CompTIA Strata Practice Exam 1

By Delano Vasquez
Delano Vasquez, Educator & Trainer
Denalo is an accomplished educator with over 20 years of teaching and training in technology. As an entrepreneur for 25+ years, he's excelled in technology, real estate, and sales. Additionally, Denalo serves as a Real Estate Broker, specializing in various real estate transactions and investments.
Quizzes Created: 1 | Total Attempts: 177
, Educator & Trainer
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
Questions: 90 | Attempts: 177

SettingsSettingsSettings
IT Fundamentals Quizzes & Trivia

Strata practice exam, questions 10/12/11


Questions and Answers
  • 1. 

    Step 1 - Talk to the customer Step 2 - Document your work Step 3 - Continue to gather information Step 4 - Eliminate possibilities to find the problem Step 5 - Test your results

  • 2. 

    You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.

    • A.

      Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B.

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.

    • C.

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drive is on the primary contoller. Designate the second hard disk drive as Slave.

    • D.

      Install both the hard disk drives on the primary IDE controller. Deignate both drives as Secondary

    Correct Answer(s)
    A. Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
    B. Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.
    Explanation
    The correct answers are both options mentioned. In the first option, installing the second hard drive on the primary IDE controller and designating one drive as Master and the other as Slave allows for proper configuration and communication between the drives. In the second option, installing the second hard disk drive on the secondary IDE controller and ensuring that the first hard disk drive is on the primary IDE controller, while designating both drives as Master, also allows for proper configuration and communication between the drives.

    Rate this question:

  • 3. 

    Which of the following maximum resolutions does the UXGA video technology supports?

    • A.

      2560 x 1600

    • B.

      1600 x 1200

    • C.

      2048 x 1536

    • D.

      1280 x 1024

    Correct Answer
    B. 1600 x 1200
    Explanation
    UXGA video technology supports a maximum resolution of 1600 x 1200.

    Rate this question:

  • 4. 

    Which of the following sleep modes is the most power hungry mode?

    • A.

      S1

    • B.

      S2

    • C.

      S0

    • D.

      S3

    Correct Answer
    A. S1
    Explanation
    S1 is the most power hungry sleep mode because it is the deepest sleep mode where the processor is completely powered off. In this mode, all the processor's caches and registers are flushed, and the voltage to the processor is turned off, resulting in the lowest power consumption. However, it takes more time and power to wake up from this mode compared to other sleep modes.

    Rate this question:

  • 5. 

    Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?

    • A.

      /p

    • B.

      /s

    • C.

      /r

    • D.

      /o

    Correct Answer
    D. /o
    Explanation
    The /o switch of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files. This means that when using the /o switch, the copied files will retain the same ownership and NTFS permissions as the original files.

    Rate this question:

  • 6. 

    Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.

    • A.

      It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.

    • B.

      It is a device that works as an interface between a computer and a network.

    • C.

      It is a device that routes data packets between computers in different networks

    • D.

      It is a device that contains a microprocessor and permanent memory.

    Correct Answer(s)
    A. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.
    D. It is a device that contains a microprocessor and permanent memory.
    Explanation
    A smart card is a device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption. This means that it can securely store sensitive information and perform cryptographic operations, making it a secure solution for authentication and data protection.

    Rate this question:

  • 7. 

    Which of the following ports is also known as PS/2

    • A.

      6 - pin Mini-Din connector

    • B.

      5- pin DIN connector

    • C.

      4 - pin Mini-Din connector

    • D.

      USB connector

    Correct Answer
    A. 6 - pin Mini-Din connector
    Explanation
    The 6-pin Mini-Din connector is also known as PS/2.

    Rate this question:

  • 8. 

    Which of the following statements are true about USB? Choose two

    • A.

      USB supports hot plugging

    • B.

      You can connect up to 127 peripheral devices to a single USB port

    • C.

      You can connect up to 16 peripheral devices to a single USB port

    • D.

