KEMBAR78
Operating Systems Quiz & Exam Guide | PDF | Ip Address | Computer Network
100% found this document useful (1 vote)
867 views140 pages

Operating Systems Quiz & Exam Guide

The document contains a quiz on principles of operating systems and their applications. It consists of 12 multiple choice questions testing knowledge of physical and logical components of computer networks like WAN, LAN, VLAN, wireless standards, network devices, Windows server roles, and key features of Windows 7. The quiz covers topics relating to network architecture, components, protocols, and operating systems.

Uploaded by

ray bryant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
867 views140 pages

Operating Systems Quiz & Exam Guide

The document contains a quiz on principles of operating systems and their applications. It consists of 12 multiple choice questions testing knowledge of physical and logical components of computer networks like WAN, LAN, VLAN, wireless standards, network devices, Windows server roles, and key features of Windows 7. The quiz covers topics relating to network architecture, components, protocols, and operating systems.

Uploaded by

ray bryant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 140

Principles of Operating Systems and Its Applications

By; langga

PRELIM QUIZ 1
Question 1
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not a Physical WAN Components?
Select one:

a.

Bridge

b.

Network Adapter

c.

Backbone

d.

Leased Lines
Feedback
Your answer is correct.

Question 2
Correct
Mark 1 out of 1

Flag question

Question text
It is a device that converts instructions from the network protocol stack into electric signals.
Select one:

a.

Network Adapter

b.

Router

c.

Switch

d.

Firewall
Feedback
Your answer is correct.

Question 3
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not the common network architecture types?
Select one:

a.
WiMax

b.

FDDI (Fiber Distributed Data Interface)

c.

Token Ring

d.

Ethernet
Feedback
Your answer is correct.

Question 4
Correct

Mark 1 out of 1

Flag question

Question text
What is the IEEE 802 Standards for Local Wireless Networks?
Select one:

a.

IEEE 802.3

b.

IEEE 802.5

c.

IEEE 802.11

d.

IEEE 802.16
Feedback
Your answer is correct.

Question 5
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not a LAN Physical Topology?
Select one:

a.

Mesh

b.

Bus

c.

Crown

d.

Hybrid
Feedback
Your answer is correct.

Question 6
Correct

Mark 1 out of 1

Flag question

Question text
It is a group of services hosted on a network which is a private structure and has
the internet-like service provision.
Select one:

a.

Extranet

b.

Cloud

c.

Internet

d.

Intranet
Feedback
Your answer is correct.

Question 7
Correct

Mark 1 out of 1

Flag question

Question text
It is the most common form of computer network.
Select one:

a.

Wide Area Network

b.

Campus Area Network

c.
Local Area Network

d.

Metropolitan Area Network


Feedback
Your answer is correct.

Question 8
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not a Wireless LAN Standards?
Select one:

a.

802.11 a

b.

802.11 b

c.

802.11 h

d.

802.11 n
Feedback
Your answer is correct.

Question 9
Correct

Mark 1 out of 1
Flag question

Question text
It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic.
Select one:

a.

Virtual Local Area Network

b.

Wireless Local Area Network

c.

Visual Local Area Network

d.

Metropolitan Area Network


Feedback
Your answer is correct.

Question 10
Correct

Mark 1 out of 1

Flag question

Question text
It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority.
Select one:
a.

Hub

b.

Router

c.

Firewall

d.

Switch
Feedback
Your answer is correct.

PRELIM QUIZ 2
Question 1
Correct

Mark 1 out of 1

Flag question

Question text
It allows you to control which role functionality is installed and enabled.
Select one:

a.

Role

b.

Role Services

c.

None of the choices


d.

Server Features
Feedback
Your answer is correct.
Question 2
Correct

Mark 1 out of 1

Flag question

Question text
Which of the following is not a Server Role of Windows Server 2008 R2?
Select one:

a.

Windows Power Shell

b.

DHCP Server

c.

Remote Desktop Services

d.

Active Directory Domain Services


Feedback
Your answer is correct.
Question 3
Correct

Mark 1 out of 1

Flag question
Question text
It provides storage for the users' files and share folders that contain users' files.
Select one:

a.

Web Server

b.

Domain Controller

c.

File Server

d.

Application Server
Feedback
Your answer is correct.
Question 4
Correct

Mark 1 out of 1

Flag question

Question text
It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration.
Select one:

a.

DNS Server

b.

Remote Access Server

c.

None of the Choices


d.

DHCP Server
Feedback
Your answer is correct.
Question 5
Correct

Mark 1 out of 1

Flag question

Question text
It a server that is used to access the corporate resources from outside the corporate network.
Select one:

a.

DHCP Server

b.

DNS Server

c.

None of the Choices

d.

Remote Access Server


Feedback
Your answer is correct.
Question 6
Correct

Mark 1 out of 1

Flag question
Question text
It is a computer that is dedicated to running network-aware application software.
Select one:

a.

Domain Controller

b.

Web Server

c.

File Server

d.

Application Server
Feedback
Your answer is correct.
Question 7
Correct

Mark 1 out of 1

Flag question

Question text
It holds a copy of AD DS and responds to request for active directory information.
Select one:

a.

Application Server

b.

File Server

c.

Domain Controller
d.

Web Server
Feedback
Your answer is correct.
Question 8
Correct

Mark 1 out of 1

Flag question

Question text
It is the foundation of the Internet naming scheme and it supports accessing resources by using
alphanumeric names.
Select one:

a.

DHCP Server

b.

None of the Choices

c.

Remote Access Server

d.

DNS Server
Feedback
Your answer is correct.

PRELIM EXAM
Question 1
Correct

Mark 2.00 out of 2.00


Flag question

Question text
Which of the following is not a Physical WAN Components?
Select one:

a.

Bridge

b.

Backbone

c.

Leased Lines

d.

Network Adapter
Feedback
Your answer is correct.

Question 2
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is a group of services hosted on a network which is a private structure and has
the internet-like service provision.
Select one:

a.
Intranet

b.

Extranet

c.

Internet

d.

Cloud
Feedback
Your answer is correct.

Question 3
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
Select one:

a.

Upgrade Installation

b.

Migration

c.

Clean Installation

d.

None of the Choices


Feedback
Your answer is correct.

Question 4
Correct

Mark 2.00 out of 2.00

Flag question

Question text
What is the IEEE 802 Standards for Local Wireless Networks?
Select one:

a.

IEEE 802.3

b.

IEEE 802.11

c.

IEEE 802.16

d.

IEEE 802.5
Feedback
Your answer is correct.

Question 5
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is the most common form of computer network.
Select one:

a.

Local Area Network

b.

Campus Area Network

c.

Wide Area Network

d.

Metropolitan Area Network


Feedback
Your answer is correct.

Question 6
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is a device that converts instructions from the network protocol stack into electric signals.
Select one:

a.

Firewall

b.

Network Adapter

c.

Switch
d.

Router
Feedback
Your answer is correct.

Question 7
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration.
Select one:

a.

DNS Server

b.

Remote Access Server

c.

DHCP Server

d.

None of the Choices


Feedback
Your answer is correct.

Question 8
Correct

Mark 2.00 out of 2.00


Flag question

Question text
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search
for, and view information.
Select one:

a.

Reliability and Performance

b.

Security

c.

Deployment

d.

Usability
Feedback
Your answer is correct.

Question 9
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority.
Select one:
a.

Firewall

b.

Router

c.

Switch

d.

Hub
Feedback
Your answer is correct.

Question 10
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows.
Select one:

a.

Deployment

b.

Security

c.

Usability
d.

Reliability and Performance


Feedback
Your answer is correct.

Question 11
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It holds a copy of AD DS and responds to request for active directory information.
Select one:

a.

Domain Controller

b.

File Server

c.

Web Server

d.

Application Server
Feedback
Your answer is correct.

