702 Hardware, Networking, Security, OS

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lauralew
L
Lauralew
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,704
| Attempts: 825 | Questions: 80
Please wait...
Question 1 / 80
0 %
0/100
Score 0/100
1. To prevent access to the BIOS setup utility, the Supervisior password can be set

Explanation

The statement is true because setting a Supervisor password is one of the ways to prevent access to the BIOS setup utility. The Supervisor password acts as a security measure, requiring anyone attempting to access the BIOS to enter the correct password. This helps to protect the system settings and configurations from unauthorized changes or tampering.

Submit
Please wait...
About This Quiz
702 Hardware, Networking, Security, OS - Quiz

This quiz titled '702 Hardware, Networking, Security, OS' assesses knowledge on hardware configurations, particularly focusing on PATA cables and US electrical outlets. It evaluates understanding of master\/slave setups... see morein PATA cables, memory module identification, and electrical wiring, essential for IT professionals. see less

2. Ipconfig /all displays IPA, Subnet Mask, Default Gateway, Computer name (Host), MAC address, DNS Server address

Explanation

The statement is true. When the command "ipconfig /all" is used in the command prompt, it displays various network configuration information including the IP address, subnet mask, default gateway, computer name (host), MAC address, and DNS server address.

Submit
3. BitLocker (Windows Vista Enterprise and Ultimate) encryptes and then store the encryption keys in the TPM CHIP (Trusted Platform Module)

Explanation

BitLocker, a feature available in Windows Vista Enterprise and Ultimate editions, indeed encrypts data and stores the encryption keys in the TPM chip (Trusted Platform Module). The TPM chip is a hardware component that provides secure storage and processing of sensitive information, such as encryption keys, ensuring that they are protected from unauthorized access. By utilizing the TPM chip, BitLocker enhances the security of the encrypted data by tying it to the specific hardware configuration of the device, making it more difficult for attackers to gain unauthorized access to the data.

Submit
4. To remember the function fo Tracert, think of it as Trace Route - traces the route a packet takes from you thru all the routers (hops) and then back to you

Explanation

The explanation for the given correct answer is that Tracert is a network diagnostic tool that traces the route a packet takes from the source to the destination. It sends out packets with increasing Time-To-Live (TTL) values and records the IP addresses of the routers (hops) that the packets pass through. This information helps in identifying any network issues or bottlenecks along the route. Therefore, the statement that Tracert traces the route a packet takes from the user through all the routers (hops) and then back to the user is true.

Submit
5. TCP is a connection-oriented protocol made from client to server. More reliable, as you know data will get to its destination unless the connection fails completely. If it gets lost, the server will re-request the lost part. 

Explanation

TCP (Transmission Control Protocol) is indeed a connection-oriented protocol that ensures reliable communication between a client and a server. It guarantees that data will reach its destination unless the connection is completely lost. In case of any lost data, the server will request the missing part to ensure the complete delivery of the information. Therefore, the statement "True" accurately describes the characteristics of TCP.

Submit
6. DSL uses telephone lines

Explanation

DSL (Digital Subscriber Line) is a technology that provides internet access over traditional telephone lines. It utilizes the existing copper telephone lines to transmit data signals, allowing users to access the internet without disrupting their telephone service. DSL works by dividing the telephone line into separate channels, with one channel dedicated to voice communication and the remaining channels used for data transmission. This enables users to simultaneously make phone calls and browse the internet. Therefore, the statement "DSL uses telephone lines" is true.

Submit
7. VOIP (Voice over IP)
Computers can be a telephone device over an ethernet connection. Skype is a good example.

Explanation

VOIP (Voice over IP) allows computers to function as telephone devices over an ethernet connection. Skype is a popular example of a VOIP service that enables users to make voice and video calls over the internet using their computers. Therefore, the statement "Computers can be a telephone device over an ethernet connection. Skype is a good example." is true.

Submit
8. IPConfig displays IPA, Subnet Mask, and Default Gateway

Explanation

IPConfig is a command-line tool used to display the IP address, subnet mask, and default gateway of a computer's network interface. This information is crucial for troubleshooting network connectivity issues and configuring network settings. Therefore, the given statement is true as IPConfig does indeed display the IP address, subnet mask, and default gateway.

Submit
9. DSL uses telephone lines

Explanation

DSL (Digital Subscriber Line) is a type of internet connection that uses existing telephone lines to transmit data. It utilizes the unused frequency range of the telephone lines to provide high-speed internet access. Therefore, the given statement that DSL uses telephone lines is true.

Submit
10. New in Windows Vista - Performance Monitor in Task Manager has a Performance Tab and then Resource Monitor - this gives a more detailed view of all processes for a longer time

Explanation

The statement is true because in Windows Vista, the Performance Monitor in Task Manager has a Performance Tab and Resource Monitor which provides a more detailed view of all processes for a longer duration. This allows users to monitor and analyze the performance of their system in a more comprehensive manner, enabling them to identify any bottlenecks or issues that may be affecting the overall performance of their computer.

