Windows Admin

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Abrunn11
A
Abrunn11
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,831
| Attempts: 3,831 | Questions: 95
Please wait...
Question 1 / 95
0 %
0/100
Score 0/100
1. Which protocol is the most common in today's computer networks?

Explanation

TCP/IP is the most common protocol in today's computer networks because it is the foundation of the internet. It is a suite of protocols that allows devices to communicate and exchange data over the internet. TCP/IP provides reliable and secure transmission of data, ensuring that information is delivered accurately and efficiently. It is widely used in various applications such as web browsing, email, file transfer, and remote access. TCP/IP has become the standard protocol for networking due to its versatility, scalability, and compatibility with different operating systems and devices.

Submit
Please wait...
About This Quiz
Windows Admin - Quiz

How much do you truly know about Windows Admin? Today we’ll be putting you through a gauntlet of questions about the operating system, various system requirements and everything... see morein between to find out just that. see less

2. Right-clicking on the desktop background and choosing Properties opens up the ____________ Control Panel

Explanation

Right-clicking on the desktop background and choosing Properties opens up the "Display" Control Panel. This control panel allows users to customize and adjust various display settings such as screen resolution, color depth, and screen orientation. It also provides access to additional display options and features, such as multiple monitor configurations and screen saver settings.

Submit
3. If you have administrator rights to a computer, you have the ability to track/monitor when a user logs into and out of that computer.

Explanation

If you have administrator rights to a computer, you have the ability to track/monitor when a user logs into and out of that computer. This is because administrator rights grant you access to the system logs and monitoring tools that record and track user activity on the computer. With these privileges, you can view and analyze the log files to see when users log in and out of the computer, providing you with the ability to track and monitor user activity.

Submit
4. The Windows XP operating system has a special program called _________ that allows you to shut down programs that are in endless loops.

Explanation

The correct answer is Task Manager. Task Manager is a special program in Windows XP that allows users to shut down programs that are in endless loops. It provides a way to view and manage running processes, monitor system performance, and end unresponsive applications. By accessing Task Manager, users can identify and terminate programs that are causing issues or consuming excessive system resources, helping to improve overall system stability and performance.

Submit
5. If I were to install a program via CD, i would typically look for the _____________ file if the installation doesn't run automatically.

Explanation

When installing a program via CD, the typical file to look for if the installation doesn't run automatically is "setup.exe". This file is commonly used as the installer for software applications and is responsible for initiating the installation process. It may contain various instructions and configurations necessary for the program to be installed correctly on the computer.

Submit
6. If a user is reporting they have entered their password unsuccessfully multiple times and cannot log in, what is the cause?

Explanation

If a user is reporting that they have entered their password unsuccessfully multiple times and cannot log in, the cause is most likely that their account is locked. This could be due to security measures in place to protect the account from unauthorized access. To resolve this issue, the user may need to contact the appropriate support or administrator to unlock their account and regain access.

Submit
7. The Windows Security Dialog Box (which contains 6 buttons) is accessed by pressing which key combination when the Welcome screen is turned off?

Explanation

When the Welcome screen is turned off, pressing CTRL+ALT+DEL will bring up the Windows Security Dialog Box. This dialog box contains 6 buttons and allows the user to perform various security-related tasks such as locking the computer, switching users, changing passwords, and opening the Task Manager. This key combination is commonly used to access this dialog box and is a security measure to ensure that the user is interacting with the authentic Windows login screen.

Submit
8. Connecting a shared printer with Windows Vista requires knowing at least either the IP address and make/model of the printer or the name of the server which the printer is installed on.

Explanation

To connect a shared printer with Windows Vista, you need to have either the IP address and make/model of the printer or the name of the server on which the printer is installed. This information is necessary to locate and establish a connection with the printer on the network. Without this information, Windows Vista would not be able to identify and connect to the shared printer. Therefore, the statement "Connecting a shared printer with Windows Vista requires knowing at least either the IP address and make/model of the printer or the name of the server which the printer is installed on" is true.

Submit
9. Passwords are case sensitive.

Explanation

Passwords being case sensitive means that the system differentiates between uppercase and lowercase letters when checking the validity of a password. For example, if a password is "Password123", typing "password123" or "PASSWORD123" would be considered incorrect. Therefore, the correct answer is "True".

Submit
10. If I were installing a 32-bit application from my computer, what would be the most common way to go about it?

Explanation

The most common way to install a 32-bit application from a computer is to go to the "Start" menu, then click on "Settings" and select "Control Panel". From there, you can choose "Add or Remove Programs" to install the application.

Submit
11. If a computer is used only for documnet processing, spreadsheet manipulation, photo editing and music production with no internet connectivity, there is no need to utilize the Disk Defragmenter tool during the life of that computer.

Explanation

The statement is false because even if a computer is used only for document processing, spreadsheet manipulation, photo editing, and music production without internet connectivity, the Disk Defragmenter tool may still be necessary. Over time, the computer's hard drive can become fragmented, which can slow down the system's performance. The Disk Defragmenter tool helps to reorganize the files on the hard drive, improving overall system efficiency. Therefore, it is still beneficial to utilize the tool, even without internet connectivity.

Submit
12. If you just hit Enter when at the Windows Security Dialog Box, you will be logged off.

