1.
____________ is to authenticate user when logging on to a domain.
Explanation
A domain controller (DC) is responsible for authenticating users when they log on to a domain. It verifies the user's credentials and grants access to the domain's resources. The DC acts as the central authority for user authentication and manages the security policies and permissions within the domain. The abbreviation "dc" is often used as a shorthand for domain controller.
2.
If I have a workgroup of 10 users, when I make a user account for user 1 on computer 1,
Correct Answer
D. I have to make the same account for user 1 on the remaining 9 computers.
Explanation
There is no such thing as Work Group Policy or Work Group domain.
Workgroup
- are a small group of less than 10 computers.
- has decentralized database
- has decentralized administration
Domain
- has centralized database
- has centralized administration
3.
What are the benefits does NTFS offer that FAT doesn't?
Correct Answer(s)
A. File level security/permission
B. Encrypted File System
C. File compression
D. Disk Quota
E. Single file size can be larger than 4GB
Explanation
http://www.ntfs.com/ntfs_vs_fat.htm
http://en.wikipedia.org/wiki/Ntfs
http://en.wikipedia.org/wiki/FAT_32
4.
A folder A is shared with shared permission READ and NTFS permission full control. The combined permission is
Correct Answer
C. Read
Explanation
The most restrictive permission is use when you combine permission.
5.
An IP address is best defined as?
Correct Answer
A. An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) associated with every system connected to a network.
Explanation
An IP address is a unique number consisting of 4 parts separated by dots that is associated with every system connected to a network. This address allows devices to communicate with each other over the internet. It is not the address of an internet provider or the location of internet packets on a network. Therefore, the correct answer is that an IP address is a unique number associated with every system connected to a network.
6.
Malware is best defined as?
Correct Answer
C. Software designed to infiltrate or damage a computer system without the owner's informed consent.
Explanation
The correct answer is "Software designed to infiltrate or damage a computer system without the owner's informed consent." This definition accurately describes malware, which refers to any malicious software that is created with the intention of causing harm to a computer system, such as stealing sensitive information, disrupting system operations, or gaining unauthorized access. It is important to note that malware is different from antivirus software, which is designed to protect the operating system from viruses and other malicious threats.
7.
One MB is equal to?
Correct Answer
D. 1024KB
Explanation
One MB is equal to 1024KB. This is because in digital storage, the binary system is used where each unit is a power of 2. Therefore, 1 MB is equal to 1024 kilobytes (KB) and not 1000 bytes.
8.
Select the 3 graphics files from the list below.
Correct Answer(s)
B. Untitled.jpg
C. Untitled.bmp
E. Untitled.tiff
Explanation
The correct answer is untitled.jpg, untitled.bmp, and untitled.tiff. These three file extensions (.jpg, .bmp, .tiff) are commonly used for graphics files, while the other options (.nfo, .ogg) are not typically associated with graphics.
9.
Select the URL from the list below.
Correct Answer
B. Http://www.yahoo.com
ExplanationThe correct answer is http://www.yahoo.com. This is the correct URL from the given list. The other options are an email address (
[email protected]), a file path (D:\downloads\standard), and an IP address (192.168.0.1), which are not valid URLs.
10.
Which of the following programs is not an email client.
Correct Answer
C. Mozilla Firefox
Explanation
Mozilla Firefox is not an email client. It is a web browser developed by Mozilla Foundation. While it does have some email-related features such as the ability to open email links, it is primarily used for browsing the internet and does not have the full functionality of an email client like Microsoft Outlook, Windows Live Mail, or Outlook Express.
11.
What is the shortcut for PASTE in Windows operating systems?
Correct Answer
B. Ctrl + V
Explanation
The shortcut for PASTE in Windows operating systems is Ctrl + V. This combination of keys allows the user to paste copied or cut content from the clipboard into a document or application.
12.
In the computer component responsible for calculations, moving, and processing information?
Correct Answer
A. CPU
Explanation
The CPU (Central Processing Unit) is responsible for calculations, moving, and processing information in a computer. It is often referred to as the "brain" of the computer as it performs all the necessary calculations and instructions to execute tasks. The CPU carries out arithmetic and logical operations, retrieves and stores data, and controls the flow of information within the computer system.
13.
What is this computer component?
Correct Answer
D. Network Interface Card
Explanation
A Network Interface Card (NIC) is a computer component that allows a computer to connect to a network. It provides the necessary hardware for a computer to communicate with other devices on the network, such as routers, switches, and other computers. The NIC typically has an Ethernet port that allows for a wired connection, but it can also support wireless connections through Wi-Fi. This component is essential for accessing the internet, sharing files and resources, and participating in network activities.
14.
What is this computer component?
