The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
The 'Desktop Support Exam: Trivia Quiz!' assesses knowledge essential for desktop support roles, focusing on Windows 7 system management, hardware troubleshooting, and user interface customization. See moreIt's ideal for learners aiming to enhance their technical support skills.
Questions and Answers
2.
Where are user files stored locally in Windows 7, with a clean install?
C:\Profiles\%Username%\My Documents
C:\Windows\Profiles\%Username%\Personal
C:\Users\%Username%\Documents
C:\Documents and Settings\%Username%\My Documents
Correct Answer A. C:\Users\%Username%\Documents
Explanation User files are stored locally in Windows 7, with a clean install, in the "C:\Users\%Username%\Documents" directory.
Rate this question:
3.
Where in Windows 7 do you find the name of a computer?
Information Manager
Right click on My Computer then select Properties then Computer Name
Right click on My Computer, select explore
Control Panel, Taskbar and Start Menu
Correct Answer A. Right click on My Computer then select Properties then Computer Name
Explanation To find the name of a computer in Windows 7, you need to right-click on "My Computer" and then select "Properties." After that, you can find the computer name under the "Computer Name" tab.
Rate this question:
4.
How do you check the pagefile in Windows 7?
Control Panel > System > Advanced > Performance > Settings > Advanced
My Computer > Properties
Start Menu > Run > mem.exe
Check the registry
Correct Answer A. Control Panel > System > Advanced > Performance > Settings > Advanced
Explanation To check the pagefile in Windows 7, you need to go to the Control Panel, then navigate to System, Advanced, Performance, Settings, and finally Advanced. This path will lead you to the settings where you can check and manage the pagefile.
Rate this question:
5.
Switching to a higher screen resolution will:
Increase the size of the icons
Increase the amount of information you can see on the screen
Increase the grainy appearance of the picture
Increase the color depth
Correct Answer A. Increase the amount of information you can see on the screen
Explanation Switching to a higher screen resolution will increase the amount of information you can see on the screen. This is because higher resolutions have more pixels, allowing for more content to be displayed on the screen at once. With a higher resolution, you can fit more text, images, and other elements on the screen without them appearing too small or getting cut off. This can be particularly useful when working with large documents, spreadsheets, or when multitasking with multiple windows open.
Rate this question:
6.
You have just installed a CD-ROM drive in a PC and it does not respond. The first thing you should do is:
Check the BIOS settings
Replace the drive
Check the motherboard jumpers
Add the drive to the path statement
Correct Answer A. Check the BIOS settings
Explanation When a newly installed CD-ROM drive does not respond, the first thing to do is to check the BIOS settings. The BIOS (Basic Input/Output System) is responsible for initializing and configuring the hardware devices in a computer, including the CD-ROM drive. By checking the BIOS settings, you can ensure that the drive is properly recognized and enabled. If the drive is not properly configured in the BIOS, it may not function correctly. Therefore, checking the BIOS settings is the logical first step in troubleshooting the issue.
Rate this question:
7.
MAC OS X v10.4 can be installed on volumes formated as ____ or _____.
MAC OS Standard
NT File System (NTFS)
UNIX File System (UFS)
MAC OS Extended (Journaled)
File Allocation Table 32 bit (FAT32)
Correct Answer(s) A. UNIX File System (UFS) A. MAC OS Extended (Journaled)
Explanation MAC OS X v10.4 can be installed on volumes formatted as UNIX File System (UFS) or MAC OS Extended (Journaled). This means that the operating system can be installed on disks that are formatted using either of these file systems.
Rate this question:
8.
Which command will display the assigned IP address of a network adapter installed on a Windows XP/7 system?
Ipadapter/all
WinIP
Ipconfig
Configip
Correct Answer A. Ipconfig
Explanation Ipconfig is the correct command to display the assigned IP address of a network adapter installed on a Windows XP/7 system. It is a command-line utility that provides information about the IP configuration of all network adapters on the system. By running the "ipconfig" command, users can view the IP address, subnet mask, default gateway, and other network configuration details.
Rate this question:
9.
What does an assigned IP address of 169.254.0.12 indicate?
The computer is configured with a static IP address.
The computer is using a dial-up modem.
The computer is being used as an Internet shared connection host.
The computer is configured for DHCP and cannot connect to the DHCP server.
The computer has been configured to work with a Linux system.
Correct Answer A. The computer is configured for DHCP and cannot connect to the DHCP server.
Explanation An assigned IP address of 169.254.0.12 indicates that the computer is configured for DHCP and cannot connect to the DHCP server. The IP address 169.254.x.x is reserved for Automatic Private IP Addressing (APIPA) which is used when a computer is unable to obtain a valid IP address from a DHCP server. This usually happens when there is a problem with the network or the DHCP server is not available. In this case, the computer assigns itself a random IP address within the APIPA range to allow for local network communication.
