Mr. Davids Help Desk Assessment

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Umojo
U
Umojo
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,700
Questions: 56 | Attempts: 2,700

SettingsSettingsSettings
Mr. Davids Help Desk Assessment - Quiz

THanks for your interest in working at Mr. David's Flooring. In order to assess all the candidates, we ask that you take this assessment test.
Good Luck!


Questions and Answers
  • 1. 

    What is the first question a computer technician should ask a user that is having issues with a software application after receiving a help desk request by phone or email?

    • A.

      Have you rebooted?

    • B.

      May I please have your name and phone number?

    • C.

      Is this computer a Dell?

    Correct Answer
    B. May I please have your name and pHone number?
    Explanation
    The first question a computer technician should ask a user that is having issues with a software application after receiving a help desk request by phone or email is "May I please have your name and phone number?" This is because it is important for the technician to have the user's contact information in order to provide assistance and follow up if needed. Rebooting the computer and asking about the computer's brand are troubleshooting steps that may come later in the conversation, but gathering the user's information is the first priority.

    Rate this question:

  • 2. 

    If you're diagnosing an issue with a printing issue, what is the first step in diagnosing the problem?

    • A.

      Ask the user to determine if the fuser is functional.

    • B.

      Determine if the printer is connected to the local machine or a network printer.

    • C.

      Ask the user if the printer is turned on.

    • D.

      Ask the user if there is paper in the printer

    Correct Answer
    C. Ask the user if the printer is turned on.
    Explanation
    The first step in diagnosing a printing issue is to ask the user if the printer is turned on. This is because if the printer is not turned on, it will not be able to perform any printing tasks. By confirming if the printer is turned on, it helps to identify if the issue is simply a matter of power supply.

    Rate this question:

  • 3. 

    A client calls and exclaims they have forgotten their password.  What is your first action to resolve the issue?

    • A.

      Remotely login to the system and reset the users password

    • B.

      Get in you vehicle, go to the site and make sure the user's caps lock is off

    • C.

      Positively identify the user's identity.

    • D.

      Determine if the user is logging into a local machine, domain or web application

    Correct Answer
    C. Positively identify the user's identity.
    Explanation
    The first action to resolve the issue of a client forgetting their password is to positively identify the user's identity. This is important in order to ensure that the person requesting the password reset is indeed the legitimate user and not someone trying to gain unauthorized access to the system. By verifying the user's identity, the support staff can proceed with the appropriate steps to reset the password and provide access to the client.

    Rate this question:

  • 4. 

    Based on the previous question, "a client calls and exclaims they have forgotten their password."  What is your second action to resolve the issue?

    • A.

      Remotely login to the system and reset the users password

    • B.

      Get in you vehicle, go to the site and make sure the user's caps lock is off

    • C.

      Positively identify the user's identity.

    • D.

      Determine if the user is logging into a local machine, domain or web application

    Correct Answer
    D. Determine if the user is logging into a local machine, domain or web application
    Explanation
    The second action to resolve the issue of a client forgetting their password is to determine if the user is logging into a local machine, domain, or web application. This step is important in order to understand the specific context and system that the user is trying to access. It will help in providing the appropriate instructions or assistance to reset the password and regain access to the system.

    Rate this question:

  • 5. 

    Based on the previous question, "a client calls and exclaims they have forgotten their password."  What is your third action to resolve the issue?

    • A.

      Remotely login to the system and reset the users password

    • B.

      Get in you vehicle, go to the site and make sure the user's caps lock is off

    • C.

      Positively identify the user's identity.

    • D.

      Determine if the user is logging into a local machine, domain or web application

    Correct Answer
    A. Remotely login to the system and reset the users password
    Explanation
    The third action to resolve the issue is to remotely login to the system and reset the user's password. This is the most efficient and convenient way to assist the client in regaining access to their account. By remotely logging in, the support personnel can quickly reset the password without the need to physically visit the site or rely on the user's ability to accurately identify their identity. This action ensures a prompt resolution to the problem and minimizes any inconvenience caused to the client.

    Rate this question:

  • 6. 

    70% of all system issues can be resolved remotely!

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    70% of all system issues can be resolved remotely. This means that a majority of problems that occur in a system can be fixed without the need for physical intervention or on-site support. This is beneficial as it saves time, resources, and costs associated with dispatching technicians to the location. Remote resolution also allows for faster response times and minimizes downtime, ensuring efficient problem-solving. Therefore, the statement "True" indicates that a significant portion of system issues can indeed be resolved remotely.

