STRATA Practice Exam 1-25 50-150 assesses knowledge in computer hardware, video technology, system commands, and security features. It enhances skills in troubleshooting, system management, and security protocol handling.
2560 x 1600
1600 X 1200
2048 X 1536
1280 X 1024
Rate this question:
S1
S2
S0
S3
Rate this question:
/p
/s
/r
/o
Rate this question:
It is used to securely store public and private keys for long on, email signing and encryption, and file encryption.
It is a device that works as an interface between a computer and a network
It is a device that routes data packets between computers in different network
It is a device that contains a microprocessor and permanent memory
Rate this question:
6-pin Mini-DIN connector
5-pin DIN connector
4-pin Mini-DIN connector
USB Connector
Rate this question:
USB supports hot plugging
You can connect up to 127 peripheral devices to a single USB port
You can connect up to 16 peripheral devices to a single USB port
USB does not support Plug n Play installation
Rate this question:
Man-in-the-middle attack
Denial-of0Service (DoS) attack
Buffer-overflow attack
Shoulder surfing attack
Rate this question:
His operating system is incompatible
A firewall is blocking him
His laptop is incompatible
MAC filtering is blocking him
Rate this question:
Session Initiation protocol
Streaming Media
HTTP streaming
Slipstreaming
Rate this question:
Bandwidth
Preboot Execution Environment (PXE)
Branding
Spam
Rate this question:
EPP
USB
FireWire
IEEE 1284
Rate this question:
Hard disk drive
Sound card
Network interface card
Video adapter
Rate this question:
AMD Athlon(tm) 64 X2
Intel Pentium 4
Intel(r) Pentium(r) processor Extreme Edition
AMD Athlon (tm)
Rate this question:
/q
/o
/s
/e
Rate this question:
PAP
WAN
WAP
WTLS
Rate this question:
Bluetooth
802.11
802.11b
Infrared
Rate this question:
2048 X 1536
1920 X 1200
3840 X 2400
1600 X 1200
Rate this question:
Data integrity
Encryption
Bandwidth
Authentication
Rate this question:
Trojan Horse
Honeypot
Spyware
Adware
Rate this question:
ICMP
DHCP
TCP
NNTP
Rate this question:
Solar panel
AC power
Battery
Docking Station
Rate this question:
Educate users of the client computers about the problems arising due to malware
Educate users of the client computers to avoid malware
Prevent users of the client computers from executing any programs
Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.
Rate this question:
129 MB
64 MB
2 GB
1 GB
Rate this question:
RamBus
Non Parity RAM
ECC RAM
Logic Parity RAM
Rate this question:
54 Mbps
600 Mbps
600 Gbps
11 Mbps
Rate this question:
Conent filter control
Bandwidth control
Usage management tool
Monitoring control
Rate this question:
BIOS has become outdated
The CMOS battery has failed
The CMOS chip has failed
Software stored in the CMOS battery is infected by a virus
Rate this question:
Easy configuration of hardware devices
Expansion
Security
Speed
Rate this question:
S3
S2
S4
S1
Rate this question:
EMI
ESD
Broadcast storm
Surge
Rate this question:
An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee
An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two host.
An unauthorized person calls a user and pretends to be a system administrator in orber to get the user's password
An unauthorized person modifies packet headers by using someone else's IP address to his identity.
Rate this question:
Simply put the Windows Recovery CD in and the recovery process will start
Reinstall Windows
Use the Windows Recovery Console witht he Windoes Recovery CD to put the system back in a working state
Simply uninstall any new software
Rate this question:
Spyware
Shareware
Freeware
Adware
Rate this question:
FireWire 800
ESATA
USB 1.1
USB 2.0
Rate this question:
Unicast
Multicast
Loopback
Anycast
Rate this question:
Video card
RAM
Microprocessor
Modem card
Rate this question:
15 volts
5 volts
50 volts
3 volts
Rate this question:
Plug-in
Virtual machine
Hotfix
JavaScript
Rate this question:
It uses a Key Distribution Center (KDC)
It protects a computer from malicious software such as worms
It involves two or more methods as part of the authentication process
It is a process in which a client process and a server are required to prove their indentities to each other before performing any application function.
Rate this question:
IEEE 1394 is faster than USB 2.0
IEEE 1394 supports hot swapping
IEEE 1394 is slower than USB 2.0
USB 2.0 supports Plug and Play feature.
Webcam
Image scanner
Packet analyzer
BD-ROM Drive
Rate this question:
Mercury (Hg)
Lead (Pb)
Iron (Fe)
Cadmium (Cd)
Rate this question:
It is used to connect a computer in a network
It is used to connect extra microprocessors
It provides extra memory for expansion cards
It is used to extend to slots for expansion cards
Rate this question:
E-book reader
Memory card reader
Smart card reader
Barcode reader
Rate this question:
Biometrics
Encryption
Password
Token
Rate this question:
SMPS
Floppy drive
Monitor
Keyboard
Rate this question:
USB
DB-25
PS/2
DB-9
Rate this question:
Quiz Review Timeline (Updated): Jul 27, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.