Explanation

If you just hit Enter when at the Windows Security Dialog Box, you will not be automatically logged off. This is because hitting Enter without entering any credentials or selecting any options will not trigger any action in the dialog box. Therefore, you will remain logged in until you manually choose an option or enter the required information.

Submit
13. What is the quickest way to begin sharing a folder via My Computer?

Explanation

To quickly begin sharing a folder via My Computer, you can right-click on the folder and select "sharing and Security." This option allows you to configure the sharing settings for the folder, such as granting permissions to specific users or groups. By choosing this option, you can easily initiate the process of sharing the folder with others on the network.

Submit
14. What is the leading theory for what NT stands for

Explanation

The leading theory for what NT stands for is "New Technology". This is supported by the fact that NT is commonly used as an abbreviation for new and innovative technology in various fields. It is a widely accepted understanding that NT refers to advancements and developments in technology that are considered new and cutting-edge. This theory aligns with the common usage and context in which NT is used, making it the most plausible explanation.

Submit
15. The latest and greatest applications on the market today are __-bit applications.

Explanation

The latest and greatest applications on the market today are 64-bit applications. This means that these applications are designed to run on 64-bit operating systems, which offer several advantages over 32-bit systems. 64-bit applications can access more memory, allowing for improved performance and the ability to handle larger data sets. They also offer better security features and compatibility with newer hardware. Overall, 64-bit applications are more advanced and capable than their 32-bit counterparts, making them the preferred choice for modern software development.

Submit
16. It is possible to allow NTFS permissions to cascade down to subfolders.

Explanation

NTFS permissions can be set to cascade down to subfolders, meaning that the permissions set on a parent folder can be inherited by its subfolders. This allows for easier management of permissions, as changes made to the parent folder's permissions will automatically apply to all subfolders. This can be useful in situations where you want to grant or restrict access to multiple folders within a directory hierarchy without having to individually set permissions for each folder.

Submit
17. It is not important that you properly shut down Windows XP Professional every time you power down your system.

Explanation

It is important to properly shut down Windows XP Professional every time you power down your system in order to avoid data loss, corruption, and other potential issues. Improperly shutting down the system can lead to file errors, system instability, and the loss of unsaved work. Therefore, it is crucial to follow the proper shutdown procedure to ensure the safe and reliable operation of the system.

Submit
18. You are planning to use your Windows Vista Pro workstation as a small server.  What file system offers the most security for your needs in this scenario?

Explanation

NTFS (New Technology File System) offers the most security for the given scenario. NTFS provides features like file and folder permissions, encryption, and auditing, which enhance the security of the system. It allows administrators to control access to files and folders, ensuring that only authorized users can access sensitive data. NTFS also supports file compression and disk quotas, which can further enhance security by managing disk space and preventing unauthorized usage. Compared to other file systems like FAT16, FAT32, and HPFS, NTFS provides better security features and is more suitable for a small server setup.

Submit
19. The first (possibly only) word of the DOS command to determine your IP address is _______________

Explanation

The correct answer is "ipconfig" because it is a DOS command used to display the IP configuration settings of a computer. By entering "ipconfig" in the command prompt, the user can retrieve information about their IP address, subnet mask, default gateway, and other network settings. This command is commonly used for troubleshooting network connectivity issues or checking the IP address assigned to a computer.

Submit
20. How can deleting temp files help speed up a slow computer?

Explanation

Deleting temp files can help speed up a slow computer because it frees up disk space. Temp files are temporary files created by various programs and applications, and over time they can accumulate and take up a significant amount of storage space. When the computer's storage is nearly full, it can slow down the system's performance. By deleting these unnecessary temp files, more disk space becomes available, allowing the computer to run more efficiently and faster.

Submit
21. What file system offers the most security if you intended to use your Windows XP Professional machine as a file server?

Explanation

NTFS (New Technology File System) offers the most security if you intend to use your Windows XP Professional machine as a file server. NTFS provides advanced security features such as file and folder permissions, encryption, and auditing. It allows you to set access control lists (ACLs) to restrict or grant permissions to specific users or groups. NTFS also supports file-level encryption, which adds an extra layer of protection to sensitive data. Overall, NTFS is the most secure file system option for a Windows XP Professional file server.

Submit
22. There is no need to distinguish between share and NTFS permissions; they mean the same thing and have the same capabilities.

Explanation

This statement is false. Share permissions and NTFS permissions are two different types of permissions in Windows operating systems. Share permissions control access to shared folders over a network, while NTFS permissions control access to files and folders on the local file system. Although they both regulate access, they have different capabilities and are applied at different levels. Share permissions are applied to the shared folder itself, while NTFS permissions are applied to individual files and folders within the shared folder. Therefore, it is important to distinguish between share and NTFS permissions.

Submit
23. Windows Vista Professional supports Plug&Play technologies

Explanation

Windows Vista Professional supports Plug&Play technologies. Plug&Play is a feature that allows devices to be automatically recognized and configured by the operating system without the need for manual intervention. This feature makes it easier for users to connect and use new devices with their computer. Since Windows Vista Professional is a more advanced version of the Windows Vista operating system, it is expected to have support for Plug&Play technologies. Therefore, the statement "Windows Vista Professional supports Plug&Play technologies" is true.

Submit
24. Which control panle is used to make changes to your workstation's name?

Explanation

The correct answer is System. The System control panel is used to make changes to your workstation's name. This control panel allows you to modify various settings and configurations related to your computer's operating system, including the computer name. By accessing the System control panel, you can change the name of your workstation to suit your preferences or organizational requirements.

