Hardest Technical Support Quiz! Trivia

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rishabkumar
R
Rishabkumar
Community Contributor
Quizzes Created: 1 | Total Attempts: 9,678
Questions: 60 | Attempts: 9,688

SettingsSettingsSettings
Hardest Technical Support Quiz! Trivia - Quiz

.


Questions and Answers
  • 1. 

    One of the customers has a disability that limits his working with both hands. You want to enable the accessibility feature on his Windows XP computer that will allow him to type using a virtual keyboard. What accessibility will you ask the user to enable?

    • A.

      Toggle Key

    • B.

      Visual Keyboard

    • C.

      On Screen Keyboard

    • D.

      Sticky keys

    Correct Answer
    C. On Screen Keyboard
    Explanation
    The correct accessibility feature that should be enabled for the customer with a disability that limits his working with both hands is the On Screen Keyboard. This feature provides a virtual keyboard on the computer screen that can be operated using a mouse or other pointing device, allowing the user to type without the need for physical keyboard input.

    Rate this question:

  • 2. 

    Which of the following files is used to resolve web site names (FQDN) to IP addresses in a Windows XP based computer when a WINS server is unavailable?

    • A.

      LMHOSTS

    • B.

      LMHOST.DAT

    • C.

      HOSTS

    • D.

      DSN.LOG

    Correct Answer
    C. HOSTS
    Explanation
    The HOSTS file is used to resolve web site names (FQDN) to IP addresses in a Windows XP based computer when a WINS server is unavailable. This file is a local text file that contains mappings of IP addresses to host names. When a user enters a web site name, the computer first checks the HOSTS file to see if there is a corresponding IP address. If there is, it uses that IP address to connect to the website. If not, it will then try to resolve the name using other methods such as DNS.

    Rate this question:

  • 3. 

    What performs all cryptographic operations in Windows XP?

    • A.

      SSPI

    • B.

      CryptoAPI

    • C.

      CSP

    • D.

      IPSec

    Correct Answer
    B. CryptoAPI
    Explanation
    CryptoAPI performs all cryptographic operations in Windows XP. It is a set of programming interfaces that allows developers to add security features such as encryption, decryption, and digital signatures to their applications. CryptoAPI provides a consistent interface for accessing cryptographic services, including symmetric and asymmetric encryption algorithms, hashing algorithms, and key management. It also supports various cryptographic protocols and standards, making it a comprehensive solution for cryptographic operations in Windows XP.

    Rate this question:

  • 4. 

    A user reports that he has lost his Windows XP CD however he had earlier taken the backup of the Windows XP Home CD on one of the partitions of his computer. He also informs that the partitions on the hard drive are FAT 32. The customer has windows ME boot disk and wishes to do a parallel install. What will you advise the customer to do?

    • A.

      Boot with the Windows Me CD and run winnt32.exe from the XP backup.

    • B.

      Ask him to get a new Windows XP CD

    • C.

      Boot with the Windows Me CD and run winnt.exe from the XP backup

    • D.

      Ask customer to create XP boot disks.

    Correct Answer
    C. Boot with the Windows Me CD and run winnt.exe from the XP backup
    Explanation
    The customer should be advised to boot with the Windows Me CD and run winnt.exe from the XP backup. Since the customer has lost his Windows XP CD, using the backup on one of the partitions is the best option. Additionally, since the partitions on the hard drive are FAT 32, it is compatible with both Windows Me and Windows XP. Running winnt.exe from the XP backup will allow the customer to perform a parallel install of Windows XP.

    Rate this question:

  • 5. 

    A customer gets the error "Error Getting Network Address (11002)" or "Error Getting Network Address (11004)" when he tries to check or send mail using Eudora. How will locate the cause of the issue

    • A.

      Incorrect POP3 or SMTP server settings

    • B.

      Firewall

    • C.

      Corrupt TCP\IP protocol

    • D.

      Issue with the ISP servers

    Correct Answer
    A. Incorrect POP3 or SMTP server settings
    Explanation
    If a customer is getting the error "Error Getting Network Address (11002)" or "Error Getting Network Address (11004)" when trying to check or send mail using Eudora, the most likely cause of the issue is incorrect POP3 or SMTP server settings. This means that the customer has not entered the correct server information for their email account in Eudora. By verifying and correcting the POP3 and SMTP server settings, the issue should be resolved.

    Rate this question:

  • 6. 