    Rate this question:

  • 7. 

    Which of the following is not an internet browser?

    • A.

      Safari

    • B.

      Firefox

    • C.

      Opera

    • D.

      Thunderbird

    Correct Answer
    D. Thunderbird
    Explanation
    Thunderbird is not an internet browser. It is actually an email client developed by Mozilla, which allows users to send, receive, and manage their email accounts. While Safari, Firefox, and Opera are all popular internet browsers used to access and navigate the internet, Thunderbird is specifically designed for email communication rather than browsing websites.

    Rate this question:

  • 8. 

    Bandwidth

    • A.

      The speed at which data can be transferred from the server to the client.

    • B.

      A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.

    • C.

      A unit of information or computer storage equal to one billion bytes.

    • D.

      None of the above.

    Correct Answer
    B. A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.
    Explanation
    Bandwidth refers to the measurement of how much information can be carried in a given time period, typically a second, over a wired or wireless communications link. It represents the capacity or speed at which data can be transferred from the server to the client. This term is commonly used to describe the capacity of an internet connection, indicating the amount of data that can be transmitted within a specific timeframe.

    Rate this question:

  • 9. 

    Download

    • A.

      A unit of information or computer storage equal to either 1,024 bytes (2 to the 10th power) or 1,000 bytes (10 to the 3rd power), depending on context

    • B.

      When you transmit data from your PC to another computer.

    • C.

      A local area network which uses high frequency radio signals to send and receive data over short distances.

    • D.

      When data is received on your PC. This includes, but is not limited to, viewing webpages, receiving e-mail, watching videos, getting movies, getting music and email attachments.

    Correct Answer
    D. When data is received on your PC. This includes, but is not limited to, viewing webpages, receiving e-mail, watching videos, getting movies, getting music and email attachments.
    Explanation
    The correct answer explains that a download refers to the process of receiving data on your PC. This can include various activities such as viewing webpages, receiving emails, watching videos, downloading movies or music, and receiving email attachments. The answer does not provide any additional information or context about downloads.

    Rate this question:

  • 10. 

    Ping

    • A.

      A measurement of data transferred to your local station from a specific network source.

    • B.

      A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the Network Interface Card (NIC) of the computer.

    • C.

      A sound used for testing your computer speakers.

    • D.

      None of the above.

    Correct Answer
    B. A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the Network Interface Card (NIC) of the computer.
    Explanation
    The answer is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer. This is because the term "Ping" is commonly used in computer networking to refer to the act of sending a small packet of data from one computer to another and measuring the time it takes for the packet to be sent and received. This helps in determining the connectivity and latency between the two devices. Additionally, the mention of testing the NIC further reinforces the network testing aspect of "Ping".

    Rate this question:

  • 11. 

    What is the function of this device?

    • A.

      It performs all the arithmetic, logical operations of computer.

    • B.

      It is very high speed short term storage that CPU uses to store information temporarily. After the computer is turned off, any data stored will be lost.

    • C.

      It is used to store large amounts of data in a computer system, data is retained on this device even when the computer is turned off.

    • D.

      It is is used to generate and output images onto the display.

    Correct Answer
    C. It is used to store large amounts of data in a computer system, data is retained on this device even when the computer is turned off.
    Explanation
    The correct answer is that the device is used to store large amounts of data in a computer system, and the data is retained on this device even when the computer is turned off. This suggests that the device being referred to is a secondary storage device, such as a hard disk drive or solid-state drive, which is used to store data for long-term use. Unlike temporary storage devices like RAM, the data stored on this device is not lost when the computer is powered off.

    Rate this question:

  • 12. 

    This is a measurement of speed over a network.

    • A.

      Megabytes

    • B.

      Bits

    • C.

      Megahertz

    • D.

      Megabits per second.

    Correct Answer
    D. Megabits per second.
    Explanation
    Megabits per second is the correct answer because it is a common unit used to measure the speed of data transfer over a network. Megabits per second (Mbps) refers to the amount of data that can be transmitted in one second, with one megabit equal to one million bits. This unit is commonly used to describe internet connection speeds and is a standard measurement in the field of networking.

    Rate this question:

  • 13. 

    What is this computer component?

    • A.

      Hard drive

    • B.

      CPU

    • C.

