3d052

100 Questions | Total Attempts: 145

SettingsSettingsSettings
Please wait...
3d052 Quizzes & Trivia

Questions and Answers
  • 1. 
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 2. 
    What is considered to be a computer’s main storage?
    • A. 

      Random access memory (RAM)

    • B. 

      Read only memory (ROM)

    • C. 

      Basic input/output system (BIOS)

    • D. 

      Complementary metal-oxide semiconductor (CMOS)

  • 3. 
    What is considered as nonvolatile permanent memory?
    • A. 

      Read only memory (ROM)

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 4. 
    • A. 

      Cache

    • B. 

      Basic input/output system (BIOS)

    • C. 

      Complementary metal-oxide semiconductor (CMOS)

    • D. 

      Electronic erasable programmable read-only memory (EEPROM)

  • 5. 
    What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache

    • B. 

      Buffer

    • C. 

      Interface

    • D. 

      Interrupt

  • 6. 
    Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
    • A. 

      Disk request

    • B. 

      Utility resource

    • C. 

      Priority interrupt

    • D. 

      Integrated resource

  • 7. 
    Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    Which is a term used to describe that data is whole or complete?
    • A. 

      Driver

    • B. 

      Parity bit

    • C. 

      Data integrity

    • D. 

      Error correction

  • 9. 
    What is considered as a technique or method of checking data integrity?
    • A. 

      Fault

    • B. 

      Parity

    • C. 

      Interrupt

    • D. 

      Asynchronous

  • 10. 
    Which is a very simple example of an error detecting code?
    • A. 

      Interrupt

    • B. 

      Parity bit

    • C. 

      Asynchronous

    • D. 

      Data integrity

  • 11. 
    What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
    • A. 

      Network attached storage (NAS)

    • B. 

      Storage area network (SAN)

    • C. 

      Redundant array of independent disks (RAID)

    • D. 

      Array storage

  • 12. 
    What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive

    • B. 

      Ease of replacing network connectivity

    • C. 

      Ease of replacing server

    • D. 

      Multiple users can access the server at once

  • 13. 
    What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre channel

    • B. 

      ATA over Ethernet (AoE)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Internet small computer system interface (iSCSI)

  • 14. 
    Which storage device can be easily connected to a network and appears as a network drive?
    • A. 

      Storage area network (SAN)

    • B. 

      Redundant array of independent disks (RAID)

    • C. 

      Network attached storage (NAS)

    • D. 

      RHD

  • 15. 
    Which storage device has the means of providing data storage reliability using multiple hard drives?
    • A. 

      Storage area network (SAN)

    • B. 

      Network attached storage (NAS)

    • C. 

      Small computer system interface (SCSI)

    • D. 

      Redundant array of independent disks (RAID)

  • 16. 
    The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
    • A. 

      One single hard drive

    • B. 

      A collection of hard drives

    • C. 

      A single RAID array

    • D. 

      A remote storage device

  • 17. 
    Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
    • A. 

      Small computer system interface (SCSI)

    • B. 

      Serial attached (SAS) SCSI

    • C. 

      Serial advanced technology attachment (SATA)

    • D. 

      Peripheral component interconnect express (PCIe)

  • 18. 
    Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting

    • B. 

      They use English-like statements

    • C. 

      Source codes that are written closest to machine language

    • D. 

      Programs are transportable between computers with few changes

  • 19. 
    What best describes programming machine code?
    • A. 

      Another term for firmware

    • B. 

      Statements that correspond to complex actions

    • C. 

      Instructions in a form that is acceptable to the computer

    • D. 

      Source code that, when compiled, is appropriate for the computer

  • 20. 
    Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      HyperText Markup Language (HTML)

    • D. 

      Dynamic HTML (DHTML)

  • 21. 
    Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML)

    • B. 

      Extensible Markup Language (XML)

    • C. 

      Standard Generalized Markup Language (SGML)

    • D. 

      Extensible HTML (XHTML)

  • 22. 
    A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a
    • A. 

      Transport layer security (TLS)

    • B. 

      Common gateway interface (CGI)

    • C. 

      Data encryption standard (DES)

    • D. 

      Public key infrastructure (PKI)

  • 23. 
    Which protocol is commonly used for managing the security of a message transmission on the Internet?
    • A. 

      Secure socket layer (SSL)

    • B. 

      Public key infrastructure (PKI)

    • C. 

      Data encryption standard (DES)

    • D. 

      Transport layer security (TLS)

  • 24. 
    Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check disk

    • B. 

      Disk quotas

    • C. 

      Disk defragmenter

    • D. 

