Os-answerkey.docx

  • Uploaded by: raijin bryan
  • 0
  • 0
  • February 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Os-answerkey.docx as PDF for free.

More details

  • Words: 6,990
  • Pages: 64
Loading documents preview...
Q1 – 100% Which of the following is not a Physical WAN Components? -Network Adapter It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority. - c. Switch Which of the following is not a LAN Physical Topology? - a. Crown It is the most common form of computer network. - a. Local Area Network It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic. - Virtual Local Area Network It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names. -DNS Server It is a computer that is dedicated to running network-aware application software. -Application Server It a server that is used to access the corporate resources from outside the corporate network. -Remote Access Server Which of the following is not the common network architecture types? -WiMax What is the IEEE 802 Standards for Local Wireless Networks? -IEEE 802.11 Q2 – 100% Which of the following is not a Specialized version of Windows 7? -Windows 7 Professional It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. -Upgrade Installation

It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation. -Sysprep It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition. -Clean Installation It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information. -Usability It is one of the Considerations on why using the option of Upgrade rather than Migrate. -Does not require the reinstallation of applications It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs. -Windows Upgrade Advisor Which of the following version of Windows are allowed for Upgrade? -Windows Vista SP1 Which of the following is not an advantage of installing a 64-bit edition of Windows 7? -It supports 16-bit Windows on Windows (WOW) environment It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows. -Reliability and Performance Prelim – 100% It is a device that converts instructions from the network protocol stack into electric signals. -Network Adapter It provides storage for the users' files and share folders that contain users' files. -File Server It a server that is used to access the corporate resources from outside the corporate network. -Remote Access Server It holds a copy of AD DS and responds to request for active directory information. -Domain Controller

It allows you to control which role functionality is installed and enabled. -Role Services It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic. -Virtual Local Area Network Which of the following is not the common network architecture types? -WiMax It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation. -Sysprep It is the most common form of computer network. -Local Area Network Which of the following is not a Server Role of Windows Server 2008 R2? -Windows Power Shell It is one of the Considerations on why using the option of Upgrade rather than Migrate. -Does not require the reinstallation of applications It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition. -Clean Installation Which of the following version of Windows are allowed for Upgrade? -Windows Vista SP1 It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority. -Switch Which of the following is not a Physical WAN Components? -Network Adapter What is the IEEE 802 Standards for Local Wireless Networks? -IEEE 802.11 It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.

-DNS Server Which of the following is not an advantage of installing a 64-bit edition of Windows 7? -It supports 16-bit Windows on Windows (WOW) environment It is a group of services hosted on a network which is a private structure and has the internet-like service provision. -Intranet It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information. -Usability Which of the following is not a Specialized version of Windows 7? -Windows 7 Professional It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration. -DHCP Server It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs. -Windows Upgrade Advisor It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. -Upgrade Installation Which of the following is not a LAN Physical Topology? -Crown It is a computer that is dedicated to running network-aware application software. -Application Server It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows. -Reliability and Performance Which of the following is not a Wireless LAN Standards? -802.11 h

It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.

Select one: a. Groups b. User Account c. Domain User d. Domain Controller

Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1

Flag question

Question text It enables the user to log on and access resources on a specific computer and usually reside in SAM. Select one: a. Built-in User Accounts b. None of the Choices c. Domain User Accounts d. Local User Accounts

Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1

Flag question

Question text

It is a way for you to limit use of disk space on a volume for each user to conserve disk space. Select one: a. Disk Shrinking b. Disk Fragmentation c. Disk Quotas d. None of the choices

Feedback Your answer is correct. Question 4 Correct Mark 1 out of 1

Flag question

Question text It contains the partition table for the disk and a small amount of executable code called as the master boot code. Select one: a. Master Boot Record Disk b. None of the choices c. GUID Partition (GPT) d. Dynamic Disk

Feedback Your answer is correct. Question 5 Correct Mark 1 out of 1

Flag question

Question text It is a collection of Domain Trees. Select one: a. Domain Local b. Forest c. Universal d. Global

Feedback Your answer is correct. Question 6 Correct Mark 1 out of 1

Flag question

Question text It enables IT Administrator to automate one-to-many management of users and computers. Select one: a. Organizational Units b. Group Policy c. None of the Choices d. Nesting Groups

Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1

Flag question

Question text It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory. Select one: a. Built-in User Accounts b. Domain User Accounts c. Local User Accounts d. None of the Choices

Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1

Flag question

Question text Which of the following is a main type of group? Select one: a. Universal b. Global c. Domain Local d. Distribution

Feedback Your answer is correct. Question 9 Correct Mark 1 out of 1

Flag question

Question text It is a scriptable command line utility that create scripts to automate disk related task. Select one: a. None of the choices b. Disk Management c. Local Disk d. Diskpart

Feedback Your answer is correct. Question 10 Correct Mark 1 out of 1

Flag question

Question text It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive. Select one: a. Simple Volume b. None of the choices c. Spanned Volume d. Striped Volume It is a method of sharing folders that allows you to share folders quickly. Select one: a. Basic Sharing

b. None of the choices c. Public Sharing d. Advance Sharing

Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1

Flag question

Question text It defines the type of access granted to a user, group, or computer for a file or folder. Select one: a. NTFS Permission b. Inherited Permission c. Explicit Permission d. None of the choices

Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1

Flag question

Question text It is the process of verifying the identity of something or someone. Select one: a. None of the choices

b. Authentication c. Authorization d. Access

Feedback Your answer is correct. Question 4 Correct Mark 1 out of 1

Flag question

Question text It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network. Select one: a. Public Sharing b. Advance Sharing c. Basic Sharing d. None of the choices

Feedback Your answer is correct. Question 5 Correct Mark 1 out of 1

Flag question

Question text It is the process of determining whether something or someone has permission to access the resources

Select one: a. None of the choices b. Access c. Authentication d. Authorization

Feedback Your answer is correct. Question 6 Correct Mark 1 out of 1

Flag question

Question text It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later Select one: a. None of the choices b. NTLM c. Kerberos v5 d. Certificate Mapping

Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1

Flag question

Question text

It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format. Select one: a. None of the choices b. GDI based printing c. PDF based printing d. XPS based printing

Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1

Flag question

Question text It is a feature of Windows 7 that allows windows 7 to be backward compatible Select one: a. Windows XP compatibility b. Virtual XP c. None of the choices d. Windows XP mode

Feedback Your answer is correct. Question 9 Correct Mark 1 out of 1

Flag question

Question text It is a new authentication features that controls the ability of online IDs to authenticate to a computer. Select one: a. Online Identity Integration b. Biometrics c. Smartcards d. None of the choices It contains an array of partition entries describing the start and end LBA of each partition on disk. Select one: a. None of the choices b. GUID Partition (GPT) c. Master Boot Record Disk d. Dynamic Disk

Feedback Your answer is correct. Question 2 Correct Mark 2.00 out of 2.00

Flag question

Question text It is the non-contiguous storage of data on a volume Select one: a. Disk Shrinking b. Disk Fragmentation c. Disk Quotas d. None of the choices

Feedback

Your answer is correct. Question 3 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally or on remote computers. Select one: a. Local Disk b. Diskpart c. Disk Management d. None of the choices

Feedback Your answer is correct. Question 4 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a way for you to limit use of disk space on a volume for each user to conserve disk space. Select one: a. Disk Fragmentation b. Disk Quotas c. None of the choices d. Disk Shrinking

Feedback Your answer is correct. Question 5 Correct Mark 2.00 out of 2.00

Flag question

Question text It contains the partition table for the disk and a small amount of executable code called as the master boot code. Select one: a. None of the choices b. Dynamic Disk c. Master Boot Record Disk d. GUID Partition (GPT)

Feedback Your answer is correct. Question 6 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a method of sharing folders that allows you to share folders quickly. Select one: a. Public Sharing b. None of the choices c. Basic Sharing

d. Advance Sharing

Feedback Your answer is correct. Question 7 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive. Select one: a. Spanned Volume b. Simple Volume c. Striped Volume d. None of the choices

Feedback Your answer is correct. Question 8 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a dynamic volume that joins areas of unallocated space disks into a single logical disk Select one: a. Simple Volume b. Spanned Volume

c. None of the choices d. Striped Volume

Feedback Your answer is correct. Question 9 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a collection of Domain Trees. Select one: a. Universal b. Forest c. Domain Local d. Global

Feedback Your answer is correct. Question 10 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format. Select one: a. None of the choices

b. PDF based printing c. XPS based printing d. GDI based printing

Feedback Your answer is correct. Question 11 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later Select one: a. NTLM b. Certificate Mapping c. Kerberos v5 d. None of the choices

Feedback Your answer is correct. Question 12 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.

