

Question 61
Answer saved

Marked out of 1.00

Flag question

Question text
Which of the following is not an IPv6 Address types?
Select one:

a.

Anycast

b.

Multicast

c.

Broadcast

d.

Unicast

Clear my choice

Question 62
Answer saved

Marked out of 1.00


Flag question

Question text
You administer an Active Directory domain that includes portable computers that have Windows
7 SP1 installed. You log on to one of the portable computers by using a domain user account
and install a new device for a bar-code scanner. You restart the portable computer after
installing the new device driver. You successfully log on to the computer by using a domain user
account. After logging on, you discover that the bar-code scanner is not working due to a driver
error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You
need to be able to roll back the driver to its previous version. What should you do?
Select one:

a.

Run the Device Manager by using elevated permissions

b.

Start the computer and select Last Known Good Configuration from the advanced startup
options

c.

From the Local Group Policy, modify Device Installation Restrictions

d.

Start the portable computer from the Windows 7 installation media and select Startup Repair

Clear my choice

Question 63
Answer saved

Marked out of 1.00

Flag question

Question text
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Select one:

a.

Subnet Mask

b.

Network Address

c.

Default Gateway 

d.

Host ID

Clear my choice

Question 64
Answer saved

Marked out of 1.00

Flag question

Question text
172.16.0.0 /12 is what type of IPv4 Address.
Select one:

a.

Host ID

b.

Public IP Address

c.

Broadcast Address
d.

Private IP Address

You might also like