      USB does not support plug n play installation

    Correct Answer(s)
    A. USB supports hot plugging
    B. You can connect up to 127 peripheral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. Additionally, you can connect up to 127 peripheral devices to a single USB port, allowing for a high level of connectivity and versatility.

    Rate this question:

  • 9. 

    Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?

    • A.

      Min in the middle attack

    • B.

      Denial of service (DoS) attack

    • C.

      Buffer overflow attack

    • D.

      Shoulder surfing attack

    Correct Answer
    D. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an unauthorized person trying to gain access to sensitive information by visually observing the victim's actions, such as passwords or confidential data, without their knowledge or consent. It is a form of social engineering that relies on exploiting human vulnerabilities and lack of awareness regarding privacy and security.

    Rate this question:

  • 10. 

    You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?

    • A.

      His operating system is incompatible.

    • B.

      A firewall is blocking him

    • C.

      His laptop is incompatable

    • D.

      MAC filtering is blocking him

    Correct Answer
    D. MAC filtering is blocking him
    Explanation
    The problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is not on the approved list, it is being blocked from accessing the network.

    Rate this question:

  • 11. 

    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

    • A.

      Session initiation Protocol

    • B.

      Streaming Media

    • C.

      HTTP streaming

    • D.

      Slipstreaming

    Correct Answer
    B. Streaming Media
    Explanation
    Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous playback of audio and video content, delivering it in a real-time streaming format. Unlike downloading, where the entire file needs to be retrieved before playback can begin, streaming media allows for immediate access and playback while the content continues to be downloaded in the background. This enhances the user experience by reducing waiting times and providing seamless playback.

    Rate this question:

  • 12. 

    Which of the following refers to the data rate supported by a network conncection or interface?

    • A.

      Bandwidth

    • B.

      Preboot Execution Environment (PXE)

    • C.

      Branding

    • D.

      Spam

    Correct Answer
    A. Bandwidth
    Explanation
    Bandwidth refers to the data rate supported by a network connection or interface. It represents the amount of data that can be transmitted over a network in a given period of time. A higher bandwidth indicates a faster data transfer rate, allowing for quicker and more efficient communication between devices on the network.

    Rate this question:

  • 13. 

    Which of the following are serial interfaces? Choos all that apply

    • A.

      EPP

    • B.

      USB

    • C.

      Firewire

    • D.

      IEEE 1284

    Correct Answer(s)
    B. USB
    C. Firewire
    Explanation
    USB and Firewire are both serial interfaces. USB (Universal Serial Bus) is a widely used interface for connecting various devices to a computer. It allows for the transfer of data and power between devices. Firewire (IEEE 1394) is another serial interface commonly used for high-speed data transfer, particularly in audio and video applications. EPP (Enhanced Parallel Port) and IEEE 1284 are parallel interfaces, not serial interfaces.

    Rate this question:

  • 14. 

    Which of the following devics has its own BIOS?

    • A.

      Hard disk drive

    • B.

      South card

    • C.

      Network interface card

    • D.

      Video adapter

    Correct Answer
    D. Video adapter
    Explanation
    A video adapter is a device that is responsible for generating and displaying visual output on a computer monitor. It has its own BIOS (Basic Input/Output System) which is a firmware that initializes and controls the hardware settings of the video adapter. The BIOS allows the computer to communicate with the video adapter and ensures that it functions properly. This includes configuring display settings, resolution, color depth, and other parameters. Having its own BIOS allows the video adapter to operate independently and ensures compatibility with the computer system.

    Rate this question:

  • 15. 

    Which of the following are dual core processors? Choose two.

    • A.

      AMD Athlon(tm) 64 X2

    • B.

      Intel Pentium 4

    • C.

      Intel(r) Pentium(r) processor Extreme Ediditon

    • D.