    While trying to uninstall Norton Antivirus on a Windows XP based computer, you get a message - Error 1719. The Windows Installer service could not be accessed. What would be one of the basic steps we would perform to troubleshoot this issue?

    • A.

      Reinstall the Norton Antivirus

    • B.

      Re-Register the Windows Installer

    • C.

      Rename msiexec.dll

    • D.

      None of the above

    Correct Answer
    B. Re-Register the Windows Installer
    Explanation
    To troubleshoot the "Error 1719" message and resolve the issue, one of the basic steps would be to re-register the Windows Installer. Re-registering the Windows Installer can help fix any issues with its configuration or registration, allowing it to be accessed properly. This can be done by opening the command prompt as an administrator and running the command "msiexec /unregister" followed by "msiexec /regserver". This will unregister and then re-register the Windows Installer, potentially resolving the problem.

    Rate this question:

  • 7. 

    You are in charge of managing migration of user state data from existing Windows 2000 Professional computers to recently purchased Windows XP Professional computers. Which of the following is the migration tool?

    • A.

      Fastwiz.exe

    • B.

      Sysprep

    • C.

      Setupmgr

    • D.

      All of the above

    Correct Answer
    A. Fastwiz.exe
    Explanation
    Fastwiz.exe is the migration tool in this scenario. Fastwiz.exe is a utility that allows for the migration of user state data from one computer to another. It is specifically designed for migrating user state data from Windows 2000 Professional computers to Windows XP Professional computers. Sysprep is a tool used for preparing Windows installations for imaging and deployment, while Setupmgr is a tool used for creating answer files for unattended installations. Therefore, the correct answer is Fastwiz.exe.

    Rate this question:

  • 8. 

    Creating Identities in Outlook Express is equivalent to creating what in Eudora?

    • A.

      Personalities

    • B.

      Preferences

    • C.

      Profiles

    • D.

      Account

    Correct Answer
    A. Personalities
    Explanation
    Creating Identities in Outlook Express is equivalent to creating Personalities in Eudora. Personalities in Eudora allow users to manage multiple email accounts and send emails from different identities. Similarly, Identities in Outlook Express enable users to manage multiple email accounts, each with its own settings, signatures, and email folders. Both features provide a convenient way to separate and organize emails from different accounts or personalities within the email client.

    Rate this question:

  • 9. 

    Which of the following files can be downloaded from the Symantec site in order to remove the Norton antivirus 2003 and earlier versions

    • A.

      RniSUPG.exe

    • B.

      Rnav2003.exe

    • C.

      Uninstall.exe

    • D.

      Sym_rem2003.exe

    Correct Answer
    B. Rnav2003.exe
    Explanation
    Rnav2003.exe is the correct answer because it is a file that can be downloaded from the Symantec site specifically for the purpose of removing Norton antivirus 2003 and earlier versions. The other files listed are not specifically designed for this purpose.

    Rate this question:

  • 10. 

    You are trying to maximize your system resources to make your computer start faster. When you open the Windows System Configuration Utility to check which programs are loading at startup, you see a file called ccApp.exe. You want to know what will happen if you uncheck the program to stop it from loading on startup.

    • A.

      CcApp is a spyware which needs to be disabled from startup option. Download a spyware removal tool and remove it.

    • B.

      CcApp is an important part of the protection that Norton AntiVirus or Norton Internet Security provides and should not be disabled at startup

    • C.

      CcApp is a virus/ Malaware

    • D.

      None of the above

    Correct Answer
    B. CcApp is an important part of the protection that Norton AntiVirus or Norton Internet Security provides and should not be disabled at startup
    Explanation
    Disabling ccApp.exe from loading at startup will prevent Norton AntiVirus or Norton Internet Security from functioning properly as ccApp.exe is an important component of these security programs. It is not a spyware, virus, or malware, but a legitimate program necessary for the proper functioning of Norton security software.

    Rate this question:

  • 11. 

    Which of the following run line command can be used to open Excel in safe mode:

    • A.

      Excel /s

    • B.

      Excel /safe

    • C.

      Excel /a

    • D.

      Excel /safe_mode

    Correct Answer
    B. Excel /safe
    Explanation
    The correct answer is "Excel /safe" because the /safe command line switch is used to start Excel in safe mode. Safe mode allows Excel to start without loading any add-ins or customization files, which can help troubleshoot issues caused by these elements.

