Strata Practice Exam 1-25 50-150

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ranger1
R
Ranger1
Community Contributor
Quizzes Created: 3 | Total Attempts: 694
| Attempts: 80
SettingsSettings
Please wait...
  • 1/107 Questions

    Which of the following refers to the data rate supported by a network connection or interface?

    • Bandwidth
    • Preboot Execution Environment (PXE)
    • Branding
    • Spam
Please wait...
About This Quiz

STRATA Practice Exam 1-25 50-150 assesses knowledge in computer hardware, video technology, system commands, and security features. It enhances skills in troubleshooting, system management, and security protocol handling.

Strata Practice Exam 1-25 50-150 - Quiz

Quiz Preview

  • 2. 

    Which of the following features are related to power management? Choose two.

    • Hot plugging

    • Hibernate mode

    • Standby mode

    • Safe mode

    Correct Answer(s)
    A. Hibernate mode
    A. Standby mode
    Explanation
    Hibernate mode and standby mode are both related to power management. Hibernate mode is a power-saving state that saves the current state of your computer to the hard drive and shuts down, allowing you to resume where you left off when you power it back on. Standby mode, on the other hand, puts your computer into a low-power state while still keeping your session and open documents in memory, allowing for quick resumption of work. Both of these features help conserve power by allowing the computer to enter a low-power state when not in use.

    Rate this question:

  • 3. 

    Which of the following types of connectors is used by 1000BASE-TX gigabit ethernet?

    • RJ-45

    • RJ-59

    • BNC

    • LC

    Correct Answer
    A. RJ-45
    Explanation
    The correct answer is RJ-45. RJ-45 is a type of connector commonly used for Ethernet connections, including 1000BASE-TX gigabit Ethernet. It is a standard connector that allows for reliable and high-speed data transmission. RJ-45 connectors have eight pins and are typically used with twisted pair cables. They are widely used in networking applications and are compatible with various Ethernet standards. RJ-59 is a different type of connector used for coaxial cables, BNC is another type of connector used for video and RF applications, and LC is a type of connector used for fiber optic cables.

    Rate this question:

  • 4. 

    Which of the following is a block of data stored on a client computer by a web browser?

    • Cookie

    • Plug-in

    • Add-in

    • Keyword

    Correct Answer
    A. Cookie
    Explanation
    A cookie is a block of data stored on a client computer by a web browser. Cookies are used to store information about the user's browsing activity, preferences, and login credentials. This information is then sent back to the server with each subsequent request, allowing the server to personalize the user's experience and remember their settings. Cookies are commonly used for tracking, session management, and targeted advertising purposes.

    Rate this question:

  • 5. 

    Which of the following is generally defined as the difference between the brightest color (white) and the darkest color (black)?

    • Reconnaissance

    • Characterizing

    • Pixel aspect ratio (PAR)

    • Contrast ratio

    Correct Answer
    A. Contrast ratio
    Explanation
    Contrast ratio is generally defined as the difference between the brightest color (white) and the darkest color (black). It is a measure of the range of tones that can be displayed on a screen or captured by a camera. A high contrast ratio indicates a greater difference between the brightest and darkest colors, resulting in more vibrant and detailed images.

    Rate this question:

  • 6. 

    Which of the followintg is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete?

    • Session Initiation protocol

    • Streaming Media

    • HTTP streaming

    • Slipstreaming

    Correct Answer
    A. Streaming Media
    Explanation
    Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, without having to wait for the download to complete. This technology enables the continuous playback of audio or video content while it is being transferred over the internet. It is commonly used for online video platforms, live streaming, and on-demand services, providing users with immediate access to multimedia content without the need to fully download it beforehand.

    Rate this question:

  • 7. 

    Which of the following devices provides input by analyzing printed text, handwriting, or an object?

    • Webcam

    • Image scanner

    • Packet analyzer

    • BD-ROM Drive

    Correct Answer
    A. Image scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert the physical content into digital data that can be processed by a computer. This allows users to easily digitize documents, images, or physical objects and store or manipulate them electronically. Unlike a webcam, which captures live video footage, an image scanner focuses on capturing and converting static visual information into a digital format. Packet analyzers and BD-ROM drives are not designed for analyzing printed text, handwriting, or objects.

    Rate this question:

  • 8. 

