Strata Practice Exam 1, 10-18-11 {part Two}

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Pedd
P
Pedd
Community Contributor
Quizzes Created: 1 | Total Attempts: 126
Questions: 22 | Attempts: 126

SettingsSettingsSettings
Strata Practice Exam 1, 10-18-11 {part Two} - Quiz

3rd part


Questions and Answers
  • 1. 

    77. which of the following power sources are used to power a laptop?

    • A.

      Solar panel

    • B.

      AC power

    • C.

      Battery

    • D.

      Docking station

    Correct Answer(s)
    B. AC power
    C. Battery
    Explanation
    AC power and battery are the correct answers because laptops can be powered either by plugging them into an electrical outlet using AC power or by using the laptop's built-in battery. Solar panels and docking stations are not typically used as primary power sources for laptops.

    Rate this question:

  • 2. 

    Mark works as a network administrator for netTech inc the network has 150 windows 2000 pro client computers and four win 2000 servers. all the client computers are able to connect to the internet. mark is concerned about malware infecting the client computers through the internet. what will mark do to protect the client computers from malware? wach correct answer represents a complete solution. choose two

    • A.

      Educate users of the client computers about the problems arisin due to malware

    • B.

      Educate users of the client computers to avoid malware

    • C.

      Prevent users of the client computers from executing any programs

    • D.

      Assign read only permission to the users for accessing the hard disk drivers of the client computers

    Correct Answer(s)
    A. Educate users of the client computers about the problems arisin due to malware
    B. Educate users of the client computers to avoid malware
    Explanation
    Mark should educate the users of the client computers about the problems arising due to malware and how to avoid it. By providing awareness and knowledge about malware, users can become more cautious and take necessary precautions while browsing the internet. This will help in preventing malware from infecting the client computers and ensure their protection.

    Rate this question:

  • 3. 

    You have a customer who wants to install windows XP pro on her computer what is the minimum amount of RAM she should use for this to work?

    • A.

      128 megabytes

    • B.

      64 megabytes

    • C.

      2 gigabytes

    • D.

      1 gigabyte

    Correct Answer
    B. 64 megabytes
    Explanation
    The minimum amount of RAM required to install Windows XP Pro is 64 megabytes. This means that the customer's computer should have at least 64 megabytes of RAM in order for the operating system to function properly.

    Rate this question:

  • 4. 

    You are selecting RAM for a new PC you are very concerned about making sure errors are handled. which of the following types of RAM should you select?

    • A.

      RamBus

    • B.

      Non party RAM

    • C.

      ECC RAM

    • D.

      Logic parity RAM

    Correct Answer
    C. ECC RAM
    Explanation
    To ensure errors are handled efficiently, it is important to select ECC RAM (Error Correcting Code RAM). ECC RAM has an additional memory chip that checks for and corrects errors that may occur during data storage or transmission. This type of RAM is commonly used in critical systems such as servers, workstations, and data centers, where data integrity is crucial. ECC RAM provides an extra layer of protection against potential errors, making it the ideal choice for someone concerned about error handling in their new PC.

    Rate this question:

  • 5. 

    What is the maximum data transmission speed of IEEE 802.11b wireless networks?

    • A.

      54 mbps

    • B.

      600 mbps

    • C.

      600 gbps

    • D.

      11 mbps

    Correct Answer
    D. 11 mbps
    Explanation
    The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard was introduced in 1999 and operates in the 2.4 GHz frequency range. It was one of the earliest Wi-Fi standards and provided a significant improvement over its predecessor, IEEE 802.11a, in terms of compatibility and cost-effectiveness. However, compared to more modern Wi-Fi standards such as 802.11ac or 802.11ax, the data transmission speed of 11 Mbps is relatively slow.

    Rate this question:

  • 6. 

    Which of the following types of parental controls is used to limit acces to the internet contents?

    • A.

      Content filter control

    • B.

      Bandwidth control

    • C.

      Usage management tool

    • D.

      Monitoring control

    Correct Answer
    A. Content filter control
    Explanation
    Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, apps, or types of content that they deem inappropriate or unsuitable for their children. This control helps in creating a safe and age-appropriate online environment for children by restricting their access to potentially harmful or explicit content on the internet.

    Rate this question:

  • 7. 

    Andrew has a personal computer. one morning he starts his computer and finds the following error message "cmos checksum failure" what are the most likely causes of this error? each correct answer represents a complete solution choose 2

    • A.

      BIOS has become outdated

    • B.

      The CMOS battery has failed

    • C.

      The CMOS chip has failed

    • D.

      Software stored in the CMOS battery is infected by a virus

    Correct Answer(s)
    B. The CMOS battery has failed
    C. The CMOS chip has failed
    Explanation
    The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings on Andrew's computer. The most likely causes of this error are the failure of the CMOS battery and the failure of the CMOS chip. The CMOS battery is responsible for maintaining the CMOS settings when the computer is powered off, and if it fails, the settings may be lost or corrupted. Similarly, if the CMOS chip itself fails, it can result in the checksum failure error.

