Você está na página 1de 21

Sample Test Question preparing for Q2

This material contains sample questions for NIIT students (being in Q2 - MMS course) for preparing better in
Q2 exam. The students need to study hardly on the Q2 curriculumn before try to do the questions. Any questions
and doubts, ask the faculty to be explained and to be cleared to you for high score at the quarter test.

The ________ connects nodes over a network using a central control unit called the hub.
1 1,Cellular category
2,Mesh model
3,Star topology
4,Bus topology

Consider the following statements:

Statement A: The resources and software capabilities that are shared by the nodes in a
network are commonly known as services.

Statement B: The common services provided in a network include file, print, message,
2 application, and database services.

Which of the following is true with respect to the above statements?

1,Statement A is True and Statement B is False.


2,Statement A is False and Statement B is True.
3,Both, Statement A and Statement B, are True.
4,Both, Statement A and Statement B, are False.

ARPA stands for __________.


3 1,Advanced Repeater Projects Agency
2,Advanced Research Projects Administration
3,Advanced Research Projects Agency
4,Advanced Rear Projects Agency

Infrared transmissions support up to ________ at shorter distances.


4 1,16 Mbps
2,10 Mbps
3,100 Mbps
4,50 Mbps

Which of the following statements is true for coaxial cables?


5 1, which are good conductors of electricity It uses copper wires,.
2,Coaxial cables provide effective protection against EMI during data transmissions.
3,It uses light rays instead of electricity to transmit data.
4,It can be differentiated into the two categories, single-mode and multimode.
Which of the following statements is true regarding the AppleTalk Data Stream Protocol
(ADSP) protocol?
1,This protocol facilitates file sharing between network nodes.

6 2,This protocol provides the services of the Session layer of the OSI model.

3,This protocol is subdivided into three applications: AppleShare File Server (AFS),
AppleShare Print Server (APS), and AppleShare PC (APC).
4,This protocol establishes connections between network nodes and various servers.

Which of the following protocol suites is used for communication between personal
computers and mainframes (IBM Hosts)?
7 1,TCP/IP
2,IPX/SPX
3,DLC
4,AppleTalk
Consider the following statements:

Statement A: The NBP protocol maps the names of nodes with their addresses.

8 Statement B: The RTMP protocol is used for the management of routing information.

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.

Which of the following is true about the Internet Protocol?


9 1,It enables reliable connection-oriented data transfers between the two nodes.
2,It guarantees delivery of data packets.
3,It performs error reporting and datagram fragmentation and reassembly.
4,It enables the exchange of electronic mails (e-mails) between two nodes.

Which of the following layers contains a number of protocols that provide services, such as
e-mails, Web browsing, and remote login by users?
10 1,Application layer
2,Internet layer
3,Transport layer
4,Network Access layer
Which of the following is used to identify the best path for sending data packets over a
network?
11 1,Routing
2,Packet switching
3,Multicasting
4,Multiplexing

Earthen Wares Inc. had a network of 200 computers. Recently, the company has
undergone a major expansion and 300 more employees have been recruited. The network
has now expanded to 500 computers. Network users are now complaining of a major slow
down in the network speed. What should Timothy Burt, the network administrator, do to
12 increase the speed of the network?
1,Implement repeaters to strengthen the networking signal.
2,Implement a hub and manage the network centrally.
3,Segment the network and use a bridge to connect the segments.
4,Use a CSU/DSU to connect computers of the network.
Consider the following statements:

Statement A: The IEEE 802.1 LAN standard provides information regarding the
prerequisites for the interface of LAN standards.

Statement B: The IEEE 803.2 is a part of the Logical Link Control (LLC) sub-layer of the
13 Data Link layer.

Which of the following is true with respect to the above statements?


1,Both, statement A and statement B, are False.
2,Both, statement A and statement B, are True.
3,Statement A is True and statement B is False.
4,Statement A is False and statement B is True.

