Loading documents preview...
Q1 – 100% Which of the following is not a Physical WAN Components? -Network Adapter It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority. - c. Switch Which of the following is not a LAN Physical Topology? - a. Crown It is the most common form of computer network. - a. Local Area Network It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic. - Virtual Local Area Network It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names. -DNS Server It is a computer that is dedicated to running network-aware application software. -Application Server It a server that is used to access the corporate resources from outside the corporate network. -Remote Access Server Which of the following is not the common network architecture types? -WiMax What is the IEEE 802 Standards for Local Wireless Networks? -IEEE 802.11 Q2 – 100% Which of the following is not a Specialized version of Windows 7? -Windows 7 Professional It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. -Upgrade Installation
It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation. -Sysprep It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition. -Clean Installation It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information. -Usability It is one of the Considerations on why using the option of Upgrade rather than Migrate. -Does not require the reinstallation of applications It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs. -Windows Upgrade Advisor Which of the following version of Windows are allowed for Upgrade? -Windows Vista SP1 Which of the following is not an advantage of installing a 64-bit edition of Windows 7? -It supports 16-bit Windows on Windows (WOW) environment It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows. -Reliability and Performance Prelim – 100% It is a device that converts instructions from the network protocol stack into electric signals. -Network Adapter It provides storage for the users' files and share folders that contain users' files. -File Server It a server that is used to access the corporate resources from outside the corporate network. -Remote Access Server It holds a copy of AD DS and responds to request for active directory information. -Domain Controller
It allows you to control which role functionality is installed and enabled. -Role Services It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic. -Virtual Local Area Network Which of the following is not the common network architecture types? -WiMax It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation. -Sysprep It is the most common form of computer network. -Local Area Network Which of the following is not a Server Role of Windows Server 2008 R2? -Windows Power Shell It is one of the Considerations on why using the option of Upgrade rather than Migrate. -Does not require the reinstallation of applications It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition. -Clean Installation Which of the following version of Windows are allowed for Upgrade? -Windows Vista SP1 It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority. -Switch Which of the following is not a Physical WAN Components? -Network Adapter What is the IEEE 802 Standards for Local Wireless Networks? -IEEE 802.11 It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.
-DNS Server Which of the following is not an advantage of installing a 64-bit edition of Windows 7? -It supports 16-bit Windows on Windows (WOW) environment It is a group of services hosted on a network which is a private structure and has the internet-like service provision. -Intranet It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information. -Usability Which of the following is not a Specialized version of Windows 7? -Windows 7 Professional It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration. -DHCP Server It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs. -Windows Upgrade Advisor It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. -Upgrade Installation Which of the following is not a LAN Physical Topology? -Crown It is a computer that is dedicated to running network-aware application software. -Application Server It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows. -Reliability and Performance Which of the following is not a Wireless LAN Standards? -802.11 h
It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.
