You are on page 1of 6

University of Education

Multan Campus
Department of Information Technology

<<Assignment>>
System And Networks
Administration Windows Based
<<Topic>>
Sharing Folder Permission
And Local Security Policy

Submitted By:
<<mcf2001181>>
<<Muhammad Shahzad>>

Submitted To
Sir Syed Zain Ul Abdin Bukhari

Date
<< 25 April 2021>>

1
Multiple choices questins

1) A ____ is a collection of related files and subfolders.

(A) Menu

(B) Disk

(C) Operating System

(D) Folder

2) ____ is a program that helps us to manage our files and folders.

(A) Windows

(B) Help

(C) DOS

(D) Windows Explorer

3) The Explorer bar is divided into ___ categories.

(A) 2

(B) 3

(C) 5

(D) 7

4) ____ allows us to copy, move and delete files and folders.

(A) Internet Explorer

(B) Windows Explorer

(C) Front page

(D) Programs

2
5) __ is a program to safeguard our computer system from the virus programs.

(A) Antivirus

(B) Data

(C) Virus

(D) None of these

6) Installation means the addition of program files and folders to your _____

(A) Hard disk

(B) RAM

(C) Memory disk

(D) Floppy

7) By default, Windows XP Professional locks the ___

(A) Taskbar

(B) Start menu

(C) Program menu

(D) Explorer menu

8) Windows XP includes more functionality for the ___

(A) Alt key

(B) Function key

(C) Winkey

(D) Ctrl key

9) Virus designers mainly attack ___


3
(A) UNIX

(B) DOS

(C) Linux

(D) Windows OS

10) The ____ on the Start menu offers an alternate method to start applications or open
data files.

(A) Run command

(B) Find command

(C) Settings command

(D) All programs

11) DNS translates a Domain name into _________

a. Hex
b. Binary
c. IP
d. URL

12) Which one of the following systems cannot be considered as an example of the oper-
ating systems?

a. Windows 8
b. Red Hat Linux
c. BSD Linux
d. Microsoft Office

4
13) In the CIA Triad, which one of the following is not involved?

a. Availability
b. Confidentiality
c. Authenticity
d. Integrity

14) In an any organization, company or firm the policies of information security come
under__________

a. CIA Triad
b. Confidentiality
c. Authenticity
d. None of the above

15) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?

a. They help in understanding the hacking process


b. These are the main elements for any security breach
c. They help to understand the security and its components in a better manner
d. All of the above

16) In order to ensure the security of the data/ information, we need to ____________
the data:

a. Encrypt
b. Decrypt
c. Delete
d. None of the above

5
17) Which one of the following is considered as the most secure Linux operating system
that also provides anonymity and the incognito option for securing the user's informa-
tion?

a. Ubuntu
b. Tails
c. Fedora
d. All of the above

18) Which type following UNIX account provides all types of privileges and rights
which one can perform administrative functions?

a. Client
b. Guest
c. Root
d. Administrative

19) Which of the following is considered as the first hacker's conference?

a. OSCON
b. DEVON
c. DEFCON
d. SECTION

20) Which of the following known as the oldest phone hacking techniques used by hack-
ers to make free calls?

a. Phreaking
b. Phishing
c. Cracking
d. Spraining

You might also like