Pmkvy - Ftns Final Internal Assessment

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kathul.anand
K
Kathul.anand
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,776
| Attempts: 2,776 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. What is the name of the software that allows us to browse through web pages called?

Explanation

A browser is a software that allows users to access and browse web pages on the internet. It retrieves and displays information from websites, enabling users to navigate through different web pages, view multimedia content, and interact with various online services. Browsers provide a user-friendly interface and support features like bookmarks, tabbed browsing, and search functionality to enhance the web browsing experience.

Submit
Please wait...
About This Quiz
Pmkvy - Ftns Final Internal Assessment - Quiz

This PMKVY - FTNS Final Internal Assessment focuses on Active Directory and IT administration skills. It evaluates knowledge in user account management, DNS configurations, and optimal setup for... see moredomain controllers, catering to professionals enhancing or validating their IT management capabilities. see less

2. In IPv4 addressing, each IP address is a unique ____ number

Explanation

In IPv4 addressing, each IP address is a unique 32-bit number. This means that IPv4 addresses are composed of 32 binary digits or bits, which are divided into four groups of eight bits each, known as octets. Each octet is represented in decimal form, ranging from 0 to 255, and is separated by periods. This addressing scheme allows for approximately 4.3 billion unique IP addresses to be assigned.

Submit
3. Data (information) is stored in computers as

Explanation

Data (information) is stored in computers as files. Files are containers that hold data, such as documents, images, videos, or any other type of digital information. They are organized into directories, which are like folders that help in organizing and managing the files. Floppies, on the other hand, are a type of storage media that were commonly used in the past but are now outdated. Matter refers to physical substances and is not directly related to computer storage.

Submit
4. In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.

Explanation

A node with an IP address of 168.34.88.29 belongs to a Class B network. In IPv4 addressing, the first octet of the IP address determines the class of the network. Class B networks have a range of IP addresses from 128.0.0.0 to 191.255.255.255, and the first octet falls within this range.

Submit
5. A hard disk is divided into tracks which are further subdivided into:

Explanation

A hard disk is divided into tracks, which are concentric circles on the disk surface. These tracks are further divided into sectors. Sectors are the smallest unit of storage on a hard disk and are used to store data. Each sector typically holds a fixed amount of data, usually 512 bytes. Therefore, the correct answer is sectors.

Submit
6. Resistance is measured in ?

Explanation

Resistance is a measure of how much a material or device impedes the flow of electric current. It is measured in ohms, which is the unit of electrical resistance. The higher the resistance, the more difficult it is for current to flow through the material or device. Volts, amps, and watts are not units of resistance, but rather units of voltage, current, and power, respectively.

Submit
7. Which of the following are valid domain and forest functional levels for a Windows Server 2008 domain?

Explanation

The valid domain and forest functional levels for a Windows Server 2008 domain include Windows Server 2003 /2008. This means that the domain and forest functional levels can be set to either Windows Server 2003 or Windows Server 2008.

Submit
8. Secondry memory is also know as?

Explanation

Secondary memory is also known as auxiliary memory because it is used to store data and programs that are not currently being used by the computer's processor. It provides additional storage capacity and is typically slower than primary memory (such as RAM). Auxiliary memory devices include hard disk drives, solid-state drives, optical drives, and magnetic tape drives. These devices allow for long-term storage of data and programs, even when the computer is turned off. Therefore, the correct answer is "Auxiliary memory".

Submit
9. NICs contain a(n) ____ which transmits and receives data signals.

Explanation

NICs (Network Interface Cards) are hardware devices that allow computers to connect to a network. They contain a data transceiver, which is responsible for transmitting and receiving data signals between the computer and the network. This transceiver enables the computer to send and receive data packets over the network, allowing for communication and data transfer. Therefore, the correct answer is "data transceiver".

Submit
10. The default subnet mask for a Class B network is ____.

Explanation

The default subnet mask for a Class B network is 255.255.0.0. Class B networks have a default subnet mask of 255.255.0.0 because they have a network portion of 16 bits and a host portion of 16 bits. This allows for a maximum of 65,534 hosts on each network.

Submit
11. Which Motherboard form factor uses one 20 pin connector

Explanation

The correct answer is ATX. The ATX motherboard form factor uses one 20 pin connector for power supply. AT and BABY AT do not use a 20 pin connector. Therefore, the correct answer is ATX.

Submit
12. Which printer is very commonly used for desktop publishing?

Explanation

A laser printer is commonly used for desktop publishing because it offers high-quality printing with sharp and precise text and graphics. It uses a laser beam to create an electrostatic image on a drum, which is then transferred onto paper using toner. Laser printers are known for their fast printing speed, high resolution, and ability to handle complex documents. They are widely used in offices and professional settings where high-quality printing is required for desktop publishing tasks.

Submit
13. What is the name of the series of Laptop computers manufactured by IBM called?

Explanation

ThinkPad is the correct answer because it is the name of the series of laptop computers manufactured by IBM. IBM is known for producing high-quality laptops under the ThinkPad brand, which are renowned for their durability, performance, and innovative features. The ThinkPad series has gained a strong reputation among business professionals and technology enthusiasts for its reliability and user-friendly design.

Submit
14. TCP is a(n)___ sub protocol.

Explanation

TCP (Transmission Control Protocol) is a connection-oriented sub protocol. This means that it establishes a reliable and ordered connection between two devices before data transmission occurs. TCP ensures that all packets are received in the correct order and handles retransmission of lost or corrupted packets. This connection-oriented approach guarantees a reliable and error-free data transfer, making TCP suitable for applications that require data integrity, such as web browsing, email, and file transfers.

Submit
15. Which of the memories below is often used in a typical computer operation?

