You are on page 1of 33

PART I

1. What type of memory used in the Solid State Drive (SSD) as a storage?

Dynamic Random Access Memory (DRAM)

Flash Memory

Read Only Memory (ROM)

Solid State Drive (SSD)

2. It occurs when an attacker or trusted insider steals data from a computer system and demands
compensation for its return.

Information Extortion

Malicious code

Theft

Threat

3. What IP address used by the virtual machine to communicate over the physical network?

Customer address

Internet address

Private address

Provider Address

4. A utility tool that test whether a particular host is reachable across an IP network.

Dxdiag

Netstat

Ping

Tracer

5. Wi-Fi is trademarked phrase, which means

IEEE.801.11

IEEE.802.11
IEEE.803.11

IEEE.804.11

6. It is originally, where the BIOS stored in a standard PC.

Hard Disk Drive (HDD)

Random Access Memory (RAM)

Read Only Memory (ROM)

Solid State Drive (SSD)

7. What type of version that protects unauthorized network access by utilizing a set-up password?

Temporary Key Integrity Protocol (TKIP)

Wi-Fir Protected Setup (WPS)

WPA2-Enterprise

WPA2-Personal

8. A type of network that interconnects multiple local area network.

Campus Area Network (CAN)

Local Area Network (LAN)

Metropolitan Area Network (MAN)

Wide Area Network (WAN)

9. A single physical hard drive can divide into multiple _______ hard drives?

Boot

Local

Logical

Single

10. What enables users of Windows that corrects any problems preventing from booting up
normally?
Disk cleanup

Ipconfig

Safe mode

Task Manager

11. What is the spider-like interconnection in millions of pieces of information located on


computers around the cyber space?

Browser

E-commerce

Internet of Things (IOT)

World Wide Web

12. _______ consist of user matrices and capability tables that govern the rights and privileges of
users.

Access control list

Statement of Policy

System Management

Systems-Specific Policy

13. ____ is a collection of devices connected together in on physical location.

Campus Area Network (CAN)

Local Area Network (LAN)

Metropolitan Area Network (MAN)

Wide Area Network (WAN)

14. A computer program used to prevent, detect, and remove possible threats to the system.

Anti-Virus Software

Defragment Software

Scandisk Software
Direct Software

15. In windows 7, when LAN connection has a cross and red indicator signifies that there is ______

Emergency that needs attention

LAN update

Problem with the LAN driver

Virus in the LAN

16. It is a networking device that forwards data packets between computer networks.

Hub

Patch Panel

Router

Wireless Access Point (WAP)

17. What starts up recovery options in a computer that essentially boot into the RECOVERY partition
of the main hard drive?

Command Prompt

Repair Computer

Safe mode

System Restore

18. What application group contains a client access point and with at least one application specific
resource?

Active node

Cluster

Cluster resource

Virtual cluster server

19. What is the volt rating of the RED wire in a power supply?
-5V

+5V

-12V

+12V

20. Where do windows device drivers store?

Computer

Drivers and Settings

Hardware

Registry

21. What are the two types of interface used to communicate between the hard drive and the computer
motherboard?

Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA)

Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)

Industry Standard Architecture (ISA) and Advanced Technology Attachment (ATA)

Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA)

22. What services in Windows Server that enables administrators to migrate data to a lower-cost and
tape media on file server?

Data Compression Service

File Screening Service

Remote Storage Service

Volume Shadow Copy Service

23. Which of the following key is not appropriate to enter BIOS setup?

F1

F2

F5
F10

24. _________ is a two or more PCs are connected and share resources without going through a
separate server computer.

Client Server

Local Area Network

Peer to Peer Network

Personal Area Network

25. _______is a complete copy of everything stored on a physical optical disc.

Backup File

ISO image

Memory Map

Stored File

26. It monitors the initial security accreditation of an information system for tracking of changes.

Configuration Management

Continuous Assessment

Measurement and Metrics

Network Monitoring

27. ____ is a network cable where one end is T568-A while the other is T568-B configuration.

Cross-Over

Extreme

Roll-Over

Straight-Thru

28. What is the minimum requirement for hard disk drive capacity in Windows 10?

16GB for 32-bit OS or 20GB for 64-bit OS


20GB for 32-bit OS or 30GB for 64-bit OS

20GB for 32-bit OS or 40GB for 64-bit OS

30GB for 32-bit OS or 40GB for 64-bit OS

29. Which of the following hardware components can connect over a computer network?

Network Driver

Network Hardware Card

Network Interface Card

Network Module Card

30. What is the common color for the USB 3.0 connector for Standard A receptacles and plugs?

Black

Blue

Red

White

PART II

31. What IP address used by the virtual machine to communicate over the physical network?

Customer address

Internet address

Private Address

Provider Address

32. What storage device should replace if frequent error messages appear while moving files booting up
operating up operating system?