Select one: a. Groups b. User Account c. Domain User d. Domain Controller
Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1
Flag question
Question text It enables the user to log on and access resources on a specific computer and usually reside in SAM. Select one: a. Built-in User Accounts b. None of the Choices c. Domain User Accounts d. Local User Accounts
Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1
Flag question
Question text
It is a way for you to limit use of disk space on a volume for each user to conserve disk space. Select one: a. Disk Shrinking b. Disk Fragmentation c. Disk Quotas d. None of the choices
Feedback Your answer is correct. Question 4 Correct Mark 1 out of 1
Flag question
Question text It contains the partition table for the disk and a small amount of executable code called as the master boot code. Select one: a. Master Boot Record Disk b. None of the choices c. GUID Partition (GPT) d. Dynamic Disk
Feedback Your answer is correct. Question 5 Correct Mark 1 out of 1
Flag question
Question text It is a collection of Domain Trees. Select one: a. Domain Local b. Forest c. Universal d. Global
Feedback Your answer is correct. Question 6 Correct Mark 1 out of 1
Flag question
Question text It enables IT Administrator to automate one-to-many management of users and computers. Select one: a. Organizational Units b. Group Policy c. None of the Choices d. Nesting Groups
Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1
Flag question
Question text It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory. Select one: a. Built-in User Accounts b. Domain User Accounts c. Local User Accounts d. None of the Choices
Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1
Flag question
Question text Which of the following is a main type of group? Select one: a. Universal b. Global c. Domain Local d. Distribution
Feedback Your answer is correct. Question 9 Correct Mark 1 out of 1
Flag question
Question text It is a scriptable command line utility that create scripts to automate disk related task. Select one: a. None of the choices b. Disk Management c. Local Disk d. Diskpart
Feedback Your answer is correct. Question 10 Correct Mark 1 out of 1
Flag question
Question text It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive. Select one: a. Simple Volume b. None of the choices c. Spanned Volume d. Striped Volume It is a method of sharing folders that allows you to share folders quickly. Select one: a. Basic Sharing
b. None of the choices c. Public Sharing d. Advance Sharing
Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1
Flag question
Question text It defines the type of access granted to a user, group, or computer for a file or folder. Select one: a. NTFS Permission b. Inherited Permission c. Explicit Permission d. None of the choices
Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1
Flag question
Question text It is the process of verifying the identity of something or someone. Select one: a. None of the choices
b. Authentication c. Authorization d. Access
Feedback Your answer is correct. Question 4 Correct Mark 1 out of 1
Flag question
Question text It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network. Select one: a. Public Sharing b. Advance Sharing c. Basic Sharing d. None of the choices
Feedback Your answer is correct. Question 5 Correct Mark 1 out of 1
Flag question
Question text It is the process of determining whether something or someone has permission to access the resources
Select one: a. None of the choices b. Access c. Authentication d. Authorization
Feedback Your answer is correct. Question 6 Correct Mark 1 out of 1
Flag question
Question text It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later Select one: a. None of the choices b. NTLM c. Kerberos v5 d. Certificate Mapping
Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1
Flag question
Question text
It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format. Select one: a. None of the choices b. GDI based printing c. PDF based printing d. XPS based printing
Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1
Flag question
Question text It is a feature of Windows 7 that allows windows 7 to be backward compatible Select one: a. Windows XP compatibility b. Virtual XP c. None of the choices d. Windows XP mode
Feedback Your answer is correct. Question 9 Correct Mark 1 out of 1
Flag question
Question text It is a new authentication features that controls the ability of online IDs to authenticate to a computer. Select one: a. Online Identity Integration b. Biometrics c. Smartcards d. None of the choices It contains an array of partition entries describing the start and end LBA of each partition on disk. Select one: a. None of the choices b. GUID Partition (GPT) c. Master Boot Record Disk d. Dynamic Disk
Feedback Your answer is correct. Question 2 Correct Mark 2.00 out of 2.00
Flag question
Question text It is the non-contiguous storage of data on a volume Select one: a. Disk Shrinking b. Disk Fragmentation c. Disk Quotas d. None of the choices
Feedback
Your answer is correct. Question 3 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally or on remote computers. Select one: a. Local Disk b. Diskpart c. Disk Management d. None of the choices
Feedback Your answer is correct. Question 4 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a way for you to limit use of disk space on a volume for each user to conserve disk space. Select one: a. Disk Fragmentation b. Disk Quotas c. None of the choices d. Disk Shrinking
Feedback Your answer is correct. Question 5 Correct Mark 2.00 out of 2.00
Flag question
Question text It contains the partition table for the disk and a small amount of executable code called as the master boot code. Select one: a. None of the choices b. Dynamic Disk c. Master Boot Record Disk d. GUID Partition (GPT)
Feedback Your answer is correct. Question 6 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a method of sharing folders that allows you to share folders quickly. Select one: a. Public Sharing b. None of the choices c. Basic Sharing
d. Advance Sharing
Feedback Your answer is correct. Question 7 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive. Select one: a. Spanned Volume b. Simple Volume c. Striped Volume d. None of the choices
Feedback Your answer is correct. Question 8 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a dynamic volume that joins areas of unallocated space disks into a single logical disk Select one: a. Simple Volume b. Spanned Volume
c. None of the choices d. Striped Volume
Feedback Your answer is correct. Question 9 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a collection of Domain Trees. Select one: a. Universal b. Forest c. Domain Local d. Global
Feedback Your answer is correct. Question 10 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format. Select one: a. None of the choices
b. PDF based printing c. XPS based printing d. GDI based printing
Feedback Your answer is correct. Question 11 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later Select one: a. NTLM b. Certificate Mapping c. Kerberos v5 d. None of the choices
Feedback Your answer is correct. Question 12 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.
