Strata Practice Exam 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By 11bRanger
1
11bRanger
Community Contributor
Quizzes Created: 1 | Total Attempts: 750
| Attempts: 750 | Questions: 89
Please wait...
Question 1 / 89
0 %
0/100
Score 0/100
1. Which of the following refers to the data rate supported by a network conncection or interface?

Explanation

Bandwidth refers to the data rate supported by a network connection or interface. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. A higher bandwidth allows for faster data transfer and better performance.

Submit
Please wait...
About This Quiz
Strata Practice Exam 1 - Quiz

Strata Practice Exam 1 assesses knowledge in key IT areas including hardware installation, video technology, power management, file copying commands, and security features like smart cards. Essential for... see morelearners aiming to validate fundamental IT skills. see less

2. Which of the following is the most common laptop battery found today?

Explanation

Lithium-ion batteries are the most common type of laptop batteries found today. They have become popular due to their high energy density, longer lifespan, and lighter weight compared to other types of batteries. Lithium-ion batteries also have a lower self-discharge rate and do not suffer from the memory effect, making them more efficient and convenient for laptop users. Additionally, they have a higher voltage capacity and can provide a consistent power supply for longer periods of time, making them ideal for portable devices like laptops.

Submit
3. Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?

Explanation

A shoulder surfing attack is a type of attack where an individual looks surreptitiously at the keyboard or monitor of an employee's computer. This allows the attacker to gather sensitive information such as passwords, login credentials, or confidential data. It is a form of social engineering that relies on the attacker's ability to physically observe the victim's actions. This type of attack can be easily executed in public places like coffee shops or airports, where individuals may be less cautious about protecting their screens or keyboards.

Submit
4. Which of the following devices provides input by analyzing printed text, handwriting, or an abject?

Explanation

An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents or images into digital format. This allows the user to edit, store, or share the scanned information electronically. Unlike a webcam, which captures live video or images, an image scanner specifically focuses on converting physical documents into digital files. A packet analyzer is used for network analysis, and a BD-ROM drive is used for reading Blu-ray discs.

Submit
5. Which of the following devices contains no moving parts and stores data in a digital format?

Explanation

A solid state drive is a device that contains no moving parts and stores data in a digital format. Unlike other options such as a cartridge tape drive, floppy disk drive, or hard disk drive, a solid state drive uses flash memory to store data, making it more reliable and faster in terms of data access. This technology has become increasingly popular due to its durability, low power consumption, and faster read/write speeds, making it a preferred choice for many electronic devices such as computers and smartphones.

Submit
6. Which of the following software displays advertisements, whether or not the user has consented?

Explanation

Adware is a type of software that displays advertisements on a user's device, regardless of whether or not the user has given consent. Unlike other software options listed, such as Trojan horse, Honeypot, and Spyware, Adware specifically focuses on generating revenue through advertising. It is designed to track user behavior and display targeted ads, often disrupting the user's browsing experience. Therefore, Adware is the correct answer to the question.

Submit
7. Which of the following stores user preferences related to a Web site?

Explanation

A cookie is a small piece of data that is stored on the user's computer by a website. It is used to store user preferences and information related to the website, such as login credentials, language preferences, and shopping cart contents. This allows the website to remember the user's preferences and provide a personalized experience. Cookies are commonly used in web development to enhance user experience and track user behavior on the site.

Submit
8. Which of the following ports on a computer are used to connect a keyboard? Choose two

Explanation

USB and PS/2 are the correct answers because these ports are commonly used to connect keyboards to a computer. USB (Universal Serial Bus) ports are the most common and widely used ports for connecting peripherals, including keyboards. PS/2 ports, on the other hand, are older and less common but still found on some computers. PS/2 ports are specifically designed for connecting keyboards and mice. DB-25 and DB-9 are not used for connecting keyboards, but rather for other purposes such as serial communication or printer connections.

Submit
9. Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

Explanation

Streaming media is the correct answer because it is a technology that enables users to hear and watch video clips while they are still being downloaded from a website. This eliminates the need to wait for the entire download to complete before accessing the content. Streaming media works by sending small portions of the video or audio file in a continuous stream, allowing users to start experiencing the content in real-time.

Submit
10. Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

Explanation

Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for easy and seamless connections between devices. It has a decent range and is capable of transmitting data at a high speed, making it suitable for connecting peripherals like printers and mice to a laptop. Additionally, Bluetooth is energy-efficient, which helps to conserve battery life on both the laptop and the connected devices.

Submit
11. Which of the following can be installed in an AGP slot?

Explanation

An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the computer's motherboard, allowing for efficient data transfer and enhanced graphics performance. Therefore, a video card is the only option that can be installed in an AGP slot, making it the correct answer.

Submit
12. Which of the following features are related to power management? Choose two

Explanation

Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state where it can quickly resume operations. Both features help conserve power and extend battery life in laptops and other devices.