Question 12
Correct

Mark 2.00 out of 2.00


Flag question

Question text
It is the foundation of the Internet naming scheme and it supports accessing resources by
using alphanumeric names.
Select one:

a.

DHCP Server

b.

Remote Access Server

c.

None of the Choices

d.

DNS Server
Feedback
Your answer is correct.

Question 13
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It allows you to control which role functionality is installed and enabled.
Select one:

a.
Role

b.

None of the choices

c.

Role Services

d.

Server Features
Feedback
Your answer is correct.

Question 14
Correct

Mark 2.00 out of 2.00

Flag question

Question text
Which of the following is not a Specialized version of Windows 7?
Select one:

a.

Windows 7 Home Basic

b.

Windows 7 Professional

c.

Windows 7 Enterprise

d.

Windows 7 Ultimate
Feedback
Your answer is correct.

Question 15
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained.
Select one:

a.

None of the Choices

b.

Clean Installation

c.

Migration

d.

Upgrade Installation
Feedback
Your answer is correct.

Question 16
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is a tool used to remove system-specific data from the Windows operating system,
configure windows to start in audit mode, configure the windows operating system to start
the Windows Welcome phase and reset Windows Product activation.
Select one:

a.

Sysprep

b.

Loadstate

c.

Scanstate

d.

Imagex
Feedback
Your answer is correct.

Question 17
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It a server that is used to access the corporate resources from outside the corporate
network.
Select one:

a.

DHCP Server

b.

None of the Choices


c.

Remote Access Server

d.

DNS Server
Feedback
Your answer is correct.

Question 18
Correct

Mark 2.00 out of 2.00

Flag question

Question text
Which of the following is not a Wireless LAN Standards?
Select one:

a.

802.11 a

b.

802.11 h

c.

802.11 b

d.

802.11 n
Feedback
Your answer is correct.

Question 19
Correct

Mark 2.00 out of 2.00


Flag question

Question text
Which of the following is not an advantage of installing a 64-bit edition of Windows 7?
Select one:

a.

Improved Security

b.

It supports 16-bit Windows on Windows (WOW) environment

c.

Improved Performance

d.

More Memory
Feedback
Your answer is correct.

Question 20
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It provides storage for the users' files and share folders that contain users' files.
Select one:

a.

Domain Controller
b.

File Server

c.

Web Server

d.

Application Server
Feedback
Your answer is correct.

Question 21
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It is a computer that is dedicated to running network-aware application software.
Select one:

a.

Application Server

b.

File Server

c.

Domain Controller

d.

Web Server
Feedback
Your answer is correct.
Question 22
Correct

Mark 2.00 out of 2.00

Flag question

Question text
Which of the following is not the common network architecture types?
Select one:

a.

Token Ring

b.

FDDI (Fiber Distributed Data Interface)

c.

WiMax

d.

Ethernet
Feedback
Your answer is correct.

Question 23
Correct

Mark 2.00 out of 2.00

Flag question

Question text
It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic.
Select one:

a.

Metropolitan Area Network

b.

Wireless Local Area Network

c.

Visual Local Area Network

d.

Virtual Local Area Network


Feedback
Your answer is correct.

Question 24
Correct

Mark 2.00 out of 2.00

Flag question

Question text
Which of the following is not a LAN Physical Topology?
Select one:

a.

Mesh

b.

Hybrid

c.

Bus

d.
Crown
Feedback
Your answer is correct.

Question 25
Correct

Mark 2.00 out of 2.00

Flag question

Question text
Which of the following is not a Server Role of Windows Server 2008 R2?
Select one:

a.

Remote Desktop Services

b.

Windows Power Shell

c.

DHCP Server

d.

Active Directory Domain Services


Feedback
Your answer is correct.

MIDTERM QUIZ 1
Question 1
Correct

Mark 2 out of 2
Flag question

Question text
Which of the following is not a Specialized version of Windows 7?
Select one:

a.

Windows 7 Home Basic

b.

Windows 7 Ultimate

c.

Windows 7 Enterprise

d.

Windows 7 Professional
Feedback
Your answer is correct.
Question 2
Correct

Mark 2 out of 2

Flag question

Question text
It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained.
Select one:

a.

Migration
b.

None of the Choices

c.

Clean Installation

d.

Upgrade Installation
Feedback
Your answer is correct.
Question 3
Correct

Mark 2 out of 2

Flag question

Question text
Which of the following version of Windows are allowed for Upgrade?
Select one:

a.

Windows XP

b.

None of the choices

c.

Windows 95

d.

Windows Vista SP1


Feedback
Your answer is correct.
Question 4
Correct
Mark 2 out of 2

Flag question

Question text
It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware,
running more reliably and providing more consistent performance than previous versions of
Windows.
Select one:

a.

Reliability and Performance

b.

Security

c.

Usability

d.

Deployment
Feedback
Your answer is correct.
Question 5
Correct

Mark 2 out of 2

Flag question

Question text
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition.
Select one:
a.

None of the Choices

b.

Clean Installation

c.

Upgrade Installation

d.

Migration
Feedback
Your answer is correct.
Question 6
Correct

Mark 2 out of 2

Flag question

Question text
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for,
and view information.
Select one:

a.

Reliability and Performance

b.

Security

c.

Usability

d.

Deployment
Feedback
Your answer is correct.
Question 7
Correct

Mark 2 out of 2

Flag question

Question text
It is a downloadable application that helps windows user identify which edition of Windows 7
meets their needs.
Select one:

a.

Windows Upgrade Advisor

b.

Windows Easy Transfer

c.

User State Migration Tool

d.

None of the choices


Feedback
Your answer is correct.
Question 8
Correct

Mark 2 out of 2

Flag question

Question text
It is a tool used to remove system-specific data from the Windows operating system, configure
windows to start in audit mode, configure the windows operating system to start the Windows
Welcome phase and reset Windows Product activation.
Select one:

a.

Scanstate

b.

Sysprep

c.

Loadstate

d.

Imagex
Feedback
Your answer is correct.
Question 9
Correct

Mark 2 out of 2

Flag question

Question text
It is one of the Considerations on why using the option of Upgrade rather than Migrate.
Select one:

a.

Typically, requires more storage space

b.

None of the choices

c.

Does not require the reinstallation of applications


d.

Typically, requires replacing existing computer hardware


Feedback
Your answer is correct.
Question 10
Correct

Mark 2 out of 2

Flag question

Question text
Which of the following is not an advantage of installing a 64-bit edition of Windows 7?
Select one:

a.

Improved Security

b.

It supports 16-bit Windows on Windows (WOW) environment

c.

More Memory

d.

Improved Performance
Feedback
Your answer is correct.

MIDTERM QUIZ 2
Question 1
Correct

Mark 2 out of 2
Flag question

Question text
It is a collection of user accounts, computer accounts, contacts and other groups that you
can manage as a single unit.
Select one:

a.

User Account

b.

Domain User

c.

Groups

d.

Domain Controller
Feedback
Your answer is correct.

Question 2
Correct

Mark 3 out of 3

Flag question

Question text
It enables users to log on to the domain to gain access to the network resources and it is
reside in Active Directory.
Select one:

a.
None of the Choices

b.

Built-in User Accounts

c.

Local User Accounts

d.

Domain User Accounts


Feedback
Your answer is correct.

Question 3
Correct

Mark 2 out of 2

Flag question

Question text
It is a collection of Domain Trees.
Select one:

a.

Global

b.

Universal

c.

Domain Local

d.

Forest
Feedback
Your answer is correct.

Question 4
Correct

Mark 2 out of 2

Flag question

Question text
Which of the following is a main type of group?
Select one:

a.

Distribution

b.

Universal

c.

Domain Local

d.

Global
Feedback
Your answer is correct.

Question 5
Correct

Mark 3 out of 3

Flag question

Question text
It enables the user to log on and access resources on a specific computer and usually reside
in SAM.
Select one:

a.

