Strata Practice Exam 151-200

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ranger1
R
Ranger1
Community Contributor
Quizzes Created: 3 | Total Attempts: 687
Questions: 43 | Attempts: 137

SettingsSettingsSettings
IT Fundamentals Quizzes & Trivia

Questions 151-200


Questions and Answers
  • 1. 

    Which of the following is a case sensitive text string used in wireless network and having a maxiumum length of 32 characters?

    • A.

      SSID

    • B.

      WAP

    • C.

      WTLS

    • D.

      WEP

    Correct Answer
    A. SSID
    Explanation
    SSID stands for Service Set Identifier. It is a case sensitive text string used in wireless networks to identify a specific network. It is used by devices to connect to the correct network. The maximum length of an SSID is 32 characters.

    Rate this question:

  • 2. 

    You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?

    • A.

      SRAM

    • B.

      LRAM

    • C.

      VRAM

    • D.

      DRAM

    Correct Answer
    C. VRAM
    Explanation
    VRAM, which stands for Video Random Access Memory, is a type of memory specifically used in video. It is a dedicated memory used by the graphics card to store and quickly access video data such as textures, frame buffers, and other graphical information. Unlike system memory (DRAM), VRAM is optimized for high-speed data transfer and is crucial for smooth video playback and rendering in games and other graphic-intensive applications.

    Rate this question:

  • 3. 

    Which of the following statements about the compression feature of the NTFS file system are true? Choose two.

    • A.

      Compressed file on an NTFS volume can be read and written by any Windows-based application after they are decompressed

    • B.

      User can work with NTFS-compressed file without decompressing them

    • C.

      It supports compression only on volumes

    • D.

      It supports compression on volumes, folders, and files.

    Correct Answer
    B. User can work with NTFS-compressed file without decompressing them
    Explanation
    The correct answer is that a user can work with NTFS-compressed files without decompressing them. This means that the user can access and modify the files directly without the need to decompress them first. This feature of the NTFS file system allows for efficient storage of files while still allowing easy access and manipulation by users. Additionally, it is worth noting that the other statements provided in the question are not true.

    Rate this question:

  • 4. 

    Which of the following term is used for software designed and optimized for controlling what content is pertmitted to a reader, especially when it is used to restrict material delivered over the Web?

    • A.

      Content-control software

    • B.

      Activex control

    • C.

      Malware

    • D.

      Spyware

    Correct Answer
    A. Content-control software
    Explanation
    Content-control software is the correct answer because it refers to software that is specifically designed and optimized for controlling what content is permitted to a reader, particularly when it is used to restrict material delivered over the internet. This type of software allows users to filter and block certain websites, keywords, or types of content to ensure a safe and controlled browsing experience.

    Rate this question:

  • 5. 

    How many pins are used in HDMI Type A and Type B connectors?

    • A.

      20 pins and 29 pins

    • B.

      18 pins and 28 pins

    • C.

      24 pins and 28 pins

    • D.

      19 pins and 29 pins

    Correct Answer
    D. 19 pins and 29 pins
    Explanation
    The correct answer is 19 pins and 29 pins. HDMI Type A connectors have 19 pins, while HDMI Type B connectors have 29 pins.

    Rate this question:

  • 6. 

    Which of the following ports does not support hot pluggings?

    • A.

      USB 2.0

    • B.

      Serial port (RS-232)

    • C.

      FireWire 800

    • D.

      FireWire 400

    Correct Answer
    B. Serial port (RS-232)
    Explanation
    The correct answer is Serial port (RS-232). Unlike USB 2.0 and FireWire ports, which support hot plugging, the Serial port (RS-232) does not. Hot plugging refers to the ability to connect and disconnect devices while the computer is running, without the need to restart or shut down the system. The Serial port (RS-232) requires the computer to be turned off before connecting or disconnecting devices, making it incompatible with hot plugging.

    Rate this question:

  • 7. 

    Which of the following refers to the process of verifying the identity of a person, network host, or system process?

    • A.

      Auditing

    • B.

      Authentication

    • C.

      Hacking

    • D.