Submit
11. For Remote Desktop Connection to work, the firewall settings must allow it

Explanation

To establish a Remote Desktop Connection, the firewall settings must be configured to allow it. This is because the firewall acts as a security measure to block unauthorized access to a computer network. By allowing Remote Desktop Connection through the firewall, it permits the necessary communication between the local and remote computers, enabling users to access and control a remote desktop from a different location. Therefore, the statement is true as the firewall settings play a crucial role in enabling Remote Desktop Connection functionality.

Submit
12. A combination of NTFS and share permissions give you what is called Effective Permissions

Explanation

A combination of NTFS and share permissions allows you to determine the effective permissions for a user or group. NTFS permissions control access to files and folders on a local computer, while share permissions control access to shared folders over a network. By combining these two types of permissions, you can determine the exact level of access that a user or group has to a particular resource.

Submit
13. SSH (Secure Shell) looks and acts the same as Telnet, but is an encrypted communication link.

Explanation

SSH (Secure Shell) is a network protocol that allows secure remote access to a computer or server. It provides a secure and encrypted communication link between the client and the server, ensuring that data transmitted over the network cannot be intercepted or tampered with. Telnet, on the other hand, is an unencrypted protocol that sends data in plain text, making it vulnerable to eavesdropping and unauthorized access. Therefore, the statement that SSH looks and acts the same as Telnet but is an encrypted communication link is true.

Submit
14. A STATEFUL firewall is what happens when particular ports are opened up for communication.  i.e. a request to Google and the response opens up a WebServer port, likely port 80

Explanation

A stateful firewall is a type of firewall that keeps track of the state of network connections and can allow or block traffic based on the context of the connection. In this case, the explanation states that when a request is made to Google and a response is received, a specific port (likely port 80, which is commonly used for web servers) is opened up for communication. This aligns with the definition of a stateful firewall, making the statement true.

Submit
15. Permissions are inherited from the parent object

Explanation

Permissions being inherited from the parent object means that any permissions assigned to the parent object will automatically apply to its child objects. In other words, if a user has certain permissions on a parent object, they will also have those same permissions on any child objects underneath it. This allows for easier management of permissions, as changes made at the parent level will automatically propagate down to all child objects. Therefore, the correct answer is true.

Submit
16. Hidden shares are indicated by the $.  i.e. C$

Explanation

Hidden shares in Windows operating systems are denoted by a dollar sign ($) at the end of the share name. These hidden shares are not visible when browsing the network, but they can still be accessed by directly entering the share name in the file explorer or by using the UNC path. Therefore, the statement "Hidden shares are indicated by the $." is true.

Submit
17. TCP and UDP ports can be any number between 0 and 65,535.

Explanation

The statement is true because TCP and UDP ports can indeed be any number between 0 and 65,535. This range allows for a large number of ports to be used for various network communication purposes. The port number is used to identify specific processes or services that are running on a device, and the range of 0-65,535 provides enough options to accommodate a wide range of applications.

Submit
18. 802.11 is the IEEE standard

Explanation

The given answer is true because 802.11 is indeed the IEEE standard for wireless local area networks (WLANs). This standard specifies the protocols and technologies used for wireless communication between devices such as computers, smartphones, and routers. It defines various versions of Wi-Fi, including 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac, each with different capabilities and speeds. Overall, 802.11 has become the widely adopted standard for wireless networking, making the given answer correct.

Submit
19. ISDN is a precursor to DSL

Explanation

ISDN (Integrated Services Digital Network) is indeed a precursor to DSL (Digital Subscriber Line). ISDN was a telecommunications technology that allowed the transmission of voice, video, and data over existing telephone lines. It provided faster and more reliable connections compared to traditional analog modems. However, DSL technology was developed later and offered even faster internet speeds over the same telephone lines. DSL utilized higher frequencies and advanced modulation techniques to achieve higher data transmission rates. Therefore, it can be concluded that ISDN paved the way for the development of DSL technology.

Submit
20. Regarding permissions, the most restrictive wins

Explanation

This statement means that when it comes to permissions, the most restrictive permission takes precedence over less restrictive ones. In other words, if there are multiple permissions set for a certain action or resource, the permission with the most limitations or restrictions will be enforced. This ensures that the highest level of security and control is maintained by prioritizing the most restrictive permission settings.

Submit
21. Devices can be disabled in the BIOS to prevent unauthorized use

Explanation

In the BIOS (Basic Input/Output System) settings of a device, there is an option to disable certain functionalities or components. This can be done to prevent unauthorized use of the device. By disabling specific devices in the BIOS, such as USB ports or network adapters, it becomes more difficult for unauthorized users to gain access to the device or its data. This security measure is commonly used in organizations or institutions where there is a need to restrict access to certain features of the device.

