3d052

100 Questions | Attempts: 145
Share

SettingsSettingsSettings
3d052 Quizzes & Trivia

Questions and Answers
  • 1. 

    Which original components were very susceptible to damage from electrostatic discharge?

    • A.

      Read only memory (ROM)

    • B.

      Basic input/output system (BIOS)

    • C.

      Complementary metal-oxide semiconductor (CMOS)

    • D.

      Electronic erasable programmable read-only memory (EEPROM)

    Correct Answer
    C. Complementary metal-oxide semiconductor (CMOS)
  • 2. 

    What is considered to be a computer’s main storage?

    • A.

      Random access memory (RAM)

    • B.

      Read only memory (ROM)

    • C.

      Basic input/output system (BIOS)

    • D.

      Complementary metal-oxide semiconductor (CMOS)

    Correct Answer
    A. Random access memory (RAM)
  • 3. 

    What is considered as nonvolatile permanent memory?

    • A.

      Read only memory (ROM)

    • B.

      Basic input/output system (BIOS)

    • C.

      Complementary metal-oxide semiconductor (CMOS)

    • D.

      Electronic erasable programmable read-only memory (EEPROM)

    Correct Answer
    A. Read only memory (ROM)
  • 4. 

    What is a form of firmware that contains the computer’s startup instructions?

    • A.

      Cache

    • B.

      Basic input/output system (BIOS)

    • C.

      Complementary metal-oxide semiconductor (CMOS)

    • D.

      Electronic erasable programmable read-only memory (EEPROM)

    Correct Answer
    B. Basic input/output system (BIOS)
  • 5. 

    What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?

    • A.

      Cache

    • B.

      Buffer

    • C.

      Interface

    • D.

      Interrupt

    Correct Answer
    D. Interrupt
  • 6. 

    Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?

    • A.

      Disk request

    • B.

      Utility resource

    • C.

      Priority interrupt

    • D.

      Integrated resource

    Correct Answer
    C. Priority interrupt
  • 7. 

    Which interrupt request (IRQ) line number is normally used for the floppy disk controller?

    • A.

      2

    • B.

      4

    • C.

      6

    • D.

      8

    Correct Answer
    C. 6
  • 8. 

    Which is a term used to describe that data is whole or complete?

    • A.

      Driver

    • B.

      Parity bit

    • C.

      Data integrity

    • D.

      Error correction

    Correct Answer
    C. Data integrity
  • 9. 

    What is considered as a technique or method of checking data integrity?

    • A.

      Fault

    • B.

      Parity

    • C.

      Interrupt

    • D.

      Asynchronous

    Correct Answer
    B. Parity
  • 10. 

    Which is a very simple example of an error detecting code?

    • A.

      Interrupt

    • B.

      Parity bit

    • C.

      Asynchronous

    • D.

      Data integrity

    Correct Answer
    B. Parity bit
  • 11. 

    What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?

    • A.

      Network attached storage (NAS)

    • B.

      Storage area network (SAN)

    • C.

      Redundant array of independent disks (RAID)

    • D.

      Array storage

    Correct Answer
    B. Storage area network (SAN)
  • 12. 

    What is an advantage of using a storage area network (SAN) architecture?

    • A.

      Ease of replacing the hard drive

    • B.

      Ease of replacing network connectivity

    • C.

      Ease of replacing server

    • D.

      Multiple users can access the server at once

    Correct Answer
    C. Ease of replacing server
  • 13. 

    What is the connection type of choice for storage area networks (SAN)?

    • A.

      Fibre channel

    • B.

      ATA over Ethernet (AoE)

    • C.

      Small computer system interface (SCSI)

    • D.

      Internet small computer system interface (iSCSI)

    Correct Answer
    A. Fibre channel
  • 14. 

    Which storage device can be easily connected to a network and appears as a network drive?

    • A.

      Storage area network (SAN)

    • B.

      Redundant array of independent disks (RAID)

    • C.

      Network attached storage (NAS)

    • D.

      RHD

    Correct Answer
    C. Network attached storage (NAS)
  • 15. 

    Which storage device has the means of providing data storage reliability using multiple hard drives?

    • A.

      Storage area network (SAN)

    • B.

      Network attached storage (NAS)

    • C.

      Small computer system interface (SCSI)

    • D.

      Redundant array of independent disks (RAID)

    Correct Answer
    D. Redundant array of independent disks (RAID)
  • 16. 

    The hard drives in a redundant array of independent disks (RAID) array are presented to the server as

    • A.

