Strata Practice Exam 50-75 (10/12/11)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tranman13195
T
Tranman13195
Community Contributor
Quizzes Created: 1 | Total Attempts: 101
Questions: 22 | Attempts: 101

SettingsSettingsSettings
Strata Practice Exam 50-75 (10/12/11) - Quiz


Questions 50-75


Questions and Answers
  • 1. 

    You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a complete solution. Choose of that apply.

    • A.

      Install the second hard disk drive on the primary IQE Controller. Designate one drive as Master and the other as Slave

    • B.

      Install the second hard drive disk on the secondary IDE controller ensuring that the first drive is on primary IDE controller. Designate both drives as Master

    • C.

      Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk is on the primary controller. Designate the second hard disk drive as Slave

    • D.

      Install both the hard disk drives as the Primary IDE Controller. Designate both drives as Secondary

    Correct Answer(s)
    A. Install the second hard disk drive on the primary IQE Controller. Designate one drive as Master and the other as Slave
    B. Install the second hard drive disk on the secondary IDE controller ensuring that the first drive is on primary IDE controller. Designate both drives as Master
    Explanation
    The correct answer is to install the second hard disk drive on the primary IQE Controller and designate one drive as Master and the other as Slave. This is because the primary IQE Controller is designed to handle multiple drives, with one drive being the Master and the other being the Slave. Additionally, installing the second hard drive disk on the secondary IDE controller and designating both drives as Master is also a correct solution. This is because the secondary IDE controller can also handle multiple drives, and designating both drives as Master allows them to be recognized and accessed by the computer.

    Rate this question:

  • 2. 

    Which of the following maximum resolution does the UXGA video technology supports?

    • A.

      2560x1600

    • B.

      1600x1200

    • C.

      2048x1536

    • D.

      1280x1024

    Correct Answer
    B. 1600x1200
    Explanation
    The correct answer is 1600x1200. UXGA video technology supports a maximum resolution of 1600x1200.

    Rate this question:

  • 3. 

    Which of the following sleep mode is the most power hungry mode?

    • A.

      S1

    • B.

      S2

    • C.

      S0

    • D.

      S3

    Correct Answer
    A. S1
    Explanation
    S1 sleep mode is the most power hungry mode because it is a fully powered state where the CPU and other components are still running, consuming a significant amount of power. In this mode, the system is idle but ready to respond quickly to any input or task, resulting in higher power consumption compared to the other sleep modes. S2, S0, and S3 sleep modes are all lower power states with varying levels of power consumption and responsiveness.

    Rate this question:

  • 4. 

    Which of the following switches of the XCOPY command copies the ownership and HTPS permissions on files while copying the files?

    • A.

      /p

    • B.

      /s

    • C.

      /t

    • D.

      /o

    Correct Answer
    D. /o
    Explanation
    The /o switch of the XCOPY command is used to copy the ownership and HTPS (Hidden, System, Archive, and Read-only) permissions on files while copying them. This switch ensures that the copied files retain the same ownership and permissions as the original files.

    Rate this question:

  • 5. 

    Fives Steps to troubleshoot Effectively Talk to the Customer* Continue to gather information* Elimate possibilities to find the problem* Test your results* Document your work* Correct Order Talk to the Customer Continue to gather information Elimante possibilites to find the problem Test your results Document your work

  • 6. 

    Which of the folloowing statements about a smart card are true? Each correct Answer represents a complete solution. Choose Two.

    • A.

      It is used to securely store public and private keys for log on, e-email signing and encryption, and file encryption

    • B.

      It is a device that works as interface between a computer and a netork

    • C.

      It is a device that routes data packets between computers in different networks.

    • D.

      It is a device that contains a microprocessor and permanent memory

    Correct Answer(s)
    A. It is used to securely store public and private keys for log on, e-email signing and encryption, and file encryption
    D. It is a device that contains a microprocessor and permanent memory
    Explanation
    A smart card is a device that contains a microprocessor and permanent memory, allowing it to store and process data. It is commonly used to securely store public and private keys for various purposes such as log on, e-mail signing and encryption, and file encryption. This makes it a reliable solution for authentication and security purposes.

    Rate this question:

  • 7. 

    Which of the following ports is also known as PS/2

    • A.

      6-Pin Mini-Din Connector

    • B.

      5-pin Din Connector

    • C.

      4-pin Mini-Din Connector

    • D.