Select one: a. Domain Controller b. Domain User c. User Account d. Groups

Feedback Your answer is correct. Question 13 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a feature of Windows 7 that allows windows 7 to be backward compatible Select one: a. Virtual XP b. None of the choices c. Windows XP compatibility d. Windows XP mode

Feedback Your answer is correct. Question 14 Correct Mark 2.00 out of 2.00

Flag question

Question text

It is an object that contains all of the information that defines a user in Windows Server 2008 R2. Select one: a. Domain Controller b. Groups c. Domain User d. User Account

Feedback Your answer is correct. Question 15 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a new authentication features that controls the ability of online IDs to authenticate to a computer. Select one: a. None of the choices b. Biometrics c. Online Identity Integration d. Smartcards

Feedback Your answer is correct. Question 16 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a scriptable command line utility that create scripts to automate disk related task. Select one: a. None of the choices b. Local Disk c. Disk Management d. Diskpart

Feedback Your answer is correct. Question 17 Correct Mark 2.00 out of 2.00

Flag question

Question text It defines the type of access granted to a user, group, or computer for a file or folder. Select one: a. None of the choices b. Explicit Permission c. NTFS Permission d. Inherited Permission

Feedback Your answer is correct. Question 18 Correct Mark 2.00 out of 2.00

Flag question

Question text It enables the user to log on and access resources on a specific computer and usually reside in SAM. Select one: a. Built-in User Accounts b. Local User Accounts c. None of the Choices d. Domain User Accounts

Feedback Your answer is correct. Question 19 Correct Mark 2.00 out of 2.00

Flag question

Question text It is the process of determining whether something or someone has permission to access the resources Select one: a. Authorization b. Authentication c. None of the choices d. Access

Feedback Your answer is correct. Question 20 Correct Mark 2.00 out of 2.00

Flag question

Question text Which of the following is a main type of group? Select one: a. Global b. Domain Local c. Universal d. Distribution

Feedback Your answer is correct. Question 21 Correct Mark 2.00 out of 2.00

Flag question

Question text It is a small software program that allows a hardware device to communicate with a computer Select one: a. Device Stage b. Drivers c. None of the choices d. Dynamic Update

Feedback Your answer is correct. Question 22

Correct Mark 2.00 out of 2.00

Flag question

Question text It is the process of verifying the identity of something or someone. Select one: a. None of the choices b. Access c. Authentication d. Authorization

Feedback Your answer is correct. Question 23 Correct Mark 2.00 out of 2.00

Flag question

Question text It enables IT Administrator to automate one-to-many management of users and computers. Select one: a. Organizational Units b. Group Policy c. None of the Choices d. Nesting Groups

Feedback Your answer is correct. Question 24

Correct Mark 2.00 out of 2.00

Flag question

Question text It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network. Select one: a. None of the choices b. Basic Sharing c. Public Sharing d. Advance Sharing

Feedback Your answer is correct. Question 25 Correct Mark 2.00 out of 2.00

Flag question

Question text It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory. Select one: a. Local User Accounts b. None of the Choices c. Built-in User Accounts d. Domain User Accounts It is a type of network that interconnect devices by means of radio waves instead of wires and cables.

Select one: a. Virtual Local Area Network b. Wireless Network c. Wired Network d. Campus Area Network

Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1

Flag question

Question text APIPA stands for: Select one: a. Automatic Private IP Addressing b. Asia Pacific Intellectual Property Association c. Automatic Protocol for Internet Public Address d. Association of Pacific Island Public Auditors

Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1

Flag question

Question text 172.16.0.0 /12 is what type of IPv4 Address.

