Compuvend Assessment Test

50 Questions

Settings
Please wait...
Compuvend Assessment Test

This is a timed quiz. You have 60 minutes to answer 50 Questions. You cannot pause the quiz once you have started it. If you do not currently have time to take the quiz please close the page and try again at a more convenient time. Once you have finished the quiz please download the certificate at the end of the quiz and email it to [email protected] Com


Questions and Answers
  • 1. 
    • A. 

      .exe

    • B. 

      .deb

    • C. 

      .app

  • 2. 
    • A. 

      Random Access Memory

    • B. 

      Regular Access Memory

    • C. 

      Regular Aggretion Mummy

    • D. 

      Random Access Motherboard

    • E. 

      Random Aggretion Motherboard

  • 3. 
    The bar at the bottom of the screen that shows you which programs are open is called_____________________.
    • A. 

      The title bar

    • B. 

      The menu bar

    • C. 

      The task bar

  • 4. 
    You have the server configured to automatically perform backups. A full backup is done every Sunday morning at 2 a.m. Differential backups are run every day at 7 a.m. You arrive at work Thursday morning to find the system crashed at 6 p.m. Wednesday night. How many backup sets must you restore to recover as much of the data as possible?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      5

  • 5. 
    The ________ shows the names of every computer user on the computer.
  • 6. 
    A _____ is a computer connected to a server.
  • 7. 
    • A. 

      Windows vista

    • B. 

      Windows xp

    • C. 

      Windows 8

    • D. 

      Windows 7

  • 8. 
    Every ______ has properties.  The ______ of an _______ are unique to that specific object and may affect what can be done to the object or what the object does. 
    • A. 

      Object, properties, object

    • B. 

      Object, prosperous, object

    • C. 

      Object, profile, object

  • 9. 
    The first (possibly only) word of the DOS command to determine your IP address is _______________
  • 10. 
    • A. 

      Network intelligence card

    • B. 

      Network interface card

    • C. 

      Network intermediate card

    • D. 

      None of the above

  • 11. 
    The backup of the MSSQL database is in __________ format.
  • 12. 
    _________ should be used in order to connect to the database using script.
    • A. 

      Database username and password.

    • B. 

      Database username, password and database name.

    • C. 

      Database name, database username, database password and database host name.

    • D. 

      Database host name, database username, database password.

  • 13. 
    A ___________is an element in a Web page, such as word or image, that connects to other information on a specific topic.  
    • A. 

      Cookie

    • B. 

      Cache

    • C. 

      Hyperlink

    • D. 

      Connector

  • 14. 
    A _____________converts the computer’s digital signals to analog signals and vice versa so that a computer can send and receive data via telephone lines.
    • A. 

      CPU

    • B. 

      Router

    • C. 

      Modem

    • D. 

      Satellite server

  • 15. 
    You have just deleted an entire folder. How can you retrieve the contents?
    • A. 

      By emptying the Recycle Bin.

    • B. 

      By restoring the folder from the Recycle Bin.

    • C. 

      You can’t-once deleted, its contents can’t be retrieved.

    • D. 

      You don’t need to. Only the folder has been deleted-not its contents.

  • 16. 
    In Windows, what does UAC stand for?
    • A. 

      User Access Control

    • B. 

      User Account Control

    • C. 

      User Agreement Certification

  • 17. 
    UAC does not require the system to be restarted to disable it.
    • A. 

      True

    • B. 

      False

  • 18. 
    What security principal is assigned as the owner of files and folders created by the operating system?
    • A. 

      The Administrator account

    • B. 

      The Administrators group

    • C. 

      The SYSVOL special identity

    • D. 

      The SYSTEM special identity

  • 19. 
    You are the network administrator for a telecommunications company in Mobile, Alabama. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. The company employs 134 people, and all of them have a Windows XP Professional system. One morning, you get a call from a user who has received the following error message: Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance. The user logged on to the system without any problem the previous day, and you have received no other reports of users experiencing problems. You reset the computer account in Active Directory Users And Computers, but the user still cannot connect to log on to the domain. Which of the following do you try next?
    • A. 

      Disable and re-enable the computer account.

    • B. 

      Disable and re-enable the user account.

    • C. 

      Change the computer system’s membership to a workgroup, and then rejoin it to the domain.

    • D. 

      Delete the existing computer account, and re-create a new computer account with the same name.

