Strata Practice Exam 1-25 50-150

107 Questions | Total Attempts: 48

SettingsSettingsSettings
Practice Exam Quizzes & Trivia

STRATA Practice Exam Good Luck!


Questions and Answers
  • 1. 
    Step 1 - Talk to the Customer Step 2 - Document Your Work Step 3 - Continue to gather information Step 4 - Eliminate possibilities to find the problem Step 5 - Test your results
  • 2. 
    You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a compleye solution. Choose all that apply.
    • A. 

      Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B. 

      Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on primary IDE controller. Designate both drives as Master.

    • C. 

      Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary controller. Desidnate the second hard disk drive as Slave.

    • D. 

      Install both the hard disk drives on the primary IDE controller. Designate both drives as Secondary

  • 3. 
    Which of the following maxium resolutions does the UXGA video technology supports?
    • A. 

      2560 x 1600

    • B. 

      1600 X 1200

    • C. 

      2048 X 1536

    • D. 

      1280 X 1024

  • 4. 
    Which of the following sleep modes is the most power hungry mode?
    • A. 

      S1

    • B. 

      S2

    • C. 

      S0

    • D. 

      S3

  • 5. 
    Which of the following switches of the XCOPY command copies file ownerships and NTFS permission on files while copying the files?
    • A. 

      /p

    • B. 

      /s

    • C. 

      /r

    • D. 

      /o

  • 6. 
    Which of the following statements about a smart card are true? Each correct answer represents a complete solution. Choose two.
    • A. 

      It is used to securely store public and private keys for long on, email signing and encryption, and file encryption.

    • B. 

      It is a device that works as an interface between a computer and a network

    • C. 

      It is a device that routes data packets between computers in different network

    • D. 

      It is a device that contains a microprocessor and permanent memory

  • 7. 
    Which of the following ports is also known as PS/2?
    • A. 

      6-pin Mini-DIN connector

    • B. 

      5-pin DIN connector

    • C. 

      4-pin Mini-DIN connector

    • D. 

      USB Connector

  • 8. 
    Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose two.
    • A. 

      USB supports hot plugging

    • B. 

      You can connect up to 127 peripheral devices to a single USB port

    • C. 

      You can connect up to 16 peripheral devices to a single USB port

    • D. 

      USB does not support Plug n Play installation

  • 9. 
    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
    • A. 

      Man-in-the-middle attack

    • B. 

      Denial-of0Service (DoS) attack

    • C. 

      Buffer-overflow attack

    • D. 

      Shoulder surfing attack

  • 10. 
    You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
    • A. 

      His operating system is incompatible

    • B. 

      A firewall is blocking him

    • C. 

      His laptop is incompatible

    • D. 

      MAC filtering is blocking him

  • 11. 
    Which of the followintg is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete?
    • A. 

      Session Initiation protocol

    • B. 

      Streaming Media

    • C. 

      HTTP streaming

    • D. 

      Slipstreaming

  • 12. 
    Which of the following refers to the data rate supported by a network connection or interface?
    • A. 

      Bandwidth

    • B. 

      Preboot Execution Environment (PXE)

    • C. 

      Branding

    • D. 

      Spam

  • 13. 
    Which of the following are serial interfaces? Choose all that apply.
    • A. 

      EPP

    • B. 

      USB

    • C. 

      FireWire

    • D. 

      IEEE 1284

  • 14. 
    Which of the following devices has its own BIOS?
    • A. 

      Hard disk drive

    • B. 

      Sound card

    • C. 

      Network interface card

    • D. 

      Video adapter

  • 15. 
    Which of the following are dual core processors? Each correct Answer represents a complete solution. Choose two.
    • A. 

      AMD Athlon(tm) 64 X2

    • B. 

      Intel Pentium 4

    • C. 

      Intel(r) Pentium(r) processor Extreme Edition

    • D. 

      AMD Athlon (tm)

  • 16. 
    Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?
    • A. 

      /q

    • B. 

      /o

    • C. 

      /s

    • D. 

      /e

  • 17. 
    Which of the following provides authentication, encryption, and data integrity for wireless devices?
    • A. 

      PAP

    • B. 

      WAN

    • C. 

      WAP

    • D. 

      WTLS

  • 18. 
    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
    • A. 

      Bluetooth

    • B. 

      802.11

    • C. 

      802.11b

    • D. 

      Infrared

  • 19. 
    What is the maximum resolution that the WUXGA video technology supports?
    • A. 

      2048 X 1536

    • B. 

      1920 X 1200

    • C. 

      3840 X 2400

    • D. 

      1600 X 1200

  • 20. 
    What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.
    • A. 

      Data integrity

    • B. 

      Encryption

    • C. 

      Bandwidth

    • D. 

      Authentication

  • 21. 
    Which of the following software displays advertisements, whether or not the user has consented?
    • A. 

      Trojan Horse

    • B. 

      Honeypot

    • C. 

      Spyware

    • D. 

      Adware

  • 22. 
    Which of the following protocols transmits error messages and network statistics?
    • A. 

      ICMP

    • B. 

      DHCP

    • C. 

      TCP

    • D. 

      NNTP

  • 23. 
    Which of the following power sources are used to power a laptop?
    • A. 

      Solar panel

    • B. 

      AC power

    • C. 

      Battery

    • D. 

      Docking Station

  • 24. 
    Mark works as a Network Administrator for NetTech Inc. The network has 150 Windoes 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? Each correct Answer represents a complete solution. Choose two.
    • A. 

      Educate users of the client computers about the problems arising due to malware

    • B. 

      Educate users of the client computers to avoid malware

    • C. 

      Prevent users of the client computers from executing any programs

    • D. 

      Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

  • 25. 
    You have a customer who wants to install WinXP professional on her computer. What is the minimum amount of RAM she must have for this to work?
    • A. 

      129 MB

    • B. 

      64 MB

    • C. 

      2 GB

    • D. 

      1 GB

Back to Top Back to top