Strata Practice Exam 1

90 Questions

Settings
Strata Practice Exam 1

Strata practice exam, questions 10/12/11


Questions and Answers
  • 1. 
    • A. 

      Install the second hard drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

    • B. 

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drice is on primary IDE contoller. Designate but drives as Master.

    • C. 

      Install the second hard disk drice on the secondary IDE controller ensuring that the first hard disk drive is on the primary contoller. Designate the second hard disk drive as Slave.

    • D. 

      Install both the hard disk drives on the primary IDE controller. Deignate both drives as Secondary

  • 2. 
    Which of the following maximum resolutions does the UXGA video technology supports?
    • A. 

      2560 x 1600

    • B. 

      1600 x 1200

    • C. 

      2048 x 1536

    • D. 

      1280 x 1024

  • 3. 
    Which of the following sleep modes is the most power hungry mode?
    • A. 

      S1

    • B. 

      S2

    • C. 

      S0

    • D. 

      S3

  • 4. 
    Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?
    • A. 

      /p

    • B. 

      /s

    • C. 

      /r

    • D. 

      /o

  • 5. 
    Step 1 - Talk to the customer Step 2 - Document your work Step 3 - Continue to gather information Step 4 - Eliminate possibilities to find the problem Step 5 - Test your results
  • 6. 
    Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.
    • A. 

      It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption.

    • B. 

      It is a device that works as an interface between a computer and a network.

    • C. 

      It is a device that routes data packets between computers in different networks

    • D. 

      It is a device that contains a microprocessor and permanent memory.

  • 7. 
    Which of the following ports is also known as PS/2
    • A. 

      6 - pin Mini-Din connector

    • B. 

      5- pin DIN connector

    • C. 

      4 - pin Mini-Din connector

    • D. 

      USB connector

  • 8. 
    Which of the following statements are true about USB? Choose two
    • A. 

      USB supports hot plugging

    • B. 

      You can connect up to 127 peripheral devices to a single USB port

    • C. 

      You can connect up to 16 peripheral devices to a single USB port

    • D. 

      USB does not support plug n play installation

  • 9. 
    Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?
    • A. 

      Min in the middle attack

    • B. 

      Denial of service (DoS) attack

    • C. 

      Buffer overflow attack

    • D. 

      Shoulder surfing attack

  • 10. 
    You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?
    • A. 

      His operating system is incompatible.

    • B. 

      A firewall is blocking him

    • C. 

      His laptop is incompatable

    • D. 

      MAC filtering is blocking him

  • 11. 
    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?
    • A. 

      Session initiation Protocol

    • B. 

      Streaming Media

    • C. 

      HTTP streaming

    • D. 

      Slipstreaming

  • 12. 
    Which of the following refers to the data rate supported by a network conncection or interface?
    • A. 

      Bandwidth

    • B. 

      Preboot Execution Environment (PXE)

    • C. 

      Branding

    • D. 

      Spam

  • 13. 
    Which of the following are serial interfaces? Choos all that apply
    • A. 

      EPP

    • B. 

      USB

    • C. 

      Firewire

    • D. 

      IEEE 1284

  • 14. 
    Which of the following devics has its own BIOS?
    • A. 

      Hard disk drive

    • B. 

      South card

    • C. 

      Network interface card

    • D. 

      Video adapter

  • 15. 
    Which of the following are dual core processors? Choose two.
    • A. 

      AMD Athlon(tm) 64 X2

    • B. 

      Intel Pentium 4

    • C. 

      Intel(r) Pentium(r) processor Extreme Ediditon

    • D. 

      AMD Athlon(tm)

  • 16. 
    Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?
    • A. 

      /q

    • B. 

      /o

    • C. 

      /s

    • D. 

      /e

  • 17. 
    WHich of the following provides authentication, enryption and data integrity for wireless devices?
    • A. 

      PAP

    • B. 

      WAN

    • C. 

      WAP

    • D. 

      WTLS

  • 18. 
    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
    • A. 

      Bluetooth

    • B. 

      802. 11

    • C. 

      802. 11b

    • D. 

      Infrared

  • 19. 
    What is the mazimum resolution that the WUXGA video technology supports?
    • A. 