Explanation

RAM, or Random Access Memory, is often used in a typical computer operation. It is a type of computer memory that allows data to be read from and written to quickly. RAM is used to store data that is currently being used by the computer's operating system and software programs. It provides fast access to data, allowing the computer to perform tasks efficiently. Unlike ROM (Read-Only Memory) or HDD (Hard Disk Drive), RAM is volatile memory, meaning that its contents are lost when the computer is powered off.

Submit
16. Which of the following cables can transmit data at high speeds?

Explanation

Optic Fiber Cable can transmit data at high speeds because it uses light to carry information. It consists of a thin glass or plastic fiber that allows light to travel through it. This enables the transmission of data at very high speeds, as light can travel much faster than electrical signals used in other types of cables such as coaxial cable, twisted pair cable, and UTP cable.

Submit
17. The most common logical topologies are ____ and ring.

Explanation

The most common logical topologies are bus and ring. A bus topology is a network configuration where all devices are connected to a central cable called a bus. Data is transmitted along the bus to all connected devices, and each device receives the data and checks if it is intended for them. This topology is simple and cost-effective, but if the bus cable fails, the entire network can go down. A ring topology, on the other hand, connects devices in a circular manner, where each device is connected to two neighboring devices. Data travels around the ring in one direction, and each device receives and passes on the data until it reaches its destination.

Submit
18. IC are classified on the basis of ___

Explanation

ICs, or integrated circuits, are classified on the basis of the number of transistors they contain. The number of transistors in an IC determines its complexity and functionality. ICs with a higher number of transistors can perform more complex tasks and have more advanced features. Therefore, the number of transistors is a crucial factor in categorizing and differentiating ICs. The other options mentioned, such as the manufacturing company or type of computer, do not play a significant role in classifying ICs.

Submit
19. At about what interval are GPOs updated on domain controllers?

Explanation

GPOs (Group Policy Objects) are updated on domain controllers at approximately 15-minute intervals. This means that any changes made to GPOs will be propagated to the domain controllers within this timeframe. This interval allows for efficient and timely distribution of policy updates across the domain, ensuring that all client computers receive the latest policies and settings.

Submit
20. On an Ethenet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

Explanation

A collision domain is the portion of a network where collisions occur if two nodes transmit data at the same time. In other words, it is the area where packets from different devices can collide and cause data loss or corruption. This can happen in Ethernet networks when multiple devices are connected to a shared medium, such as a hub or a half-duplex switch. In a collision domain, devices must follow the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) protocol to avoid collisions by checking for activity on the network before transmitting data.

Submit
21. Computer software includes ____

Explanation

Computer software includes operating system programs, application programs, and packaged programs. Operating system programs are essential software that manage computer hardware and software resources. Application programs are software designed to perform specific tasks or functions for the user, such as word processors or web browsers. Packaged programs refer to software that is commercially available and ready to be installed and used by the user. Therefore, the correct answer is "All of these" as computer software includes all these types of programs.

Submit
22. Nortel is a company which manufactures:

Explanation

Nortel is a company that specializes in manufacturing network equipment. This includes devices such as routers, switches, and other networking hardware that are essential for the functioning of computer networks. Network equipment is crucial for establishing and maintaining communication between devices and ensuring the smooth flow of data within a network. Nortel's expertise lies in developing and producing high-quality network equipment, making it the correct answer in this context.

Submit
23. In latest generation computers, the instructions are executed

Explanation

In the latest generation computers, instructions are executed both sequentially and in parallel. This means that some instructions are executed one after the other in a sequential manner, while other instructions are executed simultaneously in parallel. This allows for faster processing and improved performance, as multiple tasks can be performed at the same time. Sequential execution ensures that instructions are executed in the correct order, while parallel execution allows for efficient utilization of resources and faster completion of tasks.

Submit
24. Which two features are available in Win XP, Vista and Windows 7 as well?

Explanation

The correct answer is Remote Desktop Connection / Assistance. These two features are available in Windows XP, Vista, and Windows 7. Remote Desktop Connection allows users to access their computer from a remote location, while Remote Assistance enables users to seek help from another user to troubleshoot and fix issues on their computer. Both features provide remote access and support capabilities, making them available across these three Windows operating systems.

Submit
25. Traditional switches operate at the ____ layer of the OSI model.

Explanation

Traditional switches operate at the data link layer of the OSI model. The data link layer is responsible for the reliable transfer of data between two directly connected nodes over a physical link. Switches use MAC addresses to forward data packets within a local area network (LAN) by examining the destination MAC address in the data link layer header. Therefore, the data link layer is the correct layer at which traditional switches operate.

Submit
26. What could cause a fixed disk error.

Explanation

Incorrect CMOS settings can cause a fixed disk error. The CMOS settings store information about the computer's hardware configuration, including the settings for the hard disk. If the CMOS settings for the hard disk are incorrect, such as selecting the wrong disk type or specifying an incorrect disk size, it can lead to a fixed disk error. This error prevents the computer from properly accessing the hard disk and can result in data loss or the inability to boot the operating system.

Submit
27. Programs stored in ROM are called ___

Explanation

Firmware refers to programs that are permanently stored in read-only memory (ROM). Unlike software, which can be modified or deleted, firmware remains unchanged and is essential for the functioning of hardware devices. It provides the necessary instructions for the hardware to perform specific tasks and is typically embedded within the device itself. Therefore, the correct answer is "Firmware."

Submit
28. A ____ is a repeater with more than one output port

Explanation

A hub is a repeater with more than one output port. A hub is a networking device that is used to connect multiple devices in a local area network (LAN). It receives data packets from one port and broadcasts them to all other ports, allowing all connected devices to receive the data. Therefore, a hub is the correct answer because it acts as a repeater with multiple output ports.

