3d052 Vol 2 Ure

100 Questions | Total Attempts: 41

SettingsSettingsSettings
Please wait...
3d052 Vol 2 Ure


Questions and Answers
  • 1. 
    (201) What is considered to be a computer’s main storage?
    • A. 

      Random access memory (RAM).

    • B. 

      Read only memory (ROM).

    • C. 

      Basic input/output system (BIOS).

    • D. 

      Complementary metal-oxide semiconductor (CMOS).

  • 2. 
    (201) Which original components were very susceptible to damage from electrostatic discharge? 
    • A. 

      Read only memory (ROM).

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 3. 
    (201) What is considered as nonvolatile permanent memory? 
    • A. 

      Read only memory (ROM).

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 4. 
    (201) What is a form of firmware that contains the computer’s startup instructions?
    • A. 

      Cache.

    • B. 

      Basic input/output system (BIOS).

    • C. 

      Complementary metal-oxide semiconductor (CMOS).

    • D. 

      Electronic erasable programmable read-only memory (EEPROM).

  • 5. 
    (202) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
    • A. 

      Cache.

    • B. 

      Buffer.

    • C. 

      Interface.

    • D. 

      Interrupt.

  • 6. 
    (202) Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)? 
    • A. 

      Disk request.

    • B. 

      Utility resource.

    • C. 

      Priority interrupt.

    • D. 

      Integrated resource.

  • 7. 
    (202) Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
    • A. 

      2.

    • B. 

      4.

    • C. 

      6.

    • D. 

      8.

  • 8. 
    (202) Which is a term used to describe that data is whole or complete?
    • A. 

      Driver.

    • B. 

      Parity bit.

    • C. 

      Data integrity.

    • D. 

      Error correction.

  • 9. 
    (202) What is considered as a technique or method of checking data integrity?
    • A. 

      Fault.

    • B. 

      Parity.

    • C. 

      Interrupt.

    • D. 

      Asynchronous.

  • 10. 
     (202) Which is a very simple example of an error detecting code?
    • A. 

      Interrupt.

    • B. 

      Parity bit.

    • C. 

      Asynchronous.

    • D. 

      Data integrity.

  • 11. 
    (203) What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not? 
    • A. 

      Network attached storage (NAS).

    • B. 

      Storage area network (SAN).

    • C. 

      Redundant array of independent disks (RAID).

    • D. 

      Array storage.

  • 12. 
    (203) What is an advantage of using a storage area network (SAN) architecture?
    • A. 

      Ease of replacing the hard drive.

    • B. 

      Ease of replacing network connectivity.

    • C. 

      Ease of replacing server.

    • D. 

      Multiple users can access the server at once.

  • 13. 
    (203) What is the connection type of choice for storage area networks (SAN)?
    • A. 

      Fibre channel.

    • B. 

      ATA over Ethernet (AoE).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Internet small computer system interface (iSCSI)

  • 14. 
    (203) Which storage device can be easily connected to a network and appears as a network drive? 
    • A. 

      Storage area network (SAN).

    • B. 

      Redundant array of independent disks (RAID).

    • C. 

      Network attached storage (NAS).

    • D. 

      RHD.

  • 15. 
    (204) Which storage device has the means of providing data storage reliability using multiple hard drives? 
    • A. 

      Storage area network (SAN).

    • B. 

      Network attached storage (NAS).

    • C. 

      Small computer system interface (SCSI).

    • D. 

      Redundant array of independent disks (RAID).

  • 16. 
    (204) The hard drives in a redundant array of independent disks (RAID) array are presented to the server as 
    • A. 

      One single hard drive.

    • B. 

      A collection of hard drives.

    • C. 

      A single RAID array.

    • D. 

      A single RAID array.

  • 17. 
    (204) Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained? 
    • A. 

      Small computer system interface (SCSI).

    • B. 

      Serial attached (SAS) SCSI.

    • C. 

      Serial advanced technology attachment (SATA).

    • D. 

      Peripheral component interconnect express (PCIe).

  • 18. 
     (205) Which is not a characteristic of high-order languages?
    • A. 

      They are nearly self-documenting.

    • B. 

      They use English-like statements.

    • C. 

      Source codes that are written closest to machine language.

    • D. 

      Programs are transportable between computers with few changes.

  • 19. 
    (205) What best describes programming machine code?
    • A. 

      Another term for firmware.