Submit
13. Which of the following interfaces has the ability to support digital audio as well as video through a single cable?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only interface listed that has the ability to support both digital audio and video through a single cable. VGA (Video Graphics Array) and SVGA (Super Video Graphics Array) are analog interfaces that only support video, while DVI (Digital Visual Interface) supports only video and requires a separate audio cable. HDMI, on the other hand, is a digital interface that can transmit high-quality audio and video signals simultaneously, making it the ideal choice for connecting devices such as TVs, monitors, and audio systems.

Submit
14. Which of the following types of parental controls is used to limit access to the internet contents?

Explanation

Content filter control is used to limit access to internet contents by blocking or filtering certain websites or types of content. It allows parents to restrict their children's access to inappropriate or harmful content, ensuring a safer internet experience. This type of parental control can be set up on devices or through internet service providers, and it helps parents to control and monitor the online activities of their children.

Submit
15. Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only option that transmits all ATSC HDTV standards and supports 8-channel digital audio. DVI (Digital Visual Interface) does not support audio, S-Video does not support HDTV standards, and SVGA (Super Video Graphics Array) does not support audio or HDTV standards.

Submit
16. Which of the following is an international standard for energy efficient consumer products?

Explanation

The Energy Star rating is an international standard for energy efficient consumer products. It is a program developed by the United States Environmental Protection Agency (EPA) and the Department of Energy (DOE) that aims to promote energy efficiency and reduce greenhouse gas emissions. Products that meet the Energy Star criteria are designed to consume less energy and perform efficiently, saving consumers money and reducing their environmental impact. The Energy Star rating is recognized globally and is used to identify energy-efficient appliances, electronics, and other consumer products.

Submit
17. Which of the following programs can collect various types fo personal information, such as internet surfing habits, and Web sites that the user has visited?

Explanation

Spyware is a type of program that can collect various types of personal information, such as internet surfing habits and websites that the user has visited. Unlike malware, which is a broader term encompassing various malicious software, spyware specifically focuses on gathering personal information without the user's knowledge or consent. Honeypots are decoy systems used to lure and detect hackers, while worms are self-replicating malware that can spread across networks. Therefore, the correct answer in this case is spyware.

Submit
18. You have a wireless printer that is connected to your Windows XP laptop via infrared, and it prints proplerly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?

Explanation

The most likely cause of the issue is that the printer is located at a distance of more than three feet from the laptop. Infrared connections have a limited range, typically around three feet, so if the printer is moved further away, the laptop will not be able to send print jobs to it.

Submit
19. You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?

Explanation

The problem is that MAC filtering is blocking him. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's new laptop is not on the approved list of MAC addresses, it is being blocked from connecting to the company wireless network.

Submit
20. Which of the following protocols handles the reliable delivery data?

Explanation

TCP (Transmission Control Protocol) handles the reliable delivery of data. Unlike UDP (User Datagram Protocol), TCP ensures that data is delivered without errors, in the correct order, and with minimal delay. TCP achieves reliability through various mechanisms such as acknowledgment of received data, retransmission of lost packets, and flow control to prevent overwhelming the recipient. ARP (Address Resolution Protocol) is responsible for mapping IP addresses to MAC addresses, IPX (Internetwork Packet Exchange) is a network layer protocol used in Novell NetWare networks, while UDP is a connectionless protocol that does not guarantee reliable delivery.

Submit
21. Which of the following statements is true about modem?

Explanation

A modem is a device that allows computers to connect to the internet by converting digital signals from the computer into analog signals that can be transmitted over telephone lines. It also performs the opposite function, converting analog signals received from the telephone lines back into digital signals that the computer can understand. This conversion process enables communication between digital devices and analog telephone lines, making it possible for data to be transmitted over long distances. Therefore, the statement "It converts digital signals into analog signals and vice versa" is true about modems.

Submit
22. Which of the following ports is also known as PS/2

Explanation

The correct answer is 6-pin Mini-Din connector. This connector is commonly used for connecting keyboards and mice to computers. It is also known as the PS/2 port because it was originally introduced by IBM for their Personal System/2 computers. The 6-pin Mini-Din connector has a round shape and is typically color-coded, with purple for keyboards and green for mice. It has been largely replaced by USB connectors in modern computers, but some older systems may still have PS/2 ports for compatibility with legacy devices.

Submit
23. Which of the following storage devices uses SRAM or DRAM?

Explanation

Solid state drives (SSDs) use either SRAM (Static Random Access Memory) or DRAM (Dynamic Random Access Memory) as their primary storage medium. SRAM and DRAM are types of volatile memory that can retain data as long as power is supplied. SSDs use these types of memory because they provide fast access times and high data transfer rates, making them ideal for storing and retrieving data quickly. Unlike traditional hard disk drives (HDDs) which use mechanical components, SSDs have no moving parts, resulting in faster read and write speeds, lower power consumption, and increased durability.