      Packet filtering

    Correct Answer
    B. Authentication
    Explanation
    Authentication refers to the process of verifying the identity of a person, network host, or system process. It involves confirming that the entity trying to access a system or network is who they claim to be. This can be done through various methods such as passwords, biometrics, tokens, or certificates. Authentication is crucial for ensuring the security and integrity of a system or network by preventing unauthorized access and protecting sensitive information.

    Rate this question:

  • 8. 

    Which of the following techniques are used to secure wireless networks? Choose three

    • A.

      MAC address filtering

    • B.

      IP spoofing

    • C.

      Closed network

    • D.

      SSID spoofing

    Correct Answer(s)
    A. MAC address filtering
    C. Closed network
    D. SSID spoofing
    Explanation
    MAC address filtering is a technique used to secure wireless networks by allowing only specific devices with pre-approved MAC addresses to connect to the network. A closed network is another technique that enhances security by hiding the network's existence, making it invisible to unauthorized users. SSID spoofing is a method used by attackers to mimic a legitimate network's SSID, tricking users into connecting to the attacker's network and potentially compromising their data. IP spoofing, on the other hand, is not a technique used to secure wireless networks but rather a method used to deceive or impersonate another IP address.

    Rate this question:

  • 9. 

    You work as a Network Administrator for Infonet Inc. The companys office has a wireless netowork. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?

    • A.

      I/0 address

    • B.

      Demilitarized zone

    • C.

      Service Set Identifier

    • D.

      Internet service providers DNS server address

    Correct Answer
    C. Service Set Identifier
    Explanation
    To connect the laptop to the wireless network, you will need to configure the Service Set Identifier (SSID) on the laptop. The SSID is a unique name that identifies a wireless network. By configuring the correct SSID on the laptop, it will be able to identify and connect to the specific wireless network provided by the wireless access point.

    Rate this question:

  • 10. 

    Which of the following types of display takes the lease space on a desk?

    • A.

      Mercury

    • B.

      LED

    • C.

      CRT

    • D.

      LCD

    Correct Answer
    D. LCD
    Explanation
    LCD (Liquid Crystal Display) takes the least space on a desk compared to the other types of displays mentioned. LCD screens are thin and compact, making them ideal for saving space on a desk. On the other hand, CRT (Cathode Ray Tube) displays are bulky and take up a significant amount of space. LED (Light Emitting Diode) displays are also relatively slim, but LCD screens are known for their sleek design and minimalistic footprint. Therefore, LCD is the correct answer as it occupies the least amount of desk space.

    Rate this question:

  • 11. 

    What is the maximum cable length that FireWire 800 supports?

    • A.

      2 meters

    • B.

      2.5 meters

    • C.

      4.5 meters

    • D.

      8 meters

    Correct Answer
    C. 4.5 meters
    Explanation
    FireWire 800 supports a maximum cable length of 4.5 meters. This means that the cable connecting FireWire devices should not exceed this length in order to ensure proper functioning and data transfer. Going beyond this length may result in signal degradation and loss of data integrity. Therefore, it is important to adhere to the specified cable length to maintain optimal performance.

    Rate this question:

  • 12. 

    Which of the following statements about the XCPOPY command is true?

    • A.

      XCOPY /s copies system files only

    • B.

      XCOPY delectes all files and sub

    • C.

      XCOPY copies archived files only

    • D.

      XCOPY /s copies files and subdirectories

    Correct Answer
    D. XCOPY /s copies files and subdirectories
    Explanation
    The correct answer is that the XCOPY /s command copies both files and subdirectories. This means that when using the XCOPY command with the /s option, it will copy not only the specified files but also any subdirectories within the source directory.

    Rate this question:

  • 13. 

    Which of the following is the default resolution for a VGA monitor?

    • A.

      800x600-pixels

    • B.

      1024x768-pixels

    • C.

      320x200-pixels

    • D.

