It is one of the Key Features of Windows 7
that takes advantage of modern computing hardware, running more reliably and
providing more consistent performance than previous versions of Windows. |
Reliability and Performance |
It is a tool used to remove system-specific
data from the Windows operating system, configure windows to start in audit
mode, configure the windows operating system to start the Windows Welcome
phase and reset Windows Product activation. |
Sysprep |
It is one of the Options for Installing
Windows 7 where in you install Windows 7 on a new partition and replace an
existing operating system on a partition. |
Clean Installation |
It is one of the Key Features of Windows 7
that simplify a user's ability to organize, search for, and view information. |
Usability |
Which of the following is not an advantage
of installing a 64-bit edition of Windows 7? |
It supports 16-bit Windows on Windows (WOW)
environment |
Which of the following is not a Specialized
version of Windows 7? |
Windows 7 Professional |
It is one of the Options for Installing
Windows 7 where in you replace an existing version of Windows with Windows 7
but all user applications, files and settings are retained. |
Upgrade Installation |
It is one of the Considerations on why using
the option of Upgrade rather than Migrate |
Does not require the reinstallation of
applications |
It is a downloadable application that helps
windows user identify which edition of Windows 7 meets their needs |
Windows Upgrade Advisor |
Which of the following version of Windows
are allowed for Upgrade? |
Windows Vista SP1 |
What is the IEEE 802 Standards for Local
Wireless Networks? |
IEEE 802.11 |
It is a device that converts instructions
from the network protocol stack into electric signals |
Network Adapter |
Which of the following is not a Wireless LAN
Standards? |
802.11 h |
Which of the following is not the common
network architecture types? |
WiMax |
Which of the following is not a Physical WAN
Components? |
Network Adapter |
It is a device that provides wiring
concentrator functionality like a hub but it also enables network traffic
management, performs firewall functions and makes routing decisions based
upon traffic priority. |
Switch |
Which of the following is not a LAN Physical
Topology? |
Crown |
It is a group of services hosted on a
network which is a private structure and has the internet-like service
provision |
Intranet |
It is the most common form of computer
network. |
Local Area Network |
It enables you to manage network traffic,
group physically dispersed nodes into logical area networks and isolate
network traffic. |
Virtual Local Area Network |
It is the most common form of computer
network. |
Local Area Network |
It reduces the complexity and amount of
administrative work by using automatic TCP/IP configuration |
DHCP Server |
It is one of the Considerations on why using
the option of Upgrade rather than Migrate. |
Does not require the reinstallation of
applications |
It enables you to manage network traffic,
group physically dispersed nodes into logical area networks and isolate
network traffic |
Virtual Local Area Network |
It provides storage for the users' files and
share folders that contain users' files. |
File Server |
It a server that is used to access the
corporate resources from outside the corporate network |
Remote Access Serve |
It holds a copy of AD DS and responds to
request for active directory information. |
Domain Controlle |
It is a computer that is dedicated to
running network-aware application software. |
Application Server |
It allows you to control which role
functionality is installed and enabled |
Role Services |
It is the foundation of the Internet naming
scheme and it supports accessing resources by using alphanumeric names. |
DNS Server |
Which of the following is not an advantage
of installing a 64-bit edition of Windows 7? |
It supports 16-bit Windows on Windows (WOW)
environment |
Which of the following version of Windows
are allowed for Upgrade? |
Windows Vista SP1 |
Which of the following is not a Server Role
of Windows Server 2008 R2? |
Windows Power Shell |
It is a device that converts instructions
from the network protocol stack into electric signals. |
Network Adapter |
How many bits are there in an IP version 6
address? |
128 bits |
What type of notation does IP version 6
address uses? |
Hexadecimal |
It is a type of IPv4 Address that is
required by the devices and host that connect directly to the Internet. This
address must be unique, routable on the internet and must be assigned by
IANA. |
Public IP Address |
It specifies which part of an IPv4 address
is the network ID and which part of the IPv4 address is the Host ID. |
Subnet Mask |
How many bits are there in an IP version 4
address? |
32 bits |
172.16.0.0 /12 is what type of IPv4 Address. |
Private IP Address |
What is the binary notation for the
255.255.255.0 subnet mask? |
11111111.11111111.11111111.00000000 |
It is a device, usually a router, on a