    Which of the following statements are true about Universal Serial Bus (USB)? Each correct Answer represents a complete solution. Choose two.

    • USB supports hot plugging

    • You can connect up to 127 peripheral devices to a single USB port

    • You can connect up to 16 peripheral devices to a single USB port

    • USB does not support Plug n Play installation

    Correct Answer(s)
    A. USB supports hot plugging
    A. You can connect up to 127 peripheral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. This allows for convenient and seamless connectivity. Additionally, USB allows for the connection of up to 127 peripheral devices to a single USB port, making it a versatile and efficient technology for connecting multiple devices to a computer.

    Rate this question:

  • 9. 

    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

    • Man-in-the-middle attack

    • Denial-of0Service (DoS) attack

    • Buffer-overflow attack

    • Shoulder surfing attack

    Correct Answer
    A. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. In this type of attack, the attacker tries to gain unauthorized access to sensitive information such as passwords, PINs, or other confidential data by observing the victim's actions. By physically observing the victim's keystrokes or screen, the attacker can gather valuable information without the victim's knowledge. This type of attack can be easily carried out in public places or shared workspaces where the attacker can easily position themselves to view the victim's screen or keyboard.

    Rate this question:

  • 10. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • Bluetooth

    • 802.11

    • 802.11b

    • Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop because it is a widely supported and versatile technology that allows for easy and reliable connections between devices. Bluetooth provides a low-power, short-range wireless connection that is ideal for connecting peripherals like printers and mice to laptops without the need for additional cables or adapters. Additionally, Bluetooth offers a secure and stable connection, making it a popular choice for wireless device connectivity.

    Rate this question:

  • 11. 

    Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and finds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functioning. What should Mark do first to resolve the issue?

    • Verify that the USB functionality is enables in the BIOS

    • Purchase another model of the USB webcam.

    • Change the computers motherboard

    • Replace the USB port wires with a new one

    Correct Answer
    A. Verify that the USB functionality is enables in the BIOS
    Explanation
    Mark should first verify that the USB functionality is enabled in the BIOS. The BIOS (Basic Input/Output System) is responsible for controlling the hardware of the computer, including USB ports. By checking the BIOS settings, Mark can ensure that the USB functionality is enabled and functioning properly. This step is necessary before considering purchasing another webcam, changing the motherboard, or replacing the USB port wires.

    Rate this question:

  • 12. 

    Which of the following program is used to collect personal information stored in the computer and send it to a third party without the permission of the user?

    • Grayware

    • Spyware

    • Adware

    • Firewall

    Correct Answer
    A. Spyware
    Explanation
    Spyware is a program that is used to collect personal information stored in the computer and send it to a third party without the permission of the user. It is a type of malicious software that secretly monitors and gathers information about an individual's online activities, such as browsing habits, passwords, and credit card details. This information is then typically used for malicious purposes, such as identity theft or unauthorized access to financial accounts.

    Rate this question:

  • 13. 

    Which of the following types of parental controls is used to limit access to the Internet contents?

    • Conent filter control

    • Bandwidth control

    • Usage management tool

    • Monitoring control

    Correct Answer
    A. Conent filter control
    Explanation
    Content filter control is used to limit access to Internet contents by blocking or filtering certain websites or types of content. It allows parents or guardians to restrict access to inappropriate or potentially harmful material, ensuring a safer online experience for children. This type of parental control can be customized to block specific websites, keywords, or categories of content, providing a more tailored and effective approach to internet filtering.

    Rate this question:

  • 14. 

    Your customers WinXP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this?

    • Simply put the Windows Recovery CD in and the recovery process will start

    • Reinstall Windows

    • Use the Windows Recovery Console witht he Windoes Recovery CD to put the system back in a working state

    • Simply uninstall any new software

    Correct Answer
    A. Use the Windows Recovery Console witht he Windoes Recovery CD to put the system back in a working state
    Explanation
    The best way to put the customer's WinXP machine back into a working state is to use the Windows Recovery Console with the Windows Recovery CD. This option allows the user to access advanced troubleshooting tools and repair the system. Simply putting the Windows Recovery CD in will not initiate the recovery process, and reinstalling Windows may not be necessary if the issue can be resolved using the recovery console. Uninstalling any new software may not address the underlying cause of the problem.

    Rate this question:

  • 15. 

    Which of the following programs can collect various types of personal info, such as internet surfing habits and websites that the user has visited?