    • B. 

      Statements that correspond to complex actions.

    • C. 

      Instructions in a form that is acceptable to the computer.

    • D. 

      Source code that, when compiled, is appropriate for the computer.

  • 20. 
    (206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
    • A. 

      Standard Generalized Markup Language (SGML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      HyperText Markup Language (HTML).

    • D. 

      Dynamic HTML (DHTML).

  • 21. 
    (206) Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
    • A. 

      Dynamic HTML (DHTML).

    • B. 

      Extensible Markup Language (XML).

    • C. 

      Standard Generalized Markup Language (SGML).

    • D. 

      Extensible HTML (XHTML).

  • 22. 
    (206) A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a 
    • A. 

      Transport layer security (TLS).

    • B. 

      Common gateway interface (CGI).

    • C. 

      Data encryption standard (DES).

    • D. 

      Public key infrastructure (PKI).

  • 23. 
    (206) Which protocol is commonly used for managing the security of a message transmission on the Internet? 
    • A. 

      Secure socket layer (SSL).

    • B. 

      Public key infrastructure (PKI).

    • C. 

      Data encryption standard (DES).

    • D. 

      Transport layer security (TLS).

  • 24. 
    (207) Which program can be used to automatically launch programs on a preset schedule?
    • A. 

      Check disk.

    • B. 

      Disk quotas.

    • C. 

      Disk defragmenter.

    • D. 

      Task scheduler.

  • 25. 
    (207) Which error-checking tool allows you to monitor the file system for errors? 
    • A. 

      Check disk.

    • B. 

      Disk quotas.

    • C. 

      Task scheduler.

    • D. 

      Disk defragmenter.

  • 26. 
    (208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
    • A. 

      Least significant digit (LSD).

    • B. 

      Most significant digit (MSD).

    • C. 

      Exponent.

    • D. 

      Radix.

  • 27. 
    (209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters? 
    • A. 

      Preventive controls.

    • B. 

      List of critical devices.

    • C. 

      Recovery strategies.

    • D. 

      Emergency action plans.

  • 28. 
    (210) Which type of backup would you use at the end of the week to save all data that you select on your systems? 
    • A. 

      Incremental.

    • B. 

      Differential.

    • C. 

      Daily.

    • D. 

      Normal.

  • 29. 
    (210) Which type of backup will backup all files that have been altered in the last 24 hours?
    • A. 

      Daily.

    • B. 

      Normal.

    • C. 

      Incremental.

    • D. 

      Differential.

  • 30. 
    (211) What is based around a central directory database containing information about all the domain controllers in the network? 
    • A. 

      Active directory.

    • B. 

      Domains manager.

    • C. 

      Domain name service (DNS).

    • D. 

      Dynamic host configuration protocol (DHCP).

  • 31. 
    (211) What is a group of users, servers, and other resources that share a centralized database of account and security information? 
    • A. 

      Domain.

    • B. 

      Forest.

    • C. 

      Schema.

    • D. 

      Tree.

  • 32. 
    (211) Where does a copy of the active directory database reside?
    • A. 

      Dynamic host configuration protocol (DHCP) servers.

    • B. 

      Domain name service (DNS) servers.

    • C. 

      Domain controllers.

    • D. 

      Global catalog servers.

  • 33. 
    (211) What kind of server contains the master listing of all active directory objects in the forest?
    • A. 

      Dynamic host configuration protocol (DHCP).

    • B. 

      Domain controller.

    • C. 

      Global catalog.

    • D. 

      Member.

  • 34. 
    (211) What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user? 
    • A. 

      Access control lists.

    • B. 

      Access policy objects.

    • C. 

      Group policy objects.

    • D. 

      Group rules sets.

  • 35. 
    (212) Which type of interface is friendlier for the average user to use?
    • A. 

      Command line interface.

    • B. 

      Graphical user interface.

    • C. 

      Menu driven interface.

    • D. 

      Palo Alto Research Center user interface.

  • 36. 
    (212) Which of the following is not one of the elements that most graphical user interfaces are composed of? 
    • A. 

      Windows.

    • B. 

      Icons.

    • C. 

      Menus.

    • D. 

      Programs.

  • 37. 
    (212) Sitting at a computer and loading a software patch onto it is an example of what type of software patch? 
    • A. 

      Automatic.

    • B. 

      Attended.

    • C. 

      Unattended.