Diane Frye is a network administrator at Supersoft2000. She is giving a presentation on


SNA protocol suite to her juniors. One of her juniors asks her if there is a protocol in the
SNA suite that supports remote connections through leased or dialup connections and
provides point-to-point, multipoint, half-duplex, and full-duplex transactions. Which
14 protocol of the SNA suite has these features?
1,DIA
2,SDLC
3,VTAM
4,APPN
Red Sky IT System has its main office in New York that has 200 computers. There are two
branch offices located in Detroit and New Jersey consisting of two computers each. The
organization wants to implement a fast as well as cost effective way of maintaining
15 connectivity between all the offices using digital lines. Which of the following technologies
should the organization implement to meet the requirement?
1,X.25
2,ATM
3,SONET
4,SDH

BlueMoon Inc. has recently opened another branch at a distance of 150 metres from the
branch existing in the same city. Its network administrator observed that the signal
traversing through their network transmission media is degrading and distorting as the
length of the network segment has increased. Which of the following devices can best
16 solve the above problem?
1,Network Interface Card
2,Terminal server
3,Repeater
4, Gateway
David Wong is a networking intern at Certified Carriers. He is studying the IPX/SPX protocol
suite as part of his networking project. He is looking for a protocol that provides fast and
connectionless service. In addition, it should also be able to provide routing services.
Which protocol would best suit his requirements?

1,SAP
17
2,IPX

3,SPX

4,RIP

William, the network administrator at EarthenWare Systems, needs to set up a LAN of 15


computers based on the bus topology using coaxial cables. Determine the type of
18 connector that will be used to connect the computers.
1,DB-25
2,RJ-45
3,T-Connectors
4,DB-9
FernTech Inc. uses an ISDN line to connect its offices located in New York and Boston.
George, the network administrator of FernTech connects the router at the New York office
to the line in order to establish the connection between the two networks. However, after
the company office shifts to the new building, the network faces EMI problems on the line.
Predict the possible cause for this problem.
1,The router is defected because of which the electro-magnetic interferences have
19 increased.
2,The CSU unit is defected because of which the electro-magnetic interferences have
increased.
3,The internal LAN transmission is defected because of which the electro-magnetic
interferences have increased.
4,The atmosphere is not clear because of which the electro-magnetic interferences have
increased.
GlobalSoft Inc. has offices in New York, New Jersey, and San Francisco. The network of
GlobalSoft Inc. is based on an ISDN leased line. The regional marketing mangers of the
company wants to conduct a videoconference between the top management and the
regional market heads regarding the target market segments as per the current business
strategy. Determine the ISDN service that will be used to conduct this videoconference.
1,The PRI ISDN service with 23 B and a D channel will be used to conduct the
20 videoconference
2,The PRI ISDN service with 30 B and 2 D channel will be used to conduct the
videoconference
3,The PRI ISDN service with 30 B and a D channel will be used to conduct the
videoconference
4,The PRI ISDN service with 2 B and a D channel will be used to conduct the
videoconference

David Bernard is a renowned scientist studying the field of ISDN technology. A summit is
being conducted on the prospects of expansion of wireless and mobile networks and David
Bernard has been invited as the guest of honor. He will also conduct a session about the
latest developments in the field. This lecture is being broadcast at a transmission rate of
21 64 Kbps over the Internet to many universities all over North America. Which type of
system will be used to carry out this session?
1,Synchronous Optical NETwork
2,Synchronous Digital Hierarchy
3,T-carrier systems
4,E-carrier systems
Consider the following statements:

Statement A: In Duplex transmission, either node can transmit while the other node can
receive data.

22 Statement B: In half-duplex transmission, both the nodes can transmit as well as receive
data at the same time.

Which of the following is true with respect to the above statements?


1,Statement A is True and Statement B is False.
2,Statement A is False and Statement B is True.
3,Both, Statement A and Statement B, are True.
4,Both, Statement A and Statement B, are False.
Consider the following statements:

Statement A: The IEEE 802.3 standard is used for 1-persistent CSMA/CD (Carrier Sense
Multiple Access/ Collision Detection) LAN, which is commonly known as Ethernet.
Statement B: Using the CSMA protocol, a node transmits data packets whenever it finds
the channel or the transmission media idle.

23 Which of the following is true, with respect to the above statements?

1,Both, statement A and statement B, are False.