      640x480-pixels

    Correct Answer
    D. 640x480-pixels
    Explanation
    The default resolution for a VGA monitor is 640x480-pixels. VGA stands for Video Graphics Array, and it is an analog video standard commonly used for computer displays. The resolution refers to the number of pixels in the display, with 640x480 meaning there are 640 pixels horizontally and 480 pixels vertically. This resolution was widely used in older computer systems and is still supported by many VGA monitors today.

    Rate this question:

  • 14. 

    Which of the following devices is used to provide visual input that can be easily transferred over the internet?

    • A.

      Solid-state drive

    • B.

      Webcam

    • C.

      Iomega Zip drive

    • D.

      Trackball

    Correct Answer
    B. Webcam
    Explanation
    A webcam is a device that is used to provide visual input that can be easily transferred over the internet. It is a camera that captures video and sends it to a computer or network, allowing users to have real-time video communication or to record videos that can be shared online. Unlike solid-state drives, Iomega Zip drives, or trackballs, webcams are specifically designed for capturing and transmitting visual content over the internet, making them the correct answer for this question.

    Rate this question:

  • 15. 

    Which of the following protocols are used by Network Attached Storage (NAS)?

    • A.

      Server Message Block (SMB)

    • B.

      Network File System (NFS)

    • C.

      Distributed file system (Dfs)

    • D.

      Apple Filing Protocol (AFP)

    Correct Answer(s)
    A. Server Message Block (SMB)
    B. Network File System (NFS)
    D. Apple Filing Protocol (AFP)
    Explanation
    Network Attached Storage (NAS) is a file-level storage architecture that allows multiple users and client devices to access data over a computer network. The protocols used by NAS include Server Message Block (SMB), Network File System (NFS), and Apple Filing Protocol (AFP). SMB is a protocol used by Windows-based systems, NFS is commonly used in UNIX and Linux environments, and AFP is used by Apple devices. These protocols enable seamless file sharing and access to data stored on the NAS device from different operating systems and client devices.

    Rate this question:

  • 16. 

    Which of the following interfaces provides the fastest data transfer rate for printing a document on a printer?

    • A.

      FireWire 800

    • B.

      IEEE 802.11b

    • C.

      IEEE 802.11a

    • D.

      USB 2.0

    Correct Answer
    A. FireWire 800
    Explanation
    FireWire 800 provides the fastest data transfer rate for printing a document on a printer. FireWire 800, also known as IEEE 1394b, is a high-speed interface that can transfer data at a rate of up to 800 Mbps. This makes it ideal for tasks that require fast data transfer, such as printing large documents or high-resolution images. IEEE 802.11b and IEEE 802.11a are wireless networking standards, which may not offer the same level of speed as FireWire 800. USB 2.0 is a popular interface but has a lower data transfer rate compared to FireWire 800.

    Rate this question:

  • 17. 

    What is the thickness of Type II PCMCIA Card?

    • A.

      5.5mm card

    • B.

      3.3mm card

    • C.

      10.5mm card

    • D.

      6.5mm card

    Correct Answer
    A. 5.5mm card
    Explanation
    The thickness of a Type II PCMCIA card is 5.5mm.

    Rate this question:

  • 18. 

    Which of the following devices also works as a video capture card?

    • A.

      Web Camera

    • B.

      Image Scanner

    • C.

      SD card

    • D.

      TV tuner card

    Correct Answer
    D. TV tuner card
    Explanation
    A TV tuner card is a device that allows a computer to receive television signals and display them on the computer screen. In addition to receiving TV signals, a TV tuner card also has the capability to capture video content from sources such as cable or satellite boxes, VCRs, or camcorders. This makes it possible to record live TV shows or transfer video footage to the computer for editing or storage. Therefore, a TV tuner card also functions as a video capture card.

    Rate this question:

  • 19. 

    Which of the following can be used to maintain data related to the user during navigation, possibly across multiple visits?

    • A.

      Web caching

    • B.

      CPU cache

    • C.

      Cookie

    • D.

      Access control list

    Correct Answer
    C. Cookie
    Explanation
    Cookies can be used to maintain data related to the user during navigation, possibly across multiple visits. Cookies are small text files that are stored on the user's device by the web browser. They can store information such as user preferences, login credentials, and shopping cart contents. When the user visits a website again, the browser sends the stored cookies back to the server, allowing the website to retrieve the stored data and provide a personalized experience.

