Tb143 Unit 5-7 Study Guide

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gregbeal
G
Gregbeal
Community Contributor
Quizzes Created: 1 | Total Attempts: 59
Questions: 33 | Attempts: 59

SettingsSettingsSettings
Tb143 Unit 5-7 Study Guide - Quiz


If you fancy yourself a computer fanatic and are up to answering specifically designed questions that gauge your knowledge on TB143. It is a simple set of questions and therefore, it will be easy to answer.


Questions and Answers
  • 1. 

    Which file system can be used by all Microsoft operating systems?

    • A.

      FAT16

    • B.

      NTFS

    • C.

      DOS

    • D.

      Windows

    Correct Answer
    A. FAT16
    Explanation
    Page 5-3

    Rate this question:

  • 2. 

    Which of the following file types will save the most file space after you compress them?  

    • A.

      JPEG

    • B.

      MP3

    • C.

      TXT

    • D.

      Archive

    Correct Answer
    C. TXT
    Explanation
    Page 5-7 Text files are highly compressible

    Rate this question:

  • 3. 

    Creating a backup of your data files can be made easier if you:

    • A.

      Save image files to diskette

    • B.

      Place the data files in a separate partition

    • C.

      Create a System and Restore disk

    • D.

      Login as a standard user

    Correct Answer
    B. Place the data files in a separate partition
    Explanation
    Page 5-4

    Rate this question:

  • 4. 

    Which of the following will allow you to recover the data when a computer has been stolen from an office?

    • A.

      A backup copy of the data.

    • B.

      Police Report

    • C.

      Administrator priviledges

    • D.

      Remote access software

    Correct Answer
    A. A backup copy of the data.
    Explanation
    Page 5-22 thru 5-28

    Rate this question:

  • 5. 

    How often should you backup data?

    • A.

      Whenever you shut down the server

    • B.

      Once a year

    • C.

      Every five minutes

    • D.

      At least once a day

    Correct Answer
    D. At least once a day
    Explanation
    Page 5-9

    Rate this question:

  • 6. 

    The ______________   type of backup stores only those files that changed since the last backup?

    Correct Answer
    Incremental
    Explanation
    Page 5-13

    Rate this question:

  • 7. 

    What is the purpose of a signed driver?

    • A.

      Secures delivery of parcel packages.

    • B.

      It serves as a reliable and tested command interpreter between Windows and a hardware device.

    • C.

      It authenicates the URL and server of secure access web site or secured web application

    • D.

      Allows the driver software to be installed on a computer.

    Correct Answer
    B. It serves as a reliable and tested command interpreter between Windows and a hardware device.
    Explanation
    Pages 5-15, 5-16

    Rate this question:

  • 8. 

    Windows uses an update process to patch program code problems. Which update setting will automatically download patches but wait for you to install them?  

    • A.

      Automatic

    • B.

      Download Updates

    • C.

      Notify

    • D.

      Turn Off

    Correct Answer
    B. Download Updates
    Explanation
    Pages 5-18, 5-19

    Rate this question:

  • 9. 

    What is virtual memory and how is virtual memory created in Windows?

  • 10. 

    Your three-week old computer is hit with a nasty virus. You have secured your data files on a separate hard drive, but the system partition has an enormous amount of data corruption. Which of the following tools would be the best choice to fix this system?

    • A.

      LINUX install disk

    • B.

      Windows install CDs

    • C.

      DOS boot disk

    • D.

      System Restore CD

    Correct Answer
    D. System Restore CD
    Explanation
    Page 5-22 thru 5-25

    Rate this question:

  • 11. 

    While trying out a registry hack, you find that you have made a major mistake. Windows won’t finish its startup process, and you can’t get into the registry to undo your mistake. You decide to press F8 as you reboot, the _______________________ would be a first choice tool to fix the system?

    Correct Answer
    Last Known Good Configuration
    Explanation
    Page 5-22 to 5-25

    Rate this question:

  • 12. 

    How much current can a USB port on the back of a computer supply?  

    • A.

      50 mA at .5 volts

    • B.

      500 mA at 5 volts

    • C.

      USB 1.0 at 12mbps

    • D.

      USB 2.0 at 480mbps

    Correct Answer
    B. 500 mA at 5 volts
    Explanation
    Page 5-28

    Rate this question:

  • 13. 

    It is possible to use a USB or IEEE-1394 device to boot a computer and bypass its internal security devices. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Page 5-32

    Rate this question:

  • 14. 

    Renaming the Administrator account would:

    • A.

      Prevent access to the computer.

    • B.

      Give administrator priviledges to the guest account

    • C.

      Automatically be done in a domain environment

    • D.

      Close one potential security hole

    Correct Answer
    D. Close one potential security hole
    Explanation
    Pages 6-1, 6-2

    Rate this question:

  • 15. 

    Microsoft’s term for an account on a computer that is not attached to a network is:

    • A.

      Standalone account

    • B.

      Workgroup account

    • C.

      Local account

    • D.

      Domain account

    Correct Answer
    C. Local account
    Explanation
    Page 6-2

    Rate this question:

  • 16. 

    What is a hacker most likely not going to steal from a networked computer?

    • A.

      Passwords and account logins

    • B.

      Video game hacks

    • C.

      Credit card numbers

    • D.

      Personnel information

    Correct Answer
    B. Video game hacks
    Explanation
    Page 6-4 to 6-5

    Rate this question:

  • 17. 

    The process of verifying that the person typing is the actual authorized user is called ______________________.