Submit
24. Which of the following color code is used for a PS/2 keyboard connector on new motherboards?

Explanation

The correct answer is purple. The PS/2 keyboard connector on new motherboards is typically color-coded purple. This color coding helps users easily identify and connect their PS/2 keyboards to the appropriate port on the motherboard. The other color options listed (pink, green, and blue) are not commonly associated with the PS/2 keyboard connector.

Submit
25. Which of the following refers to a location away from the computer center where document copies and backups are kept?

Explanation

Off Site storage refers to a location away from the computer center where document copies and backups are kept. This is done to ensure that data is protected in case of any disaster or damage to the computer center. By storing copies and backups off site, organizations can safeguard their data and easily retrieve it when needed. This practice is essential for data security and business continuity.

Submit
26. Which of the following statements are true about USB? Choose two

Explanation

USB supports hot plugging, which means that you can connect and disconnect USB devices without having to restart the computer. This feature allows for easy and convenient use of USB devices. Additionally, you can connect up to 127 peripheral devices to a single USB port, making it a versatile and efficient way to connect multiple devices to a computer.

Submit
27. Which of the following maximum resolutions does the UXGA video technology supports?

Explanation

The UXGA video technology supports a maximum resolution of 1600 x 1200.

Submit
28. Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?

Explanation

A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to transfer data from these types of memory cards to a computer or other devices, making it easier to access and manage the stored information.

Submit
29. Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two

Explanation

SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting and regulating the electrical power supply, and if not handled properly, it can deliver high voltage electric shocks. Similarly, a faulty or damaged monitor can also pose a risk of electric shock due to exposed wires or faulty insulation. Floppy drives and keyboards are not typically associated with delivering lethal electric shocks.

Submit
30. You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorith. Which encryption standards should you use?

Explanation

The correct answer is WPA 2. WEP (Wired Equivalent Privacy) is an outdated encryption standard that is easily hacked, so it should not be used. WPA (Wi-Fi Protected Access) is an improvement over WEP but is also vulnerable to certain attacks. TKIP (Temporal Key Integrity Protocol) is a security protocol used with WPA to enhance its security, but it is also considered less secure compared to the newer encryption standards. WPA 2 (Wi-Fi Protected Access 2) is the most secure and up-to-date encryption standard that should be implemented for wireless access at a defense contractor.

Submit
31. What is the mazimum resolution that the WUXGA video technology supports?

Explanation

WUXGA video technology supports a maximum resolution of 1920 x 1200. This means that the technology can display images or videos with a width of 1920 pixels and a height of 1200 pixels.

Submit
32. Which of the following statements about a riser card is true?

Explanation

A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected vertically, providing more flexibility for adding peripherals or upgrading the system. This is different from the other options provided, as a riser card does not connect the computer to a network, add extra microprocessors, or provide extra memory for expansion cards.

Submit
33. You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?

Explanation

Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly. This amount of memory is sufficient for the operating system to run basic tasks and applications. However, it is important to note that this is the minimum requirement, and for optimal performance, it is recommended to have more RAM installed.

Submit
34. You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

Explanation

ECC RAM, or Error Correcting Code RAM, should be selected for the new PC to ensure that errors are handled properly. ECC RAM is designed to detect and correct errors that occur during data storage and retrieval. It uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors and detect multi-bit errors. This makes ECC RAM more reliable and suitable for systems that require high data integrity, such as servers or workstations used for critical tasks.

Submit
35. Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?

Explanation

The best way to put the customer's Windows XP machine into a working state again is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system files or settings that may be causing the issue. Reinstalling Windows or uninstalling new software may not address the underlying problem, while using the recovery console provides a more targeted and effective solution.

Submit
36. Your office uses Windows vista. A patch was applied automatically. Suddenly the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their device manager, you notice there is on exlamation point next to the scanner. What should you do now?

Explanation

After the patch was applied automatically, the users with scanners attached to their computers started experiencing issues. When checking the device manager, an exclamation point is seen next to the scanner, indicating a driver problem. Therefore, the best course of action would be to manually uninstall and reinstall the device driver. This will help troubleshoot any conflicts caused by the patch and ensure that the scanner can be accessed properly again. Reinstalling Vista or finding a Vista compatible scanner may not necessarily resolve the driver issue. Rolling back the patch could be an option, but it may not be necessary if the driver reinstallation solves the problem.

Submit
37. At what voltage does a USB host supply power to the USB bus?

Explanation

A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power supply. It is important to maintain this voltage as it ensures compatibility and safe operation of USB devices. Higher voltages can cause damage to the devices, while lower voltages may not provide sufficient power for proper functioning. Therefore, 5 volts is the correct answer for the given question.

Submit
38. Which of the following software can also be used as a basic security measure?

Explanation

A screensaver can be used as a basic security measure because it helps to protect the privacy of the computer user. When a computer is left idle for a certain period of time, the screensaver activates and displays a moving image or pattern on the screen. This prevents unauthorized users from viewing sensitive information that may be displayed on the screen. Additionally, screensavers can be configured to require a password to exit, adding an extra layer of security to the computer.

