Strata Practice Exam 50-75 (10/12/11)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tranman13195
T
Tranman13195
Community Contributor
Quizzes Created: 1 | Total Attempts: 102
| Attempts: 102 | Questions: 21
Please wait...
Question 1 / 21
0 %
0/100
Score 0/100
1. Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Explanation

A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an individual trying to gain unauthorized access to sensitive information by visually observing the target's actions. The attacker may try to steal passwords, login credentials, or other confidential information by simply watching the victim's keystrokes or screen. This method is considered a form of social engineering, as it relies on human vulnerability rather than exploiting technical vulnerabilities in the system.

Submit
Please wait...
About This Quiz
Strata Practice Exam 50-75 (10/12/11) - Quiz

Strata Practice Exam 50-75 assesses key IT skills including hardware installation, video technology, power management, command line tools, troubleshooting, and security. Ideal for learners preparing for IT certification.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which of the following refers to the data supported by a network connection or interface?

Explanation

Bandwidth refers to the data supported by a network connection or interface. It is the maximum amount of data that can be transmitted over a network connection in a given amount of time. Bandwidth is typically measured in bits per second (bps) and determines the speed and capacity of a network connection. It is an important factor in determining the efficiency and performance of a network.

Submit
3. Which of the following software displays advertisements, whether or not the user has consented?

Explanation

Adware is a type of software that displays advertisements, regardless of whether the user has given consent or not. Unlike other types of software mentioned in the question, such as Trojan Horse, Honeypot, and Spyware, which have different purposes, adware specifically focuses on delivering advertisements to users. This can be in the form of pop-up ads, banners, or even redirecting web pages. Adware is often bundled with other software and installed without the user's knowledge or explicit consent, making it an intrusive and unwanted form of software.

Submit
4. Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

Explanation

Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported technology that allows for easy and seamless connections between devices. It has a decent range and offers good data transfer speeds, making it suitable for connecting peripherals like printers and mice to laptops. Additionally, Bluetooth is energy-efficient, which helps conserve battery life on both the laptop and the connected devices.

Submit
5. Which of the following maximum resolution does the UXGA video technology supports?

Explanation

The correct answer is 1600x1200. UXGA video technology supports a maximum resolution of 1600x1200.

Submit
6. Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

Explanation

Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous delivery of audio and video content over the internet, allowing users to access and enjoy multimedia content in real-time without the need for complete downloading. Unlike other options listed, such as Session Initiation Protocol (SIP), HTTP Streaming, and Slipstreaming, streaming media specifically addresses the described functionality of starting playback before the download is finished.

Submit
7. Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose Two.

Explanation

USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without the need to restart the computer. This is a convenient feature that allows for easy and quick device connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port. This high number of connections makes USB a versatile and efficient option for connecting multiple devices to a computer.

Submit
8. You are responsible for technical supports at a company. One of the empployees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

Explanation

The most likely problem is that MAC filtering is blocking him. MAC filtering is a security measure that allows or blocks devices from connecting to a network based on their MAC address. If the employee's laptop is not added to the allowed list of MAC addresses, it would be blocked from connecting to the company wireless network even if the password/passkey is valid.

Submit
9. Which of the following ports is also known as PS/2

Explanation

The 6-Pin Mini-Din Connector is also known as PS/2. This port is commonly used to connect keyboards and mice to computers. The PS/2 interface was widely used before the introduction of USB, and it uses a 6-pin Mini-Din Connector for connecting peripherals.

Submit
10. What is the maximum resolution that the WUXGA video technology supports?

Explanation

WUXGA video technology supports a maximum resolution of 1920 x 1200. This resolution refers to the number of pixels that can be displayed horizontally and vertically on a screen. WUXGA stands for Wide Ultra Extended Graphics Array, and it is commonly used in computer monitors and projectors. This resolution provides a high level of detail and clarity, making it suitable for tasks that require precise visuals, such as graphic design or video editing.

Submit
11. Which of the following are dual core processors? Each correct answer represents a complete solution. Choose Two

Explanation

The AMD Athlon(TM) 64 X2 and Intel(r) Pentium(r) Processor Extreme Edition are both dual core processors. The AMD Athlon(TM) 64 X2 is a dual core processor from AMD, while the Intel(r) Pentium(r) Processor Extreme Edition is a dual core processor from Intel. Both processors have two cores, allowing them to perform tasks more efficiently and handle multiple tasks simultaneously. The Intel Pentium 4 and AMD Athlon (tm) are not dual core processors, as they only have a single core.

Submit
12. Which of the following provides authentication, encryption and data integrity for wireless devices?

