3d0x2 Vol. 2

100 Questions | Attempts: 1249
Share

SettingsSettingsSettings
CDCs Quizzes & Trivia

The URE questions for the 3D0X2 CDCs.


Questions and Answers
  • 1. 

    Which original components were very susceptible to damage from electrostatic discharge?

    • A.

      Read only memory (ROM).

    • B.

      Basic input/output system (BIOS).

    • C.

      Complementary metal-oxide semiconductor (CMOS).

    • D.

      Electronic erasable programmable read-only memory (EEPROM).

    Correct Answer
    C. Complementary metal-oxide semiconductor (CMOS).
  • 2. 

    What is considered to be a computer’s main storage?

    • A.

      Random access memory (RAM).

    • B.

      Read only memory (ROM).

    • C.

      Basic input/output system (BIOS).

    • D.

      Complementary metal-oxide semiconductor (CMOS).

    Correct Answer
    A. Random access memory (RAM).
  • 3. 

    What is considered as nonvolatile permanent memory?

    • A.

      Read only memory (ROM).

    • B.

      Basic input/output system (BIOS).

    • C.

      Complementary metal-oxide semiconductor (CMOS).

    • D.

      Electronic erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Read only memory (ROM).
  • 4. 

    What is a form of firmware that contains the computer’s startup instructions?

    • A.

      Cache.

    • B.

      Basic input/output system (BIOS).

    • C.

      Complementary metal-oxide semiconductor (CMOS).

    • D.

      Electronic erasable programmable read-only memory (EEPROM).

    Correct Answer
    B. Basic input/output system (BIOS).
  • 5. 

    What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?

    • A.

      Cache.

    • B.

      Buffer.

    • C.

      Interface.

    • D.

      Interrupt.

    Correct Answer
    D. Interrupt.
  • 6. 

    Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?

    • A.

      Disk request.

    • B.

      Utility resource.

    • C.

      Priority interrupt.

    • D.

      Integrated resource.

    Correct Answer
    C. Priority interrupt.
  • 7. 

    Which interrupt request (IRQ) line number is normally used for the floppy disk controller?

    • A.

      4

    • B.

      4

    • C.

      6

    • D.

      8

    Correct Answer
    C. 6
  • 8. 

    Which is a term used to describe that data is whole or complete?

    • A.

      Driver.

    • B.

      Parity bit.

    • C.

      Data integrity.

    • D.

      Error correction.

    Correct Answer
    C. Data integrity.
  • 9. 

    What is considered as a technique or method of checking data integrity?

    • A.

      Fault.

    • B.

      Parity.

    • C.

      Interrupt.

    • D.

      Asynchronous.

    Correct Answer
    B. Parity.
  • 10. 

    Which is a very simple example of an error detecting code?

    • A.

      Interrupt.

    • B.

      Parity bit.

    • C.

      Asynchronous.

    • D.

      Data integrity.

    Correct Answer
    B. Parity bit.
  • 11. 

    What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?

    • A.

      Network attached storage (NAS).

    • B.

      Storage area network (SAN).

    • C.

      Redundant array of independent disks (RAID).

    • D.

      Array storage.

    Correct Answer
    B. Storage area network (SAN).
  • 12. 

    What is an advantage of using a storage area network (SAN) architecture?

    • A.

      Ease of replacing the hard drive.

    • B.

      Ease of replacing network connectivity.

    • C.

      Ease of replacing server.

    • D.

      Multiple users can access the server at once.

    Correct Answer
    C. Ease of replacing server.
  • 13. 

    What is the connection type of choice for storage area networks (SAN)?

    • A.

      Fibre channel.

    • B.

      ATA over Ethernet (AoE).

    • C.

      Small computer system interface (SCSI).

    • D.

      Internet small computer system interface (iSCSI).

    Correct Answer
    A. Fibre channel.
  • 14. 

    Which storage device can be easily connected to a network and appears as a network drive?

    • A.

      Storage area network (SAN).

    • B.

      Redundant array of independent disks (RAID).

    • C.

      Network attached storage (NAS).

    • D.

      RHD.

    Correct Answer
    B. Redundant array of independent disks (RAID).
  • 15. 

    Which storage device has the means of providing data storage reliability using multiple hard drives?

    • A.

      Storage area network (SAN).

    • B.

      Network attached storage (NAS).

    • C.

      Small computer system interface (SCSI).

    • D.

      Redundant array of independent disks (RAID).

    Correct Answer
    D. Redundant array of independent disks (RAID).
  • 16. 

    The hard drives in a redundant array of independent disks (RAID) array are presented to the server as

    • A.

      One single hard drive.

    • B.

      A collection of hard drives.