Submit
39. Which of the following aims to restrict certain dangerous substances commonly used in electronics equipment?

Explanation

The RoHS directive aims to restrict certain dangerous substances commonly used in electronics equipment. It stands for Restriction of Hazardous Substances and is a European Union directive that limits the use of substances such as lead, mercury, cadmium, and certain flame retardants in electronic products. This directive is implemented to protect human health and the environment from the harmful effects of these substances.

Submit
40. Which of the following are the most likely causes of virus attack? Choose all that apply

Explanation

The most likely causes of a virus attack include installing an application from an unreliable source, downloading a file from an unknown website, installing a DLL file from an unreliable source, and using a floppy, a compact disk, or a pen drive from an unreliable source. These actions can expose a computer to malicious software and increase the risk of a virus infecting the system. It is important to be cautious and only download or install files from trusted sources to protect against virus attacks.

Submit
41. Which of the following power sources are used to power a laptop?

Explanation

Laptops can be powered using AC power and batteries. AC power refers to the electricity supplied through a power outlet, which is commonly used when the laptop is connected to a charger. On the other hand, laptops also have built-in batteries that can store electrical energy and provide power when the laptop is not connected to an outlet. These batteries can be recharged using AC power. Therefore, both AC power and batteries are used to power a laptop.

Submit
42. Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two

Explanation

The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings in Andrew's computer. The CMOS battery is responsible for maintaining these settings, so if it has failed, it can cause this error. Additionally, if the CMOS chip itself has failed, it can also result in a checksum failure. Therefore, the most likely causes of this error are a failed CMOS battery and a failed CMOS chip.

Submit
43. Which of the following can occur if the power cable runs along with the computer network cable?

Explanation

If the power cable runs along with the computer network cable, it can lead to Electromagnetic Interference (EMI). EMI occurs when the electrical signals from the power cable interfere with the signals from the network cable, causing distortion or disruption in the network communication. This can result in poor network performance, data errors, or even complete network failure. It is important to keep power cables and network cables separated to minimize the risk of EMI.

Submit
44. Which of the following conditions does BIOS need to be updated? Choose two

Explanation

BIOS needs to be updated in two conditions. Firstly, if users need to utilize new hardware features or options that are supported by the motherboard but not supported by the computer BIOS. Secondly, if the BIOS does not support new devices. In both cases, updating the BIOS is necessary to ensure compatibility and proper functioning of the hardware.

Submit
45. Which of the following sleep modes is the most power hungry mode?

Explanation

S1 sleep mode is the most power hungry mode among the given options. In S1 sleep mode, also known as "Standby" or "Suspend to RAM," the computer enters a low-power state where the CPU and other components are powered down, but the RAM remains active. This allows for a quick wake-up time as the system can resume from where it left off. However, since the RAM still requires power to maintain its data, S1 mode consumes more power compared to other sleep modes like S2, S0, or S3.

Submit
46. Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?

Explanation

The correct answer is /o. The /o switch is used with the XCOPY command to copy the ownership and NTFS permissions of the files while copying them. This switch ensures that the copied files retain the same permissions and ownership as the original files.

Submit
47. Which of the following are types of LCD monitors? Choose two

Explanation

Active Matrix and Passive Matrix are both types of LCD monitors. Active Matrix refers to a type of display technology that uses thin film transistors (TFTs) to control each individual pixel on the screen, resulting in faster response times and better image quality. Passive Matrix, on the other hand, uses a grid of electrodes to control the pixels, which is less expensive but can lead to slower response times and lower image quality compared to Active Matrix. X-Matrix is not a recognized type of LCD monitor. SVGA refers to a resolution standard and is not specifically a type of LCD monitor.

Submit
48. Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?

Explanation

Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

Submit
49. Which of the following enables third pary developers to create capabilites to extend an application?

Explanation

A plug-in is a software component that allows third-party developers to extend the functionality of an application. It provides an interface for developers to add new features or modify existing ones without altering the core code of the application. By creating plug-ins, developers can enhance the application's capabilities and tailor it to meet specific user needs. This enables a more customizable and flexible experience for users, as they can choose the plug-ins that best suit their requirements.

Submit
50. You are handling IT support for a sales company. One of the sales representitives complains that his laptop does not have a network card. You wish to add a type of expansion card should you use?

Explanation

PCMCIA (Personal Computer Memory Card International Association) is the correct choice for adding a network card to the sales representative's laptop. PCMCIA cards are designed to add functionality to laptops and are commonly used for adding network adapters, modems, and other peripherals. This type of expansion card will allow the sales representative to connect to the network and perform their job effectively. MCA, PCI, and AGP are not suitable choices for adding a network card to a laptop.

