Strata Practice Exam 151-200

43 Questions | Total Attempts: 103

SettingsSettingsSettings
IT Fundamentals Quizzes & Trivia

Questions 151-200


Questions and Answers
  • 1. 
    Which of the following is a case sensitive text string used in wireless network and having a maxiumum length of 32 characters?
    • A. 

      SSID

    • B. 

      WAP

    • C. 

      WTLS

    • D. 

      WEP

  • 2. 
    You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?
    • A. 

      SRAM

    • B. 

      LRAM

    • C. 

      VRAM

    • D. 

      DRAM

  • 3. 
    Which of the following statements about the compression feature of the NTFS file system are true? Choose two.
    • A. 

      Compressed file on an NTFS volume can be read and written by any Windows-based application after they are decompressed

    • B. 

      User can work with NTFS-compressed file without decompressing them

    • C. 

      It supports compression only on volumes

    • D. 

      It supports compression on volumes, folders, and files.

  • 4. 
    Which of the following term is used for software designed and optimized for controlling what content is pertmitted to a reader, especially when it is used to restrict material delivered over the Web?
    • A. 

      Content-control software

    • B. 

      Activex control

    • C. 

      Malware

    • D. 

      Spyware

  • 5. 
    How many pins are used in HDMI Type A and Type B connectors?
    • A. 

      20 pins and 29 pins

    • B. 

      18 pins and 28 pins

    • C. 

      24 pins and 28 pins

    • D. 

      19 pins and 29 pins

  • 6. 
    Which of the following ports does not support hot pluggings?
    • A. 

      USB 2.0

    • B. 

      Serial port (RS-232)

    • C. 

      FireWire 800

    • D. 

      FireWire 400

  • 7. 
    Which of the following refers to the process of verifying the identity of a person, network host, or system process?
    • A. 

      Auditing

    • B. 

      Authentication

    • C. 

      Hacking

    • D. 

      Packet filtering

  • 8. 
    Which of the following techniques are used to secure wireless networks? Choose three
    • A. 

      MAC address filtering

    • B. 

      IP spoofing

    • C. 

      Closed network

    • D. 

      SSID spoofing

  • 9. 
    You work as a Network Administrator for Infonet Inc. The companys office has a wireless netowork. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
    • A. 

      I/0 address

    • B. 

      Demilitarized zone

    • C. 

      Service Set Identifier

    • D. 

      Internet service providers DNS server address

  • 10. 
    Which of the following types of display takes the lease space on a desk?
    • A. 

      Mercury

    • B. 

      LED

    • C. 

      CRT

    • D. 

      LCD

  • 11. 
    What is the maximum cable length that FireWire 800 supports?
    • A. 

      2 meters

    • B. 

      2.5 meters

    • C. 

      4.5 meters

    • D. 

      8 meters

  • 12. 
    Which of the following statements about the XCPOPY command is true?
    • A. 

      XCOPY /s copies system files only

    • B. 

      XCOPY delectes all files and sub

    • C. 

      XCOPY copies archived files only

    • D. 

      XCOPY /s copies files and subdirectories

  • 13. 
    Which of the following is the default resolution for a VGA monitor?
    • A. 

      800x600-pixels

    • B. 

      1024x768-pixels

    • C. 

      320x200-pixels

    • D. 

      640x480-pixels

  • 14. 
    Which of the following devices is used to provide visual input that can be easily transferred over the internet?
    • A. 

      Solid-state drive

    • B. 

      Webcam

    • C. 

      Iomega Zip drive

    • D. 

      Trackball

  • 15. 
    Which of the following protocols are used by Network Attached Storage (NAS)?
    • A. 

      Server Message Block (SMB)

    • B. 

      Network File System (NFS)

    • C. 

      Distributed file system (Dfs)

    • D. 

      Apple Filing Protocol (AFP)

  • 16. 
    Which of the following interfaces provides the fastest data transfer rate for printing a document on a printer?
    • A. 

      FireWire 800

    • B. 

      IEEE 802.11b

    • C. 

      IEEE 802.11a

    • D. 

      USB 2.0

  • 17. 
    What is the thickness of Type II PCMCIA Card?
    • A. 

      5.5mm card

    • B. 

      3.3mm card

    • C. 

      10.5mm card

    • D. 

      6.5mm card

  • 18. 
    Which of the following devices also works as a video capture card?
    • A. 

      Web Camera

    • B. 

      Image Scanner

    • C. 

      SD card

    • D. 

      TV tuner card

  • 19. 
    Which of the following can be used to maintain data related to the user during navigation, possibly across multiple visits?
    • A. 

      Web caching

    • B. 

      CPU cache

    • C. 

      Cookie

    • D. 

      Access control list

  • 20. 
    Which of the following protocols allows an e-mail client to access e-mails that are stored ona  remote mail server?
    • A. 

      PPPoE

    • B. 

      IMAP

    • C. 

      SMTP

    • D. 

      ICMP

  • 21. 
    You work as a Network Administrator for Infonet Inc. The company used Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?
    • A. 

      Only users within the company

    • B. 

      Only users with the correct WEP key

    • C. 

      Anyone can authenticate

    • D. 

      Only the administrator

  • 22. 
    Which of the following PCMCIA card supports hard disk drives?
    • A. 

      Type VI

    • B. 

      Type I

    • C. 

      Type II

    • D. 

      TYPE III

  • 23. 
    Which of the following statements about a serial port are true? Choose all that apply
    • A. 

      It is used to connet a printer and a scanner to a computer

    • B. 

      It sends data one bit at atime, over a single wire

    • C. 

      It has 9-pin and 25-pin connectors on personal computers

    • D. 

      It sends data eight bits at a time, over a single wire

  • 24. 
    Which of the following statements about CPU throtting are true? Choose two
    • A. 

      Is is a process of cutting down the CPU processing time for an application, which is malfunctioning

    • B. 

      It is the process of running a computer component, such as CPU, at a higher clock rate than specified by th component manuuer

    • C. 

      It prevents applications using more than a certain percentage of CPU time in a certain time frame

    • D. 

      It is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content

  • 25. 
    Which of the following is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers?
    • A. 

      SMTP

    • B. 

      IMAP

    • C. 

      SNMP

    • D. 

      PPTP

Back to Top Back to top