    Rate this question:

  • 12. 

    Which of the following dictionary file is used to store the words added by users in MS Word:

    • A.

      • User.dic

    • B.

      • Custom.dic

    • C.

      • Wspell.dic

    • D.

      • Normal.dot

    Correct Answer
    B. • Custom.dic
    Explanation
    The correct answer is "Custom.dic". In MS Word, the "Custom.dic" dictionary file is used to store the words added by users. This file allows users to personalize their spell check by adding new words to the dictionary. It is separate from the default dictionary files and can be customized according to the user's preferences.

    Rate this question:

  • 13. 

    Launch command for Outlook Express from run window is:

    • A.

      Msimn

    • B.

      Outlook.exe

    • C.

      OE.exe

    • D.

      OEmail.exe

    Correct Answer
    A. Msimn
    Explanation
    The launch command for Outlook Express from the run window is "Msimn".

    Rate this question:

  • 14. 

    What is a GPF?

    • A.

      A hard drive with insufficient available space

    • B.

      Part of the Microsoft General Procedures For Windows operating systems

    • C.

      A Windows General Protection Fault

    • D.

      All of the above

    Correct Answer
    C. A Windows General Protection Fault
    Explanation
    The correct answer is "A Windows General Protection Fault." A GPF, or General Protection Fault, is an error that occurs in the Windows operating system when a program tries to access a protected memory location. It is a type of software exception that can cause the program to crash or freeze. This answer is correct because it accurately describes what a GPF is in the context of Windows operating systems.

    Rate this question:

  • 15. 

    An external modem connects to a PC via:

    • A.

      A docking port

    • B.

      A serial port

    • C.

      A USB Port

    • D.

      Either B or C above

    Correct Answer
    D. Either B or C above
    Explanation
    An external modem can connect to a PC via either a serial port or a USB port. Both of these ports can be used to establish a connection between the modem and the PC. The choice between the two would depend on the specific hardware and connectivity options available on the PC.

    Rate this question:

  • 16. 

    What is the command to install recovery console on a computer? (Assume x: is the CD drive)

    • A.

      X:\i386\winnt32.exe /recoverycons

    • B.

      X:\i386\winnt32.exe /r

    • C.

      X:\i386\winnt32.exe /cmdcon

    • D.

      X:\i386\winnt32.exe /cmdcons

    Correct Answer
    D. X:\i386\winnt32.exe /cmdcons
    Explanation
    The correct answer is x:\i386\winnt32.exe /cmdcons. This command is used to install the recovery console on a computer. The "/cmdcons" parameter specifies that the command console should be installed. The "x:\i386\winnt32.exe" is the path to the installation file for the recovery console.

    Rate this question:

  • 17. 

    Customer calls and says that whenever he right clicks on a File/Folder and clicks on delete, it does not go into the Recycle Bin, but gets permanently deleted. What will you do to fix this problem for the customer?

    • A.

      Ask the customer to press Shft+Del to send the files to the Recycle Bin

    • B.

      Inform the customer that Recycle Bin only works when you are in Safe Mode

    • C.

      Right click on Recycle Bin, select Properties, and uncheck

    • D.

      Right click on Recycle Bin, select Properties, and check

    Correct Answer
    C. Right click on Recycle Bin, select Properties, and uncheck
    Explanation
    The correct answer is to right click on Recycle Bin, select Properties, and uncheck. By unchecking the option, the files and folders will no longer get permanently deleted when the customer right clicks and selects delete. Instead, they will be sent to the Recycle Bin where they can be restored if needed.

    Rate this question:

  • 18. 

    Before you can use any PC for a dial-up connection, what must be installed and configured on the PC?

    • A.

      Web browser

    • B.

      Client IP address

    • C.

      NIC

    • D.

      Modem

    Correct Answer
    D. Modem
    Explanation
    In order to establish a dial-up connection on a PC, a modem must be installed and configured. A modem is a hardware device that allows the computer to transmit and receive data over telephone lines. It converts the digital signals from the computer into analog signals that can be transmitted over the phone line, and vice versa. Without a modem, the PC would not be able to establish a connection with the dial-up network.

    Rate this question:

  • 19. 

    Which uses tunneling?

    • A.

      ISDN

    • B.

      Router

    • C.

      VPN

    • D.

