Iaf-final Assessment

100 Questions | Total Attempts: 635

Settings
Please wait...
Assessment Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Your IT Company is constantly changing, with new users coming and going throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts?
    • A. 

      Dsmod

    • B. 

      LDIFDE

    • C. 

      Netsh

    • D. 

      Dcpromo

  • 2. 
    • A. 

      PTR

    • B. 

      MX

    • C. 

      SVR

    • D. 

      SOA

  • 3. 
    You install Active Directory on a server. You want it to be a separate domain that is part of an existing forest but containing a namespace separate from the forest where you are installing it. What is this type of domain called?
    • A. 

      A replica

    • B. 

      A child domain

    • C. 

      A forest root

    • D. 

      A tree root

  • 4. 
    You are installing Active Directory on a new domain controller and selecting options for placing the database and log files. Which of the following options would produce the optimum performance of these files? Each answer represents part of the solution....?
    • A. 

      Placing them on the same NTFS partition

    • B. 

      Ensuring plenty of hard disk space for these files to expand

    • C. 

      Placing them on NTFS partitions located on separate physical disks

    • D. 

      Restricting them to small partitions to control their size

  • 5. 
    • A. 

      Windows 2000 mixed

    • B. 

      Windows 2000 native

    • C. 

      Windows Server 2003 mixed

    • D. 

      Windows Server 2003 /2008

  • 6. 
    • A. 

      The Dsadd command

    • B. 

      The Create Method

    • C. 

      The Create-item cmdlet

    • D. 

      The set info method

  • 7. 
    You are the administrator of an active directory domain. A user complains to you that he is unable to change his password. No other users have this issue. What is the most likely cause of the problem?
    • A. 

      Insufficient login credentials

    • B. 

      He is a member of the Administrators group

    • C. 

      He is not a member of the domain

    • D. 

      The property “User cannot change password” has been enabled when it was created

  • 8. 
    • A. 

      Forest, Domain, Tree, Branch, Computer

    • B. 

      Computer, Forest, Domain, Tree

    • C. 

      Forest, Tree, Domain, Computer

    • D. 

      Forest, Tree, Computer, Domain

  • 9. 
    • A. 

      Mycorp.com and newcorp.com

    • B. 

      Mycorp.com and newsite.mycorp.com

    • C. 

      Marketing and Talent

    • D. 

      Windows 2000 and Window NT

  • 10. 
    • A. 

      GPUPDATE –airtel/all

    • B. 

      GPFORCE /airtel

    • C. 

      GPUPDATE /force –all

    • D. 

      GPUPDATE /force

  • 11. 
    Groups are considered an organizing component of Active Directory
    • A. 

      True

    • B. 

      False

  • 12. 
    You run the Add Roles Wizard in Server Manager to add the AD DS role.  After the wizard is finished, you check the Administrative Tools folder but don't find any of the Active Directory management tools.  What should you do?
    • A. 

      ADSI Edit

    • B. 

      Run Dcpromo.exe

    • C. 

      Global catalog

    • D. 

      None of the above

  • 13. 
    • A. 

      Domain & OU

    • B. 

      Users

    • C. 

      Computers

    • D. 

      Groups

  • 14. 
    To which of the following can a GPO be linked?
    • A. 

      Domains

    • B. 

      Sites

    • C. 

      Leaf object

    • D. 

      Container object

  • 15. 
    If a policy is defined in a GPO linked to a domain, and that policy is defined with a different setting in a GPO linked to an OU, which is true by default?
    • A. 

      The policy setting in the GPO linked to the OU is applied

    • B. 

      The policy setting in the GPO linked to the domain is applied

    • C. 

      Neither policy setting is not applied, nor is an error message generated

    • D. 

      The policy in both GPOs defaults to Not Defined so that no conflict exists

  • 16. 
    The policy in both GPOs defaults to Not Defined so that no conflict exists
    • A. 

      Similar to a list of information in a text file

    • B. 

      Similar to a database program but with the capability to manage objects in it

    • C. 

      A program for managing the user interface on a server

    • D. 

      A program for managing folders, files, and permissions on a distributed server

  • 17. 
    At about what interval are GPOs updated on domain controllers?
    • A. 

      5 seconds

    • B. 

      15 minutes

    • C. 

      50 minutes

    • D. 

      5 hours

  • 18. 
    When configuring GPOs, which node contains the majority of account policies?
    • A. 

