Network Administrator MCQ Questions And Answers

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Ashokutly
A
Ashokutly
Community Contributor
Quizzes Created: 2 | Total Attempts: 12,107
| Attempts: 11,841 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. What is the name of the software that allows us to browse through web pages called?

Explanation

A browser is a software that allows users to browse through web pages. It is designed to retrieve and display information from the World Wide Web. Browsers interpret and render HTML code, allowing users to view text, images, videos, and other multimedia content on websites. They also provide features such as bookmarks, history, and tabbed browsing to enhance the user experience. Common examples of browsers include Google Chrome, Mozilla Firefox, and Microsoft Edge.

Submit
Please wait...
About This Quiz
Network Administrator MCQ Questions And Answers - Quiz

Are you ready to test your knowledge of computer security & domain administrator? Try our ' Network administrator MCQ Questions And Answers' and see how well aware... see moreyou are of computers' technical aspects. All the questions on our quiz are to the point, and you will only get points by choosing the correction option. We strongly suggest that you answer all the questions on the quiz & try to get a good score. We wish you good luck, and make sure you try more fun quizzes! Have fun!
see less

2. Which of the following are valid domain and forest functional levels for a Windows Server 2008 domain?

Explanation

The valid domain and forest functional levels for a Windows Server 2008 domain include Windows Server 2003 /2008. This means that the domain and forest functional levels can be set to either Windows Server 2003 or Windows Server 2008.

Submit
3. Q. 90 Which two features are also available in Win XP, Vista, and Windows 7?

Explanation

The two features available in Windows XP, Vista, and Windows 7 are:

A. Remote Desktop Connection / Assistance

B. PSR (Problem Steps Recorder)

Remote Desktop Connection / Assistance allows users to remotely connect to and control another computer over a network or the internet. PSR (Problem Steps Recorder) is a built-in troubleshooting tool that allows users to record the steps they take on their computer, along with accompanying screenshots, to help diagnose and resolve technical issues.

Submit
4. Data (information) is stored in computers as

Explanation

Data is stored in computers as files. Files are units of data that are organized and stored in a structured format on a computer's storage device. They can contain various types of information such as text, images, videos, or programs. Files are typically organized within directories, which act as containers for organizing and managing the files. Floppies, on the other hand, are a type of storage medium that was commonly used in the past but is now outdated. "Matter" is not a relevant option for storing data in computers.

Submit
5. In IPv4 addressing, each IP address is a unique ____ number

Explanation

In IPv4 addressing, each IP address is a unique 32-bit number. This means that an IPv4 address is composed of 32 binary digits, which are divided into four groups of 8 bits each, separated by periods. The 32-bit address allows for a total of approximately 4.3 billion unique IP addresses, which are used to identify devices on a network.

Submit
6. Resistance is measured in ?

Explanation

Resistance is measured in ohms. Ohms is the unit of electrical resistance, which is the opposition to the flow of electric current. It is named after the German physicist Georg Simon Ohm. Resistance can be defined as the ratio of voltage to current in a circuit, and it determines how much current will flow through a given conductor for a given voltage. Therefore, ohms is the correct unit to measure resistance.

Submit
7. Which of the memories below is often used in a typical computer operation?

Explanation

RAM, which stands for Random Access Memory, is often used in a typical computer operation. It is a type of computer memory that allows data to be stored and retrieved quickly by the computer's processor. RAM is volatile, meaning that its contents are lost when the computer is powered off or restarted. It is used to temporarily store data and instructions that the processor needs to access quickly while performing tasks. This makes RAM an essential component in a computer's ability to multitask and run programs efficiently.

Submit
8. NICs contain a(n) ____ which transmits and receives data signals.

Explanation

NICs (Network Interface Cards) are hardware devices that enable computers to connect to a network. They contain a data transceiver, which is responsible for transmitting and receiving data signals. The data transceiver allows the NIC to send and receive data packets over the network, enabling communication between the computer and other devices on the network. This functionality is essential for networking and data transfer purposes.

Submit
9. Which Motherboard form factor uses one 20 pin connector

Explanation

ATX is the correct answer because it is a motherboard form factor that uses one 20 pin connector. AT and BABY AT are older form factors that use different connectors, so they are not the correct answer. "All of the above" is also not the correct answer because it includes AT and BABY AT, which do not use a 20 pin connector.

Submit
10. A hard disk is divided into tracks which are further subdivided into:

Explanation

A hard disk is divided into tracks, which are concentric circles on the disk. Each track is further subdivided into sectors, which are pie-shaped sections on the track. Sectors are the smallest unit of storage on a hard disk and are used to store data. Clusters, on the other hand, are groups of sectors and are used by the file system to manage the allocation of data. Vectors are not related to the division of a hard disk. Heads, on the other hand, are the components of a hard disk that read and write data to the disk's surface.

Submit
11. Which of the following cables can transmit data at high speeds?

Explanation

Optic Fiber Cable can transmit data at high speeds because it uses light to carry information. It consists of a thin strand of glass or plastic, which allows for faster transmission of data compared to other cables. The light signals can travel long distances without losing much of their strength or quality, making it ideal for high-speed data transmission. Additionally, optic fiber cables are also immune to electromagnetic interference, further ensuring reliable and fast data transmission.

Submit
12. What do you call the long horizontal bar at the bottom of the screen that Includes the running programs, the Start button, and the Notification Area?

Explanation

The long horizontal bar at the bottom of the screen that includes the running programs, the Start button, and the Notification Area is called the taskbar.

Submit
13. At about what interval are GPOs updated on domain controllers?

Explanation

GPOs (Group Policy Objects) are updated on domain controllers at approximately 15-minute intervals. This means that any changes made to GPOs will be applied to the domain controllers and subsequently to the client computers within the domain within this time frame. This periodic update ensures that the most recent policies are enforced across the network, allowing administrators to make necessary changes and have them implemented in a timely manner.