      ATM

    Correct Answer
    C. VPN
    Explanation
    A VPN (Virtual Private Network) uses tunneling to create a secure and encrypted connection over a public network, such as the internet. Tunneling is the process of encapsulating data packets within other packets to ensure that the original data remains secure and private during transmission. By using tunneling, a VPN can establish a private and secure connection between remote users and a private network, allowing them to access resources and communicate securely over an untrusted network like the internet.

    Rate this question:

  • 20. 

    You are a desktop support technician. A user calls & complains that till yesterday he was able to view his CD drive in My Computer. Now today when he turned his computer on he is not able to view the CD drive. What could be done to fix the problem?

    • A.

      Download & reinstall the driver for the CD drive.

    • B.

      Boot the computer using the Windows XP bootable disk & repair windows.

    • C.

      Open registry editor & delete the Upper & Lower filter keys.

    • D.

      CD drive is faulty. Refer the user to hardware vendor.

    Correct Answer
    C. Open registry editor & delete the Upper & Lower filter keys.
    Explanation
    By opening the registry editor and deleting the Upper and Lower filter keys, it is possible to fix the problem with the CD drive not being visible in My Computer. The Upper and Lower filter keys are registry entries that can sometimes cause issues with CD/DVD drives. By removing these keys, it can resolve any conflicts or errors that may be preventing the CD drive from being recognized by the operating system.

    Rate this question:

  • 21. 

    You are using Norton 360 and unable to browse a few websites. What could be the reason to this?

    • A.

      Norton has gone bad, need to uninstall/reinstall it

    • B.

      Windows has gone bad need to uninstall/reinstall the OS

    • C.

      Check the firewall settings of Norton

    • D.

      ISP/website problem

    Correct Answer
    C. Check the firewall settings of Norton
    Explanation
    The reason for being unable to browse a few websites while using Norton 360 could be that the firewall settings of Norton are blocking access to those specific websites.

    Rate this question:

  • 22. 

    Host Not Found (11001) when you try to check or send mail in Eudora. The first step of troubleshooting should be?

    • A.

      Uninstall and reinstall Eudora

    • B.

      Configure Outlook Express/MS Outlook to see whether the error is with Eudora or the account settings

    • C.

      Try a clean boot

    • D.

      Go to Tools: Options: Getting Started. Verify your settings, especially-login name, Mail Server (Incoming), SMTP Server (Outgoing)

    Correct Answer
    D. Go to Tools: Options: Getting Started. Verify your settings, especially-login name, Mail Server (Incoming), SMTP Server (Outgoing)
    Explanation
    The correct answer is to go to Tools: Options: Getting Started and verify the settings, especially the login name, Mail Server (Incoming), and SMTP Server (Outgoing). This is because the error message "Host Not Found (11001)" suggests that there may be an issue with the server settings in Eudora. By checking and verifying these settings, it can help identify if there are any incorrect or missing configurations causing the error.

    Rate this question:

  • 23. 

    Which Windows Vista application replaces the collaboration and application-sharing features previously available in Microsoft Windows NetMeeting?

    • A.

      Windows Easy Transfer

    • B.

      Windows Meeting Space

    • C.

      Windows Calendar

    • D.

      Windows Online Meeting

    Correct Answer
    B. Windows Meeting Space
    Explanation
    Windows Meeting Space is the correct answer because it is the Windows Vista application that replaces the collaboration and application-sharing features previously available in Microsoft Windows NetMeeting. Windows Easy Transfer is used for transferring files and settings from one computer to another. Windows Calendar is a calendar application, and Windows Online Meeting is not a known Windows Vista application.

    Rate this question:

  • 24. 

    Which feature of Microsoft Internet Explorer 7 is available only when it is used with Windows Vista?

    • A.

      Running in Protected Mode

    • B.

      Tabbed browsing environment

    • C.

      Phishing filter

    • D.

      Improved pop-up blocking

    Correct Answer
    A. Running in Protected Mode
    Explanation
    Running in Protected Mode is a feature of Microsoft Internet Explorer 7 that is available only when it is used with Windows Vista. This feature enhances the security of the browser by isolating it from the rest of the operating system. It prevents malicious software from accessing system files and settings, providing a safer browsing experience for the user.

    Rate this question:

  • 25. 

    Which feature in Windows Vista can users enable to visually indicate network activity?

    • A.

      Microsoft Windows Aero

    • B.

      Toggling activity animation in the tool tray

    • C.

      The logical network map in the Network and Sharing Center

    • D.