Rate this question:
10.
Which two are examples of wireless encryption?
VPN
PPP
WEP
WPA
MAC
Correct Answer(s) A. WEP A. WPA
Explanation WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) are both examples of wireless encryption. WEP is an older encryption standard that was commonly used in early Wi-Fi networks but is now considered to be weak and easily compromised. WPA, on the other hand, is a more secure encryption protocol that was developed to replace WEP. It provides stronger encryption and better security features, making it a more reliable option for protecting wireless networks.
Rate this question:
11.
Which item is an example of a physical network address?
Explanation A physical network address is a unique identifier assigned to a network interface card (NIC) in a computer or device. It is used to identify and communicate with other devices on a local area network (LAN). An IP address is a logical network address that identifies a device on a network, while a MAC address is a physical address embedded in the NIC hardware. Workstation name, website address (www.proprofs.com), and email address ([email protected]) are not examples of physical network addresses.
Rate this question:
12.
Which are the default settings for a Windows XP/7 computer network adapter?
DHCP and configured as part of a workgroup
DHCP and configured as a part of a domain
Static IP address and configured as part of a workgroup
Static IP address and configured as part of a domain
There is no default settings for a Windows XP network adapter card
Correct Answer A. DHCP and configured as part of a workgroup
Explanation The default settings for a Windows XP/7 computer network adapter are DHCP and configured as part of a workgroup. DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network. Configuring the network adapter as part of a workgroup means that it is not connected to a domain, but rather a peer-to-peer network where all devices are equal. This allows for easy file sharing and collaboration among devices on the network.
Rate this question:
13.
What does the term "Map Network Drive" mean?
Divide the host HDD into memory locations
Create a shortcut to a network location
Trace the path to the local area network gateway
Send instructions to a user to access the remote local area network
A schematic drawing of all network adapter locations on the network system
Correct Answer A. Create a shortcut to a network location
Explanation The term "Map Network Drive" refers to the action of creating a shortcut to a network location. This allows the user to easily access and navigate to a specific folder or drive on a network, as if it were a local drive on their computer. By mapping a network drive, the user can conveniently access files and folders stored on a remote server or network storage device without having to manually enter the network path each time.
Rate this question:
14.
Which is the best example of a secure password?
Mysecretpassword
MySpecialPa$$w0rd
Xyz
Keep this place private
Password12345
Correct Answer A. MySpecialPa$$w0rd
Explanation The best example of a secure password is "MySpecialPa$$w0rd" because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password. Additionally, the length of the password is also important, and "MySpecialPa$$w0rd" is longer than the other options provided.
Rate this question:
15.
What icon is used to identify a shared folder?
An open hand palm up
Two folder icons side by side
Folder icon in green
Folder icon in red
You cannot tell if a folder is shared by looking at the icon
Correct Answer A. An open hand palm up
Explanation The open hand palm up icon is used to identify a shared folder. This icon represents the concept of sharing or giving, symbolizing that the folder is accessible and can be shared with others.
Rate this question:
16.
Which is used to provide a centralized authentication method from remote locations?
HTTPS
FTP
RADIUS
DNS
DHCP
Correct Answer A. RADIUS
Explanation RADIUS (Remote Authentication Dial-In User Service) is used to provide a centralized authentication method from remote locations. It is a networking protocol that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the network. RADIUS is commonly used in virtual private network (VPN) connections, wireless networks, and dial-up connections to ensure secure and authenticated access from remote locations.
Rate this question:
17.
What is the purpose of a DNS server?
To resolve MAC addresses to NetBIOS names
To resolve domain names to IP addresses
To resolve host names to NetBeui names
To resolve IP addresses to MAC address
Correct Answer A. To resolve domain names to IP addresses
Explanation A DNS server is used to resolve domain names to IP addresses. When a user enters a domain name (e.g., www.example.com) in their web browser, the DNS server translates that domain name into the corresponding IP address (e.g., 192.168.1.1) so that the user's device can connect to the correct server on the internet. This translation is necessary because domain names are easier for humans to remember and use, while IP addresses are required for devices to communicate with each other on a network.
Rate this question:
18.
What is the default workgroup name for a computer running Windows XP/7 workstation?
Microsoft
Home
Workgroup
Netgroup
Correct Answer A. Workgroup
Explanation The default workgroup name for a computer running Windows XP/7 workstation is "Workgroup". This is the default name given to the workgroup when setting up a Windows XP/7 computer. A workgroup is a collection of computers on a local network that share resources and files. By default, Windows XP/7 workstations are set to be a part of the "Workgroup" workgroup, unless the user manually changes it.
Rate this question:
19.
What is another name for a wireless security key?