      Chassis

    • D.

      Motherboard

    Correct Answer
    C. Chassis
    Explanation
    The correct answer is "Chassis". A chassis is the physical frame or enclosure that holds and protects the internal components of a computer. It provides structural support and houses components such as the motherboard, hard drive, and CPU.

    Rate this question:

  • 14. 

    What is this device?

    • A.

      Wireless Router

    • B.

      Video Card

    • C.

      Motherboard

    • D.

      Modem

    Correct Answer
    A. Wireless Router
    Explanation
    A wireless router is a device that allows multiple devices to connect to the internet wirelessly. It acts as a central hub for the network, transmitting data between the internet and the connected devices. Unlike a modem, which only connects to the internet, a wireless router also provides a local network for devices to communicate with each other. A video card is a component in a computer that processes and renders images and videos. A motherboard is the main circuit board of a computer, connecting all the components together.

    Rate this question:

  • 15. 

    What is this computer component?

    • A.

      RAM

    • B.

      CPU

    • C.

      Hard Disk

    • D.

      Motherboard

    Correct Answer
    B. CPU
    Explanation
    The correct answer is CPU. The CPU, or Central Processing Unit, is a computer component responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer, as it carries out the majority of the processing tasks. RAM, Hard Disk, and Motherboard are also computer components, but they serve different functions. RAM is responsible for temporarily storing data that the CPU needs to access quickly, while the Hard Disk stores data for long-term storage. The Motherboard is the main circuit board that connects all the components of the computer together.

    Rate this question:

  • 16. 

    Which is not an operating system?

    • A.

      DOS

    • B.

      Windows

    • C.

      MS-Word

    • D.

      LINUX

    Correct Answer
    C. MS-Word
    Explanation
    MS-Word is not an operating system. It is a word processing software developed by Microsoft. Operating systems are software that manage computer hardware and software resources and provide common services for computer programs. DOS, Windows, and LINUX are examples of operating systems.

    Rate this question:

  • 17. 

    The brain of the computer. This part does the calculation, moving and processing of information.

    • A.

      CPU

    • B.

      RAM

    • C.

      Motherboard

    • D.

      Hard drive

    Correct Answer
    A. CPU
    Explanation
    The CPU, or Central Processing Unit, is often referred to as the brain of the computer because it is responsible for executing instructions, performing calculations, and processing data. It carries out all the necessary tasks to run programs and operate the computer system. The CPU is the component that performs the actual processing of information, making it a vital part of the computer's functionality.

    Rate this question:

  • 18. 

    What is this computer component?

    • A.

      Video Card

    • B.

      Sound Card

    • C.

      RAM

    • D.

      Network Interface Card

    Correct Answer
    D. Network Interface Card
    Explanation
    A network interface card (NIC) is a computer component that allows a computer to connect to a network. It provides the necessary hardware and software to establish a network connection, enabling the computer to send and receive data over the network. NICs are commonly used in desktop computers, laptops, and servers to connect to local area networks (LANs) or the internet. They typically have an Ethernet port or a wireless adapter, depending on the type of network connection required.

    Rate this question:

  • 19. 

    What does "www" stand for?

    • A.

      Wide World Web

    • B.

      Winding Web World

    • C.

      World Wide Web

    • D.

      None of the above

    Correct Answer
    C. World Wide Web
    Explanation
    The correct answer is "World Wide Web." The term "www" stands for World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It is a global information space where users can access and share information through websites and webpages.

    Rate this question:

  • 20. 

    What is the shortcut for PASTE?

    • A.

      Ctrl + P

    • B.

      Ctrl + V

    • C.

      Ctrl + C

    • D.

      Caps Lock + V

    Correct Answer
    B. Ctrl + V
    Explanation
    The shortcut for PASTE is Ctrl + V. This combination of keys is commonly used to paste copied or cut content into a document or program. It is a widely recognized shortcut across various operating systems and software applications.

    Rate this question:

  • 21. 

    A modem is best defined as...

    • A.

      A device that allows you to connect your PC to to an internet service.

    • B.

      A piece of computer software that is used to browse the web. (eg: internet explorer)

    • C.

      An interconnected group of computers.

    • D.

      A program that prevents other people on the Internet from accessing your computer and your files.