Submit
29. By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.

Explanation

The correct answer is PCIe. PCIe stands for Peripheral Component Interconnect Express, which is a high-speed serial computer expansion bus standard. It is currently the most popular expansion board NIC (Network Interface Controller) because it offers faster data transfer rates compared to other bus standards like ISA or ExpressCard. PCIe provides improved performance and scalability, making it the preferred choice for modern computer systems.

Submit
30. From what location are the 1st computer instructions available on boot up?

Explanation

The 1st computer instructions are available on boot up from ROM BIOS. ROM stands for Read-Only Memory, which is a type of memory that stores permanent instructions for the computer. BIOS stands for Basic Input/Output System, which is a firmware that initializes hardware components and loads the operating system. During the boot up process, the computer accesses the ROM BIOS to retrieve the initial instructions required to start the system.

Submit
31. With respect to a network interface card, the term 10/100 refers to

Explanation

The term 10/100, in the context of a network interface card, refers to the maximum speed at which data can be transferred. It signifies that the card is capable of supporting both 10 Mbps (megabits per second) and 100 Mbps speeds. This means that the card can handle data transfer rates of up to 100 Mbps, making it suitable for both slower 10 Mbps networks and faster 100 Mbps networks.

Submit
32. You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first.

Explanation

When installing a new IDE hard drive, the first thing to check is the jumpers on the hard drive. Jumpers are small connectors that determine the drive's configuration, such as whether it is set as a master or slave drive. If the jumpers are not correctly set, the system BIOS will not be able to recognize the new drive. Therefore, it is important to ensure that the jumpers are properly configured according to the system's requirements.

Submit
33. It holds the address of the active memory?

Explanation

MAR stands for Memory Address Register. It is a hardware component in a computer that holds the address of the memory location that is currently being accessed or written to. The MAR is responsible for sending the memory address to the memory unit, allowing the CPU to read or write data from or to that specific memory location. Therefore, the statement "It holds the address of the active memory" accurately describes the function of the MAR.

Submit
34. The sub protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network throughout a router is ____

Explanation

The correct answer is IP. IP (Internet Protocol) is the sub protocol that enables TCP/IP to internetwork. It allows data packets to be sent across multiple LAN segments and different types of networks through routers. IP provides the necessary addressing and routing functions to ensure that data reaches its intended destination across the internet. TCP (Transmission Control Protocol) is responsible for establishing reliable connections between devices, ICMP (Internet Control Message Protocol) is used for network diagnostics and error reporting, and UDP (User Datagram Protocol) is a connectionless protocol used for faster data transmission without error-checking.

Submit
35. Which standard govern parallel communications?

Explanation

IEEE 1284 is the correct answer because it is the standard that governs parallel communications. RS232 and RS-232a are standards for serial communications, not parallel. CAT 5 is a standard for Ethernet cables, not specifically for parallel communications. Therefore, IEEE 1284 is the most appropriate standard for governing parallel communications.

Submit
36. Floppy Disk Drives were originally designed by

Explanation

Sony was one of the original designers of floppy disk drives. They played a significant role in the development and popularization of this technology. Sony's contribution to the design and manufacturing of floppy disk drives made them a key player in the market. Their expertise and innovation in this field have made them a recognized name in the history of floppy disk drives.

Submit
37. Direct X is a _____

Explanation

DirectX is a software developed by Microsoft that provides a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video on Microsoft platforms. It is specifically designed to drive and manage the graphic hardware of a computer system, enabling developers to create and optimize high-performance graphics and multimedia applications. Therefore, the correct answer is "Software that drives Graphic hardware."

Submit
38. What are the units used to count the speed of a printer?

Explanation

The units used to count the speed of a printer are typically measured in pages per minute (PPM) or characters per minute (CPM). DPI refers to dots per inch, which is a measure of print resolution, and BIT is not a commonly used unit for measuring printer speed. Therefore, the correct answer is PPM.

Submit
39. To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

Explanation

To eliminate the possibility of a broadcast storm, switches and bridges implement the Spanning Tree Protocol (STP). STP is a network protocol that prevents loops in a network topology by creating a loop-free logical topology. It achieves this by selectively blocking redundant paths and allowing only one active path between any two network devices. By doing so, STP ensures that broadcast frames and other network traffic do not endlessly circulate in the network, thereby preventing a broadcast storm.

Submit
40. RS-232 is a standard that applies to:

Explanation

RS-232 is a standard that applies to serial ports. RS-232 is a communication standard that defines the voltage levels, signal timing, and connector pinouts for serial communication between devices. It is commonly used for connecting devices such as modems, printers, and computer terminals to a computer. Serial ports transmit data one bit at a time, sequentially, over a single communication line, making RS-232 the appropriate standard for serial port communication.

Submit
41. Who among the following is a Personal Computer manufacturer from Taiwan?

Explanation

Acer is a personal computer manufacturer from Taiwan. Sony is a Japanese company known for its electronics, IBM is an American multinational technology company, and Samsung is a South Korean conglomerate. Therefore, the correct answer is Acer.

Submit
42. A microprocessor unit, a memory unit, and an input/output unit form a:

Explanation

A microcomputer is formed by the combination of a microprocessor unit, a memory unit, and an input/output unit. The microprocessor unit is responsible for executing instructions and performing calculations, the memory unit stores data and instructions, and the input/output unit allows the microcomputer to interact with external devices. Therefore, a microcomputer is the correct answer as it encompasses all three components mentioned.

Submit
43. What do you call the long horizontal bar at the bottom of the screen that Includes the running programs, the Start button, and the Notification Area?

Explanation

The long horizontal bar at the bottom of the screen that includes the running programs, the Start button, and the Notification Area is called the taskbar. It provides easy access to open and switch between different programs and also displays notifications and system icons.

