Pages

Principles of Operating Systems and its Applications


It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows.

Reliability and Performance

It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.

Sysprep

It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition.

Clean Installation

It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information.

Usability

Which of the following is not an advantage of installing a 64-bit edition of Windows 7?

It supports 16-bit Windows on Windows (WOW) environment

Which of the following is not a Specialized version of Windows 7?

Windows 7 Professional

It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.

Upgrade Installation

It is one of the Considerations on why using the option of Upgrade rather than Migrate

Does not require the reinstallation of applications

It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs

Windows Upgrade Advisor

Which of the following version of Windows are allowed for Upgrade?

Windows Vista SP1

What is the IEEE 802 Standards for Local Wireless Networks?

IEEE 802.11

It is a device that converts instructions from the network protocol stack into electric signals

Network Adapter

Which of the following is not a Wireless LAN Standards?

802.11 h

Which of the following is not the common network architecture types?

WiMax

Which of the following is not a Physical WAN Components?

Network Adapter

It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority.

Switch

Which of the following is not a LAN Physical Topology?

Crown

It is a group of services hosted on a network which is a private structure and has the internet-like service provision

Intranet

It is the most common form of computer network.

Local Area Network

It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic.

Virtual Local Area Network

It is the most common form of computer network.

Local Area Network

It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration

DHCP Server

It is one of the Considerations on why using the option of Upgrade rather than Migrate.

Does not require the reinstallation of applications

It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic

Virtual Local Area Network

It provides storage for the users' files and share folders that contain users' files.

File Server

It a server that is used to access the corporate resources from outside the corporate network

Remote Access Serve

It holds a copy of AD DS and responds to request for active directory information.

Domain Controlle

It is a computer that is dedicated to running network-aware application software.

Application Server

It allows you to control which role functionality is installed and enabled

Role Services

It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.

DNS Server

Which of the following is not an advantage of installing a 64-bit edition of Windows 7?

It supports 16-bit Windows on Windows (WOW) environment

Which of the following version of Windows are allowed for Upgrade?

Windows Vista SP1

Which of the following is not a Server Role of Windows Server 2008 R2?

Windows Power Shell

It is a device that converts instructions from the network protocol stack into electric signals.

Network Adapter

How many bits are there in an IP version 6 address?

128 bits

What type of notation does IP version 6 address uses?

Hexadecimal

It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.

Public IP Address

It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.

Subnet Mask

How many bits are there in an IP version 4 address?

32 bits

172.16.0.0 /12 is what type of IPv4 Address.

Private IP Address

What is the binary notation for the 255.255.255.0 subnet mask?

11111111.11111111.11111111.00000000

It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.

Default Gateway

APIPA stands for

Automatic Private IP Addressing

Which of the following is not an IPv6 Address types?

Broadcast

It is a small software program that allows a hardware device to communicate with a computer

Drivers

It is a way for you to limit use of disk space on a volume for each user to conserve disk sp

Disk Quotas

It provides authenticaltion, host operations of master roles, hosting the global catalog and support group policies and sysvol

Domain Controller

It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later

Kerberos v5

It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.

Upgrade Installation

It is a feature of Windows 7 that allows windows 7 to be backward compatible

Windows XP mode

It is a dynamic volume that joins areas of unallocated space disks into a single logical disk

It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.

Groups

It is the non-contiguous storage of data on a volume

Disk Fragmentation

It defines the type of access granted to a user, group, or computer for a file or folder.

NTFS Permission

Which of the following is not a Server Role of Windows Server 2008 R2?

Windows Power Shell

It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.

Sysprep

It is a new authentication features that controls the ability of online IDs to authenticate to a computer.

Online Identity Integration

It is an object that contains all of the information that defines a user in Windows Server 2008 R2.

User Account

It contains the partition table for the disk and a small amount of executable code called as the master boot code.

Master Boot Record Disk

It is a collection of Domain Trees.

Forest

It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network.

Public Sharing

It is a method of sharing folders that allows you to share folders quickly.

Basic Sharing

It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive.