      USB Connector

    Correct Answer
    A. 6-Pin Mini-Din Connector
    Explanation
    The 6-Pin Mini-Din Connector is also known as PS/2. This port is commonly used to connect keyboards and mice to computers. The PS/2 interface was widely used before the introduction of USB, and it uses a 6-pin Mini-Din Connector for connecting peripherals.

    Rate this question:

  • 8. 

    Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose Two.

    • A.

      USB supports hot plugging

    • B.

      You can connect up to 127 peripheral devices to a single USB port

    • C.

      You can connect up to 16 peripheral devices to a single USB Port

    • D.

      USB does not support Plug n Play installation

    Correct Answer(s)
    A. USB supports hot plugging
    B. You can connect up to 127 peripHeral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without the need to restart the computer. This is a convenient feature that allows for easy and quick device connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port. This high number of connections makes USB a versatile and efficient option for connecting multiple devices to a computer.

    Rate this question:

  • 9. 

    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

    • A.

      Man in the middle Attack

    • B.

      Denial of Service (DoS) attack

    • C.

      Buffer-overflow attack

    • D.

      Shoulder surfing attack

    Correct Answer
    D. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an individual trying to gain unauthorized access to sensitive information by visually observing the target's actions. The attacker may try to steal passwords, login credentials, or other confidential information by simply watching the victim's keystrokes or screen. This method is considered a form of social engineering, as it relies on human vulnerability rather than exploiting technical vulnerabilities in the system.

    Rate this question:

  • 10. 

    You are responsible for technical supports at a company. One of the empployees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

    • A.

      His operating system incompatible

    • B.

      A firewall is blocking him

    • C.

      His laptop is incompatible

    • D.

      MAC filtering is blocking him

    Correct Answer
    D. MAC filtering is blocking him
    Explanation
    The most likely problem is that MAC filtering is blocking him. MAC filtering is a security measure that allows or blocks devices from connecting to a network based on their MAC address. If the employee's laptop is not added to the allowed list of MAC addresses, it would be blocked from connecting to the company wireless network even if the password/passkey is valid.

    Rate this question:

  • 11. 

    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

    • A.

      Session Intiation Protocol

    • B.

      Streaming Media

    • C.

      HTTP Streaming

    • D.

      Slipstreaming

    Correct Answer
    B. Streaming Media
    Explanation
    Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous delivery of audio and video content over the internet, allowing users to access and enjoy multimedia content in real-time without the need for complete downloading. Unlike other options listed, such as Session Initiation Protocol (SIP), HTTP Streaming, and Slipstreaming, streaming media specifically addresses the described functionality of starting playback before the download is finished.

    Rate this question:

  • 12. 

    Which of the following refers to the data supported by a network connection or interface?

    • A.

      Bandwidth

    • B.

      Preboot Execution Enviroment

    • C.

      Branding

    • D.

      Spam

    Correct Answer
    A. Bandwidth
    Explanation
    Bandwidth refers to the data supported by a network connection or interface. It is the maximum amount of data that can be transmitted over a network connection in a given amount of time. Bandwidth is typically measured in bits per second (bps) and determines the speed and capacity of a network connection. It is an important factor in determining the efficiency and performance of a network.

    Rate this question:

  • 13. 

    Which of the following are serial interfaces? Each correct answer represents a complete solution. Choose all that apply.

    • A.

      EPP

    • B.

      USB

    • C.

      Firewire

    • D.

      IEEE 1284

    Correct Answer(s)
    B. USB
    C. Firewire
    Explanation
    USB and Firewire are both examples of serial interfaces. USB (Universal Serial Bus) is a common interface used for connecting various devices to a computer, such as keyboards, mice, and external storage devices. Firewire (also known as IEEE 1394) is another serial interface that is commonly used for connecting audio/video equipment and external hard drives to a computer. EPP (Enhanced Parallel Port) and IEEE 1284 are examples of parallel interfaces, not serial interfaces.

    Rate this question:

  • 14. 

    Which of the following devices has its own BIOS?

    • A.

      Hard disk drive

    • B.

      Sound Card

    • C.

      Network Interface Card

    • D.

      Video Adapter

    Correct Answer
    D. Video Adapter
    Explanation
    A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that initializes the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. The BIOS of a video adapter contains settings and options that can be modified to optimize the graphics card's performance.

    Rate this question:

  • 15. 

    Which of the following are dual core processors? Each correct answer represents a complete solution. Choose Two

    • A.

      AMD Athlon(TM) 64 X2

    • B.

      Intel Pentium 4

    • C.

      Intel(r)Pentium(r)Processor Extreme Edition

    • D.