Correct Answer
B. CPU
Explanation
The correct answer is CPU. The CPU, or Central Processing Unit, is a computer component responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer, as it carries out the majority of the processing tasks. RAM, or Random Access Memory, is a different component that stores temporary data for the CPU to access quickly. The hard disk is a storage device, while the motherboard is the main circuit board that connects all the components of the computer.
15.
This is a measurement of speed over a network.
Correct Answer
D. Megabits per second.
Explanation
The correct answer is "Megabits per second." This is because when measuring speed over a network, the most commonly used unit is "bits" or "bits per second." Megabits per second (Mbps) is a unit used to measure data transfer rate or network speed. Megabytes, on the other hand, is a unit used to measure data storage capacity, not speed. Megahertz is a unit used to measure frequency, not speed over a network. Therefore, the most appropriate unit for measuring speed over a network is "megabits per second."
16.
Ping is a term for?
Correct Answer
B. A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer.
Explanation
Ping is a computer network tool used to test whether a particular host is reachable across an IP network. It sends a small packet of data to the host and waits for a response. If the host responds, it means that it is reachable. Ping is also used to self-test the Network Interface Card (NIC) of the computer, ensuring that it is functioning properly.
17.
Bandwidth is a term for?
Correct Answer
B. A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.
Explanation
Bandwidth refers to the measurement of how much information can be carried over a wired or wireless communications link within a specific time period, typically a second. It is not related to the speed of data transfer from the server to the client or the unit of information or computer storage. Therefore, the correct answer is that bandwidth is a measurement of how much information can be carried in a given time period over a communications link.
18.
What does an assigned IP address 169.254.0.12 indicate?
Correct Answer
D. The computer is configured for DHCP and cannot connect to the DHCP server.
Explanation
An IP address of 169.254.0.12 is within the range of APIPA (Automatic Private IP Addressing), which is used when a computer is unable to obtain an IP address from a DHCP server. This suggests that the computer is configured for DHCP but is unable to connect to the DHCP server, resulting in the automatic assignment of an APIPA address.
19.
Which two are examples of wireless encryption?
Correct Answer(s)
C. WEP
D. WPA
Explanation
WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) are both examples of wireless encryption. WEP was one of the first encryption protocols used for securing wireless networks but is now considered to be weak and easily cracked. WPA, on the other hand, is a more secure and robust encryption protocol that was introduced as an improvement over WEP. Both WEP and WPA are used to protect the confidentiality and integrity of data transmitted over wireless networks.
20.
Which item is an example of a physical network address?
Correct Answer
B. MAC address
Explanation
A physical network address refers to a unique identifier assigned to a network device. The MAC address, also known as the Media Access Control address, is a physical network address that is assigned to the network interface card (NIC) of a device. It is a 48-bit alphanumeric code that is embedded in the hardware of the device. The MAC address is used to identify devices on a local network and is essential for data transmission. Therefore, the MAC address is an example of a physical network address.
21.
Which are the default settings for a Windows XP computer network adapter?
Correct Answer
A. DHCP and configured as part of a workgroup
Explanation
The default settings for a Windows XP computer network adapter are DHCP and configured as part of a workgroup. This means that the network adapter will obtain its IP address automatically from a DHCP server, and it will be part of a workgroup rather than a domain.
22.
What does the term "Map Network Drive" mean?
Correct Answer
B. Create a shortcut to a network location
Explanation
The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access and connect to a specific folder or drive on a remote network. By mapping a network drive, the user can treat the network location as if it were a local drive on their computer, making it convenient to access and work with files and folders stored on the network.
23.
Which is the best example of a secure password?
Correct Answer
B. MySpecialPa$$w0rd
Explanation
"MySpecialPa$$w0rd" is the best example of a secure password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password using common methods such as dictionary attacks or brute force attacks. Additionally, the length of the password is also important, and "MySpecialPa$$w0rd" is longer than the other options provided, further enhancing its security.
24.
What icon is used to identify a shared folder?
Correct Answer
A. An open hand palm up
Explanation
The open hand palm up icon is used to identify a shared folder. This icon represents the concept of sharing, as if someone is offering their hand to share something. It is commonly used to indicate that a folder is shared and can be accessed by multiple users.
25.
Which is used to provide a centralized authentication method from remote locations?
Correct Answer
C. RADIUS
Explanation
RADIUS (Remote Authentication Dial-In User Service) is used to provide a centralized authentication method from remote locations. It is a networking protocol that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the network. RADIUS allows for secure authentication and authorization for various network services, such as VPNs, wireless networks, and dial-up connections. It provides a centralized and efficient way to manage user authentication and access control from remote locations.
26.
What is the purpose of a DNS server?