Select one: a. Broadcast Address b. Host ID c. Private IP Address d. Public IP Address

Feedback Your answer is correct. Question 4 Incorrect Mark 0 out of 1

Flag question

Question text Strong EAP methods provide strong authentication Select one: a. IEEE 802.1X b. WPA-Personal c. WPA-Enterprise d. WPA2-Personal

Feedback Your answer is incorrect. Question 5 Incorrect Mark 0 out of 1

Flag question

Question text Which of the following is not a way to improve the signal strength?

Select one: a. None of the Choices b. Check for devices that may cause interference c. Ensure close proximity to the Wireless APs d. Check all Physical obstructions

Feedback Your answer is incorrect. Question 6 Correct Mark 1 out of 1

Flag question

Question text It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets. Select one: a. Subnet Mask b. Default Gateway c. Network Address d. Host ID

Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1

Flag question

Question text What type of notation does IP version 6 address uses?

Select one: a. Octal b. Binary c. Hexadecimal d. Decimal

Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1

Flag question

Question text It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA. Select one: a. Private IP Address b. Broadcast Address c. Public IP Address d. Network Address

Feedback Your answer is correct. Question 9 Correct Mark 1 out of 1

Flag question

Question text

What is the binary notation for the 255.255.255.0 subnet mask? Select one: a. 11111111.11111111.11111111.00000000 b. 11111111.11111111.11111110.00000000 c. 11111111.00000000.00000000.00000000 d. 11111111.11111111.11111000.00000000

Feedback Your answer is correct. Question 10 Correct Mark 1 out of 1

Flag question

Question text Which of the following statement is not correct? Select one: a. You can configure the client computer by using the command line: netsh wlan b. You can configure the client computer by going to the accessories in the start menu and clicking the network options. c. You can configure the client computer by using the Network Dialog Box and following the Wizard d. You can configure the client computer by using the group policy

Feedback Your answer is correct.

It is the measurement of how a system conforms to expected behavior Select one: a. Performance b. Security

c. Reliability d. Usability

Feedback Your answer is correct. Question 2 Correct Mark 1 out of 1

Flag question

Question text It is a software that is designed to deliberately harm a computer. Select one: a. Bitlocker b. Applocker c. None of the Choices d. Malicious Software

Feedback Your answer is correct. Question 3 Correct Mark 1 out of 1

Flag question

Question text It is an administrative tool for managing user settings and computer settings across a network. Select one: a. Window Update Group Policy

b. Windows Backup c. System Restore Points d. None of the choices

Feedback Your answer is correct. Question 4 Correct Mark 1 out of 1

Flag question

Question text It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system. Select one: a. Applocker b. Control Panel c. Group Policy d. Action Center

Feedback Your answer is correct. Question 5 Correct Mark 1 out of 1

Flag question

Question text It allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.

Select one: a. Group Policy b. Software Restriction Policies c. User Account Control d. Advanced Security Settings

Feedback Your answer is correct. Question 6 Correct Mark 1 out of 1

Flag question

Question text Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures. Select one: a. Windows Memory Diagnosstics Tool b. Performance Monitor c. Reliability Monitor d. Windows Network Diagnostics Tool

Feedback Your answer is correct. Question 7 Correct Mark 1 out of 1

Flag question

Question text

Which of the following is not a Performance Monitor tool? Select one: a. Data Collector Sets b. Monitoring Tools c. Windows Memory Diagnostics Tool d. Reports

Feedback Your answer is correct. Question 8 Correct Mark 1 out of 1

Flag question

Question text Which of the following is not a Boot-option for troubleshooting startup problems? Select one: a. Boot logging b. Safe Mode c. None of the choices d. Last known good configuration

Feedback

Your answer is correct. Question 9 Correct Mark 1 out of 1

Flag question

Question text It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops. Select one: a. User Account Control b. Applocker c. Bitlocker d. Encrypting File Systems

Feedback Your answer is correct. Question 10 Correct Mark 1 out of 1

Flag question

Question text It is the measurement on how quickly the computer completes a task. Select one: a. Security b. Performance c. Usability d. Reliability Question 1 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a software that is designed to deliberately harm a computer. Select one: a. Applocker b. None of the Choices c. Malicious Software d. Bitlocker