      Task scheduler

  • 25. 
    Which error-checking tool allows you to monitor the file system for errors?
    • A. 

      Check disk

    • B. 

      Disk quotas

    • C. 

      Task scheduler

    • D. 

      Disk defragmenter

  • 26. 
    Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
    • A. 

      Least significant digit (LSD)

    • B. 

      Most significant digit (MSD)

    • C. 

      Exponent

    • D. 

      Radix

  • 27. 
    What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
    • A. 

      Preventive controls

    • B. 

      List of critical devices

    • C. 

      Recovery strategies

    • D. 

      Emergency action plans

  • 28. 
    Which type of backup would you use at the end of the week to save all data that you select on your systems?
    • A. 

      Incremental

    • B. 

      Differential

    • C. 

      Daily

    • D. 

      Normal

  • 29. 
    Which type of backup will backup all files that have been altered in the last 24 hours?
    • A. 

      Daily

    • B. 

      Normal

    • C. 

      Incremental

    • D. 

      Differential

  • 30. 
    What is based around a central directory database containing information about all the domain controllers in the network?
    • A. 

      Active directory

    • B. 

      Domains manager

    • C. 

      Domain name service (DNS)

    • D. 

      Dynamic host configuration protocol (DHCP)

  • 31. 
    What is a group of users, servers, and other resources that share a centralized database of account and security information?
    • A. 

      Domain

    • B. 

      Forest

    • C. 

      Schema

    • D. 

      Tree

  • 32. 
    Where does a copy of the active directory database reside?
    • A. 

      Dynamic host configuration protocol (DHCP) servers

    • B. 

      Domain name service (DNS) servers

    • C. 

      Domain controllers

    • D. 

      Global catalog servers

  • 33. 
    What kind of server contains the master listing of all active directory objects in the forest?
    • A. 

      Dynamic host configuration protocol (DHCP)

    • B. 

      Domain controller

    • C. 

      Global catalog

    • D. 

      Member

  • 34. 
    What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?
    • A. 

      Access control lists

    • B. 

      Access policy objects

    • C. 

      Group policy objects

    • D. 

      Group rules sets

  • 35. 
    Which type of interface is friendlier for the average user to use?
    • A. 

      Command line interface

    • B. 

      Graphical user interface

    • C. 

      Menu driven interface

    • D. 

      Palo Alto Research Center user interface

  • 36. 
    Which of the following is not one of the elements that most graphical user interfaces are composed of?
    • A. 

      Windows

    • B. 

      Icons

    • C. 

      Menus

    • D. 

      Programs

  • 37. 
    Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
    • A. 

      Automatic

    • B. 

      Attended

    • C. 

      Unattended

    • D. 

      Remote

  • 38. 
    Which type of patch would utilize a remote installation services (RIS)?
    • A. 

      Automatic

    • B. 

      Local

    • C. 

      Manual

    • D. 

      Unattended

  • 39. 
    Which components of domain name service (DNS) contain a database of associated names and IP addresses?
    • A. 

      Name servers

    • B. 

      Resolvers

    • C. 

      Resource records

    • D. 

      Forward lookup zone

  • 40. 
    Which query is made by one name server to another name server?
    • A. 

      Dynamic host configuration protocol (DHCP) query

    • B. 

      Domain name service (DNS) query

    • C. 

      Recursive query

    • D. 

      Non-recursive query

  • 41. 
    Which software program manages an IP address allocation for a network?
    • A. 

      Dynamic host configuration protocol (DHCP)

    • B. 

      Domain name service (DNS)

    • C. 

      Active directory (AD)

    • D. 

      DHCP server

  • 42. 
    The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a
    • A. 

      Pool

    • B. 

      Range

    • C. 

      Scope

    • D. 

      Zone

  • 43. 
    What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Five

  • 44. 
    According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?
    • A. 

      15 days

    • B. 

      30 days

    • C. 

      45 days

    • D. 

      60 days

  • 45. 
    What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?
    • A. 

      Domain name service (DNS)

    • B. 

      Internet information services (IIS)

    • C. 

      Remote installation services (RIS)

    • D. 

      Web

  • 46. 
    Which is not a component of Internet information services (IIS)?
    • A. 

      FTP server

    • B. 

      Internet services manager

    • C. 

      Simple mail transport protocol (SMTP)

    • D. 

      Simple network management protocol (SNMP)

  • 47. 
    What component of windows unifies and simplifies day to day system management tasks?
    • A. 

      Domain name service (DNS)

    • B. 

      Internet information services (IIS)

    • C. 

      Microsoft management console (MMC)

    • D. 

      Remote installation services (RIS)

  • 48. 
    Which type of group manages user’s rights assignments and access permissions?
    • A. 