    Correct Answer
    A. A device that allows you to connect your PC to to an internet service.
    Explanation
    A modem is a device that enables you to establish a connection between your computer and an internet service provider. It acts as a bridge between your computer and the internet, allowing you to send and receive data over the internet. By connecting your PC to the modem, you can access various online services, browse the web, and communicate with others through email, chat, or video calls.

    Rate this question:

  • 22. 

    Which of the following programs is not an email client.

    • A.

      Microsoft Outlook 2003

    • B.

      Windows Live Mail

    • C.

      Mozilla Firefox

    • D.

      Outlook Express 6

    Correct Answer
    C. Mozilla Firefox
    Explanation
    Mozilla Firefox is not an email client. It is a web browser developed by Mozilla Foundation. While Microsoft Outlook 2003, Windows Live Mail, and Outlook Express 6 are email clients used for managing and sending emails, Mozilla Firefox is primarily used for browsing websites and accessing online content.

    Rate this question:

  • 23. 

    Select the URL from the list below.

    Correct Answer
    B. Http://www.yahoo.com
    Explanation
    The correct answer is http://www.yahoo.com because it is the only option that is a valid URL. The other options are an email address ([email protected]), a file path (D:\downloads\standard), and an IP address (192.168.0.1), which are not URLs.

    Rate this question:

  • 24. 

    Select the 3 graphics files from the list below.

    • A.

      Untitled.nfo

    • B.

      Untitled.jpg

    • C.

      Untitled.bmp

    • D.

      Untitled.ogg

    • E.

      Untitled.tiff

    Correct Answer(s)
    B. Untitled.jpg
    C. Untitled.bmp
    E. Untitled.tiff
    Explanation
    The correct answer is to select the graphics files from the list. The files with the extensions .jpg, .bmp, and .tiff are commonly used for storing images and graphics. Therefore, selecting untitled.jpg, untitled.bmp, and untitled.tiff would be the appropriate choice as they are the graphics files from the given list.

    Rate this question:

  • 25. 

    Which operating system was the successor to Windows 98?

    • A.

      Windows Vista

    • B.

      Windows XP

    • C.

      Windows ME

    • D.

      Windows CE

    Correct Answer
    C. Windows ME
    Explanation
    Windows ME, which stands for Windows Millennium Edition, was the successor to Windows 98. Windows ME was released in 2000 and was designed for home users, with improvements in multimedia and internet capabilities. It introduced features such as System Restore, Windows Movie Maker, and Windows Media Player 7. Although Windows ME was not as successful as its predecessor, it played a significant role in the evolution of the Windows operating system.

    Rate this question:

  • 26. 

    One MB is equal to...

    • A.

      One thousand bytes

    • B.

      1 billion bytes

    • C.

      The amount of RAM in every computer

    • D.

      1024KB

    Correct Answer
    D. 1024KB
    Explanation
    One MB is equal to 1024KB. In computer systems, memory is often measured in bytes, with kilobytes (KB) and megabytes (MB) being common units. The prefix "kilo" represents 1000, so 1 kilobyte is equal to 1000 bytes. However, in binary systems, memory is often measured in powers of 2, so 1 kilobyte is considered to be 1024 bytes. Therefore, 1 megabyte is equal to 1024 kilobytes, or 1024KB.

    Rate this question:

  • 27. 

    Which one is not an output device?

    • A.

      Printer

    • B.

      Monitor

    • C.

      Modem

    • D.

      Keyboard

    Correct Answer
    D. Keyboard
    Explanation
    An output device is a device that displays or presents information to the user. In this question, the options given are Printer, Monitor, Modem, and Keyboard. Printer and Monitor are both examples of output devices as they produce visual or printed output. Modem, on the other hand, is a communication device used to connect to the internet and is not primarily used for outputting information. However, the Keyboard is an input device as it is used to input data or commands into a computer rather than displaying or presenting information. Therefore, the correct answer is Keyboard.

    Rate this question:

  • 28. 

    Which one of the following best defines the term Operating System?

    • A.

      The software that allows computer users to run applications with the hardware of a specific system. Microsoft® Windows® or Apple® Computer's OS are examples of operating systems.

    • B.

      The master control program that manages a computer's internal functions and provides a means of control to the computer's operations and file system.

    • C.

      The software that manages the hardware and software interface of a computer.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The term Operating System refers to the software that allows computer users to run applications with the hardware of a specific system. It is also the master control program that manages a computer's internal functions and provides a means of control to the computer's operations and file system. Additionally, it is the software that manages the hardware and software interface of a computer. Therefore, all of the given options accurately define the term Operating System.

