Professional Documents
Culture Documents
Principles of Operating Systems Prelim Lab
Principles of Operating Systems Prelim Lab
Select one:
a.
Backbone
b.
Network Adapter
c.
Leased Lines
d.
Bridge
Feedback
Your answer is correct.
Question 2
Correct
Mark 1 out of 1
Flag question
Question text
What is the IEEE 802 Standards for Local Wireless Networks?
Select one:
a.
IEEE 802.11
b.
IEEE 802.5
c.
IEEE 802.16
d.
IEEE 802.3
Feedback
Your answer is correct.
Question 3
Incorrect
Mark 0 out of 1
Flag question
Question text
Which of the following is not the common network architecture types?
Select one:
a.
WiMax
b.
Ethernet
c.
FDDI (Fiber Distributed Data Interface)
d.
Token Ring
Feedback
Your answer is incorrect.
Question 4
Correct
Mark 1 out of 1
Flag question
Question text
It is a device that converts instructions from the network protocol stack into electric signals.
Select one:
a.
Network Adapter
b.
Firewall
c.
Router
d.
Switch
Feedback
Your answer is correct.
Question 5
Correct
Mark 1 out of 1
Flag question
Question text
It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic.
Select one:
a.
Wireless Local Area Network
b.
Metropolitan Area Network
c.
Visual Local Area Network
d.
Virtual Local Area Network
Feedback
Your answer is correct.
Question 6
Correct
Mark 1 out of 1
Flag question
Question text
It is the most common form of computer network.
Select one:
a.
Local Area Network
b.
Metropolitan Area Network
c.
Wide Area Network
d.
Campus Area Network
Feedback
Your answer is correct.
Question 7
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following is not a LAN Physical Topology?
Select one:
a.
Crown
b.
Hybrid
c.
Mesh
d.
Bus
Feedback
Your answer is correct.
Question 8
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following is not a Wireless LAN Standards?
Select one:
a.
802.11 h
b.
802.11 b
c.
802.11 n
d.
802.11 a
Feedback
Your answer is correct.
Question 9
Correct
Mark 1 out of 1
Flag question
Question text
It is a group of services hosted on a network which is a private structure and has
the internet-like service provision.
Select one:
a.
Extranet
b.
Intranet
c.
Cloud
d.
Internet
Feedback
Your answer is correct.
Question 10
Correct
Mark 1 out of 1
Flag question
Question text
It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority.
Select one:
a.
Firewall
b.
Router
c.
Switch
d.
Hub
Question 1
Correct
Mark 1 out of 1
Flag question
Question text
It a server that is used to access the corporate resources from outside the corporate network.
Select one:
a.
Remote Access Server
b.
None of the Choices
c.
DNS Server
d.
DHCP Server
Feedback
Your answer is correct.
Question 2
Correct
Mark 1 out of 1
Flag question
Question text
It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration.
Select one:
a.
None of the Choices
b.
DNS Server
c.
Remote Access Server
d.
DHCP Server
Feedback
Your answer is correct.
Question 3
Correct
Mark 1 out of 1
Flag question
Question text
It provides storage for the users' files and share folders that contain users' files.
Select one:
a.
File Server
b.
Application Server
c.
Web Server
d.
Domain Controller
Feedback
Your answer is correct.
Question 4
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following is not a Server Role of Windows Server 2008 R2?
Select one:
a.
Active Directory Domain Services
b.
Remote Desktop Services
c.
Windows Power Shell
d.
DHCP Server
Feedback
Your answer is correct.
Question 5
Correct
Mark 1 out of 1
Flag question
Question text
It holds a copy of AD DS and responds to request for active directory information.
Select one:
a.
Application Server
b.
File Server
c.
Domain Controller
d.
Web Server
Feedback
Your answer is correct.
Question 6
Correct
Mark 1 out of 1
Flag question
Question text
It allows you to control which role functionality is installed and enabled.
Select one:
a.
Role
b.
None of the choices
c.
Server Features
d.
Role Services
Feedback
Your answer is correct.