2,Both, statement A and statement B, are True.
3,Statement A is True and statement B is False.
4,Statement A is False and statement B is True.

Red Infosystems is setting up a network for 100 computers to accommodate new recruits
in its production department. The management wants the network to be efficient and has
instructed the network administrator, Keith Turner, to ensure this, while setting up the
network. In order to establish an efficient network, Keith has decided to subnet the
network. The network address allocated for this network is 194.168.10.0. Keith has
decided to divide the network into four subnets. Determine the subnet mask for this
network.
1,255.255.255.240

24
2,255.255.192.0

3,255.255.256.0

4,255.255.224.0

Simon, the network administrator at ITech Inc, has received complaints regarding the slow
rate of data transfer over the network. After checking the speed and flow of data, Simon
wants to check the route being used for data transfer and the maximum number of hops in
the path to the destination host. Which utility will help him find out this information?
1,Simon will need to use the Ping utility with the /count option to check the hop count and
25 the path of data transfer.
2,Simon will need to use the IPConfig utility with the /renew option to check the latest
information about the path used by the router.
3,Simon will need to use the TFTP service to check the rate of data transfer and then apply
the IPConfig utility with the /renew option to check the count option to check current
number of hops used in the path.
4,Simon will need to use the tracert utility to check the path of the router and apply the –h
option to check the maximum number of hops in the path to the destination host.
Tom Grant is the network administrator at Global Systems Inc. He needs to design the
network setup for his organization. More than 1 650 000 hosts will be connected in the
27 network. Which IP addressing class would best meet his requirement?
1,Class C
2,Class D
3,Class A
4,Class B
Red Square Inc. is an upcoming virtual music store in North America. The company has
increased its distribution globally and provides the facility to order music CDs over the
Internet. The Web site is comprehensive and allows visitors to listen to music online. In
order to promote their virtual music store, the company frequently organizes concerts,
which can be seen live over the Internet. In order to view these concerts, the customers
need to subscribe to the Web site. Each subscriber receives a login name and password
using which he/she can log in, view, and listen to the concert. The Web site maintains the
28 subscribers as user groups and uses streaming audio/video to send data packets to
multiple computers. Determine the IP addressing scheme that will be used by these user
groups while viewing and listening to the concert.
1,The subscribers will use their respective subnet IDs for teleconferencing.
2,The subscribers will need a multicast IP address provided by the Class D IP addresses.
3,The subscribers will use the network addresses of the other networks in order to route
data packets to particular users.
4,The subscribers will need to use reserved IP addresses to teleconference over a secure
network setup.

Research Infotech needs to set up a small network for performing its research and
development on the new wireless technologies using the Internet. The network needs to be
fast and efficient. In addition, the users should be able to use the Internet only for
29 accessing relevant Web sites. Permissions for accessing chat rooms should not be allowed.
Which type of server can be used to implement such a network setup?
1,Newgroup servers
2,Proxy and cache servers
3,Catalog servers
4,News servers
Which of the following is true about a mirrored server?
1,It stores a copy of data contained in another servers.
30 2,It is used to make available the same business transaction to multiple users across the
Internet.
3,It is used for user authentication.
4,It is used to store the repository of certificates.
Robert Russel is a Web administrator in Red Sky Inc. He needs to install a Web server in his
organization. His primary requirement is that the server must be platform independent and
it should enable its users to add functionality to their environments easily. Which Web
31 server best meets the requirements?
1,IIS Web server
2,Apache server
3,Personal Web server
4,FTP server
Consider the following statements:

Statement A: WS-FTP is FTP server software.?

Statement B: Microsoft Exchange is FTP server software.


32

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.

Which of the following in a correct explanation to httpd daemon?


33 1,It is a service that controls the Web server and the http services.
2,It enables users to add functionality to the existing source code.
3,It is used to invoke Internet super daemon, inetd.
4,It helps in subscribing the services of the mailing list.
Which of the following is the correct use of the TELNET service?
1,Enables users to communicate with other users. This service needs to be run for
managing receipt/delivery of mails.
2,Enables file transfer across machines, using the HTTP protocol.

34
3,Enables users a set of bulletin boards on different subjects.
4,Enables users to log in remotely to a server. This service is used for allowing the clients
to log on to a remote server.

