Você está na página 1de 9

M.

Marks:50
1.

Internal Test Questions: 100

Time: 60 minutes

2.

3.

4.

5.

6.

7.

8.

9.

The ________________ acts as an interface between the user, applications, hardware and system peripherals. a. Windows b. Desktop c. Operating System d. RAM DOS is a ________________ base operating system. a. CUI b. GUI c. Windows d. Editor The DOS command CD is used to___________ a. Compress the disk b. Copy the files to the directory c. Change the Directory d. Make the directory ___________ and __________ configuration files in DOS. a. Config.sys b. Autoexec.exe c. Autoexec.bat d. Config.com __________ allow multiple users to simultaneously share a computer without closing all of their applications. a. Automatic update Feature b. Desktop Cleanup Wizard c. Fast User Switching d. Remote Desktop __________ provides list of program that are running and a summary of overall CPU and memory usage. a. Task Manager b. Change Password c. Lock Computer d. System Properties To install Windows XP on a computer that does not have any operating system installed, user selects___________ a. Upgrade Installation b. Network Installation c. Clean Installation d. Multiple Boot Installation ___________ requires NO or Limited users intervention. a. Clean Installation b. Automated Installation c. Standard Installation d. Network Installation The minimum hard disk space required to install Windows XP professional is___________ a. 1.5 GB on a 2 GB hard disk b. 1 GB on a 2 GB hard disk c. 500 MB on a 1 GB hard disk d. 750 MB on a 2 GB hard disk

10. Windows 7 Enterprise and Ultimate requires minimum of ________ of system memory and ________ of Hard Disk to install. a. 1GB b. 512MB c. 40 GB d. 25GB 11. During ___________ installation of windows 7, setup wizard asks series of questions that helps you to configure windows 7 on your client computer. a. Standard Installation b. Unattended Installation c. Both d. None 12. To dual boot with windows 7, you should have at least _______ free volume on your client computer. a. 10GB b. 20GB c. 15GB d. 512MB 13. X64 version of Home Basic edition of windows 7 supports a maximum of _______ GB RAM and x86 version of Home Basic windows 7 supports________ GB RAM. a. 6,4 b. 8,4 c. 4,8 d. 4,6 14. The different types of migration to migrate user data from one computer to other are a. Side by side migration b. Wipe and Load migration c. Network migration d. Clean migration 15. Windows 7 installation source are a. DVD b. USB c. Network d. WDS 16. You are migrating from Windows XP to to Windows 7 Ultimate. Which of the following tools is available as a free download to help you transfer your files and settings from Windows XP to Windows 7?

LoadState.exe 17. You are an IT administrator. You want users on your network to be disallowed from running a particular application. You do not want to apply any additional rules for that application. Which of the following technologies will you use for the purpose? Remember that you do not want to use conflicting rules for the application.

a. b. c. d.

Windows Easy Migration Wizard Windows Easy Transfer Windows 7 Upgrade Advisor

a. b. c. d.

NTFS permissions AppLocker Software Restriction Policies Any of the above

18. _____________ tab consist of Memory Range, Input/output Range and IRQ resources required for a specific device. a. General b. Details c. Resources d. Advanced

19. _____________ tool is used to identify resource conflicts. a. Registry cleaning tool b. Diskpart command line tool c. Disk Management d. System information tool 20. ____________ disk is used to create more than four partition. a. MBR b. Dynamic c. GPT d. Basic 21. ____________ Partition style cannot be applied on removable media. a. MBR b. Dynamic c. GPT d. Basic 22. A parental control can be applied only to ________________ users. a. Administrator b. Standard c. Guest d. All of them 23. You can restrict user to access some particular websites through parental control using___________ a. Web filter b. Program explorer c. Internet Explorer d. Popup Blocker 24. You need to install SQL server on your PC to configure____________________ a. Setup Analysis Tool b. Compatibility Administrator c. Application Compatibility Manager d. Standard User Analyzer 25. ____________ allow you to apply software restriction for a specific file, folder or registry key by specifying their path a. Path Rules b. Hash Rule c. Certificate Rule d. Zone Rule 26. ___________ covers files with the .psi, .bat, .cmd, .vbs and .js extension a. Executable Rules b. DLL Rules c. Script Rules d. Zone Rules 27. Windows XP mode for Windows 7 is available in. a. Professional b. Enterprise c. Ultimate d. Basic e. All 28. Applocker feature available only in_________________ and_________________ edition of 7. a. Professional b. Enterprise c. Ultimate d. Premium