Question 7
Correct
Mark 1 out of 1
Flag question
Question text
It is the foundation of the Internet naming scheme and it supports accessing resources by using
alphanumeric names.
Select one:
a.
DHCP Server
b.
Remote Access Server
c.
DNS Server
d.
None of the Choices
Feedback
Your answer is correct.
Question 8
Correct
Mark 1 out of 1
Flag question
Question text
It is a computer that is dedicated to running network-aware application software.
Select one:
a.
Application Server
b.
File Server
c.
Domain Controller
d.
Web Server
It is a tool used to remove system-specific data from the Windows operating system,
configure windows to start in audit mode, configure the windows operating system to start
the Windows Welcome phase and reset Windows Product activation.
Select one:
a.
Loadstate
b.
Scanstate
c.
Imagex
d.
Sysprep
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
Select one:
a.
Migration
b.
None of the Choices
c.
Upgrade Installation
d.
Clean Installation
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following version of Windows are allowed for Upgrade?
Select one:
a.
Windows 95
b.
None of the choices
c.
Windows XP
d.
Windows Vista SP1
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is a downloadable application that helps windows user identify which edition of Windows
7 meets their needs.
Select one:
a.
Windows Upgrade Advisor
b.
User State Migration Tool
c.
Windows Easy Transfer
d.
None of the choices
Which of the following is not a Wireless LAN Standards?
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for,
and view information.
Select one:
a.
Usability
b.
Security
c.
Deployment
d.
Reliability and Performance
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is a tool used to remove system-specific data from the Windows operating system, configure
windows to start in audit mode, configure the windows operating system to start the Windows
Welcome phase and reset Windows Product activation.
Select one:
a.
Imagex
b.
Scanstate
c.
Loadstate
d.
Sysprep
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows.
Select one:
a.
Security
b.
Deployment
c.
Reliability and Performance
d.
Usability
Feedback
Your answer is correct.
Question 22
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which of the following is not a Specialized version of Windows 7?
Select one:
a.
Windows 7 Professional
b.
Windows 7 Ultimate
c.
Windows 7 Home Basic
d.
Windows 7 Enterprise
Feedback
Your answer is incorrect.
Question 23
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which of the following is not an advantage of installing a 64-bit edition of Windows 7?
Select one:
a.
More Memory
b.
Improved Security
c.
Improved Performance
d.
It supports 16-bit Windows on Windows (WOW) environment
Feedback
Your answer is incorrect.
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
Select one:
a.
None of the Choices
b.
Upgrade Installation
c.
Migration
d.
Clean Installation
Feedback
Your answer is correct.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained.
Select one:
a.
None of the Choices
b.
Upgrade Installation
c.
Clean Installation
d.
Migration
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is one of the Considerations on why using the option of Upgrade rather than Migrate.
Select one:
a.
Does not require the reinstallation of applications
b.
Typically, requires replacing existing computer hardware
c.
None of the choices
d.
Typically, requires more storage space
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following version of Windows are allowed for Upgrade?
Select one:
a.
Windows Vista SP1
b.
Windows XP
c.
None of the choices
d.
Windows 95
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is a downloadable application that helps windows user identify which edition of Windows 7
meets their needs.
Select one:
a.
User State Migration Tool
b.
None of the choices
c.
Windows Easy Transfer
d.
Windows Upgrade Advisor
Question 1
Incorrect
Mark 0 out of 1
Flag question
Question text
It is the measurement of how a system conforms to expected behavior
Select one:
a.
Usability
b.
Reliability
c.
Performance
d.
Security
Feedback
Your answer is incorrect.
Question 2
Correct
Mark 1 out of 1
Flag question
Question text
It enables the IT Administrators to automate one-to-several management of users and
computers.
Select one:
a.
Action Center
b.
Applocker
c.
Group Policy
d.
Control Panel
Feedback
Your answer is correct.
Question 3
Correct
Mark 1 out of 1
Flag question
Question text
It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks
Select one:
a.
b.
c.
Applocker
d.
Bitlocker
Feedback
Your answer is correct.
