Trivia Quiz On CompTIA A+ Essentials For Windows XP!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Grabate
G
Grabate
Community Contributor
Quizzes Created: 3 | Total Attempts: 6,538
Questions: 93 | Attempts: 1,790

SettingsSettingsSettings
Trivia Quiz On CompTIA A+ Essentials For Windows XP! - Quiz

This quiz has been made to see whether you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. Most of the questions are harder than you will find in the actual test, so don't fret if you get a bad mark. Unless stated otherwise, all OS questions are based around Windows XP. So, let's try out this challenging quiz. All the best


Questions and Answers
  • 1. 

    Which ipconfig command retrieves a new IP address from the DHCP server?

    • A.

      /retrieve

    • B.

      /newIP

    • C.

      /renew

    • D.

      /Get

    • E.

      /next

    Correct Answer
    C. /renew
    Explanation
    The correct answer is "/renew". This command is used in the ipconfig utility to request a new IP address from the DHCP (Dynamic Host Configuration Protocol) server. When the "/renew" command is executed, the computer sends a request to the DHCP server to release the current IP address and assign a new one. This is useful in situations where the IP address lease has expired or when a different IP address is needed for troubleshooting or network configuration purposes.

    Rate this question:

  • 2. 

    NTBOOTDD.SYS is needed to boot to Windows.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    NTBOOTDD.SYS is only needed if you use SCSI

    Rate this question:

  • 3. 

    Which of the following is not an example social engineering?

    • A.

      Masquerading

    • B.

      Piggybacking

    • C.

      Phishing

    • D.

      Brute Force Attack

    • E.

      Shoulder Surfing

    Correct Answer
    D. Brute Force Attack
    Explanation
    A brute force attack is not an example of social engineering. Social engineering involves manipulating individuals to gain unauthorized access to sensitive information or systems. Masquerading, piggybacking, phishing, and shoulder surfing are all examples of social engineering techniques. However, a brute force attack is a method of trying all possible combinations or passwords until the correct one is found, without any manipulation or deception of individuals involved.

    Rate this question:

  • 4. 

    Which of the following is a “good” password?

    • A.

      Czechoslovakia

    • B.

      Pr0pr0f$

    • C.

      12345

    • D.

      JohnSmith

    • E.

      C@T

    Correct Answer
    B. Pr0pr0f$
    Explanation
    Pr0pr0f$ has a mixture of letters numbers and symbols and is at least 8 characters long. 12345 should only be used for luggage combinations and to invade Druidia.

    Rate this question:

  • 5. 

    Which of the following is used to re-install or upgrade Windows 2000 on a computer that already has Windows 95, 98, ME or NT installed.

    • A.

      WINNT32.exe

    • B.

      WINNT.exe

    • C.

      SETUP.exe

    • D.

      Upgrade.exe

    • E.

      None of the above

    Correct Answer
    E. None of the above
    Explanation
    Sorry this is a trick question, you can’t upgrade to Windows 2000 from Me. WINNT32.EXE is used to re-install or upgrade Windows 2000 on a computer that already has Windows 95, 98, or NT installed. Otherwise use WINNT. The exam won't ask trick questions but be sure to read each question carefully

    Rate this question:

  • 6. 

    Which of the following is not true?

    • A.

      HKKEY_CURRENT_CONFIG: Contains information about active hardware configuration.

    • B.

      HKEY_USERS: Used to build logon screen and ID users

    • C.

      HKEY_CURRENT_USER: Contains information about currently logged on user

    • D.

      HKEY_CLASSES_ROOT: Contains information about user privileges

    • E.

      HKEY-LOCAL_MACHINE: Contains all configuration data about the computer

    Correct Answer
    D. HKEY_CLASSES_ROOT: Contains information about user privileges
    Explanation
    HKEY_CLASSES_ROOT contains information about software and the way its configured.

    Rate this question:

  • 7. 