      AMD Athlon(tm)

    Correct Answer(s)
    A. AMD Athlon(tm) 64 X2
    C. Intel(r) Pentium(r) processor Extreme Ediditon
    Explanation
    The correct answer is AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition. These two processors are known for their dual-core architecture, which means they have two separate processing units within a single chip. This allows for better multitasking and improved performance compared to single-core processors. The other options, Intel Pentium 4 and AMD Athlon(tm), do not have dual-core architecture and therefore are not considered dual-core processors.

    Rate this question:

  • 16. 

    Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?

    • A.

      /q

    • B.

      /o

    • C.

      /s

    • D.

      /e

    Correct Answer
    D. /e
    Explanation
    The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.

    Rate this question:

  • 17. 

    WHich of the following provides authentication, enryption and data integrity for wireless devices?

    • A.

      PAP

    • B.

      WAN

    • C.

      WAP

    • D.

      WTLS

    Correct Answer
    D. WTLS
    Explanation
    WTLS stands for Wireless Transport Layer Security. It is a security protocol specifically designed for wireless devices. WTLS provides authentication, encryption, and data integrity for wireless communication. It ensures that the data transmitted between wireless devices is secure and protected from unauthorized access or tampering. WTLS is commonly used in wireless applications such as mobile banking, e-commerce, and secure messaging.

    Rate this question:

  • 18. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • A.

      Bluetooth

    • B.

      802. 11

    • C.

      802. 11b

    • D.

      Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for seamless and reliable connections between devices. It is designed for short-range communication and is commonly used for connecting peripherals such as printers and mice to laptops and other devices. Bluetooth offers low power consumption, easy pairing, and a secure connection, making it the ideal choice for this scenario.

    Rate this question:

  • 19. 

    What is the mazimum resolution that the WUXGA video technology supports?

    • A.

      2048 x 1536

    • B.

      1920 x 1200

    • C.

      3840 x 2400

    • D.

      1600 x 1200

    Correct Answer
    B. 1920 x 1200
    Explanation
    WUXGA video technology supports a maximum resolution of 1920 x 1200.

    Rate this question:

  • 20. 

    What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply

    • A.

      Data integnity

    • B.

      Encryption

    • C.

      Bandwidth

    • D.

      Authentication

    Correct Answer(s)
    A. Data integnity
    B. Encryption
    D. Authentication
    Explanation
    Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data remains unchanged during transmission, encryption protects the data from unauthorized access by encrypting it, and authentication verifies the identity of the communicating parties to ensure secure communication. Bandwidth, on the other hand, is not directly provided by WTLS.

    Rate this question:

  • 21. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • A.

      Trojan horse

    • B.

      Honeypot

    • C.

      Spyware

    • D.

      Adware

    Correct Answer
    D. Adware
    Explanation
    Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads and collecting user data. Unlike other options listed, such as Trojan horse, Honeypot, and Spyware, which have different functionalities, Adware specifically focuses on displaying advertisements.

    Rate this question:

  • 22. 

    Which of the following protocols transmits error messages and network statistics?

    • A.

      ICMP

    • B.

      DHCP

    • C.

      TCP

    • D.

      NNTP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics between network devices. It is used by network devices to report errors, such as unreachable hosts or network congestion, and to provide network statistics, such as round-trip time and packet loss. ICMP is an integral part of the Internet Protocol Suite and is commonly used by network administrators for troubleshooting network connectivity issues. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses, TCP (Transmission Control Protocol) is responsible for reliable data transmission, and NNTP (Network News Transfer Protocol) is used for distributing news articles.

    Rate this question:

  • 23. 

    Which of the following power sources are used to power a laptop?

    • A.

      Solar panel

    • B.

      AC power

    • C.

      Battery

    • D.

      Docking station

    Correct Answer(s)
    B. AC power
    C. Battery
    Explanation
    AC power and battery are both used to power a laptop. AC power refers to the electricity provided by an outlet, which is used to charge the laptop's battery and power it directly. The battery, on the other hand, stores electrical energy and allows the laptop to be used without being connected to a power source. Both power sources are essential for the functioning of a laptop, as the AC power charges the battery and the battery provides power when the laptop is not plugged in.