Question 4
Correct
Mark 1 out of 1
Flag question
Question text
It is an administrative tool for managing user settings and computer settings across a
network.
a.
None of the choices
b.
c.
d.
Windows Backup
Feedback
Your answer is correct.
Question 5
Correct
Mark 1 out of 1
Flag question
Question text
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that
using delete browsing history to maintain privacy because there are no logs kept or tracks
made during browsing
Select one:
a.
InPrivate Filtering
b.
Applocker
c.
Bitlocker
d.
InPrivate Browsing
Feedback
Your answer is correct.
Question 6
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following is not a Boot-option for troubleshooting startup problems?
Select one:
a.
b.
Safe Mode
c.
d.
Boot logging
Feedback
Your answer is correct.
Question 7
Correct
Mark 1 out of 1
Flag question
Question text
It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003.
Select one:
a.
b.
Group Policy
c.
d.
Question 8
Correct
Mark 1 out of 1
Flag question
Question text
It is one of the feature of Windows 7 that encrypts the computer operating system and data
stored on the operating system volume.
Select one:
a.
b.
Applocker
c.
Bitlocker
d.
Question 9
Correct
Mark 1 out of 1
Flag question
Question text
It is a software that is designed to deliberately harm a computer.
Select one:
a.
b.
Bitlocker
c.
Malicious Software
d.
Applocker
Feedback
Your answer is correct.
Question 10
Correct
Mark 1 out of 1
Flag question
Question text
Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Select one:
a.
b.
Reliability Monitor
c.
d.
Performance Monitor
Question 1
Correct
Mark 1 out of 1
Flag question
Question text
It is a type of IPv4 Address that is required by the devices and host that connect directly to
the Internet. This address must be unique, routable on the internet and must be assigned by
IANA.
Select one:
a.
Private IP Address
b.
Network Address
c.
Broadcast Address
d.
Public IP Address
Feedback
Your answer is correct.
Question 2
Correct
Mark 1 out of 1
Flag question
Question text
It specifies which part of an IPv4 address is the network ID and which part of the IPv4
address is the Host ID.
Select one:
a.
Default Gateway
b.
Host ID
c.
Network Address
d.
Subnet Mask
Feedback
Your answer is correct.
Question 3
Correct
Mark 1 out of 1
Flag question
Question text
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES)
encryption used by medium and large organization.
Select one:
a.
IEEE 802.1X
b.
WPA2-Personal
c.
WPA-Enterprise
d.
WPA-Personal
Feedback
Your answer is correct.
Question 4
Correct
Mark 1 out of 1
Flag question
Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:
a.
600mbps
b.
c.
54mbps
d.
11mbps
Feedback
Your answer is correct.
Question 5
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following is not an IPv6 Address types?
Select one:
a.
Multicast
b.
Anycast
c.
Unicast
d.
Broadcast
Feedback
Your answer is correct.
Question 6
Correct
Mark 1 out of 1
Flag question
Question text
It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files,
presentations or an internet connection among multiple computers and devices.
Select one:
a.
Bluetooth mode
b.
Wired mode
c.
Ad hoc mode
d.
Infrastructure mode
Feedback
Your answer is correct.
Question 7
Correct
Mark 1 out of 1
Flag question
Question text
It is a type of network that interconnect devices by means of radio waves instead of wires
and cables.
Select one:
a.
Wireless Network
b.
Wired Network
c.
d.
Question 8
Correct
Mark 1 out of 1
Flag question
Question text
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Select one:
a.
Network Address
b.
Default Gateway
c.
Host ID
d.
Subnet Mask
Feedback
Your answer is correct.
Question 9
Correct
Mark 1 out of 1
Flag question
Question text
172.16.0.0 /12 is what type of IPv4 Address.
Select one:
a.
Broadcast Address
b.
Public IP Address
c.
Host ID
d.
Private IP Address
Feedback
Your answer is correct.
Question 10
Correct
Mark 1 out of 1
Flag question
Question text
What type of notation does IP version 6 address uses?
Select one:
a.
Octal
b.