Submit
25. Which Groups would have rights to unlock a workstation when the person who locked it is no longer available

Explanation

Administrators would have the rights to unlock a workstation when the person who locked it is no longer available. Administrators typically have full control and privileges over a system, including the ability to manage user accounts and access permissions. Therefore, they would have the necessary authority to unlock a workstation in such a situation.

Submit
26. When installing Windows XP, you are only given one partition option.

Explanation

When installing Windows XP, you are not only given one partition option. Windows XP allows users to choose between different partition options based on their preferences and requirements. Users can create multiple partitions, resize existing partitions, or choose to install Windows XP on an existing partition. This flexibility in partition options allows users to customize their installation process according to their specific needs. Therefore, the given statement is false.

Submit
27. Which control panel "location" tool would be best to install/configure a new protocol?

Explanation

The "Network Connections" control panel tool would be the best option to install/configure a new protocol. This tool allows users to manage and configure network connections on their device, including setting up new protocols for network communication. By accessing the Network Connections control panel, users can add, remove, or modify network protocols to ensure proper network connectivity and communication.

Submit
28. When you make a new user in Windows XP, by default he/she becomes a member of the Power Users group.

Explanation

By default, when a new user is created in Windows XP, they do not become a member of the Power Users group. Instead, they become a member of the Users group. The Power Users group has additional privileges and permissions compared to the Users group.

Submit
29. If I am going to install a networked printer as a local printer on my computer, I just need the following two items:

Explanation

To install a networked printer as a local printer on a computer, two items are required: the printer's IP address and the driver files for the specific make and model of the printer. The IP address is necessary to establish a connection between the computer and the printer over the network. The driver files are needed to enable the computer to communicate with and control the printer, ensuring compatibility and proper functioning.

Submit
30. The taskbar must always be visually present on the bottom of the screen.

Explanation

The statement is false because the taskbar can be visually present on any side of the screen, not just the bottom. Users have the flexibility to customize the taskbar's position according to their preferences. They can choose to have it on the left, right, or top of the screen as well.

Submit
31. Which of the following specific NTFS permissions needs to be applied to allow users to do whatever they chose within the folder the permissions are set at and, by default, any subfilder therein?

Explanation

The specific NTFS permission that needs to be applied to allow users to do whatever they chose within the folder and its subfolders is "Full Control". This permission grants users the ability to perform all actions, including modifying files, deleting files, creating new files, and changing permissions. It provides the highest level of access and control over the folder and its contents.

Submit
32. How can using msconfig help speed up a slow computer?

Explanation

By accessing the start-up menu through msconfig, you can see the list of programs that start when the computer boots up. This allows you to identify any unnecessary or resource-intensive programs that may be slowing down the computer's startup time. By disabling or removing these programs from the start-up list, you can improve the computer's boot time and overall performance.

Submit
33. If I were to share out my printer, that would mean that I would be responsible for sharing out paper for that printer as well.

Explanation

The statement suggests that if someone shares their printer, they would also be responsible for sharing paper for that printer. However, this is not necessarily true. Sharing a printer does not automatically imply sharing paper as well. It is possible for individuals to share a printer while each person provides their own paper. Therefore, the answer is false.

Submit
34. What does Disk Defragmenter do to help speed up a slow computer?

Explanation

Disk defragmenter helps speed up a slow computer by rearranging files stored on the disk to occupy contiguous storage locations. This process eliminates fragmented files and reduces the time it takes for the computer to access and retrieve data, resulting in improved performance and faster response times. Deleting cookies and other adware may help improve computer performance in terms of internet browsing, but it is not directly related to the function of disk defragmenter.

Submit
35. Where can you go to change your password?

Explanation

The User Accounts Control Panel is the correct answer because it is the specific location in which users can go to change their password. The main screen of the Systems Properties window may have various options and settings, but it does not specifically provide the option to change passwords. Therefore, "Both of the Above" is not the correct answer. "None of the Above" is also incorrect as the User Accounts Control Panel is indeed the appropriate place to change passwords.

Submit
36. Only share permissions need to be considered when allowing other to access information; there is no need to consider addressing file/folder permissions.

Explanation

This statement is false. When allowing others to access information, both share permissions and file/folder permissions need to be considered. Share permissions control access at the network level, while file/folder permissions control access at the local level. Both sets of permissions are important in determining who can access and modify the information.

Submit
37. Which of the following NTFS permissions can be applied to specifically allow users to edit existing content?

Explanation

The Modify NTFS permission allows users to edit existing content. This permission grants the user the ability to make changes to files and folders, including creating new files, modifying existing files, deleting files, and changing file attributes. It provides a higher level of access compared to the Read and Write permissions, as it includes both read and write capabilities. The Modify permission is useful for users who need to make changes to files or folders without having full control over them.

Submit
38. Usernames are case sensitive.

Explanation

Usernames are case sensitive means that the system distinguishes between uppercase and lowercase letters when considering the username. In this case, the correct answer is "False" because usernames are not case sensitive. This means that the system treats uppercase and lowercase letters as the same when it comes to usernames. For example, if a username is "JohnDoe", "johndoe" or "JOHNDOE" would be considered the same username in the system.

Submit
39. If a user forgets their password, an administrator can look up their password for them.