    Which Hives does HKEY-LOCAL_MACHINE use (Select 4)

    • A.

      SAM hive

    • B.

      Security hive

    • C.

      Default hive

    • D.

      Software hive

    • E.

      System hive

    Correct Answer(s)
    A. SAM hive
    B. Security hive
    D. Software hive
    E. System hive
    Explanation
    HKEY-LOCAL_MACHINE is a registry hive in Windows operating system that stores configuration settings and information about the hardware and software installed on the computer. The SAM hive contains the Security Accounts Manager, which stores user account information and security policies. The Security hive contains security settings and permissions. The Software hive stores information about installed software and settings. The System hive contains hardware and system configuration information. Therefore, HKEY-LOCAL_MACHINE uses the SAM hive, Security hive, Software hive, and System hive.

    Rate this question:

  • 8. 

    Which of the following backup statements is true?

    • A.

      Copy only backs up archived files

    • B.

      Differential marks files as backed up

    • C.

      Incremental backs up everything, regardless of archive setting

    • D.

      Full backup is the fastest due to little overhead

    • E.

      None of the above

    Correct Answer
    E. None of the above
    Explanation
    None of the statements provided in the options is true. Copy backup can back up any type of file, not just archived files. Differential backup only marks files as backed up without actually backing them up. Incremental backup only backs up files that have changed since the last backup, regardless of their archive setting. Full backup involves backing up all files and is typically slower due to the larger amount of data being processed. Therefore, none of the statements accurately describe the characteristics of the different backup types.

    Rate this question:

  • 9. 

    Which of the following is not a Windows keyboard shortcut?

    • A.

      Windows Key, Q

    • B.

      Windows Key, R

    • C.

      Windows Key, E

    • D.

      Windows Key, F

    • E.

      Windows Key, L

    Correct Answer
    A. Windows Key, Q
    Explanation
    Windows Key – R launches Run, Windows Key – E launches Explorer, Windows Key – F launches Find, Windows Key – L locks computer.

    Rate this question:

  • 10. 

    A client is complaining that when they click the shut down button on their XP Start menu, the computer goes into hibernation instead of shutting down. Where should they go to change the shut down button settings?

    • A.

      Control panel > Power options > Advanced Tab

    • B.

      Control panel > Power options > Hibernate Tab

    • C.

      Control panel > Power options > Power Schemes

    • D.

      Control panel > Power options > UPS Tab

    • E.

      Control panel > Power options > Settings Tab

    Correct Answer
    A. Control panel > Power options > Advanced Tab
    Explanation
    To change the shut down button settings, the client should go to Control Panel, then select Power Options. From there, they should navigate to the Advanced tab.

    Rate this question:

  • 11. 

    You are manually configuring the virtual memory on a client’s machine to 1536mb. After making the change you are altering another setting when you get an message saying that virtual memory is low. You go back and find that all your changes have been erased. Why is this? (Choose 2)

    • A.

      You did not use Microsoft’s recommended amount

    • B.

      You did not restart the computer

    • C.

      The computer has more than enough RAM and Windows turned off virtual memory

    • D.

      You did not click the set button

    • E.

      The hard drive doesn’t support virtual memory

    Correct Answer(s)
    B. You did not restart the computer
    D. You did not click the set button
    Explanation
    This has caught me out a few times as it is easy to miss the set button and just click OK which does not save the settings. The changes won’t be applied until after you have restated the computer.

    Rate this question:

  • 12. 

    Instead of electricity, your power outlet generates smoke and flames. What class fire Extinguisher should you use?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    • E.

      Class E

    Correct Answer
    C. Class C
    Explanation
    As its contents is non conductive, a class C fire extinguisher should be used.

    Rate this question:

  • 13. 

    A client rings up with a problem on their XP machine that you suspect is caused by an insufficient amount of RAM. You tell them to open the system applet in control panel to find out how much RAM they have but they say that the system icon isn’t the control panel. Why is this?