Binary
c.
Hexadecimal
d.
Decimal
Feedback
Your answer is correct.
Question 11
Correct
Mark 1 out of 1
Flag question
Question text
Strong EAP methods provide strong authentication
Select one:
a.
WPA-Enterprise
b.
IEEE 802.1X
c.
WPA2-Personal
d.
WPA-Personal
Feedback
Your answer is correct.
Question 12
Correct
Mark 1 out of 1
Flag question
Question text
How many bits are there in an IP version 6 address?
Select one:
a.
24 bits
b.
128 bits
c.
32 bits
d.
64 bits
Feedback
Your answer is correct.
Question 13
Correct
Mark 1 out of 1
Flag question
Question text
APIPA stands for:
Select one:
a.
b.
c.
d.
Question 14
Correct
Mark 1 out of 1
Flag question
Question text
Where will you see the Manage Wireless Networks tool in your PC?
Select one:
a.
Accessories
b.
Control Panel
c.
Program Files
d.
System Tools
Feedback
Your answer is correct.
Question 15
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following is not a way to improve the signal strength?
Select one:
a.
b.
c.
Check for devices that may cause interference
d.
Question 16
Correct
Mark 1 out of 1
Flag question
Question text
Which of the following statement is not correct?
Select one:
a.
You can configure the client computer by using the command line: netsh wlan
b.
You can configure the client computer by using the group policy
c.
You can configure the client computer by using the Network Dialog Box and following the
Wizard
d.
You can configure the client computer by going to the accessories in the start menu and
clicking the network options.
Feedback
Your answer is correct.
Question 17
Correct
Mark 1 out of 1
Flag question
Question text
What is the binary notation for the 255.255.255.0 subnet mask?
Select one:
a.
11111111.11111111.11111000.00000000
b.
11111111.11111111.11111110.00000000
c.
11111111.00000000.00000000.00000000
d.
11111111.11111111.11111111.00000000
Feedback
Your answer is correct.
Question 18
Correct
Mark 1 out of 1
Flag question
Question text
How many bits are there in an IP version 4 address?
Select one:
a.
24 bits
b.
128 bits
c.
32 bits
d.
64 bits
Feedback
Your answer is correct.
Question 1
Answer saved
Flag question
Question text
You are the system administrator for your company. You are configuring the services on a
Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart.
Which tab of the service`s Properties dialog box should you use?
Select one:
a.
Dependencies
b.
Log On
c.
Recovery
d.
General
Clear my choice
Question 2
Answer saved
Flag question
Question text
Where will you see the Manage Wireless Networks tool in your PC?
Select one:
a.
Program Files
b.
Control Panel
c.
System Tools
d.
Accessories
Clear my choice
Question 3
Answer saved
Flag question
Question text
How many bits are there in an IP version 6 address?
Select one:
a.
128 bits
b.
24 bits
c.
64 bits
d.
32 bits
Clear my choice
Question 4
Answer saved
Flag question
Question text
It is a windows 7 feature that enables support staff to connect to a remote desktop computer.
Select one:
a.
Remote Assistance
b.
c.
d.
Remote Desktop
Clear my choice
Question 5
Answer saved
Flag question
Question text
You are evaluating the purchase a netbook computer that has the following hardware:
1.6-gigahertz (GHz) 32-bit processor
1024-MB RAM
1 video card that uses shared memory
4-G8 solid state drive
You need to ensure that you can install Windows 7 Enterprise on the netbook computer. Which
hardware component should you change or add?
Select one:
a.
video card
b.
storage device
c.
ram
d.
processor
Clear my choice
Question 6
Answer saved
Flag question
Question text
It caches content from remote and web servers in the branch location so users can quickly
access the content. This cache can be hosted centrally in the branch location or distributed
across user PCs.
Select one:
a.
BranchCache
b.
DirectAccess
c.
Remote Desktop
d.
Remote Assistance
Clear my choice
Question 7
Answer saved
Flag question
Question text
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is
allowed to run on user desktops.
Select one:
a.
Applocker
b.
c.