Explanation

The statement is incorrect. In a secure system, passwords are typically stored in a hashed or encrypted format, which means they cannot be easily retrieved by an administrator or anyone else. Instead, when a user forgets their password, the administrator can usually assist them in resetting their password or providing them with a temporary password to regain access to their account.

Submit
40. When a share name ends in a dollar sign, it is a _________ share

Explanation

When a share name ends in a dollar sign, it is a hidden share. Hidden shares are not visible when browsing the network, and their names are typically followed by a dollar sign to indicate their hidden status. These shares are often used for administrative purposes and are not intended for regular user access.

Submit
41. Which service is probably not installed if you right click on a folder and "sharing and Security" is not an option?

Explanation

If the "sharing and Security" option is not available when right-clicking on a folder, it is likely that the "File and Printer Sharing of Microsoft Networks" service is not installed. This service allows users to share files and printers on a network. Without this service, the option to share and secure folders may not be available.

Submit
42. It is possible to export extensive information on a particular workstation to text file via the System Information utility.

Explanation

The System Information utility allows users to export extensive information about a particular workstation to a text file. This feature enables users to save and share detailed information about their system configuration, hardware, and software. By exporting this information, users can easily analyze and troubleshoot any issues, as well as provide accurate information to technical support or other parties who may require it. Therefore, the statement is true.

Submit
43. When using Computer Management to create a new account, Windows asks you to supply a user's full name.

Explanation

When creating a new account using Computer Management in Windows, the operating system prompts the user to provide the full name of the user. This is because Windows uses the full name to identify the user and display it in various places, such as the login screen and user directories. By providing the full name, Windows can personalize the user's experience and ensure proper identification and organization of user accounts.

Submit
44. Specifically setting the "Deny" permission should be used as a last resort due to the fact that it can lead to troubleshooting difficulty in the future.

Explanation

Setting the "Deny" permission should be used as a last resort because it can create troubleshooting difficulties in the future. When the "Deny" permission is set, it overrides any other permissions granted to a user or group, effectively blocking their access. This can make it challenging to identify and resolve issues later on, as it may not be immediately clear why a user is being denied access. It is generally recommended to use other permission settings first and only resort to "Deny" when absolutely necessary.

Submit
45. If I install a printer through another computer (workstation or server), I still have to obtain the driver on my own every time; it isn't possible to have the driver provided for me automatically.

Explanation

The given statement is false. When installing a printer through another computer (workstation or server), it is possible for the driver to be provided automatically. This can be achieved through a process called driver sharing or driver deployment, where the driver is installed on the server or workstation and then made available to other computers on the network. This eliminates the need for each individual computer to obtain the driver separately.

Submit
46. When attepmting to open Microsoft Management Console, the simplest way is to type ____ after clicking the Windows icon in the lower left-hand corner in Microsoft Vista.

Explanation

To open Microsoft Management Console in Microsoft Vista, you can simply type "MMC" after clicking the Windows icon in the lower left-hand corner. MMC stands for Microsoft Management Console, which is a built-in tool in Windows operating systems that allows users to manage and configure system components, services, and applications. By typing "MMC" in the search bar, the user can quickly access this tool and perform various administrative tasks.

Submit
47. How can using regedit help speed up a slow computer?

Explanation

Using regedit can help speed up a slow computer by allowing you to change how fast Windows loads, improve boot and shutdown time. The Windows Registry is a database that stores settings and configurations for the operating system and installed applications. By accessing the registry editor (regedit), you can modify certain settings to optimize the performance of Windows, such as disabling unnecessary startup programs, adjusting system services, and tweaking system parameters. These changes can result in faster boot times and improved overall responsiveness of the computer.

Submit
48. Which key combination should be held down to select multiple files that do not appear one after another in the Windows Explorer window?

Explanation

To select multiple files that are not adjacent to each other in the Windows Explorer window, the Control key should be held down. By holding down the Control key while clicking on individual files, you can select multiple files that are scattered throughout the window. This allows for non-contiguous selection, giving the user more flexibility in choosing multiple files at once.

Submit
49. If I were to remove a DOS application from my computer, I would take the exact same steps as I would to remove a 32-bit application.

Explanation

The statement is false because removing a DOS application and removing a 32-bit application would involve different steps. DOS applications are typically removed by deleting their files or uninstalling them using specific commands, while 32-bit applications are usually uninstalled through the control panel or using an uninstaller program. Therefore, the steps to remove these two types of applications would not be the same.

Submit
50. NTFS permissions (the security tab) apply to which users?

Explanation

NTFS permissions apply to both users who are connecting from a remote machine on the network and users who are logging directly into the machine sharing the resource. This means that the permissions can be set to control access to files and folders for both local and remote users. By setting NTFS permissions, administrators can determine who can read, write, modify, or delete files and folders on the system, regardless of whether they are accessing the resource locally or remotely.

Submit
51. Which of the following is not an applicable share permission?

Explanation

List Folder Contents is not an applicable share permission because it is a permission that applies to folders, not shares. The other three permissions (Read, Change, and Full Control) are applicable share permissions that determine the level of access a user has to the shared resources.

Submit
52. What is the approximate minimum hard drive requirement for installing Windows XP?

Explanation

The approximate minimum hard drive requirement for installing Windows XP is less than 5 GB. This means that the operating system can be installed on a hard drive with a capacity of less than 5 GB. It is important to note that this is just the minimum requirement and it is recommended to have a larger hard drive for better performance and to accommodate additional software and files.