      2048 x 1536

    • B. 

      1920 x 1200

    • C. 

      3840 x 2400

    • D. 

      1600 x 1200

  • 20. 
    What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply
    • A. 

      Data integnity

    • B. 

      Encryption

    • C. 

      Bandwidth

    • D. 

      Authentication

  • 21. 
    Which of the following software displays advertisements, whether or not the user has consented?
    • A. 

      Trojan horse

    • B. 

      Honeypot

    • C. 

      Spyware

    • D. 

      Adware

  • 22. 
    Which of the following protocols transmits error messages and network statistics?
    • A. 

      ICMP

    • B. 

      DHCP

    • C. 

      TCP

    • D. 

      NNTP

  • 23. 
    Which of the following power sources are used to power a laptop?
    • A. 

      Solar panel

    • B. 

      AC power

    • C. 

      Battery

    • D. 

      Docking station

  • 24. 
    Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.
    • A. 

      Educate users of the client computers about the problems arising due to malware

    • B. 

      Educate users of the client computers to avoid malware

    • C. 

      Prevent users of the client computers from executing any programs.

    • D. 

      Assign read only permission to the users for accessing the hard disk drives of the client computers.

  • 25. 
    You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?
    • A. 

      128 Megabytes

    • B. 

      64 Megabytes

    • C. 

      2 Gigabytes

    • D. 

      1 Gigabyte

  • 26. 
    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?
    • A. 

      Rambus

    • B. 

      Non Parity RAM

    • C. 

      ECC RAM

    • D. 

      Logic Parity RAM

  • 27. 
    What is the maximum data transmission speed of IEE 802. 11b Wireless networks?
    • A. 

      54 Mbps

    • B. 

      600 Mbps

    • C. 

      600 Gbps

    • D. 

      11 Mbps

  • 28. 
    Which of the following types of parental controls is used to limit access to the internet contents?
    • A. 

      Content filter control

    • B. 

      Bandwidth control

    • C. 

      Usage management tool

    • D. 

      Monitoring control

  • 29. 
    Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two
    • A. 

      BIOS has become outdated.

    • B. 

      The CMOS battery has failed.

    • C. 

      The CMOS chip has failed

    • D. 

      Software stored in the CMOS battery is infected by a virus.

  • 30. 
    What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply
    • A. 

      Easy configuration of hardware devices

    • B. 

      Expansion

    • C. 

      Security

    • D. 

      Speed

  • 31. 
    Which of the following sleep modes is also known as Hibernation in Windows operating systems?
    • A. 

      S3

    • B. 

      S2

    • C. 

      S4

    • D. 

      S1

  • 32. 
    Which of the following can occur if the power cable runs along with the computer network cable?
    • A. 

      EMI

    • B. 

      ESD

    • C. 

      Broadcast Storm

    • D. 

      Surge

  • 33. 
    Which of the following are types social engineering attacks? Choose two
    • A. 

      An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee

    • B. 

      An unauthorized person inserts and intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts

    • C. 

      An unauthorized person calls a user to be a system adminstrator in order to get the users password

    • D. 

      An unauthorized person modifies packet headers by using someone elses IP address to his identity

  • 34. 
    Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?
    • A. 

      Simply put the Windows Recovery CD in and the recovery process will start

    • B. 

      Reinstall Windows

    • C. 

      Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state

    • D. 

      Simply uninstall any new software.

  • 35. 
    Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?
    • A. 

      Spyware

    • B. 

      Shareware

    • C. 

      Freeware

    • D. 

      Adware

  • 36. 
    Which of the following buses has a maximum data transfer rate of 2400 Mbps?
    • A. 

      FireWire 800

    • B. 

      ESATA

    • C. 

      USB 1.1

    • D. 

      USB 2.0

  • 37. 
    Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
    • A. 

      Unicast

    • B. 

      Multicast

    • C. 

      Loopback

    • D. 

      Anycast

  • 38. 
    Which of the following can be installed in an AGP slot?
    • A. 

      Video card

    • B. 

      RAM

    • C. 

      Micoprocessor

    • D. 

      Modem card

  • 39. 
    At what voltage does a USB host supply power to the USB bus?
    • A. 

      15 volts

    • B. 