Which of the following is the correct explanation of action attribute?


35 1,This specifies the type of control that will be displayed on the form to accept user input.
2,This stores the value entered by the user in the control.
3,This indicates that a check box or a radio button is selected.
4,This attribute is used to specify the target where the form data is transmitted.
Consider the following statements:

Statement A: Input is an attribute of FORM tag.

Statement B: Name is an attribute of INPUT element.


36

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.
Which of the following is the true for method attribute?
1,This attribute specifies the way in which the data can be transmitted from the form to
37 the Web server.
2,This attribute is used to specify the target where the form data is transmitted.
3,This specifies the type of control that will be displayed on the form to accept user input.
4,This stores the value entered by the user in the control.
Consider the following statements:

Statement A: Value button is a valid HTML form control.

Statement B: Checkbox button is a valid HTML form control.


38

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.

What does IDS stand for?


39 1,Intrusion Detection Standard
2,Intrusion Detection System
3,Intrusion Data System
4,Intrusion Digital Signature

Which of the following is true for cryptosystem?


1,Cryptosystems are of three types: symmetric, asymmetric, and RSA.
40 2,Asymmetric cryptosystems use the same key for both encrypting and decrypting data.
3,Symmetric cryptosystems use two separate keys for encryption.
4,In a cryptosystem, before data can be exchanged between two parties, the key must be
shared between them.
Samuel is network administrator in Bluesoft Inc. Lately, he is getting complaints from the
network users that they are repeatedly getting e-mail messages that with huge files
attached. This is causing the users’ e-mail box to crash. Which DoS attack are they
41 referring to?
1,Ping of death
2,SYN flood
3,Spamming
4,Mail bomb
Identify the firewall with the following characteristics:

1. Filters packets at the Network layer and examines packet headers against an access
control list

2. Checks for all the connections made to a local network

3. Allows only those connections that are from a trusted source and are considered safe
42
4. Ensures that the users behind the firewall have access to the Internet

5. Ensures that the privacy of the internal network is maintained


1,Stateful multilayer inspection firewalls
2,Proxy server firewalls
3,Packet filter firewalls
4,Circuit-level gateways

Sniffing is:
1,A technique used to deliver an e-mail message to someone who might otherwise not
choose to receive it
43 2,A technique used to passively intercept and copy all network traffic on a system, a
server, a router, or a firewall
3,A technique used redirect data that is being exchanged between two authorized entities
to one or more unauthorized entities
4,A technique used to send abnormally large ping packets to a specific computer

What does DES stand for?


44 1,Digital Encryption Standard
2,Data Encryption System
3,Data Encryption Standard
4,Digital Encryption System

_______ supports minimum key sizes of 128, 192, and 256 bits.
45 1,Triple (DES)
2,DES
3,Ron’s Code
4,AES

_________ is the process used for breaking ciphers.


46 1,Cryptographic mechanism
2,Cryptanalysis
3,Cryptology
4,Decryption
Which of the following components does NOT belong to the PKI framework?
47 1,Certification Authority (CA)
2,PKI client
3,Revoke Authority (RA)
4,Digital certificates
Identify the process for TCP connection that uses the following steps:

1. The first node requests communication by sending a packet with the sequence number
and SYN bit.

2. The second node acknowledges the receipt of the data and responds with an
acknowledgement (ACK) that contains the sequence number plus one, and its own
48
sequence number back to the first node.

3. The first node responds and the communication between the two nodes proceeds.
1,Broadcast storm
2,Three-way handshake
3,Spamming
4,Multi-access handshake
Identify the networking technology:

When an external entity accesses an internal network resource, the external IP address is
mapped to a fixed IP address.

49 When an internal node accesses an external resource, it’s device maps a private IP address
to the first IP address that is available from a pool of globally unique IP addresses.
1,Secure Socket Layer (SSL)
2,Socket Server (SOCKS)
3,Transport Layer Security (TLS)
4,Network Address Translation (NAT)

Which of the following is the correct expansion of the term CASE?


