Strata Practice Exam 1

90 Questions | Total Attempts: 595

SettingsSettingsSettings
Strata Practice Exam 1

Strata practice exam, questions 10/12/11


Questions and Answers
  • 1. 
    You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.
    • A. 

      Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B. 

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.

    • C. 

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drive is on the primary contoller. Designate the second hard disk drive as Slave.

    • D. 

      Install both the hard disk drives on the primary IDE controller. Deignate both drives as Secondary

  • 2. 
    Which of the following maximum resolutions does the UXGA video technology supports?
    • A. 

      2560 x 1600

    • B. 

      1600 x 1200

    • C. 

      2048 x 1536

    • D. 

      1280 x 1024

  • 3. 
    Which of the following sleep modes is the most power hungry mode?
    • A. 

      S1

    • B. 

      S2

    • C. 

      S0

    • D. 

      S3

  • 4. 
    Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?
    • A. 

      /p

    • B. 

      /s

    • C. 

      /r

    • D. 

      /o

  • 5. 
    Step 1 - Talk to the customer Step 2 - Document your work Step 3 - Continue to gather information Step 4 - Eliminate possibilities to find the problem Step 5 - Test your results
  • 6. 
    Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.
    • A. 

      It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.

    • B. 

      It is a device that works as an interface between a computer and a network.

    • C. 

      It is a device that routes data packets between computers in different networks

    • D. 

      It is a device that contains a microprocessor and permanent memory.

  • 7. 
    Which of the following ports is also known as PS/2
    • A. 

      6 - pin Mini-Din connector

    • B. 

      5- pin DIN connector

    • C. 

      4 - pin Mini-Din connector

    • D. 

      USB connector

  • 8. 
    Which of the following statements are true about USB? Choose two
    • A. 

      USB supports hot plugging

    • B. 

      You can connect up to 127 peripheral devices to a single USB port

    • C. 

      You can connect up to 16 peripheral devices to a single USB port

    • D. 

      USB does not support plug n play installation

  • 9. 
    Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?
    • A. 

      Min in the middle attack

    • B. 

      Denial of service (DoS) attack

    • C. 

      Buffer overflow attack

    • D. 

      Shoulder surfing attack

  • 10. 
    You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?
    • A. 

      His operating system is incompatible.

    • B. 

      A firewall is blocking him

    • C. 

      His laptop is incompatable

    • D. 

      MAC filtering is blocking him

  • 11. 
    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?
    • A. 

      Session initiation Protocol

    • B. 

      Streaming Media

    • C. 

      HTTP streaming

    • D. 

      Slipstreaming

  • 12. 
    Which of the following refers to the data rate supported by a network conncection or interface?
    • A. 

      Bandwidth

    • B. 

      Preboot Execution Environment (PXE)

    • C. 

      Branding

    • D. 

      Spam

  • 13. 
    Which of the following are serial interfaces? Choos all that apply
    • A. 

      EPP

    • B. 

      USB

    • C. 

      Firewire

    • D. 

      IEEE 1284

  • 14. 
    Which of the following devics has its own BIOS?
    • A. 

      Hard disk drive

    • B. 

      South card

    • C. 

      Network interface card

    • D. 

      Video adapter

  • 15. 
    Which of the following are dual core processors? Choose two.
    • A. 

      AMD Athlon(tm) 64 X2

    • B. 

      Intel Pentium 4

    • C. 

      Intel(r) Pentium(r) processor Extreme Ediditon

    • D. 

      AMD Athlon(tm)

  • 16. 
    Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?
    • A. 

      /q

    • B. 

      /o

    • C. 

      /s

    • D. 

      /e

  • 17. 
    WHich of the following provides authentication, enryption and data integrity for wireless devices?
    • A. 

      PAP

    • B. 

      WAN

    • C. 

      WAP

    • D. 

      WTLS

  • 18. 
    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
    • A. 

      Bluetooth

    • B. 

      802. 11

    • C. 

      802. 11b

    • D. 

      Infrared

  • 19. 
    What is the mazimum resolution that the WUXGA video technology supports?
    • A. 

      2048 x 1536

    • B. 

      1920 x 1200

    • C. 

      3840 x 2400

    • D. 

      1600 x 1200

  • 20. 
    What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply
    • A. 

      Data integnity

    • B. 

      Encryption

    • C. 

      Bandwidth

    • D. 

      Authentication

  • 21. 
    Which of the following software displays advertisements, whether or not the user has consented?
    • A. 

      Trojan horse

    • B. 

      Honeypot

    • C. 

      Spyware

    • D. 

      Adware

  • 22. 
    Which of the following protocols transmits error messages and network statistics?
    • A. 

      ICMP

    • B. 

      DHCP

    • C. 

      TCP

    • D. 

      NNTP

  • 23. 
    Which of the following power sources are used to power a laptop?
    • A. 

      Solar panel

    • B. 

      AC power

    • C. 

      Battery

    • D. 

      Docking station

  • 24. 
    Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.
    • A. 

      Educate users of the client computers about the problems arising due to malware

    • B. 

      Educate users of the client computers to avoid malware

    • C. 

      Prevent users of the client computers from executing any programs.

    • D. 

      Assign read only permission to the users for accessing the hard disk drives of the client computers.

  • 25. 
    You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
    • A. 

      128 Megabytes

    • B. 

      64 Megabytes

    • C. 

      2 Gigabytes

    • D. 

      1 Gigabyte