    Correct Answer
    authentication
    Explanation
    Page 6-8

    Rate this question:

  • 18. 

    What is the purpose of a strong password?

    • A.

      It prevents unauthorized users from guessing their way into a system.

    • B.

      It demonstrates system integrity and stability.

    • C.

      It provides a mnemonic device for users to remember passwords

    • D.

      It overwrites weaker passwords

    Correct Answer
    A. It prevents unauthorized users from guessing their way into a system.
    Explanation
    Pages 6-10, 6-14

    Rate this question:

  • 19. 

    What is the most reliable and secure way to share resources between computers?

    • A.

      Copy files to and from diskettes

    • B.

      File transfer protocol with anonymous username

    • C.

      Modem connection over public telephone network

    • D.

      Create a user account on a Windows NT-based domain network

    Correct Answer
    D. Create a user account on a Windows NT-based domain network
    Explanation
    page 6-15

    Rate this question:

  • 20. 

    A software program is recording your keystrokes in an attempt to gather your password for your online bank. This type of program is usually described as:

    • A.

      A virus

    • B.

      Spyware

    • C.

      Trojan horse

    • D.

      Honeypot

    Correct Answer
    B. Spyware
    Explanation
    Pages 6-19, 6-20

    Rate this question:

  • 21. 

    You receive an urgent e-mail message from your online bank, warning you that without immediate action, your account is going to be disabled. If you click the provided link, then verify your account information, your money will be safe. Such a warning is most likely an example of Phishing.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Page 6-24

    Rate this question:

  • 22. 

    What type of virus uses the programming and scripting features found in applications?

    • A.

      Phishing

    • B.

      Key Logger

    • C.

      Spyware

    • D.

      Macro

    Correct Answer
    D. Macro
    Explanation
    Page 6-18

    Rate this question:

  • 23. 

    All of the USB connectors on the front of your desktop are in use, but you need a file from your flash drive. You run an extension USB cable from a connector that is never used on the back of the computer, but the USB port does not work. Which of the following would be most important when describing this problem to tech support?  

    • A.

      That you have multiple USB connections on the front of the PC

    • B.

      That it is an unused USB port

    • C.

      That your flash drive is USB 2.0

    • D.

      That your PC is powered on.

    Correct Answer
    B. That it is an unused USB port
    Explanation
    Page 7-2

    Rate this question:

  • 24. 

    A computer that reboots at random times and intervals is most likely experiencing:  

    • A.

      A software problem

    • B.

      A hardware problem

    • C.

      A user error

    • D.

      Automatic software upgrades

    Correct Answer
    B. A hardware problem
    Explanation
    Page 7-4

    Rate this question:

  • 25. 

    You are into your second day of trying to figure out why a vital application will not start on your computer. In the meantime, your deadline is approaching and no progress is being made. You should: 

    • A.

      Tell your boss you can't get it done

    • B.

      Throw the computer out the window

    • C.

      Complete your project on paper

    • D.

      Call tech support

    Correct Answer
    D. Call tech support
    Explanation
    Page 7-5

    Rate this question:

  • 26. 

    If I am having a problem with a computer, a USENET newsgroup, or a manufacturer's forum, would be a good place to find if others are having the same problem. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Page 7-6

    Rate this question:

  • 27. 

    Which of the following redundancy techniques is best fulfilled by a thorough and periodic backup strategy?  

    • A.

      Data Redundancy

    • B.

      Fault Tolerance

    • C.

      Updates

    • D.

      Establishing a Baseline

    Correct Answer
    A. Data Redundancy
    Explanation
    Page 7-10

    Rate this question:

  • 28. 

    Preventing failures altogether, and thus improving up time, is the goal of:

    • A.

      Environmental Controls

    • B.

      Power Management

    • C.

      Authorization and Authentication Measures

    • D.

      Anti-Virus/Anti-Spyware

    Correct Answer
    A. Environmental Controls
    Explanation
    Environment, Page 7-10

    Rate this question:

  • 29. 

    Often problems can be predicted ahead of time by comparing the current system performance against:

    • A.

      Competitor systems

    • B.

      State of the art, new techology

    • C.

      Published internet standards

    • D.

      A baseline

    Correct Answer
    D. A baseline
    Explanation
    Page 7-11

    Rate this question:

  • 30. 

    A surge suppressor is designed to provide uninterruptible power to a system.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False, designed to remove power spikes. Page 7-14

    Rate this question:

  • 31. 

    What is the most effective way to protect a computer from malware?

    • A.

      Install and maintain an antivirus program, a spyware detector, and an adware and cookie blocker.

    • B.

      Only use diskettes to transfer data between computers

    • C.

      Only use a Macintosh

    • D.

      Contact tech support every week.

    Correct Answer
    A. Install and maintain an antivirus program, a spyware detector, and an adware and cookie blocker.
    Explanation
    Page 6-22, 6-23

    Rate this question:

  • 32. 

    A possible danger following a blackout is a:  

    • A.

      Sag

    • B.

      Storm

    • C.

      Flood

    • D.

      Surge

    Correct Answer
    D. Surge
    Explanation
    Page 7-13

    Rate this question:

  • 33. 

    What could be a warning sign that your computer power supply is about to fail?

    • A.

      Random reboots

    • B.

      ID10T errors

    • C.

      Virus Warnings

    • D.

      Your mother keeps calling

    Correct Answer
    A. Random reboots
    Explanation
    Page 7-15

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 07, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 26, 2011
    Quiz Created by
    Gregbeal
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.