    Rate this question:

  • 29. 

    Malware is best defined as...

    • A.

      A computer program designed to protect the operating system from viruses.

    • B.

      Microsoft Arithmetic LAN software. Software run in the background of any Windows based computer system used to manage network connections

    • C.

      Software designed to infiltrate or damage a computer system without the owner's informed consent.

    • D.

      None of the above.

    Correct Answer
    C. Software designed to infiltrate or damage a computer system without the owner's informed consent.
    Explanation
    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. This can include viruses, worms, Trojans, ransomware, adware, and other malicious programs. Its purpose is to gain unauthorized access to sensitive information, disrupt computer operations, or cause harm to the system or its users. It is important to have security measures in place to protect against malware, such as using antivirus software, regularly updating software, and being cautious when downloading or clicking on suspicious links.

    Rate this question:

  • 30. 

    An IP address is best defined as...

    • A.

      An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) asociated with every system connected to a network

    • B.

      Internet Provider Address. The address of a company that provides individuals and other companies access to the Internet.

    • C.

      The location of Internet Packets measured in kilobytes on a network.

    • D.

      All of the above.

    Correct Answer
    A. An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) asociated with every system connected to a network
    Explanation
    An IP address is a unique numerical identifier assigned to each device connected to a network. It consists of four parts separated by dots, such as 217.247.84.89. This address allows devices to communicate with each other on the internet. It is not related to the location of internet packets or the address of an internet provider. Therefore, the correct answer is that an IP address is a unique number associated with every system connected to a network.

    Rate this question:

  • 31. 

    The internet was invented by

    • A.

      Bill Gates

    • B.

      The US Department of Defense

    • C.

      Steve Jobs

    • D.

      Albert Einstein

    Correct Answer
    B. The US Department of Defense
    Explanation
    The correct answer is the US Department of Defense. The internet was initially developed by the US Department of Defense in the 1960s as a means of communication and information sharing between different military organizations. It was called ARPANET and later evolved into the internet that we know today. Bill Gates, Steve Jobs, and Albert Einstein are not directly associated with the invention of the internet.

    Rate this question:

  • 32. 

    what is a network repeater?

    • A.

      A repeater is something that repeats something e.g. songs

    • B.

      A network repeater is a device used to expand the boundaries of a wired or wireless (WiFi) local area network (LAN).

    • C.

      Repeater is a something that connects your computer

    Correct Answer
    B. A network repeater is a device used to expand the boundaries of a wired or wireless (WiFi) local area network (LAN).
    Explanation
    A network repeater is a device that is used to extend the range of a wired or wireless local area network (LAN). It receives the network signal and amplifies it before transmitting it again, effectively increasing the coverage area of the network. This allows devices that are located far from the main network source to connect and communicate with the network. By repeating and boosting the signal, a network repeater helps to improve the overall network performance and connectivity.

    Rate this question:

  • 33. 

    how many layers are there in the OSI model

    • A.

      4

    • B.

      20

    • C.

      5

    • D.

      7

    • E.

      1

    Correct Answer
    D. 7
    Explanation
    The OSI model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role in the process of transmitting data across a network. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Therefore, the correct answer is 7.

    Rate this question:

  • 34. 

    which are layers in the OSI model

    • A.

      Application layer , presentation layer and physical layer

    • B.

      Application layer, switch layer , bridge layer

    • C.

      Presentation layer, hub layer physical layer

    Correct Answer
    A. Application layer , presentation layer and pHysical layer
    Explanation
    The correct answer is application layer, presentation layer, and physical layer. These three layers are part of the OSI model, which is a conceptual framework that standardizes the functions of a communication system. The application layer is responsible for providing services to the user, such as email or file transfer. The presentation layer ensures that data is properly formatted and encrypted. The physical layer deals with the actual transmission of data through physical media, such as cables or wireless signals.

    Rate this question:

  • 35. 

    The presentation layer is which layer?

    • A.

      1

    • B.

      6

    • C.

      9

    • D.

      4

    Correct Answer
    B. 6
    Explanation
    The correct answer is 6. In the OSI model, the presentation layer is the sixth layer. This layer is responsible for the formatting and presentation of data to be transmitted between the application layer and the session layer. It ensures that data is properly encoded and formatted so that it can be understood by the receiving system. The presentation layer also handles encryption and decryption of data for secure communication.