29. _____________ policies determine how your windows 7 reacts when it experiences an application compatibility issue a. Application Compatibility b. Setup Analysis c. Standard user Analyzer d. Parental control 30. ___________ command line display the IP configuration of computer interfaces a. Ping b. Tracert c. Ipconfig d. Netstat 31. _____________ type of IPv6 address identifies multiple interface a. Unicast b. Multicast c. Anycast d. Both B and C 32. _____________ command should be used to display all the interfaces configuration information a. Ipconfig b. Ipconfig/all c. Both a and b d. None 33. You forgot the password of the drive you encrypted with BitLocker. How would you unlock the drive? a. Use the recovery key. b. Use the PIN used to start the OS. c. Use the password of the account in use, instead. d. Discard the data; it cannot be done now. 34. Which of the following is not a valid IP address? a. 10.10.10.10 b. 100.100.100.100 c. 200.200.200.200 d. 200.225.275.250 35. You want to use VPN reconnect feature on your Windows 7 Ultimate notebook. Which protocol should the VPN server be supporting for this feature to work? a. PEAP-MS-CHAPv2 b. IKEv2 c. MS-CHAPv2 d. Smartcard authentication protocol 36. You do not want the desktop to freeze and dim when UAC prompt occurs. Which feature will you disable when setting the policy for achieving the goal? a. Secure Desktop b. Secure Screen c. Dimmed Display d. Dimmed Desktop 37. What is a plug-and-play device? a. A device, which can be plugged to a computer from outside b. A device, which does not need any drivers c. A device, for which the driver gets installed automatically d. A device, which can play multimedia, files upon plugging 38. __________ IP Address is reserved for the internet. a. Private b. Public c. Dynamic d. Static 39. IPv6 addresses uses _______ bits. a. 32 b. 64 c. 128 d. None

40. _______ is a microchip that supports BitLocker Drive Encryption. a. TPM b. BIOS c. 8085 d. 8259 41. You can configure VPN Reconnect with a maximum timeout of ____ hours. a. 2 b. 4 c. 8 d. 18 e. 30 42. Alternative to traditional VPN is __________ a. ipsec b. Direct access, c. pptp d. L2tp e. NA 43. _______ encrypts the system volume. a. Cipher b. EFS c. Bitlocker d. DFS e. None of the above 44. _______ is a new feature in windows 7 that allows you to protect Data stored on USB storage devices. a. Bitlocker To Go, b. TPM c. EFS d. DFS e. None of the above 45. All users of clients running windows 7 run with the rights of ________ user. a. Standard b. Guest c. Admin d. Power e. Na 46. What is the meaning of EFS : a. Encrypting Folder System b. Encrypting File System c. Enhance File System d. Extend File System 47. _______ monitors which users or groups of users who access specific files and folders. a. Mapping b. Auditing c. sharing d. Security 48. ________ is a collection of virtual folders which contains links to existing folders. a. Share b. Map c. Library d. Offline e. Online 49. ________ is a tool used by the help desk people to view the screen of person to whom they are providing service. a. Remote Desktop b. Remote Assistance c. Remote Screen d. Remote Connection 50. _______ permission allows the users to access files in the shared folder but not to delete and modify them. a. Read b. Read / Write c. Owner d. Modify

51. _____ is a tool for administration that raises an alert if you modify the privileges of the administrator. a. UAC b. DAC c. RAC d. EAC 52. To create firewall rule for specific service is done by ______ rule. a. Program, b. port c. custom d. service 53. _______ is a network setting that enables your computer to determine whether your computer can find other computers and devices on the network. a. File Sharing b. Resources Sharing c. Network Discovery d. Device Sharing 54. EFS technology is applicable to the files and folders stored on volume formatted with _____. a. FAT b. FAT32 c. NTFS d. All of the above 55. User can disable the stealth feature in windows 7 (True/False) a. TRUE b. FALSE 56. Internet key exchange ver 2.0 is a VPN protocol new to windows 7. a. TRUE b. FALSE 57. Direct Access supports only certificate-based authentication. a. TRUE b. FALSE 58. If you want to editing in Windows 7 Registry so which command are use a. REGEDIT b. REDIT c. REGEDT32 d. REGEDITOR 59. Which are the VPN authentication protocols? (Choose three) a. Kerberos b. PAP (Password Authentication Protocol) c. CHAP (Challenge Handshaking Protocol) d. SMTP (Simple Mail Transfer Protocol) e. MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 60. The VPN protocols supported by Windows 7 are as: (Choose four) a. PPTP b. L2TP/IPSec c. SSTP d. HTTP e. IKEv2 61. ____________ Command line displays the IP configuration of computer interface. a. Ping b. Tracert c. Ipconfig d. Netstat 62. ___________ Type of IP address identifies multiple interface. a. Unicast b. Multicast c. Anycast d. B and C 63. ___________ configures an internal private network when DHCP is not provided. a. DNS b. APIPA c. NAT d. TCP/IP