Local User Accounts

b.

Domain User Accounts

c.

None of the Choices

d.

Built-in User Accounts


Feedback
Your answer is correct.

Question 6
Correct

Mark 3 out of 3

Flag question

Question text
It is an object that contains all of the information that defines a user in Windows Server
2008 R2.
Select one:

a.

User Account

b.

Domain User
c.

Groups

d.

Domain Controller
Feedback
Your answer is correct.

Question 7
Correct

Mark 3 out of 3

Flag question

Question text
It enables IT Administrator to automate one-to-many management of users and computers.
Select one:

a.

Group Policy

b.

None of the Choices

c.

Organizational Units

d.

Nesting Groups
Feedback
Your answer is correct.

Question 8
Correct

Mark 2 out of 2
Flag question

Question text
It provides authenticaltion, host operations of master roles, hosting the global catalog and
support group policies and sysvol.
Select one:

a.

Domain Controller

b.

User Accounts

c.

Groups

d.

Domain User
Feedback
Your answer is correct.

FINAL QUIZ 1
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How many bits are there in an IP version 4 address?
Select one:
a.

32 bits

b.

64 bits

c.

128 bits

d.

24 bits
Feedback
Your answer is correct.
The correct answer is: 32 bits

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
APIPA stands for:
Select one:

a.

Automatic Private IP Addressing

b.

Association of Pacific Island Public Auditors

c.

Automatic Protocol for Internet Public Address

d.
Asia Pacific Intellectual Property Association
Feedback
Your answer is correct.
The correct answer is: Automatic Private IP Addressing

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the binary notation for the 255.255.255.0 subnet mask?
Select one:

a.

11111111.11111111.11111110.00000000

b.

11111111.11111111.11111111.00000000

c.

11111111.11111111.11111000.00000000

d.

11111111.00000000.00000000.00000000
Feedback
Your answer is correct.
The correct answer is: 11111111.11111111.11111111.00000000

Question 4
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It specifies which part of an IPv4 address is the network ID and which part of the IPv4
address is the Host ID.
Select one:

a.

Default Gateway

b.

Subnet Mask

c.

Host ID

d.

Network Address
Feedback
Your answer is correct.
The correct answer is: Subnet Mask

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Select one:
a.

Subnet Mask

b.

Network Address

c.

Default Gateway 

d.

Host ID
Feedback
Your answer is correct.
The correct answer is: Default Gateway

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a type of IPv4 Address that is required by the devices and host that connect directly to
the Internet. This address must be unique, routable on the internet and must be assigned by
IANA.
Select one:

a.

Broadcast Address

b.

Network Address

c.
Public IP Address

d.

Private IP Address
Feedback
Your answer is correct.
The correct answer is: Public IP Address

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
172.16.0.0 /12 is what type of IPv4 Address.
Select one:

a.

Public IP Address

b.

Broadcast Address

c.

Host ID

d.

Private IP Address
Feedback
Your answer is correct.
The correct answer is: Private IP Address

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
How many bits are there in an IP version 6 address?
Select one:

a.

64 bits

b.

32 bits

c.

128 bits

d.

24 bits
Feedback
Your answer is correct.
The correct answer is: 128 bits

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of notation does IP version 6 address uses?
Select one:
a.

Binary

b.

Decimal

c.

Octal

d.

Hexadecimal
Feedback
Your answer is correct.
The correct answer is: Hexadecimal

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not an IPv6 Address types?
Select one:

a.

Multicast

b.

Unicast

c.

Broadcast

d.
Anycast
Feedback
Your answer is correct.
The correct answer is: Broadcast

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a type of network that interconnect devices by means of radio waves instead of wires
and cables.
Select one:

a.

Campus Area Network

b.

Wireless Network

c.

Virtual Local Area Network

d.

Wired Network
Feedback
Your answer is correct.
The correct answer is: Wireless Network

Question 12
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES)
encryption used by medium and large organization.
Select one:

a.

WPA-Enterprise

b.

IEEE 802.1X

c.

WPA-Personal

d.

WPA2-Personal
Feedback
Your answer is correct.
The correct answer is: WPA-Enterprise

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Strong EAP methods provide strong authentication
Select one:
a.

WPA-Enterprise

b.

IEEE 802.1X

c.

WPA-Personal

d.

WPA2-Personal
Feedback
Your answer is correct.
The correct answer is: IEEE 802.1X

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Where will you see the Manage Wireless Networks tool in your PC?
Select one:

a.

Accessories

b.

Program Files

c.

Control Panel

d.
System Tools
Feedback
Your answer is correct.
The correct answer is: Control Panel

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following statement is not correct?
Select one:

a.

You can configure the client computer by using the group policy

b.

You can configure the client computer by using the Network Dialog Box and following the
Wizard

c.

You can configure the client computer by using the command line: netsh wlan

d.

You can configure the client computer by going to the accessories in the start menu and
clicking the network options.
Feedback
Your answer is correct.
The correct answer is: You can configure the client computer by going to the accessories in
the start menu and clicking the network options.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:

a.

600mbps

b.

11mbps

c.

None of the choices

d.

54mbps
Feedback
Your answer is correct.
The correct answer is: 600mbps

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a way to improve the signal strength?
Select one:
a.

Ensure close proximity to the Wireless APs

b.

Check all Physical obstructions

c.

Check for devices that may cause interference

d.

None of the Choices


Feedback
Your answer is correct.
The correct answer is: None of the Choices

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files,
presentations or an internet connection among multiple computers and devices.
Select one:

a.

Ad hoc mode

b.

Infrastructure mode

c.
Bluetooth mode

d.

Wired mode
Feedback
Your answer is correct.
The correct answer is: Ad hoc mode

FINAL QUIZ 2
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is the measurement on how quickly the computer completes a task.
Select one:

a.

Reliability

b.

Usability

c.

Performance

d.

Security
Feedback
Your answer is correct.
The correct answer is: Performance
Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is the measurement of how a system conforms to expected behavior
Select one:

a.

Performance

b.

Usability

c.

Reliability

d.

Security
Feedback
Your answer is correct.
The correct answer is: Reliability

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a Performance Monitor tool?
Select one:

a.

Reports

b.

Data Collector Sets

c.

Monitoring Tools

d.

Windows Memory Diagnostics Tool


Feedback
Your answer is correct.
The correct answer is: Windows Memory Diagnostics Tool

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It provides assistance in resolving network-related issues
Select one:

a.

Windows Network Diagnostics Tool

b.

Reliability Monitor

c.

Performance Monitor
d.

Windows Memory Diagnostic Tool


Feedback
Your answer is correct.
The correct answer is: Windows Network Diagnostics Tool

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Select one:

a.

Reliability Monitor

b.

Windows Memory Diagnostics Tool

c.

Performance Monitor

d.

Windows Network Diagnostics Tool


Feedback
Your answer is correct.
The correct answer is: Windows Memory Diagnostics Tool

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Provides a timeline of system changes and reliability. It also provides a system stability chart
and reports on software installations and software or hardware failures.
Select one:

a.

Performance Monitor

b.

Windows Network Diagnostics Tool

c.

Reliability Monitor

d.

Windows Memory Diagnosstics Tool


Feedback
Your answer is correct.
The correct answer is: Reliability Monitor

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a Boot-option for troubleshooting startup problems?
Select one:
a.

Boot logging

b.

Safe Mode

c.

None of the choices

d.

Last known good configuration


Feedback
Your answer is correct.
The correct answer is: None of the choices

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is an administrative tool for managing user settings and computer settings across a
network.

a.

Windows Backup

b.

System Restore Points

c.

None of the choices

d.
Window Update Group Policy
Feedback
Your answer is correct.

The correct answer is: Window Update Group Policy

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a central location for viewing messages about your system and the starting point for
diagnosing and solving issues with your system.
Select one:

a.

Group Policy

b.

Action Center

c.

Applocker

d.