Feedback Your answer is correct. Question 2 Incorrect Mark 0.00 out of 1.00

Flag question

Question text You are the administrator for a large organization with multiple Windows Server 2008 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the sales group. How do you stop the sales group from accessing this one application? Select one: a. Give the Everyone group full control of the application b. Deny the Everyone group the rights to the application c. Create an executable rule from the Application Control Policy d. Create a security role from the Application Control Policy

Feedback

Your answer is incorrect. Question 3 Correct Mark 1.00 out of 1.00

Flag question

Question text It is the process of determining whether something or someone has permission to access the resources Select one: a. Authorization b. None of the choices c. Access d. Authentication

Feedback Your answer is correct. Question 4 Correct Mark 1.00 out of 1.00

Flag question

Question text Where will you see the Manage Wireless Networks tool in your PC? Select one: a. Control Panel b. Accessories c. Program Files d. System Tools

Feedback Your answer is correct. Question 5 Correct Mark 1.00 out of 1.00

Flag question

Question text It is an administrative tool for managing user settings and computer settings across a network. Select one: a. None of the choices b. Window Update Group Policy c. Windows Backup d. System Restore Points

Feedback Your answer is correct. Question 6 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a method of sharing folders that allows you to share folders quickly. Select one: a. Basic Sharing b. Public Sharing c. Advance Sharing

d. None of the choices

Feedback Your answer is correct. Question 7 Correct Mark 1.00 out of 1.00

Flag question

Question text It contains the partition table for the disk and a small amount of executable code called as the master boot code. Select one: a. Dynamic Disk b. None of the choices c. Master Boot Record Disk d. GUID Partition (GPT)

Feedback Your answer is correct. Question 8 Correct Mark 1.00 out of 1.00

Flag question

Question text It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration. Select one: a. Remote Access Server

b. DHCP Server c. None of the Choices d. DNS Server

Feedback Your answer is correct. Question 9 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs. Select one: a. Windows Upgrade Advisor b. Windows Easy Transfer c. None of the choices d. User State Migration Tool

Feedback Your answer is correct. Question 10 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following is not a Wireless LAN Standards? Select one:

a. 802.11 h b. 802.11 n c. 802.11 b d. 802.11 a

Feedback Your answer is correct. Question 11 Incorrect Mark 0.00 out of 1.00

Flag question

Question text You are the network administrator for a large organization. You are in charge of implementing company policies. One company policy states that you have to prevent Internet Explorer from saving any data during a user`s browsing session. How do you accomplish this? Select one: a. Private sessions should be enabled b. InPrivate sessions should be disabled c. Run the browsers in the InPrivate session d. Set the Internet Security setting to disabled

Feedback Your answer is incorrect. Question 12 Correct Mark 1.00 out of 1.00

Flag question

Question text

It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later Select one: a. Certificate Mapping b. Kerberos v5 c. None of the choices d. NTLM

Feedback Your answer is correct. Question 13 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following is not the common network architecture types? Select one: a. WiMax b. Ethernet c. FDDI (Fiber Distributed Data Interface) d. Token Ring

Feedback Your answer is correct. Question 14 Correct Mark 1.00 out of 1.00

Flag question

Question text It defines the type of access granted to a user, group, or computer for a file or folder. Select one: a. Inherited Permission b. None of the choices c. NTFS Permission d. Explicit Permission

Feedback Your answer is correct. Question 15 Correct Mark 1.00 out of 1.00

Flag question

Question text It provides storage for the users' files and share folders that contain users' files. Select one: a. Web Server b. File Server c. Application Server d. Domain Controller

Feedback Your answer is correct. Question 16 Correct Mark 1.00 out of 1.00

Flag question

Question text It is the measurement on how quickly the computer completes a task. Select one: a. Security b. Performance c. Reliability d. Usability

Feedback Your answer is correct. Question 17 Incorrect Mark 0.00 out of 1.00

Flag question

Question text Checks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel Select one: a. Windows Memory Diagnostics Tool b. Performance Monitor c. Windows Network Diagnostics Tool d. Reliability Monitor

Feedback Your answer is incorrect. Question 18 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive. Select one: a. None of the choices b. Simple Volume c. Striped Volume d. Spanned Volume