    • Malware

    • Spyware

    • Honeypot

    • Worm

    Correct Answer
    A. Spyware
    Explanation
    Spyware is a type of program that can collect various types of personal information, including internet surfing habits and websites that the user has visited. It is designed to secretly monitor and gather data about a user's online activities without their knowledge or consent. This information can then be used for malicious purposes, such as identity theft or targeted advertising. Spyware is often installed on a user's device without their knowledge, typically through deceptive tactics or bundled with other software.

    Rate this question:

  • 16. 

    Which of the following term is used for any small mobile hand held device that provides computing, information storage and retrieval capabilities for business or personal use?

    • Solid State Drive

    • Personal Digital Assistant

    • Pen drive

    • SocketShield

    Correct Answer
    A. Personal Digital Assistant
    Explanation
    A personal digital assistant (PDA) is a small mobile handheld device that provides computing, information storage, and retrieval capabilities for both business and personal use. PDAs are designed to be portable and offer features such as calendars, address books, note-taking, and task management. They also often have wireless connectivity options, allowing users to access the internet and send/receive emails. PDAs have been widely used in the past for their convenience and functionality, although they have largely been replaced by smartphones in recent years.

    Rate this question:

  • 17. 

    Which of the following ports is also known as PS/2?

    • 6-pin Mini-DIN connector

    • 5-pin DIN connector

    • 4-pin Mini-DIN connector

    • USB Connector

    Correct Answer
    A. 6-pin Mini-DIN connector
    Explanation
    The 6-pin Mini-DIN connector is also known as PS/2. This connector is commonly used for connecting keyboards and mice to computers.

    Rate this question:

  • 18. 

    You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?

    • His operating system is incompatible

    • A firewall is blocking him

    • His laptop is incompatible

    • MAC filtering is blocking him

    Correct Answer
    A. MAC filtering is blocking him
    Explanation
    The most likely problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is new, it is possible that its MAC address has not been added to the list of allowed devices. This would result in the laptop being blocked from connecting to the network, even if the correct password/passkey is entered.

    Rate this question:

  • 19. 

    Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and CompactFlash (CF)?

    • E-book reader

    • Memory card reader

    • Smart card reader

    • Barcode reader

    Correct Answer
    A. Memory card reader
    Explanation
    A memory card reader is used for accessing the data on Secure Digital (SD) cards, MMC cards, and CompactFlash (CF) cards. It is a device that allows you to transfer data between your memory card and a computer or other devices. By connecting the memory card reader to a computer, you can easily access and transfer files, photos, videos, and other data from your memory card without the need for the original device the card was used in.

    Rate this question:

  • 20. 

    Which of the following devices has an acoustic sensor that provides input by converting sound into electrical signals?

    • Microphone

    • Trackball

    • Webcam

    • Sound card

    Correct Answer
    A. Microphone
    Explanation
    A microphone is a device that has an acoustic sensor, which converts sound into electrical signals. It is commonly used to capture audio and provide input for various applications such as recording, voice recognition, and communication. The microphone's acoustic sensor detects sound waves and converts them into electrical signals that can be processed and transmitted to other devices or systems. Therefore, the correct answer is Microphone.

    Rate this question:

  • 21. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • Trojan Horse

    • Honeypot

    • Spyware

    • Adware

    Correct Answer
    A. Adware
    Explanation
    Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other free software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads, which can be intrusive and disruptive to the user's browsing experience. Unlike other options listed, such as Trojan Horse, Honeypot, and Spyware, Adware specifically focuses on displaying advertisements.

    Rate this question:

  • 22. 

    Mark works as a Network Administrator for NetTech Inc. The network has 150 Windoes 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? Each correct Answer represents a complete solution. Choose two.

    • Educate users of the client computers about the problems arising due to malware

    • Educate users of the client computers to avoid malware

    • Prevent users of the client computers from executing any programs

    • Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

    Correct Answer(s)
    A. Educate users of the client computers about the problems arising due to malware
    A. Educate users of the client computers to avoid malware
    Explanation
    To protect the client computers from malware, Mark will educate the users about the problems arising due to malware and how to avoid it. By providing information and awareness about the risks and consequences of malware infections, users will be more cautious and take necessary precautions while using the internet. This will help in reducing the chances of malware infecting the client computers and ensure a safer network environment.

    Rate this question:

  • 23. 