Control Panel
Feedback
Your answer is correct.
The correct answer is: Action Center

Question 10
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is a software that is designed to deliberately harm a computer.
Select one:

a.

Malicious Software

b.

Applocker

c.

None of the Choices

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: Malicious Software

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It enables the IT Administrators to automate one-to-several management of users and
computers.
Select one:
a.

Group Policy

b.

Action Center

c.

Control Panel

d.

Applocker
Feedback
Your answer is correct.
The correct answer is: Group Policy

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is the built-in encryption tool for Windows file systems
Select one:

a.

User Account Control

b.

Encrypting File Systems

c.

Applocker

d.
Bitlocker
Feedback
Your answer is correct.
The correct answer is: Encrypting File Systems

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is one of the feature of Windows 7 that encrypts the computer operating system and data
stored on the operating system volume.
Select one:

a.

Applocker

b.

User Account Control

c.

Encrypting File Systems

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: Bitlocker

Question 14
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is
allowed to run on user desktops.
Select one:

a.

Bitlocker

b.

Encrypting File Systems

c.

User Account Control

d.

Applocker
Feedback
Your answer is correct.
The correct answer is: Applocker

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks
Select one:
a.

Encrypting File Systems

b.

User Account Control

c.

Applocker

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: User Account Control

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003.
Select one:

a.

Group Policy

b.

Software Restriction Policies

c.

Advanced Security Settings


d.

User Account Control


Feedback
Your answer is correct.
The correct answer is: Software Restriction Policies

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This are equivalents to door locks, employee badges and security systems. It protects the
computer and networks from intrusions.
Select one:

a.

Bitlocker

b.

Group Policy

c.

Firewall

d.

Internet
Feedback
Your answer is correct.
The correct answer is: Firewall

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that
using delete browsing history to maintain privacy because there are no logs kept or tracks
made during browsing
Select one:

a.

Applocker

b.

InPrivate Filtering

c.

InPrivate Browsing

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: InPrivate Browsing

MIDTERM EXAM
Question 1
Correct

Mark 1.00 out of 1.00

Flag question
Question text
It is the process of verifying the identity of something or someone.
Select one:

a.

Authentication

b.

Access

c.

Authorization

d.

None of the choices


Feedback
Your answer is correct.
The correct answer is: Authentication

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is the process of determining whether something or someone has permission to access
the resources
Select one:

a.

Authentication

b.

None of the choices


c.

Access

d.

Authorization
Feedback
Your answer is correct.
The correct answer is: Authorization

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a Windows Authentication Method that is used by windows 7 clients and server running
Microsoft Windows Server 2000 or later
Select one:

a.

Kerberos v5

b.

NTLM

c.

Certificate Mapping

d.

None of the choices


Feedback
Your answer is correct.
The correct answer is: Kerberos v5
Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a new authentication features that controls the ability of online IDs to authenticate to a
computer.
Select one:

a.

Biometrics

b.

Online Identity Integration

c.

Smartcards

d.

None of the choices


Feedback
Your answer is correct.
The correct answer is: Online Identity Integration

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It defines the type of access granted to a user, group, or computer for a file or folder.
Select one:

a.

None of the choices

b.

NTFS Permission

c.

Inherited Permission

d.

Explicit Permission
Feedback
Your answer is correct.
The correct answer is: NTFS Permission

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a method of sharing folders that allows you to share folders quickly.
Select one:

a.

None of the choices

b.

Advance Sharing

c.
Public Sharing

d.

Basic Sharing
Feedback
Your answer is correct.
The correct answer is: Basic Sharing

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a method of sharing folders that allow multiple default public folders for each computer
and files shared with same computer and with same network.
Select one:

a.

None of the choices

b.

Advance Sharing

c.

Basic Sharing

d.

Public Sharing
Feedback
Your answer is correct.
The correct answer is: Public Sharing

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a type of printing wherein it is used by legacy application in pre-vista version of
windows that uses enhanced metafile format (EMF) as the spool file format.
Select one:

a.

XPS based printing

b.

None of the choices

c.

PDF based printing

d.

GDI based printing


Feedback
Your answer is correct.
The correct answer is: GDI based printing

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a feature of Windows 7 that allows windows 7 to be backward compatible
Select one:

a.

Virtual XP

b.

Windows XP mode

c.

Windows XP compatibility

d.

None of the choices


Feedback
Your answer is correct.
The correct answer is: Windows XP mode

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It contains the partition table for the disk and a small amount of executable code called as
the master boot code.
Select one:

a.

Master Boot Record Disk

b.

None of the choices

c.
Dynamic Disk

d.

GUID Partition (GPT)


Feedback
Your answer is correct.
The correct answer is: Master Boot Record Disk

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It contains an array of partition entries describing the start and end LBA of each partition on
disk.
Select one:

a.

None of the choices

b.

Master Boot Record Disk

c.

Dynamic Disk

d.

GUID Partition (GPT)


Feedback
Your answer is correct.
The correct answer is: GUID Partition (GPT)

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a graphical user interface that is used to manage disks and volumes both basic and
dynamic, locally or on remote computers.
Select one:

a.

None of the choices

b.

Diskpart

c.

Disk Management

d.

Local Disk
Feedback
Your answer is correct.
The correct answer is: Disk Management

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a scriptable command line utility that create scripts to automate disk related task.
Select one:

a.

Local Disk

b.

None of the choices

c.

Disk Management

d.

Diskpart
Feedback
Your answer is correct.
The correct answer is: Diskpart

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a dynamic volume that encompasses available free-space from single, dynamic, hard
disk drive.
Select one:

a.

Simple Volume

b.

Spanned Volume

c.
Striped Volume

d.

None of the choices


Feedback
Your answer is correct.
The correct answer is: Simple Volume

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a dynamic volume that joins areas of unallocated space disks into a single logical disk
Select one:

a.

Spanned Volume

b.

Striped Volume

c.

Simple Volume

d.

None of the choices


Feedback
Your answer is correct.
The correct answer is: Spanned Volume

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the non-contiguous storage of data on a volume
Select one:

a.

None of the choices

b.

Disk Shrinking

c.

Disk Quotas

d.

Disk Fragmentation
Feedback
Your answer is correct.
The correct answer is: Disk Fragmentation

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a way for you to limit use of disk space on a volume for each user to conserve disk
space.
Select one:
a.

Disk Shrinking

b.

None of the choices

c.

Disk Fragmentation

d.

Disk Quotas
Feedback
Your answer is correct.
The correct answer is: Disk Quotas

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a small software program that allows a hardware device to communicate with a
computer
Select one:

a.

Device Stage

b.

None of the choices

c.

Dynamic Update
d.

Drivers
Feedback
Your answer is correct.
The correct answer is: Drivers

FINAL QUIZ 1
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How many bits are there in an IP version 4 address?
Select one:

a.

32 bits

b.

64 bits

c.

128 bits

d.

24 bits
Feedback
Your answer is correct.
The correct answer is: 32 bits

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
APIPA stands for:
Select one:

a.

Automatic Private IP Addressing

b.

Association of Pacific Island Public Auditors

c.

Automatic Protocol for Internet Public Address

d.

Asia Pacific Intellectual Property Association


Feedback
Your answer is correct.
The correct answer is: Automatic Private IP Addressing

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the binary notation for the 255.255.255.0 subnet mask?
Select one:
a.

11111111.11111111.11111110.00000000

b.

11111111.11111111.11111111.00000000

c.

11111111.11111111.11111000.00000000

d.

11111111.00000000.00000000.00000000
Feedback
Your answer is correct.
The correct answer is: 11111111.11111111.11111111.00000000

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It specifies which part of an IPv4 address is the network ID and which part of the IPv4
address is the Host ID.
Select one:

a.

Default Gateway

b.

Subnet Mask

c.

Host ID
d.

Network Address
Feedback
Your answer is correct.
The correct answer is: Subnet Mask

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Select one:

a.