      AMD Athlon (tm)

    Correct Answer(s)
    A. AMD Athlon(TM) 64 X2
    C. Intel(r)Pentium(r)Processor Extreme Edition
    Explanation
    The AMD Athlon(TM) 64 X2 and Intel(r) Pentium(r) Processor Extreme Edition are both dual core processors. The AMD Athlon(TM) 64 X2 is a dual core processor from AMD, while the Intel(r) Pentium(r) Processor Extreme Edition is a dual core processor from Intel. Both processors have two cores, allowing them to perform tasks more efficiently and handle multiple tasks simultaneously. The Intel Pentium 4 and AMD Athlon (tm) are not dual core processors, as they only have a single core.

    Rate this question:

  • 16. 

    Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?

    • A.

      /q

    • B.

      /o

    • C.

      /s

    • D.

      /e

    Correct Answer
    D. /e
    Explanation
    The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.

    Rate this question:

  • 17. 

    Which of the following provides authentication, encryption and data integrity for wireless devices?

    • A.

      PAP

    • B.

      WAN

    • C.

      WAP

    • D.

      WTLS

    Correct Answer
    D. WTLS
    Explanation
    WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. WTLS is a security protocol specifically designed for wireless communication, ensuring secure transmission of data over wireless networks. It offers authentication to verify the identities of the communicating parties, encryption to protect the confidentiality of the data being transmitted, and data integrity to ensure that the data has not been tampered with during transmission. WTLS is commonly used in mobile devices and wireless applications to ensure secure communication and protect sensitive information.

    Rate this question:

  • 18. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • A.

      Bluetooth

    • B.

      802.11

    • C.

      802.11b

    • D.

      Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported technology that allows for easy and seamless connections between devices. It has a decent range and offers good data transfer speeds, making it suitable for connecting peripherals like printers and mice to laptops. Additionally, Bluetooth is energy-efficient, which helps conserve battery life on both the laptop and the connected devices.

    Rate this question:

  • 19. 

    What is the maximum resolution that the WUXGA video technology supports?

    • A.

      2048 x 1536

    • B.

      1920 x 1200

    • C.

      3840 x 2400

    • D.

      1600 x 1200

    Correct Answer
    B. 1920 x 1200
    Explanation
    WUXGA video technology supports a maximum resolution of 1920 x 1200. This resolution refers to the number of pixels that can be displayed horizontally and vertically on a screen. WUXGA stands for Wide Ultra Extended Graphics Array, and it is commonly used in computer monitors and projectors. This resolution provides a high level of detail and clarity, making it suitable for tasks that require precise visuals, such as graphic design or video editing.

    Rate this question:

  • 20. 

    What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.

    • A.

      Data integrity

    • B.

      Encryption

    • C.

      Bandwidth

    • D.

      Authentication

    Correct Answer(s)
    A. Data integrity
    B. Encryption
    D. Authentication
    Explanation
    Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data remains intact and has not been tampered with during transmission. Encryption ensures that the data is encrypted and can only be decrypted by authorized parties, protecting it from unauthorized access. Authentication verifies the identity of the communicating parties, ensuring that only trusted devices can access the network. Bandwidth, on the other hand, is not provided by WTLS and is not relevant to its security features.

    Rate this question:

  • 21. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • A.

      Trojan Horse

    • B.

      Honeypot

    • C.

      Spyware

    • D.

      Adware

    Correct Answer
    D. Adware
    Explanation
    Adware is a type of software that displays advertisements, regardless of whether the user has given consent or not. Unlike other types of software mentioned in the question, such as Trojan Horse, Honeypot, and Spyware, which have different purposes, adware specifically focuses on delivering advertisements to users. This can be in the form of pop-up ads, banners, or even redirecting web pages. Adware is often bundled with other software and installed without the user's knowledge or explicit consent, making it an intrusive and unwanted form of software.

    Rate this question:

  • 22. 

    Which of the following protocols transmits error messages and network statistics?

    • A.

      ICMP

    • B.

      DHCP

    • C.

      TCP

    • D.

      NNTP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. ICMP is used by network devices to send error messages, such as "destination unreachable" or "time exceeded," back to the source IP address. It is also used for network diagnostics and troubleshooting, providing information about network connectivity, latency, and other statistics. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. TCP (Transmission Control Protocol) is responsible for establishing reliable connections between devices. NNTP (Network News Transfer Protocol) is used for distributing, querying, and retrieving news articles.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    Tranman13195
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.