      Computer Configuration node, Windows Settings folder, Security Settings node

    • B. 

      Computer Configuration node, Administrative Templates folder, Windows Components node

    • C. 

      The User Configuration node, Administrative Templates folder

    • D. 

      The User Configuration node, Windows Settings folder, Security Settings node

  • 19. 
    • A. 

      Default Directory Policy and Default Domain Policy

    • B. 

      Default Domain Controllers Policy and Default Directory Policy

    • C. 

      Default Domain-Wide Policy and Default Active Directory Policy

    • D. 

      Default Domain Policy and Default Domain Controllers Policy

  • 20. 
    Under what circumstances are the built-in user accounts no longer local user accounts?
    • A. 

      When accessing a network resource in a workgroup environment

    • B. 

      After installing Active Directory

    • C. 

      This is impossible; built-in user accounts cannot be converted

    • D. 

      When using dsadd on the built-in accounts

  • 21. 
    After receiving several support calls, you have decided to prevent users of the DomA-Group from being able to access the Control Panel regardless of what machine they log into. Where would you configure this setting?
    • A. 

      The User Configuration node, Windows Settings folder

    • B. 

      The Computer Configuration node, Administrative templates folder

    • C. 

      The Computer Configuration node, Windows Settings folder

    • D. 

      The User Configuration node, Administrative Templates folder

  • 22. 
    An Active Directory container used to organize a network’s users and resources into logical administrative units
    • A. 

      Organizational Units

    • B. 

      Users Units

    • C. 

      Container object

    • D. 

      Leaf object

  • 23. 
    The main purpose of Active Directory is to ________.
    • A. 

      Provide authentication and authorization to users and computers

    • B. 

      Provide File and Print services

    • C. 

      Give administrators the ability to control access to restricted hardware

    • D. 

      Allow users to organize their file systems into a cohesive and high performance directory

  • 24. 
    • A. 

      System Address

    • B. 

      SYSID

    • C. 

      Process ID

    • D. 

      Structure

  • 25. 
    The software used to drive microprocessor-based systems is called:
    • A. 

      Assembly language programs

    • B. 

      Firmware

    • C. 

      BASIC interpreter instructions

    • D. 

      Flowchart instructions

  • 26. 
    A microprocessor unit, a memory unit, and an input/output unit form a:
    • A. 

      CPU

    • B. 

      Compiler

    • C. 

      Microcomputer

    • D. 

      ALU

  • 27. 
    Index hole is related to?
    • A. 

      Hard disk

    • B. 

      Floppy disk

    • C. 

      Printer

    • D. 

      CPU

  • 28. 
    Secondry memory is also know as?
    • A. 

      Auxiliary memory

    • B. 

      Primery memory

    • C. 

      Virtual memory

    • D. 

      None of above

  • 29. 
    It holds the address of the active memory?
    • A. 

      MAR

    • B. 

      MBR

    • C. 

      PC

    • D. 

      AR

  • 30. 
    In latest generation computers, the instructions are executed
    • A. 

      Parallel only

    • B. 

      Sequentially only

    • C. 

      Both sequentially and parallel

    • D. 

      All of above

  • 31. 
    Which printer is very commonly used for desktop publishing?
    • A. 

      Laser printer

    • B. 

      Inkjet printer

    • C. 

      Daisywheel printer

    • D. 

      Dot matrix printer

  • 32. 
    • A. 

      It will add to the content of the location

    • B. 

      It will change the address of the memory location

    • C. 

      It will erase the previous content

    • D. 

      It will not be fruitful if there is already some data at the location

  • 33. 
    ____ is a simple Application layer protocol used to synchronize the clocks of computers on a network.
    • A. 

      NNTP

    • B. 

      NTP

    • C. 

      PING

    • D. 

      ARP

  • 34. 
    A ____ is a repeater with more than one output port
    • A. 

      Bridge

    • B. 

      Switch

    • C. 

      hub

    • D. 

      Router

  • 35. 
    ____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
    • A. 

      Routers

    • B. 

      Switches

    • C. 

      Gateways

    • D. 

      Broadcast domains

  • 36. 
    A physical topology ____.
    • A. 

      Specifies device types

    • B. 

      Depicts a network in broad scope

    • C. 

      Specifies connectivity methods

    • D. 

      Specifies addressing schemes

  • 37. 
    The most common logical topologies are ____ and ring.
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Wired

    • D. 