Correct Answer
B. To resolve domain names to IP addresses
Explanation
The purpose of a DNS server is to resolve domain names to IP addresses. This is necessary because domain names are easier for humans to remember and use, while computers communicate using IP addresses. The DNS server acts as a translator, converting the domain name entered by a user into the corresponding IP address so that the correct website or service can be accessed.
27.
What is the default name of the folder used by the Windows Vista operating system to share documents, downloads, music, pictures, videos, and recorded TV?
Correct Answer
D. Public
Explanation
The default name of the folder used by the Windows Vista operating system to share documents, downloads, music, pictures, videos, and recorded TV is "Public". This folder is accessible to all users on the computer and allows for easy sharing of files and media between different accounts.
28.
What is the default workgroup name for a computer running Windows XP professional?
Correct Answer
C. Workgroup
Explanation
The default workgroup name for a computer running Windows XP professional is "Workgroup". This is the default name assigned to a computer when it is set up on a local network. The workgroup name is used to identify and group computers together on the network, allowing them to share files, printers, and other resources.
29.
Which is an example of a MAC address?
Correct Answer
C. 00-1F-E2-57-DD-A6
Explanation
A MAC address is a unique identifier assigned to a network interface controller (NIC) for communication on a network. It is represented as a series of six pairs of hexadecimal digits separated by hyphens or colons. The given answer "00-1F-E2-57-DD-A6" follows this format and is a valid example of a MAC address.
30.
Which type or connecter is commonly used for CAT6 cable?
Correct Answer
B. RJ45
Explanation
RJ45 is commonly used for CAT6 cable. RJ45 is a type of connector that is specifically designed for Ethernet networking. It has 8 pins and is used to connect devices such as computers, routers, and switches to a local area network (LAN). CAT6 cable, on the other hand, is a type of twisted pair cable that is used for high-speed Ethernet connections. It supports data transfer rates of up to 10 gigabits per second and is backward compatible with lower category cables. Therefore, RJ45 is the correct answer as it is the commonly used connector for CAT6 cable.
31.
Which command will display the assigned IP address of a network adapter installed on a Windows XP system?
Correct Answer
C. Ipconfig
Explanation
The command "Ipconfig" is used to display the assigned IP address of a network adapter installed on a Windows XP system.
32.
What is the standard port for HTTP?
Correct Answer
B. 80
Explanation
The standard port for HTTP is 80. This port is used for transmitting data over the internet using the HTTP protocol. When a user enters a website URL in their browser, the browser sends a request to the server on port 80 to retrieve the website's content. This port is commonly used for accessing websites and is the default port for HTTP communication.
33.
What is the standard port for HTTPS?
Correct Answer
B. 443
Explanation
The standard port for HTTPS is 443. HTTPS is the secure version of HTTP, and it uses SSL/TLS encryption to establish a secure connection between a web browser and a web server. Port 443 is specifically designated for secure HTTP communication, ensuring that data transmitted over this port is encrypted and protected from unauthorized access.
34.
What is the standard port for SMTP?
Correct Answer
B. 25
Explanation
The standard port for SMTP (Simple Mail Transfer Protocol) is 25. SMTP is the protocol used for sending email messages between servers. By default, SMTP servers listen on port 25 for incoming email traffic. This port is used for establishing a connection between the email client and the email server, allowing the client to send outgoing emails.
35.
What is the standard port for IMAP?
Correct Answer
C. 143
Explanation
IMAP (Internet Message Access Protocol) is a standard protocol used for receiving emails from a mail server. The standard port for IMAP is 143. This port is used by email clients to establish a connection with the mail server and retrieve emails. Port 80 is the standard port for HTTP, port 443 is the standard port for HTTPS, and port 25 is the standard port for SMTP (Simple Mail Transfer Protocol), which is used for sending emails.
36.
Choose the advantages of using Word as an Email Editor in Outlook from the following:
Correct Answer(s)
A. Formatting benefits to e-mails
B. Spell Check in e-mails
D. Auto-Save benefits
Explanation
Using Word as an Email Editor in Outlook provides several advantages. Firstly, it offers formatting benefits to emails, allowing users to customize the appearance of their messages with various fonts, colors, and styles. Secondly, it includes a spell check feature, ensuring that emails are free from spelling errors. Lastly, Word as an Email Editor provides auto-save benefits, automatically saving drafts of emails at regular intervals, preventing the loss of unsaved work. However, there is no mention of a decrease in RAM usage as an advantage of using Word as an Email Editor in Outlook.
37.
File extension for an Outlook Archive file is ………….
Correct Answer(s)
.pst
Explanation
The file extension for an Outlook Archive file is .pst. This file extension is used to save and store archived emails, contacts, calendar events, and other data in Microsoft Outlook. The .pst extension stands for "Personal Storage Table" and is commonly used for backing up and organizing Outlook data.