Strata Practice Exam 50-75 (10/12/11)

22 Questions

Settings
It Fundamentals Quizzes & Trivia

Questions 50-75


Questions and Answers
  • 1. 
  • 2. 
    You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a complete solution. Choose of that apply.
    • A. 

      Install the second hard disk drive on the primary IQE Controller. Designate one drive as Master and the other as Slave

    • B. 

      Install the second hard drive disk on the secondary IDE controller ensuring that the first drive is on primary IDE controller. Designate both drives as Master

    • C. 

      Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk is on the primary controller. Designate the second hard disk drive as Slave

    • D. 

      Install both the hard disk drives as the Primary IDE Controller. Designate both drives as Secondary

  • 3. 
    Which of the following maximum resolution does the UXGA video technology supports?
    • A. 

      2560x1600

    • B. 

      1600x1200

    • C. 

      2048x1536

    • D. 

      1280x1024

  • 4. 
    Which of the following sleep mode is the most power hungry mode?
    • A. 

      S1

    • B. 

      S2

    • C. 

      S0

    • D. 

      S3

  • 5. 
    Which of the following switches of the XCOPY command copies the ownership and HTPS permissions on files while copying the files?
    • A. 

      /p

    • B. 

      /s

    • C. 

      /t

    • D. 

      /o

  • 6. 
    Which of the folloowing statements about a smart card are true? Each correct Answer represents a complete solution. Choose Two.
    • A. 

      It is used to securely store public and private keys for log on, e-email signing and encryption, and file encryption

    • B. 

      It is a device that works as interface between a computer and a netork

    • C. 

      It is a device that routes data packets between computers in different networks.

    • D. 

      It is a device that contains a microprocessor and permanent memory

  • 7. 
    Which of the following ports is also known as PS/2
    • A. 

      6-Pin Mini-Din Connector

    • B. 

      5-pin Din Connector

    • C. 

      4-pin Mini-Din Connector

    • D. 

      USB Connector

  • 8. 
    Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose Two.
    • A. 

      USB supports hot plugging

    • B. 

      You can connect up to 127 peripheral devices to a single USB port

    • C. 

      You can connect up to 16 peripheral devices to a single USB Port

    • D. 

      USB does not support Plug n Play installation

  • 9. 
    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
    • A. 

      Man in the middle Attack

    • B. 

      Denial of Service (DoS) attack

    • C. 

      Buffer-overflow attack

    • D. 

      Shoulder surfing attack

  • 10. 
    You are responsible for technical supports at a company. One of the empployees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
    • A. 

      His operating system incompatible

    • B. 

      A firewall is blocking him

    • C. 

      His laptop is incompatible

    • D. 

      MAC filtering is blocking him

  • 11. 
    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?
    • A. 

      Session Intiation Protocol

    • B. 

      Streaming Media

    • C. 

      HTTP Streaming

    • D. 

      Slipstreaming

  • 12. 
    Which of the following refers to the data supported by a network connection or interface?
    • A. 

      Bandwidth

    • B. 

      Preboot Execution Enviroment

    • C. 

      Branding

    • D. 

      Spam

  • 13. 
    Which of the following are serial interfaces? Each correct answer represents a complete solution. Choose all that apply.
    • A. 

      EPP

    • B. 

      USB

    • C. 

      Firewire

    • D. 

      IEEE 1284

  • 14. 
    Which of the following devices has its own BIOS?
    • A. 

      Hard disk drive

    • B. 

      Sound Card

    • C. 

      Network Interface Card

    • D. 

      Video Adapter

  • 15. 
    Which of the following are dual core processors? Each correct answer represents a complete solution. Choose Two
    • A. 

      AMD Athlon(TM) 64 X2

    • B. 

      Intel Pentium 4

    • C. 

      Intel(r)Pentium(r)Processor Extreme Edition

    • D. 

      AMD Athlon (tm)

  • 16. 
    Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?
    • A. 

      /q

    • B. 

      /o

    • C. 

      /s

    • D. 

      /e

  • 17. 
    Which of the following provides authentication, encryption and data integrity for wireless devices?
    • A. 

      PAP

    • B. 

      WAN

    • C. 

      WAP

    • D. 

      WTLS

  • 18. 
    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
    • A. 

      Bluetooth

    • B. 

      802.11

    • C. 

      802.11b

    • D. 

      Infrared

  • 19. 
    What is the maximum resolution that the WUXGA video technology supports?
    • A. 

      2048 x 1536

    • B. 

      1920 x 1200

    • C. 

      3840 x 2400

    • D. 

      1600 x 1200

  • 20. 
    What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.
    • A. 

      Data integrity

    • B. 

      Encryption

    • C. 

      Bandwidth

    • D. 

      Authentication

  • 21. 
    Which of the following software displays advertisements, whether or not the user has consented?
    • A. 

      Trojan Horse

    • B. 

      Honeypot

    • C. 

      Spyware

    • D. 

      Adware

  • 22. 
    Which of the following protocols transmits error messages and network statistics?
    • A. 

      ICMP

    • B. 

      DHCP

    • C. 

      TCP

    • D. 

      NNTP