      One single hard drive

    • B.

      A collection of hard drives

    • C.

      A single RAID array

    • D.

      A remote storage device

    Correct Answer
    A. One single hard drive
  • 17. 

    Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?

    • A.

      Small computer system interface (SCSI)

    • B.

      Serial attached (SAS) SCSI

    • C.

      Serial advanced technology attachment (SATA)

    • D.

      Peripheral component interconnect express (PCIe)

    Correct Answer
    B. Serial attached (SAS) SCSI
  • 18. 

    Which is not a characteristic of high-order languages?

    • A.

      They are nearly self-documenting

    • B.

      They use English-like statements

    • C.

      Source codes that are written closest to machine language

    • D.

      Programs are transportable between computers with few changes

    Correct Answer
    C. Source codes that are written closest to machine language
  • 19. 

    What best describes programming machine code?

    • A.

      Another term for firmware

    • B.

      Statements that correspond to complex actions

    • C.

      Instructions in a form that is acceptable to the computer

    • D.

      Source code that, when compiled, is appropriate for the computer

    Correct Answer
    C. Instructions in a form that is acceptable to the computer
  • 20. 

    Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?

    • A.

      Standard Generalized Markup Language (SGML)

    • B.

      Extensible Markup Language (XML)

    • C.

      HyperText Markup Language (HTML)

    • D.

      Dynamic HTML (DHTML)

    Correct Answer
    C. HyperText Markup Language (HTML)
  • 21. 

    Which Web application is most likely to succeed Hypertext Markup Language (HTML)?

    • A.

      Dynamic HTML (DHTML)

    • B.

      Extensible Markup Language (XML)

    • C.

      Standard Generalized Markup Language (SGML)

    • D.

      Extensible HTML (XHTML)

    Correct Answer
    D. Extensible HTML (XHTML)
  • 22. 

    A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a

    • A.

      Transport layer security (TLS)

    • B.

      Common gateway interface (CGI)

    • C.

      Data encryption standard (DES)

    • D.

      Public key infrastructure (PKI)

    Correct Answer
    B. Common gateway interface (CGI)
  • 23. 

    Which protocol is commonly used for managing the security of a message transmission on the Internet?

    • A.

      Secure socket layer (SSL)

    • B.

      Public key infrastructure (PKI)

    • C.

      Data encryption standard (DES)

    • D.

      Transport layer security (TLS)

    Correct Answer
    A. Secure socket layer (SSL)
  • 24. 

    Which program can be used to automatically launch programs on a preset schedule?

    • A.

      Check disk

    • B.

      Disk quotas

    • C.

      Disk defragmenter

    • D.

      Task scheduler

    Correct Answer
    D. Task scheduler
  • 25. 

    Which error-checking tool allows you to monitor the file system for errors?

    • A.

      Check disk

    • B.

      Disk quotas

    • C.

      Task scheduler

    • D.

      Disk defragmenter

    Correct Answer
    A. Check disk
  • 26. 

    Which numbering system characteristic is the leftmost non-zero digit of a numeric value?

    • A.

      Least significant digit (LSD)

    • B.

      Most significant digit (MSD)

    • C.

      Exponent

    • D.

      Radix

    Correct Answer
    B. Most significant digit (MSD)
  • 27. 

    What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?

    • A.

      Preventive controls

    • B.

      List of critical devices

    • C.

      Recovery strategies

    • D.

      Emergency action plans

    Correct Answer
    B. List of critical devices
  • 28. 

    Which type of backup would you use at the end of the week to save all data that you select on your systems?

    • A.

      Incremental

    • B.

      Differential

    • C.

      Daily

    • D.

      Normal

    Correct Answer
    D. Normal
  • 29. 

    Which type of backup will backup all files that have been altered in the last 24 hours?

    • A.

      Daily

    • B.

      Normal

    • C.

      Incremental

    • D.

      Differential

    Correct Answer
    A. Daily
  • 30. 

    What is based around a central directory database containing information about all the domain controllers in the network?

    • A.

      Active directory

    • B.

      Domains manager

    • C.

      Domain name service (DNS)

    • D.

      Dynamic host configuration protocol (DHCP)

    Correct Answer
    A. Active directory
  • 31. 

    What is a group of users, servers, and other resources that share a centralized database of account and security information?

    • A.

      Domain

    • B.

      Forest

    • C.

      Schema

    • D.

      Tree

    Correct Answer
    A. Domain
  • 32. 

    Where does a copy of the active directory database reside?