Submit
22. A NAT is a device (i.e. Netgear Firewall Router) that assigns ip addresses to all other devices withing the network (i.e. SOHO) but in turn provides only one ip address for all to the internet.

Explanation

A NAT (Network Address Translation) is a device, such as a Netgear Firewall Router, that assigns unique IP addresses to all devices within a network, typically a small office or home office (SOHO) network. However, when these devices communicate with the internet, the NAT provides only one IP address for all devices, allowing them to share a single public IP address. This helps conserve IPv4 addresses and adds an extra layer of security by hiding the individual device IP addresses from the internet. Therefore, the statement "A NAT is a device that assigns IP addresses to all other devices within the network but provides only one IP address for all to the internet" is true.

Submit
23. UDP (User Datagram Protocol) is a message-based connectionless protocol. It is less reliable than TCP because you don't know if the data you sent actually gets there.

Explanation

UDP (User Datagram Protocol) is indeed a message-based connectionless protocol. Unlike TCP, which ensures reliable delivery of data by establishing a connection and providing error-checking mechanisms, UDP does not guarantee delivery or verify if the data sent actually reaches the intended recipient. This lack of reliability makes UDP suitable for applications that prioritize speed and efficiency over data integrity, such as real-time streaming or online gaming. Therefore, the statement "UDP is less reliable than TCP because you don't know if the data you sent actually gets there" is true.

Submit
24. DSL downloads are faster than uploads

Explanation

DSL (Digital Subscriber Line) is a type of internet connection that uses existing telephone lines to transmit data. The download speed refers to the rate at which data is received from the internet, while the upload speed refers to the rate at which data is sent to the internet. In the case of DSL, the download speed is typically faster than the upload speed. This is because most users tend to download more data (such as streaming videos, downloading files) than they upload (such as sending emails or uploading files). Therefore, the statement that DSL downloads are faster than uploads is true.

Submit
25. The User Password in CMOS prevents unauthorized individuals to boot up the computer.

Explanation

The User Password in CMOS is a security feature that prevents unauthorized individuals from booting up the computer. It acts as a barrier by requiring a password to be entered before the computer can start up. This ensures that only authorized users have access to the system and protects sensitive data from being accessed or modified by unauthorized individuals. Therefore, the statement is true.

Submit
26. With DSL, the farther you are away from the office the slower you are.

Explanation

This statement is true because DSL (Digital Subscriber Line) technology uses copper wires to transmit data signals. As the distance between the DSL modem and the central office increases, the signal strength decreases, resulting in slower internet speeds. Therefore, the farther you are away from the office, the slower your DSL connection will be.

Submit
27. To rebuild the boot sector, boot to install CD and use recovery console:
Fixboot C: is the command

Explanation

To rebuild the boot sector, one can boot to the installation CD and use the recovery console. The command "Fixboot C:" is used to fix the boot sector on the C: drive. Therefore, the given statement is true.

Submit
28. For FTP the logon name is usually defaulted to 'Anonymous'

Explanation

FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a client and a server on a computer network. When logging into an FTP server, the logon name is often defaulted to 'Anonymous'. This means that users can log in without providing a specific username or password. This feature is commonly used for public FTP servers that allow anonymous access to publicly available files. Therefore, the given statement is true.

Submit
29. Ethernet is based on the IEEE 802.3 standard

Explanation

Ethernet is a networking technology that is widely used for local area networks (LANs). It is based on the IEEE 802.3 standard, which defines the physical and data link layers of the Ethernet protocol. This standard specifies the characteristics and specifications for Ethernet networks, including the type of cables, connectors, and signaling used. Therefore, the statement "Ethernet is based on the IEEE 802.3 standard" is true.

Submit
30. New to Windows Vista and Task Manager - the Services Tab is added

Explanation

The explanation for the correct answer "True" is that in Windows Vista, the Services Tab is indeed added to the Task Manager. This new feature allows users to view and manage the services running on their computer, providing more control and visibility over system processes.

Submit
31. How do you copy a new copy of NTLDR?

Explanation

To copy a new copy of NTLDR, you need to use the Install CD or Recovery Console. By selecting the "R" option for repair, you can access the Recovery Console. From there, you can navigate to the D drive and copy the i386 folder to obtain a new copy of NTLDR.

Submit
32. True or False?
NTFS permissions apply to local and network network connections

Explanation

NTFS permissions indeed apply to both local and network connections. NTFS (New Technology File System) is a file system used by Windows operating systems. It provides a way to control access and permissions for files and folders. These permissions can be applied to both local drives and network drives, allowing administrators to manage access rights for users accessing files and folders on both local and network connections.