Select one: a. Domain Controller b. Domain User c. User Account d. Groups
Feedback Your answer is correct. Question 13 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a feature of Windows 7 that allows windows 7 to be backward compatible Select one: a. Virtual XP b. None of the choices c. Windows XP compatibility d. Windows XP mode
Feedback Your answer is correct. Question 14 Correct Mark 2.00 out of 2.00
Flag question
Question text
It is an object that contains all of the information that defines a user in Windows Server 2008 R2. Select one: a. Domain Controller b. Groups c. Domain User d. User Account
Feedback Your answer is correct. Question 15 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a new authentication features that controls the ability of online IDs to authenticate to a computer. Select one: a. None of the choices b. Biometrics c. Online Identity Integration d. Smartcards
Feedback Your answer is correct. Question 16 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a scriptable command line utility that create scripts to automate disk related task. Select one: a. None of the choices b. Local Disk c. Disk Management d. Diskpart
Feedback Your answer is correct. Question 17 Correct Mark 2.00 out of 2.00
Flag question
Question text It defines the type of access granted to a user, group, or computer for a file or folder. Select one: a. None of the choices b. Explicit Permission c. NTFS Permission d. Inherited Permission
Feedback Your answer is correct. Question 18 Correct Mark 2.00 out of 2.00
Flag question
Question text It enables the user to log on and access resources on a specific computer and usually reside in SAM. Select one: a. Built-in User Accounts b. Local User Accounts c. None of the Choices d. Domain User Accounts
Feedback Your answer is correct. Question 19 Correct Mark 2.00 out of 2.00
Flag question
Question text It is the process of determining whether something or someone has permission to access the resources Select one: a. Authorization b. Authentication c. None of the choices d. Access
Feedback Your answer is correct. Question 20 Correct Mark 2.00 out of 2.00
Flag question
Question text Which of the following is a main type of group? Select one: a. Global b. Domain Local c. Universal d. Distribution
Feedback Your answer is correct. Question 21 Correct Mark 2.00 out of 2.00
Flag question
Question text It is a small software program that allows a hardware device to communicate with a computer Select one: a. Device Stage b. Drivers c. None of the choices d. Dynamic Update
Feedback Your answer is correct. Question 22
Correct Mark 2.00 out of 2.00
Flag question
Question text It is the process of verifying the identity of something or someone. Select one: a. None of the choices b. Access c. Authentication d. Authorization
Feedback Your answer is correct. Question 23 Correct Mark 2.00 out of 2.00
Flag question
Question text It enables IT Administrator to automate one-to-many management of users and computers. Select one: a. Organizational Units b. Group Policy c. None of the Choices d. Nesting Groups
Feedback Your answer is correct. Question 24
Correct Mark 2.00 out of 2.00
Flag question
Question text It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network. Select one: a. None of the choices b. Basic Sharing c. Public Sharing d. Advance Sharing
Feedback Your answer is correct. Question 25 Correct Mark 2.00 out of 2.00
Flag question
Question text It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory. Select one: a. Local User Accounts b. None of the Choices c. Built-in User Accounts d. Domain User Accounts It is a type of network that interconnect devices by means of radio waves instead of wires and cables.
Select one: a. Virtual Local Area Network b. Wireless Network c. Wired Network d. Campus Area Network
Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1
Flag question
Question text APIPA stands for: Select one: a. Automatic Private IP Addressing b. Asia Pacific Intellectual Property Association c. Automatic Protocol for Internet Public Address d. Association of Pacific Island Public Auditors
Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1
Flag question
Question text 172.16.0.0 /12 is what type of IPv4 Address.