50 1,Computer Aided Software Engineering
2,Computer Aided System Engineering
3,Computer Aided Software Enterprise
4,Computer Aided System Enterprise

_______ is the high speed network hat exists separately from the LAN and main corporate
network and allows different kinds of storage devices to be shared.
51 1,SAN
2,NAS
3,DAS
4,MAN

________ is the first activity of the Development phase.


52 1,Implementation
2,Testing
3,Analysis
4,Design
________ is the last activity of the Development phase.
53 1,Design
2,Construction
3,Testing
4,Implementation

Which of the following communication media is the cost-effective solution for users
seeking an independent communications network and connects a large number of
54 geographically dispersed sites?
1,ISDN Integrated Services Digital Network (ISDN)
2,Very Small Aperture Terminals (VSAT)
3,Wireless
4,Digital Subscriber Line (DSL)

Which of the following is NOT the feature of eShop?


55 1,Products are marketed using Media
2,Payment is online
3,Products will be delivered at home
4,Products sold at higher prices

In which of the following, a mobile client can be alerted and informed about the presence
of various services within the specified area?
56 1,L-commerce
2,M-commerce
3,T-commerce
4,E-commerce

Which of the following statements is true?


57 1,With CRM, there is a slower response to customer inquiries.
2,The CRM obtains information that can be kept confidential from other business partners.
3,CRM cannot identify the most profitable customer.
4,CRM provides better understanding of customers.
Which of the following statements is correct?
1,A MAN is a network that covers an entire city, but uses LAN technology.
2,When a network is spread over wide areas, such as across cities, states, or countries, it is
58 called a MAN.
3,If a network is confined to a single location, typically one building or complex, it is called
a WAN.
4,A WAN is a network that covers an entire city, but uses LAN technology.
Which of the following is correct?

1,A network firewall is a mechanism used to protect a trusted network from an untrusted
network.
59 2,A network firewall is a standard followed to protect a trusted network from an untrusted
network.
3,A network firewall is a network access policy followed to protect a trusted network from
an untrusted network.
4,A network firewall is a mechanism used to protect an untrusted network from a trusted
network.
Which of the following statements is NOT true for smart cards?
1,Smart Cards can be used to pay for parking at parking meters or to get on subways,
trains, or buses.
2,Smart Cards can be used to dial a connection on a telephone and be charged on a per-
60 call basis.
3,Smart Cards can be used to give hospitals or doctors personal data without filling out a
form.
4,Smart Cards can be used to establish your identity when logging on to an Internet access
provider or to an online bank.
__________ is the process that verifies the identity of a user.

61 1,Authorization
2,Authentication
3,Encryption
4,Access control

A ________ is a special area of memory reserved to hold data and instructions recently
accessed from another location.
62 1,Stack
2,Cookie
3,Cache
4,Cluster

If the BIOS did not locate the boot record in the floppy or hard drive, what kind of error is
shown on the screen?

63
1,Windows Protection Error
2,Non-System Disk or Disk Error
3,Error in Loading System Files
4,Bluescreen Error

Which of the following is a hidden file, located under the C:\Windows directory, which
contains all information about the system’s hardware configuration, and is checked by the
system for the first part of Registry file?
64
1,SYSTEM.DAT
2,USER.DAT
3,AUTOEXEC.BAT
4,WIN.INI

You have installed a new Windows 2000 Professional client in your network and manually
assigned it a valid IP address. However, when you try to browse the network, nothing is
displayed. Which network utility should you use to display the current IP settings in
Windows 2000 systems and serve as a starting point for troubleshooting?
65

1,WINIPCFG
2,TRACERT
3,IPCONFIG /ALL
4,ARP
Douglas shared a folder on his machine. Which of the following permission is assigned to
the share by default?
66 1,Read Only for Everyone
2,Full Control for Everyone
3,Full Control for CREATER OWNER
4,Read Only for CREATER OWNER
The ____________ section contains the secondary bootstrap loader.