  • 20. 
    You have just taken over as the network administrator for a paper manufacturer in Springfield, Ohio. You are in the process of implementing a new file structure to better accommodate users’ needs and make file access more secure. Today, you are working on the E:\SALES folder structure, which is used by the 65 users in the Sales department. All 65 users need the ability to read files in the folder and run programs from that folder. In addition, three managers need the ability to edit and delete files in that folder. All of the users and managers in the Sales department are members of the SALES group. Which of the following statements best describes how to configure permissions to meet these requirements?
    • A. 

      Create a share, and assign the Modify share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.

    • B. 

      Create a share, and assign the Read share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.

    • C. 

      Create a share, and assign the Full Control share permission to the SALES group. Assign the SALES group the NTFS Read & Execute permission. Assign the three managers in the Sales department the NTFS Modify permission.

    • D. 

      Create a share, and assign the Full Control share permission to the SALES group. Assign the SALES group the NTFS Read permission. Assign the three managers in the Sales department the NTFS Modify permission.

  • 21. 
    You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?
    • A. 

      The NTFS permissions on the folders were reset to Read for the Everyone special identity during the restore process.

    • B. 

      The ACLs for the folders were re-created by the restore process and are now empty.

    • C. 

      The shares that the users used to connect to the server were removed.

    • D. 

      The shares that the users used to connect to the server were automatically set to deny access to the Everyone special identity, as a security precaution.

  • 22. 
    On a Windows Server 2003 system, where do you go to join the computer to a domain?
    • A. 

      Control Panel, System, Computer Name

    • B. 

      Control Panel, System, Network Identification

    • C. 

      Control Panel, System, Advanced

    • D. 

      Control Panel, System, General

  • 23. 
    Which protocol is used by web browsers?
    • A. 

      HTML

    • B. 

      SMTP

    • C. 

      HTTP

    • D. 

      TCP/IP

  • 24. 
    • A. 

      Hub

    • B. 

      Repeater

    • C. 

      Router

    • D. 

      Switch

  • 25. 
    The command line utility pictured is?
    • A. 

      Nslookup

    • B. 

      TracerT

    • C. 

      Ping

    • D. 

      Nbstat

    • E. 

      Netstat

  • 26. 
    A credit card-sized expansion board that is inserted into portable computers that connects the PC to the telephone wall jack is called what?
    • A. 

      Internal modem

    • B. 

      External modem

    • C. 

      PC Card modem

    • D. 

      Wireless modem

  • 27. 
    This wireless standard is widely used to connect computers to each other and to the Internet.
    • A. 

      802.11

    • B. 

      RJ45

    • C. 

      Blueband

    • D. 

      Broadband

  • 28. 
    Each computer on the Internet has a unique numeric address called a(n)
    • A. 

      domain address

    • B. 

      protocol address

    • C. 

      IP address

    • D. 

      Web address

  • 29. 
    Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.
    • A. 

      Modem

    • B. 

      Cable

    • C. 

      Hub

    • D. 

      Router

  • 30. 
    Which of the following is NOT a type of motherboard expansion slot?
    • A. 

      ISA

    • B. 

      PCI

    • C. 

      AGP

    • D. 

      ATX

  • 31. 
     Which of the following retains the information it's storing when the power to the system is turned off?
    • A. 

      CPU

    • B. 

      ROM

    • C. 

      DRAM

    • D. 

      DIMM

  • 32. 
    Because the configuration information for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
    • A. 

      PING

    • B. 

      TRACERT

    • C. 

      ARP

    • D. 

      IPCONFIG

  • 33. 
    A collection of 8 bits is called ?
    • A. 

      Megabit

    • B. 

      Byte

    • C. 

      Word

    • D. 

      Record

  • 34. 
    Most Web-enabled devices follow a standard known as
    • A. 

      FireWire

    • B. 

      Bluetooth

    • C. 

      TCP/IP

    • D. 

      Wi-FI

  • 35. 
    Explain how to map a network drive from the desktop of a Windows XP Pro machine:
    • A. 

      From a DOS command prompt type net use followed by the drive letter and the UNC.

    • B. 

      Right click on My Computer, select map network drive. Select the drive letter, enter the path, and check the box if you want it to map each time you login, click OK.

    • C. 