Submit
44. ____ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

Explanation

NTP (Network Time Protocol) is a simple Application layer protocol used to synchronize the clocks of computers on a network. It allows computers to accurately maintain the same time by exchanging time information with NTP servers. This synchronization is important for various network applications that rely on accurate timekeeping, such as transaction processing, logging, and authentication. NTP uses a hierarchical structure of time servers to ensure accuracy and reliability in time synchronization across the network.

Submit
45. Which of the following is a container object?

Explanation

Domain & OU (Organizational Unit) are both container objects in a Windows Active Directory environment. They are used to organize and manage objects such as users, computers, and groups within a network. A domain is a logical grouping of network resources, while an OU is a subdivision within a domain that allows for further organization and delegation of administrative tasks.

Submit
46. What protocol enables you to create a standard platform to develop secure networks and electronic tunnels between two machines?

Explanation

Windows Firewall with Advanced Security enables you to create a standard platform to develop secure networks and electronic tunnels between two machines. It provides advanced features such as inbound and outbound filtering, monitoring, and logging of network traffic. It allows you to create rules and policies to control network traffic and protect against unauthorized access. Additionally, it supports the creation of secure virtual private network (VPN) connections, which can be used to establish secure tunnels between machines over the internet.

Submit
47. ____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

Explanation

Gateways are combinations of networking hardware and software that connect two dissimilar kinds of networks. Unlike routers and switches, which primarily connect networks of the same kind, gateways are specifically designed to bridge the gap between different types of networks. They can translate protocols, perform data format conversions, and enable communication between networks that use different technologies or standards. Gateways are essential for connecting networks with different architectures, such as connecting a local area network (LAN) to the internet.

Submit
48. What type of DNS record is the record that points out the location of the mail server?

Explanation

The correct answer is MX. MX stands for Mail Exchanger, and it is a type of DNS record that specifies the mail server responsible for accepting incoming email messages for a specific domain. It points out the location of the mail server, allowing email to be properly routed and delivered to the intended recipients.

Submit
49. In which file system technology file level security is available?

Explanation

NTFS (New Technology File System) is the file system technology that provides file level security. It allows users to set permissions and access controls on individual files and folders, ensuring that only authorized users can access or modify them. This level of security is not available in FAT (File Allocation Table) or FAT32 (File Allocation Table 32) file systems. Ext3 (Third Extended File System) also does not provide file level security.

Submit
50. Which provides the fastest access to large video files?

Explanation

SCSI (Small Computer System Interface) hard drives provide the fastest access to large video files. SCSI is a high-performance interface that allows for faster data transfer rates compared to other interfaces like IDE and EIDE. This makes SCSI hard drives ideal for handling large video files, which require quick access and retrieval. Optical drives, on the other hand, are not as fast as SCSI hard drives when it comes to accessing large video files.

Submit
51. Windows Easy Transfer supports two types of migrations?

Explanation

Windows Easy Transfer supports two types of migrations: Side by Side and Wipe and Load. Side by Side migration involves transferring files and settings from an old computer to a new computer while keeping the old computer intact. Wipe and Load migration, on the other hand, involves wiping the old computer clean and then transferring files and settings to a new computer.

Submit
52. Before you upgrade an existing Windows operating system to Windows 7, you should determine which edition your computer will support by installing and running the Windows 7 Upgrade ____

Explanation

Before upgrading an existing Windows operating system to Windows 7, it is important to determine which edition your computer will support. This can be done by installing and running the Windows 7 Upgrade Wizard. The wizard will analyze your system and provide recommendations on which edition of Windows 7 is compatible with your computer's hardware and software configuration. It helps users make informed decisions about the upgrade process and ensures a smooth transition to the new operating system.

Submit
53. Groups are considered an organizing component of Active Directory

Explanation

Active Directory is a hierarchical directory service that is used to store information about network resources, such as users, groups, and computers, in a centralized database. While groups are an important component of Active Directory, they are not considered the organizing component. The organizing component of Active Directory is the Domain, which is a logical grouping of network resources that share a common directory database. Therefore, the statement that groups are considered the organizing component of Active Directory is false.

Submit
54. You run the Add Roles Wizard in Server Manager to add the AD DS role.  After the wizard is finished, you check the Administrative Tools folder but don't find any of the Active Directory management tools.  What should you do?

Explanation

After running the Add Roles Wizard in Server Manager to add the AD DS role, if the Active Directory management tools are not found in the Administrative Tools folder, the next step would be to run Dcpromo.exe. Dcpromo.exe is a command-line tool used to promote a server to a domain controller. Running this tool can help resolve the issue and make the Active Directory management tools available.

Submit
55. A source program is

Explanation

A source program refers to a program that is written in a high-level programming language, such as C++, Java, or Python, which needs to be translated or compiled into machine language before it can be executed by a computer. Therefore, the correct answer is "a program to be translated into machine language."

Submit
56. You install Active Directory on a server. You want it to be a separate domain that is part of an existing forest but containing a namespace separate from the forest where you are installing it. What is this type of domain called?

Explanation

A tree root domain is a separate domain within an existing forest that has its own namespace separate from the forest where it is installed. This allows for the creation of a distinct domain structure within the forest, with its own unique domain name.

Submit
57. How can you create a user object with the help of a single command?

Explanation

The Dsadd command can be used to create a user object with a single command. This command is a command-line tool that is used to create objects in Active Directory, including user objects. By using the appropriate syntax and parameters, the Dsadd command allows administrators to quickly and efficiently create user objects without the need for multiple commands or manual configuration.