Select one: a. Broadcast Address b. Host ID c. Private IP Address d. Public IP Address
Feedback Your answer is correct. Question 4 Incorrect Mark 0 out of 1
Flag question
Question text Strong EAP methods provide strong authentication Select one: a. IEEE 802.1X b. WPA-Personal c. WPA-Enterprise d. WPA2-Personal
Feedback Your answer is incorrect. Question 5 Incorrect Mark 0 out of 1
Flag question
Question text Which of the following is not a way to improve the signal strength?
Select one: a. None of the Choices b. Check for devices that may cause interference c. Ensure close proximity to the Wireless APs d. Check all Physical obstructions
Feedback Your answer is incorrect. Question 6 Correct Mark 1 out of 1
Flag question
Question text It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets. Select one: a. Subnet Mask b. Default Gateway c. Network Address d. Host ID
Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1
Flag question
Question text What type of notation does IP version 6 address uses?
Select one: a. Octal b. Binary c. Hexadecimal d. Decimal
Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1
Flag question
Question text It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA. Select one: a. Private IP Address b. Broadcast Address c. Public IP Address d. Network Address
Feedback Your answer is correct. Question 9 Correct Mark 1 out of 1
Flag question
Question text
What is the binary notation for the 255.255.255.0 subnet mask? Select one: a. 11111111.11111111.11111111.00000000 b. 11111111.11111111.11111110.00000000 c. 11111111.00000000.00000000.00000000 d. 11111111.11111111.11111000.00000000
Feedback Your answer is correct. Question 10 Correct Mark 1 out of 1
Flag question
Question text Which of the following statement is not correct? Select one: a. You can configure the client computer by using the command line: netsh wlan b. You can configure the client computer by going to the accessories in the start menu and clicking the network options. c. You can configure the client computer by using the Network Dialog Box and following the Wizard d. You can configure the client computer by using the group policy
Feedback Your answer is correct.
It is the measurement of how a system conforms to expected behavior Select one: a. Performance b. Security
c. Reliability d. Usability
Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1
Flag question
Question text It is a software that is designed to deliberately harm a computer. Select one: a. Bitlocker b. Applocker c. None of the Choices d. Malicious Software
Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1
Flag question
Question text It is an administrative tool for managing user settings and computer settings across a network. Select one: a. Window Update Group Policy
b. Windows Backup c. System Restore Points d. None of the choices
Feedback Your answer is correct. Question 4 Correct Mark 1 out of 1
Flag question
Question text It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system. Select one: a. Applocker b. Control Panel c. Group Policy d. Action Center
Feedback Your answer is correct. Question 5 Correct Mark 1 out of 1
Flag question
Question text It allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.
Select one: a. Group Policy b. Software Restriction Policies c. User Account Control d. Advanced Security Settings
Feedback Your answer is correct. Question 6 Correct Mark 1 out of 1
Flag question
Question text Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures. Select one: a. Windows Memory Diagnosstics Tool b. Performance Monitor c. Reliability Monitor d. Windows Network Diagnostics Tool
Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1
Flag question
Question text
Which of the following is not a Performance Monitor tool? Select one: a. Data Collector Sets b. Monitoring Tools c. Windows Memory Diagnostics Tool d. Reports
Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1
Flag question
Question text Which of the following is not a Boot-option for troubleshooting startup problems? Select one: a. Boot logging b. Safe Mode c. None of the choices d. Last known good configuration
Feedback
Your answer is correct. Question 9 Correct Mark 1 out of 1
Flag question
Question text It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops. Select one: a. User Account Control b. Applocker c. Bitlocker d. Encrypting File Systems
Feedback Your answer is correct. Question 10 Correct Mark 1 out of 1
Flag question
Question text It is the measurement on how quickly the computer completes a task. Select one: a. Security b. Performance c. Usability d. Reliability Question 1 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a software that is designed to deliberately harm a computer. Select one: a. Applocker b. None of the Choices c. Malicious Software d. Bitlocker
Feedback Your answer is correct. Question 2 Incorrect Mark 0.00 out of 1.00
Flag question