Submit
14. TCP is a(n)___ sub protocol.

Explanation

TCP (Transmission Control Protocol) is a connection-oriented sub protocol. This means that it establishes a reliable and ordered connection between two devices before transmitting data. TCP ensures that all packets are received in the correct order and handles any lost or corrupted packets by retransmitting them. This connection-oriented nature of TCP makes it suitable for applications that require a guaranteed delivery of data, such as web browsing, file transfer, and email communication.

Submit
15. Which printer is very commonly used for desktop publishing?

Explanation

The laser printer is commonly used for desktop publishing because it produces high-quality prints with sharp text and graphics. It uses a laser beam to create an electrostatic image on a drum, which is then transferred onto paper using toner. This technology allows for precise and detailed printing, making it ideal for professional documents and graphic design projects. Inkjet printers, daisywheel printers, and dot matrix printers are also used for printing, but they are not as commonly used for desktop publishing due to their lower print quality and speed.

Submit
16. In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.

Explanation

A node with an IP address of 168.34.88.29 belongs to a Class B network. This is because in IPv4 addressing, the first octet of the IP address determines the class of the network. Class B networks have a range of IP addresses from 128.0.0.0 to 191.255.255.255, and the given IP address falls within this range.

Submit
17. The default subnet mask for a Class B network is ____.

Explanation

The default subnet mask for a Class B network is 255.255.0.0. In Class B networks, the first two octets are used to identify the network, while the last two octets are used to identify the hosts within the network. The subnet mask of 255.255.0.0 allows for a larger number of hosts compared to the other options given.

Submit
18. Windows Easy Transfer supports two types of migrations.

Explanation

Windows Easy Transfer supports two types of migrations: Side-by-side and Wipe and Load. Side-by-side migration involves transferring files, settings, and programs from an old computer to a new one while keeping the old computer running. Wipe and Load migration, on the other hand, involves wiping the old computer clean and then transferring files, settings, and programs to a new computer. Both options provide users with flexibility in migrating their data and settings to a new system.

Submit
19. IC are classified on the basis of ___

Explanation

ICs (Integrated Circuits) are classified on the basis of the number of transistors they contain. The number of transistors in an IC determines its complexity and functionality. ICs with a higher number of transistors can perform more advanced tasks and have greater processing power. This classification system helps in categorizing ICs based on their capabilities and allows engineers and designers to select the appropriate IC for their specific requirements.

Submit
20. Direct X is a _____

Explanation

DirectX is a software technology developed by Microsoft that is responsible for driving and managing the graphics hardware in a computer system. It provides a collection of application programming interfaces (APIs) that allow developers to create and run multimedia applications, particularly games, on Windows-based platforms. DirectX acts as a bridge between the software and the graphics hardware, enabling efficient communication and optimization of graphics rendering. Therefore, the correct answer is "Software that drives Graphic hardware."

Submit
21. Secondry memory is also know as?

Explanation

Secondary memory refers to the storage devices that are external to the computer's main memory (RAM) and are used to store data for long-term use. It is also known as auxiliary memory because it provides additional storage capacity to the computer system. This includes devices like hard disk drives, solid-state drives, optical drives, and magnetic tapes. Primary memory, on the other hand, refers to the computer's main memory where data is directly accessed by the CPU. Virtual memory is a memory management technique that uses a combination of primary memory and secondary memory to create an illusion of having more RAM than is physically available. Therefore, the correct answer is auxiliary memory.

Submit
22. In which file system technology file level security is available?

Explanation

NTFS (New Technology File System) is the correct answer because it is the only file system technology listed that provides file level security. NTFS supports access control lists (ACLs) which allow for fine-grained permissions to be set on individual files and folders. This means that administrators can control who can access, modify, or delete specific files, providing a higher level of security compared to other file systems like FAT or FAT32. Ext3 is a file system used in Linux and does not have native file level security features.

Submit
23. Which of the following is a container object?

Explanation

Domain & OU stands for Domain and Organizational Unit, which are both container objects in a network environment. A domain is a logical group of network resources, such as computers, users, and groups, that share a common directory database. An Organizational Unit (OU) is a container within a domain that can hold users, groups, computers, and other OUs. Both Domain and OU are used to organize and manage network resources, making them container objects.

Submit
24. In latest generation computers, the instructions are executed ?

Explanation

In the latest generation computers, the instructions are executed both sequentially and in parallel. This means that some instructions are executed one after the other, in a sequential manner, while others are executed simultaneously, in parallel. This allows for better utilization of the computer's resources and improves overall performance. By combining sequential and parallel execution, modern computers can handle complex tasks more efficiently and effectively.

Submit
25. Programs stored in ROM are called ___

Explanation

Firmware refers to programs or software that are permanently stored in read-only memory (ROM) of a device. Unlike software that can be modified or updated by the user, firmware remains unchanged and is essential for the device's operation. It provides the necessary instructions for the hardware to function properly. Therefore, the correct answer for the question is "Firmware".

Submit
26. Computer software includes ____

Explanation

Computer software includes operating system programs, application programs, and packaged programs. Operating system programs are essential for managing computer hardware and providing a platform for other software to run on. Application programs are designed to perform specific tasks or functions, such as word processing or spreadsheet calculations. Packaged programs refer to software that is commercially available and can be purchased and installed on a computer system. Therefore, the correct answer is "All of these" as it encompasses all the mentioned categories of computer software.

Submit
27. What is the name of the series of Laptop computers manufactured by IBM called?

Explanation

The correct answer is ThinkPad. ThinkPad is the name of the series of laptop computers manufactured by IBM.