    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

    • RamBus

    • Non Parity RAM

    • ECC RAM

    • Logic Parity RAM

    Correct Answer
    A. ECC RAM
    Explanation
    ECC RAM, or Error Correcting Code RAM, is the type of RAM that should be selected to ensure errors are handled effectively. ECC RAM has the ability to detect and correct errors that may occur during data storage and retrieval processes. It uses additional bits to store error correction codes, allowing it to identify and fix errors in real-time. This makes ECC RAM more reliable and stable compared to other types of RAM, making it the ideal choice for someone who is concerned about error handling in their new PC.

    Rate this question:

  • 24. 

    Which of the following can be installed in an AGP slot?

    • Video card

    • RAM

    • Microprocessor

    • Modem card

    Correct Answer
    A. Video card
    Explanation
    An AGP slot is specifically designed to accommodate a video card. AGP stands for Accelerated Graphics Port, which is a high-speed interface primarily used for connecting a graphics card to a computer's motherboard. Therefore, a video card is the only option that can be installed in an AGP slot. RAM, microprocessors, and modem cards require different types of slots or connectors to be installed in a computer.

    Rate this question:

  • 25. 

    Which of the following methods is based on the user's roles and responsibilities?

    • Mandatory access control

    • System access control

    • Role based access control

    • Discretionary access control

    Correct Answer
    A. Role based access control
    Explanation
    Role based access control is a method that is based on the user's roles and responsibilities. In this method, access to resources is granted based on the user's assigned role within an organization. Each role has a set of permissions associated with it, and users are granted access based on their assigned role. This approach helps to ensure that users only have access to the resources that are necessary for their job functions, reducing the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 26. 

    You have a customer who wants to install WinXP professional on her computer. What is the minimum amount of RAM she must have for this to work?

    • 129 MB

    • 64 MB

    • 2 GB

    • 1 GB

    Correct Answer
    A. 64 MB
    Explanation
    To install Windows XP Professional, the minimum amount of RAM required is 64 MB. This is the smallest amount of memory needed for the operating system to function properly. However, it is important to note that this is the bare minimum requirement and having more RAM would lead to better performance and smoother operation of the computer.

    Rate this question:

  • 27. 

    Andrew has a personal computer. One morning, he starts his computer and finds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose Two

    • BIOS has become outdated

    • The CMOS battery has failed

    • The CMOS chip has failed

    • Software stored in the CMOS battery is infected by a virus

    Correct Answer(s)
    A. The CMOS battery has failed
    A. The CMOS chip has failed
    Explanation
    The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for providing power to the CMOS chip, which stores the computer's BIOS settings. If the battery fails, it can cause the CMOS chip to fail as well, resulting in the error message. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.

    Rate this question:

  • 28. 

    Which of the following statements about a riser card is true?

    • It is used to connect a computer in a network

    • It is used to connect extra microprocessors

    • It provides extra memory for expansion cards

    • It is used to extend to slots for expansion cards

    Correct Answer
    A. It is used to extend to slots for expansion cards
    Explanation
    A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them vertically, providing more space for installation. This is useful when there are limited slots available on the motherboard or when specific configurations require additional expansion capabilities.

    Rate this question:

  • 29. 

    Which of the following ports on ac omputer are used to connect a keyboard? Choose two

    • USB

    • DB-25

    • PS/2

    • DB-9

    Correct Answer(s)
    A. USB
    A. PS/2
    Explanation
    USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a common port found on most modern computers and is widely used for connecting various peripherals, including keyboards. PS/2 ports, on the other hand, are older ports specifically designed for connecting keyboards and mice. Although less common nowadays, some computers still have PS/2 ports for backward compatibility with older devices. DB-25 and DB-9 ports are not typically used for connecting keyboards.

    Rate this question:

  • 30. 

    Which of the following are types of LCD Monitors? Each correct answer represents a complete solution. Choose two that do this.

    • SVGA

    • Active Matrix

    • Passive Matrix

    • X-Matrix

    Correct Answer(s)
    A. Active Matrix
    A. Passive Matrix
    Explanation
    Active Matrix and Passive Matrix are both types of LCD Monitors. Active Matrix LCD monitors use a transistor for each pixel, allowing for faster response times and better image quality. Passive Matrix LCD monitors use a grid of electrodes to control the pixels, resulting in slower response times and lower image quality compared to Active Matrix. X-Matrix is not a type of LCD Monitor.