Flash drive

Hard disk

Optical drive

Random access memory


33. What is the minimum hardware requirements of the computer RAM, for Windows 10?

1 GB for 32-bit or 2 GB for 64-bit

1 GB for 32-bit or 4 GB for 64-bit

2 GB for 32-bit or 2 GB for 64-bit

4 GB for 32-bit or 4 GB for 64-bit

34. The computer system is functional if it is in __________.

Auto shut off

Change option

Good option

Normal booting

35. What is the maximum cable length for USB 2.0?

5 ft.

1.2 yards

1.5 meters

5 meters

36. A Yost cable, Cisco cable and a console cable also known as ________ .

Cross-Over

Extreme

Straight-Thru

Roll-0ver

37. An automated software program that executes certain commands when it receives a specific input is
____ .

Boot

Malicious code
Spyware

Threat

38. _________ is a computer network made up of an interconnection of local area networks (LANS)
within a limited geographical area, e.g. corporate buildings.

Campus Area Network

Metropolitan Area Network

System Area Network

Wide Area Network

39. What windows update that downloads and installs latest version?

Check update

Full updates

Fully automatic

Semiautomatic

40. What feature in windows severs provides the ability to migrate workloads between a source and
target cluster?

Failback

Failover

Live migration

Shared storage

41. What is the volt rating of the YELLOW wire in a power supply?

-5V

+5V

-12V

+12V
42. An extension of Microsoft management console used to manage hardware devices including device
drivers.

Console Manager

Device Manager

Hardware Manager

Peripheral Manager

43. What software program stores into a Read Only Memory (ROM)

Driver

Firmware

Flash IC

Power On Self

44. What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?

Campus Area Network

Metropolitan Area Network

System Area Network

Wide Area Network

45. It occurs when two or more devices connected with the same IP address in a computer network.

Dynamic IP address conflict

IP address conflict

Private IP address error

Static IP address error

46. Port _____ is an application of network address translation (NAT) that redirects a communication
request from one address and port number combination to another.

Evaluation

Forwarding
Request

Standard

47. What type of version that verifies network users through server and requires a more complicated
setup, but provides additional security?

Temporal Key Integrity Protocol (TKIP)

WPA2 – Enterprise

WPA2 – Personal

WI-Fi Protected Set up (WPS)

48. Who is assign to monitor the network security, operation and network users?

Encoder

End-user

Network Administrator

Wide Area Network

49. Disc image also known as ________.

Hard Disk Drive (HDD) image

Installer image

ISO image

WIM image

50. What recovery console commands that writes a new master boot record on the hard disk drive?

Bmrui

Bootrec

Chkdsk

Fixmbr

51. What is the physically damaged cluster of storage on the hard drive?
Bad sector

GUID partition Table

Master boot record (MBR)

Volume

52. ______ is used to store the user documents with a large amount of memory and storage space.

Application Server

File Server

Mail Server

Print Server

53. A compound used to prevent overheating of CPU.

Central Processing Unit (CPU) separator

Heat sink insulator

Interface sink

Thermal Paste

54. Light Emitting diode (LED) in Network Interface Card (NIC) has _____ lights.

55. _____ is a way to identify a specific process to which an internet or other network message
forwarded when it arrives at the server.

IP address

PING

Port number

Proxy server
56. The recovery console command that examines the volume for errors and repairs it.

Bootcfg

Bootrec

Chkdsk

Mbr

57. What is the alternative for wired connection that users radio frequencies to send signals between
devices and a router?

Wireless Fidelity

Wireless Finder

Wireless Firmware

Wireless Fix

58. What log files that record performance statistics based on the various performance objects and
instances available in performance monitor?

Circular logging

Counter logs

Linear Logging

View Log File Data

59. _______ enables administrators to configure storage thresholds on particular sets of data stored on
server NTFS volumes.

Data compression

Extensile File Allocation Table (exFAT)

FAT – formatted partition

File system Quota

60. In server 2008, Local Area Network (LAN) connection icon in a yellow color indicator signifies
_______.
Driver problem

No connectivity

Update

Virus

PART III

61. It is used as a substitute for actual disc, allowing users to run software without having to load a CD or
DVD.

Bootsys file

CMD file

Hyberfil file

ISO file

62. What second clustering technology provides by corresponding client requests across several servers
with replicated configurations?

