1.
What is meant by localhost and 127.0.0.1?
2.
If you got blue screen on Windows, what will you do?
3.
If your computer screen showing no boot detected, what will you do?
4.
How to check your computer network is running well? What tool do you use?
5.
What is the difference between router, switch and hub? Use your own word to describe the difference.
6.
How do you secure your computer or server?
7.
Your clients are infected by ransomware. What will you do?
8.
Do you think cloud computing is important? What's the benefits?
9.
What do you know about Active Directory and LDAP?
10.
Are you familiar with Excel? What function do you usually use? Please elaborate each function with the purpose why you used that.
11.
Best define for an IP Address :
Correct Answer
B. Unique number, consists of 4 parts separated by dots associated with every system connected to a network
Explanation
The correct answer is "Unique number, consists of 4 parts separated by dots associated with every system connected to a network." An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves two main functions: identifying the host or network interface, and providing the location of the host in the network. The IP address is composed of four sets of numbers separated by dots, with each set ranging from 0 to 255.
12.
Port 22 and Port 23 are used for?
Correct Answer
D. 22 is used for SSH remote login, 23 is used for TELNET
Explanation
Port 22 is used for SSH (Secure Shell) remote login, which allows secure access to a remote computer over an unsecured network. Port 23, on the other hand, is used for TELNET, a protocol that provides a way to remotely access and control a computer. TELNET is not secure and transmits data in plain text, making it less secure compared to SSH. Therefore, the correct answer is that port 22 is used for SSH remote login, while port 23 is used for TELNET.
13.
What label is used for wildcard domain names?
Correct Answer
B. *
Explanation
The label used for wildcard domain names is "*". This symbol represents a wildcard character and is commonly used in DNS (Domain Name System) to match any subdomain or hostname. By using "*", any request for a domain that matches the wildcard pattern can be directed to a specific location or handled in a particular way. For example, "*.example.com" would match "www.example.com", "blog.example.com", and any other subdomain under "example.com".
14.
Someone requests you to disable a particular hardware device, which is built into the motherboard. How the valid ways to do so?
Correct Answer
D. Right click on My Computer icon, choose Manage, then select Device Manager
Explanation
To disable a hardware device that is built into the motherboard, the valid way to do so is by right-clicking on the My Computer icon, choosing Manage, and then selecting Device Manager. This will open the Device Manager window where you can locate the specific hardware device and disable it.
15.
What command can you use to force all computer policy?
Correct Answer
C. Gpupdate /force
Explanation
The correct answer is Gpupdate /force. This command is used to force an immediate update of all computer policies. It ensures that any changes made to group policies are applied immediately without waiting for the regular refresh interval. This command is commonly used in troubleshooting scenarios or when immediate policy changes are required.
16.
How to prevent someone from copying the cell from your worksheet? (answer can be more than 1)
Correct Answer
D. Use protect sheet tools and set a password
Explanation
To prevent someone from copying a cell from your worksheet, you can use the "protect sheet" tools and set a password. This feature allows you to restrict certain actions, such as copying, on the protected sheet. By setting a password, only individuals who know the password will be able to make changes or copy cells from the worksheet. This ensures that your data remains secure and prevents unauthorized copying.
17.
You configure the IP Address on a PC or Host that automatically provides a subnet mask after the IP Address is entered correctly. If the IP Address entered is 66.249.64.182, then the subnet mask that is automatically displayed is :
Correct Answer
C. 255.0.0.0
Explanation
The IP address 66.249.64.182 belongs to the Class A range of IP addresses, which have a default subnet mask of 255.0.0.0. This means that the first octet of the IP address represents the network portion, while the remaining three octets represent the host portion. Therefore, the subnet mask that is automatically displayed after entering this IP address correctly is 255.0.0.0.
18.
How to find list of local user in a computer? (answer can be more than 1)
Correct Answer(s)
B. Types lusrmgr.msc in Windows key + R
C. Types netplwiz in Windows key + R
D. Right click on My Computer icon, choose Manage, then select Local User and Groups
Explanation
To find a list of local users on a computer, you can perform the following actions:
1. Type "lusrmgr.msc" in the Windows key + R command prompt.
2. Type "netplwiz" in the Windows key + R command prompt.
3. Right-click on the My Computer icon, choose Manage, and then select Local User and Groups.