    Rate this question:

  • 20. 

    Which of the following protocols allows an e-mail client to access e-mails that are stored ona  remote mail server?

    • A.

      PPPoE

    • B.

      IMAP

    • C.

      SMTP

    • D.

      ICMP

    Correct Answer
    B. IMAP
    Explanation
    IMAP (Internet Message Access Protocol) is the correct answer because it is a protocol that allows an email client to access and manage emails that are stored on a remote mail server. It enables users to view, organize, and manipulate their email messages on the server, without needing to download them to their local device. This allows for convenient remote access to emails from multiple devices, as well as the ability to synchronize changes made on different devices. The other options listed, PPPoE, SMTP, and ICMP, are not specifically designed for accessing and managing emails on remote servers.

    Rate this question:

  • 21. 

    You work as a Network Administrator for Infonet Inc. The company used Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

    • A.

      Only users within the company

    • B.

      Only users with the correct WEP key

    • C.

      Anyone can authenticate

    • D.

      Only the administrator

    Correct Answer
    B. Only users with the correct WEP key
    Explanation
    Only users with the correct WEP key can authenticate from the access point of the network. Wired Equivalent Privacy (WEP) is a security protocol that provides encryption for wireless networks. It requires users to have the correct WEP key in order to authenticate and access the network. This means that only authorized users who possess the correct WEP key can connect to the network and authenticate themselves.

    Rate this question:

  • 22. 

    Which of the following PCMCIA card supports hard disk drives?

    • A.

      Type VI

    • B.

      Type I

    • C.

      Type II

    • D.

      TYPE III

    Correct Answer
    D. TYPE III
    Explanation
    TYPE III PCMCIA cards support hard disk drives. Type III cards are the thickest and provide the most space for components, making them suitable for larger devices such as hard disk drives. Type I and Type II cards are thinner and are typically used for smaller devices like modems and network cards. Type VI is not a valid PCMCIA card type.

    Rate this question:

  • 23. 

    Which of the following statements about a serial port are true? Choose all that apply

    • A.

      It is used to connet a printer and a scanner to a computer

    • B.

      It sends data one bit at atime, over a single wire

    • C.

      It has 9-pin and 25-pin connectors on personal computers

    • D.

      It sends data eight bits at a time, over a single wire

    Correct Answer(s)
    B. It sends data one bit at atime, over a single wire
    C. It has 9-pin and 25-pin connectors on personal computers
    Explanation
    A serial port is a hardware interface that allows devices such as printers and scanners to be connected to a computer. It sends data one bit at a time, over a single wire. Personal computers typically have serial ports with either 9-pin or 25-pin connectors.

    Rate this question:

  • 24. 

    Which of the following statements about CPU throtting are true? Choose two

    • A.

      Is is a process of cutting down the CPU processing time for an application, which is malfunctioning

    • B.

      It is the process of running a computer component, such as CPU, at a higher clock rate than specified by th component manuuer

    • C.

      It prevents applications using more than a certain percentage of CPU time in a certain time frame

    • D.

      It is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content

    Correct Answer(s)
    A. Is is a process of cutting down the CPU processing time for an application, which is malfunctioning
    C. It prevents applications using more than a certain percentage of CPU time in a certain time frame
    Explanation
    CPU throttling is a process that involves reducing the CPU processing time for an application that is malfunctioning. This helps to prevent the application from consuming excessive resources and causing system instability. Additionally, CPU throttling also involves limiting the amount of CPU time that applications can use within a specific time frame. This helps to prevent a single application from monopolizing the CPU and ensures fair resource allocation among multiple applications running on the system.

    Rate this question:

  • 25. 

    Which of the following is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers?

    • A.

      SMTP

    • B.

      IMAP

    • C.

      SNMP

    • D.

