Strata Practice Exam 151-200

43 Questions

Settings
It Fundamentals Quizzes & Trivia

Questions 151-200


Questions and Answers
  • 1. 
    Which of the following is a case sensitive text string used in wireless network and having a maxiumum length of 32 characters?
    • A. 

      SSID

    • B. 

      WAP

    • C. 

      WTLS

    • D. 

      WEP

  • 2. 
    You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?
    • A. 

      SRAM

    • B. 

      LRAM

    • C. 

      VRAM

    • D. 

      DRAM

  • 3. 
    Which of the following statements about the compression feature of the NTFS file system are true? Choose two.
    • A. 

      Compressed file on an NTFS volume can be read and written by any Windows-based application after they are decompressed

    • B. 

      User can work with NTFS-compressed file without decompressing them

    • C. 

      It supports compression only on volumes

    • D. 

      It supports compression on volumes, folders, and files.

  • 4. 
    Which of the following term is used for software designed and optimized for controlling what content is pertmitted to a reader, especially when it is used to restrict material delivered over the Web?
    • A. 

      Content-control software

    • B. 

      Activex control

    • C. 

      Malware

    • D. 

      Spyware

  • 5. 
    How many pins are used in HDMI Type A and Type B connectors?
    • A. 

      20 pins and 29 pins

    • B. 

      18 pins and 28 pins

    • C. 

      24 pins and 28 pins

    • D. 

      19 pins and 29 pins

  • 6. 
    Which of the following ports does not support hot pluggings?
    • A. 

      USB 2.0

    • B. 

      Serial port (RS-232)

    • C. 

      FireWire 800

    • D. 

      FireWire 400

  • 7. 
    Which of the following refers to the process of verifying the identity of a person, network host, or system process?
    • A. 

      Auditing

    • B. 

      Authentication

    • C. 

      Hacking

    • D. 

      Packet filtering

  • 8. 
    Which of the following techniques are used to secure wireless networks? Choose three
    • A. 

      MAC address filtering

    • B. 

      IP spoofing

    • C. 

      Closed network

    • D. 

      SSID spoofing

  • 9. 
    You work as a Network Administrator for Infonet Inc. The companys office has a wireless netowork. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
    • A. 

      I/0 address

    • B. 

      Demilitarized zone

    • C. 

      Service Set Identifier

    • D. 

      Internet service providers DNS server address

  • 10. 
    Which of the following types of display takes the lease space on a desk?
    • A. 

      Mercury

    • B. 

      LED

    • C. 

      CRT

    • D. 

      LCD

  • 11. 
    What is the maximum cable length that FireWire 800 supports?
    • A. 

      2 meters

    • B. 

      2.5 meters

    • C. 

      4.5 meters

    • D. 

      8 meters

  • 12. 
    Which of the following statements about the XCPOPY command is true?
    • A. 

      XCOPY /s copies system files only

    • B. 

      XCOPY delectes all files and sub

    • C. 

      XCOPY copies archived files only

    • D. 

      XCOPY /s copies files and subdirectories

  • 13. 
    Which of the following is the default resolution for a VGA monitor?
    • A. 

      800x600-pixels

    • B. 

      1024x768-pixels

    • C. 

      320x200-pixels

    • D. 

      640x480-pixels

  • 14. 
    Which of the following devices is used to provide visual input that can be easily transferred over the internet?
    • A. 

      Solid-state drive

    • B. 

      Webcam

    • C. 

      Iomega Zip drive

    • D. 

      Trackball

  • 15. 
    Which of the following protocols are used by Network Attached Storage (NAS)?
    • A. 

      Server Message Block (SMB)

    • B. 

      Network File System (NFS)

    • C. 

      Distributed file system (Dfs)

    • D. 

      Apple Filing Protocol (AFP)

  • 16. 
    Which of the following interfaces provides the fastest data transfer rate for printing a document on a printer?
    • A. 

      FireWire 800

    • B. 

      IEEE 802.11b

    • C. 

      IEEE 802.11a

    • D. 

      USB 2.0

  • 17. 
    What is the thickness of Type II PCMCIA Card?
    • A. 

      5.5mm card

    • B. 

      3.3mm card

    • C. 

      10.5mm card

    • D. 

      6.5mm card

  • 18. 
    Which of the following devices also works as a video capture card?
    • A. 

      Web Camera

    • B. 

      Image Scanner

    • C. 

      SD card

    • D. 

      TV tuner card

  • 19. 
    Which of the following can be used to maintain data related to the user during navigation, possibly across multiple visits?
    • A. 

      Web caching

    • B. 

      CPU cache

    • C. 

      Cookie

    • D. 

      Access control list

  • 20. 
    Which of the following protocols allows an e-mail client to access e-mails that are stored ona  remote mail server?
    • A. 

      PPPoE

    • B. 

      IMAP

    • C. 

      SMTP

    • D. 

      ICMP

  • 21. 
    You work as a Network Administrator for Infonet Inc. The company used Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?
    • A. 

      Only users within the company

    • B. 

      Only users with the correct WEP key

    • C. 

      Anyone can authenticate

    • D. 

      Only the administrator

  • 22. 
    Which of the following PCMCIA card supports hard disk drives?
    • A. 

      Type VI

    • B. 

      Type I

    • C. 

      Type II

    • D. 

      TYPE III

  • 23. 
    Which of the following statements about a serial port are true? Choose all that apply
    • A. 

      It is used to connet a printer and a scanner to a computer

    • B. 