Submit
33. Telnet is an unencrypted communication.

Explanation

Telnet is an unencrypted communication protocol that allows users to remotely access and manage devices or systems over a network. This means that any data transmitted through Telnet is not secured and can be intercepted by malicious actors. It is recommended to use encrypted protocols like SSH (Secure Shell) instead of Telnet to ensure the confidentiality and integrity of the communication.

Submit
34. If you move a folder to a different folder on the same drive, the permissions do not change from the old folder.

Explanation

When a folder is moved to a different folder on the same drive, the permissions associated with the original folder are retained. This means that the permissions do not change and remain the same as they were in the old folder. Therefore, the answer is true.

Submit
35. What is BitLocker?

Explanation

BitLocker is a feature in Windows Vista Enterprise and Ultimate that allows users to encrypt entire volumes. This means that all the data stored on the volume is protected and can only be accessed with the appropriate encryption key. BitLocker provides an added layer of security for sensitive information, ensuring that it remains confidential and protected from unauthorized access.

Submit
36. ISDN is dial-up

Explanation

ISDN (Integrated Services Digital Network) is a telecommunications network that allows digital transmission of voice, video, and data over traditional telephone lines. It is a dial-up technology because it requires the establishment of a connection between two devices through the use of a telephone line and modem. This connection is initiated by dialing a specific phone number. Therefore, the statement "ISDN is dial-up" is true as it accurately describes the nature of ISDN technology.

Submit
37. Which technology can transmit telephone calls over packet-based networks?

Explanation

VOIP (Voice over Internet Protocol) is the correct answer because it is a technology that enables the transmission of telephone calls over packet-based networks, such as the internet. It converts voice signals into digital data packets and sends them over IP networks, allowing for cost-effective and efficient communication. Skype is a specific software application that uses VOIP technology, but it is not the only option available. NetOP is not a recognized technology for transmitting telephone calls over packet-based networks.

Submit
38. Share permissions only apply to connections over the network

Explanation

Share permissions are used to control access to shared resources, such as files and folders, over a network. These permissions determine what actions users can perform on the shared resource when accessing it remotely. They do not apply to local access or direct access to the resource. Therefore, share permissions only apply to connections made over the network, making the statement "Share permissions only apply to connections over the network" true.

Submit
39. Which protocol is used to automatically assign TCP/IP configuration information?

Explanation

DHCP (Dynamic Host Configuration Protocol) is used to automatically assign TCP/IP configuration information. DHCP allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration parameters automatically. This eliminates the need for manual configuration of network settings, making it convenient for users and administrators. DNS (Domain Name System) is responsible for translating domain names into IP addresses, while NetBIOS (Network Basic Input/Output System) is an older protocol used for communication between computers on a local network.

Submit
40. How can you confirm the operation of a device?

Explanation

Device Manager / Device Properties is the correct answer because it allows you to view and manage the hardware devices installed on your computer. By accessing the Device Manager, you can check the status of a device, view its properties, and troubleshoot any issues that may be affecting its operation. This tool provides detailed information about the devices connected to your computer, allowing you to confirm their proper functioning. Control Panel and Event Viewer are not specifically designed for device management and do not provide the same level of control and information as Device Manager / Device Properties.

Submit
41. What command line tool sends a request to a another device and receives a reply back?

Explanation

Ping is a command line tool that sends a request, known as an ICMP Echo Request, to another device on a network and waits for a reply, known as an ICMP Echo Reply. This tool is commonly used to test network connectivity and determine the round-trip time for data packets to travel between devices. Therefore, Ping is the correct answer as it accurately describes the command line tool that sends a request and receives a reply back from another device.

Submit
42. What is one method for moving a stuck print job out of the queue and onto the printer?

Explanation

One method for moving a stuck print job out of the queue and onto the printer is to restart the print spooler service. The print spooler service is responsible for managing print jobs in the queue, and restarting it can help resolve any issues or errors that may be causing the job to get stuck. By restarting the print spooler service, it refreshes the system and allows the print job to be processed and sent to the printer successfully.

Submit
43. What does the TTL result in the PING command define? (TTL=52)

Explanation

The TTL (Time to Live) result in the PING command defines a timer value included in packets sent over TCP/IP-based networks. This value tells the recipients how long to hold or use the packet or any of its included data before expiring and discarding the packet or data.

Submit
44. What command line interface allows you to lookup a device DNS name and see what its IPA is?

Explanation

NSLookup is the correct answer because it is a command line interface that allows you to lookup a device DNS name and see what its IP address (IPA) is. This tool is commonly used for troubleshooting network connectivity and DNS-related issues by querying DNS servers to retrieve information about domain names and IP addresses. Tracert is used to trace the route that packets take to reach a destination, while Netstat displays active network connections and listening ports.

