Professional Documents
Culture Documents
1. What type of memory used in the Solid State Drive (SSD) as a storage?
Flash Memory
2. It occurs when an attacker or trusted insider steals data from a computer system and demands
compensation for its return.
Information Extortion
Malicious code
Theft
Threat
3. What IP address used by the virtual machine to communicate over the physical network?
Customer address
Internet address
Private address
Provider Address
4. A utility tool that test whether a particular host is reachable across an IP network.
Dxdiag
Netstat
Ping
Tracer
IEEE.801.11
IEEE.802.11
IEEE.803.11
IEEE.804.11
7. What type of version that protects unauthorized network access by utilizing a set-up password?
WPA2-Enterprise
WPA2-Personal
9. A single physical hard drive can divide into multiple _______ hard drives?
Boot
Local
Logical
Single
10. What enables users of Windows that corrects any problems preventing from booting up
normally?
Disk cleanup
Ipconfig
Safe mode
Task Manager
Browser
E-commerce
12. _______ consist of user matrices and capability tables that govern the rights and privileges of
users.
Statement of Policy
System Management
Systems-Specific Policy
14. A computer program used to prevent, detect, and remove possible threats to the system.
Anti-Virus Software
Defragment Software
Scandisk Software
Direct Software
15. In windows 7, when LAN connection has a cross and red indicator signifies that there is ______
LAN update
16. It is a networking device that forwards data packets between computer networks.
Hub
Patch Panel
Router
17. What starts up recovery options in a computer that essentially boot into the RECOVERY partition
of the main hard drive?
Command Prompt
Repair Computer
Safe mode
System Restore
18. What application group contains a client access point and with at least one application specific
resource?
Active node
Cluster
Cluster resource
19. What is the volt rating of the RED wire in a power supply?
-5V
+5V
-12V
+12V
Computer
Hardware
Registry
21. What are the two types of interface used to communicate between the hard drive and the computer
motherboard?
Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA)
Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)
Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA)
22. What services in Windows Server that enables administrators to migrate data to a lower-cost and
tape media on file server?
23. Which of the following key is not appropriate to enter BIOS setup?
F1
F2
F5
F10
24. _________ is a two or more PCs are connected and share resources without going through a
separate server computer.
Client Server
Backup File
ISO image
Memory Map
Stored File
26. It monitors the initial security accreditation of an information system for tracking of changes.
Configuration Management
Continuous Assessment
Network Monitoring
27. ____ is a network cable where one end is T568-A while the other is T568-B configuration.
Cross-Over
Extreme
Roll-Over
Straight-Thru
28. What is the minimum requirement for hard disk drive capacity in Windows 10?
29. Which of the following hardware components can connect over a computer network?
Network Driver
30. What is the common color for the USB 3.0 connector for Standard A receptacles and plugs?
Black
Blue
Red
White
PART II
31. What IP address used by the virtual machine to communicate over the physical network?
Customer address
Internet address
Private Address
Provider Address
32. What storage device should replace if frequent error messages appear while moving files booting up
operating up operating system?
Flash drive
Hard disk
Optical drive
Change option
Good option
Normal booting
5 ft.
1.2 yards
1.5 meters
5 meters
36. A Yost cable, Cisco cable and a console cable also known as ________ .
Cross-Over
Extreme
Straight-Thru
Roll-0ver
37. An automated software program that executes certain commands when it receives a specific input is
____ .
Boot
Malicious code
Spyware
Threat
38. _________ is a computer network made up of an interconnection of local area networks (LANS)
within a limited geographical area, e.g. corporate buildings.
39. What windows update that downloads and installs latest version?
Check update
Full updates
Fully automatic
Semiautomatic
40. What feature in windows severs provides the ability to migrate workloads between a source and
target cluster?
Failback
Failover
Live migration
Shared storage
41. What is the volt rating of the YELLOW wire in a power supply?
-5V
+5V
-12V
+12V
42. An extension of Microsoft management console used to manage hardware devices including device
drivers.
Console Manager
Device Manager
Hardware Manager
Peripheral Manager
43. What software program stores into a Read Only Memory (ROM)
Driver
Firmware
Flash IC
Power On Self
44. What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?
45. It occurs when two or more devices connected with the same IP address in a computer network.
IP address conflict
46. Port _____ is an application of network address translation (NAT) that redirects a communication
request from one address and port number combination to another.
Evaluation
Forwarding
Request
Standard
47. What type of version that verifies network users through server and requires a more complicated
setup, but provides additional security?
WPA2 – Enterprise
WPA2 – Personal
48. Who is assign to monitor the network security, operation and network users?
Encoder
End-user
Network Administrator
Installer image
ISO image
WIM image
50. What recovery console commands that writes a new master boot record on the hard disk drive?
Bmrui
Bootrec
Chkdsk
Fixmbr
51. What is the physically damaged cluster of storage on the hard drive?
Bad sector
Volume
52. ______ is used to store the user documents with a large amount of memory and storage space.