      Right click on My Network Places, select map network drive. Select the drive letter, enter the path, and check the box if you want it to map each time you login, click OK

    • D. 

      All of the above.

  • 36. 
    Where are user files stored locally in Windows XP Pro, with a clean install?
    • A. 

      C:\Profiles\%Username%\My Documents

    • B. 

      C:\Windows\Profiles\%Username%\Personal

    • C. 

      C:\Documents and Settings\%Username%\My Documents

    • D. 

      C:\Winnt\%Username%

  • 37. 
    If, while trying to run a new software title, you get the error message "Access Denied" and the program fails to launch, where would you look for the problem?
    • A. 

      In the flash drive

    • B. 

      In the device drivers

    • C. 

      In the integrity of the resident memory

    • D. 

      In the file permissions

    • E. 

      In the user's profile

  • 38. 
    • A. 

      VPN

    • B. 

      PPP

    • C. 

      WEP

    • D. 

      WPA

    • E. 

      MAC

  • 39. 
    • A. 

      IP address

    • B. 

      MAC address

    • C. 

      Workstation name

    • D. 

      Www.proprofs.com

    • E. 
  • 40. 
    • A. 

      Divide the host HDD into memory locations

    • B. 

      Create a shortcut to a network location

    • C. 

      Trace the path to the local area network gateway

    • D. 

      Send instructions to a user to access the remote local area network

    • E. 

      A schematic drawing of all network adapter locations on the network system

  • 41. 
    • A. 

      To resolve MAC addresses to NetBIOS names

    • B. 

      To resolve domain names to IP addresses

    • C. 

      To resolve host names to NetBeui names

    • D. 

      To resolve IP addresses to MAC address

  • 42. 
    • A. 

      192.168.000.001

    • B. 

      2001:0:4137:9e50:1418:fe9b

    • C. 

      00-1F-E2-57-DD-A6

    • D. 

      00010001:01100110:11110000:01010000

  • 43. 
    • A. 

      443

    • B. 

      80

    • C. 

      25

    • D. 

      143

  • 44. 
    • A. 

      80

    • B. 

      443

    • C. 

      25

    • D. 

      143

  • 45. 
    • A. 

      443

    • B. 

      25

    • C. 

      80

    • D. 

      143

  • 46. 
    • A. 

      80

    • B. 

      443

    • C. 

      143

    • D. 

      25

  • 47. 
    Which elctrical component hold charge even when no voltage is being replied ?
    • A. 

      Resistor

    • B. 

      Terminator

    • C. 

      Flip Flop

    • D. 

      Capacitor

    • E. 

      None of the above

  • 48. 
    An end user reports she has noticed some bizarre behavior on her computer all morning, and she believes it is getting worse. She reports the computer is displaying odd messages, that she cannot open her JPEG files, and that some programs won’t run. She says she has not opened any e-mail attachments all morning, and that no one has accessed the computer but her. What is most likely the problem?
    • A. 

      The user has a virus on her computer and it is most likely a simple, replicating virus.

    • B. 

      The user has a virus on her computer and it is most likely a worm.

    • C. 

      The user has an internal problem that cannot be a virus, because the user states she did not open any e-mail attachments recently.

    • D. 

      The user’s computer needs to be reinstalled; these are common signs of a corrupt installation.

  • 49. 
    You are troubleshooting a network connectivity problem for a workgroup containing 12 computers. One of the computers cannot access network resources. After verifying the physical connections are good, that the NIC light is on and the NIC produces no errors in Device Manager, and that the computer name and workgroup name are correct in System Properties, you still can’t solve the problem. What should you try next?
    • A. 

      Remove two of the computers from the workgroup; workgroups can only have 10 or fewer computers connected.

    • B. 

      Open Network Connections and try to repair the connection.

    • C. 

      Re-create the network connection.

    • D. 

      Configure the workgroup to use APIPA.

  • 50. 
    A user has a POP3 e-mail account from an ISP and he reports he cannot send e-mail. He can receive e-mail. Which of the following is most likely the problem?
    • A. 

      The Mail Account name in the Internet E-Mail Settings dialog box (accessed by clicking More Settings in the E-Mail Accounts dialog box) has a typographical error.

    • B. 

      The SMTP server name is incorrectly configured in the user’s e-mail settings.

    • C. 

      The ISP’s POP3 mail server is down.

    • D. 

      The user has not typed in the correct password.