    • C.

      A single RAID array.

    • D.

      A remote storage device.

    Correct Answer
    A. One single hard drive.
  • 17. 

    Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?

    • A.

      Small computer system interface (SCSI).

    • B.

      Serial attached (SAS) SCSI.

    • C.

      Serial advanced technology attachment (SATA).

    • D.

      Peripheral component interconnect express (PCIe).

    Correct Answer
    A. Small computer system interface (SCSI).
  • 18. 

    Which is not a characteristic of high-order languages?

    • A.

      They are nearly self-documenting.

    • B.

      They use English-like statements.

    • C.

      Source codes that are written closest to machine language.

    • D.

      Programs are transportable between computers with few changes.

    Correct Answer
    C. Source codes that are written closest to machine language.
  • 19. 

    What best describes programming machine code?

    • A.

      Another term for firmware.

    • B.

      Statements that correspond to complex actions.

    • C.

      Instructions in a form that is acceptable to the computer.

    • D.

      Source code that, when compiled, is appropriate for the computer.

    Correct Answer
    C. Instructions in a form that is acceptable to the computer.
  • 20. 

     Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?

    • A.

      Standard Generalized Markup Language (SGML).

    • B.

      Extensible Markup Language (XML).

    • C.

      HyperText Markup Language (HTML).

    • D.

      Dynamic HTML (DHTML).

    Correct Answer
    C. HyperText Markup Language (HTML).
  • 21. 

    Which Web application is most likely to succeed Hypertext Markup Language (HTML)?

    • A.

      Dynamic HTML (DHTML).

    • B.

      Extensible Markup Language (XML).

    • C.

      Standard Generalized Markup Language (SGML).

    • D.

      Extensible HTML (XHTML).

    Correct Answer
    D. Extensible HTML (XHTML).
  • 22. 

    A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a

    • A.

      Transport layer security (TLS).

    • B.

      Common gateway interface (CGI).

    • C.

      Data encryption standard (DES).

    • D.

      public key infrastructure (PKI).

    Correct Answer
    B. Common gateway interface (CGI).
  • 23. 

    Which protocol is commonly used for managing the security of a message transmission on the Internet?

    • A.

      Secure socket layer (SSL).

    • B.

      Public key infrastructure (PKI).

    • C.

      Data encryption standard (DES).

    • D.

      Transport layer security (TLS).

    Correct Answer
    A. Secure socket layer (SSL).
  • 24. 

    Which program can be used to automatically launch programs on a preset schedule?

    • A.

      Check disk.

    • B.

      Disk quotas.

    • C.

      Disk defragmenter.

    • D.

      Task scheduler.

    Correct Answer
    D. Task scheduler.
  • 25. 

    Which error-checking tool allows you to monitor the file system for errors?

    • A.

      Check disk.

    • B.

      Disk quotas.

    • C.

      Task scheduler.

    • D.

      Disk defragmenter.

    Correct Answer
    A. Check disk.
  • 26. 

    Which numbering system characteristic is the leftmost non-zero digit of a numeric value?

    • A.

      Least significant digit (LSD).

    • B.

      Most significant digit (MSD).

    • C.

      Exponent.

    • D.

      Radix.

    Correct Answer
    B. Most significant digit (MSD).
  • 27. 

    What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?

    • A.

      Preventive controls.

    • B.

      List of critical devices.

    • C.

      Recovery strategies.

    • D.

      Emergency action plans.

    Correct Answer
    D. Emergency action plans.
  • 28. 

    Which type of backup would you use at the end of the week to save all data that you select on your systems?

    • A.

      Incremental.

    • B.

      Differential.

    • C.

      Daily.

    • D.

      Normal.

    Correct Answer
    D. Normal.
  • 29. 

    Which type of backup will backup all files that have been altered in the last 24 hours?

    • A.

      Daily.

    • B.

      Normal.

    • C.

      Incremental.

    • D.

      Differential.

    Correct Answer
    A. Daily.
  • 30. 

    What is based around a central directory database containing information about all the domain controllers in the network?

    • A.

      Active directory.

    • B.

      Domains manager.

    • C.

      Domain name service (DNS).

    • D.

      Dynamic host configuration protocol (DHCP).

    Correct Answer
    A. Active directory.
  • 31. 

    What is a group of users, servers, and other resources that share a centralized database of account and security information?

    • A.

      Domain.

    • B.

      Forest.

    • C.

      Schema.

    • D.

      Tree.

    Correct Answer
    A. Domain.
  • 32. 

    Where does a copy of the active directory database reside?

    • A.

      Dynamic host configuration protocol (DHCP) servers.

    • B.

      Domain name service (DNS) servers.

