Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Health
›
Computed Tomography
CT 5
31 Questions
|
By Ict_cc_mp | Updated: Jul 23, 2015
| Attempts: 116
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 31
0 %
0/100
Score
0/100
1.
Please fill answer below
Submit
Start Quiz
About This Quiz
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
A good password characteristics is______________.
At least three characters long
A rotation or reuse of the characters in a logon name
At least two alphabetic characters and one non-alphabetic character
The personal data such as birth date, telephone number, license plate number
Submit
3.
An example of a second-level domain is___________in the
www.microsoft.com
domain.
.
Com
Www
Microsoft
Submit
4.
DHCP simplifies the____________process for a network administrator.
IP configuration
Host configuration
Security configuration
Network configuration
Submit
5.
Tom wants to share an NTFS folder Windows System to other users within the same network. Which tab should be selected in the properties panel of the folder to enable that?
Roles
Sharing
General
Customized
Submit
6.
Which one of the following is the best practice to setup the server environment before installing SQL Server?
Use firewalls
Use licensed software
Use unsolicited software
Use NetBIOS and server message block
Submit
7.
Which one of the following is the private IPv4 address range for 10.0.0.0/8?
10.0.0.0 - 10.255.255.255.255
10.1.0.0 - 10.255.255.255.255
10.1.1.0 - 10.255.255.255.255
10.1.1.1 - 10.255.255.255.255
Submit
8.
Installation of DHCP service is done using the Server Manager console and under add___________option.
Roles
Scope
Features
Command
Submit
9.
_____________requires each user or device to have only one CAL to access any number of services.
Open licensing
Select licensing
Per-seat licensing
Per-server licensing
Submit
10.
Which one of the followings describes the term Job redirection?
To cancel the print job if the print device is offline.
To hold the print job until the print device is online.
To resubmit the print job to another print device by prompting user to resubmit the job
To redirect the print job to another print device without requiring the user to resubmit the job
Submit
11.
DHCP uses____________to initiate communications.
IP broadcasts
WIN broadcasts
NetBIOS broadcasts
Network broadcasts
Submit
12.
What does DNS stand for?
Domain Name Server
Domain Name System
Domain Naming System
Domain Naming Services
Submit
13.
______________is the typical type of licensing used by small organizations that are purchasing a limited number of licenses.
OEM licenses
Retail licenses
Select licenses
Volume licenses
Submit
14.
________________is not the common applications for server.
E-mail
Terminal services
Post office protocols
File and printer sharing
Submit
15.
The____________command allows a user to send SQL scripts to a SQL Server.
Sqlcmd
Doscmd
Osqlcmd
Scriptcmd
Submit
16.
Tom needs to setup a print server to provide for high availability of shared printers. Which one of the following print components should Tom deploy?
Print queue
Print spooler
Print daemon
Print server cluster
Submit
17.
The purpose of WINS in a network infrastructure is to resolve__________________for effective communication between systems and applications that still makes use of single names.
Host names to IP addresses
IP addresses to Host names
NetBIOS names to IP addresses
IP addresses to NetBIOS names
Submit
18.
WINS provided a distributed__________for registering and querying dynamic computer name-to-IP address mapping in a routed network environment.
Network
Database
IP address
Host name
Submit
19.
The__________permission allows a user to read the content of a folder.
Write
Modify
Read and Write
List folder contents
Submit
20.
________________is the types of volume licenses designed for companies that provide hosting services to other organizations. You pay a monthly licensing fee based on requirements.
Open license
Enterprise agreement
Enterprise subscription agreement
Services provider licensing agreement
Submit
21.
Which of the following SQL server editions offers data synchronization for remote offices?
SQL Server 2008 Express Editions
SQL Server 2008 Compact Editions
SQL Server 2008 Standard Editions
SQL Server 2008 Workgroup Editions
Submit
22.
___________enables multiple client computers to share one or more print devices.
Print queue
Print server
Print spooler
Print services
Submit
23.