    • A.

      System applet is a Vista feature

    • B.

      System applet comes with XP service pack two

    • C.

      The client is in category view

    • D.

      The client is borderline retarded

    • E.

      System applet doesn't come with their version of XP

    Correct Answer
    C. The client is in category view
    Explanation
    Category view is turned on by default and hides most of the Classic view icons. This can be fixed by clicking "switch to classic view"

    Rate this question:

  • 14. 

    What does Event Viewer do?

    • A.

      Shows all computer activity

    • B.

      Shows all events

    • C.

      Shows all installed/uninstalled programs

    • D.

      Shows all blue screen errors

    • E.

      Shows all reasons for shutting down

    Correct Answer
    B. Shows all events
    Explanation
    Event Viewer is a tool in Windows operating systems that allows users to view and analyze detailed information about various events that occur on their computer. These events can include system errors, warnings, information messages, and more. By providing a comprehensive log of events, Event Viewer helps users troubleshoot issues, monitor system performance, and track changes made to the system. It does not specifically show all computer activity, installed/uninstalled programs, blue screen errors, or reasons for shutting down, but rather focuses on capturing and displaying all events that occur on the computer.

    Rate this question:

  • 15. 

    Which of the following is not a registry file?

    • A.

      System

    • B.

      Software

    • C.

      Settings

    • D.

      SAM

    • E.

      Security

    Correct Answer
    C. Settings
    Explanation
    System, Software, SAM, Security and Default are registry files.

    Rate this question:

  • 16. 

    A client is having problems connecting to the DHCP server. What if the first thing you should do?

    • A.

      Run diagnostic software

    • B.

      Make sure all plugs are correctly inserted

    • C.

      Run tests on DHCP server

    • D.

      See if other users are having the same problem

    • E.

      Panic

    Correct Answer
    D. See if other users are having the same problem
    Explanation
    The first thing you should do when a client is having problems connecting to the DHCP server is to see if other users are having the same problem. This helps determine if the issue is specific to the client or if it is a widespread problem affecting multiple users. By checking if other users are experiencing the same problem, you can narrow down the scope of the issue and determine if it is a client-side or server-side problem.

    Rate this question:

  • 17. 

    You are working on a client’s computer and the computer flashes a blue screen and reboots. Where would the error that was shown be held?

    • A.

      Event Viewer

    • B.

      Errors.exe

    • C.

      Mini.dmp

    • D.

      Recovery Console

    • E.

      Task manager

    Correct Answer
    C. Mini.dmp
    Explanation
    Minidump shows stop errors (Blue Screen of Death)

    Rate this question:

  • 18. 

    You are setting up an IP address on a clients computer, which of the following is usable.

    • A.

      169.254.52.5

    • B.

      192.168.50.256

    • C.

      64.32.5.1

    • D.

      127.0.0.1

    • E.

      246.220.56.92

    Correct Answer
    C. 64.32.5.1
    Explanation
    169.254.x.x is used by APIPA
    Each octet only goes up to 255
    127.0.0.1 is reserved for loopback
    240.0.0.0 to 255.255.255.255 are reserved

    Rate this question:

  • 19. 

    You are setting up XP on a family computer. The client wants their children to each have their own accounts but only wants them to use software he has installed. What account would you recommend for them?

    • A.

      Administrator

    • B.

      Power User

    • C.

      Standard User

    • D.

      Restricted User

    • E.

      Guest

    Correct Answer
    D. Restricted User
    Explanation
    A restricted user account would be the most appropriate recommendation for the children on the family computer. This account type provides limited access and permissions, allowing them to only use the software that has been installed by the client. This ensures that the children cannot make any unauthorized changes or install additional software on the computer, maintaining control and security over the system.

    Rate this question:

  • 20. 

    A client is complaining that their dial up connection has suddenly stoped working. It reaches the end of the handshake a user name/ password box pops up. It refuses to connect even with correct user name and password, the client is the only person who uses the comptuer and you have ruled out a hacking. What is most likely explanation?