      PPTP

    Correct Answer
    B. IMAP
    Explanation
    IMAP (Internet Message Access Protocol) is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers. It is commonly used by email clients to access and manage emails stored on a remote mail server. Unlike POP (Post Office Protocol), which downloads emails to the client device and removes them from the server, IMAP allows users to view and manipulate emails directly on the server, providing a more synchronized and versatile email experience. SMTP (Simple Mail Transfer Protocol) is used for sending emails, SNMP (Simple Network Management Protocol) is used for network management, and PPTP (Point-to-Point Tunneling Protocol) is used for virtual private networks (VPNs).

    Rate this question:

  • 26. 

    Which of the following terms describes software technologies that improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating ststem on which they are executed?

    • A.

      Encapsulation

    • B.

      Application virtualization

    • C.

      Failover

    • D.

      System hardening

    Correct Answer
    B. Application virtualization
    Explanation
    Application virtualization is the correct answer because it refers to the software technologies that enhance the portability, manageability, and compatibility of applications by isolating them from the underlying operating system. This allows applications to run independently of the specific operating system, making them easier to deploy and maintain across different environments. Encapsulation, failover, and system hardening do not specifically address the encapsulation of applications from the underlying operating system.

    Rate this question:

  • 27. 

    Which of the following statements about hibernate mode are true? Choose two.

    • A.

      When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode.

    • B.

      Users have to enter hibernate mode manually on the computers that are not ACPI-enables or APM-enabled

    • C.

      Computers that are not ACPI-enabled or APM-enabled automatically enter hibernate mode

    • D.

      When a computer resumes from hibernate mode, it reads the saved settings from the computer's RAM and restores the system state as it was before it entered hibernate mode

    Correct Answer
    B. Users have to enter hibernate mode manually on the computers that are not ACPI-enables or APM-enabled
    Explanation
    The given statement states that users have to enter hibernate mode manually on computers that are not ACPI-enabled or APM-enabled. This means that on computers that do not have the necessary power management features, the user needs to manually put the computer into hibernate mode. This suggests that hibernate mode is not automatically activated on these computers.

    Rate this question:

  • 28. 

    Which of the following energy saving standards is used to control only monitors and video cards?

    • A.

      ACPI

    • B.

      APM

    • C.

      ASPI

    • D.

      DPMS

    Correct Answer
    D. DPMS
    Explanation
    DPMS stands for Display Power Management Signaling, which is an energy-saving standard used to control only monitors and video cards. It allows the computer to automatically turn off the display or put it into a low-power mode when it is not in use. This helps to reduce energy consumption and extend the lifespan of the display. ACPI (Advanced Configuration and Power Interface), APM (Advanced Power Management), and ASPI (Advanced SCSI Programming Interface) are not specifically designed for controlling monitors and video cards.

    Rate this question:

  • 29. 

    Which of the following indicates the subjects that can use them?

    • A.

      Access control list

    • B.

      Audit policy

    • C.

      Intrusion detection system

    • D.

      Single sign-on

    Correct Answer
    A. Access control list
    Explanation
    An access control list is a mechanism used to define and control access permissions to resources in a computer system. It lists the subjects (users, groups, or processes) that are allowed or denied access to specific objects (files, directories, devices). Therefore, the correct answer indicates that access control lists are used by subjects to determine their access privileges.

    Rate this question:

  • 30. 

    Which of the following relies on a physical characteristic of the user to verify his identity?

    • A.

      Biometrics

    • B.

      Social Engineering

    • C.

      CHAP

    • D.

      Kerberos v5

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics relies on a physical characteristic of the user, such as fingerprints, facial recognition, or iris scans, to verify their identity. This technology uses unique biological traits that are difficult to forge or replicate, providing a high level of security. Social engineering, CHAP, and Kerberos v5 do not rely on physical characteristics but rather use other methods such as manipulation, authentication protocols, or encryption for identity verification.

    Rate this question:

  • 31. 

    How many IEEE 1394 devices can be connected to a single IEEE 1394 port through daisy chaining?

    • A.

      53

    • B.

      63

    • C.

      127

    • D.

      110

    Correct Answer
    B. 63
    Explanation
    A single IEEE 1394 port can support up to 63 devices through daisy chaining. Daisy chaining is a method of connecting multiple devices in a series, where each device is connected to the previous one. This allows for efficient use of the limited number of ports available on a device. Therefore, the correct answer is 63.