      Automated diagnosis of network connectivity in the Network and Sharing Center

    Correct Answer
    C. The logical network map in the Network and Sharing Center
    Explanation
    The logical network map in the Network and Sharing Center is the feature in Windows Vista that users can enable to visually indicate network activity. This feature provides a graphical representation of the network connections and displays the activity on each connection, allowing users to easily see if there is any network activity happening. It helps users monitor their network connections and identify any issues or disruptions in the network.

    Rate this question:

  • 26. 

    You are unable to browse the internet and in the network properties, you find that both IPv6 and IPv4 are enabled. What would you try to fix the internet issue?

    • A.

      Disable IPv6 and let IPv4 be enabled.

    • B.

      Enable IPv6 and let IPv4 be disabled.

    • C.

      Try to Disable both and try to access internet.

    • D.

      Enable both

    Correct Answer
    A. Disable IPv6 and let IPv4 be enabled.
    Explanation
    Enabling both IPv6 and IPv4 can sometimes cause conflicts and connectivity issues. By disabling IPv6 and leaving IPv4 enabled, it allows the device to prioritize IPv4 for internet connectivity. This can help resolve the internet issue and ensure a stable connection.

    Rate this question:

  • 27. 

     A program that was compatible with Windows XP is not able to execute properly in vista. It is asking for some compatibility mode. What would you do to fix it?

    • A.

      You cannot use such programs in Vista

    • B.

      Try to reinstall the software.

    • C.

      Use the program compatibility wizard and select the option “use an older program with this version of Windows”

    • D.

      Try to Disable UAC

    Correct Answer
    C. Use the program compatibility wizard and select the option “use an older program with this version of Windows”
    Explanation
    If a program that was compatible with Windows XP is not able to execute properly in Vista and is asking for compatibility mode, the best solution would be to use the program compatibility wizard and select the option "use an older program with this version of Windows." This option allows the program to run in a compatibility mode that emulates the environment of an older version of Windows, in this case, Windows XP. This can help resolve any compatibility issues and allow the program to run properly in Vista.

    Rate this question:

  • 28. 

    How would you troubleshoot the error "Windows Setup cannot locate a valid hard drive to store temporary installation files." that you might face during installation?

    • A.

      Try to restart the installation.

    • B.

      Try to replace the installation media and try again

    • C.

      Make sure that all the hard disk drives on your computer either have unallocated disk space or contain partitions that have drive letters assigned to them.

    • D.

      Clean the disc and try again.

    Correct Answer
    C. Make sure that all the hard disk drives on your computer either have unallocated disk space or contain partitions that have drive letters assigned to them.
    Explanation
    This answer is correct because it provides a solution to the error message. It suggests checking the hard disk drives on the computer to ensure that they either have unallocated disk space or contain partitions with drive letters assigned to them. This is important because if the hard drives do not meet these criteria, the Windows Setup will not be able to locate a valid hard drive to store temporary installation files.

    Rate this question:

  • 29. 

    How would you troubleshoot the following error “Windows is unable to find a system volume which meets its criteria for installation”?

    • A.

      The hard drive is not recognized by vista.

    • B.

      The hard disc is bad replacing it.

    • C.

      Try to format the drive and try again.

    • D.

      Remove any USB device attached to the system.

    Correct Answer
    D. Remove any USB device attached to the system.
    Explanation
    The error message "Windows is unable to find a system volume which meets its criteria for installation" indicates that there is an issue with the system volume that Windows needs to install. One possible cause of this error is the presence of a USB device attached to the system. Removing any USB device attached to the system can resolve this issue by ensuring that Windows can properly detect and install on the system volume.

    Rate this question:

  • 30. 

    You get the following error at startup of Vista "Windows has blocked some startup programs" how would you troubleshoot this issue?

    • A.

      Disable UAC and try to restart the computer.

    • B.

      Remove the startup programs permanently if they are unwanted.

    • C.

      Try to reinstall the program

    • D.

      Both a & b

    Correct Answer
    D. Both a & b
    Explanation
    To troubleshoot the issue of "Windows has blocked some startup programs" error at startup of Vista, you can try disabling UAC (User Account Control) and then restart the computer. This can help determine if UAC is causing the problem. Additionally, you can remove any unwanted startup programs permanently, as they might be triggering the error. By doing both a and b, you cover multiple potential causes of the issue and increase the chances of resolving it.

    Rate this question:

  • 31. 