      Hybrid

  • 38. 
    NICs contain a(n) ____ which transmits and receives data signals.
    • A. 

      Keyboard port

    • B. 

      Mouse port

    • C. 

      Data transceiver

    • D. 

      All of above

  • 39. 
    TCP is a(n)___ sub protocol.
    • A. 

      Open-ended

    • B. 

      indiscriminating

    • C. 

      Connection-oriented

    • D. 

      Connectionless

  • 40. 
    Traditional switches operate at the ____ layer of the OSI model.
    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      Session

  • 41. 
    The sub protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network throughout a router is ____
    • A. 

      TCP

    • B. 

      ICMP

    • C. 

      UDP

    • D. 

      IP

  • 42. 
    By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.
    • A. 

      Onboard

    • B. 

      PCIe

    • C. 

      ExpressCard

    • D. 

      ISA

  • 43. 
    To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
    • A. 

      RIP (Routing Information Protocol)

    • B. 

      STP (Spanning Tree Protocol)

    • C. 

      BGP (Border Gateway Protocol)

    • D. 

      OSPF (Open Shortest Path First) protocol

  • 44. 
    In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 45. 
    The default subnet mask for a Class B network is ____.
    • A. 

      255.0.0.0

    • B. 

      255.255.0.0

    • C. 

      255.255.255.0

    • D. 

      255.255.255.255

  • 46. 
    On an Ethenet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
    • A. 

      Collision domain

    • B. 

      Crash domain

    • C. 

      Interference domain

    • D. 

      Duplicate domain

  • 47. 
    A ____ is a multiport connectivity device that directs data between nodes on a network
    • A. 

      Switch

    • B. 

      Bridge

    • C. 

      Router

    • D. 

      Gateway

  • 48. 
    In IPv4 addressing, each IP address is a unique ____ number
    • A. 

      12-bit

    • B. 

      32-bit

    • C. 

      64-bit

    • D. 

      128-bit

  • 49. 
    From what location are the 1st computer instructions available on boot up?
    • A. 

      ROM BIOS

    • B. 

      CPU

    • C. 

      Boot.ini

    • D. 

      CONFIG.SYS

  • 50. 
    What could cause a fixed disk error.
    • A. 

      No-CD installed

    • B. 

      Bad ram

    • C. 

      Slow processor

    • D. 

      Incorrect CMOS settings

  • 51. 
    With respect to a network interface card, the term 10/100 refers to
    • A. 

      Protocol speed

    • B. 

      Afiber speed

    • C. 

      Megabits per seconds

    • D. 

      Minimum and maximum server speed

  • 52. 
    • A. 

      ATX

    • B. 

      AT

    • C. 

      BABY AT

    • D. 

      All of the above

  • 53. 
    A hard disk is divided into tracks which are further subdivided into:
    • A. 

      Clusters

    • B. 

      Sectors

    • C. 

      Vectors

    • D. 

      Heads

  • 54. 
    The 34-pin connection on an I/O card is for?
    • A. 

      Floppy drive

    • B. 

      SCSI drive

    • C. 

      IDE drive

    • D. 

      Zip drive

  • 55. 
    Resistance is measured in ?
    • A. 

      Volts

    • B. 

      Amps

    • C. 

      Watts

    • D. 

      Ohms

  • 56. 
    • A. 

      Optical drives

    • B. 

      IDE hard drives

    • C. 

      SCSI hard drives

    • D. 

      EIDE hard drives

  • 57. 
    RS-232 is a standard that applies to:
    • A. 

      serial ports

    • B. 

      parallel ports

    • C. 

      Game ports

    • D. 

      Digital frequencies

  • 58. 
    You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first.
    • A. 

      Cable sequence

    • B. 

      jumpers on the hard drive

    • C. 

      drivers that need to be loaded

    • D. 

      Hard drive manufacturer web site information

  • 59. 
    Data (information) is stored in computers as
    • A. 

      Files

    • B. 

      Directories

    • C. 

      Floppies

    • D. 

      Matter

  • 60. 
    Floppy Disk Drives were originally designed by
    • A. 

      IBM

    • B. 

      Sony

    • C. 

      Panasonic

    • D. 

      Samsung

  • 61. 
    Programs stored in ROM are called ___
    • A. 

      Hardware

    • B. 

      Firmware

    • C. 

      Software

    • D. 