TCP/IP internet that forwards IP packets to other subnets. |
Default Gateway |
APIPA stands for |
Automatic Private IP Addressing |
Which of the following is not an IPv6
Address types? |
Broadcast |
It is a small software program that allows a
hardware device to communicate with a computer |
Drivers |
It is a way for you to limit use of disk
space on a volume for each user to conserve disk sp |
Disk Quotas |
It provides authenticaltion, host operations
of master roles, hosting the global catalog and support group policies and
sysvol |
Domain Controller |
It is a Windows Authentication Method that
is used by windows 7 clients and server running Microsoft Windows Server 2000
or later |
Kerberos v5 |
It is one of the Options for Installing
Windows 7 where in you replace an existing version of Windows with Windows 7
but all user applications, files and settings are retained. |
Upgrade Installation |
It is a feature of Windows 7 that allows
windows 7 to be backward compatible |
Windows XP mode |
It is a dynamic volume that joins areas of
unallocated space disks into a single logical disk |
|
It is a collection of user accounts,
computer accounts, contacts and other groups that you can manage as a single
unit. |
Groups |
It is the non-contiguous storage of data on
a volume |
Disk Fragmentation |
It defines the type of access granted to a
user, group, or computer for a file or folder. |
NTFS Permission |
Which of the following is not a Server Role
of Windows Server 2008 R2? |
Windows Power Shell |
It is a tool used to remove system-specific
data from the Windows operating system, configure windows to start in audit
mode, configure the windows operating system to start the Windows Welcome
phase and reset Windows Product activation. |
Sysprep |
It is a new authentication features that
controls the ability of online IDs to authenticate to a computer. |
Online Identity Integration |
It is an object that contains all of the
information that defines a user in Windows Server 2008 R2. |
User Account |
It contains the partition table for the disk
and a small amount of executable code called as the master boot code. |
Master Boot Record Disk |
It is a collection of Domain Trees. |
Forest |
It is a method of sharing folders that allow
multiple default public folders for each computer and files shared with same
computer and with same network. |
Public Sharing |
It is a method of sharing folders that
allows you to share folders quickly. |
Basic Sharing |
It is a dynamic volume that encompasses
available free-space from single, dynamic, hard disk drive. |
Simple Volume |
It is a scriptable command line utility that
create scripts to automate disk related task |
Diskpart |
It allows you to control which role
functionality is installed and enabled. |
Role Services |
It enables IT Administrator to automate
one-to-many management of users and computers. |
Group Policy |
It contains an array of partition entries
describing the start and end LBA of each partition on disk. |
GUID Partition (GPT) |
Which of the following is a main type of
group? |
Distribution |
It enables the user to log on and access
resources on a specific computer and usually reside in SAM |
Local User Accounts |
It is the process of verifying the identity
of something or someone. |
Authentication |
It is a type of printing wherein it is used
by legacy application in pre-vista version of windows that uses enhanced
metafile format (EMF) as the spool file format. |
GDI based printing |
It contains the partition table for the disk
and a small amount of executable code called as the master boot code |
Master Boot Record Disk |
It is a group of services hosted on a
network which is a private structure and has the internet-like service
provision. |
Intranet |
It is a type of printing wherein it is used
by legacy application in pre-vista version of windows that uses enhanced
metafile format (EMF) as the spool file format. |
GDI based printing |
It is the non-contiguous storage of data on a
volume |
Disk Fragmentation |
It is a downloadable application that helps
windows user identify which edition of Windows 7 meets their needs. |
Windows Upgrade Advisor |
What is the binary notation for the
255.255.255.0 subnet mask? |
11111111.11111111.11111111.00000000 |
It is a scriptable command line utility that
create scripts to automate disk related task. |
Diskpart |
What is the maximum bit rate for the 802.11n
technologies? |
600mbps |
You administer an Active Directory domain
that includes portable computers that have Windows 7 SP1 installed. You log
on to one of the portable computers by using a domain user account and
install a new device for a bar-code scanner. You restart the portable
computer after installing the new device driver. You successfully log on to
the computer by using a domain user account. After logging on, you discover
that the bar-code scanner is not working due to a driver error. You try to
remove the installed driver, but the Roll Back Driver option is unavailable.