Luster qourum

Hyper-V virtualization

Network Load Balancing

Quick Migration

63. What Ethernet cable used to connect computers to hubs & switches?

Cross-Over

Extreme

Roll-Over

Straight-Thru

64. ______allows users to move around the coverage area in a line of sight while maintaining a network
connection.

Campus Area Network

Local Area Network


Wide Area Network

Wireless Local Area Network

65. A task to do after planning to fix the network is ____.

Implementing the agreement

Implementing the idea

Implementing the result

Implementing the solution

66.What kind of chip stores the settings in the BIOS?

Advanced Technology eXtended (ATX) Chip

Basic Input Output System Random Access Memory (BIOS RAM) chip

Complementary Metal Oxide Semiconductor Read Only Memory (CMOS ROM) chip

Real Time Clock/Non Volatile Random Access Memory (RTC/NVRAM) chip

67. What is the maximum cable length for USB 3.0 using a non-twisted pair wire

3 meters

4 meters

5 meters

10 meters

68. Which of the following is the most efficient in transferring larger files?

Control Protocol

File Transfer Protocol

Hypertext Transfer Protocol

Network Time Protocol (NTP)

69. What Class of IP address is 192.168.0.1?

Class A
Claas B

Class C

Class D

70. What Windows edition has a program capable of restricting other users to access certain programs
in a computer?

Wubdiws Extreme

Windows Basic

Windows Professional

Windows Ultimate

71. What technique used to gain unauthorized access to computers, wherein the intruder sends
messages with a source IP address?

Sniffers

Spam

Spoofing

Spyware

72. _____is an enterprise-level heterogeneous backup and recovery suite.

NetBackup

NetCopy

NetFile

NetSave

73. A tool used for checking the condition of the hard drive with signs like “Good” “Caution” or “Bad”.

Crystal disk info

Defragmented

Disk Management

Scandisk
74. What is the problem of a computer if the time and date keeps on resetting even after fixing in the
BIOS?

CMOS battery failure

CPU overheating

Flash memory failure

System crashing

75. What command line tool used to find the IP address that corresponds to a host or domain name?

Ms dos

Nslookup

Ping

Tracert

76. type of network that connects through signals, e.g. infrared?

Campus Area Network

Local Area Network

Wireless Personal Area Network

Wide Area Network

77. In what folder that the device driver can be found?

Drv

Program files

Registry

System32

78. It enables administrators to define the types of file hat can save within a Windows volume and
folder.

File Classification Infrastructure


File Compression

File Encryption

File Screening

79. _____allows to define a list of devices and only allow these devices on WI-FI Network.

MAC Address Filtering

Service Set Identifier

Wired Equivalent Privacy

Wireless Security

80. M.2 is a form factor for ____.

Memory

Motherboard

Power supply

Storage drive

81. A network interface controller also known as ____.

Hub

LAN Card

Switch

WAP

82. A protocol that provides quick, automatic and central management for the distribution of IP
addresses within a network.

Domain Name System (DNS)

Dynamic Host Control Protocol (DHCP)

Simple Mail Transfer Protocol (SMTP)

Transmission Control Protocol (TCP)


83. A process of scanning, identifying, diagnosing and resolving problems, error and bugs in software.

Debugging

Software diagnostic

Software troubleshooting

Testing

84. An ideal voltage range on the hotwires of a Molex connector?

Red = 3.3V, Yellow = 5V

Red = 5V, Yellow = 3.3V

Red = 5V, Yellow = 12V

Red = 12V, Yellow = 5V

85. _____is an information asset suffering damage, unintended modification or disclosure.

Attack

Exploit

Exposure

Loss

86. A type of server that allows the central administration and management of network users and
network resources.

Application server

Database server

Directory server

File server

87. What log files that conserves disk space by ensuring that the performance log file will not continue
growing certain limits?

Circular Logging

Counter Logs
Linear Logging

View Log File Data

88. A router that is design to operate in the Internet backbone.

Bridge

Core

Edge

Network

89. The network security standard that tries to make connections between a router and wireless devices
faster and easier.