    • C.

      Domain controllers.

    • D.

      Global catalog servers.

    Correct Answer
    C. Domain controllers.
  • 33. 

    What kind of server contains the master listing of all active directory objects in the forest?

    • A.

      Dynamic host configuration protocol (DHCP).

    • B.

      Domain controller.

    • C.

      Global catalog.

    • D.

      Member.

    Correct Answer
    C. Global catalog.
  • 34. 

    What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?

    • A.

      Access control lists.

    • B.

      Access policy objects.

    • C.

      Group policy objects.

    • D.

      Group rules sets.

    Correct Answer
    C. Group policy objects.
  • 35. 

    Which type of interface is friendlier for the average user to use?

    • A.

      Command line interface.

    • B.

      Graphical user interface.

    • C.

      Menu driven interface.

    • D.

      Palo Alto Research Center user interface.

    Correct Answer
    B. Graphical user interface.
  • 36. 

    Which of the following is not one of the elements that most graphical user interfaces are composed of?

    • A.

      Windows.

    • B.

      Icons.

    • C.

      Menus.

    • D.

      Programs.

    Correct Answer
    D. Programs.
  • 37. 

    Sitting at a computer and loading a software patch onto it is an example of what type of software patch?

    • A.

      Automatic.

    • B.

      Attended.

    • C.

      Unattended.

    • D.

      Remote.

    Correct Answer
    B. Attended.
  • 38. 

    Which type of patch would utilize a remote installation services (RIS)?

    • A.

      Automatic.

    • B.

      Local.

    • C.

      Manual.

    • D.

      Unattended.

    Correct Answer
    D. Unattended.
  • 39. 

    Which components of domain name service (DNS) contain a database of associated names and IP addresses?

    • A.

      Name servers.

    • B.

      Resolvers.

    • C.

      Resource records.

    • D.

      Forward lookup zone.

    Correct Answer
    A. Name servers.
  • 40. 

    Which query is made by one name server to another name server?

    • A.

      Dynamic host configuration protocol (DHCP) query.

    • B.

      Domain name service (DNS) query.

    • C.

      Recursive query.

    • D.

      Non-recursive query.

    Correct Answer
    D. Non-recursive query.
  • 41. 

    Which software program manages an IP address allocation for a network?

    • A.

      Dynamic host configuration protocol (DHCP).

    • B.

      Domain name service (DNS).

    • C.

      Active directory (AD).

    • D.

      DHCP server.

    Correct Answer
    A. Dynamic host configuration protocol (DHCP).
  • 42. 

    The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a

    • A.

      Pool.

    • B.

      Range.

    • C.

      Scope.

    • D.

      Zone.

    Correct Answer
    C. Scope.
  • 43. 

    What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?

    • A.

      One.

    • B.

      Two.

    • C.

      Three.

    • D.

      Five.

    Correct Answer
    A. One.
  • 44. 

    According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?

    • A.

      15 days.

    • B.

      30 days.

    • C.

      45 days.

    • D.

      60 days.

    Correct Answer
    B. 30 days.
  • 45. 

    What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?

    • A.

      Domain name service (DNS).

    • B.

      Internet information services (IIS).

    • C.

      Remote installation services (RIS).

    • D.

      Web.

    Correct Answer
    C. Remote installation services (RIS).
  • 46. 

    Which is not a component of Internet information services (IIS)?

    • A.

      FTP server.

    • B.

      Internet services manager.

    • C.

      Simple mail transport protocol (SMTP).

    • D.

      Simple network management protocol (SNMP).

    Correct Answer
    D. Simple network management protocol (SNMP).
  • 47. 

    What component of windows unifies and simplifies day to day system management tasks?

    • A.

      Domain name service (DNS).

    • B.

      Internet information services (IIS).

    • C.

      Microsoft management console (MMC).

    • D.

      Remote installation services (RIS).

    Correct Answer
    C. Microsoft management console (MMC).
  • 48. 

    Which type of group manages user’s rights assignments and access permissions?

    • A.

      Universal.

    • B.

      Distribution.

    • C.

      Security.

    • D.

      Access.

    Correct Answer
    C. Security.
  • 49. 

    Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?

    • A.

      Anonymous logon.

    • B.

      Everyone.

    • C.

      Network.

    • D.

      Interactive.

    Correct Answer
    D. Interactive.
  • 50. 

    What defines the rules by which operations can be performed on a particular resource?

    • A.

      Rights.

    • B.

      Permissions.

    • C.

      Access control lists

    • D.

      Hardware configuration.

    Correct Answer
    B. Permissions.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 23, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 25, 2011
    Quiz Created by
    Maldesto
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.