Submit
28. From what location are the 1st computer instructions available on boot up?

Explanation

The 1st computer instructions are available on boot up from ROM BIOS. ROM BIOS stands for Read-Only Memory Basic Input/Output System, which is a firmware that is permanently stored on a chip on the computer's motherboard. It contains the initial instructions that are necessary for the computer to start up and perform basic functions, such as initializing hardware and loading the operating system.

Submit
29. Nortel is a company which manufactures:

Explanation

Nortel is a company that specializes in manufacturing network equipment. This includes devices such as routers, switches, and other networking infrastructure components. Network equipment is essential for establishing and maintaining communication between different devices and networks. Nortel's expertise lies in designing and producing reliable and high-performance network equipment that enables efficient data transmission and connectivity.

Submit
30. Groups are considered an organizing component of Active Directory.

Explanation

Groups are indeed an organizing component of Active Directory. They are used to efficiently manage and control access to resources within the network by grouping users, computers, and other objects together based on common attributes or requirements.

Submit
31. What could cause a fixed disk error.

Explanation

Incorrect CMOS settings can cause a fixed disk error. The CMOS (Complementary Metal-Oxide-Semiconductor) is responsible for storing the computer's BIOS settings, including the configuration of hardware devices such as the hard disk. If the settings related to the fixed disk are incorrect or misconfigured in the CMOS, it can lead to a fixed disk error. This error can prevent the computer from recognizing or accessing the hard disk properly, resulting in data loss or system malfunction. Therefore, it is important to ensure that the CMOS settings are correctly configured to avoid fixed disk errors.

Submit
32. Which standard govern parallel communications?

Explanation

IEEE 1284 is the correct answer because it is the standard that governs parallel communications. This standard specifies the electrical and mechanical interfaces for parallel communications between computers and peripheral devices, such as printers. It defines the signaling and data transfer protocols, as well as the physical connectors and cables used for parallel communication. RS232, RS-232a, and CAT 5 are not relevant to parallel communications and do not govern this type of communication.

Submit
33. What protocol enables you to create a standard platform to develop secure networks and electronic tunnels between two machines?

Explanation

VPN (Virtual Private Network) is the protocol that allows the creation of secure networks and electronic tunnels between two machines. VPNs encrypt data transmitted over public networks, ensuring confidentiality and security. Options A, B, and C are not protocols for creating secure networks and electronic tunnels, making them incorrect choices for this question.

Submit
34. Index hole is related to?

Explanation

The index hole is a feature found in floppy disks. It is a small hole located near the center of the disk. When the disk is inserted into a floppy disk drive, a sensor detects the presence or absence of the index hole as the disk rotates. This allows the drive to accurately determine the starting point of each track on the disk. The index hole is crucial for the proper functioning of floppy disks, as it helps in reading and writing data to the correct locations on the disk.

Submit
35. RS-232 is a standard that applies to:

Explanation

RS-232 is a standard that applies to serial ports. Serial ports are used to connect devices such as modems, printers, and mice to a computer. RS-232 is a communication protocol that defines the electrical and functional characteristics of the interface, allowing for the transmission of data between devices. This standard has been widely used in the past for serial communication and is still used in some applications today.

Submit
36. You are the administrator of an active directory domain. A user complains to you that he is unable to change his password. No other users have this issue. What is the most likely cause of the problem?

Explanation

The most likely cause of the user's inability to change his password is that the property "User cannot change password" has been enabled when the user account was created. This property restricts the user from changing their password, which could explain the issue reported by the user.

Submit
37. Traditional switches operate at the ____ layer of the OSI model.

Explanation

Traditional switches operate at the data link layer of the OSI model. The data link layer is responsible for the reliable transfer of data between network devices over a local area network (LAN). Switches use MAC addresses to forward data packets within a LAN, making decisions based on the destination MAC address. By operating at the data link layer, switches can efficiently and accurately direct network traffic within a LAN, improving network performance and reducing collisions.

Submit
38. You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first. ?

Explanation

When installing a new IDE hard drive, one of the first things to check is the jumpers on the hard drive. Jumpers are small connectors that determine the drive's settings, such as whether it is the primary or secondary drive. If the jumpers are not set correctly, the system BIOS may not recognize the new drive. By checking and adjusting the jumpers as needed, the system should be able to detect the new IDE hard drive.

Submit
39. What are the units used to count the speed of a printer?

Explanation

PPM stands for "Pages Per Minute" and measures the printer's speed in terms of how many pages it can print in one minute. This metric indicates the printer's printing speed, which is important for assessing its efficiency and productivity. Therefore, option C, PPM, is the correct answer.

Submit
40. Which of the following does UAC prompt for permission or administrative Credentials?

Explanation

The UAC (User Account Control) prompts for permission or administrative credentials when installing a device driver or an application. This is because installing drivers or applications can make changes to the system settings and potentially affect the overall functionality and security of the computer. The UAC helps to prevent unauthorized or malicious installations by requiring the user to confirm their actions and provide administrative credentials if necessary.

Submit
41. A microprocessor unit, a memory unit, and an input/output unit form a:

Explanation

A microcomputer is formed by combining a microprocessor unit, a memory unit, and an input/output unit. The microprocessor unit is responsible for executing instructions, the memory unit stores data and instructions, and the input/output unit allows the microcomputer to interact with external devices. Therefore, the combination of these three units forms a microcomputer.

Submit
42. ____ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

Explanation

NTP (Network Time Protocol) is a simple Application layer protocol used to synchronize the clocks of computers on a network. It allows computers to accurately maintain the same time by exchanging time information between them. This is particularly important in scenarios where accurate timekeeping is crucial, such as in financial transactions, network logging, or distributed systems. NTP achieves synchronization by utilizing a hierarchical system of time servers, where lower-level servers synchronize with higher-level ones, ultimately obtaining time from highly accurate reference clocks.