Subnet Mask

b.

Network Address

c.

Default Gateway 

d.

Host ID
Feedback
Your answer is correct.
The correct answer is: Default Gateway 

Question 6
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is a type of IPv4 Address that is required by the devices and host that connect directly to
the Internet. This address must be unique, routable on the internet and must be assigned by
IANA.
Select one:

a.

Broadcast Address

b.

Network Address

c.

Public IP Address

d.

Private IP Address
Feedback
Your answer is correct.
The correct answer is: Public IP Address

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
172.16.0.0 /12 is what type of IPv4 Address.
Select one:
a.

Public IP Address

b.

Broadcast Address

c.

Host ID

d.

Private IP Address
Feedback
Your answer is correct.
The correct answer is: Private IP Address

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How many bits are there in an IP version 6 address?
Select one:

a.

64 bits

b.

32 bits

c.

128 bits

d.
24 bits
Feedback
Your answer is correct.
The correct answer is: 128 bits

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of notation does IP version 6 address uses?
Select one:

a.

Binary

b.

Decimal

c.

Octal

d.

Hexadecimal
Feedback
Your answer is correct.
The correct answer is: Hexadecimal

Question 10
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which of the following is not an IPv6 Address types?
Select one:

a.

Multicast

b.

Unicast

c.

Broadcast

d.

Anycast
Feedback
Your answer is correct.
The correct answer is: Broadcast

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a type of network that interconnect devices by means of radio waves instead of wires
and cables.
Select one:
a.

Campus Area Network

b.

Wireless Network

c.

Virtual Local Area Network

d.

Wired Network
Feedback
Your answer is correct.
The correct answer is: Wireless Network

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES)
encryption used by medium and large organization.
Select one:

a.

WPA-Enterprise

b.

IEEE 802.1X

c.

WPA-Personal
d.

WPA2-Personal
Feedback
Your answer is correct.
The correct answer is: WPA-Enterprise

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Strong EAP methods provide strong authentication
Select one:

a.

WPA-Enterprise

b.

IEEE 802.1X

c.

WPA-Personal

d.

WPA2-Personal
Feedback
Your answer is correct.
The correct answer is: IEEE 802.1X

Question 14
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Where will you see the Manage Wireless Networks tool in your PC?
Select one:

a.

Accessories

b.

Program Files

c.

Control Panel

d.

System Tools
Feedback
Your answer is correct.
The correct answer is: Control Panel

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following statement is not correct?
Select one:

a.
You can configure the client computer by using the group policy

b.

You can configure the client computer by using the Network Dialog Box and following the
Wizard

c.

You can configure the client computer by using the command line: netsh wlan

d.

You can configure the client computer by going to the accessories in the start menu and
clicking the network options.
Feedback
Your answer is correct.
The correct answer is: You can configure the client computer by going to the accessories in
the start menu and clicking the network options.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the maximum bit rate for the 802.11n technologies?
Select one:

a.

600mbps

b.

11mbps

c.

None of the choices


d.

54mbps
Feedback
Your answer is correct.
The correct answer is: 600mbps

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a way to improve the signal strength?
Select one:

a.

Ensure close proximity to the Wireless APs

b.

Check all Physical obstructions

c.

Check for devices that may cause interference

d.

None of the Choices


Feedback
Your answer is correct.
The correct answer is: None of the Choices

Question 18
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files,
presentations or an internet connection among multiple computers and devices.
Select one:

a.

Ad hoc mode

b.

Infrastructure mode

c.

Bluetooth mode

d.

Wired mode
Feedback
Your answer is correct.
The correct answer is: Ad hoc mode

FINAL QUIZ 2

Question 1
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is the measurement on how quickly the computer completes a task.
Select one:

a.

Reliability

b.

Usability

c.

Performance

d.

Security
Feedback
Your answer is correct.
The correct answer is: Performance

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is the measurement of how a system conforms to expected behavior
Select one:

a.
Performance

b.

Usability

c.

Reliability

d.

Security
Feedback
Your answer is correct.
The correct answer is: Reliability

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a Performance Monitor tool?
Select one:

a.

Reports

b.

Data Collector Sets

c.

Monitoring Tools

d.

Windows Memory Diagnostics Tool


Feedback
Your answer is correct.
The correct answer is: Windows Memory Diagnostics Tool

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It provides assistance in resolving network-related issues
Select one:

a.

Windows Network Diagnostics Tool

b.

Reliability Monitor

c.

Performance Monitor

d.

Windows Memory Diagnostic Tool


Feedback
Your answer is correct.
The correct answer is: Windows Network Diagnostics Tool

Question 5
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Checks for symptoms of defective computer memory and usually can be started from
administratve tools in the control panel
Select one:

a.

Reliability Monitor

b.

Windows Memory Diagnostics Tool

c.

Performance Monitor

d.

Windows Network Diagnostics Tool


Feedback
Your answer is correct.
The correct answer is: Windows Memory Diagnostics Tool

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Provides a timeline of system changes and reliability. It also provides a system stability chart
and reports on software installations and software or hardware failures.
Select one:
a.

Performance Monitor

b.

Windows Network Diagnostics Tool

c.

Reliability Monitor

d.

Windows Memory Diagnosstics Tool


Feedback
Your answer is correct.
The correct answer is: Reliability Monitor

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a Boot-option for troubleshooting startup problems?
Select one:

a.

Boot logging

b.

Safe Mode

c.

None of the choices

d.
Last known good configuration
Feedback
Your answer is correct.
The correct answer is: None of the choices

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is an administrative tool for managing user settings and computer settings across a
network.

a.

Windows Backup

b.

System Restore Points

c.

None of the choices

d.

Window Update Group Policy


Feedback
Your answer is correct.

The correct answer is: Window Update Group Policy

Question 9
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is a central location for viewing messages about your system and the starting point for
diagnosing and solving issues with your system.
Select one:

a.

Group Policy

b.

Action Center

c.

Applocker

d.

Control Panel
Feedback
Your answer is correct.
The correct answer is: Action Center

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a software that is designed to deliberately harm a computer.
Select one:
a.

Malicious Software

b.

Applocker

c.

None of the Choices

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: Malicious Software

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It enables the IT Administrators to automate one-to-several management of users and
computers.
Select one:

a.

Group Policy

b.

Action Center

c.

Control Panel
d.

Applocker
Feedback
Your answer is correct.
The correct answer is: Group Policy

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is the built-in encryption tool for Windows file systems
Select one:

a.

User Account Control

b.

Encrypting File Systems

c.

Applocker

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: Encrypting File Systems

Question 13
Correct

Mark 1.00 out of 1.00


Flag question

Question text
It is one of the feature of Windows 7 that encrypts the computer operating system and data
stored on the operating system volume.
Select one:

a.

Applocker

b.

User Account Control

c.

Encrypting File Systems

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: Bitlocker

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is
allowed to run on user desktops.
Select one:
a.

Bitlocker

b.

Encrypting File Systems

c.

User Account Control

d.

Applocker
Feedback
Your answer is correct.
The correct answer is: Applocker

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks
Select one:

a.

Encrypting File Systems

b.

User Account Control

c.

Applocker
d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: User Account Control

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003.
Select one:

a.

Group Policy

b.

Software Restriction Policies

c.

Advanced Security Settings

d.

User Account Control


Feedback
Your answer is correct.
The correct answer is: Software Restriction Policies

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This are equivalents to door locks, employee badges and security systems. It protects the
computer and networks from intrusions.
Select one:

a.

Bitlocker

b.

Group Policy

c.

Firewall

d.

Internet
Feedback
Your answer is correct.
The correct answer is: Firewall

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that
using delete browsing history to maintain privacy because there are no logs kept or tracks
made during browsing
Select one:

a.

Applocker

b.

InPrivate Filtering

c.

InPrivate Browsing

d.