    Rate this question:

  • 32. 

    How many devices, excluding the SCSI adapter, does a Fast-Wide SCSI-2 bus support?

    • A.

      4

    • B.

      7

    • C.

      15

    • D.

      127

    Correct Answer
    C. 15
    Explanation
    A Fast-Wide SCSI-2 bus supports a maximum of 15 devices, excluding the SCSI adapter. This means that up to 15 devices can be connected to the bus, such as hard drives, CD/DVD drives, scanners, and printers, allowing for efficient data transfer and communication between the devices.

    Rate this question:

  • 33. 

    A customer has come to you wanting upgrade the video card in his laptop. What would you recommend?

    • A.

      A PCMCIA card

    • B.

      A PCI Express card

    • C.

      Upgrade is not possible

    • D.

      An AGP Card

    Correct Answer
    C. Upgrade is not possible
    Explanation
    Upgrading the video card in a laptop is usually not possible because most laptops have integrated graphics, meaning the video card is soldered onto the motherboard and cannot be easily replaced or upgraded. Unlike desktop computers, laptops do not have expansion slots like PCI Express or AGP, and PCMCIA cards are typically used for other purposes such as adding additional ports or wireless capabilities. Therefore, the correct answer is that upgrading the video card is not possible in this scenario.

    Rate this question:

  • 34. 

    Which of the following protocols has recently been succeeded by Transport Layer Security (TLS) protocol?

    • A.

      SNMP

    • B.

      IPX/SPX

    • C.

      HTTP

    • D.

      SSL

    Correct Answer
    D. SSL
    Explanation
    SSL (Secure Sockets Layer) is the correct answer. SSL is a cryptographic protocol that provides secure communication over a computer network. It was widely used for secure communication on the internet, but it has been succeeded by Transport Layer Security (TLS) protocol. TLS is an updated and more secure version of SSL, providing encryption and authentication for internet communications. Therefore, SSL has recently been succeeded by TLS.

    Rate this question:

  • 35. 

    Which of the following statements about SRAM and true? Choose three.

    • A.

      SRAM is made of capacitors

    • B.

      SRAM is more expensive than DRAM

    • C.

      SRAM is made of a special circuit called a flip-flop

    • D.

      SRAM is used for caching

    Correct Answer(s)
    B. SRAM is more expensive than DRAM
    C. SRAM is made of a special circuit called a flip-flop
    D. SRAM is used for caching
    Explanation
    SRAM is more expensive than DRAM because it requires more transistors to store each bit of data. SRAM is made of a special circuit called a flip-flop, which is composed of multiple transistors. SRAM is used for caching, as it provides faster access to data compared to DRAM.

    Rate this question:

  • 36. 

    Your computer has an internal SCSI hard disk drive and an external SCSI CD drive connected to a SCSI controller. Where will you place the terminators?

    • A.

      Place one terminator on the SCSI controller and one on the external CD drive

    • B.

      Place one terminator at the end of each drive

    • C.

      Place one terminator on the SCSI controller

    • D.

      Place one terminator on the SCSI controller and one on the internal hard disk drive

    • E.

      Place one terminator on the itnernal hard disk drive

    Correct Answer
    B. Place one terminator at the end of each drive
    Explanation
    You should place one terminator at the end of each drive. Terminators are used to prevent signal reflections and ensure proper communication on the SCSI bus. Placing a terminator at the end of each drive helps to terminate the bus properly and prevent any signal issues.

    Rate this question:

  • 37. 

    Which of the following options will you use to minimize ESD problems?

    • A.

      Wearing synthetic clothes in the computer lab

    • B.

      A wrist strap

    • C.

      A plastic CPU cover

    • D.