Submit
58. The software used to drive microprocessor-based systems is called:

Explanation

Assembly language programs are the software used to drive microprocessor-based systems. Assembly language is a low-level programming language that uses mnemonic codes to represent machine instructions. It is specific to a particular processor architecture and provides a way to directly control the hardware of a microprocessor. Assembly language programs are closer to the machine code and allow for efficient and precise control over the system's operations. Firmware refers to software that is embedded in a device's hardware and is responsible for controlling its functions. BASIC interpreter instructions and flowchart instructions are not specific to microprocessor-based systems and are not commonly used for driving them.

Submit
59. A user granted Domain Administrator access over the domain dallas.mycorp.com may administer which of the following groupings?

Explanation

The user granted Domain Administrator access over the domain dallas.mycorp.com can administer the grouping of dallas.mycorp.com within the mycorp.com domain. This means they have administrative control over the specific domain dallas.mycorp.com, which is a subdomain of the larger mycorp.com domain. They do not have administrative control over the other groupings mentioned in the question.

Submit
60. An Active Directory container used to organize a network’s users and resources into logical administrative units

Explanation

The correct answer is Organizational Units. Organizational Units are a type of Active Directory container that are used to organize a network's users and resources into logical administrative units. They provide a way to manage and delegate administrative tasks within a network by grouping related objects together. Organizational Units help to simplify the management of users, groups, computers, and other network resources, allowing administrators to apply policies, permissions, and other settings at a more granular level.

Submit
61. Which of the following will happen when data is entered into a memory location?

Explanation

When data is entered into a memory location, it will erase the previous content. This means that the new data will replace whatever was previously stored in that memory location. The previous content will be overwritten and no longer accessible.

Submit
62. A ____ is a multiport connectivity device that directs data between nodes on a network

Explanation

A router is a multiport connectivity device that directs data between nodes on a network. Unlike switches and bridges, routers are designed to connect multiple networks together and determine the best path for data to travel. Routers use routing tables to make decisions about where to send data packets based on their destination IP addresses. Gateways, on the other hand, are devices that connect different types of networks together, such as a local area network (LAN) to the internet. Therefore, a router is the correct answer as it specifically directs data between nodes on a network.

Submit
63. A person by name Paul wants to perform a profile migration, which involves a large number of profiles. He wants to transfer the profile data to USB device rapidly. Which of the following tool is helpful in the migration of the user profile data to the USB device?

Explanation

Windows Easy Transfer is the correct answer because it is a tool specifically designed for transferring user profile data, including files, settings, and preferences, from one computer to another or to an external storage device like a USB device. It provides a simple and straightforward way to migrate profiles, making the process quick and efficient. The other tools listed, such as the USMT Tool, Snipping Tool, and Trace Tool, are not designed for profile migration and would not be as helpful in this scenario.

Submit
64. Which of the following groupings of linked domains would be a tree?

Explanation

The grouping of "mycorp.com and newsite.mycorp.com" would form a tree. This is because "newsite.mycorp.com" is a subdomain of "mycorp.com". In a tree structure, there is a hierarchical relationship between the nodes, where each node can have only one parent. In this case, "mycorp.com" would be the parent node and "newsite.mycorp.com" would be the child node. This grouping follows the tree structure as it has a clear parent-child relationship between the domains.

Submit
65. The 34-pin connection on an I/O card is for?

Explanation

The 34-pin connection on an I/O card is for the floppy drive. Floppy drives typically use a 34-pin connector to connect to the I/O card, allowing for data transfer between the drive and the computer. This type of connection was commonly used in older computer systems before the advent of USB and other modern storage technologies.

Submit
66. The area where the clock and a few select system icons is located on the taskbar is called what?

Explanation

The area where the clock and a few select system icons is located on the taskbar is called the Notification Area. This is where important notifications and system status updates are displayed for the user to see. It provides quick access to system settings and allows users to customize which icons are displayed.

Submit
67. You are the administrator of an active directory domain. A user complains to you that he is unable to change his password. No other users have this issue. What is the most likely cause of the problem?

Explanation

The most likely cause of the user's inability to change his password is that the property "User cannot change password" has been enabled when his account was created. This property restricts the user from changing their password, and since no other users are experiencing this issue, it suggests that it is specific to this user's account.

Submit
68. Which of the following commands will force an update of group policy of computers on the domain Airtel?

Explanation

The correct answer is GPUPDATE /force. This command is used to force an immediate update of group policy settings on a computer or a specific target. By using the /force parameter, all policies are reapplied, even if there are no changes since the last update. This ensures that any changes made to group policy settings on the domain Airtel are immediately applied to the computers within that domain.

Submit
69. Index hole is related to?

Explanation

The index hole is related to the CPU. In older computer systems, the index hole was a physical hole or notch on the edge of a punched card or paper tape that was used to mark the beginning of a new line or record. When the hole passed through a sensor, it triggered the CPU to start processing the next line or record of data. This indexing mechanism was commonly used in early computer systems to read and process data from punched cards or paper tapes.

Submit
70. Which of the following was not an improvement of Windows 7 over Windows Vista?

Explanation

Bit Locker was not an improvement of Windows 7 over Windows Vista. Bit Locker is a feature that was introduced in Windows Vista and continued to be available in Windows 7. It is a data protection feature that allows users to encrypt their drives to prevent unauthorized access. Therefore, it cannot be considered as an improvement of Windows 7 over Windows Vista.

Submit
71. Your IT Company is constantly changing, with new users coming and going throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts?

Explanation

LDIFDE can be used to delete user accounts. LDIFDE stands for Lightweight Directory Access Protocol Data Interchange Format Editor and it is a command-line tool used to import, export, and modify objects in Active Directory. In this scenario, since the task is to delete user accounts for employees who have left the company, LDIFDE can be used to remove those user accounts from the Active Directory.