      5 vots

    • C. 

      50 volts

    • D. 

      3 volts

  • 40. 
    Which of the following enables third pary developers to create capabilites to extend an application?
    • A. 

      Plug in

    • B. 

      Virtual machine

    • C. 

      Hotfix

    • D. 

      JavaScript

  • 41. 
    Which of the following statements about multi or authentication is true?
    • A. 

      It uses a key distribution center (KDC)

    • B. 

      It protects a computer from a malicious software such as worms

    • C. 

      It involves two or more methods as part of the authentication process

    • D. 

      It is a process in which a client process and a server are required to prove their identities to each other before performing any application function

  • 42. 
    What is the difference between the USB 2.0 and IEEE 1394 bus standards?
    • A. 

      IEEE 1394 is faster than USB 2.0

    • B. 

      IEEE 1393 supports hot swapping

    • C. 

      IEEE 1394 is slower than USB 2.0

    • D. 

      USB 2.0 supports Plug and Play feature

  • 43. 
    Which of the following devices provides input by analyzing printed text, handwriting, or an abject?
    • A. 

      Webcam

    • B. 

      Image Scanner

    • C. 

      Packet analyzer

    • D. 

      BD-ROM drive

  • 44. 
    Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?
    • A. 

      Mercury(Hg)

    • B. 

      Lead(Pb)

    • C. 

      Iron(Fe)

    • D. 

      Cadmium(Cd)

  • 45. 
    Which of the following statements about a riser card is true?
    • A. 

      It is used to connect a computer in a network

    • B. 

      It is used to connect extra microprocessors

    • C. 

      It provides extra memory for expansion cards

    • D. 

      It is used to extend slots for expansion cards.

  • 46. 
    Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?
    • A. 

      E book reader

    • B. 

      Memory card reader

    • C. 

      Smart card reader

    • D. 

      Barcode reader

  • 47. 
    Which of the following can be used to accomplish authentication? Choose all that apply
    • A. 

      Biometrics

    • B. 

      Enryption

    • C. 

      Passwaord

    • D. 

      Token

  • 48. 
    Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two
    • A. 

      SMPS

    • B. 

      Floppy drive

    • C. 

      Monitor

    • D. 

      Keyboard

  • 49. 
    Which of the following ports on a computer are used to connect a keyboard? Choose two
    • A. 

      USB

    • B. 

      DB-25

    • C. 

      PS/2

    • D. 

      DB-9

  • 50. 
    Which of the following features are related to power management? Choose two
    • A. 

      Hot plugging

    • B. 

      Hibernate mode

    • C. 

      Standy mode

    • D. 

      Safe mode

  • 51. 
    Which of the following are types of LCD monitors? Choose two
    • A. 

      SVGA

    • B. 

      Active Matrix

    • C. 

      Passive Matrix

    • D. 

      X-Matrix

  • 52. 
    Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?
    • A. 

      DVI

    • B. 

      S-Video

    • C. 

      SVGA

    • D. 

      HDMI

  • 53. 
    You are handling IT support for a sales company. One of the sales representitives complains that his laptop does not have a network card. You wish to add a type of expansion card should you use?
    • A. 

      MCA

    • B. 

      PCMCIA

    • C. 

      PCI

    • D. 

      AGP

  • 54. 
    Which of the following terms refers to an anti virus software file that is updated from time to time to protect a computer from new viruses?
    • A. 

      Definition

    • B. 

      Modules

    • C. 

      Service Pack

    • D. 

      Hotfix

  • 55. 
    You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorith. Which encryption standards should you use?
    • A. 

      WEP

    • B. 

      WPA

    • C. 

      TKIP

    • D. 

      WPA 2

  • 56. 
    What is the maximum cable length to connect a device to an IEEE 1394 a port?
    • A. 

      12 meters

    • B. 

      10 meters

    • C. 

      4.5 meters

    • D. 

      5 meters

  • 57. 
    Which of the following is an international standard for energy efficient consumer products?
    • A. 

      Energy star rating

    • B. 

      Standby mode

    • C. 

      Trusted Computer System Evaluation Criteria(TCSEC

    • D. 

      Advanced Configuration and Power Interface(ACPI)

  • 58. 
    Which of the following storage devices uses SRAM or DRAM?
    • A. 