Bitlocker
Feedback
Your answer is correct.
The correct answer is: InPrivate Browsing

FINAL EXAM
Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You have a computer that runs Windows 7. The computer is a member of a workgroup. You
use Encrypting File System (EFS) to protect your local files. You need to ensure that you can
decrypt EFS files on the computer if you forget your password. What should you do?
Select one:

a.

From BitLocker Drive Encryption, Select Manage BitLocker and Turn On BitLocker

b.

From Authorization manager, Modify the Authorization Manager options.

c.

From User Accounts, Select Manage your file encryption certificates.

d.

From Credential Manager, select Back up Vault.


Feedback
Your answer is correct.
The correct answer is: From User Accounts, Select Manage your file encryption certificates.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are evaluating the purchase a netbook computer that has the following hardware:
 
1.6-gigahertz (GHz) 32-bit processor
1024-MB RAM
1 video card that uses shared memory
4-G8 solid state drive
 
You need to ensure that you can install Windows 7 Enterprise on the netbook computer.
Which hardware component should you change or add?
Select one:

a.

ram

b.

processor

c.

video card

d.

storage device
Feedback
Your answer is correct.
The correct answer is: storage device

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Your company network includes desktop computers that have Windows 7 installed.
Microsoft updates are applied automatically at a scheduled time. A use1- reports that a
proprietary application has stopped working. You need to uninstall the most recent update
from Microsoft. What should you do first?
Select one:

a.

From the Task Scheduler, view the WindowsBackup node.

b.

From the Event Viewer, open the System log.


c.

From the Services console, open the Windows Update service.

d.

From the Action Center, open the Windows Update window.


Feedback
Your answer is correct.
The correct answer is: From the Action Center, open the Windows Update window.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer
that runs Windows 7. You want to deploy a Windows image (WIM) file to other computers
in the domain. You need to capture the operating system, computer configuration, and
applications installed on the computer to a WIM file. What should you do before you
capture the image?
Select one:

a.

Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk

b.

Run Defrag.exe

c.

Run Diskpart.exe

d.

Run ScanState.exe
Feedback
Your answer is correct.
The correct answer is: Run ScanState.exe

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You manage a network device by using a web interface. You perform all critical Windows
updates so that the computer now runs Internet Explorer 10. After performing these
updates, the layout of the network device web page displays incorrectly. Other web pages
display correctly. You need to resolve this issue. What should you do?
Select one:

a.

Set the local Intranet security zone to Low

b.

Enable Compatibly Mode for the network device web page

c.

Add the network device web page to the trusted sites zone

d.

Clear Internet Explorer’s browsing history


Feedback
Your answer is correct.
The correct answer is: Add the network device web page to the trusted sites zone

Question 6
Correct

Mark 1.00 out of 1.00


Flag question

Question text
You are a desktop administrator for an enterprise organization. A user applies a device
update from the manufacturer, and now the computer is displaying error messages. The
user has critical documents on the computer that need to be preserved. You need to restore
the computer to an operating state and preserve applications and data. What should you
do?
Select one:

a.

Restore Windows by using the most recent System Restore point

b.

Boot Windows by using the Last Known Good Configuration

c.

Perform a System Image Recovery

d.

Perform a re-installation of Windows


Feedback
Your answer is correct.
The correct answer is: Restore Windows by using the most recent System Restore point

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the administrator for a large organization with multiple Windows Server 2008
domain controllers and multiple domains. You have a Windows 7 machine that is set up for
all users to access. You have an application called StellApp.exe that everyone on this
Windows 7 computer can use except for the sales group. How do you stop the sales group
from accessing this one application?
Select one:

a.

Create an executable rule from the Application Control Policy

b.

Deny the Everyone group the rights to the application

c.

Create a security role from the Application Control Policy

d.

Give the Everyone group full control of the application


Feedback
Your answer is correct.
The correct answer is: Create an executable rule from the Application Control Policy

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the network manager for a small company. You have a junior IT administrator who
did some installations last week on a Windows 7 machine. How can you see what
applications were installed last week on the Windows 7 machine?
Select one:

a.
View the informational events of Reliability Monitor

b.

Check Event Viewer system logs

c.

View the data collector sets

d.

Open Control Panel, Add/Remove programs


Feedback
Your answer is correct.
The correct answer is: View the informational events of Reliability Monitor

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the network administrator for Stellacon Corporation. User in the sales department
have been complaining that the Sales application is slow to load. Using Performance
Monitor, you create a baseline report for one of the computers, monitoring memory, the
processor, the disk subsystem, and the network subsystem. You notice that the disk
subsystem has a high load of activity. What other subsystem should you monitor before you
can know for sure whether you have a disk subsystem bottleneck?
Select one:

a.

Memory

b.

Network

c.
Processor

d.

Application
Feedback
Your answer is correct.
The correct answer is: Memory

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the network administrator for a large organization that uses both Windows Server
2008 R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily. You
perform an image backup on the Windows 7 machine. The Windows 7 machine then gets
struck by a virus and will not start up properly. What can you do to get the Windows 7
machine up and running the fastest possible way?
Select one:

a.

Use a Windows 7 boot disk and run the Image Restore utility

b.

Because of the virus, the best things is to rebuild the machine from scratch

c.

Start the computer from the Windows 7 DVD and then use the System Image Recovery tool

d.

Start the computer from the Windows 7 DVD and then use the Image Restore utility
Feedback
Your answer is correct.
The correct answer is: Start the computer from the Windows 7 DVD and then use the
System Image Recovery tool

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the system administrator for a large organization that uses Windows Server R2 and
Windows 7. You have a Windows 7 machine and have enabled System Protection. You want
the machine to retain only the last System Protection snapshot that was taken. What should
you do?
Select one:

a.

Enable Shadow Copies and then set the Keep Only Last Shadow Copy option

b.

Disable Shadow Copies and run System Protection

c.

Set the Keep Only Last Shadow Copy option in System Protection

d.

Run Disk Cleanup for System Restore and then run Shadow Copies
Feedback
Your answer is correct.
The correct answer is: Run Disk Cleanup for System Restore and then run Shadow Copies

Question 12
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Alexandria is the payroll manager and stores critical file on her local drive for added security
on her Windows 7 computer. She wants to ensure that she is using the disk configuration
with the most fault tolerance and the highest level of consistent availability. Which of the
following provisions should she use?
Select one:

a.

Mirrored volumes

b.

Disk striping

c.

Spanned volumes

d.

Extended volumes
Feedback
Your answer is correct.
The correct answer is: Mirrored volumes

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the system administrator for your company. You are configuring the services on a
Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to
restart. Which tab of the service`s Properties dialog box should you use?
Select one:

a.

Log On

b.

General

c.

Recovery

d.

Dependencies
Feedback
Your answer is correct.
The correct answer is: Recovery

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset
the keyboard speed and the mouse pointer rate. Which utility should she use to configure
the keyboard and mouse properties?
Select one:

a.

Microsoft Management Console


b.

Registry Editor

c.

Control Panel

d.

Computer Management
Feedback
Your answer is correct.
The correct answer is: Control Panel

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the network administrator for your organization. You have been asked by the owner
of the company to verify that all drivers installed on the Windows 7 machines are signed
drivers. How do you accomplish this task?
Select one:

a.

Run Verify.exe at the command prompt

b.

Run Sigverif.exe at the command prompt

c.

Run a scan in Device manager

d.
Run Drivers.exe at the command prompt
Feedback
Your answer is correct.
The correct answer is: Run Sigverif.exe at the command prompt

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the network administrator for a large organization. You are in charge of
implementing company policies. One company policy states that you have to prevent
Internet Explorer from saving any data during a user`s browsing session. How do you
accomplish this?
Select one:

a.

InPrivate sessions should be disabled

b.

Set the Internet Security setting to disabled

c.

Private sessions should be enabled

d.

