Quiz: Computer Proficiency MCQ Test!

30 Questions | Total Attempts: 25

SettingsSettingsSettings
Please wait...
Computer Quizzes & Trivia

.


Questions and Answers
  • 1. 
    You are troubleshooting a network connectivity problem on a Windows 7 Enterprise computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use?
    • A. 

      The ipconfig /all command

    • B. 

      The arp command

    • C. 

      The ping command

    • D. 

      The tracert command

  • 2. 
    You administer your company's network, which is connected to the Internet. A firewall is configured between the company network and the Internet. You want to prevent users on the Internet from using HTTP to connect to computers on the company network. Which well-known TCP port should you block to prevent Internet users from entering the company's network on that port?
    • A. 

      21

    • B. 

      23

    • C. 

      80

    • D. 

      119

  • 3. 
    What is the purpose of a pointer (PTR) DNS record?
    • A. 

      It maps a hostname to an IPv4 address.

    • B. 

      It maps a hostname to an IPv6 address.

    • C. 

      It maps an IP address to a hostname.

    • D. 

      It maps a domain name to an e-mail server.

    • E. 

      It contains an alias for an existing A record.

    • F. 

      It contains information regarding a particular DNS zone's start of authority.

  • 4. 
    You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are shown below: Adapter address: 00-10-4B-DE-F5-D8IP address: 192.168.1.40Subnet mask: 255.255.255.0Default gateway: 0.0.0.0You can access services on the local network from the host, but you cannot access the Internet. What is the most likely cause of the problem? 
    • A. 

      Incorrect IP address

    • B. 

      Missing default gateway

    • C. 

      Incorrect subnet mask

    • D. 

      Invalid Ethernet adapter

  • 5. 
    A user is complaining that she cannot log on to the network server. What is the first step in troubleshooting the issue?
    • A. 

      Reboot the network server.

    • B. 

      Run the MSCONFIG command.

    • C. 

      Establish whether other users are experiencing the same problem.

    • D. 

      Ensure that network server-access limits have not been exceeded.

  • 6. 
    You have been called to assist a user with a network connectivity problem. The user is unable to access an application stored on a server. You want to determine if this problem is network-wide or a workstation problem. Which step should be taken to make this determination?
    • A. 

      Shut down the server and reset the network.

    • B. 

      Try opening the application from other workstations.

    • C. 

      Reset the user's rights/permissions for the application.

    • D. 

      Try opening other applications on the user's workstation.

  • 7. 
    You have recently been hired as a network administrator. After starting your new job, you discover that the network devices are not being monitored on a regular basis. You need to deploy a technology or protocol that will provide this service. Which protocol or technology should you deploy?
    • A. 

      SMTP

    • B. 

      SNMP

    • C. 

      DHCP

    • D. 

      DNS

  • 8. 
    Your Windows 7 computer is located on a TCP/IP network that uses DHCP. You want your computer to release its lease on the TCP/IP configuration that it received from the DHCP server.Which command should you issue to release the configurations?
    • A. 

      The ping command

    • B. 

      The arp command

    • C. 

      The ipconfig command

    • D. 

      The tracert command

  • 9. 
    You have several switches and routers on your company's network. The switches aren't experiencing any problems. However, one of the routers is not correctly routing packets based on IP addresses. At which layer of the OSI model does the problem device operate?
    • A. 

      Session

    • B. 

      Network

    • C. 

      Physical

    • D. 

      Data Link

    • E. 

      Transport

  • 10. 
    Which TCP port is the well-known port assigned to SSL?
    • A. 

      20

    • B. 

      80

    • C. 

      119

    • D. 

      443

  • 11. 
    Users are having trouble accessing resources by computer or host name. Which device is likely causing the problem?
    • A. 

      DHCP Server

    • B. 

      DNS Server

    • C. 

      IIS Server

    • D. 

      Firewall

  • 12. 
    Which parameter of the ping command will cause the command to continue sending messages until interrupted?
    • A. 

      -t

    • B. 

      -a

    • C. 

      -f

    • D. 

      -v

  • 13. 
    Your department's laser printer recently began printing a vertical black line near the edge of every printed page. What should you do to resolve the problem?
    • A. 

      Add memory

    • B. 

      Replace the fuser

    • C. 

      Clean the transfer corona

    • D. 