    • A.

      The user is typing something wrong

    • B.

      A hacker has hijacked their account

    • C.

      Thier account has been disconnected

    • D.

      They have a ghost login

    • E.

      The modem is faulty

    Correct Answer
    D. They have a ghost login
    Explanation
    The most likely explanation for the issue is that the client has a ghost login. This means that there is another user account or session that is still active on the computer, causing a conflict with the client's login attempt. This can prevent the dial-up connection from working properly, even with the correct username and password.

    Rate this question:

  • 21. 

    Which statement is false?

    • A.

      The Kernal is the part of the operating system that loads first

    • B.

      The Kernal is small because it stays in memory

    • C.

      Kernal is also known as Kernel

    • D.

      The Kernal provides basic services

    • E.

      The Kernal is not used by NT operating systems

    Correct Answer
    E. The Kernal is not used by NT operating systems
    Explanation
    The given statement "The Kernal is not used by NT operating systems" is false. The kernel is a crucial component of an operating system, including NT operating systems. The kernel is responsible for managing system resources, providing basic services, and serving as a bridge between software and hardware. Therefore, the kernel is indeed used by NT operating systems.

    Rate this question:

  • 22. 

    You are right clicking on my computer and see Map Network Dive as a selection, what does this do?

    • A.

      Creates a list of the hard drives in the machines networked to a computer

    • B.

      Allows other computers on a network to access you hard drive

    • C.

      Creates a link to another hard drive which you can access

    • D.

      Allows others on network to view your hard drive using the fastest route possible

    • E.

      Tests your network connection, maps the fastest route to various locations

    Correct Answer
    C. Creates a link to another hard drive which you can access
    Explanation
    This answer is correct because when you select "Map Network Drive" in the right-click menu of "My Computer", it allows you to create a link or connection to another hard drive on the network. This enables you to access and view the files and folders stored on that particular hard drive as if it were a part of your own computer's file system.

    Rate this question:

  • 23. 

    Which of the following was not included in the Windows XP Service Pack 2? (Choose 2)

    • A.

      Compatibility Mode

    • B.

      Internet Explorer ad blocker

    • C.

      Windows Security Centre

    • D.

      Docx support

    • E.

      WPA compatibility

    Correct Answer(s)
    A. Compatibility Mode
    D. Docx support
    Explanation
    The Windows XP Service Pack 2 included several updates and enhancements to the operating system. Compatibility Mode was not included in this service pack. Compatibility Mode was introduced in Windows 7 and allows users to run programs that were designed for previous versions of Windows. Docx support, on the other hand, was included in Windows XP Service Pack 2. Docx is a file format used by Microsoft Word for documents created in Word 2007 and later versions.

    Rate this question:

  • 24. 

    Which is the correct order for Comptias troubleshooting strategy?

    • A.

      Establish the symptoms, Establish what changed, Identify Infected Area, Select most probable cause, implement solution, test result, recognize potential effects, document solution

    • B.

      Establish what changed, Establish the symptoms, Identify Infected Area, test result, Select most probable cause, implement solution, recognize potential effects, document solution

    • C.

      Establish the symptoms, Identify Infected Area, Establish what changed, Select most probable cause, document solution, implement solution, test result, recognize potential effects

    • D.

      Establish the symptoms, Identify Infected Area, Establish what changed, Select most probable cause, document solution, implement solution, test result, recognize potential effects

    • E.

      Establish the symptoms, Identify Infected Area, Establish what changed, recognize potential effects, Select most probable cause, implement solution, test result, document solution

    Correct Answer
    A. Establish the symptoms, Establish what changed, Identify Infected Area, Select most probable cause, implement solution, test result, recognize potential effects, document solution
  • 25. 

    Which of the following tools are available under the tools tab of the local disk properties box? (Choose 3)

    • A.