Submit
53. Windows runs programs within the NT kernel since it makes sense to have the OS crash if an application crashes.

Explanation

The given statement is false. Windows does not run programs within the NT kernel with the intention of having the OS crash if an application crashes. In fact, Windows uses a protected memory model where each application runs in its own isolated process, separate from the kernel. This design ensures that if an application crashes, it does not affect the stability of the entire operating system. The NT kernel provides a layer of abstraction and manages system resources, but it is not directly responsible for running applications.

Submit
54. When using Computer Management to create a new account, Windows Forces you to supply a description of the user before you are allowed to create the account.

Explanation

When using Computer Management to create a new account, Windows does not force you to supply a description of the user before creating the account. This means that the statement is false.

Submit
55. Which IP setting does not require a value when configuring a single-subnet LAN (meaning you don't need to reach another network)

Explanation

In a single-subnet LAN configuration, there is no need to reach another network, so a default gateway is not required. The default gateway is used to connect different networks together, allowing communication between them. However, in this scenario, since there is only one subnet, there is no need for a default gateway as all devices are already on the same network.

Submit
56. What is the folder name on the installation CD that should be copied to the root of the C: drive immediately after installing Windows XP?

Explanation

After installing Windows XP, the folder name "i386" on the installation CD should be copied to the root of the C: drive. This folder contains essential files and drivers necessary for the functioning of the operating system. By copying it to the root of the C: drive, the system can easily access these files when needed, ensuring smooth operation and compatibility with various hardware components.

Submit
57. Which of the following paths would likely provide me connectivity to a printer assuming a printer in installed on a lab workstation with the naming convention we have been using and that computer is powered on:

Explanation

The correct answer is \\G30-WA\4050n_Printer. This path follows the naming convention we have been using and specifies the location of the printer on the lab workstation with the name G30-WA.

Submit
58. Is setting share permissions to Full Control and the manipulating the NTFS permissions a common practice?

Explanation

Setting share permissions to Full Control and then manipulating the NTFS permissions is a common practice. Share permissions control access to files and folders over a network, while NTFS permissions control access to files and folders on the local system. By setting share permissions to Full Control, users can have maximum access to the shared resources. Manipulating the NTFS permissions allows for further customization and fine-tuning of access rights, providing an additional layer of security and control.

Submit
59. What button do you need to hold down to avoid having to empty the trash after dragging and dropping a file there?

Explanation

To avoid having to empty the trash after dragging and dropping a file there, you need to hold down the Shift button. When you hold down the Shift button while dragging and dropping a file into the trash, it bypasses the trash and permanently deletes the file.

Submit
60. According to Microsoft, the recommended minimum hard drive space required to install Windows XP Professional is:

Explanation

The correct answer is 1.5 GB. This is the recommended minimum hard drive space required to install Windows XP Professional according to Microsoft.

Submit
61. In the following UNC, what is identified with the "Instructor" parameter? \\Instructor\apps

Explanation

The UNC (Universal Naming Convention) is a naming system used to identify network resources. In this case, the UNC "\\Instructor\apps" is identifying a server (or workstation acting as a server) named "Instructor" that is hosting the "apps" network share. The "Instructor" parameter in the UNC refers to the name of the server or workstation.

Submit
62. Windows XP is the first Windows operating system to allow for multiple user accounts

Explanation

Windows XP is not the first Windows operating system to allow for multiple user accounts. This feature was actually introduced in Windows NT, which was released before Windows XP. Therefore, the correct answer is False.

Submit
63. The following command fails and does not provide a mapped drive: NET USE\\instructor\apps.  You know that the "apps" share exists on the workstation,  What is the most likely cause for the failure?

Explanation

The most likely cause for the failure is that the devicename (drive letter) parameter was not specified in the command. Without specifying the drive letter, the command does not know where to map the "apps" share, resulting in the failure to provide a mapped drive.

Submit
64. According to Microsoft, the recommended minimum RAM required to install Windows XP Professional is:

Explanation

The recommended minimum RAM required to install Windows XP Professional is 128 MB. This is because Windows XP Professional is a relatively lightweight operating system compared to newer versions of Windows, and it can run reasonably well with this amount of memory. However, it is important to note that this is the minimum requirement and having more RAM, such as 256 MB or higher, would provide better performance and allow for smoother multitasking.

Submit
65. If you want to ensure your Windows OS has the lastest updates, the best site to visit is:

Explanation

The best site to visit for ensuring the latest updates for Windows OS is update.microsoft.com. This is because Microsoft is the official provider of Windows updates and their website is specifically dedicated to providing these updates. The other options mentioned, such as update.mywindows.com and microsoft.com/updatemyos, are not recognized as official sources for Windows updates.

Submit
66. What group has many of the rights needed to add drivers or some software but not to unlock a workstation?

Explanation

Power Users is the correct answer because this group in a computer system has the necessary rights and permissions to add drivers or software to the system. However, they do not have the authority to unlock a workstation, which is a separate privilege typically reserved for administrators or higher-level user groups.

Submit
67. Windows 7 built-in backup utility is more robust than many thrid-party backup utilities on the market today.

Explanation

The explanation for the answer "False" is that Windows 7 built-in backup utility is not more robust than many third-party backup utilities on the market today. Third-party backup utilities often offer more advanced features, customization options, and better performance compared to the built-in utility. Therefore, it is not true to say that the built-in utility is more robust.