Submit
43. A ____ is a repeater with more than one output port

Explanation

A hub is a repeater with more than one output port. A hub is a networking device that connects multiple devices in a network, and it broadcasts the incoming data to all connected devices. It does not perform any filtering or routing of data, and all devices connected to a hub share the same bandwidth. Therefore, a hub is the correct answer as it fits the description of a repeater with multiple output ports.

Submit
44. The sub protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network throughout a router is ____

Explanation

The correct answer is IP. IP (Internet Protocol) is the sub protocol that enables TCP/IP to internetwork by allowing data packets to traverse multiple LAN segments and different types of networks through routers. TCP/IP uses IP to route the packets from the source to the destination by assigning unique IP addresses to each device on the network. IP ensures that the packets are delivered to the correct destination by using routing tables and addressing schemes.

Submit
45. Floppy Disk Drives were originally designed by.

Explanation

IBM (International Business Machines Corporation) is credited with developing the floppy disk drive, which became a popular storage medium for personal computers in the late 1970s,1980s, and 1990s. IBM introduced the first commercial floppy disk drive 1971 as part of the IBM 3330 disk storage unit. This innovation revolutionized data storage and contributed to the widespread adoption of personal computing.

Submit
46. Who among the following is a Personal Computer manufacturer from Taiwan?

Explanation

Acer is a personal computer manufacturer from Taiwan. Sony is a Japanese company known for its electronics products, IBM is an American multinational technology company, and Samsung is a South Korean conglomerate. Therefore, Acer is the correct answer as it is the only option that matches the given criteria.

Submit
47. An Active Directory container used to organize a network’s users and resources into logical administrative units ?

Explanation

Organizational Units are a type of Active Directory container that is used to organize a network's users and resources into logical administrative units. This helps in managing and delegating administrative tasks more efficiently. By organizing users and resources into Organizational Units, administrators can apply policies, permissions, and settings to specific groups of users or resources. This allows for better control and management of the network, making it easier to assign and revoke access rights, apply group policies, and streamline administrative tasks.

Submit
48. The most common logical topologies are ____ and ring. (Select two)

Explanation

Logical topologies define how data is transmitted between nodes in a network regardless of their physical interconnection. In a bus topology, all devices are connected to a single shared communication line, while in a star topology, each device is connected directly to a central hub or switch. These two logical topologies are widely used in network designs due to their simplicity and efficiency.

Submit
49. By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.

Explanation

The correct answer is PCIe. PCIe stands for Peripheral Component Interconnect Express and is the most popular expansion board NIC (Network Interface Card) bus today. PCIe provides high-speed data transfer rates and is widely used in modern computer systems for connecting various peripherals, including network cards.

Submit
50. Which of the following was not an improvement of Windows 7 over Windows Vista?

Explanation

Bit Locker was not an improvement of Windows 7 over Windows Vista. Bit Locker is a feature that was introduced in Windows Vista and continued to be available in Windows 7. It provides encryption for the operating system's drive to enhance security.

Submit
51. A person by the name of Paul wants to perform a profile migration, which involves a large number of profiles. He wants to transfer the profile data to USB device rapidly. Which of the following tools is helpful in the migration of the user profile data to the USB device?

Explanation

The User State Migration Tool (USMT) is a command-line utility in Windows that facilitates the migration of user files and settings between computers. It can be used to transfer user profiles, data, and settings from one computer to another, including to external storage devices like USB drives. USMT provides a more robust and customizable solution for profile migration compared to other tools like Windows Easy Transfer. Therefore, option B, USMT Tool, is the correct answer.

Submit
52. Before you upgrade an existing Windows operating system to Windows 7, you should determine which edition your computer will support by installing and running the Windows 7 Upgrade ____

Explanation

Before upgrading an existing Windows operating system to Windows 7, it is necessary to determine which edition your computer will support. This can be done by installing and running the Windows 7 Upgrade Wizard. The Upgrade Wizard will analyze your system and provide you with the information needed to select the appropriate edition of Windows 7 for your computer.

Submit
53. What type of DNS record is the record that points out the location of the mail server?

Explanation

The correct answer is MX. MX stands for Mail Exchanger, and it is a type of DNS record that specifies the mail server responsible for accepting incoming email messages for a particular domain. This record points out the location of the mail server and helps in the routing of email traffic.

Submit
54. The area where the clock and a few select system icons is located on the taskbar is called what?

Explanation

The area where the clock and a few select system icons are located on the taskbar is called the Notification Area. This is where users can see notifications from various applications and access system settings and functions. It provides quick access to important information and allows users to manage their system and application notifications efficiently.

Submit
55. On an Ethenet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

Explanation

A collision domain refers to the portion of an Ethernet network where collisions occur if two nodes transmit data at the same time. In other words, it is the area where network devices share the same network segment and can potentially interfere with each other's transmissions. This can happen when multiple devices try to send data simultaneously, resulting in collisions and degraded network performance.

Submit
56. Which of the following is used to prevent unauthorized changes to your computer?

Explanation

User Account Control (UAC) is used to prevent unauthorized changes to your computer. It is a security feature in Windows operating systems that prompts the user for confirmation or an administrator's password before allowing certain actions that could potentially harm the computer. By requiring user consent or administrator authorization, UAC helps to protect the system from malicious software or unauthorized modifications. It enhances the overall security of the computer by ensuring that only trusted and authorized actions are performed.

Submit
57. You run the Add Roles Wizard in Server Manager to add the AD DS role.  After the wizard is finished, you check the Administrative Tools folder but don't find any of the Active Directory management tools.  What should you do?