TKIP

WPS

WPA2-Enterprise

WPA2-Personal

90. A _____should be upgraded to receive and transmit strong signals to and from other computer.

Video card

Memory card

Network card

Sim card

PART IV

91. What networking tool that monitors and intercepts traffics over the computer network?

Data Link analyzer

Frequency analyzer

Packet analyzer

Protocol analyzer
92. What pertains to the maximum data transfer rate of a network for internet connection?

Backbone

Backhaul

Bandwidth

Broadband

93. What media types of 10-megabit Ethernet that compose a broadband coaxial cable carrying multiple
baseband channels for a maximum length of 3,600 meters?

10Base-T

10BASE-2

10BASE-5

10BASE-36

94. An enclosed or semi-enclosed channel that protects, routes, and hides cables and wires

Holder

Rack

Panel

Raceway

95. A material that slid before crimping both ends of a patch cable and acts to reduce strain in a cable.

Boot

Protector

Shield

Ring

96. What type of peripheral card having media access control address?

Firmware card

Network interface card

Peripheral component interconnect card


Tuner Card

97. It acts like a border router to connect corporate sites to wired access lines.

Customer Premises Equipment (CPE)

Network Transfer Equipment (NTE)

Product Terminal Equipment (PTE)

Virtual Control Equipment (VCE)

98. Resistance reading of an open wire is _____.

Almost zero ohm

Infinite ohms

Zero ohm

10 Mega ohms

99. What option in the BIOS/UEFI used to overclock computer?

Clock Basic Input Output System (BIOS)

Extreme Basic Input Output System (BIOS)

Power Basic Input and Output System (BIOS)

Voltage Basic Input Output System (BIOS)

100. What is the minimum RAM requirement of Server 2012 R2?

512MB

1GB

2GB

4GB

101. What test verifies the operation of communication device by sending and receiving data forms
from the same port?

Data Link test


Loopback test

Routing test

Signal test

102. In Windows 7, Windows update and security is located in _____.

Device Manager

Programs

Settings

System Performance

103. _________ is a 24 pin USB connector system with a rotationally symmetrical connector.

Extreme Universal Serial Bus (USB)

Super Universal Serial Bus (USB)

Ultra Extreme

Universal Serial bus (USB) C Thunderbolt

104. What type of a high-speed network/subnetwork that composed of hosts and interconnects using a
variety of technology/topology?

Campus Area Network

Local Area Network

Personal Area Network

Storage Area Network

105. A type of server that occupies a large portion of computing a territory between the database server
and end user.

Application Server

Client Server

Directory server

File Server
106. _____ defined as a structured network cabling system standards for commercial buildings, and
between buildings in campus environments.

ANSI/TIA-567

ANSI/TIA-568

ANSI/TIA-566

ANSI/TIA-587

107. In the context of security, _____ is a privilege or assigned permission for the use of computer data
resources.

Access

Asset

Attack

Exploit

108. It facilitates communication between the CPU and other devices in the system.

Basic Input Output System (BIOS)

Bus

Chipset

Random Access Memory (RAM)

109. Which of the following commands used to certify the peer name resolution in Active Directory?

DCPROMO

DNSCMD

FORMAT

NSLOOKUP

110. What term used to refer when a system is unavailable?

Downtime
Recovery

Reliability

Unavailability

111. In networking, ______ refers to the pieces of related information that are transferred through a
network.

Access

Connection

Packet

Wi-Fi

112. What active directory protocol used to access data from a database?

Dynamic Host Control Protocol (DHCP)

File Transfer Protocol (FTP)

Sample Mail Transfer Protocol (SMTP)

Lightweight Directory Access Protocol (LDAP)

113. Which of the following displays the measures and various real-time statistics on the system’s
performance?

Counter Logs

Counter Monitoring

View Current Activity

View Log File Data

114. What class of IP addressing is 172.168.10.1?

Class A

Class B

Class C

Class D
115. What type of router that enables an internal network to connect to external network?

Broadband

Core

Edge

Forwarding

116. Which of the following is a term for the main patch panel that links to every telecommunication
room inside the building?

Lead Extension

Major distribution line

Multiplexer

Vertical cross-connect

117. Minimum byte capacity of a bootable flash drive for Windows 10 is ____.

4GB

8GB

16GB

32GB

118. ______ is a process of recognizing a user’s identity.

Authentication

Authorization

Encryption

Identification

119. A network security system that monitors and controls incoming and outgoing network traffic based
on predetermined security rules.