Submit
72. You are installing Active Directory on a new domain controller and selecting options for placing the database and log files. Which of the following options would produce the optimum performance of these files? Each answer represents part of the solution..?

Explanation

Placing the Active Directory database and log files on separate physical disks would result in optimum performance. This is because separating the files onto different disks allows for parallel read and write operations, reducing disk contention and improving overall performance. Additionally, by placing them on NTFS partitions, the files can benefit from the security and reliability features provided by the NTFS file system. Ensuring plenty of hard disk space for these files to expand is also important to prevent any potential issues caused by running out of disk space. Restricting them to small partitions may limit their size and potentially hinder their functionality.

Submit
73. Which of the following does UAC prompt for permission or administrative Credentials?

Explanation

The UAC (User Account Control) prompts for permission or administrative credentials when attempting to install a device driver or an application. This is because installing drivers or applications can potentially make changes to the system settings or introduce new software that may have an impact on the computer's stability and security. By requiring permission or administrative credentials, UAC helps to ensure that only authorized users can make such changes, reducing the risk of unauthorized modifications or malicious software installation.

Submit
74. A physical topology ____.

Explanation

A physical topology refers to the layout or arrangement of devices in a network, such as how they are connected and the physical paths that data takes. It does not specify device types, connectivity methods, or addressing schemes. Instead, it focuses on providing a high-level overview of the network structure, showing how devices are physically connected and organized. Therefore, the correct answer is "depicts a network in broad scope."

Submit
75. Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?

Explanation

The correct order for the Active Directory organizational structure is as follows: Forest is the highest level, containing multiple Trees. Each Tree contains multiple Domains. Finally, within each Domain, there are Computers. Therefore, the correct order is Forest, Tree, Domain, Computer.

Submit
76. The main purpose of Active Directory is to ________.

Explanation

Active Directory is a directory service developed by Microsoft that provides authentication and authorization to users and computers in a network. It allows administrators to manage and control access to resources, such as files, folders, and printers, by assigning permissions and policies. Active Directory ensures that only authorized users can access specific resources and helps maintain the security and integrity of the network. Therefore, its main purpose is to provide authentication and authorization to users and computers.

Submit
77. What replaced the Quick Launch shortcut?

Explanation

Jump Lists replaced the Quick Launch shortcut. Quick Launch was a feature in previous versions of Windows that allowed users to quickly access frequently used programs and files. However, in later versions of Windows, such as Windows 7 and onwards, Jump Lists were introduced as a replacement for Quick Launch. Jump Lists provide a similar functionality by allowing users to access recent documents, tasks, and frequently used programs directly from the taskbar or Start menu.

Submit
78. You work as the desktop support technician at Texas.com. Your boss wants to protect the laptops if they get stolen. What would you do?

Explanation

Implementing BitLocker is a suitable solution for protecting laptops if they get stolen. BitLocker is a full-disk encryption feature that encrypts the entire Windows operating system and data on the hard drive. This ensures that even if the laptop is stolen, the data cannot be accessed without the correct encryption key. By implementing BitLocker, the data on the laptops will remain secure, providing an effective measure against unauthorized access.

Submit
79. A person by name Simson as created a free allocated space of 20GB in his system, now he wants to deploy operating system image in the free allocated space in the system. Which tool should he use to deploy the operating system?

Explanation

Simson should use Windows AIK (Automated Installation Kit) to deploy the operating system image in the free allocated space on his system. Windows AIK is a set of tools and documentation provided by Microsoft to assist in deploying Windows operating systems. It includes tools like Windows System Image Manager (SIM) and Deployment Image Servicing and Management (DISM) that can be used to create and deploy operating system images.

Submit
80. To which of the following can a GPO be linked?

Explanation

A Group Policy Object (GPO) can be linked to sites in Active Directory. Sites in Active Directory represent physical locations or network segments within a domain. By linking a GPO to a site, the policy settings defined in the GPO will be applied to all objects within that site. This allows for more granular control and management of policies based on the physical location of the network.

Submit
81. Which feature in Windows 7 enables you to quickly reveal hidden icons and gadgets?

Explanation

Aero Peek is the feature in Windows 7 that allows users to quickly reveal hidden icons and gadgets. By hovering over the "Show Desktop" button on the taskbar, users can temporarily minimize all open windows and see the desktop. This feature is useful for quickly accessing hidden icons or gadgets without having to minimize or close any open windows.

Submit
82. Which of the following is used to prevent unauthorized changes to your computer?

Explanation

User Account Control (UAC) is used to prevent unauthorized changes to your computer. UAC is a security feature in Windows operating systems that prompts users for permission or confirmation before allowing any program or process to make changes that could affect the system. It helps to protect the computer from malicious software and prevents unauthorized access to system settings. By enabling UAC, users have better control over their computer and can ensure that only trusted applications make changes to the system.

Submit
83. If a policy is defined in a GPO linked to a domain, and that policy is defined with a different setting in a GPO linked to an OU, which is true by default?

Explanation

When a policy is defined in a Group Policy Object (GPO) linked to an Organizational Unit (OU) and the same policy is defined with a different setting in a GPO linked to a domain, the policy setting in the GPO linked to the OU takes precedence by default. This means that the policy setting in the GPO linked to the OU will be applied to the objects within that OU, overriding the policy setting in the GPO linked to the domain.

Submit
84. Under what circumstances are the built-in user accounts no longer local user accounts?

Explanation

After installing Active Directory, the built-in user accounts are no longer local user accounts. Active Directory is a directory service that centralizes the management of network resources, including user accounts, in a domain environment. When Active Directory is installed, it replaces the local user accounts with domain user accounts, which are managed by the Active Directory domain controller. Therefore, the built-in user accounts become domain user accounts rather than local user accounts.