Explanation

After running the Add Roles Wizard in Server Manager to add the AD DS role, if the Active Directory management tools are not found in the Administrative Tools folder, the correct action to take is to run Dcpromo.exe. This command is used to promote a server to a domain controller and will ensure that the necessary Active Directory management tools are installed and available.

Submit
58. With respect to a network interface card, the term 10/100 refers to

Explanation

The term 10/100 in relation to a network interface card refers to the maximum data transfer speed it can handle. It indicates that the card is capable of supporting both 10 Mbps (megabits per second) and 100 Mbps speeds. This means that the card can operate at either of these speeds depending on the capabilities of the network it is connected to.

Submit
59. What replaced the Quick Launch shortcut?

Explanation

Jump Lists replaced the Quick Launch shortcut. Jump Lists are a feature in Windows that allow quick access to recently used files, folders, or websites. They provide a convenient way to access frequently used items without having to navigate through the entire file system or search for them. The Quick Launch shortcut, on the other hand, was a toolbar in previous versions of Windows that allowed users to quickly launch their favorite applications. With the introduction of Jump Lists, the Quick Launch shortcut became obsolete and was replaced.

Submit
60. Your IT Company is constantly changing, with new users coming and going throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts?

Explanation

The dsmod command is used to modify existing Active Directory objects, including user accounts. Specifically, you can use dsmod user followed by the appropriate parameters to delete user accounts from Active Directory.

Submit
61. You install Active Directory on a server. You want it to be a separate domain that is part of an existing forest but containing a namespace separate from the forest where you are installing it. What is this type of domain called?

Explanation

A tree root is a type of domain that is part of an existing forest but has a separate namespace. It is created when you install Active Directory on a server and want to establish a separate domain within the forest. This allows for the organization of resources and users in a distinct namespace while still being connected to the existing forest.

Submit
62. Which of the following groupings of linked domains would be a tree?

Explanation

A tree is a hierarchical structure where each node has only one parent, except for the root node which has no parent. In the given options, the grouping "mycorp.com and newsite.mycorp.com" forms a tree because "newsite.mycorp.com" is a subdomain of "mycorp.com". This means that "mycorp.com" is the parent node and "newsite.mycorp.com" is the child node. Since all nodes have only one parent, this grouping satisfies the definition of a tree.

Submit
63. It holds the address of the active memory?

Explanation

The Memory Address Register (MAR) holds the address of the active memory location. It is responsible for storing the address of the data that needs to be accessed or modified in the memory. The MAR is used in conjunction with the Memory Buffer Register (MBR) to read or write data from or to the memory. The Program Counter (PC) holds the address of the next instruction to be executed, while the Address Register (AR) is a general-purpose register used to store memory addresses temporarily.

Submit
64. A source program is

Explanation

A source program is a program that is written in a high-level programming language and needs to be translated into machine language in order to be executed by a computer. This translation process is typically done by a compiler or interpreter. The source program contains human-readable instructions and is written using a syntax and structure that is easier for programmers to understand and work with. Once the source program is translated into machine language, it can be executed directly by the computer's hardware.

Submit
65. You work as the desktop support technician at Texas.com. Your boss wants to protect the laptops if they get stolen. What would you do?

Explanation

Implementing BitLocker would be the most appropriate solution for protecting the laptops if they get stolen. BitLocker is a full-disk encryption feature in Windows that encrypts the entire hard drive, making it difficult for unauthorized individuals to access the data. This ensures that even if the laptops are stolen, the data stored on them remains secure. Other options like implementing NTFS file system, IPsec for network communications, or EFS on key data files do not provide the same level of comprehensive protection as BitLocker.

Submit
66. The 34-pin connection on an I/O card is for?

Explanation

The 34-pin connection on an I/O card is for a floppy drive. Floppy drives use a 34-pin connector to connect to the I/O card, allowing data transfer between the drive and the computer. This connection was commonly used in older computer systems before the introduction of USB and other storage options. SCSI drives, IDE drives, and Zip drives typically use different types of connectors for connection to the I/O card.

Submit
67. In the Windows 7 Device Manager, how do you know if there is a problem with a driver?

Explanation

If there is a problem with a driver in the Windows 7 Device Manager, the driver icon will have an exclamation point. This symbol indicates that there is an issue with the driver and it needs attention or troubleshooting. The exclamation point is commonly used as a warning symbol, suggesting that there is a problem or error that needs to be resolved.

Submit
68. How can you create a user object with the help of a single command?

Explanation

The Dsadd command is used to create a user object with a single command. It is a command-line tool in Windows Server that allows administrators to create objects in Active Directory. By using the Dsadd command, you can specify the necessary parameters such as the user's name, password, and other attributes, and the user object will be created in Active Directory. This command simplifies the process of creating user objects by combining multiple steps into a single command.

Submit
69. What is the address given to a computer connected to a network called?

Explanation



The address given to a computer connected to a network is called an IP Address. An IP address is a unique string of numbers separated by periods or colons that identifies each computer using the Internet Protocol to communicate over a network. This address allows networked devices to find and communicate with each other effectively.
Submit
70. ____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

Explanation

Gateways are combinations of networking hardware and software that connect two dissimilar kinds of networks. Unlike routers and switches, which primarily connect similar networks, gateways are specifically designed to bridge the gap between different types of networks. They act as intermediaries, translating data between the two networks and enabling communication between them. Gateways are essential for connecting networks that use different protocols or technologies, allowing them to exchange information and function seamlessly together.

Submit
71. Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?

Explanation

The correct order for Active Directory organizational structure is Forest, Tree, Domain, and Computer. A forest is the highest level of organization, containing multiple trees. Each tree represents a domain, which is a logical group of objects, such as users and computers. Within each domain, there can be multiple computers. Therefore, Forest, Tree, Domain, Computer is the correct order.