    • A.

      Dynamic host configuration protocol (DHCP) servers

    • B.

      Domain name service (DNS) servers

    • C.

      Domain controllers

    • D.

      Global catalog servers

    Correct Answer
    C. Domain controllers
  • 33. 

    What kind of server contains the master listing of all active directory objects in the forest?

    • A.

      Dynamic host configuration protocol (DHCP)

    • B.

      Domain controller

    • C.

      Global catalog

    • D.

      Member

    Correct Answer
    C. Global catalog
  • 34. 

    What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?

    • A.

      Access control lists

    • B.

      Access policy objects

    • C.

      Group policy objects

    • D.

      Group rules sets

    Correct Answer
    C. Group policy objects
  • 35. 

    Which type of interface is friendlier for the average user to use?

    • A.

      Command line interface

    • B.

      Graphical user interface

    • C.

      Menu driven interface

    • D.

      Palo Alto Research Center user interface

    Correct Answer
    B. Graphical user interface
  • 36. 

    Which of the following is not one of the elements that most graphical user interfaces are composed of?

    • A.

      Windows

    • B.

      Icons

    • C.

      Menus

    • D.

      Programs

    Correct Answer
    D. Programs
  • 37. 

    Sitting at a computer and loading a software patch onto it is an example of what type of software patch?

    • A.

      Automatic

    • B.

      Attended

    • C.

      Unattended

    • D.

      Remote

    Correct Answer
    B. Attended
  • 38. 

    Which type of patch would utilize a remote installation services (RIS)?

    • A.

      Automatic

    • B.

      Local

    • C.

      Manual

    • D.

      Unattended

    Correct Answer
    D. Unattended
  • 39. 

    Which components of domain name service (DNS) contain a database of associated names and IP addresses?

    • A.

      Name servers

    • B.

      Resolvers

    • C.

      Resource records

    • D.

      Forward lookup zone

    Correct Answer
    A. Name servers
  • 40. 

    Which query is made by one name server to another name server?

    • A.

      Dynamic host configuration protocol (DHCP) query

    • B.

      Domain name service (DNS) query

    • C.

      Recursive query

    • D.

      Non-recursive query

    Correct Answer
    D. Non-recursive query
  • 41. 

    Which software program manages an IP address allocation for a network?

    • A.

      Dynamic host configuration protocol (DHCP)

    • B.

      Domain name service (DNS)

    • C.

      Active directory (AD)

    • D.

      DHCP server

    Correct Answer
    D. DHCP server
  • 42. 

    The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a

    • A.

      Pool

    • B.

      Range

    • C.

      Scope

    • D.

      Zone

    Correct Answer
    C. Scope
  • 43. 

    What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Five

    Correct Answer
    A. One
  • 44. 

    According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?

    • A.

      15 days

    • B.

      30 days

    • C.

      45 days

    • D.

      60 days

    Correct Answer
    B. 30 days
  • 45. 

    What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?

    • A.

      Domain name service (DNS)

    • B.

      Internet information services (IIS)

    • C.

      Remote installation services (RIS)

    • D.

      Web

    Correct Answer
    C. Remote installation services (RIS)
  • 46. 

    Which is not a component of Internet information services (IIS)?

    • A.

      FTP server

    • B.

      Internet services manager

    • C.

      Simple mail transport protocol (SMTP)

    • D.

      Simple network management protocol (SNMP)

    Correct Answer
    D. Simple network management protocol (SNMP)
  • 47. 

    What component of windows unifies and simplifies day to day system management tasks?

    • A.

      Domain name service (DNS)

    • B.

      Internet information services (IIS)

    • C.

      Microsoft management console (MMC)

    • D.

      Remote installation services (RIS)

    Correct Answer
    C. Microsoft management console (MMC)
  • 48. 

    Which type of group manages user’s rights assignments and access permissions?

    • A.

      Universal

    • B.

      Distribution

    • C.

      Security

    • D.

      Access

    Correct Answer
    C. Security
  • 49. 

    Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?

    • A.

      Anonymous logon

    • B.

      Everyone

    • C.

      Network

    • D.

      Interactive

    Correct Answer
    D. Interactive
  • 50. 

    What defines the rules by which operations can be performed on a particular resource?

    • A.

      Rights

    • B.

      Permissions

    • C.

      Access control lists

    • D.

      Hardware configuration

    Correct Answer
    B. Permissions

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 01, 2012
    Quiz Created by
    Hellbomb
Back to Top Back to top
Advertisement