Simple Volume

It is a scriptable command line utility that create scripts to automate disk related task

Diskpart

It allows you to control which role functionality is installed and enabled.

Role Services

It enables IT Administrator to automate one-to-many management of users and computers.

Group Policy

It contains an array of partition entries describing the start and end LBA of each partition on disk.

GUID Partition (GPT)

Which of the following is a main type of group?

Distribution

It enables the user to log on and access resources on a specific computer and usually reside in SAM

Local User Accounts

It is the process of verifying the identity of something or someone.

Authentication

It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format.

GDI based printing

It contains the partition table for the disk and a small amount of executable code called as the master boot code

Master Boot Record Disk

It is a group of services hosted on a network which is a private structure and has the internet-like service provision.

Intranet

It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format.

GDI based printing

It is the non-contiguous storage of data on a volume

Disk Fragmentation

It is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs.

Windows Upgrade Advisor

What is the binary notation for the 255.255.255.0 subnet mask?

11111111.11111111.11111111.00000000

It is a scriptable command line utility that create scripts to automate disk related task.

Diskpart

What is the maximum bit rate for the 802.11n technologies?

600mbps

You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You log on to one of the portable computers by using a domain user account and install a new device for a bar-code scanner. You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You need to be able to roll back the driver to its previous version. What should you do?

Run the Device Manager by using elevated permissions

Which of the following is not a Server Role of Windows Server 2008 R2?

Windows Power Shell

Strong EAP methods provide strong authentication

IEEE 802.1X

It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.

DNS Server

It enables the IT Administrators to automate one-to-several management of users and computers.

Group Policy

You are the network administrator for Stellacon Corporation. User in the sales department have been complaining that the Sales application is slow to load. Using Performance Monitor, you create a baseline report for one of the computers, monitoring memory, the processor, the disk subsystem, and the network subsystem. You notice that the disk subsystem has a high load of activity. What other subsystem should you monitor before you can know for sure whether you have a disk subsystem bottleneck?

Memory

It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.

Upgrade Installation

Which of the following version of Windows are allowed for Upgrade?

Windows Vista SP1

It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration.

DHCP Server

This are point-to-point connection across a private or public network. It uses special protocols, called tunneling protocol to make a virtual call to a virtual port.

Virtual Private Network

It allows you to control which role functionality is installed and enabled.

Role Services

Which of the following is not a LAN Physical Topology?

Crown

It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing

InPrivate Browsing

It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.

Groups

It is a small software program that allows a hardware device to communicate with a computer

Drivers

You are the network administrator for a small company that has just switched its machines from Windows XP to Windows Vista and Windows 7. One of the users who has Windows Vista asks you why there is a vertical sidebar on the screen. What feature of Windows Vista is this?

Windows Sidebar

It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA

Public IP Address

You are the system administrator for a large organization that uses Windows Server R2 and Windows 7. You have a Windows 7 machine and have enabled System Protection. You want the machine to retain only the last System Protection snapshot that was taken. What should you do?

Run Disk Cleanup for System Restore and then run Shadow Copies

It is a security feature that simplifies the ability of users to run as standard users and perform all neccessary daily tasks

User Account Control

You are the network administrator for a large organization that uses both Windows Server 2008 R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily. You perform an image backup on the Windows 7 machine. The Windows 7 machine then gets struck by a virus and will not start up properly. What can you do to get the Windows 7 machine up and running the fastest possible way?

Start the computer from the Windows 7 DVD and then use the System Image Recovery tool

You are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use?

Recovery

You are the network administrator for your organization. You have been asked by the owner of the company to verify that all drivers installed on the Windows 7 machines are signed drivers. How do you accomplish this task?

Run Sigverif.exe at the command prompt

This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions.

Firewall

Which of the following is not an IPv6 Address types?

Broadcast

It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority

Switch

Which of the following is not the common network architecture types?

WiMax

Which of the following is not a way to improve the signal strength?

None of the Choices

It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network.

Basic Sharing

It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.

Sysprep

It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops.