Submit
72. To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

Explanation

To eliminate the possibility of a broadcast storm, switches and bridges implement the Spanning Tree Protocol (STP). STP is a network protocol that prevents loops in Ethernet networks by creating a loop-free logical topology. It achieves this by selecting a root bridge and then determining the best path from each bridge to the root bridge. Any redundant paths are blocked, ensuring that there are no loops in the network. This prevents broadcast storms, which can occur when broadcast or multicast packets are continuously forwarded in a loop, causing network congestion and degradation.

Submit
73. A ____ is a multiport connectivity device that directs data between nodes on a network.

Explanation

A switch is a multiport connectivity device that directs data between nodes on a network. It operates at the data link layer (Layer 2) of the OSI model and uses MAC addresses to forward data frames to their intended destinations within a local area network (LAN). Switches are commonly used in Ethernet networks to create multiple collision domains, allowing for efficient and simultaneous communication between devices.

Submit
74. You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer. You need to ensure that you can enable BitLocker To Go on the USB disk. What should you do?

Explanation

BitLocker To Go, which allows encryption of removable drives like USB disks, is available in Windows 7 Enterprise and Windows 7 Ultimate editions. Therefore, to enable BitLocker To Go on the USB disk in this scenario, you would need to upgrade the computer to Windows 7 Enterprise. Options A, C, and D are not directly related to enabling BitLocker To Go and are therefore incorrect choices for this scenario.

Submit
75. Which of the following commands will force an update of group policy of computers on the domain Airtel?

Explanation

The correct answer is GPUPDATE /force. This command is used to force an immediate update of group policy settings on the computers in the domain Airtel. The /force parameter ensures that all policies are reapplied, even if there are no changes detected. This command is useful when there is a need to immediately apply new or updated group policy settings to the computers in the domain.

Submit
76. To which of the following can a GPO be linked?

Explanation

A Group Policy Object (GPO) can be linked to Sites. Sites in Active Directory represent physical locations and are used to manage network traffic and replication. By linking a GPO to a site, the policies defined in the GPO can be applied to all the objects (such as users and computers) within that site, ensuring consistent configuration and settings across the network.

Submit
77. The main purpose of Active Directory is to ________. ?

Explanation

Active Directory is a directory service that provides authentication and authorization to users and computers. It allows administrators to control access to resources, such as files and printers, by verifying the identity of users and granting them appropriate permissions. Active Directory also enables users to organize their file systems into a cohesive and high-performance directory structure, but its main purpose is to provide authentication and authorization.

Submit
78. Which feature in Windows 7 enables you to quickly reveal hidden icons and gadgets?

Explanation

Aero Peek is a feature in Windows 7 that allows users to quickly reveal hidden icons and gadgets. By hovering the mouse cursor over the "Show desktop" button on the taskbar, all open windows become transparent, allowing users to see the desktop and any hidden icons or gadgets. This feature is useful for quickly accessing and managing these hidden elements without having to minimize or close any open windows.

Submit
79. A user granted Domain Administrator access over the domain dallas.mycorp.com may administer which of the following groupings?

Explanation

The user granted Domain Administrator access over the domain dallas.mycorp.com may administer the grouping of dallas.mycorp.com within the mycorp.com domain. This means that the user has administrative control over the dallas.mycorp.com subdomain within the larger mycorp.com domain. They would not have administrative control over other subdomains like austin.mycorp.com or any specific organizational units within the dallas.mycorp.com domain.

Submit
80. Which provides the fastest access to large video files?

Explanation

SCSI (Small Computer System Interface) hard drives provide the fastest access to large video files compared to the other options listed. SCSI technology allows for faster data transfer rates and lower latency, making it ideal for handling large files such as videos. Optical drives, IDE hard drives, and EIDE hard drives are relatively slower in terms of data transfer rates and access times compared to SCSI drives, which makes SCSI the preferred choice for accessing large video files quickly.

Submit
81. If a policy is defined in a GPO linked to a domain, and that policy is defined with a different setting in a GPO linked to an OU, which is true by default?

Explanation

When a policy is defined in a GPO linked to a domain and the same policy is defined with a different setting in a GPO linked to an OU, the policy setting in the GPO linked to the OU is applied by default. This means that the policy setting in the GPO linked to the OU takes precedence over the one linked to the domain.

Submit
82. What is the disadvantage of using a 64-bit version of Windows 7 when running applications?

Explanation

The disadvantage of using a 64-bit version of Windows 7 when running applications is that you are not able to run legacy 16-bit applications directly on Windows 7. This means that any applications that were designed to run on older 16-bit systems will not be compatible with the 64-bit version of Windows 7 and will not run properly.

Submit
83. A person by name Simson as created a free allocated space of 20GB in his system, now he wants to deploy operating system image in the free allocated space in the system. Which tool should he use to deploy the operating system?

Explanation

Simson should use Windows AIK (Windows Automated Installation Kit) to deploy the operating system image in the free allocated space in his system. Windows AIK is a set of tools and documentation provided by Microsoft to assist in deploying Windows operating systems. It includes tools such as Windows System Image Manager (WSIM) and Deployment Image Servicing and Management (DISM), which can be used to create and deploy customized Windows images.

Submit
84. Under what circumstances are the built-in user accounts no longer local user accounts?

Explanation

After installing Active Directory, the built-in user accounts are no longer local user accounts. Active Directory is a directory service that centralizes the management of user accounts, groups, and resources in a network environment. When Active Directory is installed, the built-in user accounts become part of the domain and are managed centrally by Active Directory instead of being local to a specific computer.