Submit
45. What Web communication protocol provides encryption and shows a small lock in the corner of your browser?

Explanation

HTTPS (Hypertext Transfer Protocol Secure) is the correct answer. It is a web communication protocol that provides encryption, ensuring secure transmission of data between a web browser and a website. The small lock symbol in the corner of the browser indicates that the website is using HTTPS and the connection is secure. This protocol is commonly used for secure online transactions, such as online banking, shopping, and sensitive data transfers.

Submit
46. How do you remember the 40-wire / 80-wire Master/Slave configuration?

Explanation

The correct answer explains that in newer configurations, the 80-wire setup is used. To remember this, one can pretend that the center is the safest choice and that Slaves have the first choice. This mnemonic device helps to recall the correct configuration for the 80-wire Master/Slave setup.

Submit
47. What does Fixboot C: do?

Explanation

Fixboot C: is a command used in the Windows operating system to repair the boot sector on the C: partition. The boot sector is a critical part of the hard drive that contains essential information for the computer to start up. By overwriting the boot sector, Fixboot C: can fix issues related to booting up the system, such as missing or corrupted files. This command does not rebuild the entire hard drive or NTLDR (the boot loader for Windows NT operating systems), but specifically focuses on repairing the boot sector on the C: partition.

Submit
48. Which Task Manager tab contains global memory information?

Explanation

The Performance Monitor tab in Task Manager contains global memory information. This tab provides detailed information about the memory usage on the system, including the total amount of physical memory, the amount of memory currently in use, and the amount of memory available. It also displays information about the memory usage of individual processes and allows users to monitor and analyze memory performance in real-time.

Submit
49. What is CPU burnin?

Explanation

CPU burnin is a theory that involves using software to continuously stress a CPU for an extended period of time, typically 12-14 hours. The purpose of this process is to test the CPU's maximum performance capabilities and ensure that it can operate at its peak level without any issues or failures. By subjecting the CPU to prolonged high-intensity workloads, any potential weaknesses or flaws in its design can be identified and addressed. This helps ensure that the CPU is reliable and can perform optimally under heavy usage conditions.

Submit
50. What are the two address translation processes provided by a NAT (router/firewall)?

Explanation

SNAT (Source NAT) is a process provided by a NAT (Network Address Translation) router/firewall that converts a large number of internal IP addresses (IPAs) to one external IP address. This allows multiple devices within a network to share a single public IP address when communicating with external networks.

DNAT (Destination NAT) is another process provided by a NAT router/firewall that converts external IP addresses to internal IP addresses. This allows incoming packets from external networks to be correctly routed to the appropriate internal device based on the destination IP address.

These two address translation processes work together to enable communication between devices on a private network and external networks while preserving the limited availability of public IP addresses.

Submit
51. What command line allows you to determine how many hops (routers) a data packet when thru to be sent and then received back, including response times?

Explanation

Tracert is the correct answer because it is a command line tool that allows you to determine the number of hops (routers) a data packet goes through to be sent and then received back. It also provides information about the response times of each hop, helping to diagnose network connectivity issues. Netstat is a command line tool used for displaying active network connections and listening ports, while ipconfig is used for displaying the IP configuration of a network interface.

Submit
52. At what speed does Bluetooth 2.0 run?

Explanation

Bluetooth 2.0 runs at a speed of 3 Mbps. This means that it can transfer data at a rate of 3 million bits per second. This high speed allows for faster and more efficient data transmission between devices. With this speed, Bluetooth 2.0 is capable of supporting various applications such as audio streaming, file sharing, and wireless printing.

Submit
53. Where can Remote Desktop Connection be found?

Explanation

Remote Desktop Connection can be found in the "All Programs / Accessories / Remote Desktop" menu. This is a common location for system utilities and tools in Windows operating systems. By navigating to this menu, users can easily access and launch the Remote Desktop Connection application for establishing remote desktop connections to other computers.

Submit
54. What is the standard specification that allows an operating system to communicate with, and to control the power distribution to peripherals, such as hard drives.

Explanation

ACPI stands for Advanced Configuration and Power Interface. It is a standard specification that enables an operating system to communicate with and control the power distribution to peripherals, including hard drives. ACPI allows the operating system to manage power resources efficiently by providing features such as power management, device configuration, and system control. It is widely used in modern computer systems to ensure optimal power usage and control over peripherals.

Submit
55. Invalid partition table
Error loading operating system
Missing operating system
Operating system not found
The above startup errors point to what problem?

Explanation

The given startup errors, such as "Invalid partition table," "Error loading operating system," and "Missing operating system," all indicate issues with the boot sector. The boot sector is a critical part of the hard drive that contains the necessary instructions for the computer to start up properly. If there are problems in the boot sector, it can result in the computer being unable to find or load the operating system, leading to these errors.

Submit
56. What command line interface allows you to see what active connections your computer is using?