    Rate this question:

  • 31. 

    Which of the following transmits all HTSC HDTV standards and supports 8 channel digital audio?

    • DVI

    • S-Video

    • SVGA

    • HDMI

    Correct Answer
    A. HDMI
    Explanation
    HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only option that transmits all HTSC HDTV standards and supports 8 channel digital audio. DVI (Digital Visual Interface) supports high-quality video signals but does not support audio. S-Video (Separate Video) transmits analog video signals but does not support audio or HDTV standards. SVGA (Super Video Graphics Array) is a video display standard but does not support audio or HDTV standards. HDMI, on the other hand, supports both high-quality video and audio signals, making it the most suitable option for transmitting HTSC HDTV standards with 8 channel digital audio.

    Rate this question:

  • 32. 

    You are implementing wireless access at a defense contractor. You must use AES encryption algorithm. Which encryption should you use?

    • WEP

    • WPA

    • TKIP

    • WPA2

    Correct Answer
    A. WPA2
    Explanation
    WPA2 should be used for implementing wireless access at a defense contractor because it provides the highest level of security among the given options. WEP is outdated and easily cracked, while WPA and TKIP have known vulnerabilities. WPA2, on the other hand, uses the AES encryption algorithm, which is currently considered the most secure encryption method for wireless networks. Therefore, WPA2 is the best choice for ensuring the confidentiality and integrity of sensitive data transmitted over the wireless network.

    Rate this question:

  • 33. 

    Which of the following storage device uses SRAM or DRAM?

    • USB flash drive

    • Solid State drive (SSD)

    • Blu-ray Disc

    • CD drive

    Correct Answer
    A. Solid State drive (SSD)
    Explanation
    Solid State drives (SSD) use either SRAM (Static Random Access Memory) or DRAM (Dynamic Random Access Memory) as storage devices. SRAM and DRAM are types of volatile memory that can retain data as long as power is supplied to them. SSDs use these types of memory to store data and provide fast access to it. USB flash drives, Blu-ray Discs, and CD drives, on the other hand, do not use SRAM or DRAM as storage devices.

    Rate this question:

  • 34. 

    Which of the following defines power management for various types of computers and peripherals?

    • PCIe

    • HDMI

    • ACPI

    • PCI

    Correct Answer
    A. ACPI
    Explanation
    ACPI (Advanced Configuration and Power Interface) is a standard that defines power management for various types of computers and peripherals. It provides a framework for the operating system to control the power usage of hardware components, allowing for efficient power management and conservation. ACPI enables features such as system sleep states, dynamic frequency scaling, and device hot-plugging, making it an essential component in modern computer systems.

    Rate this question:

  • 35. 

    Which of the following devices allows television signals to be received by a computer?

    • SD Card

    • Video Capture card

    • ExpressCard

    • Smart card

    Correct Answer
    A. Video Capture card
    Explanation
    A Video Capture card is the correct answer because it is a device that allows television signals to be received by a computer. It is used to convert analog video signals from a television or other video source into digital format, which can then be processed and displayed on the computer. This allows users to watch and record television programs on their computers.

    Rate this question:

  • 36. 

    Which of the following precautions should be taken to minimize the risk of damage to add on-cards and motherboard? Choose three

    • Keep water and liquids away from them

    • Wear an anti-static wrist strap when handling them

    • Always clean them witha water spray gun

    • Keep them in antistatic bags

    Correct Answer(s)
    A. Keep water and liquids away from them
    A. Wear an anti-static wrist strap when handling them
    A. Keep them in antistatic bags
    Explanation
    To minimize the risk of damage to add-on cards and motherboard, three precautions should be taken. Firstly, it is important to keep water and liquids away from them as contact with moisture can cause short circuits and other damage. Secondly, wearing an anti-static wrist strap when handling them is necessary to prevent static electricity from damaging the sensitive components. Lastly, keeping them in anti-static bags helps to protect them from electrostatic discharge and other potential hazards.

    Rate this question:

  • 37. 

    You are handling IT supports for a sales company. One of the sales reps complains that his laptop does not have a network card. You wish to add via expansion slot. “What type of expansion card do you use?”

