Strata 1

21 Questions

Settings
It Fundamentals Quizzes & Trivia

STRATA PRACTICE EXAM!


Questions and Answers
  • 1. 
    You are installing two hard drisk drives on a computer. Which of the following possible combinations can be used? Each correst represents a complete solution. Choose all that apply.
    • A. 

      Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B. 

      Install the second hard disk drive onthe secondary IDE controller ensuring that the first hard disk drive is on Primary IDE controller.

    • C. 

      Install the second hard disk drive ont he secondary IDE controller ensuring that the first hard disk drive is on the primary controller.

    • D. 

      Install both the hard disk drives on the primary IDE controller. Designate both drives as Secondary.

  • 2. 
    Which of the following maximum resolutions doe sthe UXGA video technology supports?
    • A. 

      2560x1600

    • B. 

      1600x1200

    • C. 

      2048x1536

    • D. 

      1280x1024

  • 3. 
    Which of the following sleep modes is the most power hungry mode?
    • A. 

      S1

    • B. 

      S2

    • C. 

      S0

    • D. 

      S3

  • 4. 
    Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?
    • A. 

      /p

    • B. 

      /s

    • C. 

      /r

    • D. 

      /o

  • 5. 
    Put in order: *Talk to customer *document your work *continue to gather information *eliminate possibilities to find the problem *test your results Correct order to troubleshoot effectively: (1)Talk to customer (2)Continue to gather information (3)eliminate possibilities to find the problem (4)Test your results (5)document your work
  • 6. 
    Which of the following statements about a smart card are true? Eachcorrect answer represents a complete solution. Choose two.
    • A. 

      It is used to securely store public and private keys for log on, e-mail signing and encryption, and file encryption

    • B. 

      It is a device that works as an interface between a computer and a network

    • C. 

      It is a device that routes data packets between computers in different networks

    • D. 

      It is a device that contains a microprocessir abd a permanent memory

  • 7. 
    Which of the following ports is also known as PS/2?
    • A. 

      6 PIN MINI DIN CONNECTOR

    • B. 

      5 PIN MINI DIN CONNECTOR

    • C. 

      4 PIN MINI DIN CONNECTOR

    • D. 

      USB CONNECTOR

  • 8. 
    Which of the following statements are true about Universal Serial Bus (USB) ? choose two
    • A. 

      Usb suports hot plugging

    • B. 

      You can connect up to 127 peripheral devices to a single USB port

    • C. 

      You can connect up to 16 peripheral devices to a single usb port

    • D. 

      Usb does not support plug n play installation

  • 9. 
    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
    • A. 

      Man in the middle attack

    • B. 

      Denial of service attack(DoS)

    • C. 

      BUFFER OVERFLOW

    • D. 

      SHOULDER SURFING ATTACK

  • 10. 
    You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network.  You have verified that he is entering a calid password/passkey. What is the most likely problem?
    • A. 

      His operating system is incompatable

    • B. 

      Firewall blocking him

    • C. 

      Laptop is incompatible

    • D. 

      MAC filtering is blocking him

  • 11. 
    Which of the following is a technology that allows you to hear and watch video clups as soon as they start downloading from the web site, instead of waiting for the download to complete?
    • A. 

      Session initiation protocol

    • B. 

      Streaming media

    • C. 

      Http streaming

    • D. 

      Slipstreaming

  • 12. 
    Which of the following refers to the data rate supported by a network connection or interface?
    • A. 

      Bandwidth

    • B. 

      Preboot execution environment (PXE)

    • C. 

      Branding

    • D. 

      Spam

  • 13. 
    Which of the following are serial interfaces?
    • A. 

      EPP

    • B. 

      USB

    • C. 

      FIREWIRE

    • D. 

      IEE 1284

  • 14. 
    Which of the following devices has its own BIOS?
    • A. 

      Hard disk drive

    • B. 

      Sound card

    • C. 

      Network interface card

    • D. 

      Video adapter

  • 15. 
    Which of the following are dual core processors?
    • A. 

      AMD ATHION 64 X2

    • B. 

      INTEL PENTIUM 4

    • C. 

      INTELL(r) PENTIUM (r) PROCESSORE EXTREME EDITION

    • D. 

      AMD ANTHION(tm)

  • 16. 
    Which of the following switches is used with the XCOPY command to copy directions and subdirectories, including empty directories?
    • A. 

      /q

    • B. 

      /o

    • C. 

      /s

    • D. 

      /e

  • 17. 
    Which of the following provides authentication, encription and data integrity for wireless devices?
    • A. 

      PAP

    • B. 

      WAN

    • C. 

      WAP

    • D. 

      WTLS

  • 18. 
    MARK WANTS TO CONNECT A PRINTER AND MOUSE TO HIS LAPTOP WHICH IS THE BEST WIRELESS TECHNOLOGY O USE
    • A. 

      Bluetooth

    • B. 

      802 11

    • C. 

      802.11b

    • D. 

      Infrared

  • 19. 
    What is the maximun resolution that the WUXGA video technology supports?
    • A. 

      2048x1538

    • B. 

      1920x1200

    • C. 

      3840x2400

    • D. 

      1600x1200

  • 20. 
    What does wir5eless transport layer security WTLS provide for wireless devices?
    • A. 

      Data integrity

    • B. 

      Encription

    • C. 

      Bandwidth

    • D. 

      Authentication

  • 21. 
    Which of the following software displays advertisements, whether or not the user has consented?
    • A. 

      Trojan horse

    • B. 

      Honeypot

    • C. 

      Spyware

    • D. 

      Adware