      Backup

    • B.

      Disk Cleanup

    • C.

      Defragmenter

    • D.

      Scan Disk

    • E.

      Compress Drive

    Correct Answer(s)
    A. Backup
    C. Defragmenter
    D. Scan Disk
    Explanation
    The tools available under the tools tab of the local disk properties box are Backup, Defragmenter, and Scan Disk. These tools are commonly used for managing and optimizing the performance of the local disk. Backup allows users to create copies of important files and folders. Defragmenter rearranges fragmented data on the disk to improve access speed. Scan Disk scans the disk for errors and fixes them.

    Rate this question:

  • 26. 

    In the XP local drive properties box, Compress drive option is under which tab

    • A.

      General

    • B.

      Hardware

    • C.

      Security

    • D.

      Sharing

    • E.

      Tools

    Correct Answer
    A. General
    Explanation
    The Compress drive option in the XP local drive properties box is found under the General tab.

    Rate this question:

  • 27. 

    In the Local Drive Properties box, what can you do in the security tab?

    • A.

      Configure encryption properties

    • B.

      Modify user permissions

    • C.

      Set file security

    • D.

      Create a demilitarized zone on the drive

    • E.

      Create a Quarantine zone on the drive

    Correct Answer
    B. Modify user permissions
    Explanation
    In the security tab of the Local Drive Properties box, you can modify user permissions. This means that you can change the access levels and rights that different users have for the files and folders on the drive. This allows you to control who can view, edit, or delete certain files, and restrict unauthorized access to sensitive information. By modifying user permissions, you can ensure that only authorized individuals have the necessary privileges to interact with the files on the drive.

    Rate this question:

  • 28. 

    When you right click a file and highlight “send to”, what options are available? (Choose 3)

    • A.

      C: Drive

    • B.

      Compressed folder

    • C.

      Mail Recipient

    • D.

      My Documents

    • E.

      Outlook

    Correct Answer(s)
    B. Compressed folder
    C. Mail Recipient
    D. My Documents
    Explanation
    When you right click a file and highlight "send to", the options available are Compressed folder, Mail Recipient, and My Documents. These options allow you to either compress the file into a folder, send it as an email attachment, or move it to the My Documents folder. The C: Drive and Outlook options are not available in the "send to" menu.

    Rate this question:

  • 29. 

    A client calls and complains that they have just brought a XP Media Center computer and want to access the My Documents folder but the only thing on the desktop is the recycle bin. What’s the best way for them to get the My Documents folder on the desktop?

    • A.

      Right Click start menu > properties > select classic start menu

    • B.

      Right click My Documents on Start Menu > Send to > Desktop

    • C.

      To optimise performance, Media Centre PC’s don’t use shortcuts

    • D.

      Right Click on desktop > Properties > Desktop> Customize Desktop

    • E.

      Control Panel > Desktop > Settings

    Correct Answer
    D. Right Click on desktop > Properties > Desktop> Customize Desktop
    Explanation
    Changing the start menu to classic does do the job but the client may be be happy with their current start menu.

    Rate this question:

  • 30. 

    A client compains their deleted files are not being displayed in his recycle bin but they know something is in there because right clicking the bin gives them the option to remove it. How could you fix this problem? (Choose 2)

    • A.

      Start > Accessories > System Tool > Disk Cleanup

    • B.

      Open Recycle Bin > Tools > Folder Options > View > Display > Show hidden files and folders

    • C.

      Right click Recycle Bin > Properties > make sure “Do not move files to the recycle bin” is unselected

    • D.

      Make sure the folder “recyclables” is not set to read only

    • E.