    Rate this question:

  • 36. 

    what is the function of a Gateway?

    • A.

      Is enabling connection to other networks

    • B.

      The way in which you get out of the internet

    • C.

      To direct traffic

    Correct Answer
    A. Is enabling connection to other networks
    Explanation
    A gateway is a networking device that enables connection to other networks. It acts as an entry and exit point for data packets between different networks. It helps in directing traffic by routing data packets to their intended destination. It also performs protocol conversions and ensures compatibility between different networks. By enabling connection to other networks, a gateway allows devices on one network to communicate with devices on another network, facilitating data transfer and communication between different networks.

    Rate this question:

  • 37. 

    What does WAP stand for

    • A.

      Wireless apple pear

    • B.

      Wireless access point

    • C.

      William ate peter

    • D.

      Wireless access pin

    Correct Answer
    B. Wireless access point
    Explanation
    WAP stands for "wireless access point." A wireless access point is a device that allows wireless devices to connect to a wired network. It acts as a bridge between wireless devices and the network, providing wireless connectivity to devices such as laptops, smartphones, and tablets.

    Rate this question:

  • 38. 

    What does a network bridge do?

    • A.

      Connects multiple network segments at the data link layer (layer 2) of the OSI model

    • B.

      Connects multiple segments to the network

    Correct Answer
    A. Connects multiple network segments at the data link layer (layer 2) of the OSI model
    Explanation
    A network bridge is a device or software that connects multiple network segments at the data link layer (layer 2) of the OSI model. It allows different network segments to communicate with each other by forwarding data packets between them. By doing so, it effectively extends the network and enables devices on different segments to communicate as if they were on the same network. This helps to improve network performance, increase network capacity, and enhance network flexibility.

    Rate this question:

  • 39. 

    What does ISDN stand for?

    • A.

      Internet scores display nation

    • B.

      Intergrated services digital network

    • C.

      Internet service display network

    Correct Answer
    B. Intergrated services digital network
    Explanation
    ISDN stands for Integrated Services Digital Network. It is a telecommunications network that enables the transmission of voice, data, video, and other network services over traditional copper telephone lines. ISDN provides faster and more reliable connections compared to analog systems, allowing for simultaneous voice and data transmission. It has been widely used for internet access, video conferencing, and other communication services.

    Rate this question:

  • 40. 

    What are the four types of networks?

    • A.

      Bus Ring Star Mesh

    • B.

      Flower Water Rain Main

    • C.

      Coke Ring Flower Mash

    Correct Answer
    A. Bus Ring Star Mesh
    Explanation
    The correct answer is Bus Ring Star Mesh. These are the four types of network topologies commonly used in computer networking. A bus network consists of a single cable that connects all devices in a linear fashion. A ring network forms a closed loop where each device is connected to two other devices. A star network has a central hub or switch that connects all devices. And a mesh network has multiple connections between devices, creating a redundant and fault-tolerant network.

    Rate this question:

  • 41. 

    What are router, modem and Wap types of ?

    • A.

      Essay words

    • B.

      Losers

    • C.

      Topolgy

    • D.

      Interconnecting devices

    Correct Answer
    D. Interconnecting devices
    Explanation
    The given answer, "interconnecting devices," is a suitable explanation for the question. It implies that a router, modem, and WAP are all types of devices that facilitate the connection and communication between different networks or devices. These interconnecting devices play a crucial role in establishing and maintaining network connections, allowing data to be transmitted and received efficiently.

    Rate this question:

  • 42. 

    The two built-in user accounts that are created on a Windows Server 2008 computer are the Administrator account and the __________ account.

    • A.

      Network

    • B.

      Interactive

    • C.

      Power User

    • D.

      Guest

    Correct Answer
    D. Guest
    Explanation
    On a Windows Server 2008 computer, the two built-in user accounts are the Administrator account and the Guest account. The Guest account is a limited account that allows temporary access to the system for users who do not have a regular user account. It has restricted permissions and is typically used for temporary or occasional users who need to access the system without full privileges.

    Rate this question:

  • 43. 

    __________ groups are a collection of user accounts that are local to one specific workstation or member server.

    • A.

      Distribution

    • B.

      Local

    • C.

      Built-in

    • D.