      USB flash drive

    • B. 

      Solid state drive(SSD)

    • C. 

      Blu ray disc

    • D. 

      CD drive

  • 59. 
    You are working with a team that will be bringing new computers to a sales department at a company. The sales team would like to keep not only their old find on the new PCs. What should you do?
    • A. 

      Do a system backup (Complete) on each old machine, then restore it into the new machines.

    • B. 

      Use the disk management tool to move everything to the new computer.

    • C. 

      Use the User state migration tool to move the system settings and files to the new machines

    • D. 

      Copy the files and the windows registry to a removable media then copy it into the new machines.

  • 60. 
    Which of the following programs can collect various types fo personal information, such as internet surfing habits, and Web sites that the user has visited?
    • A. 

      Malware

    • B. 

      Spyware

    • C. 

      Honeypot

    • D. 

      Worm

  • 61. 
    Which of the following expansion slots can be used to plug a SCSI adapter? Choose all that apply.
    • A. 

      VESA

    • B. 

      Slot 2

    • C. 

      PCI

    • D. 

      Slot 1

    • E. 

      EISA

  • 62. 
    Which of the following AT Attachment(ATA) standards supports transfer mode UltraDMA/133?
    • A. 

      ATA-6

    • B. 

      ATA-7

    • C. 

      ATA-4

    • D. 

      ATA-5

  • 63. 
    Which of the following color code is used for a PS/2 keyboard connector on new motherboards?
    • A. 

      Purple

    • B. 

      Pink

    • C. 

      Green

    • D. 

      Blue

  • 64. 
    Which of the following cryptographic algorithm uses public key and private key to enrypt or decrypt data?
    • A. 

      Hashing

    • B. 

      Symmetric

    • C. 

      Asymmetric

    • D. 

      Numeric

  • 65. 
    Which of the following are the types of parental control? Choose all that apply
    • A. 

      Content filter control

    • B. 

      Usage control

    • C. 

      Monitoring control

    • D. 

      Usage management tool

  • 66. 
    Which of the following interfaces has the ability to support digital audio as well as video through a single cable?
    • A. 

      VGA

    • B. 

      HDMI

    • C. 

      SVGA

    • D. 

      DVI

  • 67. 
    In which of the following sizes are the Express card modules available? Choose two
    • A. 

      54 mm Wide

    • B. 

      64 mm Wide

    • C. 

      20 mm Wide

    • D. 

      34 mm Wide

  • 68. 
    Which of the following statements about the DVI-I connector are true? Choose two
    • A. 

      It contains 4 more pins that the DVI-D connector

    • B. 

      It used only for digital signal connection

    • C. 

      It is used for both digital and analog signal connections

    • D. 

      It contains 15 more pins than the DVI-D connector

  • 69. 
    Your client currently has Windows 98 and wishes to upgrade to Windows XP. What is the best way to accomplish this?
    • A. 

      Buy and install the Windows XP Upgrade

    • B. 

      Install a full copy of windows XP

    • C. 

      First upgrade to windows 2000, then to windows XP

    • D. 

      You cannot upgrade from Windows 98 to XP

  • 70. 
    Which of the following is the most common laptop battery found today?
    • A. 

      NiMH

    • B. 

      Lithium-ion

    • C. 

      Energizer

    • D. 

      NiCad

  • 71. 
    Which of the following refers to a location away from the computer center where document copies and backups are kept?
    • A. 

      Off Site storage

    • B. 

      Network attached storage

    • C. 

      Storage Area network

    • D. 

      On site storage

  • 72. 
    Which of the following statements is true about modem?
    • A. 

      It amplifies the digital signals

    • B. 

      It converts digital signals into analog signals and vice versa

    • C. 

      It reduces the noise in analog signal.

    • D. 

      It converts AC current to DC current and vice versa

  • 73. 
    Which of the following devices contains no moving parts and stores data in a digital format?
    • A. 

      Solid state drive

    • B. 

      Cartridge tape drive

    • C. 

      Floppy disk drive

    • D. 

      Hard disk drive

  • 74. 
    Which of the following statements about the G3 state of a computer are true? Choose two
    • A. 