Bitlocker
d.
Clear my choice
Question 8
Answer saved
Flag question
Question text
It is a type of network that interconnect devices by means of radio waves instead of wires and
cables.
Select one:
a.
b.
Wired Network
c.
Virtual Local Area Network
d.
Wireless Network
Clear my choice
Question 9
Answer saved
Flag question
Question text
You are the network administrator for a small company that has just switched its machines from
Windows XP to Windows Vista and Windows 7. One of the users who has Windows Vista asks
you why there is a vertical sidebar on the screen. What feature of Windows Vista is this?
Select one:
a.
Windows Sidebar
b.
Parental controls
c.
Windows Firewall
d.
Jump List
Clear my choice
Question 10
Answer saved
Question text
Which of the following is not a Performance Monitor tool?
Select one:
a.
Reports
b.
Monitoring Tools
c.
d.
Clear my choice
Question 11
Answer saved
Flag question
Question text
You are a desktop administrator for an enterprise organization. A user applies a device update
from the manufacturer, and now the computer is displaying error messages. The user has critical
documents on the computer that need to be preserved. You need to restore the computer to an
operating state and preserve applications and data. What should you do?
Select one:
a.
Boot Windows by using the Last Known Good Configuration
b.
c.
d.
Clear my choice
Question 12
Answer saved
Flag question
Question text
What type of notation does IP version 6 address uses?
Select one:
a.
Binary
b.
Octal
c.
Decimal
d.
Hexadecimal
Clear my choice
Question 13
Answer saved
Flag question
Question text
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using
delete browsing history to maintain privacy because there are no logs kept or tracks made
during browsing
Select one:
a.
InPrivate Filtering
b.
Applocker
c.
InPrivate Browsing
d.
Bitlocker
Clear my choice
Question 14
Answer saved
Flag question
Question text
It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is
the Host ID.
Select one:
a.
Network Address
b.
Default Gateway
c.
Host ID
d.
Subnet Mask
Clear my choice
Question 15
Answer saved
Flag question
Question text
Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Select one:
a.
b.
Performance Monitor
c.
Reliability Monitor
d.
Clear my choice
Question 16
Answer saved
Flag question
Question text
Your company network includes desktop computers that have Windows 7 installed. Microsoft
updates are applied automatically at a scheduled time. A use1- reports that a proprietary
application has stopped working. You need to uninstall the most recent update from Microsoft.
What should you do first?
Select one:
a.
b.
c.
d.
Clear my choice
Question 17
Answer saved
Question text
You manage a network device by using a web interface. You perform all critical Windows
updates so that the computer now runs Internet Explorer 10. After performing these updates,
the layout of the network device web page displays incorrectly. Other web pages display
correctly. You need to resolve this issue. What should you do?
Select one:
a.
b.
c.
Add the network device web page to the trusted sites zone
d.
Clear my choice
Question 18
Answer saved
Flag question
Question text
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES)
encryption used by medium and large organization.
Select one:
a.
IEEE 802.1X
b.
WPA-Enterprise
c.
WPA-Personal
d.
WPA2-Personal
Clear my choice
Question 19
Answer saved
Flag question
Question text
It is a security feature that simplifies the ability of users to run as standard users and perform all
neccessary daily tasks
Select one:
a.
Bitlocker
b.
Applocker
c.
d.
Question 20
Answer saved
Flag question
Question text
Your company has asked you to implement Network Access Protection(NAP) on the network.
You already have Windows Server 2008 installed on your servers but your organization wants to
know which client operating systems will support NAP. What operating system does not support
NAP?
Select one:
a.
Windows 7
b.
Windows Vista
c.
d.
Clear my choice
Question 21
Answer saved
Flag question
Question text
Which of the following statement is not correct?
Select one:
a.
You can configure the client computer by using the Network Dialog Box and following the
Wizard
b.
You can configure the client computer by using the group policy
c.
You can configure the client computer by using the command line: netsh wlan
d.
You can configure the client computer by going to the accessories in the start menu and clicking
the network options.