__________________is a SQL utility used to transfer data between databases.
SQL Server Manager
SQL Server Query Tool
SQL Server Management Studio
SQL Server Configuration Manager
Submit
24.
_________________offers the ability for remote users to connect to terminal services with just a web browser.
Remote applications
Published applications
Terminal Services Gateway
Terminal Services Web Access
Submit
25.
For IPv4 addressing: 172.16.16.1/20, the /20 represents how many subnet bits are in the mask, and this notation is________________.
Variable Bits Subnet Masking(VBSM)
Variable Bytes Subnet Masking(VBSM)
Variable Hosts Subnet Masking(VHSM)
Variable Length Subnet Masking(VLSM)
Submit
26.
Which one of the following is
TRUE
regarding the Mixed Authentication?
It allows user logon using Windows accounts only
It allows user logon using SA or Windows accounts only
It allows permission to be linked to Active Directory only
It allows permission to be linked to Windows accounts only
Submit
27.
Almost all groups used by Windows Server 2008 are security groups because they are the only groups through which permission can be assigned. Each group is also assigned a___________which defines how permissions are assigned to the group members.
User name
User scope
Group name
Group scope
Submit
28.
Tom wants to run the Print Management console in the Windows Server 2008 system but he cannot locate it anywhere. What could be the
MOST
likely reason?
Print Queue role was not installed
Print Server role was not installed
Print Services role was not installed
Print Daemon role was not installed
Submit
29.
______________is
NOT
the type of authentication providers built into ASP.NET.
Mixed Authentication Provider
Forms Authentication Provider
Passport Authentication Provider
Windows Authentication Provider
Submit
30.
Domain Name System is a_______________database.
List
Access
Tree distributed
Hierarchical distributed
Submit
31.
________________uses reverse lookups to validate that the IP address sending messages is associated with a domain.
Default gateway
Internet gateway
E-mail security gateway
Instant messaging gateway
Submit
View My Results
Related Quizzes
Medical CT Registry Exam Review MCQ Test!
Medical CT Registry Exam Review MCQ Test!
Computed Tomography Quiz Test! Trivia
Computed Tomography Quiz Test! Trivia
CT Imaging Procedures Test: Quiz!
CT Imaging Procedures Test: Quiz!
CT Registry Preparation Quiz
CT Registry Preparation Quiz
Computed Tomography Quiz
Computed Tomography Quiz
Test: Computed Tomography MCQ Quiz!
Test: Computed Tomography MCQ Quiz!
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (31)
Unanswered (
)
Answered (
)
Please fill answer below
A good password characteristics is______________.
An example of a second-level domain is___________in the...
DHCP simplifies the____________process for a network administrator.
Tom wants to share an NTFS folder Windows System to other users within...
Which one of the following is the best practice to setup the server...
Which one of the following is the private IPv4 address range for...
Installation of DHCP service is done using the Server Manager console...
_____________requires each user or device to have only one CAL to...
Which one of the followings describes the term Job redirection?
DHCP uses____________to initiate communications.
What does DNS stand for?
______________is the typical type of licensing used by small...
________________is not the common applications for server.
The____________command allows a user to send SQL scripts to a SQL...
Tom needs to setup a print server to provide for high availability of...
The purpose of WINS in a network infrastructure is to...
WINS provided a distributed__________for registering and querying...
The__________permission allows a user to read the content of a folder.
________________is the types of volume licenses designed for companies...
Which of the following SQL server editions offers data synchronization...
___________enables multiple client computers to share one or more...
__________________is a SQL utility used to transfer data between...
_________________offers the ability for remote users to connect to...
For IPv4 addressing: 172.16.16.1/20, the /20 represents how many...
Which one of the following is TRUE regarding the Mixed Authentication?
Almost all groups used by Windows Server 2008 are security groups...
Tom wants to run the Print Management console in the Windows Server...
______________is NOT the type of authentication providers built...
Domain Name System is a_______________database.
________________uses reverse lookups to validate that the IP address...
X
OK
X
OK
Cancel
X
OK
Cancel
Advertisement