    Rate this question:

  • 24. 

    Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.

    • A.

      Educate users of the client computers about the problems arising due to malware

    • B.

      Educate users of the client computers to avoid malware

    • C.

      Prevent users of the client computers from executing any programs.

    • D.

      Assign read only permission to the users for accessing the hard disk drives of the client computers.

    Correct Answer(s)
    A. Educate users of the client computers about the problems arising due to malware
    B. Educate users of the client computers to avoid malware
    Explanation
    Mark will educate the users of the client computers about the problems arising due to malware and also educate them on how to avoid malware. By educating the users, they will become aware of the risks associated with malware and the precautions they need to take to prevent infection. This will help in creating a security-conscious environment where users will be more cautious while browsing the internet and downloading files, reducing the chances of malware infecting the client computers.

    Rate this question:

  • 25. 

    You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?

    • A.

      128 Megabytes

    • B.

      64 Megabytes

    • C.

      2 Gigabytes

    • D.

      1 Gigabyte

    Correct Answer
    B. 64 Megabytes
    Explanation
    Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly.

    Rate this question:

  • 26. 

    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

    • A.

      Rambus

    • B.

      Non Parity RAM

    • C.

      ECC RAM

    • D.

      Logic Parity RAM

    Correct Answer
    C. ECC RAM
    Explanation
    ECC RAM (Error Correcting Code RAM) should be selected because it is specifically designed to detect and correct errors in data that is being read from or written to the RAM. This type of RAM uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors, and detect multiple-bit errors. By using ECC RAM, the chances of data corruption or system crashes due to memory errors are significantly reduced, making it a reliable choice for those concerned about error handling.

    Rate this question:

  • 27. 

    What is the maximum data transmission speed of IEE 802. 11b Wireless networks?

    • A.

      54 Mbps

    • B.

      600 Mbps

    • C.

      600 Gbps

    • D.

      11 Mbps

    Correct Answer
    D. 11 Mbps
    Explanation
    The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard was introduced in 1999 and operates in the 2.4 GHz frequency range. While it may seem slow compared to modern standards, such as 802.11n or 802.11ac, 802.11b was a significant improvement over its predecessor, 802.11a, which had a maximum speed of 2 Mbps. It provided a more reliable and faster wireless connection for devices at that time.

    Rate this question:

  • 28. 

    Which of the following types of parental controls is used to limit access to the internet contents?

    • A.

      Content filter control

    • B.

      Bandwidth control

    • C.

      Usage management tool

    • D.

      Monitoring control

    Correct Answer
    A. Content filter control
    Explanation
    Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, keywords, or types of content that they deem inappropriate or unsafe for their children. By using content filter control, parents can ensure that their children are only accessing age-appropriate and safe online content, protecting them from potentially harmful or inappropriate material.

    Rate this question:

  • 29. 

    Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two

    • A.

      BIOS has become outdated.

    • B.

      The CMOS battery has failed.

    • C.

      The CMOS chip has failed

    • D.

      Software stored in the CMOS battery is infected by a virus.

    Correct Answer(s)
    B. The CMOS battery has failed.
    C. The CMOS chip has failed
    Explanation
    The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for powering the CMOS chip, which stores the computer's BIOS settings. If the CMOS battery fails, it can cause the CMOS chip to fail as well, leading to the checksum failure error message. Therefore, the most likely causes of this error are the failure of both the CMOS battery and the CMOS chip.

    Rate this question:

  • 30. 

    What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply

    • A.

      Easy configuration of hardware devices

    • B.

      Expansion

    • C.

      Security

    • D.

      Speed

    Correct Answer(s)
    A. Easy configuration of hardware devices
    B. Expansion
    D. Speed
    Explanation
    The benefits of using Universal Serial Bus 2.0 (USB 2.0) over legacy communication ports such as RS-232 and parallel ports are easy configuration of hardware devices, expansion, and speed. USB 2.0 allows for plug-and-play functionality, making it easier to connect and configure hardware devices without the need for manual settings. It also supports daisy-chaining and the connection of multiple devices through hubs, providing expansion capabilities. Furthermore, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, enabling quicker and more efficient communication between devices.