Submit
68. Which of the following is not found on the Windows Security dialog box?

Explanation

The option "Sharing" is not found on the Windows Security dialog box. The Windows Security dialog box typically includes options related to user accounts, passwords, system settings, and security features. Sharing, on the other hand, is a feature that allows users to share files, folders, and printers with other users or devices on a network. It is not directly related to security settings and therefore not included in the Windows Security dialog box.

Submit
69. If you wanted to determine the percentage of elapsed time that the selected disk drive was busy servicing read or write requests, which counter would you select under the PhysicalDisk object with System Monitor?

Explanation

The %Disk Time counter under the PhysicalDisk object in System Monitor would be selected to determine the percentage of elapsed time that the selected disk drive was busy servicing read or write requests. This counter measures the percentage of time the disk is busy performing read or write operations, indicating the overall disk usage.

Submit
70. By default, all files written in WordPad have a .txt extension as part of their name when saved.

Explanation

WordPad is a text editing program that saves files with a .rtf (Rich Text Format) extension by default, not a .txt extension. Therefore, the given statement is false.

Submit
71. Identify the least practical option to be utilized in a backup scheme:

Explanation

The least practical option to be utilized in a backup scheme is "No backup is needed; computers never fail." This option suggests that there is no need for backups because computers never fail, which is an unrealistic assumption. In reality, computers can fail due to various reasons such as hardware malfunctions, software errors, or natural disasters. Therefore, relying on this option would leave the system vulnerable to data loss and potential disruptions in case of a computer failure.

Submit
72. Windows XP Professional fully supports every Plug&Play device

Explanation

Windows XP Professional does not fully support every Plug&Play device. While it does have a wide range of built-in drivers for common devices, there may be certain devices that require additional drivers or software to be installed in order to function properly. Additionally, some older or less common devices may not have compatible drivers available for Windows XP Professional, making them unsupported. Therefore, the statement that Windows XP Professional fully supports every Plug&Play device is false.

Submit
73. For ease of administration, one method is to set share permissions to ___________ for the Everyone group and the modify _________________ permissions accordingly.

Explanation

To ensure ease of administration, it is suggested to set share permissions to "Full Control" for the Everyone group. This allows all users to have complete control over the shared resource. Then, the modify permissions can be adjusted accordingly using NTFS permissions. NTFS permissions enable more granular control over individual users or groups, allowing specific actions such as read, write, execute, etc. This approach ensures that the Everyone group has the necessary access to the shared resource, while still allowing for more specific modifications through NTFS permissions.

Submit
74. Where must you go to view the results of auditing when a user has accessed a network share in Windows Vista Professional?

Explanation

To view the results of auditing when a user has accessed a network share in Windows Vista Professional, you need to go to the Event Viewer-Security Menu. The Event Viewer is a tool in Windows that allows you to view and analyze system events and logs. The Security Menu specifically displays security-related events, such as user logins, access attempts, and permissions changes. Therefore, by accessing the Event Viewer-Security Menu, you can find the necessary information about user access to network shares and any associated auditing records.

Submit
75. The most likely scenario where the Windows Perfomance Monitor information would come in handy would be when:

Explanation

The Windows Performance Monitor information would come in handy when the computer is acting slow for no reason despite having no programs open. This tool allows users to monitor and analyze various system performance metrics such as CPU usage, memory usage, disk activity, and network activity. By using the Performance Monitor, one can identify the specific resource or process causing the slowdown and take appropriate measures to resolve the issue, such as closing unnecessary background processes or upgrading hardware components.

Submit
76. To test whether you can communicate with another computer with an IP address of 10.10.10.10 using TCP/IP, what command would you type at a DOS prompt?

Explanation

To test communication with another computer using TCP/IP, the command "ping 10.10.10.10" is used. The "ping" command sends a small packet of data to the specified IP address and waits for a response. If a response is received, it confirms that communication is possible with the computer at the given IP address.

Submit
77. Idenify the order of the release of these Windows operating systems (1-5) _Windows 200 _Windows 98 _Windows XP _Windows 7 _Windows Vista Answer should be in the form of #,#,#,#,#

Explanation

The correct order of the release of these Windows operating systems is as follows: Windows 98 (1), Windows 2000 (2), Windows XP (3), Windows Vista (4), and Windows 7 (5).

Submit
78. Which group has rights to make copies of any information with archived property rights checked?

Explanation

Backup Operators have the rights to make copies of any information with archived property rights checked. They are specifically designated to perform backup and restore operations on a computer system. This includes the ability to make copies of files and folders, including those with archived property rights. Other user groups such as Power Users, Users, and Replicator do not have the same level of permissions and rights as Backup Operators in this context.

Submit
79. PS drivers are much "lighter" to use over PCL print drivers since they don't have as much "overhead" communication.

Explanation

The given statement suggests that PS drivers are lighter to use over PCL print drivers because they have less overhead communication. However, the correct answer is False. This implies that the statement is incorrect and PS drivers are not necessarily lighter to use compared to PCL print drivers.

Submit
80. In a peer-to-peer (workgroup) network, what is the maximum number of concurrent connections?