Submit
85. The software used to drive microprocessor-based systems is called:

Explanation

Firmware refers to a specific type of software that is embedded into hardware devices, typically onto read-only memory (ROM) chips. It provides the necessary instructions for the device to operate and interact with other hardware components. Firmware is often tailored to the specific hardware it controls and is responsible for managing low-level functions and operations of the device.

Submit
86. Which edition of Windows 7 is the minimum needed to fully support Home Groups and DVD Video Playback and authoring?

Explanation

Windows 7 Home Premium is the minimum edition needed to fully support Home Groups and DVD Video Playback and authoring. Home Basic does not support Home Groups, and Professional and Enterprise editions also support these features, but Home Premium is the minimum requirement.

Submit
87. You have a computer that runs Windows Vista. You need to identify whether the computer can be upgraded to Windows 7. Which tool should you use?

Explanation

To identify whether the computer can be upgraded to Windows 7, the appropriate tool to use is the Windows 7 Upgrade Advisor. This tool scans the computer's hardware, devices, and installed programs to determine if they are compatible with Windows 7. It provides a detailed report on any potential issues or incompatibilities that may arise during the upgrade process. By using this tool, users can make an informed decision about whether their computer meets the requirements for upgrading to Windows 7.

Submit
88. What can you use to quickly capture performance data of multiple performance counters and configure alert activities based on the performance counters?

Explanation

A Data Collector Set can be used to quickly capture performance data of multiple performance counters and configure alert activities based on those counters. It allows for the collection and analysis of performance data in a structured manner, making it easier to monitor and troubleshoot system performance. By creating a Data Collector Set, users can select the specific performance counters they want to monitor, set thresholds for alerts, and schedule when data collection should occur. This makes it a useful tool for monitoring and managing system performance.

Submit
89. Which editions of Windows 7 include all the features that Windows 7 has to offer?

Explanation

Windows 7 Ultimate is the highest edition of Windows 7 and includes all features and functionalities available in other editions of Windows 7, including Home Premium, Professional, and Enterprise editions. Therefore, option D, Windows 7 Ultimate, is the correct answer.

Submit
90. Which of the following will happen when data is entered into a memory location?

Explanation

When data is entered into a memory location, it will erase the previous content. This means that any existing data in that memory location will be overwritten or replaced by the new data that is being entered.

Submit
91. Which of the following is the most appropriate scenario where you would want to install a read-only domain controller?

Explanation

Installing a read-only domain controller in a branch office with less than optimum physical security would be the most appropriate scenario. A read-only domain controller provides an additional layer of security by preventing any modifications to the Active Directory database. This is particularly useful in locations where there is a higher risk of unauthorized access or physical tampering. By installing a read-only domain controller, the branch office can still authenticate users and provide services, while minimizing the risk of compromising the entire Active Directory infrastructure.

Submit
92. A physical topology ____.

Explanation

A physical topology specifies the physical layout of devices and the connectivity methods used to interconnect them within a network. It describes how devices are physically connected to each other, such as through cables, wires, or wireless connections. Examples of physical topologies include bus, star, ring, mesh, and hybrid topologies. Physical topologies do not typically specify device types, network scope, or addressing schemes, as those aspects are usually covered by other network specifications or documentation.

Submit
93. A standard user named User1 has a computer that runs Windows 7. You need to ensure that User1 can run Windows Easy Transfer. What should you do?

Explanation

Adding User1 to the Administrators group will give them the necessary permissions and privileges to run Windows Easy Transfer. By being a member of the Administrators group, User1 will have the necessary access rights to perform administrative tasks on the computer, including running Windows Easy Transfer.

Submit
94. What tool can help you quickly determine what processes are writing to disk and how much each is writing?

Explanation

Resource Monitor is the correct answer because it is a tool in Windows operating systems that provides detailed information about the processes and services running on a computer. It allows users to monitor the utilization of system resources such as CPU, memory, disk, and network. In the case of determining what processes are writing to disk and how much each is writing, Resource Monitor provides real-time data and graphs that display the disk activity for each process, making it an effective tool for this purpose.

Submit
95. You are employed as the network Administrator at Acme.com. The Acme.com network client computers currently make use of Microsoft Windows XP Professional. Acme.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You receive an instruction from management to identify the volume types that is not used by Windows 7.

Explanation

The correct answer is that in Windows 7, NFS is not a volume type. NFS (Network File System) is a file sharing protocol commonly used in Unix and Linux systems, but it is not natively supported as a volume type in Windows 7. Windows 7 supports volume types such as exFAT, NTFS, and FAT, but not NFS.

Submit
96. What are the two default GPOs that are created when Active Directory is installed?

Explanation

When Active Directory is installed, two default Group Policy Objects (GPOs) are created. The first is the Default Domain Policy, which is linked to the entire domain and applies to all users and computers within the domain. The second is the Default Domain Controllers Policy, which is linked specifically to the Domain Controllers organizational unit (OU) and applies to all domain controllers in the domain. These default GPOs provide a baseline configuration for the domain and domain controllers, allowing administrators to define and enforce specific settings and restrictions.

Submit
97. The policy in both GPOs defaults to Not Defined so that no conflict exists ?

Explanation

not-available-via-ai

Submit
98. After receiving several support calls, you have decided to prevent users of the DomA-Group from being able to access the Control Panel regardless of what machine they log into. Where would you configure this setting?

Explanation

In order to prevent users of the DomA-Group from accessing the Control Panel, you would need to configure this setting in the User Configuration node, specifically in the Administrative Templates folder. This folder contains various policy settings that can be applied to user accounts. By configuring the appropriate policy setting within this folder, you can restrict access to the Control Panel for users in the DomA-Group, regardless of the machine they log into.

Submit
99. When configuring GPOs, which node contains the majority of account policies?