    • D. 

      Remote.

  • 38. 
    (212) Which type of patch would utilize a remote installation services (RIS)?
    • A. 

      Automatic.

    • B. 

      Local.

    • C. 

      Manual.

    • D. 

      Unattended.

  • 39. 
    (213) Which components of domain name service (DNS) contain a database of associated names and IP addresses? 
    • A. 

      Name servers.

    • B. 

      Resolvers.

    • C. 

      Resource records.

    • D. 

      Forward lookup zone.

  • 40. 
    (213) Which query is made by one name server to another name server?
    • A. 

      Dynamic host configuration protocol (DHCP) query.

    • B. 

      Domain name service (DNS) query.

    • C. 

      Recursive query.

    • D. 

      Non-recursive query

  • 41. 
    (214) Which software program manages an IP address allocation for a network?
    • A. 

      Dynamic host configuration protocol (DHCP).

    • B. 

      Domain name service (DNS).

    • C. 

      Active directory (AD).

    • D. 

      DHCP server.

  • 42. 
    (214) The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a 
    • A. 

      Pool.

    • B. 

      Range.

    • C. 

      Scope.

    • D. 

      Zone.

  • 43. 
    (214) What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have? 
    • A. 

      One.

    • B. 

      Two.

    • C. 

      Three.

    • D. 

      Five.

  • 44. 
    (214) According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them? 
    • A. 

      15 days.

    • B. 

      30 days.

    • C. 

      45 days.

    • D. 

      60 days.

  • 45. 
    (215) What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location? 
    • A. 

      Domain name service (DNS).

    • B. 

      Internet information services (IIS).

    • C. 

      Remote installation services (RIS.

    • D. 

      Web.

  • 46. 
    (216) Which is not a component of Internet information services (IIS)?
    • A. 

      FTP server.

    • B. 

      Internet services manager.

    • C. 

      Simple mail transport protocol (SMTP).

    • D. 

      Simple network management protocol (SNMP).

  • 47. 
    (217) What component of windows unifies and simplifies day to day system management tasks?
    • A. 

      Domain name service (DNS).

    • B. 

      Internet information services (IIS).

    • C. 

      Microsoft management console (MMC).

    • D. 

      Remote installation services (RIS).

  • 48. 
    (217) Which type of group manages user’s rights assignments and access permissions?
    • A. 

      Universal.

    • B. 

      Distribution.

    • C. 

      Security.

    • D. 

      Access.

  • 49. 
    (217) Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer? 
    • A. 

      Anonymous logon.

    • B. 

      Everyone.

    • C. 

      Network.

    • D. 

      Interactive.

  • 50. 
    (218) What defines the rules by which operations can be performed on a particular resource?
    • A. 

      Rights.

    • B. 

      Permissions.

    • C. 

      Access control lists.

    • D. 

      Hardware configuration.

  • 51. 
    (218) A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called 
    • A. 

      Rights.

    • B. 

      Sharing.

    • C. 

      Permissions.

    • D. 

      Access control lists.

  • 52. 
    (218) What permission always overrides all other permissions assigned to a user or group to which the user belongs? 
    • A. 

      Full control.

    • B. 

      No access.

    • C. 

      Change.

    • D. 

      Write.

  • 53. 
    (218) When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? 
    • A. 

      Global group permissions.

    • B. 

      Everyone group permission.

    • C. 

      No permissions are automatically assigned.

    • D. 

      Inherited permissions of the folder it’s contained in.

  • 54. 
    (219) Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down? 
    • A. 

      Mailbox service.

    • B. 

      System Attendant

    • C. 

      Simple mail transport protocol (SMTP).

    • D. 

      Post office protocol version 3 (POP3) service.

  • 55. 
    (219) In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information? 
    • A. 

      Global settings.

    • B. 

      System policies.

    • C. 

      Tools.

    • D. 

      Servers.

  • 56. 
    (220) Which type of lists uses pointers to connect each element together? 
    • A. 

      Derived.

    • B. 

      Linked.

    • C. 

      Ordered.

    • D. 

      Sequential.

  • 57. 
    (220) A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a 
    • A. 

      List

    • B. 

      Schema.

    • C. 

      Table

    • D. 

      View.

  • 58. 
    (220) What is the most common type of operation in sequential query language (SQL)?
    • A. 

      Clauses.

    • B. 

      Expressions.

    • C. 