Run the browsers in the InPrivate session


Feedback
Your answer is correct.
The correct answer is: Run the browsers in the InPrivate session

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference
room at your company has a network projector installed on a server within the company
network. You need to connect to the projector from your computer. What should you do?
Select one:

a.

From Accessories, click Connect to a Network Projector

b.

From PowerShell, run the Net Config command

c.

From Display, click Connect to a projector

d.

Run the Displayswitch.exe command and select Projector only


Feedback
Your answer is correct.
The correct answer is: From Accessories, click Connect to a Network Projector

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You administer an Active Directory domain that includes portable computers that have
Windows 7 SP1 installed. You log on to one of the portable computers by using a domain
user account and install a new device for a bar-code scanner. You restart the portable
computer after installing the new device driver. You successfully log on to the computer by
using a domain user account. After logging on, you discover that the bar-code scanner is
not working due to a driver error. You try to remove the installed driver, but the Roll Back
Driver option is unavailable. You need to be able to roll back the driver to its previous
version. What should you do?
Select one:

a.

Start the computer and select Last Known Good Configuration from the advanced startup
options

b.

Run the Device Manager by using elevated permissions

c.

Start the portable computer from the Windows 7 installation media and select Startup
Repair

d.

From the Local Group Policy, modify Device Installation Restrictions


Feedback
Your answer is correct.
The correct answer is: Run the Device Manager by using elevated permissions

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
You are the network administrator for a small company that has just switched its machines
from Windows XP to Windows Vista and Windows 7. One of the users who has Windows
Vista asks you why there is a vertical sidebar on the screen. What feature of Windows Vista
is this?
Select one:

a.

Windows Sidebar

b.

Parental controls

c.

Jump List

d.

Windows Firewall
Feedback
Your answer is correct.
The correct answer is: Windows Sidebar

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Your company has asked you to implement Network Access Protection(NAP) on the
network. You already have Windows Server 2008 installed on your servers but your
organization wants to know which client operating systems will support NAP. What
operating system does not support NAP?
Select one:

a.

Windows Vista
b.

Windows 7

c.

Windows XP with SP2

d.

Windows XP with SP3


Feedback
Your answer is correct.
The correct answer is: Windows XP with SP2

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is one of the features of Mobile Computers wherein it synchronizes various content
including music, video, contacts, calendar events, web browser favorites and other files
between Windows Mobile devices and Windows 7
Select one:

a.

Windows Mobile Device Center

b.

Power Options

c.

Sync Center

d.
Windows Mobility Center
Feedback
Your answer is correct.
The correct answer is: Windows Mobile Device Center

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a method of turning a computer on or off wherein the system state is saved to memory.
Select one:

a.

Sleep or Standby

b.

Shut Down

c.

Hibernate

d.

Restart
Feedback
Your answer is correct.
The correct answer is: Sleep or Standby

Question 23
Correct

Mark 1.00 out of 1.00


Flag question

Question text
This Power plan saves power on a mobile computer by reducing system performance. Its
primary purpose is to maximize the battery life.
Select one:

a.

High Performance

b.

Balanced

c.

None of the Choices

d.

Power Saver
Feedback
Your answer is correct.
The correct answer is: Power Saver

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a windows 7 feature that enables user to connect to their desktop computer from
another device.
Select one:
a.

Remote Desktop

b.

Remote Assistance

c.

None of the Choices

d.

Virtual Private Network


Feedback
Your answer is correct.
The correct answer is: Remote Desktop

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It is a windows 7 feature that enables support staff to connect to a remote desktop
computer.
Select one:

a.

Remote Desktop

b.

Remote Assistance

c.

Virtual Private Network


d.

None of the Choices


Feedback
Your answer is correct.
The correct answer is: Remote Assistance

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
This are point-to-point connection across a private or public network. It uses special
protocols, called tunneling protocol to make a virtual call to a virtual port.
Select one:

a.

Remote Desktop

b.

Virtual Private Network

c.

None of the Choices

d.

Remote Assitance
Feedback
Your answer is correct.
The correct answer is: Virtual Private Network

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It provides transparent access to internal network resources whenever they are connected to
the Internet. It also enables the IT Professionals to manage remote computers outside of the
office and does not require a VPN connection.
Select one:

a.

DirectAccess

b.

Remote Assistance

c.

BranchCache

d.

Remote Desktop
Feedback
Your answer is correct.
The correct answer is: DirectAccess

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
It caches content from remote and web servers in the branch location so users can quickly
access the content. This cache can be hosted centrally in the branch location or distributed
across user PCs.
Select one:

a.

Remote Desktop

b.

Remote Assistance

c.

BranchCache

d. B/H;YP-YBBVVV;;;;;;;;;;;;;;;;;;;;;;;;;/’’

DirectAccess
Feedback
Your answer is correct.
The correct answer is: BranchCache

Private IP Address 172.16.0.0 /12 is what type of IPv4 Address.