    Rate this question:

  • 31. 

    Which of the following sleep modes is also known as Hibernation in Windows operating systems?

    • A.

      S3

    • B.

      S2

    • C.

      S4

    • D.

      S1

    Correct Answer
    C. S4
    Explanation
    S4 is the correct answer because it refers to the sleep mode known as Hibernation in Windows operating systems. In this mode, the computer saves all open documents and running applications to the hard drive and then shuts down completely. When the computer is turned back on, it restores the previously saved state, allowing the user to resume their work from where they left off. This sleep mode is particularly useful for laptops and other portable devices as it helps conserve battery life while still allowing quick access to the system.

    Rate this question:

  • 32. 

    Which of the following can occur if the power cable runs along with the computer network cable?

    • A.

      EMI

    • B.

      ESD

    • C.

      Broadcast Storm

    • D.

      Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, electromagnetic interference (EMI) can occur. EMI is the disturbance caused by electromagnetic radiation from external sources that can interfere with the signals transmitted through the network cable. This interference can lead to data corruption, signal degradation, and communication errors. It is important to keep power cables and network cables separated to minimize the risk of EMI.

    Rate this question:

  • 33. 

    Which of the following are types social engineering attacks? Choose two

    • A.

      An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee

    • B.

      An unauthorized person inserts and intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts

    • C.

      An unauthorized person calls a user to be a system adminstrator in order to get the users password

    • D.

      An unauthorized person modifies packet headers by using someone elses IP address to his identity

    Correct Answer(s)
    A. An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee
    C. An unauthorized person calls a user to be a system adminstrator in order to get the users password
    Explanation
    The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks. In the first scenario, the attacker manipulates their way into the building by impersonating an employee, gaining physical access to the server. In the second scenario, the attacker tricks a user into believing they are a system administrator and convinces them to disclose their password. Both of these attacks exploit human vulnerabilities to gain unauthorized access to systems or information.

    Rate this question:

  • 34. 

    Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?

    • A.

      Simply put the Windows Recovery CD in and the recovery process will start

    • B.

      Reinstall Windows

    • C.

      Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state

    • D.

      Simply uninstall any new software.

    Correct Answer
    C. Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state
    Explanation
    The best way to put the customer's Windows XP machine back into a working state is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system errors or issues that are causing the computer to be unusable. Reinstalling Windows or uninstalling new software may not address the underlying cause of the problem, while using the recovery console provides a more comprehensive solution.

    Rate this question:

  • 35. 

    Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?

    • A.

      Spyware

    • B.

      Shareware

    • C.

      Freeware

    • D.

      Adware

    Correct Answer
    B. Shareware
    Explanation
    Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

    Rate this question:

  • 36. 

    Which of the following buses has a maximum data transfer rate of 2400 Mbps?

    • A.

      FireWire 800

    • B.

      ESATA

    • C.

      USB 1.1

    • D.

      USB 2.0

    Correct Answer
    B. ESATA
    Explanation
    eSATA (External Serial ATA) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate.

    Rate this question:

  • 37. 

    Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

    • A.

      Unicast

    • B.

      Multicast

    • C.

      Loopback

    • D.

      Anycast

    Correct Answer
    D. Anycast
    Explanation
    Anycast is the correct answer because it refers to a single IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that is assigned that address. This allows for efficient routing and load balancing, as the network automatically directs traffic to the closest available interface. Anycast is commonly used for services such as DNS or content delivery networks, where multiple servers can provide the same service.

    Rate this question:

  • 38. 

    Which of the following can be installed in an AGP slot?

    • A.

      Video card

    • B.

      RAM

    • C.

      Micoprocessor

    • D.