     What is Windows Vista complete Pc backup and restore?

    • A.

      It is same as System restore

    • B.

      It is something similar to Files and settings transfer wizard.

    • C.

      It is an image-based backup tool that will help you to recover your entire system.

    • D.

      This helps you create a restore point.

    Correct Answer
    C. It is an image-based backup tool that will help you to recover your entire system.
    Explanation
    Windows Vista complete PC backup and restore is an image-based backup tool that allows users to create a backup of their entire system. This means that it creates a snapshot of the entire operating system, including all files, settings, and programs. In the event of a system failure or data loss, users can use this backup to restore their entire system to its previous state. It is different from system restore, which only restores system files and settings, and also different from the Files and Settings Transfer Wizard, which only transfers files and settings to a new computer.

    Rate this question:

  • 32. 

    You suspect your system is failing to boot because of a corrupt master boot record. Which utility is the best to fix this?

    • A.

      Automated System Restore

    • B.

      Device Manager

    • C.

      System Restore

    • D.

      Recovery Console

    Correct Answer
    D. Recovery Console
    Explanation
    The Recovery Console is the best utility to fix a corrupt master boot record. The Recovery Console is a command-line tool available in Windows operating systems that allows users to perform advanced troubleshooting and repair tasks, including fixing boot-related issues. It provides access to various system recovery options and allows users to manually repair the master boot record, which is responsible for loading the operating system. By using the Recovery Console, users can restore the master boot record to its original state and resolve booting problems caused by corruption.

    Rate this question:

  • 33. 

    What command should you run to check and fix corrupt system files, DLLs, and other critical files?

    • A.

      CMDCONS /FIXBOOT

    • B.

      SFC /SCANNOW

    • C.

      CHKDSK /R

    • D.

      DEFRAG –A

    Correct Answer
    B. SFC /SCANNOW
    Explanation
    The correct answer is "SFC /SCANNOW." The SFC (System File Checker) command is used to scan and repair corrupt system files, DLLs, and other critical files in Windows. Running this command will check the integrity of these files and replace any corrupt or missing ones with a cached copy stored in a compressed folder at %WinDir%\System32\dllcache. This helps to ensure the stability and proper functioning of the operating system.

    Rate this question:

  • 34. 

    You get a tech call from a distraught Windows XP user who can’t get into Windows. He says he has a Recover CD from the manufacturer and plans to run it. What would you suggest?

    • A.

      Run the Recover CD to restore the system.

    • B.

      Run the Recover CD to return the system to the factory-installed state.

    • C.

      Try to get the computer to boot into Safe Mode.

    • D.

      Reinstall Windows using a Windows XP disc.

    Correct Answer
    C. Try to get the computer to boot into Safe Mode.
    Explanation
    Trying to get the computer to boot into Safe Mode is suggested because it is a troubleshooting step that can help identify and resolve any issues that may be preventing the user from accessing Windows. Running the Recover CD may restore or return the system to factory settings, but it may also result in data loss. Reinstalling Windows using a Windows XP disc is not necessary at this stage and may be a more drastic solution.

    Rate this question:

  • 35. 

    What are the main operating system files required for a successful boot of Windows 2000/XP?

    • A.

      NTLDR.COM, NTDETECT, BOOT.INI

    • B.

      NTKERN.OS, COMMAND.COM, IO.SYS

    • C.

      NTLDR, NTDETECT.COM, BOOT.INI

    • D.

      COMMAND.COM, IO.SYS, MSDOS.SYS

    Correct Answer
    C. NTLDR, NTDETECT.COM, BOOT.INI
    Explanation
    The main operating system files required for a successful boot of Windows 2000/XP are NTLDR, NTDETECT.COM, and BOOT.INI. NTLDR (NT Loader) is responsible for loading the operating system kernel and starting the boot process. NTDETECT.COM is used to detect hardware devices during the boot process. BOOT.INI is a configuration file that contains information about the operating systems installed on the computer and their boot options. These three files work together to initiate and configure the boot process for Windows 2000/XP.

    Rate this question:

  • 36. 

    Which statement is true about starting the Recovery Console?

    • A.

      It can be installed as an advanced startup option, or started from the installation CD.

    • B.

      It must be run from the installation CD.

    • C.

      It can be run from a floppy.

    • D.

      It is automatically started after booting from the Emergency Repair Disk.