      None of these

  • 62. 
    Computer software includes ____
    • A. 

      Operating system programs

    • B. 

      Application programs

    • C. 

      Packaged programs

    • D. 

      All of these

  • 63. 
    IC are classified on the basis of ___
    • A. 

      Manufacturing company

    • B. 

      Type of computer

    • C. 

      Number of transistors

    • D. 

      None of these

  • 64. 
    A source program is
    • A. 

      A program written in a machine language

    • B. 

      A program to be translated into machine language

    • C. 

      A machine language translation of a program written in a C

    • D. 

      None of these

  • 65. 
    Nortel is a company which manufactures:
    • A. 

      Software

    • B. 

      Processors

    • C. 

      Cables

    • D. 

      Network equipment

  • 66. 
    • A. 

      LapPad

    • B. 

      ThinkPad

    • C. 

      Aptiva

    • D. 

      Notepad

  • 67. 
    Direct X is a _____
    • A. 

      Computer Part

    • B. 

      Software that drives Graphic hardware

    • C. 

      A User Interface

    • D. 

      None of these

  • 68. 
    • A. 

      Sony

    • B. 

      IBM

    • C. 

      Samsung

    • D. 

      Acer

  • 69. 
    • A. 

      CPM

    • B. 

      DPI

    • C. 

      PPM

    • D. 

      BIT

  • 70. 
    • A. 

      Coaxial Cable

    • B. 

      Optic Fiber Cable

    • C. 

      Twisted pair Cable

    • D. 

      UTP Cable

  • 71. 
    • A. 

      Browser

    • B. 

      Mail Client

    • C. 

      FTP Client

    • D. 

      Messenger

  • 72. 
    • A. 

      Thicker taskbar

    • B. 

      Gadgets integrated directly into the desktop

    • C. 

      Use of libraries to replace the old documents, pictures, and similar folders

    • D. 

      Bit Locker

  • 73. 
    • A. 

      Windows 7 Home Basic

    • B. 

      Windows 7 Home Premium

    • C. 

      Windows 7 Professional

    • D. 

      Windows 7 Enterprise

  • 74. 
    The area where the clock and a few select system icons is located on the taskbar is called what?
    • A. 

      Start menu

    • B. 

      The Notification Area

    • C. 

      The Recycle Bin

    • D. 

      The Sidebar

  • 75. 
    • A. 

      Aero Shake

    • B. 

      Aero Peek

    • C. 

      Aero Snap

    • D. 

      Windows Flip 3D

  • 76. 
    • A. 

      Desktop

    • B. 

      Taskbar

    • C. 

      Windows Explorer

    • D. 

      Alert Center

  • 77. 
    • A. 

      Notification Area

    • B. 

      Alert Center

    • C. 

      Recycle Bin

    • D. 

      Jump Lists

  • 78. 
    • A. 

      Windows 7 Home Premium

    • B. 

      Windows 7 Professional

    • C. 

      Windows 7 Enterprise

    • D. 

      Windows 7 Ultimate

  • 79. 
    • A. 

      You are not able to run legacy 16-bit applications directly on Windows 7

    • B. 

      You are only able to run up to three legacy 16-bit applications

    • C. 

      You need to have 16-bit drivers available to use 16-bit applications

    • D. 

      Your 16-bit applications run slowly

  • 80. 
    In the Windows 7 Device Manager, how do you know if there is a problem with a driver?
    • A. 

      The driver icon has a red X

    • B. 

      The driver icon has an exclamation point

    • C. 

      The driver icon has a down arrow

    • D. 

      The driver icon is flashing

  • 81. 
    • A. 

      Change time zone

    • B. 

      Change power management settings

    • C. 

      Install fonts

    • D. 

      Install a device driver /an application

  • 82. 
    • A. 

      Computer Management Console

    • B. 

      User Account Control (UAC)

    • C. 

      Windows Firewall

    • D. 

      Event Viewer

  • 83. 
    • A. 

      System Information

    • B. 

      System Configuration

    • C. 

      Resource Monitor

    • D. 

      Windows Experience Index

  • 84. 
    • A. 

      Alert Counter

    • B. 

      Task Parameter

    • C. 

      Data Collector Set

    • D. 

      Windows Experience Index

  • 85. 
    • A. 

      Remote Desktop Connection / Assistance

    • B. 

      PSR

    • C. 

      WDS

    • D. 