    Rate this question:

  • 8. 

    What are the benefits of using Universal Serial Bus 2.0  (USB) over legacy communication ports such as RS-232 and parellel ports? each correct answer represents a complete solution choose all that apply

    • A.

      Easy configuration of hardware devices

    • B.

      Expansion

    • C.

      Security

    • D.

      Speed

    Correct Answer(s)
    A. Easy configuration of hardware devices
    B. Expansion
    D. Speed
    Explanation
    The benefits of using Universal Serial Bus 2.0 (USB) over legacy communication ports such as RS-232 and parallel ports include easy configuration of hardware devices, expansion, and speed. USB allows for plug-and-play functionality, making it easier to connect and configure hardware devices without the need for manual configuration. It also supports the connection of multiple devices through hubs, allowing for easy expansion of the system. Additionally, USB 2.0 offers faster data transfer speeds compared to legacy ports, enabling quicker communication between devices.

    Rate this question:

  • 9. 

    Which of the following sleep modes is also known as hibernation in windows operating systems?

    • A.

      S3

    • B.

      S2

    • C.

      S4

    • D.

      S1

    Correct Answer
    C. S4
    Explanation
    S4 is the correct answer because it refers to the sleep mode known as hibernation in Windows operating systems. In this mode, the computer saves all the open documents and running programs to the hard drive and then shuts down completely. When the computer is turned back on, it restores the previous state, allowing the user to resume their work from where they left off. This sleep mode is particularly useful for conserving energy while still being able to quickly resume work.

    Rate this question:

  • 10. 

    Which of the following can occur if the power cable runs along with the the computer network cable?

    • A.

      EMI

    • B.

      ESD

    • C.

      Broadcast storm

    • D.

      Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI is the disturbance caused by electromagnetic radiation from an external source, such as the power cable, that affects the performance of the network cable. This interference can lead to signal degradation, data loss, and communication errors in the network.

    Rate this question:

  • 11. 

    which of the following are types of social engineering attacks? each correct answer represents a complete solution choose two

    • A.

      An unauthorized person gains entrance to the building where the company is database server resides and accesses the server by pretending to be an employee

    • B.

      On on authorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts

    • C.

      An unauthorized person call the user pretends to be a system administrator in order to get the person's password

    • D.

      An unauthorized person modifies packet headers by using someone else's IP address to his identity

    Correct Answer(s)
    A. An unauthorized person gains entrance to the building where the company is database server resides and accesses the server by pretending to be an employee
    C. An unauthorized person call the user pretends to be a system administrator in order to get the person's password
    Explanation
    The given correct answer states that two types of social engineering attacks are:
    1) An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee. This is an example of a physical social engineering attack, where the attacker manipulates their physical presence to gain unauthorized access.
    2) An unauthorized person calls the user and pretends to be a system administrator in order to get the person's password. This is an example of a phishing attack, where the attacker manipulates the user through impersonation to obtain sensitive information.

    Rate this question:

  • 12. 

    Your customer uses windows XP machine has become unstable due to some unknown cause you want to put the computer into a working state again what is the best way to do this?

    • A.

      Simply put the Windows recovery CD in and the recovery process will start

    • B.

      Reinstall Windows

    • C.

      Use the Windows cover a console with the Windows recovery CD to put the system back in a working state

    • D.

      Simply uninstall any new software

    Correct Answer
    C. Use the Windows cover a console with the Windows recovery CD to put the system back in a working state
    Explanation
    The best way to put the Windows XP machine back into a working state is to use the Windows recovery CD and access the Windows recovery console. This console allows the user to perform various repair and troubleshooting tasks to fix any issues causing instability in the system. Reinstalling Windows or uninstalling new software may not address the root cause of the problem, whereas using the recovery console provides a more comprehensive solution.

    Rate this question:

  • 13. 

    Which of the following terms are first to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality viability or convenience?

    • A.

      Spyware

    • B.

      Shareware

    • C.

      Freeware

    • D.

      Adware

    Correct Answer
    B. Shareware
    Explanation
    Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, viability, or convenience. This means that users can try the software before deciding to purchase it, but there may be limitations or restrictions in place.

    Rate this question:

  • 14. 

    Which of the following buses has a maximum data transfer rate of 2400 in MBPS?

    • A.

      FireWire 800

    • B.

      ESATA

    • C.

      USB 1.1

    • D.

      USB 2.0

    Correct Answer
    B. ESATA
    Explanation
    eSATA has a maximum data transfer rate of 2400 MBPS. FireWire 800 has a maximum data transfer rate of 800 MBPS, USB 1.1 has a maximum data transfer rate of 12 MBPS, and USB 2.0 has a maximum data transfer rate of 480 MBPS. Therefore, eSATA is the correct answer as it has the highest data transfer rate among the given options.

    Rate this question:

  • 15. 

    Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

    • A.

      Unicast

    • B.

      Multicast

    • C.

      Loopback

    • D.

      Anycast

    Correct Answer
    D. Anycast
    Explanation
    Anycast is the correct answer because it refers to a single IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that has that address assigned. This allows for efficient routing and load balancing, as multiple interfaces can share the same anycast address and handle incoming traffic.

    Rate this question:

  • 16. 

    Which of the following can be installed in the AGP slot?

    • A.

      Video card

    • B.

      RAM

    • C.

      Microprocessor

    • D.

      Modem card

    Correct Answer
    A. Video card
    Explanation
    The AGP slot is specifically designed for installing a video card. It is not compatible with RAM, microprocessors, or modem cards. Therefore, the correct answer is a video card.

    Rate this question:

  • 17. 

    At one voltage does a USB host supply power to a USB bus?

    • A.

      15 Volts

    • B.

      5 Volts

    • C.

      50 Volts

    • D.

      3 Volts

    Correct Answer
    B. 5 Volts
    Explanation
    A USB host typically supplies power to a USB bus at a voltage of 5 Volts. This voltage is standardized and is used to power various USB devices such as keyboards, mice, and external hard drives. The 5V power supply is sufficient for most USB devices and ensures compatibility and safety. Higher voltages like 15 Volts or 50 Volts are not commonly used for USB power supply as they may cause damage to the connected devices.

    Rate this question:

  • 18. 

    Which of the following enables third-party developers to create capabilities to extend an application?

    • A.

      Plug in

    • B.

      Virtual machine

    • C.

      Hot fix

    • D.

      JavaScript

    Correct Answer
    A. Plug in
    Explanation
    A plug-in is a software component that allows third-party developers to add new features or functionalities to an existing application. By creating plug-ins, developers can extend the capabilities of the application without modifying its core code. This enables customization and flexibility, as different users can choose which plug-ins to install based on their specific needs.

    Rate this question:

  • 19. 

    Which of the following statements about multi-or authentication is true?

    • A.

      He uses a key distribution center( KDC )

    • B.

      It protects a computer from malicious software such as worms

    • C.

      It involves two or more methods as part of the authentication process

    • D.

      It is a process in which a client process and a server are required to prove their identities to each other before performing any application function

    Correct Answer
    C. It involves two or more methods as part of the authentication process
    Explanation
    The statement "it involves two or more methods as part of the authentication process" is true. Multi-factor authentication (MFA) is a security measure that requires users to provide two or more different types of authentication factors to verify their identity. These factors can include something the user knows (such as a password), something the user has (such as a fingerprint or smart card), or something the user is (such as biometric data). By requiring multiple factors, MFA adds an extra layer of security and makes it more difficult for unauthorized individuals to access sensitive information or systems.

    Rate this question:

  • 20. 

    What is the difference between the USB 2.0 and IEEE 1394 bus standards?

    • A.

      IEEE 1394 is faster than USB 2.0

    • B.

      IEEE 1394 supports hot swapping

    • C.

      IEEE 1394 is slower than USB 2.0

    • D.

      USB 2.0 supports plug-and-play feature

    Correct Answer
    C. IEEE 1394 is slower than USB 2.0
    Explanation
    The given answer states that IEEE 1394 is slower than USB 2.0. This is the correct answer because USB 2.0 has a higher data transfer rate compared to IEEE 1394. USB 2.0 has a maximum transfer rate of 480 Mbps, while IEEE 1394, also known as FireWire, has a maximum transfer rate of 400 Mbps. Therefore, USB 2.0 is faster than IEEE 1394.

    Rate this question:

  • 21. 

    Which of the following devices provides input by analyzing printed text handwriting or an object?

    • A.

      WebCam

    • B.

      Image scanner

    • C.

      Packet analyzer

    • D.

      BD ROM drive

    Correct Answer
    B. Image scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, which can then be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document archiving, data entry, and image editing. Unlike a webcam, which captures live video footage, an image scanner focuses specifically on capturing and digitizing physical documents or objects. Therefore, an image scanner is the correct answer to the question.

    Rate this question:

  • 22. 

    Which of the following substances are restricted under restriction of hazardous substances (RoHS)? Each correct answer represents a complete solution choose all that apply.

    • A.

      Mercury (HG)

    • B.

      Lead (pb)

    • C.

      Iron (Fe)

    • D.

      Cadmium (Cd)

    Correct Answer(s)
    A. Mercury (HG)
    B. Lead (pb)
    D. Cadmium (Cd)
    Explanation
    Mercury (HG), lead (pb), and cadmium (Cd) are restricted under the Restriction of Hazardous Substances (RoHS). These substances are known to be hazardous to human health and the environment. The RoHS directive aims to limit the use of these substances in electrical and electronic equipment to reduce their negative impact. Iron (Fe) is not restricted under RoHS as it is not considered a hazardous substance in this context.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 18, 2011
    Quiz Created by
    Pedd
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.