      It is a normal state of a computer

    • B. 

      A complete power loss occurs in this state such as power cord unplugged from a computer

    • C. 

      A computer can be disassimble in this state

    • D. 

      This state is also known as soft off.

  • 75. 
    Which of the following display standards provides four times more pixels than an 800x600 display?
    • A. 

      SXGA

    • B. 

      SXGA+

    • C. 

      SVGA

    • D. 

      UXGA

  • 76. 
    Which of the following statements is true about a brownout?
    • A. 

      It is the situation of voltage drop in power supply

    • B. 

      It supplies power to the devices in case of power failure

    • C. 

      It is a brief decrease in voltage to power source

    • D. 

      It is a device used to filter out the effects of voltage spikes

  • 77. 
    Which of the following protocols handles the reliable delivery data?
    • A. 

      TCP

    • B. 

      ARP

    • C. 

      IPX

    • D. 

      UDP

  • 78. 
    Your office uses Windows vista. A patch was applied automatically. Suddenly the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their device manager, you notice there is on exlamation point next to the scanner. What should you do now?
    • A. 

      Reinstall vista

    • B. 

      Find a Vista compatible scanner

    • C. 

      Manually uninstall and reinstall the device driver

    • D. 

      Roll back the patch

  • 79. 
    You have a wireless printer that is connected to your Windows XP laptop via infrared, and it prints proplerly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?
    • A. 

      The printer driver is uninstalled from the laptop

    • B. 

      The printer driver is not updated on the laptop

    • C. 

      Printer is located at the distance of more than three feet from the laptop

    • D. 

      The printing option is disabled in the control panel on the laptop

  • 80. 
    Which of the following is the most common method used by attackers to identify wireless networks?
    • A. 

      Back door

    • B. 

      Packet sniffing

    • C. 

      Packet filtering

    • D. 

      War driving

  • 81. 
    Which of the following conditions does BIOS need to be updated? Choose two
    • A. 

      If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS

    • B. 

      If the operating system installed on the computer has bugs

    • C. 

      If the BIOS does not support new devices

    • D. 

      If the software application installed on the computer stops responding frequintly.

  • 82. 
    Which of the following is the clock speed of the accelerated graphics port 8X expansion slot?
    • A. 

      266 MHz

    • B. 

      133 MHz

    • C. 

      533 MHz

    • D. 

      633 MHz

  • 83. 
    Which of the following stores user preferences related to a Web site?
    • A. 

      Cookie

    • B. 

      SSID

    • C. 

      Local user profile

    • D. 

      MAC address

  • 84. 
    Which of the following software can also be used as a basic security measure?
    • A. 

      Adware

    • B. 

      Visual TimeAnalyzer

    • C. 

      Screensaver

    • D. 

      Cookie

  • 85. 
    Which of the following aims to restrict certain dangerous substances commonly used in electronics equipment?
    • A. 

      RoHS directive

    • B. 

      IEEE standards

    • C. 

      IETF standards

    • D. 

      W3C standards

  • 86. 
    Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computer, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?
    • A. 

      A Firewall

    • B. 

      WPA ecryption

    • C. 

      Mac Filtering

    • D. 

      WEP encryption

  • 87. 
    Which of the following are the most likely causes of virus attack? Choose all that apply
    • A. 

      Installing an application from an unreliable source

    • B. 

      Downloading a file from an unknown Website

    • C. 

      Installing a DLL file from an unrelieable souce

    • D. 

      Using a floppy, a compact disk, or a pen drive from an unreliable souce

  • 88. 
    Which of the following bus interfaces are used by the video capture cards? Choose two.
    • A. 

      VESA

    • B. 

      AGP

    • C. 

      PCIe

    • D. 

      EISA

  • 89. 
    Which of the following methods is based on the usrs roles and responsibilites?
    • A. 

      Madnatory acces control

    • B. 

      System access control

    • C. 

      Role-based access control

    • D. 

      Discretionary access control

  • 90. 
    Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and ginds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functional. What should Mark do first to resolve the issure?
    • A. 

      Verify that the USB webcam

    • B. 

      Purchase another model of the USB webcam

    • C. 

      Change the computers motherboard.

    • D. 

      Replace the USB port wires with a new one