      Replace the toner cartridge

  • 14. 
    Which tab of the MSCONFIG utility can allow you to select applications that should NOT be loaded at boot time? 
    • A. 

      The Startup tab

    • B. 

      The Services tab

    • C. 

      The Boot tab

    • D. 

      The General tab

  • 15. 
    After you have resolved a client's computer problem, what is the last step in the troubleshooting process?
    • A. 

      Identify the troubleshooting process

    • B. 

      Test the solution

    • C. 

      Test the solution

    • D. 

      Document findings, actions, and outcomes

  • 16. 
    What is a rootkit?
    • A. 

      A software application that displays advertisements while the application is executing.

    • B. 

      A malicious collection of programs that are implemented into an operating system’s boot procedure.

    • C. 

      An application that uses tracking cookies to collect and report a user's activities.

    • D. 

      A malicious program that spreads itself through network connections.

  • 17. 
    You need to copy a user's profile from one Windows 7/Windows 8 computer to another. In which folder would the user's profile be located?
    • A. 

      C:\Users

    • B. 

      C:\Documents and Settings

    • C. 

      C:\Windows

    • D. 

      C:\Program Files

  • 18. 
    Which device prevents unauthorized users from accessing certain services on a network? 
    • A. 

      Hub

    • B. 

      Router

    • C. 

      Bridge

    • D. 

      Firewall

  • 19. 
    A user reports that his computer often issues errors about running out of virtual memory. You want to increase the amount of available virtual memory.
    • A. 

      Open the case, and verify the type of RAM installed.

    • B. 

      Edit the size of the paging file by clicking the Settings button in the Performance section of the System Properties Advanced tab.

    • C. 

      Edit the size of the paging file by clicking the Device Manager button in the Device Manager section of the System Properties Hardware tab.

    • D. 

      AdminiRestart the computer.

  • 20. 
    Which type of RAID array includes a minimum of 3 drives that uses parity for data integrity?
    • A. 

      RAID 0

    • B. 

      RAID 1

    • C. 

      RAID 5

    • D. 

      RAID 6

  • 21. 
    True or False: RAID is a type of data backup.
    • A. 

      True

    • B. 

      False

  • 22. 
    You have installed several 32-bit and 64-bit applications on a Windows 7 Ultimate 64-bit computer. What is the installation folder for the 32-bit applications?
    • A. 

      C:\Program Files

    • B. 

      C:\Program Files (x86)

    • C. 

      C:\Program Files (x64)

    • D. 

      C:\Windows\System32

  • 23. 
    What is the subnet mask of a /27 network?
    • A. 

      255.255.255.0

    • B. 

      255.255.255.255

    • C. 

      255.255.255.252

    • D. 

      255.255.255.224

  • 24. 
    How many hosts are available on a /25 network?
    • A. 

      62

    • B. 

      254

    • C. 

      126

    • D. 

      30

  • 25. 
    What is the name of the virtualization software that Microsoft integrates into their server operating systems?
    • A. 

      VSphere

    • B. 

      Hyper-V

    • C. 

      ESXi

    • D. 

      VirtualBox

  • 26. 
    What is the name of the task automation scripting language used by Microsoft in their server operating systems?
    • A. 

      Ruby

    • B. 

      PowerShell

    • C. 

      AppleScript

    • D. 

      ColdFusion

  • 27. 
    In a server, what does “NIC” stand for?
    • A. 

      Network Interface Card

    • B. 

      Niche Integrated Circuit

    • C. 

      Non-Interfacing Calculator

    • D. 

      Nickel-Inducing Carbon

  • 28. 
    Your coworker has just made several changes to a Group Policy rule that is active on a client’s network. As you are at a client’s workstation, which CMD command do you use to update the group policy on the workstation?
    • A. 

      Gpresults

    • B. 

      Scwcmd

    • C. 

      Get-GPO

    • D. 

      Gpupdate

  • 29. 
    True or false: You can upgrade a server from Windows Server 2003 to Windows Server 2012 R2 by using the standard upgrade procedure in the Windows Server 2012 R2 installation wizard.
    • A. 

      True

    • B. 

      False

  • 30. 
    True or false: The MAC Address is a network address physically tied to a piece of networking equipment.
    • A. 

      True

    • B. 

      False