Explanation

In a peer-to-peer (workgroup) network, the maximum number of concurrent connections is 10. This means that at any given time, there can be a maximum of 10 devices connected and communicating with each other in the network. This limitation is due to the nature of peer-to-peer networks where each device has equal capabilities and responsibilities, and the network's performance and efficiency can be affected if there are too many concurrent connections.

Submit
81. According to Microsoft, the recommended minimum processor speed required to install Windows XP Professional is:

Explanation

According to Microsoft's official system requirements, the recommended minimum processor speed required to install Windows XP Professional is 300 MHz. While higher processor speeds will enhance performance, 300 MHz is the minimum needed to run the operating system.

Submit
82. Of the System Monitor memory counters below, which is the primary indicator of the kind of faults that cause system-wide delays?

Explanation

Pages/sec is the primary indicator of the kind of faults that cause system-wide delays. This counter measures the rate at which pages are read from or written to disk. When the value of Pages/sec is high, it indicates that the system is experiencing a high rate of paging, which can lead to delays in system performance. Therefore, monitoring this counter can help identify and address memory-related issues that may be causing system-wide delays.

Submit
83. If a friend came to you with a bad hard drive from their Dell Latitude D360 laptop and had files backed up to an external hard drive, would you be able to restore their system for them from the files that were backed up?

Explanation

The answer is "Not enough information is provided in this scenario" because the question does not provide any details about the condition of the laptop, the reason for the hard drive failure, or the compatibility of the backed-up files with the laptop's system. Therefore, it is impossible to determine whether the system can be restored from the backed-up files without further information.

Submit
84. When conflicting share a NTFS permissions are set on a folder, what is the effective permission that results?

Explanation

When conflicting NTFS permissions are set on a folder, the effective permission that results is the most restrictive permission. This means that if different permissions are set for different users or groups, the permission that grants the least amount of access will take precedence. For example, if User A has Read access and User B has No Access, the effective permission for both users will be No Access.

Submit
85. What is the result of typing this command in the Start--> Run window in Windows XP or the search window in Windows Vista start menu? \\instructor

Explanation

Typing "\\instructor" in the Start->Run window or search window in Windows XP or Windows Vista will open a window with shared folders and printers found on the instructor computer. This command is used to access network resources shared by the computer named "instructor".

Submit
86. Which groups would have rights to make a copy of a particular user in order to cross domains?

Explanation

Replicators would have the rights to make a copy of a particular user in order to cross domains. Replicators are a group that is specifically designated for the purpose of replicating directory information between domain controllers in different domains. They are responsible for ensuring that changes made in one domain are replicated to other domains. Therefore, they would have the necessary permissions to create copies of users across domains.

Submit
87. Windows Vista Professional will automatically dtect correctly any and every new NIC installed in your machine.

Explanation

Windows Vista Professional does not automatically detect every new NIC installed in your machine. It may require manual installation of drivers for the new NIC in order for it to be detected and function properly. Therefore, the statement is false.

Submit
88. Which of the following settings cannot be performed with your screen saver in Windows XP?

Explanation

The screen saver settings in Windows XP allow users to password protect the screen saver, preview it, and determine the length of inactivity before it starts. However, determining date and time settings is not a feature available in the screen saver settings.

Submit
89. The file system used by traditional DOS 6.x (non-Windows or Caldera version) is called:

Explanation

The file system used by traditional DOS 6.x (non-Windows or Caldera version) is called FAT16. This file system was introduced by Microsoft and was the standard file system used in DOS-based operating systems. FAT16 supports a maximum partition size of 2GB and a maximum file size of 2GB. It uses a 16-bit file allocation table to keep track of file allocations on the disk.

Submit
90. What is the minimum sharing permissions needed to add a new file to a network share?

Explanation

In order to add a new file to a network share, the minimum sharing permissions needed are "Change". This permission allows the user to make changes to the existing files and folders within the network share, including adding new files. With the "Change" permission, the user can create, modify, and delete files, but they do not have full control over the network share.

Submit
91. Share permissions need to be set to restrict/allow access for ________users.

Explanation

Share permissions need to be set to restrict/allow access for remote users. This means that the permissions can be configured to allow or deny access to files or folders for users who are accessing them remotely, such as over a network or through the internet. By setting share permissions, administrators can control the level of access that remote users have to shared resources.

Submit
92. If Jeff locks is workstation when he goes to lunch, what users/groups will be unable to unlock that workstation when he returns to his computer?

Explanation

The Backup Operator group will be unable to unlock Jeff's workstation when he returns to his computer. This is because the Backup Operator group does not have the necessary permissions to unlock a locked workstation.

Submit
93. Where would you go in order to force your users to change their passwords the next time they log in?

Explanation

You would go to the Computer Management admin tool in order to force your users to change their passwords the next time they log in. This tool allows you to manage various aspects of your computer, including user accounts and passwords. By accessing the user accounts section in the Computer Management admin tool, you can enforce password changes for your users, ensuring that they are prompted to change their passwords the next time they log in.

Submit
94. In order to test your computer's processor using Performance Monitor, the two most insightful counter to use are;

Explanation

The two most insightful counters to use when testing a computer's processor using Performance Monitor are %Processor Time and Interrupts/sec. %Processor Time measures the percentage of time the processor is busy executing a thread, providing insight into how much workload the processor is handling. Interrupts/sec measures the rate at which interrupts, which are signals sent to the processor from hardware devices, are being received. This counter helps identify any excessive interrupt activity that may be affecting the processor's performance.