Application Server
File Server
Mail Server
Print Server
Interface sink
Thermal Paste
54. Light Emitting diode (LED) in Network Interface Card (NIC) has _____ lights.
55. _____ is a way to identify a specific process to which an internet or other network message
forwarded when it arrives at the server.
IP address
PING
Port number
Proxy server
56. The recovery console command that examines the volume for errors and repairs it.
Bootcfg
Bootrec
Chkdsk
Mbr
57. What is the alternative for wired connection that users radio frequencies to send signals between
devices and a router?
Wireless Fidelity
Wireless Finder
Wireless Firmware
Wireless Fix
58. What log files that record performance statistics based on the various performance objects and
instances available in performance monitor?
Circular logging
Counter logs
Linear Logging
59. _______ enables administrators to configure storage thresholds on particular sets of data stored on
server NTFS volumes.
Data compression
60. In server 2008, Local Area Network (LAN) connection icon in a yellow color indicator signifies
_______.
Driver problem
No connectivity
Update
Virus
PART III
61. It is used as a substitute for actual disc, allowing users to run software without having to load a CD or
DVD.
Bootsys file
CMD file
Hyberfil file
ISO file
62. What second clustering technology provides by corresponding client requests across several servers
with replicated configurations?
Luster qourum
Hyper-V virtualization
Quick Migration
63. What Ethernet cable used to connect computers to hubs & switches?
Cross-Over
Extreme
Roll-Over
Straight-Thru
64. ______allows users to move around the coverage area in a line of sight while maintaining a network
connection.
Basic Input Output System Random Access Memory (BIOS RAM) chip
Complementary Metal Oxide Semiconductor Read Only Memory (CMOS ROM) chip
67. What is the maximum cable length for USB 3.0 using a non-twisted pair wire
3 meters
4 meters
5 meters
10 meters
68. Which of the following is the most efficient in transferring larger files?
Control Protocol
Class A
Claas B
Class C
Class D
70. What Windows edition has a program capable of restricting other users to access certain programs
in a computer?
Wubdiws Extreme
Windows Basic
Windows Professional
Windows Ultimate
71. What technique used to gain unauthorized access to computers, wherein the intruder sends
messages with a source IP address?
Sniffers
Spam
Spoofing
Spyware
NetBackup
NetCopy
NetFile
NetSave
73. A tool used for checking the condition of the hard drive with signs like “Good” “Caution” or “Bad”.
Defragmented
Disk Management
Scandisk
74. What is the problem of a computer if the time and date keeps on resetting even after fixing in the
BIOS?
CPU overheating
System crashing
75. What command line tool used to find the IP address that corresponds to a host or domain name?
Ms dos
Nslookup
Ping
Tracert
Drv
Program files
Registry
System32
78. It enables administrators to define the types of file hat can save within a Windows volume and
folder.
File Encryption
File Screening
79. _____allows to define a list of devices and only allow these devices on WI-FI Network.
Wireless Security
Memory
Motherboard
Power supply
Storage drive
Hub
LAN Card
Switch
WAP
82. A protocol that provides quick, automatic and central management for the distribution of IP
addresses within a network.
Debugging
Software diagnostic
Software troubleshooting
Testing
Attack
Exploit
Exposure
Loss
86. A type of server that allows the central administration and management of network users and
network resources.
Application server
Database server
Directory server
File server
87. What log files that conserves disk space by ensuring that the performance log file will not continue
growing certain limits?
Circular Logging
Counter Logs
Linear Logging
Bridge
Core
Edge
Network
89. The network security standard that tries to make connections between a router and wireless devices
faster and easier.
TKIP
WPS
WPA2-Enterprise
WPA2-Personal
90. A _____should be upgraded to receive and transmit strong signals to and from other computer.
Video card
Memory card
Network card
Sim card
PART IV
91. What networking tool that monitors and intercepts traffics over the computer network?
Frequency analyzer
Packet analyzer
Protocol analyzer
92. What pertains to the maximum data transfer rate of a network for internet connection?
Backbone
Backhaul
Bandwidth
Broadband
93. What media types of 10-megabit Ethernet that compose a broadband coaxial cable carrying multiple
baseband channels for a maximum length of 3,600 meters?
10Base-T
10BASE-2
10BASE-5
10BASE-36
94. An enclosed or semi-enclosed channel that protects, routes, and hides cables and wires
Holder
Rack
Panel
Raceway
95. A material that slid before crimping both ends of a patch cable and acts to reduce strain in a cable.
Boot
Protector
Shield
Ring
96. What type of peripheral card having media access control address?
Firmware card
97. It acts like a border router to connect corporate sites to wired access lines.
Infinite ohms
Zero ohm
10 Mega ohms
512MB
1GB
2GB
4GB
101. What test verifies the operation of communication device by sending and receiving data forms
from the same port?
Routing test
Signal test
Device Manager
Programs
Settings
System Performance
103. _________ is a 24 pin USB connector system with a rotationally symmetrical connector.