      It sends data one bit at atime, over a single wire

    • C. 

      It has 9-pin and 25-pin connectors on personal computers

    • D. 

      It sends data eight bits at a time, over a single wire

  • 24. 
    Which of the following statements about CPU throtting are true? Choose two
    • A. 

      Is is a process of cutting down the CPU processing time for an application, which is malfunctioning

    • B. 

      It is the process of running a computer component, such as CPU, at a higher clock rate than specified by th component manuuer

    • C. 

      It prevents applications using more than a certain percentage of CPU time in a certain time frame

    • D. 

      It is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content

  • 25. 
    Which of the following is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers?
    • A. 

      SMTP

    • B. 

      IMAP

    • C. 

      SNMP

    • D. 

      PPTP

  • 26. 
    Which of the following terms describes software technologies that improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating ststem on which they are executed?
    • A. 

      Encapsulation

    • B. 

      Application virtualization

    • C. 

      Failover

    • D. 

      System hardening

  • 27. 
    Which of the following statements about hibernate mode are true? Choose two.
    • A. 

      When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode.

    • B. 

      Users have to enter hibernate mode manually on the computers that are not ACPI-enables or APM-enabled

    • C. 

      Computers that are not ACPI-enabled or APM-enabled automatically enter hibernate mode

    • D. 

      When a computer resumes from hibernate mode, it reads the saved settings from the computer's RAM and restores the system state as it was before it entered hibernate mode

  • 28. 
    Which of the following energy saving standards is used to control only monitors and video cards?
    • A. 

      ACPI

    • B. 

      APM

    • C. 

      ASPI

    • D. 

      DPMS

  • 29. 
    Which of the following indicates the subjects that can use them?
    • A. 

      Access control list

    • B. 

      Audit policy

    • C. 

      Intrusion detection system

    • D. 

      Single sign-on

  • 30. 
    Which of the following relies on a physical characteristic of the user to verify his identity?
    • A. 

      Biometrics

    • B. 

      Social Engineering

    • C. 

      CHAP

    • D. 

      Kerberos v5

  • 31. 
    How many IEEE 1394 devices can be connected to a single IEEE 1394 port through daisy chaining?
    • A. 

      53

    • B. 

      63

    • C. 

      127

    • D. 

      110

  • 32. 
    How many devices, excluding the SCSI adapter, does a Fast-Wide SCSI-2 bus support?
    • A. 

      4

    • B. 

      7

    • C. 

      15

    • D. 

      127

  • 33. 
    A customer has come to you wanting upgrade the video card in his laptop. What would you recommend?
    • A. 

      A PCMCIA card

    • B. 

      A PCI Express card

    • C. 

      Upgrade is not possible

    • D. 

      An AGP Card

  • 34. 
    Which of the following protocols has recently been succeeded by Transport Layer Security (TLS) protocol?
    • A. 

      SNMP

    • B. 

      IPX/SPX

    • C. 

      HTTP

    • D. 

      SSL

  • 35. 
    Which of the following statements about SRAM and true? Choose three.
    • A. 

      SRAM is made of capacitors

    • B. 

      SRAM is more expensive than DRAM

    • C. 

      SRAM is made of a special circuit called a flip-flop

    • D. 

      SRAM is used for caching

  • 36. 
    Your computer has an internal SCSI hard disk drive and an external SCSI CD drive connected to a SCSI controller. Where will you place the terminators?
    • A. 

      Place one terminator on the SCSI controller and one on the external CD drive

    • B. 

      Place one terminator at the end of each drive

    • C. 

      Place one terminator on the SCSI controller

    • D. 

      Place one terminator on the SCSI controller and one on the internal hard disk drive

    • E. 

      Place one terminator on the itnernal hard disk drive

  • 37. 
    Which of the following options will you use to minimize ESD problems?
    • A. 

      Wearing synthetic clothes in the computer lab

    • B. 

      A wrist strap

    • C. 

      A plastic CPU cover

    • D. 

      An artiglare screen

  • 38. 
    Your customer complains that some of his older WinXP programs, particularly some games, won;t work in Windows Vista. What should you recommend?
    • A. 

      That he buy Vista versions of those programs

    • B. 

      That he dual boot XP and Vista in order to handle old and new programs

    • C. 

      That he use the Windows Vista Compatibility Mode

    • D. 

      Unfortunately he won't be able to use those programs

  • 39. 
    Your customer is using WinXP Service pack 1 with wireless zero configuration. Which is the most modern encryption supported with wireless zero configuration?
    • A. 

      WPA

    • B. 

      WEP2

    • C. 

      PKI

    • D. 

      WEP

  • 40. 
    Which of the following is a curcuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer?
    • A. 

      Communication and Networking Riser (CNR)

    • B. 

      Audio/modem riser

    • C. 

      Riser Card

    • D. 

      Secure Digital (SD) card

  • 41. 
    Which of the following is used by Wi-Fi Protected Access (WPA) to provide data encryption?
    • A. 

      RSA

    • B. 

      TKIP

    • C. 

      RC4

    • D. 

      IDEA

  • 42. 
    Which is the maximum resolution that the XGA video technology supports?
    • A. 

      2560 x 1600

    • B. 

      1024 x 768

    • C. 

      2048 x 1536

    • D. 

      800 x 600

  • 43. 
    Which of the following modes saves maximum battery power while maintaining the current state of a computing session?
    • A. 

      Hibernate mode

    • B. 

      Standby mode

    • C. 

      Session mode

    • D. 

      Safe mode