Beruflich Dokumente
Kultur Dokumente
1. Which of the following is not the common network architecture types? WiMax
2. It enables you to manage network traffic, group physically dispersed nodes into logical area
networks and isolate network traffic. Virtual Local Area Network
3. What is the IEEE 802 Standards for Local Wireless Networks? IEEE 802.11
4. It is the most common form of computer network. Local Area Network
5. Which of the following is not a LAN Physical Topology? Crown
6. Which of the following is not a Physical WAN Components? Network Adapter
7. Which of the following is not a Wireless LAN Standards? 802.11 h
8. It is a group of services hosted on a network which is a private structure and has
the internet-like service provision. Intranet
9. It is a device that converts instructions from the network protocol stack into electric signals.
Network Adapter
10. It is a device that provides wiring concentrator functionality like a hub but it also enables
network traffic management, performs firewall functions and makes routing decisions based
upon traffic priority. Switch
QUIZ 2
1. Which of the following is not a Server Role of Windows Server 2008 R2? Windows Power
Shell
2. It allows you to control which role functionality is installed and enabled. Role Services
3. It provides storage for the users' files and share folders that contain users' files. File Server
4. It holds a copy of AD DS and responds to request for active directory information. Domain
Controller
5. It is a computer that is dedicated to running network-aware application software.
Application Server
6. It a server that is used to access the corporate resources from outside the corporate
network. Remote Access Server
7. It reduces the complexity and amount of administrative work by using automatic TCP/IP
configuration. DHCP Server
8. It is the foundation of the Internet naming scheme and it supports accessing resources by
using alphanumeric names. DNS Server
QUIZ 3
1. It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search
for, and view information. Usability
2. It is a tool used to remove system-specific data from the Windows operating system,
configure windows to start in audit mode, configure the windows operating system to start
the Windows Welcome phase and reset Windows Product activation. Sysprep
3. It is one of the Key Features of Windows 7 that takes advantage of modern computing
hardware, running more reliably and providing more consistent performance than previous
versions of Windows. Reliability and Performance
4. Which of the following is not a Specialized version of Windows 7? Windows 7
Professional
5. Which of the following is not an advantage of installing a 64-bit edition of Windows 7? It
supports 16-bit Windows on Windows (WOW) environment
6. It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new
partition and replace an existing operating system on a partition. Clean Installation
7. It is one of the Options for Installing Windows 7 where in you replace an existing version of
Windows with Windows 7 but all user applications, files and settings are retained. Upgrade
Installation
8. It is one of the Considerations on why using the option of Upgrade rather than Migrate.
Does not require the reinstallation of applications
9. Which of the following version of Windows are allowed for Upgrade? Windows Vista SP1
10. It is a downloadable application that helps windows user identify which edition of Windows 7
meets their needs. Windows Upgrade Advisor
QUIZ 4
QUIZ 5
1. It contains the partition table for the disk and a small amount of executable code called as
the master boot code. Master Boot Record Disk
2. It contains an array of partition entries describing the start and end LBA of each partition on
disk. GUID Partition (GPT)
3. It is a graphical user interface that is used to manage disks and volumes both basic and
dynamic, locally or on remote computers. Disk Management
4. It is a scriptable command line utility that create scripts to automate disk related task.
Diskpart
5. It is a dynamic volume that encompasses available free-space from single, dynamic, hard
disk drive. Simple Volume
6. It is a dynamic volume that joins areas of unallocated space disks into a single logical disk
Spanned Volume
7. It is the non-contiguous storage of data on a volume Disk Fragmentation
8. It is a way for you to limit use of disk space on a volume for each user to conserve disk
space. Disk Quotas
9. It is a small software program that allows a hardware device to communicate with a
computer Drivers
QUIZ 6
1. It is the process of verifying the identity of something or someone. Authentication
2. It is the process of determining whether something or someone has permission to access the
resources Authorization
3. It is a Windows Authentication Method that is used by windows 7 clients and server running
Microsoft Windows Server 2000 or later Kerberos v5
4. It is a new authentication features that controls the ability of online IDs to authenticate to a
computer. Online Identity Integration
5. It defines the type of access granted to a user, group, or computer for a file or folder. NTFS
Permission
6. It is a method of sharing folders that allows you to share folders quickly. Basic Sharing
7. It is a method of sharing folders that allow multiple default public folders for each computer
and files shared with same computer and with same network. Public Sharing
8. It is a type of printing wherein it is used by legacy application in pre-vista version of
windows that uses enhanced metafile format (EMF) as the spool file format. GDI based
printing
9. It is a feature of Windows 7 that allows windows 7 to be backward compatible Windows
XP mode
QUIZ 7
1. It is a type of network that interconnect devices by means of radio waves instead of wires
and cables. Wireless Network
2. It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong
(AES) encryption used by medium and large organization. WPA-Enterprise
3. Strong EAP methods provide strong authentication IEEE 802.1X
4. Where will you see the Manage Wireless Networks tool in your PC? Control Panel
5. Which of the following statement is not correct? You can configure the client computer
by using the group policy
6. What is the maximum bit rate for the 802.11n technologies? 600mbps
7. Which of the following is not a way to improve the signal strength? None of the Choices
8. It is a wireless network modes that allows a wireless network adapters connects directly to
another wireless network adapter for the purpose of temporarily sharing of files,
presentations or an internet connection among multiple computers and devices. Ad hoc
mode
QUIZ 9
1. It is a central location for viewing messages about your system and the starting point for
diagnosing and solving issues with your system. Action Center
2. It is a software that is designed to deliberately harm a computer. Malicious Software
3. It enables the IT Administrators to automate one-to-several management of users and
computers. Group Policy
4. It is the built-in encryption tool for Windows file systems Encrypting File Systems
5. It is one of the feature of Windows 7 that encrypts the computer operating system and data
stored on the operating system volume. Bitlocker
6. It is a new Windows 7 security feature that enables IT professionals to specify exactly what
is allowed to run on user desktops. Applocker
7. It is a security feature that simplifies the ability of users to run as standard users and
perform all neccessary daily tasks User Account Control
8. It allows the administrators to identify which software is allowed to run and was initially
added to Windows XP and Windows Server 2003. Software Restriction Policies
9. This are equivalents to door locks, employee badges and security systems. It protects the
computer and networks from intrusions. Firewall
10. It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that
using delete browsing history to maintain privacy because there are no logs kept or tracks
made during browsing InPrivate Browsing
QUIZ 10