      Queries

    • D. 

      Statements

  • 59. 
    (220) What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent? 
    • A. 

      Data

    • B. 

      Query.

    • C. 

      Schema

    • D. 

      Transaction.

  • 60. 
    (220) Which is the most commonly used sequential query language (SQL) data statement? 
    • A. 

      Commit

    • B. 

      Select.

    • C. 

      Where.

    • D. 

      Update

  • 61. 
    (220) Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
    • A. 

      Buffers

    • B. 

      Concurrency.

    • C. 

      Locking.

    • D. 

      Logging.

  • 62. 
    (221) Which UNIX capability can execute numerous programs at the same time? 
    • A. 

      Multi-user.

    • B. 

      Multiprocessing.

    • C. 

      Time sharing.

    • D. 

      Multitasking

  • 63. 
    (221) Which UNIX ability can run on different types of hardware with few relatively minorchanges? 
    • A. 

      Portability.

    • B. 

      Flexibility.

    • C. 

      Simplicity

    • D. 

      Base line programming

  • 64. 
    (221) Which UNIX operating system component interacts directly with the system hardware? 
    • A. 

      File system

    • B. 

      VI editor.

    • C. 

      Kernel

    • D. 

      Shell

  • 65. 
    (221) Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data? 
    • A. 

      File system

    • B. 

      VI editor

    • C. 

      Kernel.

    • D. 

      Shell.

  • 66. 
    (221) Which UNIX shell is the most compact and is often used for writing shell scripts? 
    • A. 

      C shell.

    • B. 

      Bourne shell.

    • C. 

      Korn shell.

    • D. 

      D shell.

  • 67. 
    (221) Normally, when you create a file with a text editor, the file is set up with 
    • A. 

      Read and write permission for you and read-only permission for others.

    • B. 

      Write permission for you and read only permission for others.

    • C. 

      Read, write, and execute for you and read, write for others.

    • D. 

      Read and write permission for you and read, write for others.

  • 68. 
    (221) To change permissions on a shell script, you use the UNIX command
    • A. 

      Chown.

    • B. 

      Chgrp.

    • C. 

      Chmod.

    • D. 

      Chper.

  • 69. 
    (221) The simplest place to put your function definitions is in your
    • A. 

      Function.

    • B. 

      Dev

    • C. 

      Definition.

    • D. 

      Profile.

  • 70. 
    (222) What do you type to quit a UNIX shell? 
    • A. 

      Exit.

    • B. 

      Quit

    • C. 

      X.

    • D. 

      Xit.

  • 71. 
    (223) How many characters do most UNIX system administrators and users tend to use for filenames? 
    • A. 

      10.

    • B. 

      12.

    • C. 

      14.

    • D. 

      16.

  • 72. 
    (223) UNIX™ disks are divided into logical sections called 
    • A. 

      Sectors.

    • B. 

      Sections.

    • C. 

      Reams.

    • D. 

      Partitions.

  • 73. 
    (223) The /dev/dsk and /dev/rdsk directories are subdirectories of which directory? 
    • A. 

      Root.

    • B. 

      System.

    • C. 

      Device.

    • D. 

      Home.

  • 74. 
    (223) What does the 0 following the c in the device name c0t6d0s7 represent?
    • A. 

      Controller.

    • B. 

      Partition.

    • C. 

      Drive number

    • D. 

      Bus target number

  • 75. 
    (223) What does the 7 in the device name c0t6d0s7 represent?
    • A. 

      Bus target number

    • B. 

      Drive number

    • C. 

      Controller

    • D. 

      Partition.

  • 76. 
    (223) What is the basic unit for storing and manipulating a collection of logically relatedinformation known as data?
    • A. 

      Directories.

    • B. 

      Partitions.

    • C. 

      Slices.

    • D. 

      Files.

  • 77. 
    (223) Hard links are created using which UNIX command?
    • A. 

      Cd

    • B. 

      Hd.

    • C. 

      Lm.

    • D. 

      Ln.

  • 78. 
    (223) Which UNIX mechanism enables programs to communicate with one another through the file system? 
    • A. 

      Named pipes.

    • B. 

      Character devices.

    • C. 

      Block devices

    • D. 

      Sockets.

  • 79. 
    (223) Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time? 
    • A. 

      Named pipes

    • B. 

      Character devices.

    • C. 

      Block devices

    • D. 

      Sockets.