Submit
51. Your client currently has Windows 98 and wishes to upgrade to Windows XP. What is the best way to accomplish this?

Explanation

The best way to upgrade from Windows 98 to Windows XP is to buy and install the Windows XP Upgrade. This option allows the client to upgrade their existing operating system to Windows XP without having to do a clean installation. It is a cost-effective solution that ensures compatibility and a smooth transition from Windows 98 to XP.

Submit
52. Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.

Explanation

Mark will educate the users about the problems arising due to malware and how to avoid it. This will help the users to be aware of the risks and take necessary precautions while browsing the internet, downloading files, or opening suspicious emails. By educating the users, Mark can reduce the chances of malware infecting the client computers and ensure that the users are actively involved in maintaining a secure network environment.

Submit
53. Which of the following buses has a maximum data transfer rate of 2400 Mbps?

Explanation

eSATA (External Serial Advanced Technology Attachment) has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps. USB 1.1 has a maximum data transfer rate of 12 Mbps. USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the correct answer as it has the highest data transfer rate among the given options.

Submit
54. Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computer, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?

Explanation

Mac Filtering is the most appropriate security measure to recommend in this scenario. Mac Filtering allows the customer to create a list of authorized devices by their unique MAC addresses. Only devices with MAC addresses on the list will be able to connect to the Wi-Fi network, providing an additional layer of security and ensuring that only authorized computers can access the network.

Submit
55. Which of the following devics has its own BIOS?

Explanation

A video adapter is a hardware device that is responsible for generating and outputting video signals to a display device. It has its own BIOS (Basic Input/Output System) which contains the necessary firmware to initialize and control the video adapter. The BIOS of a video adapter allows it to communicate with the computer's operating system and ensures proper functioning of the display. This BIOS is separate from the computer's main BIOS, which is responsible for initializing other hardware components.

Submit
56. Which of the following are dual core processors? Choose two.

Explanation

The correct answer is AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition. Both of these processors are dual core processors, meaning they have two separate processing units within a single chip. This allows for improved multitasking and performance compared to single core processors. The other options, Intel Pentium 4 and AMD Athlon(tm), are not dual core processors.

Submit
57. Which of the following are types social engineering attacks? Choose two

Explanation

The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks where the attacker manipulates human behavior and exploits trust to gain unauthorized access to systems or sensitive information. In the first scenario, the attacker uses impersonation to deceive the company's employees and gain physical access to the server. In the second scenario, the attacker uses social manipulation by pretending to be a system administrator to trick the user into revealing their password.

Submit
58. Which of the following terms refers to an anti virus software file that is updated from time to time to protect a computer from new viruses?

Explanation

An anti-virus software file that is updated from time to time to protect a computer from new viruses is referred to as a "definition." Definitions contain information about known viruses and help the anti-virus software identify and remove them from the computer. Regularly updating the definition file ensures that the anti-virus software can effectively detect and protect against the latest threats.

Submit
59. What is the difference between the USB 2.0 and IEEE 1394 bus standards?

Explanation

The given correct answer states that IEEE 1394 is slower than USB 2.0. This means that in terms of data transfer speed, USB 2.0 is faster compared to IEEE 1394.

Submit
60. Which of the following cryptographic algorithm uses public key and private key to enrypt or decrypt data?

Explanation

Asymmetric cryptographic algorithms use both a public key and a private key to encrypt and decrypt data. The public key is used for encryption, and anyone can use it to encrypt data. However, the private key is required to decrypt the encrypted data, and only the intended recipient who possesses the private key can perform the decryption. This method provides secure communication and is commonly used in applications such as secure email, digital signatures, and secure online transactions.

Submit
61. What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply

Explanation

WTLS provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data transmitted over the wireless network remains intact and has not been tampered with. Encryption ensures that the data is secured and cannot be accessed by unauthorized individuals. Authentication verifies the identity of the wireless devices and ensures that only authorized devices can access the network. Bandwidth, on the other hand, is not provided by WTLS.

Submit
62. Which of the following statements about multi or authentication is true?

Explanation

Multi-factor authentication (MFA) is a security measure that involves using two or more methods for verifying a user's identity during the authentication process. This adds an extra layer of security as it requires the user to provide multiple pieces of evidence to prove their identity. By combining different authentication methods such as passwords, biometrics, tokens, or smart cards, MFA helps protect against unauthorized access and enhances the overall security of a system or application.

Submit
63. Which of the following statements is true about a brownout?

Explanation

A brownout refers to a situation where there is a decrease in voltage in the power supply. This can lead to dimming of lights, slower electrical device performance, and potential damage to sensitive electronics. Unlike a blackout, where power is completely lost, a brownout is a partial loss of power. It can occur due to various reasons such as high demand, faulty wiring, or inadequate power generation.

Submit
64. Which of the following is the clock speed of the accelerated graphics port 8X expansion slot?