Clear my choice
Question 22
Answer saved
Flag question
Question text
You are the system administrator for a large organization that uses Windows Server R2 and
Windows 7. You have a Windows 7 machine and have enabled System Protection. You want the
machine to retain only the last System Protection snapshot that was taken. What should you do?
Select one:
a.
b.
Run Disk Cleanup for System Restore and then run Shadow Copies
c.
Set the Keep Only Last Shadow Copy option in System Protection
d.
Enable Shadow Copies and then set the Keep Only Last Shadow Copy option
Clear my choice
Question 23
Answer saved
Flag question
Question text
Which of the following is not a way to improve the signal strength?
Select one:
a.
b.
c.
d.
Clear my choice
Question 24
Answer saved
Question text
It is one of the features of Mobile Computers wherein it synchronizes various content including
music, video, contacts, calendar events, web browser favorites and other files between Windows
Mobile devices and Windows 7
Select one:
a.
Sync Center
b.
c.
d.
Power Options
Clear my choice
Question 25
Answer saved
Flag question
Question text
It is a software that is designed to deliberately harm a computer.
Select one:
a.
Applocker
b.
Malicious Software
c.
d.
Bitlocker
Clear my choice
Question 26
Answer saved
Flag question
Question text
You have a computer that runs Windows 7. The computer is a member of a workgroup. You use
Encrypting File System (EFS) to protect your local files. You need to ensure that you can decrypt
EFS files on the computer if you forget your password. What should you do?
Select one:
a.
b.
c.
From BitLocker Drive Encryption, Select Manage BitLocker and Turn On BitLocker
d.
Question 27
Answer saved
Flag question
Question text
Provides a timeline of system changes and reliability. It also provides a system stability chart and
reports on software installations and software or hardware failures.
Select one:
a.
b.
Performance Monitor
c.
Reliability Monitor
d.
Clear my choice
Question 28
Answer saved
Flag question
Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:
a.
b.
Bitlocker
c.
d.
Applocker
Clear my choice
Question 29
Answer saved
Flag question
Question text
You are the network administrator for Stellacon Corporation. User in the sales department have
been complaining that the Sales application is slow to load. Using Performance Monitor, you
create a baseline report for one of the computers, monitoring memory, the processor, the disk
subsystem, and the network subsystem. You notice that the disk subsystem has a high load of
activity. What other subsystem should you monitor before you can know for sure whether you
have a disk subsystem bottleneck?
Select one:
a.
Application
b.
Network
c.
Processor
d.
Memory
Clear my choice
Question 30
Answer saved
Flag question
Question text
It allows the administrators to identify which software is allowed to run and was initially added
to Windows XP and Windows Server 2003.
Select one:
a.
b.
c.
Group Policy
d.
Clear my choice
Question 31
Answer saved
Marked out of 1.00
Flag question
Question text
You are the network administrator for a large organization that uses both Windows Server 2008
R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily. You perform
an image backup on the Windows 7 machine. The Windows 7 machine then gets struck by a
virus and will not start up properly. What can you do to get the Windows 7 machine up and
running the fastest possible way?
Select one:
a.
Because of the virus, the best things is to rebuild the machine from scratch
b.
Use a Windows 7 boot disk and run the Image Restore utility
c.
Start the computer from the Windows 7 DVD and then use the Image Restore utility
d.
Start the computer from the Windows 7 DVD and then use the System Image Recovery tool
Clear my choice
Question 32
Answer saved
Flag question
Question text
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that
runs Windows 7. You want to deploy a Windows image (WIM) file to other computers in the
domain. You need to capture the operating system, computer configuration, and applications
installed on the computer to a WIM file. What should you do before you capture the image?
Select one:
a.
Run Diskpart.exe
b.
Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk
c.
Run ScanState.exe
d.
Run Defrag.exe
Clear my choice
Question 33
Answer saved
Flag question
Question text
It provides transparent access to internal network resources whenever they are connected to the
Internet. It also enables the IT Professionals to manage remote computers outside of the office
and does not require a VPN connection.
Select one:
a.
BranchCache
b.