      Right click Recycle Bin > Properties > Use one setting for all drives

    Correct Answer(s)
    C. Right click Recycle Bin > Properties > make sure “Do not move files to the recycle bin” is unselected
    E. Right click Recycle Bin > Properties > Use one setting for all drives
    Explanation
    To fix the problem, you would need to perform the following steps:
    1. Right click on the Recycle Bin and select Properties.
    2. Make sure the option "Do not move files to the recycle bin" is unselected. This ensures that deleted files are moved to the recycle bin instead of being permanently deleted.
    3. Additionally, in the Recycle Bin Properties, select the option "Use one setting for all drives" to apply the same settings to all drives. This ensures that deleted files from all drives are displayed in the recycle bin.

    Rate this question:

  • 31. 

    One of the features exclusive to XP service pack 2 is “Set Program Access and Defaults” on Add Remove Programs

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Set Program Access and Defaults came with XP service pack 1a

    Rate this question:

  • 32. 

    Which of the following is not found in Categorty View?

    • A.

      User Accounts

    • B.

      Accessibility Options

    • C.

      Power Options

    • D.

      Printers and other hardware

    • E.

      Network and internet connections

    Correct Answer
    C. Power Options
    Explanation
    Power Options is not found in Category View. Category View is a feature in Windows operating systems that organizes Control Panel options into different categories. It provides a simplified and organized way to access various settings and features. However, Power Options is not listed as a category in Category View. Instead, it is typically found under the System and Security category or can be accessed directly from the Start menu.

    Rate this question:

  • 33. 

    What is the advised virtual memory setting?

    • A.

      1 x RAM installed

    • B.

      1.5 x RAM installed

    • C.

      2 x RAM installed

    • D.

      2.5 x RAM installed

    • E.

      3 x RAM installed

    Correct Answer
    B. 1.5 x RAM installed
    Explanation
    The advised virtual memory setting is 1.5 times the amount of RAM installed. This is because virtual memory is a space on the hard drive that is used to supplement the physical RAM when it becomes full. By setting the virtual memory to 1.5 times the amount of RAM, it ensures that there is enough space to handle the overflow of data from RAM, allowing the system to run smoothly without experiencing performance issues.

    Rate this question:

  • 34. 

    You have installed more RAM on a client’s machine. Which of the following should you do afterwards?

    • A.

      Adjust CMOS settings

    • B.

      Recalabrate the memory

    • C.

      Configure all applications so the RAM is used efficiently

    • D.

      Change virtual memory settings

    • E.

      Defrag hard drive

    Correct Answer
    D. Change virtual memory settings
    Explanation
    After installing more RAM on a client's machine, it is necessary to change the virtual memory settings. This is because increasing the amount of physical RAM allows the computer to store more data in memory, reducing the need to use virtual memory. By adjusting the virtual memory settings, the computer can allocate less space for virtual memory and utilize the newly installed RAM more efficiently.

    Rate this question:

  • 35. 

    You are attempting to fix a users computer running XP Home and you find that task manager has been disabled, what would you use to fix it?

    • A.

      User profiles

    • B.

      Gpedit

    • C.

      Regedit

    • D.

      Local Hard Drive > Security

    • E.

      Nothing, you can’t disable task manager

    Correct Answer
    C. Regedit
    Explanation
    If the comptuer had been XP Pro, Gpedit could also have been used to fix the problem

    Rate this question:

  • 36. 

    A client has a computer with the following specs: 350 Mhz Processor 64Mb RAM 16Gb Hard Drive Can the client’s computer upgrade to XP Media Center?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    Media Centre requires a 1.6 Ghz processor, 256mb of Ram and 4GB of hard drive space. It also requires a 4x DVD, 64 Mb Graphics card and a internet connection. Media Center is on the Comptia requirements so it would pay to at least know the requirements.

    Rate this question:

  • 37. 

    In system properties, what path would you take to join a domain?

    • A.

      System > Computer Name > Change

    • B.

      System > Computer Name > Network ID

    • C.

      System > Advanced > Environment Variables

    • D.

      System > Hardware > Hardware Profiles

    • E.