      An artiglare screen

    Correct Answer
    B. A wrist strap
    Explanation
    A wrist strap is used to minimize ESD (electrostatic discharge) problems. ESD occurs when there is a sudden flow of electricity between two objects with different charges, and it can damage electronic components. Wearing synthetic clothes in the computer lab, using a plastic CPU cover, or an artiglare screen do not directly address ESD issues. However, a wrist strap is designed to safely discharge static electricity from the body to prevent damage to sensitive electronic equipment, making it the most suitable option for minimizing ESD problems.

    Rate this question:

  • 38. 

    Your customer complains that some of his older WinXP programs, particularly some games, won;t work in Windows Vista. What should you recommend?

    • A.

      That he buy Vista versions of those programs

    • B.

      That he dual boot XP and Vista in order to handle old and new programs

    • C.

      That he use the Windows Vista Compatibility Mode

    • D.

      Unfortunately he won't be able to use those programs

    Correct Answer
    C. That he use the Windows Vista Compatibility Mode
    Explanation
    The recommended solution is to use the Windows Vista Compatibility Mode. This mode allows older programs, such as the WinXP programs mentioned, to run on Windows Vista by emulating the environment of the previous operating system. By enabling compatibility mode, the customer can potentially resolve compatibility issues and continue using their older programs without having to purchase new versions or dual boot between operating systems.

    Rate this question:

  • 39. 

    Your customer is using WinXP Service pack 1 with wireless zero configuration. Which is the most modern encryption supported with wireless zero configuration?

    • A.

      WPA

    • B.

      WEP2

    • C.

      PKI

    • D.

      WEP

    Correct Answer
    A. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is the most modern encryption supported with wireless zero configuration. It provides better security than WEP (Wired Equivalent Privacy) and WEP2. PKI (Public Key Infrastructure) is not an encryption method but a framework for managing and verifying digital certificates. Therefore, WPA is the correct answer as it is the most advanced encryption option for wireless zero configuration in WinXP Service pack 1.

    Rate this question:

  • 40. 

    Which of the following is a curcuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer?

    • A.

      Communication and Networking Riser (CNR)

    • B.

      Audio/modem riser

    • C.

      Riser Card

    • D.

      Secure Digital (SD) card

    Correct Answer
    C. Riser Card
    Explanation
    A riser card is a circuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer. It allows for more expansion options by allowing additional cards to be connected to the computer's motherboard.

    Rate this question:

  • 41. 

    Which of the following is used by Wi-Fi Protected Access (WPA) to provide data encryption?

    • A.

      RSA

    • B.

      TKIP

    • C.

      RC4

    • D.

      IDEA

    Correct Answer
    B. TKIP
    Explanation
    TKIP (Temporal Key Integrity Protocol) is used by Wi-Fi Protected Access (WPA) to provide data encryption. TKIP is a security protocol that was designed to replace the original WEP (Wired Equivalent Privacy) encryption protocol, which had several vulnerabilities. TKIP uses a combination of encryption techniques, including RC4 for data confidentiality and a message integrity check to ensure data integrity. It also provides a key mixing function to dynamically generate encryption keys, making it more secure than WEP.

    Rate this question:

  • 42. 

    Which is the maximum resolution that the XGA video technology supports?

    • A.

      2560 x 1600

    • B.

      1024 x 768

    • C.

      2048 x 1536

    • D.

      800 x 600

    Correct Answer
    B. 1024 x 768
    Explanation
    XGA (Extended Graphics Array) video technology supports a maximum resolution of 1024 x 768. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. In the given options, 1024 x 768 is the only resolution that matches the maximum supported by XGA.

    Rate this question:

  • 43. 

    Which of the following modes saves maximum battery power while maintaining the current state of a computing session?

    • A.

      Hibernate mode

    • B.

      Standby mode

    • C.

      Session mode

    • D.

      Safe mode

    Correct Answer
    A. Hibernate mode
    Explanation
    Hibernate mode saves maximum battery power while maintaining the current state of a computing session. In this mode, the computer saves the current state, including all open documents and applications, to the hard drive and then shuts down. When the computer is turned on again, it restores the previous state, allowing the user to continue where they left off. This mode is particularly useful when the computer needs to be powered off for an extended period but the user wants to resume their work without losing any data or progress.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 26, 2011
    Quiz Created by
    Ranger1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.