      Modem card

    Correct Answer
    A. Video card
    Explanation
    An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the motherboard, allowing for efficient data transfer and improved graphics performance. Therefore, a video card is the correct answer as it is the only component listed that is compatible with an AGP slot. RAM, microprocessors, and modem cards are typically installed in different types of slots on a motherboard.

    Rate this question:

  • 39. 

    At what voltage does a USB host supply power to the USB bus?

    • A.

      15 volts

    • B.

      5 vots

    • C.

      50 volts

    • D.

      3 volts

    Correct Answer
    B. 5 vots
    Explanation
    A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power delivery and is used to power and charge various USB devices such as smartphones, tablets, and other peripherals. It is important to note that different USB versions may have different power delivery capabilities, but the most common and widely used voltage is 5 volts.

    Rate this question:

  • 40. 

    Which of the following enables third pary developers to create capabilites to extend an application?

    • A.

      Plug in

    • B.

      Virtual machine

    • C.

      Hotfix

    • D.

      JavaScript

    Correct Answer
    A. Plug in
    Explanation
    A plug-in is a software component that adds specific features or functionality to an existing application. It allows third-party developers to create additional capabilities and extend the functionality of the application. By integrating a plug-in, developers can customize the application to meet their specific needs, enhancing its functionality and providing additional features that were not originally included. This enables the application to be more versatile and adaptable to different user requirements.

    Rate this question:

  • 41. 

    Which of the following statements about multi or authentication is true?

    • A.

      It uses a key distribution center (KDC)

    • B.

      It protects a computer from a malicious software such as worms

    • C.

      It involves two or more methods as part of the authentication process

    • D.

      It is a process in which a client process and a server are required to prove their identities to each other before performing any application function

    Correct Answer
    C. It involves two or more methods as part of the authentication process
    Explanation
    The correct answer is "it involves two or more methods as part of the authentication process". This means that multi-factor authentication requires the use of multiple methods or factors to verify the identity of a user. These factors can include something the user knows (such as a password), something the user has (such as a smart card), or something the user is (such as a fingerprint). By combining multiple factors, multi-factor authentication provides an extra layer of security compared to single-factor authentication methods.

    Rate this question:

  • 42. 

    What is the difference between the USB 2.0 and IEEE 1394 bus standards?

    • A.

      IEEE 1394 is faster than USB 2.0

    • B.

      IEEE 1393 supports hot swapping

    • C.

      IEEE 1394 is slower than USB 2.0

    • D.

      USB 2.0 supports Plug and Play feature

    Correct Answer
    C. IEEE 1394 is slower than USB 2.0
    Explanation
    IEEE 1394 is slower than USB 2.0 because USB 2.0 has a higher data transfer rate compared to IEEE 1394. USB 2.0 has a maximum data transfer rate of 480 Mbps, while IEEE 1394 has a maximum data transfer rate of 400 Mbps. Therefore, USB 2.0 is faster in terms of data transfer speed.

    Rate this question:

  • 43. 

    Which of the following devices provides input by analyzing printed text, handwriting, or an abject?

    • A.

      Webcam

    • B.

      Image Scanner

    • C.

      Packet analyzer

    • D.

      BD-ROM drive

    Correct Answer
    B. Image Scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, allowing the text or images to be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document scanning, data entry, and image editing. Unlike a webcam, which captures live video, or other devices listed, an image scanner specifically focuses on analyzing printed text, handwriting, or objects.

    Rate this question:

  • 44. 

    Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?

    • A.

      Mercury(Hg)

    • B.

      Lead(Pb)

    • C.

      Iron(Fe)

    • D.

      Cadmium(Cd)

    Correct Answer(s)
    A. Mercury(Hg)
    B. Lead(Pb)
    D. Cadmium(Cd)
    Explanation
    The substances that are restricted under the Restriction of Hazardous Substances (RoHS) are Mercury (Hg), Lead (Pb), and Cadmium (Cd). These substances are considered hazardous to the environment and human health. The RoHS directive aims to limit the use of these substances in electrical and electronic equipment to reduce their negative impact on the environment and human well-being. Iron (Fe) is not restricted under RoHS as it is not considered hazardous in the same way as the other substances mentioned.