Explanation

The correct answer is 533 MHz because the accelerated graphics port (AGP) 8X expansion slot operates at a clock speed of 533 MHz. This high clock speed allows for faster data transfer between the graphics card and the computer's memory, resulting in improved graphics performance.

Submit
65. Which of the following bus interfaces are used by the video capture cards? Choose two.

Explanation

The video capture cards use AGP and PCIe bus interfaces. AGP (Accelerated Graphics Port) is a high-speed interface specifically designed for graphics cards, making it suitable for video capture cards as well. PCIe (Peripheral Component Interconnect Express) is a newer and faster bus interface that offers high bandwidth and low latency, making it ideal for video capture cards to transfer large amounts of data quickly and efficiently. EISA (Extended Industry Standard Architecture) and VESA (Video Electronics Standards Association) are not commonly used for video capture cards.

Submit
66. Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?

Explanation

The correct answer is /e. This switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. The /e switch ensures that all directories and subdirectories are copied during the process, even if they are empty. This is useful when you want to create an exact copy of a directory structure, including all empty directories within it.

Submit
67. Which of the following methods is based on the usrs roles and responsibilites?

Explanation

Role-based access control is a method that is based on the users' roles and responsibilities. In this method, access to resources is granted based on the user's assigned role within the organization. Each role is associated with a set of permissions and access rights, and users are granted access to resources based on their assigned role. This approach allows for more efficient and effective access management, as it aligns access privileges with users' job functions and responsibilities.

Submit
68. Which of the following protocols transmits error messages and network statistics?

Explanation

ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics. ICMP is used by network devices to send error messages indicating issues such as unreachable hosts or network congestion. It is also used for network diagnostics and troubleshooting by providing information about network statistics like round-trip time and packet loss. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses, TCP (Transmission Control Protocol) is responsible for reliable data transmission, and NNTP (Network News Transfer Protocol) is used for distributing news articles.

Submit
69. Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?

Explanation

Mercury (Hg), lead (Pb), and cadmium (Cd) are restricted under the Restriction of Hazardous Substances (RoHS). These substances are known to be harmful and toxic to human health and the environment. RoHS is a directive that restricts the use of certain hazardous substances in electrical and electronic equipment to minimize their negative impact. By restricting the use of these substances, RoHS aims to promote the production of safer and more environmentally friendly products.

Submit
70. Which of the following AT Attachment(ATA) standards supports transfer mode UltraDMA/133?

Explanation

ATA-7 is the correct answer because it is the AT Attachment (ATA) standard that supports transfer mode UltraDMA/133. The other options, ATA-6, ATA-4, and ATA-5, do not support this specific transfer mode.

Submit
71. Which of the following are serial interfaces? Choos all that apply

Explanation

USB and Firewire are both examples of serial interfaces. Serial interfaces are communication interfaces that transmit data one bit at a time over a single wire or channel. USB (Universal Serial Bus) is a widely used interface for connecting devices such as keyboards, mice, and external storage devices to computers. Firewire (IEEE 1394) is another high-speed interface commonly used for connecting devices like digital cameras and external hard drives to computers. EPP and IEEE 1284, on the other hand, are parallel interfaces, which transmit multiple bits simultaneously over multiple wires or channels.

Submit
72. What is the maximum data transmission speed of IEE 802. 11b Wireless networks?

Explanation

The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard, also known as Wi-Fi 1, was introduced in 1999 and operates in the 2.4 GHz frequency range. It provides a lower data rate compared to newer Wi-Fi standards such as 802.11g and 802.11n, but it still offers sufficient speed for basic internet browsing and email usage.

Submit
73. Which of the following sleep modes is also known as Hibernation in Windows operating systems?

Explanation

S4 is the correct answer because it is the sleep mode that is also known as Hibernation in Windows operating systems. In this mode, the computer saves the current state of the system to the hard drive and then shuts down completely. When the computer is turned on again, it restores the previous state from the hard drive, allowing the user to resume their work from where they left off.

Submit
74. What is the maximum cable length to connect a device to an IEEE 1394 a port?

Explanation

The maximum cable length to connect a device to an IEEE 1394 a port is 4.5 meters.

Submit
75. You are working with a team that will be bringing new computers to a sales department at a company. The sales team would like to keep not only their old find on the new PCs. What should you do?

Explanation

The User State Migration Tool is specifically designed to transfer user settings and files from one computer to another. It ensures that all the necessary system settings and files are moved to the new machines, allowing the sales team to keep their old settings and files intact. This tool is the most appropriate solution for the given scenario, as it addresses the specific requirement of transferring user settings and files.

Submit
76. WHich of the following provides authentication, enryption and data integrity for wireless devices?

Explanation

WTLS (Wireless Transport Layer Security) provides authentication, encryption, and data integrity for wireless devices. It is a security protocol specifically designed for wireless communication, ensuring secure transmission of data over wireless networks. WTLS is similar to SSL (Secure Sockets Layer) and provides similar security features, such as encryption to protect data from unauthorized access, authentication to verify the identity of the communicating parties, and data integrity to ensure that the data remains unchanged during transmission. Therefore, WTLS is the correct answer for this question.