    • MCA

    • PCMCIA

    • PCI

    • AGP

    Correct Answer
    A. PCMCIA
    Explanation
    PCMCIA stands for Personal Computer Memory Card International Association. It is a type of expansion card that is commonly used to add additional functionality to laptops, such as network cards, modems, or wireless adapters. In this scenario, the sales rep's laptop does not have a network card, so the appropriate expansion card to use would be a PCMCIA card.

    Rate this question:

  • 38. 

    Which of following is a 1 terminal standard for energy efficient consumer products?

    • Energy Star rating

    • Standby mode

    • Trusted Computer System Evaluation Criteria (TCSEC)

    • Advanced Configuration and Power Interface

    Correct Answer
    A. Energy Star rating
    Explanation
    The Energy Star rating is a 1 terminal standard for energy efficient consumer products. This rating is given to products that meet specific energy efficiency guidelines set by the Environmental Protection Agency (EPA) and the Department of Energy (DOE) in the United States. Products with the Energy Star rating are designed to consume less energy and save money on utility bills while still providing high performance and quality. This rating helps consumers make informed decisions when purchasing appliances, electronics, and other products, encouraging the use of energy-efficient technologies and reducing greenhouse gas emissions.

    Rate this question:

  • 39. 

    You work as a Network Administrator for NetTec h Inc. The company has a wireless local area network (WLAN). You want to prevent your wireless access point from being accessed by intruders

    • Implement WEP

    • Implement EAP

    • Implement SSL

    • Implement auditing

    Correct Answer
    A. Implement WEP
    Explanation
    Implementing WEP (Wired Equivalent Privacy) is a suitable solution to prevent unauthorized access to the wireless access point. WEP is a security protocol that encrypts data transmitted over the WLAN, making it difficult for intruders to intercept and understand the information. By implementing WEP, the network administrator can ensure that only authorized users with the correct encryption key can access the network, enhancing the overall security of the WLAN.

    Rate this question:

  • 40. 

    Mark works as a Network Administrator for Net Tech Inc. The company has a Win2000 domain based network. A user working on a Win2000 Professional client computer reports that he is unable to access some files on the hard disk. However, he is able to successfully log on and access other files. What should Mark do to resolve the issue?

    • Check the hard disk drive using the SCANDISK utility

    • Enable the user account on the computer

    • Instruct the user to log off and log on again

    • Check the file permissions on the hard disk drive

    Correct Answer
    A. Check the file permissions on the hard disk drive
    Explanation
    Mark should check the file permissions on the hard disk drive to resolve the issue. This is because the user is able to log on and access some files, but not others. This suggests that the issue is related to the permissions set for those specific files. By checking the file permissions, Mark can ensure that the user has the necessary rights and privileges to access the files that are currently inaccessible.

    Rate this question:

  • 41. 

    Which of the following devices has its own BIOS?

    • Hard disk drive

    • Sound card

    • Network interface card

    • Video adapter

    Correct Answer
    A. Video adapter
    Explanation
    A video adapter, also known as a graphics card, has its own BIOS. The BIOS (Basic Input/Output System) is a firmware that is responsible for initializing the hardware components of a computer system. In the case of a video adapter, the BIOS is responsible for initializing and configuring the graphics card, allowing it to communicate with the computer's operating system and display output on the monitor. This BIOS contains specific settings and instructions for the video adapter, allowing it to function properly and provide the necessary graphics capabilities.

    Rate this question:

  • 42. 

    Which of the following can occur if the power cable runs along with the computer network cable?

    • EMI

    • ESD

    • Broadcast storm

    • Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, it can cause electromagnetic interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals in the network cable, resulting in data corruption or loss. This interference can disrupt the functioning of the network and lead to communication errors and performance issues. It is important to separate power cables from network cables to minimize the risk of EMI.

    Rate this question:

  • 43. 

    Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Choose all that apply

    • Mercury (Hg)

    • Lead (Pb)

    • Iron (Fe)

    • Cadmium (Cd)

    Correct Answer(s)
    A. Mercury (Hg)
    A. Lead (Pb)
    A. Cadmium (Cd)
    Explanation
    Mercury (Hg), Lead (Pb), and Cadmium (Cd) are all substances that are restricted under Restriction of Hazardous Substances (RoHS). This regulation restricts the use of certain hazardous substances in electrical and electronic equipment to protect human health and the environment. Iron (Fe) is not restricted under RoHS, so it is not included in the answer.