Explanation

WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. WTLS is a security protocol specifically designed for wireless communication, ensuring secure transmission of data over wireless networks. It offers authentication to verify the identities of the communicating parties, encryption to protect the confidentiality of the data being transmitted, and data integrity to ensure that the data has not been tampered with during transmission. WTLS is commonly used in mobile devices and wireless applications to ensure secure communication and protect sensitive information.

Submit
13. Which of the following switches of the XCOPY command copies the ownership and HTPS permissions on files while copying the files?

Explanation

The /o switch of the XCOPY command is used to copy the ownership and HTPS (Hidden, System, Archive, and Read-only) permissions on files while copying them. This switch ensures that the copied files retain the same ownership and permissions as the original files.

Submit
14. Which of the folloowing statements about a smart card are true? Each correct Answer represents a complete solution. Choose Two.

Explanation

A smart card is a device that contains a microprocessor and permanent memory, allowing it to store and process data. It is commonly used to securely store public and private keys for various purposes such as log on, e-mail signing and encryption, and file encryption. This makes it a reliable solution for authentication and security purposes.

Submit
15. Which of the following devices has its own BIOS?

Explanation

A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that initializes the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. The BIOS of a video adapter contains settings and options that can be modified to optimize the graphics card's performance.

Submit
16. What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.

Explanation

Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data remains intact and has not been tampered with during transmission. Encryption ensures that the data is encrypted and can only be decrypted by authorized parties, protecting it from unauthorized access. Authentication verifies the identity of the communicating parties, ensuring that only trusted devices can access the network. Bandwidth, on the other hand, is not provided by WTLS and is not relevant to its security features.

Submit
17. Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?

Explanation

The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.

Submit
18. You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a complete solution. Choose of that apply.

Explanation

The correct answer is to install the second hard disk drive on the primary IQE Controller and designate one drive as Master and the other as Slave. This is because the primary IQE Controller is designed to handle multiple drives, with one drive being the Master and the other being the Slave. Additionally, installing the second hard drive disk on the secondary IDE controller and designating both drives as Master is also a correct solution. This is because the secondary IDE controller can also handle multiple drives, and designating both drives as Master allows them to be recognized and accessed by the computer.

Submit
19. Which of the following are serial interfaces? Each correct answer represents a complete solution. Choose all that apply.

Explanation

USB and Firewire are both examples of serial interfaces. USB (Universal Serial Bus) is a common interface used for connecting various devices to a computer, such as keyboards, mice, and external storage devices. Firewire (also known as IEEE 1394) is another serial interface that is commonly used for connecting audio/video equipment and external hard drives to a computer. EPP (Enhanced Parallel Port) and IEEE 1284 are examples of parallel interfaces, not serial interfaces.

Submit
20. Which of the following protocols transmits error messages and network statistics?

Explanation

ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. ICMP is used by network devices to send error messages, such as "destination unreachable" or "time exceeded," back to the source IP address. It is also used for network diagnostics and troubleshooting, providing information about network connectivity, latency, and other statistics. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. TCP (Transmission Control Protocol) is responsible for establishing reliable connections between devices. NNTP (Network News Transfer Protocol) is used for distributing, querying, and retrieving news articles.

Submit
21. Which of the following sleep mode is the most power hungry mode?

Explanation

S1 sleep mode is the most power hungry mode because it is a fully powered state where the CPU and other components are still running, consuming a significant amount of power. In this mode, the system is idle but ready to respond quickly to any input or task, resulting in higher power consumption compared to the other sleep modes. S2, S0, and S3 sleep modes are all lower power states with varying levels of power consumption and responsiveness.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 15, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    Tranman13195
Cancel
  • All
    All (21)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following types of attacks is often performed by looking...
Which of the following refers to the data supported by a network...
Which of the following software displays advertisements, whether or...
Mark wants to connect a printer and mouse to his laptop. Which of the...
Which of the following maximum resolution does the UXGA video...
Which of the following is a technology that allows you to hear and...
Which of the following statements are true about Universal Serial Bus...
You are responsible for technical supports at a company. One of the...
Which of the following ports is also known as PS/2
What is the maximum resolution that the WUXGA video technology...
Which of the following are dual core processors?...
Which of the following provides authentication, encryption and data...
Which of the following switches of the XCOPY command copies the...
Which of the folloowing statements about a smart card are true? Each...
Which of the following devices has its own BIOS?
What does Wireless Transport Layer Security (WTLS) provide for...
Which of the following switches is used with the XCOPY command to copy...
You are installing two hard disk drives on a computer. Which of the...
Which of the following are serial interfaces?...
Which of the following protocols transmits error messages and network...
Which of the following sleep mode is the most power hungry mode?
Alert!

Advertisement