Explanation

Netstat is a command line interface that allows users to see the active connections their computer is using. It provides information about the network connections, including the local and foreign addresses, protocol, state, and more. By using netstat, users can monitor network activities, identify open ports, and troubleshoot network issues. NSLookup is used to query DNS servers for IP address information, while Tracert is used to trace the route taken by packets across an IP network.

Submit
57. What are three ways to start Task Manager?

Explanation

Three ways to start Task Manager are by pressing Ctrl-Alt-Del, right-clicking the taskbar, or using the shortcut Ctrl-Shift-Esc.

Submit
58. Which wireless standards operates in the 5 GHz range and has speeds up to 54 Mbit/s?

Explanation

802.11a operates in the 5 GHz range and has speeds up to 54 Mbit/s. This wireless standard uses orthogonal frequency-division multiplexing (OFDM) to transmit data over multiple channels simultaneously, allowing for higher data rates. It is capable of providing faster and more reliable connections compared to the 802.11b standard, which operates in the 2.4 GHz range and has slower speeds. 802.11n is a newer standard that also operates in the 2.4 GHz and 5 GHz range, but it can achieve higher speeds than 802.11a, reaching up to 600 Mbit/s.

Submit
59. Choose two ways to access System restore in Windows XP

Explanation

The correct answer is "Control Panel / System / System Restore" and "All Programs / Accessories / System Tools / System Restore". These are two different ways to access the System Restore feature in Windows XP. The first method involves navigating through the Control Panel and accessing the System menu, where the System Restore option can be found. The second method involves going to the All Programs menu, then Accessories, then System Tools, and finally selecting the System Restore option. Both methods lead to the same System Restore feature, allowing users to restore their computer to a previous state.

Submit
60. A 40-wire PATA cable allows for which Slave / Master configuration?

Explanation

A 40-wire PATA cable allows for the configuration where the master device is connected in the center of the cable and the slave device is connected on the end of the cable. This configuration is commonly used in older computer systems that use Parallel ATA (PATA) technology to connect devices such as hard drives and optical drives. The master device is typically the primary device, while the slave device is the secondary device. This configuration allows for proper communication and data transfer between the devices.

Submit
61. Which suite of commands provides information about the Windows network?

Explanation

The NET suite of commands provides information about the Windows network. These commands can be used to view network connections, display network statistics, and manage network resources. NETUSE is not a valid command and does not provide network information. Similarly, NETOP is also not a valid command for obtaining network information.

Submit
62. Where can you find BSOD information after you've rebooted?

Explanation

After experiencing a Blue Screen of Death (BSOD) and rebooting the system, you can find BSOD information in the Event Viewer. Event Viewer logs various system events, including critical errors like BSODs. It provides detailed information about the error, such as the error code, timestamp, and other relevant data. By accessing the Event Viewer, users can analyze the BSOD information and troubleshoot the underlying causes of the crash.

Submit
63. Identify the Hot prong on a US electrical outle

Explanation

The hot prong on a US electrical outlet is identified as the upper right (smaller) prong. This is because in the US, electrical outlets follow a standard configuration known as "polarized" plugs, where the wider slot is the neutral prong and the narrower slot is the hot prong. The upper right slot is smaller, indicating that it is the hot prong.

Submit
64. An 80-wire PATA cable allows for which Slave/Master configuration?

Explanation

An 80-wire PATA cable allows for the Slave in the Center / Master on the end configuration because it has a specific design that enables the transfer of data between the devices connected to it. The center connector is used for the slave device, while the end connector is used for the master device. This configuration ensures proper communication and data transfer between the two devices.

Submit
65. What is a significant configuration consideration for a workstation when using proxies?

Explanation

When using proxies on a workstation, it is important to consider that each application must be configured to use the proxy. This means that the proxy settings need to be manually configured for each individual application that requires internet access. Simply having a proxy connection set up on Internet Explorer will not automatically apply the proxy settings to other applications on the workstation. Therefore, it is necessary to configure each application separately to ensure that they use the proxy for their internet communication.

Submit
66. What laptop switch togges between the Video output and the LCD?

Explanation

The correct answer is "LCD switch." This suggests that there is a specific switch on the laptop that toggles between the video output and the LCD screen. This switch allows the user to choose whether they want the display to be shown on an external monitor or on the laptop's built-in LCD screen.

Submit
67. At what speed does Bluetooth 1.0 run?

Explanation

Bluetooth 1.0 runs at a speed of 1 Mbps.

Submit
68. NTLDR is missing
NTLDR is compressed
A disk read error occurred
The above errors point to what problem?