Passphrase
Wirelessphrase
WAPphrase
Hexphrase
Correct Answer A. Passphrase
Explanation A wireless security key is commonly referred to as a passphrase. This term is used to describe the sequence of characters or words that are used to authenticate and secure a wireless network. A passphrase is typically longer and more complex than a traditional password, providing an added layer of security. It is used to encrypt and decrypt data transmitted over the wireless network, ensuring that only authorized users can access the network.
Rate this question:
20.
Which is an example of a MAC address?
192.168.000.001
2001:0:4137:9e50:1418:fe9b
00-1F-E2-57-DD-A6
00010001:01100110:11110000:01010000
Correct Answer A. 00-1F-E2-57-DD-A6
Explanation The MAC address is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It is a 48-bit address represented in hexadecimal format. The given answer, "00-1F-E2-57-DD-A6," follows this format and is a valid example of a MAC address. The other options provided are IP addresses (192.168.000.001 and 2001:0:4137:9e50:1418:fe9b) and binary representation of an IP address (00010001:01100110:11110000:01010000), which are not examples of MAC addresses.
Rate this question:
21.
Which type of connecter is commonly used for CAT5/6 cable?
RJ11
RJ45
BNC
SC
Correct Answer A. RJ45
Explanation RJ45 is the correct answer because it is the most commonly used connector for CAT5/6 cables. It is an 8-pin connector that is used for Ethernet networking. RJ11, on the other hand, is a 4-pin connector commonly used for telephone cables. BNC and SC connectors are used for different types of cables, such as coaxial and fiber optic cables, respectively.
Rate this question:
22.
What are the 4 network segments within our company?
PRD, CDE, LAB, WIFI
INTERNAL, EXTERNAL, WEB, CDE
PUBLIC, PRIVATE, GUEST, QUARANTINE
PRD, CDEPRD, NONPRD, MGMT
Correct Answer A. PRD, CDEPRD, NONPRD, MGMT
Explanation The correct answer is PRD, CDEPRD, NONPRD, MGMT. This answer suggests that there are four network segments within the company, namely PRD, CDEPRD, NONPRD, and MGMT. These segments likely represent different areas or departments within the company that have their own separate network configurations and access privileges.
Rate this question:
23.
MKH means ________ in mkh.prdcde.fw01.407etr.com.
Correct Answer Markham
Explanation The given correct answer for the question is "Markham" because the question asks for the meaning of "MKH" in the domain "mkh.prdcde.fw01.407etr.com". Based on the information provided, it can be inferred that "MKH" represents the abbreviation or acronym for "Markham".
Rate this question:
24.
WDB means ________ in wdb.prdcde.fw01.407etr.com.
Correct Answer Woodbridge
Explanation The acronym "WDB" stands for Woodbridge in the context of the domain name wdb.prdcde.fw01.407etr.com. This suggests that the domain name is related to or associated with Woodbridge in some way.
Rate this question:
25.
What are the 4 approvals required for a change?
Normal, Standard, Advanced, Emergency
MOP, UV/Product Owner, SA, CAB
Peer, Technician, Management, Support
MOP, Delivery, CAB, Support
Correct Answer A. MOP, UV/Product Owner, SA, CAB
Explanation The correct answer is MOP, UV/Product Owner, SA, CAB. MOP stands for Method of Procedure, which outlines the steps and processes for implementing a change. UV/Product Owner refers to the User Verification or Product Owner, who ensures that the change aligns with user requirements. SA stands for System Administrator, who is responsible for implementing and managing the change. CAB stands for Change Advisory Board, a group of stakeholders who review and approve changes to ensure they align with business objectives and minimize risks. These four approvals are crucial for a change to be implemented effectively and efficiently.
Rate this question:
26.
What is the UNC path for SD Tools on the PFPFLEW01 server?
Explanation The correct answer is \\PFPFLEW01\APPS\SD TOOLS. This is the UNC (Universal Naming Convention) path for SD Tools on the PFPFLEW01 server. UNC paths are used to access shared resources on a network, and they consist of the server name or IP address followed by the shared folder path. In this case, the server name is PFPFLEW01 and the shared folder path is APPS\SD TOOLS. The second option, \\407ETR.COM\APPS\SD TOOLS, is not the correct answer as it refers to a different server.
Rate this question:
27.
What is the Apple File Protocol path for SD Tools on the PFPFLEW01 server?
Correct Answer afp://pfpflew01/apps/sd tools
Explanation The correct answer is the Apple File Protocol (AFP) path for accessing SD Tools on the PFPFLEW01 server. The path is afp://pfpflew01/apps/sd tools. This means that to access the SD Tools application on the PFPFLEW01 server, one needs to use the AFP protocol and navigate to the "apps" folder where the SD Tools application is located.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.