      Security

    Correct Answer
    B. Local
    Explanation
    Local groups are a collection of user accounts that are specific to one particular workstation or member server. These groups are used to manage access and permissions on that specific machine. They are not distributed across a network or domain, but rather limited to the local environment. Local groups are typically used to grant or deny access to resources on a single machine, making them an important tool for managing security and user accounts within a specific workstation or server.

    Rate this question:

  • 44. 

    What special identity group is used as a reduced-privilege account to allow applications to run on a server without requiring administrative access?

    • A.

      Network

    • B.

      Dialup

    • C.

      Network Service

    • D.

      Restricted

    Correct Answer
    C. Network Service
    Explanation
    The special identity group used as a reduced-privilege account to allow applications to run on a server without requiring administrative access is "Network Service." This account is specifically designed for running services and processes in a secure manner, with limited permissions to ensure the safety and integrity of the server. It provides the necessary access for network-related tasks while minimizing the risk of unauthorized access or system damage.

    Rate this question:

  • 45. 

    What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?

    • A.

      RSA SecureID

    • B.

      Password token

    • C.

      Smart chip

    • D.

      Smart card

    Correct Answer
    D. Smart card
    Explanation
    A smart card is a credit card-sized or token-style device that is used with a PIN to enable logon to the enterprise. It is a secure method of authentication that stores and processes data on an embedded microchip. The smart card provides an extra layer of security by requiring both the physical card and the correct PIN to gain access, making it difficult for unauthorized users to impersonate someone else.

    Rate this question:

  • 46. 

    What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?

    • A.

      Runas

    • B.

      Su

    • C.

      Runadmin

    • D.

      Launchas

    Correct Answer
    A. Runas
    Explanation
    The command-line tool "runas" can be used with a standard user account to reduce the risks associated with the Administrator account. This tool allows a user to run specific commands with different user credentials, such as running administrative tasks without actually logging in as the Administrator. By using "runas", the standard user can perform necessary administrative tasks while minimizing the exposure and potential risks associated with the more powerful Administrator account.

    Rate this question:

  • 47. 

    What policies can be used to ensure that users always have the latest versions of applications?

    • A.

      Registry-based

    • B.

      Software installation

    • C.

      Folder redirection

    • D.

      Offline file storage

    Correct Answer
    B. Software installation
    Explanation
    Software installation is the correct answer because it allows users to always have the latest versions of applications. By regularly updating and installing software on users' devices, organizations can ensure that users have access to the most up-to-date features and security patches. This can be done through various methods such as automatic updates, centralized software deployment, or using software distribution tools.

    Rate this question:

  • 48. 

    What Microsoft Management Console (MMC) snap-in is used to create and modify Group Policies and their settings?

    • A.

      Group Policy Management Editor

    • B.

      Group Policy Control Console

    • C.

      Group Policy GPO

    • D.

      Group Policy Management Console

    Correct Answer
    D. Group Policy Management Console
    Explanation
    The Group Policy Management Console is the correct answer because it is the MMC snap-in used to create and modify Group Policies and their settings. This tool allows administrators to manage Group Policy objects (GPOs) across an Active Directory domain. It provides a centralized interface for configuring and deploying Group Policies, making it easier to manage and control the security and configuration settings for multiple users and computers in a network environment.

    Rate this question:

  • 49. 

    Which of the following is not a type of GPO?

    • A.

      Local GPO

    • B.

      Advanced GPO

    • C.

      Domain GPO

    • D.

      Starter GPO

    Correct Answer
    B. Advanced GPO
    Explanation
    The answer is "advanced GPO" because it is not a recognized type of Group Policy Object (GPO). GPOs are used in Windows operating systems to manage various settings and configurations for groups of computers or users. The recognized types of GPOs are local GPO, domain GPO, and starter GPO. However, "advanced GPO" is not a commonly used or recognized term in the context of GPOs.

    Rate this question:

  • 50. 

    What term refers to tracking events that take place on the local computer?

    • A.

      Tracking

    • B.

      Tracing

    • C.

      Spying

    • D.

      Auditing

    Correct Answer
    D. Auditing
    Explanation
    The term "auditing" refers to tracking events that take place on the local computer. Auditing involves monitoring and recording activities such as file access, logins, system changes, and other events to ensure compliance, security, and accountability. It helps to identify any unauthorized or suspicious activities, detect potential security breaches, and maintain the integrity of the system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 29, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 22, 2012
    Quiz Created by
    Umojo
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.