Applocker

You are evaluating the purchase a netbook computer that has the following hardware: 1.6-gigahertz (GHz) 32-bit processor 1024-MB RAM 1 video card that uses shared memory 4-G8 solid state drive You need to ensure that you can install Windows 7 Enterprise on the netbook computer. Which hardware component should you change or add?

storage device

What type of notation does IP version 6 address uses?

Hexadecimal

It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption used by medium and large organization.

WPA-Enterprise

Where will you see the Manage Wireless Networks tool in your PC?

Control Pane

What is the IEEE 802 Standards for Local Wireless Networks?

IEEE 802.11

It is a windows 7 feature that enables user to connect to their desktop computer from another device.

Remote Desktop

It holds a copy of AD DS and responds to request for active directory information.

Domain Controller

Which of the following is not a Boot-option for troubleshooting startup problems?

None of the choices

It is the measurement of how a system conforms to expected behavior

Reliability

It is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices.

Ad hoc mode

Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures.

Reliability Monitor

Which of the following is not a Performance Monitor tool?

Windows Memory Diagnostics Tool

Which of the following statement is not correct?

You can configure the client computer by going to the accessories in the start menu and clicking the network options.

It is a type of network that interconnect devices by means of radio waves instead of wires and cables.

Wireless Network

It is an administrative tool for managing user settings and computer settings across a network.

Window Update Group Policy

It is a collection of Domain Trees.

Forest

It provides assistance in resolving network-related issues

Windows Network Diagnostics Tool

It is the measurement on how quickly the computer completes a task

Performance

Checks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel

Windows Memory Diagnostics Tool

It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system.

Action Center

It is one of the feature of Windows 7 that encrypts the computer operating system and data stored on the operating system volume.

Bitlocker

How many bits are there in an IP version 6 address?

128 bits

It is a software that is designed to deliberately harm a computer

Malicious Software

It is a dynamic volume that joins areas of unallocated space disks into a single logical disk

Spanned Volume

It allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.

Software Restriction Policies

It is the built-in encryption tool for Windows file systems

Encrypting File Systems

It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.

Public IP Address

It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.

Subnet Mask

How many bits are there in an IP version 4 address?

32 bits

172.16.0.0 /12 is what type of IPv4 Address

Private IP Address

It is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally or on remote computers.

Disk Management

It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets

Default Gateway

APIPA stands for:

Automatic Private IP Addressing

Which of the following is a main type of group?

Distribution

It contains an array of partition entries describing the start and end LBA of each partition on disk.

GUID Partition (GPT)

It enables the user to log on and access resources on a specific computer and usually reside in SAM

Local User Accounts

It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information

Usability

It is a software that is designed to deliberately harm a computer.

Malicious Software

It is a computer that is dedicated to running network-aware application software.

Application Server

It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive.

Simple Volume

It enables IT Administrator to automate one-to-many management of users and computers.

Group Policy

It defines the type of access granted to a user, group, or computer for a file or folder

NTFS Permission

It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or late

Kerberos v5

It is an object that contains all of the information that defines a user in Windows Server 2008 R2.

User Account

It is a new authentication features that controls the ability of online IDs to authenticate to a computer.

Online Identity Integration

It is one of the Considerations on why using the option of Upgrade rather than Migrate.

Does not require the reinstallation of applications

Which of the following is not a Wireless LAN Standards

802.11 h

It is a way for you to limit use of disk space on a volume for each user to conserve disk space.

Disk Quota

It provides storage for the users' files and share folders that contain users' files.

File Server

It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority.

Switch

It is the measurement on how quickly the computer completes a task.

Performance

It provides authenticaltion, host operations of master roles, hosting the global catalog and support group policies and sysvol.

Domain Controller

It enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic.

Virtual Local Area Network

It is a collection of Domain Trees

Forest

It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition.

Clean Installation

 





































































































































































No comments:

Post a Comment

Data Communications and Networking 3

  In case a router is powered on, where will the router first search for a valid IOS image to load by default? flash memo...