64. Which types of IP address is reserved for internet? a. Public b. Private c. Static d. Dynamic 65. IPv6 address uses __________ bit. a. 32 b. 64 c. 128 d. 16 66. ______________feature ensures that the firewall become operational when the network interface active. a. Full Stealth b. Boot time filtering c. Network location awareness d. Active directory domain 67. ____________rules control connections for a TCP or UDP port. a. Program rule b. Custom rule c. Predefined rule d. Port rule 68. ___________ controls connection of branch cache, home group, file and printer sharing. a. Predefined rules b. Path rules c. Custom rules d. Program rules 69. Which edition of windows 7 does not support incoming Remote Desktop Connection? a. Windows 7 Home Premium b. Windows 7 Ultimate c. Windows 7 Professional d. All of the above 70. Windows 7 include ________ version of Windows Power Shell. a. Windows PowerShell 1.0 b. Windows PowerShell 2.0 c. Both a and b d. None of the above 71. Remote Desktop is ________ by default on computer running windows 7. a. Enable b. Disable 72. ____________ is a command line tool used to mange shared folder a. Netshare b. Diskpart c. Network and Sharing Center d. None of these 73. Which of the following editions of Windows 7 supports BranchCache feature? a. Home Premium b. Ultimate c. Enterprise d. Both B and C 74. EFS technology is applicable to the files and folders stored on volume formatted with_____________ a. FAT b. FAT32 c. NTFS d. All of the above 75. ____________ tools users can use to backup EFS certificates created when they encrypt a file on a standalone computer running Windows 7. a. Credential Manager b. The Manage File Encryption Certificate Tool c. The Certificate Manager console d. Chiper.exe 76. If you want to ensure that the users of standalone client running windows 7 in your organization change their passwords every three weeks, you should configure _________________ policies on each computer to accomplish this goal. a. Enforce Password History b. Minimum Password Length c. Maximum Password Length d. Maximum Password Age

77. You have to use Runas with the ___________ option to save the credential of an administrator account on a client running windows 7. a. Runas b. Credential Manager c. /savecred d. Certificate Console 78. Windows 7 support multifactor authentication, also include drivers that supports the _____________ smart card standard policies that can require a smart card to log on. a. Personal Identity Verification (PIV) b. Digital certificate c. Both A and B d. None of these 79. Windows 7 supports the PIV standard that was issued by_____________________ a. National Institute of Standard and Technology b. Server c. Credential Manager d. Certificate Manager Console 80. _________________ Authentication protocol is used to connect an IKEv2 VPN. a. PEAP b. EAP-MSCHAPv2 c. Microsoft Smart Card or other Certificate d. CHAP 81. _______________ type of VPN support the VPN Reconnect feature of Windows 7. a. PPTP b. L2TP/IPSec c. SSTP d. IKEv2 82. CHAP is _________________ based authentication protocol. a. Certificate b. Password c. Both A & B d. All of the Above e. None 83. A large number of people access the internet using their ______________ a. ISP b. PPTP c. PEAP d. None of the above 84. DirectAccess supports ________________ based authentication protocol. a. Certificate b. Password c. Both A & B d. None 85. The VPN protocols supported by Windows 7 are: a. PPTP b. L2TP/IPSec c. SSTP d. IKEv2 86. The ______________ helps the VPN clients to change the internet address without negotiating with the VPN server. a. MOBIKE b. SSTP c. MS-CHAP d. IKEv2 87. ______________ restricts unauthorized data access by encrypting the entire Windows operating system drive on the hard disk. a. BitLocker b. BitLocker To Go c. Digital Certificate d. Offline Files 88. ____________ is special user account with a special type of digital certificate that can be used to recover a BitLocker protected volume a. Digital signature b. Data Recovery agent c. Recover key d. Startup key

89. _____________ is the default mode of operation for offline features in Windows 7. a. Online Mode b. Auto Offline Mode c. Manually offline mode d. Slow link mode 90. ____________ is a command line tool used manages Windows 7 power settings. a. Manage-bde.exe b. Powercfg.exe c. Both A & B d. None 91. You can use keyboard or mouse to wake a computer from its _____________ mode. a. Hibernation b. Shut down c. Sleep d. Lock 92. In ________________ BitLocker mode user must provide PIN number and a device which host startup key at the boot time. a. TPM with Startup key b. TPM with PIN c. TPM With PIN and Startup key d. BitLocker Without TPM 93. ________________ addresses functionality issues. a. Important updates b. Recommended updates c. Optional updates d. All of the above 94. ________________ is the zone contains websites that damage your computer or files saved on your computer. a. Internet Zone b. Local Intranet Zone c. Restricted Sites Zone d. Trusted Site Zone 95. ______________ is a way to catch the confidential information such as personal or financial information of a user through a website or e-mail program. a. Hacking b. Phishing c. Filtering d. None of the Above 96. ____________ prevent your internet explorer from storing data such as cookies, temporary files, history and other data of your browsing session. a. Smart Screen Filter b. Action Center c. In Private Browsing d. In Private Filtering 97. SSL stands for_______________ a. Secure Socket Layer b. Standard Socket Layer c. Secure Standard Layer d. Secure Standard Logic 98. ____________ tool or feature is used to find out which application is installed on a client running Windows 7. a. Reliability Monitor b. Action Center c. DCSs d. Performance Monitor 99. A ___________ gives you details about the status of hardware resources, system response time and process on the computer along with system information and configuration data. a. System diagnostic Report b. Computer Health Check c. Both A & B d. None 100. The problem related with security and overall performance of the computer is monitored by_____________ a. Action center b. Problem Report and Solution c. Both A & B d. None ALL THE BEST

Você também pode gostar