Ultra Extreme
104. What type of a high-speed network/subnetwork that composed of hosts and interconnects using a
variety of technology/topology?
105. A type of server that occupies a large portion of computing a territory between the database server
and end user.
Application Server
Client Server
Directory server
File Server
106. _____ defined as a structured network cabling system standards for commercial buildings, and
between buildings in campus environments.
ANSI/TIA-567
ANSI/TIA-568
ANSI/TIA-566
ANSI/TIA-587
107. In the context of security, _____ is a privilege or assigned permission for the use of computer data
resources.
Access
Asset
Attack
Exploit
108. It facilitates communication between the CPU and other devices in the system.
Bus
Chipset
109. Which of the following commands used to certify the peer name resolution in Active Directory?
DCPROMO
DNSCMD
FORMAT
NSLOOKUP
Downtime
Recovery
Reliability
Unavailability
111. In networking, ______ refers to the pieces of related information that are transferred through a
network.
Access
Connection
Packet
Wi-Fi
112. What active directory protocol used to access data from a database?
113. Which of the following displays the measures and various real-time statistics on the system’s
performance?
Counter Logs
Counter Monitoring
Class A
Class B
Class C
Class D
115. What type of router that enables an internal network to connect to external network?
Broadband
Core
Edge
Forwarding
116. Which of the following is a term for the main patch panel that links to every telecommunication
room inside the building?
Lead Extension
Multiplexer
Vertical cross-connect
117. Minimum byte capacity of a bootable flash drive for Windows 10 is ____.
4GB
8GB
16GB
32GB
Authentication
Authorization
Encryption
Identification
119. A network security system that monitors and controls incoming and outgoing network traffic based
on predetermined security rules.
Firewall
Gateway
Group Policy
120. What voltages that ATX12V P1 connector provides for the motherboard?
3.3V, 5V
3.3V, 12V
5V, 12V
PART V
121. What type of server that enables large numbers users to exchange information near
instantaneously and formerly known as Internet Relay Chat (IRC) Servers?
Directory server
Proxy servers
Server Platforms
123. What two command-line utilities used to export and import Active Directory object information?
Connections.txt
Ipconfig
Netstat
Ping
125. A device that acts as a bridge between wireless clients and wired network is _____.
Access Point
Broadband
Hub
Router
126. A node on a computer network that allows data to flow one discrete network to another.
Gateway
Hub
Router
127. In Windows 7, an indicator tells that a video driver has not installed.
No video display
128. It is the time lapse between data sent and when received, it can have a big impact on performance.
Cycle
Delay
Gap
Latency
129. A setup option in Unified Extensible Firmware Interface (UEFI)/ Basic Input Output System (BIOS)
that allows security settings to perform such tasks as locating the device.
LoJack
Remote PC On
Tracker On
Wake on LAN
130. What set of rules that describe how software and hardware should interact within a network?
Communications protocol
Group policy
Multihomed host
131. A text based command used for creating bootable flash drive.
Boot
Chkdsk
Diskpart
Format
132. Which of the following electronic components need to discharge electrically before the
replacement of parts?
Capacitor
Diode
Resistor
Transistor
Zero volt
134. What type of backup used in hard drive, disc, flash drive and external drive that are housed on site?
Differential backup
Incremental backup
Full backup
Local backup
135. It ensures that information and programs are changing only in a specified and authorized manner.
Availability
Confidentiality
Integrity
Security
136. What is the minimum Random Access Memory (RAM) requirement of Server 2008 R2?
512MB
1GB
2GB
4GB
137. What electrical quantities measured when performing continuity testing of twisted pair cable?
Capacitance
Conductance
Inductance
Resistance
138. ______ which means pushing component to its limits and extremes.
Interface Test
Logical Test
Stress Test
Technical Test
Class A
Class B
Class C
Class D
Power On Self-Test
Windows Update
141. A logical subnetwork that groups collection of devices from the same network switch.
142. Set of rules for transferring files such as text, graphic images, sound, video and other multimedia
files, on the World Wide Web (WWW).
143. What attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with
the intent to destroy or steal information?
Bot
Information Extortion
Malicious code
Polymorphic
144. _________ is an interface standard for a serial bus for high – speed communications, also referred
as institution of Electrical and Electronics Engineers (IEEE) 1394 interface.
Firewire
Thunderbolt
145. What recovery tool in Windows fixes and scans computer problem that prevents computer from
booting repeatedly?
Boot sequence
Restore point
Startup repair
146. What is a hardware device that enables to connect serial devices across a network?
Com Port
Coaxial Cable
Register Jack
Terminal Server
200
150
100
Cable conduiting
Cable passing
Cable pressing
Cable splicing
149. What is the traditional method used to access server data and using the server message block
protocol over TCP/IP?
150. The most current wireless networking standard and can communicate with the older network
standards.
802.11a
802.11b
802.11g
802.11n