Submit
77. In which of the following sizes are the Express card modules available? Choose two

Explanation

Express card modules are available in two sizes: 54 mm wide and 34 mm wide. These sizes refer to the width of the modules. Therefore, the correct answer is 54 mm wide and 34 mm wide.

Submit
78. Which of the following statements about the DVI-I connector are true? Choose two

Explanation

The DVI-I connector is capable of carrying both digital and analog signals, making it suitable for connecting to both digital and analog displays. Additionally, it has four more pins than the DVI-D connector, which means it has additional pins for carrying the analog signals.

Submit
79. Which of the following statements about the G3 state of a computer are true? Choose two

Explanation

In the G3 state of a computer, a complete power loss occurs, such as when the power cord is unplugged. This means that the computer is completely powered off and not in a standby or sleep mode. Additionally, in the G3 state, a computer can be disassembled, indicating that it is safe to open the computer and perform maintenance or repairs. The G3 state is also known as "soft off," distinguishing it from other power states of a computer.

Submit
80. What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply

Explanation

USB 2.0 offers several benefits over legacy communication ports. Firstly, it allows for easy configuration of hardware devices, making it convenient to connect and use different peripherals. Secondly, it provides expansion capabilities, allowing users to connect multiple devices through hubs and extend the functionality of their system. Lastly, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, ensuring efficient and quick communication between devices.

Submit
81. Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and ginds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functional. What should Mark do first to resolve the issure?

Explanation

Mark should first verify that the USB webcam is functioning properly. This can be done by testing the webcam on another computer or by trying a different USB port on the same computer. If the webcam works on another computer or on a different USB port, then the issue is likely with the USB port on Mark's computer. If the webcam does not work on any device, then it is likely a problem with the webcam itself and Mark may need to consider purchasing another model. Changing the computer's motherboard or replacing the USB port wires should be the last resort after verifying the functionality of the webcam.

Submit
82. Which of the following display standards provides four times more pixels than an 800x600 display?

Explanation

UXGA stands for Ultra Extended Graphics Array and it provides a resolution of 1600x1200 pixels. This is four times more pixels than an 800x600 display, making it the correct answer. SXGA, SXGA+, and SVGA do not provide as high of a resolution as UXGA.

Submit
83. Which of the following is the most common method used by attackers to identify wireless networks?

Explanation

War driving is the most common method used by attackers to identify wireless networks. War driving involves driving around with a device that can detect and analyze wireless signals. Attackers use this method to locate and gather information about wireless networks, such as the network name (SSID) and encryption type. This information can then be used to launch further attacks, such as unauthorized access or eavesdropping on network traffic.

Submit
84. You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.

Explanation

The correct answers are:
1) Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
2) Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary IDE controller. Designate both drives as Master.


In both of these configurations, each hard drive is connected to a separate IDE controller, ensuring that they don't interfere with each other. In the first configuration, the second hard drive is connected to the primary IDE controller, and the drives are designated as Master and Slave to differentiate between them. In the second configuration, the second hard drive is connected to the secondary IDE controller, and both drives are designated as Master.

Submit
85. Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.

Explanation

A smart card is a device that contains a microprocessor and permanent memory, allowing it to store and process data. It is used to securely store public and private keys for various purposes such as log on, e-mail signing and encryption, and file encryption. This ensures that sensitive information is protected and can only be accessed by authorized individuals. Therefore, the given answer correctly states that a smart card is used for secure storage of keys and contains a microprocessor and permanent memory.

Submit
86. Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Explanation

Anycast is a type of IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that has been assigned that address. This allows for efficient routing and load balancing, as the packet is automatically directed to the closest available interface. Anycast addresses are commonly used for services that need to be highly available and distributed across multiple locations.

Submit
87. Which of the following can be used to accomplish authentication? Choose all that apply

Explanation

Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to the use of unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify a person's identity. Passwords are commonly used to authenticate users by requiring them to enter a secret code or phrase. Tokens, such as smart cards or USB devices, can also be used to authenticate users by generating a unique code or providing a physical object that verifies their identity.

Submit
88. Which of the following expansion slots can be used to plug a SCSI adapter? Choose all that apply.

Explanation

VESA, PCI, and EISA expansion slots can be used to plug a SCSI adapter. VESA (Video Electronics Standards Association) is a standard for video display interfaces, but it can also support SCSI adapters. PCI (Peripheral Component Interconnect) is a standard for connecting peripheral devices to a computer motherboard, and it can support SCSI adapters. EISA (Extended Industry Standard Architecture) is an enhanced version of the ISA bus architecture, and it can also support SCSI adapters.