Automatic Private IP
APIPA stands for:
Addressing
Windows Memory Diagnostics Checks for symptoms of defective computer memory and usually can
Tool be started from administratve tools in the control panel
32 bits How many bits are there in an IP version 4 address?
128 bits How many bits are there in an IP version 6 address?
It a server that is used to access the corporate resources from outside
Remote Access Server
the corporate network.
It allows the administrators to identify which software is allowed to run
Software Restriction Policies
and was initially added to Windows XP and Windows Server 2003.
Role Services It allows you to control which role functionality is installed and enabled.
It contains an array of partition entries describing the start and end LBA
GUID Partition (GPT)
of each partition on disk.
It contains the partition table for the disk and a small amount of
Master Boot Record Disk
executable code called as the master boot code.
It defines the type of access granted to a user, group, or computer for a
NTFS Permission
file or folder.
It enables IT Administrator to automate one-to-many management of
Group Policy
users and computers.
It enables the IT Administrators to automate one-to-several
Group Policy
management of users and computers.
It enables the user to log on and access resources on a specific
Local User Accounts
computer and usually reside in SAM.
It enables you to manage network traffic, group physically dispersed
Virtual Local Area Network
nodes into logical area networks and isolate network traffic.
It holds a copy of AD DS and responds to request for active directory
Domain Controller
information.
It is a central location for viewing messages about your system and the
Action Center
starting point for diagnosing and solving issues with your system.
Forest It is a collection of Domain Trees.
It is a collection of user accounts, computer accounts, contacts and
Groups
other groups that you can manage as a single unit.
It is a computer that is dedicated to running network-aware application
Application Server
software.
It is a device that converts instructions from the network protocol stack
Network Adapter
into electric signals.
It is a device that provides wiring concentrator functionality like a hub
Switch but it also enables network traffic management, performs firewall
functions and makes routing decisions based upon traffic priority.
It is a downloadable application that helps windows user identify which
Windows Upgrade Advisor
edition of Windows 7 meets their needs.
It is a dynamic volume that encompasses available free-space from
Simple Volume
single, dynamic, hard disk drive.
It is a feature of Windows 7 that allows windows 7 to be backward
Windows XP mode
compatible
It is a graphical user interface that is used to manage disks and
Disk Management
volumes both basic and dynamic, locally or on remote computers.
It is a group of services hosted on a network which is a private structure
Intranet
and has the internet-like service provision.
It is a method of sharing folders that allow multiple default public folders
Public Sharing for each computer and files shared with same computer and with same
network.
Basic Sharing It is a method of sharing folders that allows you to share folders quickly.
It is a new authentication features that controls the ability of online IDs
Online Identity Integration
to authenticate to a computer.
It is a new Windows 7 security feature that enables IT professionals to
Applocker
specify exactly what is allowed to run on user desktops.
It is a scriptable command line utility that create scripts to automate disk
Diskpart
related task.
It is a security feature that simplifies the ability of users to run as
User Account Control
standard users and perform all neccessary daily tasks
Drivers It is a small software program that allows a hardware device to
communicate with a computer
Malicious Software It is a software that is designed to deliberately harm a computer.
It is a strong authentication (with strong EAP method) and strong (TKIP)
WPA-Enterprise or very strong (AES) encryption used by medium and large
organization.
It is a tool used to remove system-specific data from the Windows
operating system, configure windows to start in audit mode, configure
Sysprep
the windows operating system to start the Windows Welcome phase
and reset Windows Product activation.
It is a type of IPv4 Address that is required by the devices and host that
Public IP Address connect directly to the Internet. This address must be unique, routable
on the internet and must be assigned by IANA.
It is a type of network that interconnect devices by means of radio
Wireless Network
waves instead of wires and cables.
It is a type of printing wherein it is used by legacy application in pre-
GDI based printing vista version of windows that uses enhanced metafile format (EMF) as
the spool file format.
It is a way for you to limit use of disk space on a volume for each user to
Disk Quotas
conserve disk space.
It is a Windows Authentication Method that is used by windows 7 clients
Kerberos v5
and server running Microsoft Windows Server 2000 or later
It is a wireless network modes that allows a wireless network adapters
connects directly to another wireless network adapter for the purpose of
Ad hoc mode
temporarily sharing of files, presentations or an internet connection
among multiple computers and devices.
It is an administrative tool for managing user settings and computer
Window Update Group Policy
settings across a network.
It is an enhanced privacy features of Internet Explorer 8 that inherently
InPrivate Browsing more secure that using delete browsing history to maintain privacy
because there are no logs kept or tracks made during browsing
It is an object that contains all of the information that defines a user in
User Account
Windows Server 2008 R2.
Does not require the It is one of the Considerations on why using the option of Upgrade
reinstallation of applications rather than Migrate.
It is one of the feature of Windows 7 that encrypts the computer
Bitlocker
operating system and data stored on the operating system volume.
It is one of the Key Features of Windows 7 that simplify a user's ability
Usability
to organize, search for, and view information.
It is one of the Key Features of Windows 7 that takes advantage of
Reliability and Performance modern computing hardware, running more reliably and providing more
consistent performance than previous versions of Windows.
It is one of the Options for Installing Windows 7 where in you install
Clean Installation Windows 7 on a new partition and replace an existing operating system
on a partition.
It is one of the Options for Installing Windows 7 where in you replace an
Upgrade Installation existing version of Windows with Windows 7 but all user applications,
files and settings are retained.
Encrypting File Systems It is the built-in encryption tool for Windows file systems
It is the foundation of the Internet naming scheme and it supports
DNS Server
accessing resources by using alphanumeric names.
Local Area Network It is the most common form of computer network.
Disk Fragmentation It is the non-contiguous storage of data on a volume
It is the process of determining whether something or someone has
Authorization
permission to access the resources
Authentication It is the process of verifying the identity of something or someone.
Windows Network Diagnostics
It provides assistance in resolving network-related issues
Tool
It provides storage for the users' files and share folders that contain
File Server
users' files.
It reduces the complexity and amount of administrative work by using
DHCP Server
automatic TCP/IP configuration.
Provides a timeline of system changes and reliability. It also provides a
Reliability Monitor system stability chart and reports on software installations and software
or hardware failures.
IEEE 802.1X Strong EAP methods provide strong authentication
This are equivalents to door locks, employee badges and security
Firewall
systems. It protects the computer and networks from intrusions.
IEEE 802.11 What is the IEEE 802 Standards for Local Wireless Networks?
Distribution Which of the following is a main type of group?
Which of the following is not a Boot-option for troubleshooting startup
None of the choices
problems?
Crown Which of the following is not a LAN Physical Topology?
Windows Memory Diagnostics
Which of the following is not a Performance Monitor tool?
Tool
Network Adaptor Which of the following is not a Physical WAN Components?
Which of the following is not a Server Role of Windows Server 2008
Windows Power Shell
R2?
Windows 7 Professional Which of the following is not a Specialized version of Windows 7?
None of the Choices Which of the following is not a way to improve the signal strength?
802.11 h Which of the following is not a Wireless LAN Standards?
It supports 16-bit Windows on Which of the following is not an advantage of installing a 64-bit edition
Windows (WOW) environment of Windows 7?
WiMax Which of the following is not the common network architecture types?
You can configure the client
computer by going to the
accessories in the start menu Which of the following statement is not correct?
and clicking the network
options.
Windows Vista SP1 Which of the following version of Windows are allowed for Upgrade?
Hexadecimal What type of notation does IP version 6 address uses?
It specifies which part of an IPv4 address is the network ID and which
Subnet Mask
part of the IPv4 address is the Host ID.
600mbps What is the maximum bit rate for the 802.11n technologies?
Performance It is the measurement on how quickly the computer completes a task.
It provides authenticaltion, host operations of master roles, hosting the
Domain Controller
global catalog and support group policies and sysvol.
Control Panel Where will you see the Manage Wireless Networks tool in your PC?
It is a dynamic volume that joins areas of unallocated space disks into a
Spanned Volume
single logical disk
It is a device, usually a router, on a TCP/IP internet that forwards IP
Default Gateway
packets to other subnets.
You are the system administrator for a large organization that uses
Run Disk Cleanup for System Windows Server R2 and Windows 7. You have a Windows 7 machine
Restore and then run Shadow and have enabled System Protection. You want the machine to retain
Copies only the last System Protection snapshot that was taken. What should
you do?
You are the administrator for a large organization with multiple Windows
Server 2008 domain controllers and multiple domains. You have a
Create an executable rule from Windows 7 machine that is set up for all users to access. You have an
the Application Control Policy application called StellApp.exe that everyone on this Windows 7
computer can use except for the sales group. How do you stop the
sales group from accessing this one application?
Alexandria is the payroll manager and stores critical file on her local
drive for added security on her Windows 7 computer. She wants to
Mirrored volumes ensure that she is using the disk configuration with the most fault
tolerance and the highest level of consistent availability. Which of the
following provisions should she use?
You are the system administrator for your company. You are configuring
the services on a Windows 7 computer. You want to ensure that if a
Recovery
service fails to load, it will attempt to restart. Which tab of the service`s
Properties dialog box should you use?
Your company network includes desktop computers that have Windows
7 installed. Microsoft updates are applied automatically at a scheduled
From the Action Center, open
time. A use1- reports that a proprietary application has stopped working.
the Windows Update window.
You need to uninstall the most recent update from Microsoft. What
should you do first?
It provides transparent access to internal network resources whenever
they are connected to the Internet. It also enables the IT Professionals
DirectAccess
to manage remote computers outside of the office and does not require
a VPN connection.
Broadcast Which of the following is not an IPv6 Address types?
It is a windows 7 feature that enables user to connect to their desktop
Remote Desktop
computer from another device.
You are a desktop administrator for an enterprise organization. A user
applies a device update from the manufacturer, and now the computer
Restore Windows by using the
is displaying error messages. The user has critical documents on the
most recent System Restore
computer that need to be preserved. You need to restore the computer
point
to an operating state and preserve applications and data. What should
you do?
Kayla is dissatisfied with the configuration of her keyboard and mouse.
She wants to reset the keyboard speed and the mouse pointer rate.
Control Panel
Which utility should she use to configure the keyboard and mouse
properties?
It is a windows 7 feature that enables support staff to connect to a
Remote Assistance
remote desktop computer.
Your company has asked you to implement Network Access
Protection(NAP) on the network. You already have Windows Server
Windows XP with SP2 2008 installed on your servers but your organization wants to know
which client operating systems will support NAP. What operating
system does not support NAP?
You use a portable computer that has Windows 7 Enterprise SP1
From Accessories, click installed. A conference room at your company has a network projector
Connect to a Network Projector installed on a server within the company network. You need to connect
to the projector from your computer. What should you do?
This are point-to-point connection across a private or public network. It
Virtual Private Network uses special protocols, called tunneling protocol to make a virtual call to
a virtual port.

You might also like