67 1,MBR
2,DMA
3,DRAM
4,ROM

The NTFS structure uses 64-bit entries to keep track of the storage on the disk. The core
component of the NTFS system is the __________ that contains information about each file
being stored on the disk.
68
1,Volume file
2,Log file
3,Master File Table
4,Quota Table
Which file system supports encryption of files and enables administrators to set up a
limited amount of hard drive space to each user?
1,CDFS
2,FAT32
3,FAT16
69 4,NTFS

Which of the following administrative tools is stored under the Documents and Settings
directory, and contains system information and settings that are specific to the user?
1,User profiles
2,Group Policies
3,Network Share Permissions
70 4,NTFS Rights
Consider the following statements:

Statement A: A PIF file is a file created to serve as a bridge between a MS-DOS-based


application and the Windows environment in older versions of Windows.

71 Statement B: PIF files contain information about how much memory and other system
resources an application requires.

Which of the following statement is true with respect to the above statements?
1,Both, Statement A and Statement B, are False.
2,Both, Statement A and Statement B, are True.
3,Statement A is True and Statement B is False.
4,Statement A is False and Statement B is True.
Cruzan, the project manager of Systems Solutions, is working on an E-learning project with
a team of five members. He has prepared a Weekly Schedule sheet, detailing the tasks and
the targets for each of his team members. He wants to share this file with all his team
members, so that they can update the sheet on daily basis. What permissions should
Cruzan assign to the file so that his team members are able to update the sheet?
1,He should assign Change Permission to the file
72 2,He should assign Write Permission to the file
3,He should assign Execute Permission to the file
4,He should assign Ownership Permission to the file

John has been assigned an additional responsibility of training employees at the


employees' workstation as and when required. Whenever John conducts a training at the
employees' workstation, he should be able to access his desktop settings. For this purpose,
the network administrator creates a roaming profile for John. Which of the following
policies will support the roaming profile?

73 1,System profile
2,User profile
3,Group policy
4,Network share
You want to run an application on your Windows 98 operating system, the code for which is
written in an older version of Microsoft operating systems. When you try to run the
application, it does not execute properly. What will you do to execute this application?

1,Use SYSEDIT.EXE to establish compatibility between the application and the operating
system.

2,Use mkcompat.exe to establish compatibility between the application and the operating
74 system.

3,Use Scanreg.exe utility to establish compatibility between the application and the
operating system.

4,Use CVT1.EXE utility to establish compatibility between the application and the operating
system.

Web pages can be loaded onto the desktop and automatically updated from the Web. This
type of operation is referred to as _________.
1,Duplexing
2,Active Channel

75
3,Active Desktop
4,Mirroring

___________ are pieces of retrievable information stored on the Web browser by the Web
server.

1,Cookies
2,History

76

3,Favorites
4,NetHood

Files and folders can be encrypted from the command line using the _____ command.
77 1,Mem
2,Cipher
3,Ver
4,Setver
In XYZ Solutions, the employees in different shifts are working on Windows 98 operating
system. In order to maintain and govern the rights and privileges of different users, certain
guidelines are framed in order to restrict the user access, so that when a user logs on to
the system, Windows 98 checks the user’s configuration information. What are these
guidelines known as?
78

1,System Policies
2,Registry Editor
3,Policy editor
4,Policies security
IP addresses exist in the numeric format of XXX.YYY.ZZZ.AAA. This format of specifying
addresses is referred to as the dotted decimal notation. Each address consists of four
______ separated by dots (.).

1,4-bit fields
2,2-bit fields

79

3,8-bit fields
4,6-bit fields

Which of the following device receives, amplifies, and retransmits messages to keep them
from deteriorating as they are transmitted?

80
1,Hub
2,Bridge
3,Router
4,Gateway

Which of the following technologies provides high-speed communication links by using the
existing telephone lines to generate bandwidths ranging up to 9Mb/s or more?

81
1,ISDN Connection
2,Digital Subscriber Lines
3,Dialup Networking
4,Satellite Internet Access
SoftPro Pvt. Ltd. has set up a new office. As a part of the process for implementing
security, they want to restrict access to the internal network so that specific types of items
or addresses are not allowed to pass between the networks. Which of the following
security measures should be taken to control the traffic between the networks?