    Correct Answer
    A. It can be installed as an advanced startup option, or started from the installation CD.
    Explanation
    The Recovery Console can be accessed in two ways: it can be installed as an advanced startup option, or it can be started from the installation CD. This means that users have the flexibility to choose how they want to access the Recovery Console, depending on their specific needs and preferences. They can either install it as an advanced startup option, which allows them to access it directly from the boot menu, or they can start it from the installation CD if they prefer. This flexibility ensures that users can easily access the Recovery Console when needed, regardless of their system setup.

    Rate this question:

  • 37. 

    Which of the following is not possible with the Recovery Console?

    • A.

      Copy files from removable media to system folders to replace corrupt system files

    • B.

      Run the CheckDisk utility to repair a corrupt hard drive

    • C.

      Enable and disable services for the next normal startup

    • D.

      Retrieve a forgotten administrative password

    Correct Answer
    D. Retrieve a forgotten administrative password
    Explanation
    The Recovery Console is a feature in Windows that allows users to repair their computer in the event of a system failure. It provides various tools and commands to troubleshoot and fix issues. However, one thing that is not possible with the Recovery Console is retrieving a forgotten administrative password. The Recovery Console does not have the capability to recover or reset passwords. This task requires separate tools or methods, such as using password reset disks or third-party software.

    Rate this question:

  • 38. 

    What are the proper steps for repairing a Windows XP system with an Emergency Repair Disk?

    • A.

      Boot from the ERD and follow the on-screen prompts.

    • B.

      Boot from the installation CD, select the repair installation option, select ERD, and follow the on-screen prompts.

    • C.

      Boot from the installation CD, press F2 to begin Automated System Recovery, select the ERD option, and follow the on-screen prompts.

    • D.

      You cannot use an ERD with Windows XP.

    Correct Answer
    D. You cannot use an ERD with Windows XP.
  • 39. 

    Your computer freezes on the Windows startup screen during boot. What is the most likely cause of the problem?

    • A.

      Corrupt boot sector

    • B.

      Problem with a hardware device

    • C.

      Corrupt or missing NTLDR

    • D.

      Error in BOOT.INI

    Correct Answer
    D. Error in BOOT.INI
    Explanation
    The most likely cause of the computer freezing on the Windows startup screen is an error in the BOOT.INI file. The BOOT.INI file is responsible for loading the operating system, and if it is corrupt or contains errors, it can prevent the computer from properly starting up. This can result in the computer freezing on the startup screen.

    Rate this question:

  • 40. 

    What is the best way to replace a corrupted Registry with an earlier, good version?

    • A.

      Try the Last Known Good Configuration boot option.

    • B.

      Start REGEDIT and select Restore from the File menu.

    • C.

      Use the Automated System Recovery option.

    • D.

      Boot from the installation CD and perform an upgrade install.

    Correct Answer
    D. Boot from the installation CD and perform an upgrade install.
    Explanation
    The best way to replace a corrupted Registry with an earlier, good version is to boot from the installation CD and perform an upgrade install. This option allows for a fresh installation of the operating system while preserving user files and settings. It replaces the entire system, including the Registry, with a clean version from the installation CD. This ensures that any corruption or errors in the previous Registry are completely resolved.

    Rate this question:

  • 41. 

    Which of these is the loop back address?

    • A.

      127.0.0.1

    • B.

      127.0.0.0

    • C.

      127.1.0.1

    • D.

      127.0.0.7

    Correct Answer
    A. 127.0.0.1
    Explanation
    The loop back address is used to test network connectivity on a local machine. In this case, the correct loop back address is 127.0.0.1. This address is reserved for the loop back interface, which allows a computer to send and receive data to itself. It is commonly used for troubleshooting network issues or testing network applications.

    Rate this question:

  • 42. 

    What is SSL?

    • A.

      Socket security layer

    • B.

      Socket secure layer

    • C.

      Secured Socket Layer

    • D.

      Security socket layer

    Correct Answer
    C. Secured Socket Layer
    Explanation
    SSL stands for Secured Socket Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted by unauthorized parties. It establishes a secure connection, authenticates the server, and encrypts the data being transmitted. SSL is commonly used to secure online transactions, such as credit card payments, online banking, and sensitive data transfers.

    Rate this question:

  • 43. 

    To which of the OSI layers does Router belong?

    • A.

      Network Layer

    • B.

      Transport Layer

    • C.

      Data Link Layer

    • D.