Explanation

The given errors, "NTLDR is missing," "NTLDR is compressed," and "A disk read error occurred," all indicate issues with the OS system boot files. The NTLDR (NT Loader) is a crucial file for the Windows operating system's boot process. If it is missing or compressed, the system will not be able to start properly. Additionally, a disk read error suggests a problem with accessing the boot sector, which contains essential information for booting the OS. Therefore, the correct answer is "OS system boot file errors."

Submit
69. What type of current comes from the Power company?

Explanation

Direct current (DC) is the type of current that comes from the power company. Unlike alternating current (AC), which periodically changes direction, direct current flows continuously in one direction. This is the type of current commonly used in batteries and electronic devices. It is often preferred for applications that require a steady and constant flow of electricity, such as in certain industrial processes or for powering sensitive electronic equipment.

Submit
70. What are two ways to access System Information?

Explanation

The correct answer is "msinfo32" and "All Programs / Accessories / System Tools / System Information". These are two different methods to access the System Information on a computer. The first method involves directly typing "msinfo32" in the Run dialog box or the search bar, which opens the System Information window. The second method requires navigating through the Control Panel and accessing the System Information tool under the System Tools or Accessories section. Both methods provide access to the System Information, allowing users to view detailed information about their computer's hardware, software, and system components.

Submit
71. What is the name of the special little chip in every memory module that provides information about the memory module?

Explanation

The special little chip in every memory module that provides information about the memory module is called SPD (Serial Presence Detect). This chip stores vital information such as the module's manufacturer, size, speed, voltage, and timing parameters. This information is crucial for the system to properly recognize and configure the memory module. The SPD chip is accessed by the system during the boot process to ensure optimal performance and compatibility.

Submit
72. Which utility provides a consolidated view of sysem resources?

Explanation

Resource Monitor provides a consolidated view of system resources. It allows users to monitor and analyze the usage of CPU, memory, disk, and network resources in real-time. It provides detailed information about each resource, including the processes and services that are utilizing them. With Resource Monitor, users can identify resource bottlenecks, troubleshoot performance issues, and optimize system performance. It is a powerful tool for system administrators and advanced users to gain insights into resource usage and make informed decisions to improve system efficiency.

Submit
73. Identify the Neutral prong on a US electrical outlet

Explanation

The neutral prong on a US electrical outlet is typically identified by the upper left position, which is also bigger in size compared to the other prongs. This prong is responsible for carrying the return current from the electrical device back to the power source.

Submit
74. What program or protocol allows you to remotely access a device in a console mode?

Explanation

Telnet is a program or protocol that enables remote access to a device in console mode. It allows users to establish a connection to a remote device and access its command-line interface. Through Telnet, users can remotely manage and control the device, execute commands, configure settings, and troubleshoot issues. This makes it a valuable tool for system administrators and network engineers who need to remotely access and manage devices without physically being present at the location.

Submit
75. What is the Windows Vista feature that allows you to configure what devices will use autorun?

Explanation

The correct answer is Control Panel > Auto Play. Auto Play is a Windows Vista feature that allows users to configure which devices will use the autorun functionality. This feature can be accessed through the Control Panel settings.

Submit
76. Which wireless standard operated in the 2.4 GHz range and has speeds up to 11 Mbit/s?

Explanation

802.11g is the correct answer because it is a wireless standard that operates in the 2.4 GHz range and has speeds up to 11 Mbit/s. 802.11n operates in both the 2.4 GHz and 5 GHz range, and has higher speeds than 11 Mbit/s. 802.11a operates in the 5 GHz range and also has higher speeds than 11 Mbit/s. Therefore, 802.11g is the only option that fits the given criteria.

Submit
77. What command line interface is used to update, fix, or view the device and network or network settings?

Explanation

NETUSE is not the correct answer for this question. The correct answer is NET, which is a command line interface used to update, fix, or view the device and network settings. NETUSE is not a valid command line interface. NETSTAT is also a command line interface, but it is used to display active network connections and listening ports, not to update or fix network settings.

Submit
78. How do you re-configure Windows Vista UAC?

Explanation

To re-configure Windows Vista UAC, you need to access the Control Panel, then navigate to the Administrative Tools section, and finally open the Local Security Policy Console. This console allows you to modify the settings related to User Account Control (UAC) in Windows Vista.

Submit
79. What are the startup options on the Windows Vista Install Disk?

Explanation

The startup options on the Windows Vista Install Disk include Startup/Repair, System Restore, Windows Complete PC Restore, Windows Memory Diagnostic Tool, Command Prompt, and Safe Mode. These options are available to users during the installation process and can be used to troubleshoot and repair various issues with the operating system. Startup/Repair is used to automatically fix problems that prevent Windows from starting, System Restore allows users to restore their computer to a previous working state, Windows Complete PC Restore is used to restore a full system backup, Windows Memory Diagnostic Tool is used to check for memory problems, Command Prompt provides a command-line interface for advanced troubleshooting, and Safe Mode starts Windows with a minimal set of drivers and services for troubleshooting purposes.