      System > Remote > Advanced

    Correct Answer
    A. System > Computer Name > Change
    Explanation
    To join a domain in system properties, you would navigate to System > Computer Name > Change. This option allows you to modify the computer name and join a domain by providing the necessary domain information and credentials.

    Rate this question:

  • 38. 

    Kernal Mode and system mode are the same thing

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true because kernel mode and system mode refer to the same concept. In operating systems, there are different modes of operation for processes and programs. Kernel mode, also known as system mode, is the highest privilege level where the operating system has full control over the hardware and resources. In this mode, the operating system can execute privileged instructions and access restricted areas of memory. Therefore, kernel mode and system mode are interchangeable terms used to describe the same privileged state of the operating system.

    Rate this question:

  • 39. 

    You are installing work software on a clients machine and the client asks you to install something else, what should you do?

    • A.

      Install it

    • B.

      Don’t install it

    • C.

      Ask your supervisor

    • D.

      Check Company Policy

    • E.

      Check User License agreement to make sure it can legally installed.

    Correct Answer
    D. Check Company Policy
    Explanation
    When installing work software on a client's machine, it is important to follow company policies. These policies are put in place to ensure consistency, security, and compliance with legal requirements. By checking the company policy, you can determine whether installing the additional software is allowed or not. This step helps to maintain the integrity of the client's system and ensures that any software installed aligns with the company's guidelines and regulations.

    Rate this question:

  • 40. 

    What does IMAP Stand For?

    • A.

      Independent Memory Access Prevention

    • B.

      Intelligent Mapping Application Partition

    • C.

      Indirect Motherboard Attack Protector

    • D.

      Internal Multicasting Attenuation Port

    • E.

      Internet Message Access Protocol

    Correct Answer
    E. Internet Message Access Protocol
    Explanation
    IMAP stands for Internet Message Access Protocol. It is a protocol used by email clients to retrieve emails from a mail server. Unlike POP (Post Office Protocol), which downloads emails to a device and removes them from the server, IMAP allows users to access their emails from multiple devices while keeping them stored on the server. This enables users to manage their emails more efficiently, as they can synchronize their email accounts across different devices and access their messages from anywhere.

    Rate this question:

  • 41. 

    What is NSlookup used for?

    • A.

      Tests signal strength

    • B.

      Tests DNS server

    • C.

      Tests printer server

    • D.

      Tests FTP

    • E.

      Configures internet access

    Correct Answer
    B. Tests DNS server
    Explanation
    NSlookup is a command-line tool used to query the Domain Name System (DNS) server. It allows users to obtain information about a specific domain or IP address, such as the corresponding IP address for a domain name or the domain name for an IP address. By testing the DNS server, NSlookup helps to troubleshoot and diagnose any issues related to DNS resolution and connectivity.

    Rate this question:

  • 42. 

    In Windows 2000, what is mixed mode?

    • A.

      Allows a duel boot with a 9x Operating system

    • B.

      Allows 2000 to run on 64bit processors

    • C.

      Allows programs written for Windows 9x to run

    • D.

      Allows users to switch from Windows 2000 to Windows 2000 server

    • E.

      Allows 2000 and NT Domain controllers to coexist

    Correct Answer
    E. Allows 2000 and NT Domain controllers to coexist
    Explanation
    Mixed mode in Windows 2000 refers to the ability of Windows 2000 and NT Domain controllers to coexist. This means that both Windows 2000 and NT Domain controllers can operate together in the same network environment. This allows for a smooth transition from NT to Windows 2000 without disrupting the existing NT Domain controllers. It ensures compatibility and allows for a gradual upgrade of the domain controllers in an organization.

    Rate this question:

  • 43. 

    Which of the following is not a Windows 2000 OS?

    • A.

      Windows 2000 Professional

    • B.

      Windows 2000 Server

    • C.

      Windows 2000 Exchange Server

    • D.

      Windows 2000 Advanced Server

    • E.