Question text You are the administrator for a large organization with multiple Windows Server 2008 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the sales group. How do you stop the sales group from accessing this one application? Select one: a. Give the Everyone group full control of the application b. Deny the Everyone group the rights to the application c. Create an executable rule from the Application Control Policy d. Create a security role from the Application Control Policy
Feedback
Your answer is incorrect. Question 3 Correct Mark 1.00 out of 1.00
Flag question
Question text It is the process of determining whether something or someone has permission to access the resources Select one: a. Authorization b. None of the choices c. Access d. Authentication
Feedback Your answer is correct. Question 4 Correct Mark 1.00 out of 1.00
Flag question
Question text Where will you see the Manage Wireless Networks tool in your PC? Select one: a. Control Panel b. Accessories c. Program Files d. System Tools
Feedback Your answer is correct. Question 5 Correct Mark 1.00 out of 1.00
Flag question
Question text It is an administrative tool for managing user settings and computer settings across a network. Select one: a. None of the choices b. Window Update Group Policy c. Windows Backup d. System Restore Points
Feedback Your answer is correct. Question 6 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a method of sharing folders that allows you to share folders quickly. Select one: a. Basic Sharing b. Public Sharing c. Advance Sharing
d. None of the choices
Feedback Your answer is correct. Question 7 Correct Mark 1.00 out of 1.00
Flag question
Question text It contains the partition table for the disk and a small amount of executable code called as the master boot code. Select one: a. Dynamic Disk b. None of the choices c. Master Boot Record Disk d. GUID Partition (GPT)
Feedback Your answer is correct. Question 8 Correct Mark 1.00 out of 1.00
Flag question
Question text It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration. Select one: a. Remote Access Server
b. DHCP Server c. None of the Choices d. DNS Server
Feedback Your answer is correct. Question 9 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs. Select one: a. Windows Upgrade Advisor b. Windows Easy Transfer c. None of the choices d. User State Migration Tool
Feedback Your answer is correct. Question 10 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following is not a Wireless LAN Standards? Select one:
a. 802.11 h b. 802.11 n c. 802.11 b d. 802.11 a
Feedback Your answer is correct. Question 11 Incorrect Mark 0.00 out of 1.00
Flag question
Question text You are the network administrator for a large organization. You are in charge of implementing company policies. One company policy states that you have to prevent Internet Explorer from saving any data during a user`s browsing session. How do you accomplish this? Select one: a. Private sessions should be enabled b. InPrivate sessions should be disabled c. Run the browsers in the InPrivate session d. Set the Internet Security setting to disabled
Feedback Your answer is incorrect. Question 12 Correct Mark 1.00 out of 1.00
Flag question
Question text
It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later Select one: a. Certificate Mapping b. Kerberos v5 c. None of the choices d. NTLM
Feedback Your answer is correct. Question 13 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following is not the common network architecture types? Select one: a. WiMax b. Ethernet c. FDDI (Fiber Distributed Data Interface) d. Token Ring
Feedback Your answer is correct. Question 14 Correct Mark 1.00 out of 1.00
Flag question
Question text It defines the type of access granted to a user, group, or computer for a file or folder. Select one: a. Inherited Permission b. None of the choices c. NTFS Permission d. Explicit Permission
Feedback Your answer is correct. Question 15 Correct Mark 1.00 out of 1.00
Flag question
Question text It provides storage for the users' files and share folders that contain users' files. Select one: a. Web Server b. File Server c. Application Server d. Domain Controller
Feedback Your answer is correct. Question 16 Correct Mark 1.00 out of 1.00
Flag question
Question text It is the measurement on how quickly the computer completes a task. Select one: a. Security b. Performance c. Reliability d. Usability
Feedback Your answer is correct. Question 17 Incorrect Mark 0.00 out of 1.00
Flag question
Question text Checks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel Select one: a. Windows Memory Diagnostics Tool b. Performance Monitor c. Windows Network Diagnostics Tool d. Reliability Monitor
Feedback Your answer is incorrect. Question 18 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive. Select one: a. None of the choices b. Simple Volume c. Striped Volume d. Spanned Volume
Feedback Your answer is correct. Question 19 Incorrect Mark 0.00 out of 1.00
Flag question