Submit
80. Choose two ways to access System restore in Windows Vista

Explanation

The correct answer is "All Programs / Accessories / System Tools / System Restore" and "Control Panel / System / System Protection". These are two different ways to access the System Restore feature in Windows Vista. The first method involves navigating through the start menu by clicking on "All Programs", then "Accessories", then "System Tools", and finally selecting "System Restore". The second method involves accessing the Control Panel, then clicking on "System", and finally selecting either "System Restore" or "System Protection" depending on the version of Windows Vista. Both methods allow users to access the System Restore feature and restore their system to a previous state.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 30, 2010
    Quiz Created by
    Lauralew
Cancel
  • All
    All (80)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
To prevent access to the BIOS setup utility, the Supervisior password...
Ipconfig /all displays IPA, Subnet Mask, Default Gateway, Computer...
BitLocker (Windows Vista Enterprise and Ultimate) encryptes and then...
To remember the function fo Tracert, think of it as Trace Route -...
TCP is a connection-oriented protocol made from client to server. More...
DSL uses telephone lines
VOIP (Voice over IP)Computers can be a telephone device over an...
IPConfig displays IPA, Subnet Mask, and Default Gateway
DSL uses telephone lines
New in Windows Vista - Performance Monitor in Task Manager has a...
For Remote Desktop Connection to work, the firewall settings must...
A combination of NTFS and share permissions give you what is called...
SSH (Secure Shell) looks and acts the same as Telnet, but is an...
A STATEFUL firewall is what happens when particular ports are opened...
Permissions are inherited from the parent object
Hidden shares are indicated by the $.  i.e. C$
TCP and UDP ports can be any number between 0 and 65,535.
802.11 is the IEEE standard
ISDN is a precursor to DSL
Regarding permissions, the most restrictive wins
Devices can be disabled in the BIOS to prevent unauthorized use
A NAT is a device (i.e. Netgear Firewall Router) that assigns ip...
UDP (User Datagram Protocol) is a message-based connectionless...
DSL downloads are faster than uploads
The User Password in CMOS prevents unauthorized individuals to boot up...
With DSL, the farther you are away from the office the slower you are.
To rebuild the boot sector, boot to install CD and use recovery...
For FTP the logon name is usually defaulted to 'Anonymous'
Ethernet is based on the IEEE 802.3 standard
New to Windows Vista and Task Manager - the Services Tab is added
How do you copy a new copy of NTLDR?
True or False?NTFS permissions apply to local and network network...
Telnet is an unencrypted communication.
If you move a folder to a different folder on the same drive, the...
What is BitLocker?
ISDN is dial-up
Which technology can transmit telephone calls over packet-based...
Share permissions only apply to connections over the network
Which protocol is used to automatically assign TCP/IP configuration...
How can you confirm the operation of a device?
What command line tool sends a request to a another device and...
What is one method for moving a stuck print job out of the queue and...
What does the TTL result in the PING command define? (TTL=52)
What command line interface allows you to lookup a device DNS name and...
What Web communication protocol provides encryption and shows a small...
How do you remember the 40-wire / 80-wire Master/Slave configuration?
What does Fixboot C: do?
Which Task Manager tab contains global memory information?
What is CPU burnin?
What are the two address translation processes provided by a NAT...
What command line allows you to determine how many hops (routers) a...
At what speed does Bluetooth 2.0 run?
Where can Remote Desktop Connection be found?
What is the standard specification that allows an operating system to...
Invalid partition tableError loading operating systemMissing operating...
What command line interface allows you to see what active connections...
What are three ways to start Task Manager?
Which wireless standards operates in the 5 GHz range and has speeds up...
Choose two ways to access System restore in Windows XP
A 40-wire PATA cable allows for which Slave / Master configuration?
Which suite of commands provides information about the Windows...
Where can you find BSOD information after you've rebooted?
Identify the Hot prong on a US electrical outle
An 80-wire PATA cable allows for which Slave/Master configuration?
What is a significant configuration consideration for a workstation...
What laptop switch togges between the Video output and the LCD?
At what speed does Bluetooth 1.0 run?
NTLDR is missingNTLDR is compressedA disk read error occurredThe above...
What type of current comes from the Power company?
What are two ways to access System Information?
What is the name of the special little chip in every memory module...
Which utility provides a consolidated view of sysem resources?
Identify the Neutral prong on a US electrical outlet
What program or protocol allows you to remotely access a device in a...
What is the Windows Vista feature that allows you to configure what...
Which wireless standard operated in the 2.4 GHz range and has speeds...
What command line interface is used to update, fix, or view the device...
How do you re-configure Windows Vista UAC?
What are the startup options on the Windows Vista Install Disk?
Choose two ways to access System restore in Windows Vista
Alert!

Advertisement