Explanation

The majority of account policies are contained in the Computer Configuration node, specifically within the Windows Settings folder and the Security Settings node. This is where administrators can configure various security-related settings and policies for computer accounts in the domain. The Administrative Templates folder and the Windows Components node do not specifically focus on account policies, while the User Configuration node is primarily used for configuring policies related to user accounts.

Submit
100. You are installing Active Directory on a new domain controller and selecting options for placing the database and log files. Which of the following options would produce the optimum performance of these files? Each answer represents part of the solution.(Choose two.)

Explanation

Placing the database and log files on separate physical disks ensures better performance because it allows the disks to work independently, reducing contention for disk resources. Additionally, ensuring plenty of hard disk space for these files to expand prevents issues related to disk space exhaustion, which can lead to database corruption or service disruptions. Therefore, these two practices together contribute to optimizing the performance and reliability of Active Directory.

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Apr 15, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 15, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Jan 22, 2016
    Quiz Created by
    Ashokutly
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the name of the software that allows us to browse through web...
Which of the following are valid domain and forest functional levels...
Q. 90 Which two features are also available in Win XP, Vista, and...
Data (information) is stored in computers as
In IPv4 addressing, each IP address is a unique ____ number
Resistance is measured in ?
Which of the memories below is often used in a typical computer...
NICs contain a(n) ____ which transmits and receives data signals.
Which Motherboard form factor uses one 20 pin connector
A hard disk is divided into tracks which are further subdivided into:
Which of the following cables can transmit data at high speeds?
What do you call the long horizontal bar at the bottom of the screen...
At about what interval are GPOs updated on domain controllers?
TCP is a(n)___ sub protocol.
Which printer is very commonly used for desktop publishing?
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs...
The default subnet mask for a Class B network is ____.
Windows Easy Transfer supports two types of migrations.
IC are classified on the basis of ___
Direct X is a _____
Secondry memory is also know as?
In which file system technology file level security is available?
Which of the following is a container object?
In latest generation computers, the instructions are executed ?
Programs stored in ROM are called ___
Computer software includes ____
What is the name of the series of Laptop computers manufactured by IBM...
From what location are the 1st computer instructions available on boot...
Nortel is a company which manufactures:
Groups are considered an organizing component of Active Directory.
What could cause a fixed disk error.
Which standard govern parallel communications?
What protocol enables you to create a standard platform to develop...
Index hole is related to?
RS-232 is a standard that applies to:
You are the administrator of an active directory domain. A user...
Traditional switches operate at the ____ layer of the OSI model.
You just installed a new IDE hard drive, but your system BIOS will not...
What are the units used to count the speed of a printer?
Which of the following does UAC prompt for permission or...
A microprocessor unit, a memory unit, and an input/output unit form a:
____ is a simple Application layer protocol used to synchronize the...
A ____ is a repeater with more than one output port
The sub protocol that enables TCP/IP to internetwork - that is, to...
Floppy Disk Drives were originally designed by.
Who among the following is a Personal Computer manufacturer from...
An Active Directory container used to organize a network’s users and...
The most common logical topologies are ____ and ring. (Select two)
By far, the most popular expansion board NIC today is one that uses...
Which of the following was not an improvement of Windows 7 over...
A person by the name of Paul wants to perform a profile migration,...
Before you upgrade an existing Windows operating system to Windows 7,...
What type of DNS record is the record that points out the location of...
The area where the clock and a few select system icons is located on...
On an Ethenet network, a(n) ____ is the portion of a network in which...
Which of the following is used to prevent unauthorized changes to your...
You run the Add Roles Wizard in Server Manager to add the AD DS...
With respect to a network interface card, the term 10/100 refers to
What replaced the Quick Launch shortcut?
Your IT Company is constantly changing, with new users coming and...
You install Active Directory on a server. You want it to be a separate...
Which of the following groupings of linked domains would be a tree?
It holds the address of the active memory?
A source program is
You work as the desktop support technician at Texas.com. Your boss...
The 34-pin connection on an I/O card is for?
In the Windows 7 Device Manager, how do you know if there is a problem...
How can you create a user object with the help of a single command?
What is the address given to a computer connected to a network called?
____ are combinations of networking hardware and software that connect...
Which of the following is arranged in the correct Active Directory...
To eliminate the possibility of a broadcast storm, switches and...
A ____ is a multiport connectivity device that directs data between...
You have a computer that runs Windows 7 Professional. A USB disk is...
Which of the following commands will force an update of group policy...
To which of the following can a GPO be linked?
The main purpose of Active Directory is to ________. ?
Which feature in Windows 7 enables you to quickly reveal hidden icons...
A user granted Domain Administrator access over the domain...
Which provides the fastest access to large video files?
If a policy is defined in a GPO linked to a domain, and that policy is...
What is the disadvantage of using a 64-bit version of Windows 7 when...
A person by name Simson as created a free allocated space of 20GB in...
Under what circumstances are the built-in user accounts no longer...
The software used to drive microprocessor-based systems is called:
Which edition of Windows 7 is the minimum needed to fully support Home...
You have a computer that runs Windows Vista. You need to identify...
What can you use to quickly capture performance data of multiple...
Which editions of Windows 7 include all the features that Windows 7...
Which of the following will happen when data is entered into a memory...
Which of the following is the most appropriate scenario where you...
A physical topology ____.
A standard user named User1 has a computer that runs Windows 7. You...
What tool can help you quickly determine what processes are writing to...
You are employed as the network Administrator at Acme.com. The...
What are the two default GPOs that are created when Active Directory...
The policy in both GPOs defaults to Not Defined so that no conflict...
After receiving several support calls, you have decided to prevent...
When configuring GPOs, which node contains the majority of account...
You are installing Active Directory on a new domain controller and...
Alert!

Advertisement