1,They should use the Kerberos to protect their company network


2,They should use the Digital certificates to protect their company network

82

3,They should set up the firewall program to protect their company network.
4,They should combine various certificates with security standards such as the IP Security
Protocol

You are using IEEE 802.11b standard for transmitting data over wireless LAN. You want to
ensure secure transmission of data by the workstations. Which of the following methods is
the best way to ensure secure transmission of data?
83
1,Enable Authentication feature of the IEEE 802.11b standard.
2,Enable Encrypt data transmission feature of the IEEE 802.11b standard.
3,Enable Authorization feature of the IEEE 802.11b standard.
4,Enable the WEP function of the IEEE 802.11b standard.
As the System Administrator of a Software development firm, Jack wants to protect his
network from outside attacks by preventing unwanted connections from Internet devices.
How can he ensure the security of his network?

1,Implement Virtual Private Networks


84

2,Implement IP Security Protocol (IPSec)


3,Implement Digital Certificate
4,Implement Firewall
Which of the following commands can be used to restore the hard drive's Master Boot
Record, along with its partition information?
1,SYS:C
2,FDISK/MBR

85 3,FDISK
4,MEM
The command line utility used to find out the domain name is ______________.

86
1,PING
2,TRACERT
3,NSLOOKUP
4,FTP
Which of the following are the two Registry editors included in Windows 2000 and Windows
XP that enable you to perform basic functions such as adding, editing, and removing
Registry entries?

1,RegEdit and PolEdit


2,RegEdit and SysEdit

87

3,RegEdit and GPE


4,RegEdit and RegEdt32

If an “X” is displayed by an entry in the Windows 9x Device Manager, what is indicated?

1,The device has been disabled by a user selection conflict.


88

2,The device is experiencing a direct hardware conflict with another device.


3,The device’s real-mode driver is not being loaded.
4,The device’s virtual-mode driver is not being loaded.

The system administrator of BlueCorp Inc. wants to change the attribute of files, such as
hidden, read-only, and system files so that they can be seen and manipulated for
troubleshooting purposes. Which of the following files will he use to achieve this task?
89
1, SYS.COM
2,CONFIG.SYS
3,ATTRIB.EXE
4,AUTOEXEC.BAT
Kelly has forgotten her logon password and is not able to log on to her system. Therefore,
she wants to logon to her system using a local logon password. Which of the following
methods will help Kelly obtain a local logon password?

1,Use the Emergency Start disk to gain access to the system and the hard drive
90 2,Start the system in step-by-step confirmation mode (pressing F8 during the boot up).

3,Access the local machine and delete the username.PWL file in the C:\Windows directory
4,Run the Setup utility and select the Verify option when presented by the Setup procedure

Jack Halls has purchased a computer with the following configuration:

Processor – Pentium II

Speed – 233 Mhz

Ram – 64 MB

HDD – 2 GB

CD-ROM – 12X
91

He wants to install Windows XP on the computer. He creates two partitions of 1 GB each on


the hard disk. When he attempts to install the operating system on the first partition, the
installation fails mid-way and the installation wizard gives a stop error. What could be the
cause of the problem?

1,The computer has some applications, which are conflicting with Windows XP.
2,The computer does not have sufficient hard disk space to install Windows XP.
3,The computer does not have the required partition size to install Windows XP.
4,The computer’s CD drive is not compatible with Windows XP.
Mary Wilson has Windows NT installed on her computer. She takes a daily backup of her
files on a separate computer. The computer crashes one day after completing the boot
procedure successfully. Mary suspects that the problem is due to corruption of certain
system files. Which of the following methods will help her to correct the problem?

92 1,She should try to repair the files by using the Emergency Repair Disk of the computer.
2,She should try to repair the files by using the Setup disks of the computer.
3,She should try to restore the operating system from the backup files maintained on
another computer..
4,She should try to repair the files by copying the files from another operating system.
You are the administrator of a company named Firmware Corporation. One of the users
shuts down his computer and when he starts it, the computer does not boot up. You
93 suspect that the file system boot sector is corrupted. How can you resolve this problem?
1,Use recovery console to fix the MBR
2,Reboot the system again, it will automatically correct the problem
3,Use the F8 option at start up and select Last Known Good Configuration.
4,Use the Emergency Repair Disk to repair the problem.

Você também pode gostar