    Rate this question:

  • 44. 

    Which of the following maxium resolutions does the UXGA video technology supports?

    • 2560 x 1600

    • 1600 X 1200

    • 2048 X 1536

    • 1280 X 1024

    Correct Answer
    A. 1600 X 1200
    Explanation
    The correct answer is 1600 X 1200. UXGA video technology supports a maximum resolution of 1600 X 1200.

    Rate this question:

  • 45. 

    Mark has a computer with a CD-ROM drive. He is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel of the drive. What else can he do to open the tray?

    • Open the tray by holding it through pliers

    • Insert a pen into the eject hole on the drive

    • Push the Eject button for 2 minutes

    • Open the CD-ROM cover

    Correct Answer
    A. Insert a pen into the eject hole on the drive
    Explanation
    When the Eject button on the front panel of the CD-ROM drive is not working, inserting a pen into the eject hole on the drive is a common alternative method to manually open the tray. The eject hole is usually a small hole located near the Eject button and is designed for situations like this, allowing users to manually eject the tray by applying pressure with a small object like a pen.

    Rate this question:

  • 46. 

    What is the maximum resolution that the WUXGA video technology supports?

    • 2048 X 1536

    • 1920 X 1200

    • 3840 X 2400

    • 1600 X 1200

    Correct Answer
    A. 1920 X 1200
    Explanation
    WUXGA (Wide Ultra Extended Graphics Array) video technology supports a maximum resolution of 1920 X 1200. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. WUXGA provides a high-quality display with a widescreen aspect ratio, making it suitable for various applications such as multimedia, gaming, and professional use. The other resolution options mentioned in the question (2048 X 1536, 3840 X 2400, and 1600 X 1200) are not the maximum resolutions supported by WUXGA.

    Rate this question:

  • 47. 

    You are working with a team that will be bringing in new pcs to a Sales Dept at a company. The sales team would like to keep not only, their old files but systems settings. What should you do?

    • Do a system backup (complete) on each old machine, then restore it onto the new machines

    • Use the Disk Management tool to move everything to the new computer

    • Use the User State Migration tool to move the system settings and files to the new machine

    • Copy the file and the Windows Registry to a removeable media then copy it onto the new machine

    Correct Answer
    A. Use the User State Migration tool to move the system settings and files to the new machine
    Explanation
    The User State Migration tool is specifically designed for transferring system settings and files from one computer to another. It ensures that not only the files but also the system settings are preserved during the migration process. This tool is the most appropriate solution for the sales team's requirement of keeping their old files and system settings intact on the new machines.

    Rate this question:

  • 48. 

    You are responsible for the wireless network at your company. You have been asked to create SSID's for wireless routers. What are the limits on an SSID? Choose two.

    • It is not case sensitive

    • It must be 32 or fewer characters long

    • It can only contain letters, not numbers

    • It is case sensitive

    • It must be 64 or viewer characters long

    Correct Answer(s)
    A. It must be 32 or fewer characters long
    A. It is case sensitive
    Explanation
    The correct answer is that an SSID must be 32 or fewer characters long and it is case sensitive. This means that when creating SSIDs for wireless routers, they should not exceed 32 characters in length and the capitalization of letters should be taken into account. This information is important for ensuring the proper functioning and compatibility of the wireless network.

    Rate this question:

  • 49. 

    Youa re using infrared devices in your network. You want to improve the quality of connections and achieve better communication between infrared devices. What will you do to achieve this? Choose three.

    • Move the devices closer together

    • Keep the devices in line of sight

    • Remove any obstruction between the devices

    • Keep the devices in different geographic locations

    Correct Answer(s)
    A. Move the devices closer together
    A. Keep the devices in line of sight
    A. Remove any obstruction between the devices
    Explanation
    To improve the quality of connections and achieve better communication between infrared devices, three actions can be taken. First, moving the devices closer together will reduce the distance between them, resulting in a stronger and more reliable signal. Second, keeping the devices in line of sight ensures that there are no physical barriers blocking the infrared signals, allowing for uninterrupted communication. Lastly, removing any obstructions between the devices, such as objects or obstacles, will further enhance the signal strength and clarity. These three measures collectively contribute to optimizing the quality of connections and facilitating better communication between infrared devices.

    Rate this question:

Quiz Review Timeline (Updated): Jul 27, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 27, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    Ranger1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.