You need to be able to roll back the driver to its previous version. What
should you do? |
Run the Device Manager by using elevated
permissions |
Which of the following is not a Server Role
of Windows Server 2008 R2? |
Windows Power Shell |
Strong EAP methods provide strong
authentication |
IEEE 802.1X |
It is the foundation of the Internet naming
scheme and it supports accessing resources by using alphanumeric names. |
DNS Server |
It enables the IT Administrators to automate
one-to-several management of users and computers. |
Group Policy |
You are the network administrator for
Stellacon Corporation. User in the sales department have been complaining
that the Sales application is slow to load. Using Performance Monitor, you
create a baseline report for one of the computers, monitoring memory, the
processor, the disk subsystem, and the network subsystem. You notice that the
disk subsystem has a high load of activity. What other subsystem should you
monitor before you can know for sure whether you have a disk subsystem
bottleneck? |
Memory |
It is one of the Options for Installing
Windows 7 where in you replace an existing version of Windows with Windows 7
but all user applications, files and settings are retained. |
Upgrade Installation |
Which of the following version of Windows
are allowed for Upgrade? |
Windows Vista SP1 |
It reduces the complexity and amount of
administrative work by using automatic TCP/IP configuration. |
DHCP Server |
This are point-to-point connection across a
private or public network. It uses special protocols, called tunneling
protocol to make a virtual call to a virtual port. |
Virtual Private Network |
It allows you to control which role
functionality is installed and enabled. |
Role Services |
Which of the following is not a LAN Physical
Topology? |
Crown |
It is an enhanced privacy features of
Internet Explorer 8 that inherently more secure that using delete browsing
history to maintain privacy because there are no logs kept or tracks made
during browsing |
InPrivate Browsing |
It is a collection of user accounts,
computer accounts, contacts and other groups that you can manage as a single
unit. |
Groups |
It is a small software program that allows a
hardware device to communicate with a computer |
Drivers |
You are the network administrator for a
small company that has just switched its machines from Windows XP to Windows
Vista and Windows 7. One of the users who has Windows Vista asks you why
there is a vertical sidebar on the screen. What feature of Windows Vista is
this? |
Windows Sidebar |
It is a type of IPv4 Address that is
required by the devices and host that connect directly to the Internet. This
address must be unique, routable on the internet and must be assigned by IANA |
Public IP Address |
You are the system administrator for a large
organization that uses Windows Server R2 and Windows 7. You have a Windows 7
machine and have enabled System Protection. You want the machine to retain
only the last System Protection snapshot that was taken. What should you do? |
Run Disk Cleanup for System Restore and then run
Shadow Copies |
It is a security feature that simplifies the
ability of users to run as standard users and perform all neccessary daily
tasks |
User Account Control |
You are the network administrator for a
large organization that uses both Windows Server 2008 R2 and Windows 7. One
of the Windows 7 machines needs to be backed up daily. You perform an image
backup on the Windows 7 machine. The Windows 7 machine then gets struck by a
virus and will not start up properly. What can you do to get the Windows 7
machine up and running the fastest possible way? |
Start the computer from the Windows 7 DVD and
then use the System Image Recovery tool |
You are the system administrator for your
company. You are configuring the services on a Windows 7 computer. You want
to ensure that if a service fails to load, it will attempt to restart. Which
tab of the service`s Properties dialog box should you use? |
Recovery |
You are the network administrator for your
organization. You have been asked by the owner of the company to verify that
all drivers installed on the Windows 7 machines are signed drivers. How do
you accomplish this task? |
Run Sigverif.exe at the command prompt |
This are equivalents to door locks, employee
badges and security systems. It protects the computer and networks from
intrusions. |
Firewall |
Which of the following is not an IPv6
Address types? |
Broadcast |
It is a device that provides wiring
concentrator functionality like a hub but it also enables network traffic
management, performs firewall functions and makes routing decisions based
upon traffic priority |
Switch |
Which of the following is not the common
network architecture types? |
WiMax |
Which of the following is not a way to
improve the signal strength? |
None of the Choices |
It is a method of sharing folders that allow
multiple default public folders for each computer and files shared with same
computer and with same network. |
Basic Sharing |
It is a tool used to remove system-specific
data from the Windows operating system, configure windows to start in audit
mode, configure the windows operating system to start the Windows Welcome
phase and reset Windows Product activation. |
Sysprep |
It is a new Windows 7 security feature that
enables IT professionals to specify exactly what is allowed to run on user
desktops. |
Applocker |
You are evaluating the purchase a netbook
computer that has the following hardware: 1.6-gigahertz (GHz) 32-bit
processor 1024-MB RAM 1 video card that uses shared memory 4-G8 solid state
drive You need to ensure that you can install Windows 7 Enterprise on the
netbook computer. Which hardware component should you change or add? |
storage device |
What type of notation does IP version 6
address uses? |
Hexadecimal |
It is a strong authentication (with strong
EAP method) and strong (TKIP) or very strong (AES) encryption used by medium
and large organization. |
WPA-Enterprise |
Where will you see the Manage Wireless
Networks tool in your PC? |
Control Pane |
What is the IEEE 802 Standards for Local
Wireless Networks? |
IEEE 802.11 |
It is a windows 7 feature that enables user