Submit
85. What is the disadvantage of using a 64-bit version of Windows 7 when running applications?

Explanation

not-available-via-ai

Submit
86. You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer. You need to ensure that you can enable BitLocker To Go on the USB disk. What should you do?

Explanation

not-available-via-ai

Submit
87. What is the address given to a computer connected to a network called?

Explanation

The address given to a computer connected to a network is called a structure. This term refers to the organization and arrangement of components within a computer system. In the context of networking, a structure is used to define the format and layout of data packets sent over the network. It helps in organizing and managing the various components and protocols involved in network communication.

Submit
88. In the Windows 7 Device Manager, how do you know if there is a problem with a driver?

Explanation

If a driver icon in the Windows 7 Device Manager has an exclamation point, it indicates that there is a problem with the driver. This symbol typically indicates a driver error or conflict, such as a missing or outdated driver, incompatible hardware, or a malfunctioning device. The exclamation point serves as a warning sign to the user that the driver may not be functioning properly and needs attention.

Submit
89. Which of the following is the most appropriate scenario where you would want to install a read-only domain controller?

Explanation

Installing a read-only domain controller (RODC) in a branch office with less than optimum physical security would be the most appropriate scenario. RODC is designed to enhance security in remote locations where the physical security of the server might be compromised. It allows organizations to deploy a domain controller without risking the exposure of sensitive information in case of theft or unauthorized access. By installing an RODC, the risk of compromising the entire domain is minimized, as it stores a read-only copy of the Active Directory database and does not allow any changes to be made locally.

Submit
90. You have a computer that runs Windows Vista. You need to identify whether the computer can be upgraded to Windows 7. Which tool should you use?

Explanation

The Windows 7 Upgrade Advisor is the correct tool to use in order to identify whether a computer running Windows Vista can be upgraded to Windows 7. This tool will analyze the computer's hardware and software to determine compatibility with Windows 7 and provide recommendations for any necessary upgrades or actions to take before upgrading.

Submit
91. A standard user named User1 has a computer that runs Windows 7. You need to ensure that User1 can run Windows Easy Transfer. What should you do?

Explanation

Adding User1 to the Administrators group will give them the necessary permissions and privileges to run Windows Easy Transfer. The Administrators group has elevated privileges that allow users to perform administrative tasks on the computer. By adding User1 to this group, they will have the necessary permissions to run Windows Easy Transfer without any issues.

Submit
92. What can you use to quickly capture performance data of multiple performance counters and configure alert activities based on the performance counters?

Explanation

A Data Collector Set is a tool that can be used to quickly capture performance data of multiple performance counters and configure alert activities based on those counters. It allows users to specify which performance counters they want to monitor and collect data from, and then set up alerts to be triggered based on specific thresholds. This allows for efficient monitoring and analysis of system performance.

Submit
93. What are the two default GPOs that are created when Active Directory is installed?

Explanation

When Active Directory is installed, two default Group Policy Objects (GPOs) are created: Default Domain Policy and Default Domain Controllers Policy. The Default Domain Policy is applied to all users and computers in the domain, while the Default Domain Controllers Policy is applied specifically to domain controllers. These GPOs define the default security and configuration settings for the domain and domain controllers, respectively.

Submit
94. Which edition of Windows 7 is the minimum needed to fully support Home Groups and DVD Video Playback and authoring?

Explanation

Windows 7 Home Premium is the minimum edition needed to fully support Home Groups and DVD Video Playback and authoring. This edition includes all the necessary features and functionalities to create and join Home Groups for easy file sharing and collaboration. Additionally, it supports DVD video playback and authoring, allowing users to watch and create DVDs on their computer.

Submit
95. The policy in both GPOs defaults to Not Defined so that no conflict exists

Explanation

The given answer suggests that the policy in both GPOs defaults to "Not Defined" in order to avoid any conflicts. This means that there are no specific settings defined in the GPOs, allowing the system to use its default settings. The explanation does not include the phrase "The correct answer is" as instructed.

Submit
96. What tool can help you quickly determine what processes are writing to disk and how much each is writing?

Explanation

Resource Monitor is a tool that can help you quickly determine what processes are writing to disk and how much each is writing. It provides real-time monitoring and detailed information about the disk activity of different processes running on the system. By analyzing the disk activity tab in Resource Monitor, you can identify the processes that are using the disk heavily and consuming more resources. This information can be useful in troubleshooting performance issues and identifying any processes that may be causing excessive disk usage.

Submit
97. Which editions of Windows 7 include all features that Windows 7 has to offer?

Explanation

Windows 7 Enterprise includes all the features that Windows 7 has to offer. This edition is typically used by large organizations and businesses as it includes advanced security and networking capabilities, as well as additional features like DirectAccess and BranchCache. It is designed to meet the needs of enterprise-level users and provides them with a comprehensive set of features for their computing requirements.

Submit
98. You are employed as the network Administrator at Acme.com. The Acme.com network client computers currently make use of Microsoft Windows XP Professional. Acme.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You receive an instruction from management to identify the volume types that is not used by Windows 7.

Explanation

The correct answer is that in Windows 7, NFS (Network File System) is not a volume type. This means that Windows 7 does not support NFS as a file system for creating volumes. NFS is a protocol used for sharing files and directories over a network, commonly used in Unix-like operating systems. However, Windows 7 primarily supports NTFS (New Technology File System) and FAT (File Allocation Table) as volume types. exFAT (Extended File Allocation Table) is also supported, but it is not the correct answer as it is a volume type in Windows 7.

Submit
99. When configuring GPOs, which node contains the majority of account policies?