      Universal

    • B. 

      Distribution

    • C. 

      Security

    • D. 

      Access

  • 49. 
    Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?
    • A. 

      Anonymous logon

    • B. 

      Everyone

    • C. 

      Network

    • D. 

      Interactive

  • 50. 
    What defines the rules by which operations can be performed on a particular resource?
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

  • 51. 
    A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called
    • A. 

      Rights

    • B. 

      Sharing

    • C. 

      Permissions

    • D. 

      Access control lists

  • 52. 
    What permission always overrides all other permissions assigned to a user or group to which the user belongs?
    • A. 

      Full control

    • B. 

      No access

    • C. 

      Change

    • D. 

      Write

  • 53. 
    When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?
    • A. 

      Global group permissions

    • B. 

      Everyone group permission

    • C. 

      No permissions are automatically assigned

    • D. 

      Inherited permissions of the folder it’s contained in

  • 54. 
    Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down?
    • A. 

      Mailbox service

    • B. 

      System attendant

    • C. 

      Simple mail transport protocol (SMTP)

    • D. 

      Post office protocol version 3 (POP3) service

  • 55. 
    In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?
    • A. 

      Global settings

    • B. 

      System policies

    • C. 

      Tools

    • D. 

      Servers

  • 56. 
    Which type of lists uses pointers to connect each element together?
    • A. 

      Derived

    • B. 

      Linked

    • C. 

      Ordered

    • D. 

      Sequential

  • 57. 
    A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a
    • A. 

      List

    • B. 

      Schema

    • C. 

      Table

    • D. 

      View

  • 58. 
    What is the most common type of operation in sequential query language (SQL)?
    • A. 

      Clauses

    • B. 

      Expressions

    • C. 

      Queries

    • D. 

      Statements

  • 59. 
    What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent?
    • A. 

      Data

    • B. 

      Query

    • C. 

      Schema

    • D. 

      Transaction

  • 60. 
    Which is the most commonly used sequential query language (SQL) data statement?
    • A. 

      Commit

    • B. 

      Select

    • C. 

      Where

    • D. 

      Update

  • 61. 
    Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
    • A. 

      Buffers

    • B. 

      Concurrency

    • C. 

      Locking

    • D. 

      Logging

  • 62. 
    Which UNIX capability can execute numerous programs at the same time?
    • A. 

      Multi-user

    • B. 

      Multiprocessing

    • C. 

      Time sharing

    • D. 

      Multitasking

  • 63. 
    Which UNIX ability can run on different types of hardware with few relatively minor changes?
    • A. 

      Portability

    • B. 

      Flexibility

    • C. 

      Simplicity

    • D. 

      Base line programming

  • 64. 
    Which UNIX operating system component interacts directly with the system hardware?
    • A. 

      File system

    • B. 

      VI editor

    • C. 

      Kernel

    • D. 

      Shell

  • 65. 
    Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?
    • A. 

      File system

    • B. 

      VI editor

    • C. 

      Kernel

    • D. 

      Shell

  • 66. 
    Which UNIX shell is the most compact and is often used for writing shell scripts?
    • A. 

      C shell

    • B. 

      Bourne Shell

    • C. 

      Korn shell

    • D. 

      D shell

  • 67. 
    Normally, when you create a file with a text editor, the file is set up with
    • A. 

      Read and write permission for you and read-only permission for others

    • B. 

      Write permission for you and read only permission for others

    • C. 

      Read, write, and execute for you and read, write for others

    • D. 

      Read and write permission for you and read, write for others

  • 68. 
    To change permissions on a shell script, you use the UNIX command
    • A. 

      Chown

    • B. 

      Chgrp

    • C. 

      Chmod

    • D. 

      Chper

  • 69. 
    The simplest place to put your function definitions is in your
    • A. 

      Function

    • B. 

      Dev

    • C. 

      Definition

    • D. 

      Profile

  • 70. 
    What do you type to quit a UNIX shell?
    • A. 

      Exit

    • B. 

      Quit

    • C. 

      X

    • D. 

      Xit

  • 71. 
    How many characters do most UNIX system administrators and users tend to use for filenames?
    • A. 

      10

    • B. 

      12

    • C. 

      14

    • D. 

      16

  • 72. 
    UNIX™ disks are divided into logical sections called
    • A. 

      Sectors

    • B. 

      Sections

    • C. 

      Reams

    • D. 

      Partitions

  • 73. 
    The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
    • A. 

      Root

    • B. 

      System

    • C. 

      Device

    • D. 

      Home

  • 74. 
    What does the 0 following the c in the device name c0t6d0s7 represent?
    • A. 