  • 80. 
    (224) Which UNIX command displays the current working directory?
    • A. 

      Ls.

    • B. 

      Ls-s.

    • C. 

      Pwf.

    • D. 

      Pwd.

  • 81. 
    (224) Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames? 
    • A. 

      Ls

    • B. 

      Cd.

    • C. 

      Pwf.

    • D. 

      Pwd.

  • 82. 
    (224) Which UNIX command takes any characters from standard input and then echoes them to standard output? 
    • A. 

      Cat.

    • B. 

      Mkdir

    • C. 

      Pwd.

    • D. 

      Pwf.

  • 83. 
    (224) Which UNIX command deletes files from within a directory? 
    • A. 

      Lm.

    • B. 

      Rm

    • C. 

      Pr.

    • D. 

      Ps.

  • 84. 
    (225) Which UNIX command looks at an individual file and finds a specified pattern (string)? 
    • A. 

      Grep

    • B. 

      Find.

    • C. 

      Crypt.

    • D. 

      Group.

  • 85. 
    (225) Which UNIX command changes the group ownership of one or more files?
    • A. 

      Chgrp

    • B. 

      Chown

    • C. 

      Whodo.

    • D. 

      Finger

  • 86. 
    (225) Which UNIX command changes the ownership of one or more files to a new owner?
    • A. 

      Chgrp

    • B. 

      Chown.

    • C. 

      Whodo.

    • D. 

      Finger.

  • 87. 
    (225) Which UNIX command sets access and modification times for each file to the current time? 
    • A. 

      Chgrp.

    • B. 

      Chown.

    • C. 

      Touch.

    • D. 

      Finger.

  • 88. 
    (226) How many primary groups can a user be a member of? 
    • A. 

      One.

    • B. 

      Two.

    • C. 

      Three.

    • D. 

      Four.

  • 89. 
    (227) Which UNIX vi mode allows users to execute set commands?
    • A. 

      Edit.

    • B. 

      Text input

    • C. 

      Command.

    • D. 

      Append.

  • 90. 
    (227) Which UNIX vi character represents the end of the file?
    • A. 

      *.

    • B. 

      &.

    • C. 

      ?.

    • D. 

      $.

  • 91. 
    (227) While using UNIX vi to edit a file, what would you enter to save the buffer contents andstay in same file? 
    • A. 

      W.

    • B. 

      W!.

    • C. 

      Wq.

    • D. 

      !.

  • 92. 
    (228) In UNIX, which package of programs lets a terminal handle many sessions at once?
    • A. 

      UNIX™ windows system.

    • B. 

      . Multi-user manager.

    • C. 

      Multi-session manager.

    • D. 

      UNIX™ session manager.

  • 93. 
    (228) What is the most common UNIX windows system?
    • A. 

      U windows.

    • B. 

      X windows.

    • C. 

      UX windows.

    • D. 

      UZ windows.

  • 94. 
    (228) Which UNIX default command starts the X windows system? 
    • A. 

      Xwnds.

    • B. 

      Xstart.

    • C. 

      Xinit.

    • D. 

      X.

  • 95. 
    (228) The act of choosing the window you type is called setting the
    • A. 

      Active window.

    • B. 

      Input focus.

    • C. 

      X window.

    • D. 

      Window manager.

  • 96. 
    (229) What action puts unneeded windows out of the way without quitting the program insidethem? 
    • A. 

      Iconifying.

    • B. 

      Previewing.

    • C. 

      Paging.

    • D. 

      Desktop management.

  • 97. 
    (229) Which UNIX command from the menu bar moves a window to the bottom of the stack ofwindows? 
    • A. 

      Resize.

    • B. 

      Move.

    • C. 

      . Lower.

    • D. 

      . Restore.

  • 98. 
    (229) The key to shutting down an xterm window is to know which of your programs is the 
    • A. 

      Controlling program.

    • B. 

      Exiting program.

    • C. 

      Executing program.

    • D. 

      Hard link file

  • 99. 
    (229) The first step in quitting an xterm session is to 
    • A. 

      Quit all non-controlling programs

    • B. 

      Quit all controlling programs.

    • C. 

      Type quit and press enter.

    • D. 

      Type exit and press enter

  • 100. 
    (230) Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command? 
    • A. 

      Catman.

    • B. 

      Manbld.

    • C. 

      Mancat.

    • D. 

      Man-b.