    Rate this question:

  • 45. 

    Which of the following statements about a riser card is true?

    • A.

      It is used to connect a computer in a network

    • B.

      It is used to connect extra microprocessors

    • C.

      It provides extra memory for expansion cards

    • D.

      It is used to extend slots for expansion cards.

    Correct Answer
    D. It is used to extend slots for expansion cards.
    Explanation
    A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them up vertically, providing more space for installation. This is particularly useful in compact computer cases where there is limited horizontal space for expansion cards. By using a riser card, users can add more functionality to their computer by connecting additional expansion cards such as graphics cards, sound cards, or network cards.

    Rate this question:

  • 46. 

    Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?

    • A.

      E book reader

    • B.

      Memory card reader

    • C.

      Smart card reader

    • D.

      Barcode reader

    Correct Answer
    B. Memory card reader
    Explanation
    A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to connect their memory cards to a computer or other device and transfer data between them. It provides a convenient way to access and transfer files, photos, videos, and other data stored on these types of memory cards.

    Rate this question:

  • 47. 

    Which of the following can be used to accomplish authentication? Choose all that apply

    • A.

      Biometrics

    • B.

      Enryption

    • C.

      Passwaord

    • D.

      Token

    Correct Answer(s)
    A. Biometrics
    C. Passwaord
    D. Token
    Explanation
    Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to using unique physical or behavioral characteristics of an individual, such as fingerprints or facial recognition, to verify their identity. Passwords are a common method of authentication where users must enter a secret code or phrase known only to them. Tokens, such as smart cards or key fobs, provide an additional layer of authentication by generating one-time passwords or digital signatures. By choosing any combination of these methods, organizations can ensure secure access to their systems and data.

    Rate this question:

  • 48. 

    Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two

    • A.

      SMPS

    • B.

      Floppy drive

    • C.

      Monitor

    • D.

      Keyboard

    Correct Answer(s)
    A. SMPS
    C. Monitor
    Explanation
    SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting the AC power from the wall outlet to the DC power required by the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, monitors can store high levels of electrical charge which can be dangerous if mishandled. Floppy drives and keyboards, on the other hand, do not possess the same level of electrical risk.

    Rate this question:

  • 49. 

    Which of the following ports on a computer are used to connect a keyboard? Choose two

    • A.

      USB

    • B.

      DB-25

    • C.

      PS/2

    • D.

      DB-9

    Correct Answer(s)
    A. USB
    C. PS/2
    Explanation
    USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a widely used port that allows for easy plug-and-play connectivity. It is the most common port for connecting peripherals, including keyboards. PS/2 (Personal System/2) is an older port specifically designed for connecting keyboards and mice. While it is less commonly used nowadays, some keyboards still utilize PS/2 connections. DB-25 and DB-9 ports are not typically used for connecting keyboards, but rather for other purposes such as serial or parallel communication.

    Rate this question:

  • 50. 

    Which of the following features are related to power management? Choose two

    • A.

      Hot plugging

    • B.

      Hibernate mode

    • C.

      Standy mode

    • D.

      Safe mode

    Correct Answer(s)
    B. Hibernate mode
    C. Standy mode
    Explanation
    Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state but still be quickly resumed. Both modes help to conserve power and extend battery life in laptops or reduce electricity usage in desktop computers. Hot plugging and Safe mode, on the other hand, are not directly related to power management. Hot plugging refers to the ability to connect or disconnect devices without rebooting, while Safe mode is a troubleshooting mode used to diagnose and fix software or driver issues.

    Rate this question:

Delano Vasquez |Educator & Trainer |
Denalo is an accomplished educator with over 20 years of teaching and training in technology. As an entrepreneur for 25+ years, he's excelled in technology, real estate, and sales. Additionally, Denalo serves as a Real Estate Broker, specializing in various real estate transactions and investments.
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.