      Controller

    • B. 

      Partition

    • C. 

      Drive number

    • D. 

      Bus target number

  • 75. 
    What does the 7 in the device name c0t6d0s7 represent?
    • A. 

      Bus target number

    • B. 

      Drive number

    • C. 

      Controller

    • D. 

      Partition

  • 76. 
    What is the basic unit for storing and manipulating a collection of logically related information known as data?
    • A. 

      Directories

    • B. 

      Partitions

    • C. 

      Slices

    • D. 

      Files

  • 77. 
    Hard links are created using which UNIX command?
    • A. 

      Cd

    • B. 

      Hd

    • C. 

      Lm

    • D. 

      Ln

  • 78. 
    Which UNIX mechanism enables programs to communicate with one another through the file system?
    • A. 

      Named pipes

    • B. 

      Character devices

    • C. 

      Block devices

    • D. 

      Sockets

  • 79. 
    Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time?
    • A. 

      Named pipes

    • B. 

      Character devices

    • C. 

      Block devices

    • D. 

      Sockets

  • 80. 
    Which UNIX command displays the current working directory?
    • A. 

      Ls

    • B. 

      Ls-s

    • C. 

      Pwf

    • D. 

      Pwd

  • 81. 
    Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames?
    • A. 

      Ls

    • B. 

      Cd

    • C. 

      Pwf

    • D. 

      Pwd

  • 82. 
    Which UNIX command takes any characters from standard input and then echoes them to standard output?
    • A. 

      Cat

    • B. 

      Mkdir

    • C. 

      Pwd

    • D. 

      Pwf

  • 83. 
    Which UNIX command deletes files from within a directory?
    • A. 

      Lm

    • B. 

      Rm

    • C. 

      Pr

    • D. 

      Ps

  • 84. 
    Which UNIX command looks at an individual file and finds a specified pattern (string)?
    • A. 

      Grep

    • B. 

      Find

    • C. 

      Crypt

    • D. 

      Group

  • 85. 
    Which UNIX command changes the group ownership of one or more files?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Whodo

    • D. 

      Finger

  • 86. 
    Which UNIX command sets access and modification times for each file to the current time?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Touch

    • D. 

      Finger

  • 87. 
    How many primary groups can a user be a member of?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 88. 
    Which UNIX vi mode allows users to execute set commands?
    • A. 

      Edit

    • B. 

      Text Input

    • C. 

      Command

    • D. 

      Append

  • 89. 
    Which UNIX vi character represents the end of the file?
    • A. 

      *

    • B. 

      &

    • C. 

      ?

    • D. 

      $

  • 90. 
    Which UNIX command changes the ownership of one or more files to a new owner?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Whodo

    • D. 

      Finger

  • 91. 
    While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file?
    • A. 

      W

    • B. 

      W!

    • C. 

      Wq

    • D. 

      !

  • 92. 
    In UNIX, which package of programs lets a terminal handle many sessions at once?
    • A. 

      UNIX™ windows system

    • B. 

      Multi-user manager

    • C. 

      Multi-session manager

    • D. 

      UNIX™ session manager

  • 93. 
    What is the most common UNIX windows system?
    • A. 

      U windows

    • B. 

      X windows

    • C. 

      UX windows

    • D. 

      UZ windows

  • 94. 
    Which UNIX default command starts the X windows system?
    • A. 

      Xwnds

    • B. 

      Xstart

    • C. 

      Xinit

    • D. 

      X

  • 95. 
    The act of choosing the window you type is called setting the
    • A. 

      Active window

    • B. 

      Input focus

    • C. 

      X window

    • D. 

      Window manager

  • 96. 
    What action puts unneeded windows out of the way without quitting the program inside them?
    • A. 

      Iconifying

    • B. 

      Previewing

    • C. 

      Paging

    • D. 

      Desktop management

  • 97. 
    Which UNIX command from the menu bar moves a window to the bottom of the stack of windows?
    • A. 

      Resize

    • B. 

      Move

    • C. 

      Lower

    • D. 

      Restore

  • 98. 
    The key to shutting down an xterm window is to know which of your programs is the
    • A. 

      Controlling program

    • B. 

      Exiting program

    • C. 

      Executing program

    • D. 

      Hard link file

  • 99. 
    The first step in quitting an xterm session is to
    • A. 

      Quit all non-controlling programs

    • B. 

      Quit all controlling programs

    • C. 

      Type quit and press enter

    • D. 

      Type exit and press enter

  • 100. 
    Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command?
    • A. 

      Catman

    • B. 

      Manbld

    • C. 

      Mancat

    • D. 

      Man-b