Feedback Your answer is correct. Question 19 Incorrect Mark 0.00 out of 1.00

Flag question

Question text You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7. You want to deploy a Windows image (WIM) file to other computers in the domain. You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file. What should you do before you capture the image? Select one: a. Run Diskpart.exe b. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk c. Run ScanState.exe d. Run Defrag.exe

Feedback

Your answer is incorrect. Question 20 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a way for you to limit use of disk space on a volume for each user to conserve disk space. Select one: a. Disk Quotas b. None of the choices c. Disk Shrinking d. Disk Fragmentation

Feedback Your answer is correct. Question 21 Correct Mark 1.00 out of 1.00

Flag question

Question text 172.16.0.0 /12 is what type of IPv4 Address. Select one: a. Private IP Address b. Host ID c. Public IP Address d. Broadcast Address

Feedback Your answer is correct. Question 22 Correct Mark 1.00 out of 1.00

Flag question

Question text It is an object that contains all of the information that defines a user in Windows Server 2008 R2. Select one: a. User Account b. Domain Controller c. Groups d. Domain User

Feedback Your answer is correct. Question 23 Correct Mark 1.00 out of 1.00

Flag question

Question text It is the built-in encryption tool for Windows file systems Select one: a. Applocker b. User Account Control c. Bitlocker

d. Encrypting File Systems

Feedback Your answer is correct. Question 24 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following is a main type of group? Select one: a. Universal b. Distribution c. Domain Local d. Global

Feedback Your answer is correct. Question 25 Correct Mark 1.00 out of 1.00

Flag question

Question text It enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory. Select one: a. Local User Accounts b. Built-in User Accounts

c. None of the Choices d. Domain User Accounts

Feedback Your answer is correct. Question 26 Correct Mark 1.00 out of 1.00

Flag question

Question text It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. Select one: a. None of the Choices b. Migration c. Upgrade Installation d. Clean Installation

Feedback Your answer is correct. Question 27 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a windows 7 feature that enables support staff to connect to a remote desktop computer. Select one:

a. Remote Assistance b. None of the Choices c. Virtual Private Network d. Remote Desktop

Feedback Your answer is correct. Question 28 Incorrect Mark 0.00 out of 1.00

Flag question

Question text What is the maximum bit rate for the 802.11n technologies? Select one: a. 11mbps b. 600mbps c. 54mbps d. None of the choices

Feedback Your answer is incorrect. Question 29 Correct Mark 1.00 out of 1.00

Flag question

Question text

You have a computer that runs Windows 7. The computer is a member of a workgroup. You use Encrypting File System (EFS) to protect your local files. You need to ensure that you can decrypt EFS files on the computer if you forget your password. What should you do? Select one: a. From BitLocker Drive Encryption, Select Manage BitLocker and Turn On BitLocker b. From Credential Manager, select Back up Vault. c. From User Accounts, Select Manage your file encryption certificates. d. From Authorization manager, Modify the Authorization Manager options.

Feedback Your answer is correct. Question 30 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following is not a Performance Monitor tool? Select one: a. Data Collector Sets b. Monitoring Tools c. Reports d. Windows Memory Diagnostics Tool

Feedback Your answer is correct. Question 31 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system. Select one: a. Control Panel b. Applocker c. Group Policy d. Action Center

Feedback Your answer is correct. Question 32 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a type of network that interconnect devices by means of radio waves instead of wires and cables. Select one: a. Campus Area Network b. Wireless Network c. Wired Network d. Virtual Local Area Network

Feedback Your answer is correct. Question 33 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit. Select one: a. Domain User b. User Account c. Domain Controller d. Groups

Feedback Your answer is correct. Question 34 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a small software program that allows a hardware device to communicate with a computer Select one: a. Dynamic Update b. None of the choices c. Drivers d. Device Stage

Feedback Your answer is correct.

Question 35 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a computer that is dedicated to running network-aware application software. Select one: a. File Server b. Application Server c. Domain Controller d. Web Server

Feedback Your answer is correct. Question 36 Correct Mark 1.00 out of 1.00

Flag question

Question text What is the binary notation for the 255.255.255.0 subnet mask? Select one: a. 11111111.00000000.00000000.00000000 b. 11111111.11111111.11111110.00000000 c. 11111111.11111111.11111111.00000000 d. 11111111.11111111.11111000.00000000

Feedback Your answer is correct.