Question text You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7. You want to deploy a Windows image (WIM) file to other computers in the domain. You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file. What should you do before you capture the image? Select one: a. Run Diskpart.exe b. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk c. Run ScanState.exe d. Run Defrag.exe
Feedback
Your answer is incorrect. Question 20 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a way for you to limit use of disk space on a volume for each user to conserve disk space. Select one: a. Disk Quotas b. None of the choices c. Disk Shrinking d. Disk Fragmentation
Feedback Your answer is correct. Question 21 Correct Mark 1.00 out of 1.00
Flag question
Question text 172.16.0.0 /12 is what type of IPv4 Address. Select one: a. Private IP Address b. Host ID c. Public IP Address d. Broadcast Address
Feedback Your answer is correct. Question 22 Correct Mark 1.00 out of 1.00
Flag question
Question text It is an object that contains all of the information that defines a user in Windows Server 2008 R2. Select one: a. User Account b. Domain Controller c. Groups d. Domain User
Feedback Your answer is correct. Question 23 Correct Mark 1.00 out of 1.00
Flag question
Question text It is the built-in encryption tool for Windows file systems Select one: a. Applocker b. User Account Control c. Bitlocker
d. Encrypting File Systems
Feedback Your answer is correct. Question 24 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following is a main type of group? Select one: a. Universal b. Distribution c. Domain Local d. Global
Feedback Your answer is correct. Question 25 Correct Mark 1.00 out of 1.00
Flag question
Question text It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory. Select one: a. Local User Accounts b. Built-in User Accounts
c. None of the Choices d. Domain User Accounts
Feedback Your answer is correct. Question 26 Correct Mark 1.00 out of 1.00
Flag question
Question text It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. Select one: a. None of the Choices b. Migration c. Upgrade Installation d. Clean Installation
Feedback Your answer is correct. Question 27 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a windows 7 feature that enables support staff to connect to a remote desktop computer. Select one:
a. Remote Assistance b. None of the Choices c. Virtual Private Network d. Remote Desktop
Feedback Your answer is correct. Question 28 Incorrect Mark 0.00 out of 1.00
Flag question
Question text What is the maximum bit rate for the 802.11n technologies? Select one: a. 11mbps b. 600mbps c. 54mbps d. None of the choices
Feedback Your answer is incorrect. Question 29 Correct Mark 1.00 out of 1.00
Flag question
Question text
You have a computer that runs Windows 7. The computer is a member of a workgroup. You use Encrypting File System (EFS) to protect your local files. You need to ensure that you can decrypt EFS files on the computer if you forget your password. What should you do? Select one: a. From BitLocker Drive Encryption, Select Manage BitLocker and Turn On BitLocker b. From Credential Manager, select Back up Vault. c. From User Accounts, Select Manage your file encryption certificates. d. From Authorization manager, Modify the Authorization Manager options.
Feedback Your answer is correct. Question 30 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following is not a Performance Monitor tool? Select one: a. Data Collector Sets b. Monitoring Tools c. Reports d. Windows Memory Diagnostics Tool
Feedback Your answer is correct. Question 31 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system. Select one: a. Control Panel b. Applocker c. Group Policy d. Action Center
Feedback Your answer is correct. Question 32 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a type of network that interconnect devices by means of radio waves instead of wires and cables. Select one: a. Campus Area Network b. Wireless Network c. Wired Network d. Virtual Local Area Network
Feedback Your answer is correct. Question 33 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit. Select one: a. Domain User b. User Account c. Domain Controller d. Groups
Feedback Your answer is correct. Question 34 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a small software program that allows a hardware device to communicate with a computer Select one: a. Dynamic Update b. None of the choices c. Drivers d. Device Stage
Feedback Your answer is correct.
Question 35 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a computer that is dedicated to running network-aware application software. Select one: a. File Server b. Application Server c. Domain Controller d. Web Server
Feedback Your answer is correct. Question 36 Correct Mark 1.00 out of 1.00
Flag question
Question text What is the binary notation for the 255.255.255.0 subnet mask? Select one: a. 11111111.00000000.00000000.00000000 b. 11111111.11111111.11111110.00000000 c. 11111111.11111111.11111111.00000000 d. 11111111.11111111.11111000.00000000
Feedback Your answer is correct.