Submit
89. Which of the following are the types of parental control? Choose all that apply

Explanation

The types of parental control include content filter control, usage control, monitoring control, and usage management tool. Content filter control allows parents to restrict access to certain types of content. Usage control allows parents to set limits on the amount of time or specific times when devices can be used. Monitoring control allows parents to monitor their child's online activities. Usage management tool provides parents with tools to manage and track their child's device usage.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2011
    Quiz Created by
    11bRanger
Cancel
  • All
    All (89)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following refers to the data rate supported by a network...
Which of the following is the most common laptop battery found today?
Which of the following types of attacks is often performed by looking...
Which of the following devices provides input by analyzing printed...
Which of the following devices contains no moving parts and stores...
Which of the following software displays advertisements, whether or...
Which of the following stores user preferences related to a Web site?
Which of the following ports on a computer are used to connect a...
Which of the following is a technology that allows you to hear and...
Mark wants to connect a printer and mouse to his laptop. Which of the...
Which of the following can be installed in an AGP slot?
Which of the following features are related to power management?...
Which of the following interfaces has the ability to support digital...
Which of the following types of parental controls is used to limit...
Which of the following transmits all ATSC HDTV standards and supports...
Which of the following is an international standard for energy...
Which of the following programs can collect various types fo personal...
You have a wireless printer that is connected to your Windows XP...
You are responsible for tenchincal support at a company. One of the...
Which of the following protocols handles the reliable delivery data?
Which of the following statements is true about modem?
Which of the following ports is also known as PS/2
Which of the following storage devices uses SRAM or DRAM?
Which of the following color code is used for a PS/2 keyboard...
Which of the following refers to a location away from the computer...
Which of the following statements are true about USB? Choose two
Which of the following maximum resolutions does the UXGA video...
Which of the following devices is used for accessing the data on...
Which of the following devices can cause great harm to ones life with...
You are implementing wireless access at a defense contractor....
What is the mazimum resolution that the WUXGA video technology...
Which of the following statements about a riser card is true?
You have a customer who wants to install Windows XP professional on...
You are selecting RAM for a new PC. You are very concerned about...
Your customers Windows XP machine has become ususable due to some...
Your office uses Windows vista. A patch was applied automatically....
At what voltage does a USB host supply power to the USB bus?
Which of the following software can also be used as a basic security...
Which of the following aims to restrict certain dangerous substances...
Which of the following are the most likely causes of virus attack?...
Which of the following power sources are used to power a laptop?
Andrew has a personal computer. One morning, he starts his computer...
Which of the following can occur if the power cable runs along with...
Which of the following conditions does BIOS need to be updated? Choose...
Which of the following sleep modes is the most power hungry mode?
Which of the following switches of the XCOPY command copies the...
Which of the following are types of LCD monitors? Choose two
Which of the following terms refers to properitary software that is...
Which of the following enables third pary developers to create...
You are handling IT support for a sales company. One of the sales...
Your client currently has Windows 98 and wishes to upgrade to Windows...
Matk works as a Network admin. for NetTech inc. The network has 150...
Which of the following buses has a maximum data transfer rate of 2400...
Your customer is very concerned about security for Wi-Fi at his home....
Which of the following devics has its own BIOS?
Which of the following are dual core processors? Choose two.
Which of the following are types social engineering attacks? Choose...
Which of the following terms refers to an anti virus software file...
What is the difference between the USB 2.0 and IEEE 1394 bus...
Which of the following cryptographic algorithm uses public key and...
What does Wireless transport layer security (WTLS) provide for...
Which of the following statements about multi or authentication is...
Which of the following statements is true about a brownout?
Which of the following is the clock speed of the accelerated graphics...
Which of the following bus interfaces are used by the video capture...
Which of the following switches is used with XCOPY command to copy...
Which of the following methods is based on the usrs roles and...
Which of the following protocols transmits error messages and network...
Which fo the following substances are restricted under restriction of...
Which of the following AT Attachment(ATA) standards supports transfer...
Which of the following are serial interfaces? Choos all that apply
What is the maximum data transmission speed of IEE 802. 11b Wireless...
Which of the following sleep modes is also known as Hibernation in...
What is the maximum cable length to connect a device to an IEEE 1394 a...
You are working with a team that will be bringing new computers to a...
WHich of the following provides authentication, enryption and data...
In which of the following sizes are the Express card modules...
Which of the following statements about the DVI-I connector are true?...
Which of the following statements about the G3 state of a computer are...
What are the benefits of using Universal Serial bus 2.0 over legacy...
Mark has purchased a new working USB webcam. He connects the webcam to...
Which of the following display standards provides four times more...
Which of the following is the most common method used by attackers to...
You are installing two hard disk drives which of the following...
Which of the following statements about a smart card are true? Each...
Which of the following IPv6 address types is a single address that can...
Which of the following can be used to accomplish authentication?...
Which of the following expansion slots can be used to plug a SCSI...
Which of the following are the types of parental control? Choose all...
Alert!

Advertisement