Firewall
Gateway

Group Policy

Media Access Control (MAC)

120. What voltages that ATX12V P1 connector provides for the motherboard?

3.3V, 5V

3.3V, 5V, 12V

3.3V, 12V

5V, 12V

PART V

121. What type of server that enables large numbers users to exchange information near
instantaneously and formerly known as Internet Relay Chat (IRC) Servers?

Directory server

Proxy servers

Real-Time Communications Server

Server Platforms

122. A microchip to manage data communication between a CPU and a motherboard.

Inclusive Control Hub

Input/Output Controller Hub

Internal Controller Hub

Intersystem Controller Hub

123. What two command-line utilities used to export and import Active Directory object information?

AllUsers.idf and objectclass=user

Csvde and Set-ADComputer

Ldifde.exe and csvde.exe

Ping.exe and ping /all


124. What command-line network utility that displays network connections for TCP and routing tables?

Connections.txt

Ipconfig

Netstat

Ping

125. A device that acts as a bridge between wireless clients and wired network is _____.

Access Point

Broadband

Hub

Router

126. A node on a computer network that allows data to flow one discrete network to another.

Gateway

Hub

Network Interface Card (NIC)

Router

127. In Windows 7, an indicator tells that a video driver has not installed.

Displays bios setup only

No video display

Only standard video is displayed

Three short beeps

128. It is the time lapse between data sent and when received, it can have a big impact on performance.

Cycle

Delay

Gap
Latency

129. A setup option in Unified Extensible Firmware Interface (UEFI)/ Basic Input Output System (BIOS)
that allows security settings to perform such tasks as locating the device.

LoJack

Remote PC On

Tracker On

Wake on LAN

130. What set of rules that describe how software and hardware should interact within a network?

Communications protocol

Expanding the network

Group policy

Multihomed host

131. A text based command used for creating bootable flash drive.

Boot

Chkdsk

Diskpart

Format

132. Which of the following electronic components need to discharge electrically before the
replacement of parts?

Capacitor

Diode

Resistor

Transistor

133. A volt meter reading of s shorted diode.


Almost zero volt

Equal to its source voltage

Half of the source voltage

Zero volt

134. What type of backup used in hard drive, disc, flash drive and external drive that are housed on site?

Differential backup

Incremental backup

Full backup

Local backup

135. It ensures that information and programs are changing only in a specified and authorized manner.

Availability

Confidentiality

Integrity

Security

136. What is the minimum Random Access Memory (RAM) requirement of Server 2008 R2?

512MB

1GB

2GB

4GB

137. What electrical quantities measured when performing continuity testing of twisted pair cable?

Capacitance

Conductance

Inductance

Resistance
138. ______ which means pushing component to its limits and extremes.

Interface Test

Logical Test

Stress Test

Technical Test

139. What Class of IP addressing is 10.10.10.1?

Class A

Class B

Class C

Class D

140. ______used to run commands for troubleshooting unbootable operating system.

Master Boot Record

Power On Self-Test

Windows Recovery Environment

Windows Update

141. A logical subnetwork that groups collection of devices from the same network switch.

Enterprise Private Network

Personal Area Network

System Area Network

Virtual Local Area Network

142. Set of rules for transferring files such as text, graphic images, sound, video and other multimedia
files, on the World Wide Web (WWW).

Accelerated File Transfer Protocol (AFTP)

File Transfer Protocol

Hypertext Transfer Protocol (HTTP)


Simple Mail Transfer Protocol (SMTP)

143. What attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with
the intent to destroy or steal information?

Bot

Information Extortion

Malicious code

Polymorphic

144. _________ is an interface standard for a serial bus for high – speed communications, also referred
as institution of Electrical and Electronics Engineers (IEEE) 1394 interface.

Firewire

Universal Serial Bus (USB)

Serial Advanced Technology Attachment (SATA)

Thunderbolt

145. What recovery tool in Windows fixes and scans computer problem that prevents computer from
booting repeatedly?

Boot sequence

Restore point

Repair and update

Startup repair

146. What is a hardware device that enables to connect serial devices across a network?

Com Port

Coaxial Cable

Register Jack

Terminal Server

147. How many devices can connect to a wireless router?


250

200

150

100

148. ________ is the process of joining two cable ends together.

Cable conduiting

Cable passing

Cable pressing

Cable splicing

149. What is the traditional method used to access server data and using the server message block
protocol over TCP/IP?

File Resource Manager Tools

File System Monitoring

System Management Tools

Windows Folder Sharing

150. The most current wireless networking standard and can communicate with the older network
standards.

802.11a

802.11b

802.11g

802.11n

You might also like