to connect to their desktop computer from another device. |
Remote Desktop |
It holds a copy of AD DS and responds to
request for active directory information. |
Domain Controller |
Which of the following is not a Boot-option
for troubleshooting startup problems? |
None of the choices |
It is the measurement of how a system
conforms to expected behavior |
Reliability |
It is a wireless network modes that allows a
wireless network adapters connects directly to another wireless network
adapter for the purpose of temporarily sharing of files, presentations or an
internet connection among multiple computers and devices. |
Ad hoc mode |
Provides a timeline of system changes and
reliability. It also provides a system stability chart and reports on
software installations and software or hardware failures. |
Reliability Monitor |
Which of the following is not a Performance
Monitor tool? |
Windows Memory Diagnostics Tool |
Which of the following statement is not
correct? |
You can configure the client computer by going
to the accessories in the start menu and clicking the network options. |
It is a type of network that interconnect
devices by means of radio waves instead of wires and cables. |
Wireless Network |
It is an administrative tool for managing
user settings and computer settings across a network. |
Window Update Group Policy |
It is a collection of Domain Trees. |
Forest |
It provides assistance in resolving
network-related issues |
Windows Network Diagnostics Tool |
It is the measurement on how quickly the
computer completes a task |
Performance |
Checks for symptoms of defective computer
memory and usually can be started from administratve tools in the control
panel |
Windows Memory Diagnostics Tool |
It is a central location for viewing
messages about your system and the starting point for diagnosing and solving
issues with your system. |
Action Center |
It is one of the feature of Windows 7 that
encrypts the computer operating system and data stored on the operating
system volume. |
Bitlocker |
How many bits are there in an IP version 6
address? |
128 bits |
It is a software that is designed to
deliberately harm a computer |
Malicious Software |
It is a dynamic volume that joins areas of
unallocated space disks into a single logical disk |
Spanned Volume |
It allows the administrators to identify
which software is allowed to run and was initially added to Windows XP and
Windows Server 2003. |
Software Restriction Policies |
It is the built-in encryption tool for
Windows file systems |
Encrypting File Systems |
It is a type of IPv4 Address that is
required by the devices and host that connect directly to the Internet. This
address must be unique, routable on the internet and must be assigned by
IANA. |
Public IP Address |
It specifies which part of an IPv4 address
is the network ID and which part of the IPv4 address is the Host ID. |
Subnet Mask |
How many bits are there in an IP version 4
address? |
32 bits |
172.16.0.0 /12 is what type of IPv4 Address |
Private IP Address |
It is a graphical user interface that is
used to manage disks and volumes both basic and dynamic, locally or on remote
computers. |
Disk Management |
It is a device, usually a router, on a
TCP/IP internet that forwards IP packets to other subnets |
Default Gateway |
APIPA stands for: |
Automatic Private IP Addressing |
Which of the following is a main type of
group? |
Distribution |
It contains an array of partition entries
describing the start and end LBA of each partition on disk. |
GUID Partition (GPT) |
It enables the user to log on and access
resources on a specific computer and usually reside in SAM |
Local User Accounts |
It is one of the Key Features of Windows 7
that simplify a user's ability to organize, search for, and view information |
Usability |
It is a software that is designed to
deliberately harm a computer. |
Malicious Software |
It is a computer that is dedicated to
running network-aware application software. |
Application Server |
It is a dynamic volume that encompasses
available free-space from single, dynamic, hard disk drive. |
Simple Volume |
It enables IT Administrator to automate
one-to-many management of users and computers. |
Group Policy |
It defines the type of access granted to a
user, group, or computer for a file or folder |
NTFS Permission |
It is a Windows Authentication Method that
is used by windows 7 clients and server running Microsoft Windows Server 2000
or late |
Kerberos v5 |
It is an object that contains all of the
information that defines a user in Windows Server 2008 R2. |
User Account |
It is a new authentication features that
controls the ability of online IDs to authenticate to a computer. |
Online Identity Integration |
It is one of the Considerations on why using
the option of Upgrade rather than Migrate. |
Does not require the reinstallation of
applications |
Which of the following is not a Wireless LAN
Standards |
802.11 h |
It is a way for you to limit use of disk
space on a volume for each user to conserve disk space. |
Disk Quota |
It provides storage for the users' files and
share folders that contain users' files. |
File Server |
It is a device that provides wiring concentrator
functionality like a hub but it also enables network traffic management,
performs firewall functions and makes routing decisions based upon traffic
priority. |
Switch |
It is the measurement on how quickly the
computer completes a task. |
Performance |
It provides authenticaltion, host operations
of master roles, hosting the global catalog and support group policies and
sysvol. |
Domain Controller |
It enables you to manage network traffic,
group physically dispersed nodes into logical area networks and isolate
network traffic. |
Virtual Local Area Network |
It is a collection of Domain Trees |
Forest |
It is one of the Options for Installing
Windows 7 where in you install Windows 7 on a new partition and replace an
existing operating system on a partition. |
Clean Installation |
Principles of Operating Systems and its Applications
Subscribe to:
Post Comments (Atom)
Data Communications and Networking 3
In case a router is powered on, where will the router first search for a valid IOS image to load by default? flash memo...
No comments:
Post a Comment