      Windows 2000 Datacenter Server

    Correct Answer
    C. Windows 2000 Exchange Server
    Explanation
    Windows 2000 Exchange Server is not a Windows 2000 OS. The other options listed, Windows 2000 Professional, Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Datacenter Server, are all valid Windows 2000 operating systems. However, Windows 2000 Exchange Server is not an operating system but rather a server application that runs on Windows 2000 Server.

    Rate this question:

  • 44. 

    Which of the following is the Windows 2000 Minimum Requirement?

    • A.

      Pentium 133, 32mb RAM, 650mb Hard Drive Space

    • B.

      Pentium 133, 32mb RAM, 700mb Hard Drive Space

    • C.

      Pentium 233, 32mb RAM, 700mb Hard Drive Space

    • D.

      Pentium 133, 64mb RAM, 2Gb Hard Drive Space

    • E.

      Pentium 233, 64mb RAM, 2Gb Hard Drive Space

    Correct Answer
    A. Pentium 133, 32mb RAM, 650mb Hard Drive Space
    Explanation
    The correct answer is Pentium 133, 32mb RAM, 650mb Hard Drive Space. This is the minimum requirement for Windows 2000, as stated in the question. The other options either have higher processor speed, more RAM, or larger hard drive space, which exceed the minimum requirement.

    Rate this question:

  • 45. 

    The boot partition contains NTLDR

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The boot partition does not contain NTLDR. NTLDR (NT Loader) is a file that is used by Windows operating systems prior to Windows Vista to boot the system. It is typically located in the root directory of the system partition, not the boot partition. The boot partition, on the other hand, contains the necessary files for starting the computer and loading the operating system. Therefore, the statement is false.

    Rate this question:

  • 46. 

    Windows XP Home and Professional both have the same system requirements

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The explanation for the given answer is that Windows XP Home and Professional editions have the same minimum system requirements. This means that both editions can run on the same hardware specifications without any significant differences. Therefore, the statement is true.

    Rate this question:

  • 47. 

    XP home cannot connect to a domain

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Windows XP Home Edition does not have the built-in capability to join a domain. It is designed for home users and does not include the necessary features to connect to a domain network. In contrast, Windows XP Professional Edition has the ability to join a domain and is intended for business and professional use. Therefore, the statement "XP home cannot connect to a domain" is true.

    Rate this question:

  • 48. 

    NTFS backs up Critical Data

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    NTFS (New Technology File System) is a file system used by Windows operating systems. One of the features of NTFS is its ability to provide data redundancy and fault tolerance through its built-in backup mechanisms. NTFS supports features like file and folder compression, encryption, and disk quotas, which can be used to back up critical data. Therefore, the statement "NTFS backs up Critical Data" is true.

    Rate this question:

  • 49. 

    Which of the following can't be done using the Atrib command

    • A.

      Make file read only

    • B.

      Make file hidden

    • C.

      Encrypt a file

    • D.

      Archive a file

    • E.

      Make a system file

    Correct Answer
    C. Encrypt a file
    Explanation
    The Atrib command is used to change the attributes of a file in Windows. It can be used to make a file read-only, hidden, archive, or a system file. However, it does not have the capability to encrypt a file. Encryption is a separate process that involves converting the contents of a file into a coded form to prevent unauthorized access.

    Rate this question:

  • 50. 

    Holding down the F8 Key during startup launches what

    • A.

      The Boot Menu

    • B.

      Startup Menu

    • C.

      OS Menu

    • D.

      Advanced Options Menu

    • E.

      Windows Menu

    Correct Answer
    D. Advanced Options Menu
    Explanation
    Holding down the F8 key during startup launches the Advanced Options Menu. This menu provides various options for troubleshooting and advanced startup settings, such as Safe Mode, Last Known Good Configuration, and System Restore. It allows users to access additional tools and features that can help resolve issues or modify the startup behavior of the operating system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 24, 2008
    Quiz Created by
    Grabate
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.