      None of these

  • 86. 
    In which file system technology file level security is available?
    • A. 

      FAT

    • B. 

      NTFS

    • C. 

      FAT32

    • D. 

      Ext3

  • 87. 
    A person by name Paul wants to perform a profile migration, which involves a large number of profiles. He wants to transfer the profile data to USB device rapidly. Which of the following tool is helpful in the migration of the user profile data to the USB device?
    • A. 

      Windows Easy Transfer

    • B. 

      USMT Tool

    • C. 

      Snipping Tool

    • D. 

      Trace Tool

  • 88. 
    Windows Easy Transfer supports two types of migrations?
    • A. 

      Side by Side / Wipe and Load

    • B. 

      Wipe and Load

    • C. 

      Load and Wipe

    • D. 

      None of these above

  • 89. 
    • A. 

      Windows Firewall with Advanced Security

    • B. 

      Windows Defender

    • C. 

      Windows auditing

    • D. 

      Windows Tunnel Maker

  • 90. 
    Before you upgrade an existing Windows operating system to Windows 7, you should determine which edition your computer will support by installing and running the Windows 7 Upgrade ____
    • A. 

      Wizard

    • B. 

      Consultant

    • C. 

      Advisor

    • D. 

      Master

  • 91. 
    A person by name Simson as created a free allocated space of 20GB in his system, now he wants to deploy operating system image in the free allocated space in the system. Which tool should he use to deploy the operating system?
    • A. 

      Windows AIK

    • B. 

      MDT

    • C. 

      Bcdedit command –line tool

    • D. 

      USMT

  • 92. 
    You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer. You need to ensure that you can enable BitLocker To Go on the USB disk. What should you do?
    • A. 

      Enable Encrypting File System (EFS)

    • B. 

      Upgrade the computer to Windows 7 Enterprise

    • C. 

      Initialize the Trusted Platform Module (TPM) hardware

    • D. 

      Obtain a client certificate from an enterprise certification authority (CA)

  • 93. 
    You have a computer that runs Windows Vista. You need to identify whether the computer can be upgraded to Windows 7. Which tool should you use?
    • A. 

      Windows Anytime Upgrade for Windows 7

    • B. 

      Windows Anytime Upgrade for Windows Vista

    • C. 

      Windows 7 Upgrade Advisor

    • D. 

      Windows Vista Upgrade Advisor

  • 94. 
    A standard user named User1 has a computer that runs Windows 7. You need to ensure that User1 can run Windows Easy Transfer. What should you do?
    • A. 

      Disable User Account Control (UAC)

    • B. 

      Add User1 to the Administrators group

    • C. 

      Configure User1 to have a complex password

    • D. 

      Copy the support folder from the Windows 7 installation media to the local hard disk drive

  • 95. 
    You are employed as the network Administrator at Acme.com. The Acme.com network client computers currently make use of Microsoft Windows XP Professional. Acme.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You receive an instruction from management to identify the volume types that is not used by Windows 7.
    • A. 

      In Windows 7 exFAT is not a volume type

    • B. 

      In Windows 7 NTFS is not a volume type

    • C. 

      In Windows 7 FAT is not a volume type

    • D. 

      In Windows 7 NFS is not a volume type

  • 96. 
    • A. 

      To access ftp server

    • B. 

      To access Microsoft Windows share

    • C. 

      To access local file in linux machine

    • D. 

      None of the above

  • 97. 
    • A. 

      Command/ Options/ Arguments

    • B. 

      Arguments/ Script/command

    • C. 

      Command/ Options/ script native

    • D. 

      Script

  • 98. 
    What is the correct sequence of the output of ls -l;
    • A. 

      Type of file 2) permission 3) no of link 4) group 5) date and time 6) filename

    • B. 

      Type of file 2 permission 3) username 4) group 5) date and time 6) filename 7) size of file

    • C. 

      Type of file 2) permission 3) no of link 4) username 5) group 6) date and time 7) size of file8) filename

    • D. 

      None of the above

  • 99. 
    Which of the following partition cannot be formatted and used as a file system?
    • A. 

      Primary partition

    • B. 

      Extended partition

    • C. 

      Logical partition

    • D. 

      All of the above

  • 100. 
    You want to troubleshoot your hard disk’s configuration, so which directory you will open?
    • A. 

      /proc

    • B. 

      /dev

    • C. 

      /etc

    • D. 

      /var