Remote Assistance
c.
DirectAccess
d.
Remote Desktop
Clear my choice
Question 34
Answer saved
Flag question
Question text
How many bits are there in an IP version 4 address?
Select one:
a.
32 bits
b.
128 bits
c.
64 bits
d.
24 bits
Clear my choice
Question 35
Answer saved
Question text
Alexandria is the payroll manager and stores critical file on her local drive for added security on
her Windows 7 computer. She wants to ensure that she is using the disk configuration with the
most fault tolerance and the highest level of consistent availability. Which of the following
provisions should she use?
Select one:
a.
Mirrored volumes
b.
Spanned volumes
c.
Disk striping
d.
Extended volumes
Clear my choice
Question 36
Answer saved
Flag question
Question text
APIPA stands for:
Select one:
a.
Association of Pacific Island Public Auditors
b.
c.
d.
Clear my choice
Question 37
Answer saved
Flag question
Question text
You are the network administrator for your organization. You have been asked by the owner of
the company to verify that all drivers installed on the Windows 7 machines are signed drivers.
How do you accomplish this task?
Select one:
a.
b.
c.
d.
Question 38
Answer saved
Flag question
Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:
a.
b.
600mbps
c.
11mbps
d.
54mbps
Clear my choice
Question 39
Answer saved
Flag question
Question text
It is an administrative tool for managing user settings and computer settings across a network.
a.
Windows Backup
b.
c.
d.
Clear my choice
Question 40
Answer saved
Flag question
Question text
It enables the IT Administrators to automate one-to-several management of users and
computers.
Select one:
a.
Applocker
b.
Action Center
c.
Control Panel
d.
Group Policy
Clear my choice
Question 41
Answer saved
Flag question
Question text
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the
keyboard speed and the mouse pointer rate. Which utility should she use to configure the
keyboard and mouse properties?
Select one:
a.
b.
Registry Editor
c.
Computer Management
d.
Control Panel
Clear my choice
Question 42
Answer saved
Flag question
Question text
Strong EAP methods provide strong authentication
Select one:
a.
WPA-Enterprise
b.
WPA2-Personal
c.
IEEE 802.1X
d.
WPA-Personal
Clear my choice
Question 43
Answer saved
Flag question
Question text
It is the built-in encryption tool for Windows file systems
Select one:
a.
b.
Bitlocker
c.
Applocker
d.
Clear my choice
Question 44
Answer saved
Flag question
Question text
It is the measurement of how a system conforms to expected behavior
Select one:
a.
Security
b.
Performance
c.
Usability
d.
Reliability
Clear my choice
Question 45
Answer saved
Question text
You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at
your company has a network projector installed on a server within the company network. You
need to connect to the projector from your computer. What should you do?
Select one:
a.
b.
c.
d.
Clear my choice
Question 46
Answer saved
Flag question
Question text
This Power plan saves power on a mobile computer by reducing system performance. Its
primary purpose is to maximize the battery life.
Select one:
a.
High Performance
b.
c.
Balanced
d.
Power Saver
Clear my choice
Question 47
Answer saved
Flag question
Question text
This are equivalents to door locks, employee badges and security systems. It protects the
computer and networks from intrusions.
Select one:
a.
Bitlocker
b.
Group Policy
c.
Firewall
d.
Internet
Clear my choice
Question 48
Answer saved
Flag question
Question text
Which of the following is not a Boot-option for troubleshooting startup problems?
Select one:
a.
Safe Mode
b.
c.
d.
Boot logging
Clear my choice
Question 49
Answer saved
Flag question
Question text
It is a method of turning a computer on or off wherein the system state is saved to memory.
Select one:
a.
Restart
b.
Shut Down
c.
Sleep or Standby
d.
Hibernate
Clear my choice
Question 50
Answer saved
Flag question
Question text
You are the network manager for a small company. You have a junior IT administrator who did
some installations last week on a Windows 7 machine. How can you see what applications were
installed last week on the Windows 7 machine?
Select one:
a.
b.
c.
d.