      Application Layer

    Correct Answer
    A. Network Layer
    Explanation
    Routers belong to the Network Layer of the OSI model. The Network Layer is responsible for routing and forwarding data packets between different networks. Routers use network layer protocols, such as IP (Internet Protocol), to determine the best path for data packets to reach their destination. They examine the destination IP address in the packet's header and make decisions based on routing tables to forward the packet to the next hop on the network. Routers also perform functions like network address translation (NAT) and firewalling to enhance network security.

    Rate this question:

  • 44. 

    What is the Port number of HTTPS?

    • A.

      80

    • B.

      443

    • C.

      8013

    • D.

      440

    Correct Answer
    B. 443
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption to protect the communication between a web browser and a web server. The port number 443 is the designated port for HTTPS. When a user accesses a website using HTTPS, the web browser establishes a secure connection with the server on port 443, ensuring that the data transmitted between them is encrypted and secure from unauthorized access.

    Rate this question:

  • 45. 

    How can the operating system version that is currently running be found?

    • A.

      Right click the My Computer icon and select Properties

    • B.

      Right click the Desktop and select Properties

    • C.

      Open any application, select help from the toolbar

    • D.

      Right click the Task bar and select Properties

    Correct Answer
    A. Right click the My Computer icon and select Properties
    Explanation
    To find the operating system version that is currently running, you can right click the My Computer icon and select Properties. This will open a window displaying information about the computer, including the operating system version.

    Rate this question:

  • 46. 

    Which of these is an Email client?

    • A.

      Lotus Notes

    • B.

      Outlook Express

    • C.

      All the above

    • D.

      None of the above

    Correct Answer
    C. All the above
    Explanation
    All the options given are examples of Email clients. Lotus Notes and Outlook Express are both popular email clients used for managing and sending emails. Therefore, "All the above" is the correct answer as it includes both Lotus Notes and Outlook Express.

    Rate this question:

  • 47. 

    A router:

    • A.

      Determines on which outgoing link a packet is to be forwarded.

    • B.

      Forwards a packet to all outgoing links.

    • C.

      Forwards a packet to the next free outgoing link.

    • D.

      Forwards a packet to all outgoing links, except the link upon which the packet originated.

    Correct Answer
    A. Determines on which outgoing link a packet is to be forwarded.
    Explanation
    A router determines on which outgoing link a packet is to be forwarded. This is because routers are responsible for directing network traffic to its intended destination. When a packet arrives at a router, it examines the packet's destination address and uses its routing table to determine the appropriate outgoing link for the packet. The router then forwards the packet to that outgoing link, ensuring that it reaches its intended destination efficiently.

    Rate this question:

  • 48. 

    The Internet is an example of a:

    • A.

      Circuit switched network.

    • B.

      Packet switched network.

    • C.

      Cell switched network.

    Correct Answer
    B. Packet switched network.
    Explanation
    The Internet is an example of a packet switched network because it breaks data into small packets and sends them individually across the network. These packets can take different routes to reach their destination, and they are reassembled at the receiving end. This method allows for efficient use of network resources and enables data to be transmitted in a more flexible and reliable manner compared to circuit switched or cell switched networks.

    Rate this question:

  • 49. 

    The TCP in TCP/IP stands for:

    • A.

      Transport Control Prototcol

    • B.

      Transmission Control Process

    • C.

      Transport Command Process

    • D.

      Transmission Control Protocol

    Correct Answer
    D. Transmission Control Protocol
    Explanation
    The correct answer is Transmission Control Protocol. TCP is a core protocol of the Internet protocol suite and it provides reliable, ordered, and error-checked delivery of data between applications running on different hosts. It ensures that the data packets are transmitted in the correct order and without any errors. TCP is responsible for establishing and terminating connections between devices and it also handles flow control to prevent overwhelming the receiving device with too much data at once.

    Rate this question:

  • 50. 

    Clock speed is measured in

    • A.

      Bits per second

    • B.

      Baud

    • C.

      Bytes

    • D.

      Hertz

    Correct Answer
    D. Hertz
    Explanation
    Clock speed is a measure of how fast a computer's processor can execute instructions. It represents the number of cycles per second that the processor can complete. The unit of measurement for clock speed is Hertz, which is named after the German physicist Heinrich Hertz. Therefore, the correct answer is Hertz.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 29, 2011
    Quiz Created by
    Rishabkumar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.