Submit
95. Which of the following share permissions is granted by default when initially sharing out a folder?

Explanation

When initially sharing out a folder, none of the above share permissions are granted by default. The default share permission is usually set to "Read" access, which allows users to view the contents of the folder but not make any changes or modifications. Full Control, Change, and List Folder Contents are all higher-level permissions that need to be explicitly granted by the folder owner or administrator.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 19, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2012
    Quiz Created by
    Abrunn11
Cancel
  • All
    All (95)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which protocol is the most common in today's computer networks?
Right-clicking on the desktop background and choosing Properties opens...
If you have administrator rights to a computer, you have the ability...
The Windows XP operating system has a special program called _________...
If I were to install a program via CD, i would typically look for the...
If a user is reporting they have entered their password unsuccessfully...
The Windows Security Dialog Box (which contains 6 buttons) is accessed...
Connecting a shared printer with Windows Vista requires knowing at...
Passwords are case sensitive.
If I were installing a 32-bit application from my computer, what would...
If a computer is used only for documnet processing, spreadsheet...
If you just hit Enter when at the Windows Security Dialog Box, you...
What is the quickest way to begin sharing a folder via My Computer?
What is the leading theory for what NT stands for
The latest and greatest applications on the market today are __-bit...
It is possible to allow NTFS permissions to cascade down to...
It is not important that you properly shut down Windows XP...
You are planning to use your Windows Vista Pro workstation as a small...
The first (possibly only) word of the DOS command to determine your IP...
How can deleting temp files help speed up a slow computer?
What file system offers the most security if you intended to use your...
There is no need to distinguish between share and NTFS permissions;...
Windows Vista Professional supports Plug&Play technologies
Which control panle is used to make changes to your workstation's...
Which Groups would have rights to unlock a workstation when the person...
When installing Windows XP, you are only given one partition option.
Which control panel "location" tool would be best to...
When you make a new user in Windows XP, by default he/she becomes a...
If I am going to install a networked printer as a local printer on my...
The taskbar must always be visually present on the bottom of the...
Which of the following specific NTFS permissions needs to be applied...
How can using msconfig help speed up a slow computer?
If I were to share out my printer, that would mean that I would be...
What does Disk Defragmenter do to help speed up a slow computer?
Where can you go to change your password?
Only share permissions need to be considered when allowing other to...
Which of the following NTFS permissions can be applied to specifically...
Usernames are case sensitive.
If a user forgets their password, an administrator can look up their...
When a share name ends in a dollar sign, it is a _________ share
Which service is probably not installed if you right click on a folder...
It is possible to export extensive information on a particular...
When using Computer Management to create a new account, Windows asks...
Specifically setting the "Deny" permission should be used as...
If I install a printer through another computer (workstation or...
When attepmting to open Microsoft Management Console, the simplest way...
How can using regedit help speed up a slow computer?
Which key combination should be held down to select multiple files...
If I were to remove a DOS application from my computer, I would take...
NTFS permissions (the security tab) apply to which users?
Which of the following is not an applicable share permission?
What is the approximate minimum hard drive requirement for installing...
Windows runs programs within the NT kernel since it makes sense to...
When using Computer Management to create a new account, Windows Forces...
Which IP setting does not require a value when configuring a...
What is the folder name on the installation CD that should be copied...
Which of the following paths would likely provide me connectivity to a...
Is setting share permissions to Full Control and the manipulating the...
What button do you need to hold down to avoid having to empty the...
According to Microsoft, the recommended minimum hard drive space...
In the following UNC, what is identified with the...
Windows XP is the first Windows operating system to allow for multiple...
The following command fails and does not provide a mapped drive: NET...
According to Microsoft, the recommended minimum RAM required to...
If you want to ensure your Windows OS has the lastest updates, the...
What group has many of the rights needed to add drivers or some...
Windows 7 built-in backup utility is more robust than many thrid-party...
Which of the following is not found on the Windows Security dialog...
If you wanted to determine the percentage of elapsed time that the...
By default, all files written in WordPad have a .txt extension as part...
Identify the least practical option to be utilized in a backup scheme:
Windows XP Professional fully supports every Plug&Play device
For ease of administration, one method is to set share permissions to...
Where must you go to view the results of auditing when a user has...
The most likely scenario where the Windows Perfomance Monitor...
To test whether you can communicate with another computer with an IP...
Idenify the order of the release of these Windows operating systems...
Which group has rights to make copies of any information with archived...
PS drivers are much "lighter" to use over PCL print drivers...
In a peer-to-peer (workgroup) network, what is the maximum number of...
According to Microsoft, the recommended minimum processor speed...
Of the System Monitor memory counters below, which is the primary...
If a friend came to you with a bad hard drive from their Dell Latitude...
When conflicting share a NTFS permissions are set on a folder, what is...
What is the result of typing this command in the Start--> Run...
Which groups would have rights to make a copy of a particular user in...
Windows Vista Professional will automatically dtect correctly any and...
Which of the following settings cannot be performed with your screen...
The file system used by traditional DOS 6.x (non-Windows or Caldera...
What is the minimum sharing permissions needed to add a new file to a...
Share permissions need to be set to restrict/allow access for...
If Jeff locks is workstation when he goes to lunch, what users/groups...
Where would you go in order to force your users to change their...
In order to test your computer's processor using Performance...
Which of the following share permissions is granted by default when...
Alert!

Advertisement