View the data collector sets
Clear my choice
Question 51
Answer saved
Flag question
Question text
This are point-to-point connection across a private or public network. It uses special protocols,
called tunneling protocol to make a virtual call to a virtual port.
Select one:
a.
b.
Remote Desktop
c.
Remote Assitance
d.
Clear my choice
Question 52
Answer saved
Flag question
Question text
It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files, presentations
or an internet connection among multiple computers and devices.
Select one:
a.
Ad hoc mode
b.
Bluetooth mode
c.
Infrastructure mode
d.
Wired mode
Clear my choice
Question 53
Answer saved
Flag question
Question text
It is a central location for viewing messages about your system and the starting point for
diagnosing and solving issues with your system.
Select one:
a.
Applocker
b.
Control Panel
c.
Action Center
d.
Group Policy
Clear my choice
Question 54
Answer saved
Flag question
Question text
It provides assistance in resolving network-related issues
Select one:
a.
Reliability Monitor
b.
c.
d.
Performance Monitor
Clear my choice
Question 55
Answer saved
Question text
You are the network administrator for a large organization. You are in charge of implementing
company policies. One company policy states that you have to prevent Internet Explorer from
saving any data during a user`s browsing session. How do you accomplish this?
Select one:
a.
b.
c.
d.
Clear my choice
Question 56
Answer saved
Flag question
Question text
What is the binary notation for the 255.255.255.0 subnet mask?
Select one:
a.
11111111.00000000.00000000.00000000
b.
11111111.11111111.11111111.00000000
c.
11111111.11111111.11111000.00000000
d.
11111111.11111111.11111110.00000000
Clear my choice
Question 57
Answer saved
Flag question
Question text
You are the administrator for a large organization with multiple Windows Server 2008 domain
controllers and multiple domains. You have a Windows 7 machine that is set up for all users to
access. You have an application called StellApp.exe that everyone on this Windows 7 computer
can use except for the sales group. How do you stop the sales group from accessing this one
application?
Select one:
a.
b.
c.
d.
Deny the Everyone group the rights to the application
Clear my choice
Question 58
Answer saved
Flag question
Question text
It is a type of IPv4 Address that is required by the devices and host that connect directly to the
Internet. This address must be unique, routable on the internet and must be assigned by IANA.
Select one:
a.
Network Address
b.
Public IP Address
c.
Broadcast Address
d.
Private IP Address
Clear my choice
Question 59
Answer saved
Flag question
Question text
It is a windows 7 feature that enables user to connect to their desktop computer from another
device.
Select one:
a.
b.
Remote Assistance
c.
Remote Desktop
d.
Clear my choice
Question 60
Answer saved
Flag question
Question text
It is the measurement on how quickly the computer completes a task.
Select one:
a.
Security
b.
Usability
c.
Performance
d.
Reliability
Clear my choice
Question 61
Answer saved
Flag question
Question text
Which of the following is not an IPv6 Address types?
Select one:
a.
Anycast
b.
Multicast
c.
Broadcast
d.
Unicast
Clear my choice
Question 62
Answer saved
Question text
You administer an Active Directory domain that includes portable computers that have Windows
7 SP1 installed. You log on to one of the portable computers by using a domain user account
and install a new device for a bar-code scanner. You restart the portable computer after
installing the new device driver. You successfully log on to the computer by using a domain user
account. After logging on, you discover that the bar-code scanner is not working due to a driver
error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You
need to be able to roll back the driver to its previous version. What should you do?
Select one:
a.
b.
Start the computer and select Last Known Good Configuration from the advanced startup
options
c.
d.
Start the portable computer from the Windows 7 installation media and select Startup Repair
Clear my choice
Question 63
Answer saved
Flag question
Question text
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Select one:
a.
Subnet Mask
b.
Network Address
c.
Default Gateway
d.
Host ID
Clear my choice
Question 64
Answer saved
Flag question
Question text
172.16.0.0 /12 is what type of IPv4 Address.
Select one:
a.
Host ID
b.
Public IP Address
c.
Broadcast Address
d.
Private IP Address