Explanation

The majority of account policies can be found in the Computer Configuration node, specifically within the Windows Settings folder and the Security Settings node. This is where settings related to password policies, account lockout policies, and other security-related configurations are typically located. The Administrative Templates folder and the Windows Components node may contain other configuration options, but they do not specifically pertain to account policies. The User Configuration node and its folders are primarily used to configure settings for individual user accounts, rather than account policies in general.

Submit
100. After receiving several support calls, you have decided to prevent users of the DomA-Group from being able to access the Control Panel regardless of what machine they log into. Where would you configure this setting?

Explanation

In order to prevent users of the DomA-Group from accessing the Control Panel regardless of the machine they log into, you would need to configure this setting in the User Configuration node, specifically in the Administrative Templates folder. This folder contains various policy settings that can be applied to user accounts. By configuring the appropriate policy setting within this folder, you can restrict access to the Control Panel for users belonging to the DomA-Group.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 31, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 31, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 15, 2015
    Quiz Created by
    Kathul.anand
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the name of the software that allows us to browse through web...
In IPv4 addressing, each IP address is a unique ____ number
Data (information) is stored in computers as
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs...
A hard disk is divided into tracks which are further subdivided into:
Resistance is measured in ?
Which of the following are valid domain and forest functional levels...
Secondry memory is also know as?
NICs contain a(n) ____ which transmits and receives data signals.
The default subnet mask for a Class B network is ____.
Which Motherboard form factor uses one 20 pin connector
Which printer is very commonly used for desktop publishing?
What is the name of the series of Laptop computers manufactured by IBM...
TCP is a(n)___ sub protocol.
Which of the memories below is often used in a typical computer...
Which of the following cables can transmit data at high speeds?
The most common logical topologies are ____ and ring.
IC are classified on the basis of ___
At about what interval are GPOs updated on domain controllers?
On an Ethenet network, a(n) ____ is the portion of a network in which...
Computer software includes ____
Nortel is a company which manufactures:
In latest generation computers, the instructions are executed
Which two features are available in Win XP, Vista and Windows 7 as...
Traditional switches operate at the ____ layer of the OSI model.
What could cause a fixed disk error.
Programs stored in ROM are called ___
A ____ is a repeater with more than one output port
By far, the most popular expansion board NIC today is one that uses...
From what location are the 1st computer instructions available on boot...
With respect to a network interface card, the term 10/100 refers to
You just installed a new IDE hard drive, but your system BIOS will not...
It holds the address of the active memory?
The sub protocol that enables TCP/IP to internetwork - that is, to...
Which standard govern parallel communications?
Floppy Disk Drives were originally designed by
Direct X is a _____
What are the units used to count the speed of a printer?
To eliminate the possibility of a broadcast storm, switches and...
RS-232 is a standard that applies to:
Who among the following is a Personal Computer manufacturer from...
A microprocessor unit, a memory unit, and an input/output unit form a:
What do you call the long horizontal bar at the bottom of the screen...
____ is a simple Application layer protocol used to synchronize the...
Which of the following is a container object?
What protocol enables you to create a standard platform to develop...
____ are combinations of networking hardware and software that connect...
What type of DNS record is the record that points out the location of...
In which file system technology file level security is available?
Which provides the fastest access to large video files?
Windows Easy Transfer supports two types of migrations?
Before you upgrade an existing Windows operating system to Windows 7,...
Groups are considered an organizing component of Active Directory
You run the Add Roles Wizard in Server Manager to add the AD DS...
A source program is
You install Active Directory on a server. You want it to be a separate...
How can you create a user object with the help of a single command?
The software used to drive microprocessor-based systems is called:
A user granted Domain Administrator access over the domain...
An Active Directory container used to organize a network’s users and...
Which of the following will happen when data is entered into a memory...
A ____ is a multiport connectivity device that directs data between...
A person by name Paul wants to perform a profile migration, which...
Which of the following groupings of linked domains would be a tree?
The 34-pin connection on an I/O card is for?
The area where the clock and a few select system icons is located on...
You are the administrator of an active directory domain. A user...
Which of the following commands will force an update of group policy...
Index hole is related to?
Which of the following was not an improvement of Windows 7 over...
Your IT Company is constantly changing, with new users coming and...
You are installing Active Directory on a new domain controller and...
Which of the following does UAC prompt for permission or...
A physical topology ____.
Which of the following is arranged in the correct Active Directory...
The main purpose of Active Directory is to ________.
What replaced the Quick Launch shortcut?
You work as the desktop support technician at Texas.com. Your boss...
A person by name Simson as created a free allocated space of 20GB in...
To which of the following can a GPO be linked?
Which feature in Windows 7 enables you to quickly reveal hidden icons...
Which of the following is used to prevent unauthorized changes to your...
If a policy is defined in a GPO linked to a domain, and that policy is...
Under what circumstances are the built-in user accounts no longer...
What is the disadvantage of using a 64-bit version of Windows 7 when...
You have a computer that runs Windows 7 Professional. A USB disk is...
What is the address given to a computer connected to a network called?
In the Windows 7 Device Manager, how do you know if there is a problem...
Which of the following is the most appropriate scenario where you...
You have a computer that runs Windows Vista. You need to identify...
A standard user named User1 has a computer that runs Windows 7. You...
What can you use to quickly capture performance data of multiple...
What are the two default GPOs that are created when Active Directory...
Which edition of Windows 7 is the minimum needed to fully support Home...
The policy in both GPOs defaults to Not Defined so that no conflict...
What tool can help you quickly determine what processes are writing to...
Which editions of Windows 7 include all features that Windows 7 has to...
You are employed as the network Administrator at Acme.com. The...
When configuring GPOs, which node contains the majority of account...
After receiving several support calls, you have decided to prevent...
Alert!

Advertisement