Question 37 Correct Mark 1.00 out of 1.00
Flag question
Question text It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information. Select one: a. Security b. Usability c. Deployment d. Reliability and Performance
Feedback Your answer is correct. Question 38 Correct Mark 1.00 out of 1.00
Flag question
Question text It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops. Select one: a. Bitlocker b. Applocker c. Encrypting File Systems d. User Account Control
Feedback
Your answer is correct. Question 39 Correct Mark 1.00 out of 1.00
Flag question
Question text This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions. Select one: a. Internet b. Firewall c. Bitlocker d. Group Policy
Feedback Your answer is correct. Question 40 Correct Mark 1.00 out of 1.00
Flag question
Question text You are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use? Select one: a. General b. Recovery c. Log On
d. Dependencies
Feedback Your answer is correct. Question 41 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following statement is not correct? Select one: a. You can configure the client computer by using the group policy b. You can configure the client computer by using the Network Dialog Box and following the Wizard c. You can configure the client computer by going to the accessories in the start menu and clicking the network options. d. You can configure the client computer by using the command line: netsh wlan
Feedback Your answer is correct. Question 42 Correct Mark 1.00 out of 1.00
Flag question
Question text It holds a copy of AD DS and responds to request for active directory information. Select one: a. Domain Controller
b. Web Server c. Application Server d. File Server
Feedback Your answer is correct. Question 43 Correct Mark 1.00 out of 1.00
Flag question
Question text It provides assistance in resolving network-related issues Select one: a. Performance Monitor b. Windows Memory Diagnostic Tool c. Windows Network Diagnostics Tool d. Reliability Monitor
Feedback Your answer is correct. Question 44 Correct Mark 1.00 out of 1.00
Flag question
Question text This Power plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize the battery life. Select one:
a. High Performance b. None of the Choices c. Balanced d. Power Saver
Feedback Your answer is correct. Question 45 Correct Mark 1.00 out of 1.00
Flag question
Question text It is the most common form of computer network. Select one: a. Campus Area Network b. Local Area Network c. Metropolitan Area Network d. Wide Area Network
Feedback Your answer is correct. Question 46 Correct Mark 1.00 out of 1.00
Flag question
Question text It contains an array of partition entries describing the start and end LBA of each partition on disk.
Select one: a. None of the choices b. GUID Partition (GPT) c. Dynamic Disk d. Master Boot Record Disk
Feedback Your answer is correct. Question 47 Correct Mark 1.00 out of 1.00
Flag question
Question text What type of notation does IP version 6 address uses? Select one: a. Decimal b. Binary c. Octal d. Hexadecimal
Feedback Your answer is correct. Question 48 Incorrect Mark 0.00 out of 1.00
Flag question
Question text
You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You log on to one of the portable computers by using a domain user account and install a new device for a bar-code scanner. You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You need to be able to roll back the driver to its previous version. What should you do? Select one: a. Start the portable computer from the Windows 7 installation media and select Startup Repair b. Start the computer and select Last Known Good Configuration from the advanced startup options c. Run the Device Manager by using elevated permissions d. From the Local Group Policy, modify Device Installation Restrictions
Feedback Your answer is incorrect. Question 49 Correct Mark 1.00 out of 1.00
Flag question
Question text It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows. Select one: a. Deployment b. Security c. Usability d. Reliability and Performance
Feedback
Your answer is correct. Question 50 Correct Mark 1.00 out of 1.00
Flag question
Question text Which of the following is not an advantage of installing a 64-bit edition of Windows 7? Select one: a. Improved Security b. It supports 16-bit Windows on Windows (WOW) environment c. Improved Performance d. More Memory Question 4 Not yet answered Marked out of 1.00
Flag question
Question text It enables the IT Administrators to automate one-to-several management of users and computers. Select one: a. Group Policy b. Action Center c. Applocker d. Control Panel