Question 37 Correct Mark 1.00 out of 1.00

Flag question

Question text It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information. Select one: a. Security b. Usability c. Deployment d. Reliability and Performance

Feedback Your answer is correct. Question 38 Correct Mark 1.00 out of 1.00

Flag question

Question text It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops. Select one: a. Bitlocker b. Applocker c. Encrypting File Systems d. User Account Control

Feedback

Your answer is correct. Question 39 Correct Mark 1.00 out of 1.00

Flag question

Question text This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions. Select one: a. Internet b. Firewall c. Bitlocker d. Group Policy

Feedback Your answer is correct. Question 40 Correct Mark 1.00 out of 1.00

Flag question

Question text You are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use? Select one: a. General b. Recovery c. Log On

d. Dependencies

Feedback Your answer is correct. Question 41 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following statement is not correct? Select one: a. You can configure the client computer by using the group policy b. You can configure the client computer by using the Network Dialog Box and following the Wizard c. You can configure the client computer by going to the accessories in the start menu and clicking the network options. d. You can configure the client computer by using the command line: netsh wlan

Feedback Your answer is correct. Question 42 Correct Mark 1.00 out of 1.00

Flag question

Question text It holds a copy of AD DS and responds to request for active directory information. Select one: a. Domain Controller

b. Web Server c. Application Server d. File Server

Feedback Your answer is correct. Question 43 Correct Mark 1.00 out of 1.00

Flag question

Question text It provides assistance in resolving network-related issues Select one: a. Performance Monitor b. Windows Memory Diagnostic Tool c. Windows Network Diagnostics Tool d. Reliability Monitor

Feedback Your answer is correct. Question 44 Correct Mark 1.00 out of 1.00

Flag question

Question text This Power plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize the battery life. Select one:

a. High Performance b. None of the Choices c. Balanced d. Power Saver

Feedback Your answer is correct. Question 45 Correct Mark 1.00 out of 1.00

Flag question

Question text It is the most common form of computer network. Select one: a. Campus Area Network b. Local Area Network c. Metropolitan Area Network d. Wide Area Network

Feedback Your answer is correct. Question 46 Correct Mark 1.00 out of 1.00

Flag question

Question text It contains an array of partition entries describing the start and end LBA of each partition on disk.

Select one: a. None of the choices b. GUID Partition (GPT) c. Dynamic Disk d. Master Boot Record Disk

Feedback Your answer is correct. Question 47 Correct Mark 1.00 out of 1.00

Flag question

Question text What type of notation does IP version 6 address uses? Select one: a. Decimal b. Binary c. Octal d. Hexadecimal

Feedback Your answer is correct. Question 48 Incorrect Mark 0.00 out of 1.00

Flag question

Question text

You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You log on to one of the portable computers by using a domain user account and install a new device for a bar-code scanner. You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You need to be able to roll back the driver to its previous version. What should you do? Select one: a. Start the portable computer from the Windows 7 installation media and select Startup Repair b. Start the computer and select Last Known Good Configuration from the advanced startup options c. Run the Device Manager by using elevated permissions d. From the Local Group Policy, modify Device Installation Restrictions

Feedback Your answer is incorrect. Question 49 Correct Mark 1.00 out of 1.00

Flag question

Question text It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows. Select one: a. Deployment b. Security c. Usability d. Reliability and Performance

Feedback

Your answer is correct. Question 50 Correct Mark 1.00 out of 1.00

Flag question

Question text Which of the following is not an advantage of installing a 64-bit edition of Windows 7? Select one: a. Improved Security b. It supports 16-bit Windows on Windows (WOW) environment c. Improved Performance d. More Memory Question 4 Not yet answered Marked out of 1.00

Flag question

Question text It enables the IT Administrators to automate one-to-several management of users and computers. Select one: a. Group Policy b. Action Center c. Applocker d. Control Panel

More Documents from "raijin bryan"

Os-answerkey.docx
February 2021 1
February 2021 2
Shaum-6-y-7-solucionado
February 2021 1
January 2021 2
February 2021 2