🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

WRITTEN-EXAM-CSS (1).docx

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Transcript

**COMPUTER SYSTEMS SERVICING NC II** **WRITTEN EXAM** **NAME: \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_** **DATE: \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_...

**COMPUTER SYSTEMS SERVICING NC II** **WRITTEN EXAM** **NAME: \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_** **DATE: \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_** **MULTIPLE CHOICE** **SET A** 1. What is the common color for USB 3.0 connector for Standard A receptacles and plugs? A. Black B. Blue C. Red D. White 2. What type of memory used in the Solid-State Drive (SSD) as a storage? A. Dynamic Random Access Memory (DRAM) B. Flash Memory C. Read Only Memory (ROM) D. Solid State Drive (SSD) 3. It is originally, where the BIOS stored in a standard PC. A. Hard Disk Drive (HDD) B. Random Access Memory (RAM) C. Read Only Memory (ROM) D. Solid State Drive (SSD) 4. \_\_\_\_\_\_\_ is a complete copy of everything stored in a physical optical disc. A. Backup file B. ISO image C. Memory map D. Stored file 5. What is the minimum requirement for hard disk drive capacity in Windows 10? A. 16 GB for 32-bit OS or 20 GB for 64-bit OS B. 20 GB for 32-bit OS or 30 GB for 64-bit OS C. 20 GB for 32-bit OS or 40 GB for 64-bit OS D. 30 GB for 32-bit OS or 40 GB for 64-bit OS 6. Where do Windows device drivers store? A. Computers B. Drivers and Settings C. Hardware D. Registry 7. What is the volt rating of the RED wire in a power supply? A. -5V B. +5V C. -12V D. +12V 8. \_\_\_\_\_\_\_\_\_ is a network cable where one end is T568-A while the other is T568-B configuration. A. Cross-Over B. Extreme C. Roll-Over D. Straight-Thru 9. In Windows 7, when LAN connection has a cross and red indicator signifies that there is \_\_\_\_. A. Emergency that need attention B. LAN update C. Problem with the LAN driver D. Virus in the LAN 10. Which of the following hardware components can connect over a computer network? A. Network Driver B. Network Hardware Card C. Network interface Card D. Network Module Card 11. It is a networking device that forwards data packets between computer networks. A. Hub B. Patch Panel C. Router D. Wireless Access Point (WAP) 12. Wi-Fi is a trademark phrase, which means \_\_\_. A. IEEE.801.11 B. IEEE.802.11 C. IEEE.803.11 D. IEEE.804.11 13. \_\_\_\_ is a collection of devices connected together in one physical location. A. Campus Area Network (CAN) B. Local Area Network (LAN) C. Metropolitan Area Network (MAN) D. Wide Area Network (WAN) 14. A type of network that interconnects multiple local area network. A. Campus Area Network B. Local Area Network C. Metropolitan Area Network D. Wide Area Network 15. A computer program used to prevent, detect, and remove possible threats to the system, A. Anti-virus software B. Defragment software C. Scandisk Software D. Direct Software 16. \_\_\_\_ is a two or more PCs are connected and share resources without going through a separate server computer. A. Client Server B. Local Area Network C. Peer to peer network D. Personal Area Network 17. What IP address used by the virtual machine to communicate over the physical network? A. Costumer address B. Internet address C. Private address D. Provider address 18. What type of version that protects unauthorized network access by utilizing a set-up password A. Temporal Key Integrity Protocol (TKIP) B. Wi-Fi Protected Setup (WPS) C. WPA2-Enterprise D. WPA2-Personal 19. \_\_\_\_\_\_\_\_ consists the user matrices, and capability tables that govern the rights and privileges of users. A. Access control list B. Statement of Policy C. Systems Management D. System-Specific Policy 20. It occurs when an attacker or trusted insider steals data from a computer system and demands compensation for its return. A. Information Extortion B. Malicious code C. Theft D. Threat 21. It monitors the initial security accreditation of an information system for tracking of changes. A. Configuration Management B. Continuous Assessment C. Measurement and Metrics D. Network Monitoring 22. What services in Windows Server that enables administrators to migrate data to a lowest-cost and tape media on file servers? A. Data Compression Service B. File Screening Services C. Remote Storage Services D. Volume Shadow Copy Service 23. What application group that contains a Client Access Point and with atleast one application specific resource? A. Active node B. Clusters C. Cluster resource D. Virtual cluster services 24. A utility tool that test whether a particular host is reachable across an IP network. A. Dxdiag B. Netstat C. Ping D. Tracer 25. Which of the following keys is not appropriate to enter BIOS setup A. F1 B. F2 C. F5 D. F10 26. What enables users of Windows that corrects any problems preventing from booting up normally? A. Disk cleanup B. IPconfig C. Safe mode D. Task manager 27. What Starts up recovery options in a computer that essentially boot in to RECOVERY partition of the main hard drive? A. Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA) B. Repair Computer C. Safe Mode D. System Restore 28. A Single physical hard drive can divide into multiple \_\_\_ hard drives. A. Boot B. Local C. Logical D. Single 29. What are the two types of interface used to communicate between the hard drive and computer motherboard? A. Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA) B. Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) C. Industry Standard Architecture (ISA) and Advanced Technology Attachment (ATA) D. Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA) 30. What is the spider-like interconnection in millions of pieces of information located on computers around the cyber space? A. Browser B. E-Commerce C. Internet of Things (IOT) D. World wide web **MULTIPLE CHOICE** **SET B** 1. A compound used to prevent overheating of CPU A. Central Processing Unit (CPU) separator B. Heat sink insulator C. Interface sink D. Thermal paste 2. What is the maximum cable length for USB 2.0? A. 5ft. B. 1.2 yards C. 1.5 meters D. 5 meters 3. What software program stores into a Read Only Memory (ROM)? A. Driver B. Firmware C. Flash IC D. Power On Self Test(POST) 4. Disc Image also known as \_\_\_. A. Hard Disk Drive (HDD) Image B. Installer image C. ISO image D. WIM image 5. What is the minimum hardware requirements of the computer RAM, for Windows 10? A. 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit B. 1 gigabyte (GB) for 32-bit or 4 GB for 64-bit C. 2 gigabyte (GB) for 32-bit or 2 GB for 64-bit D. 4 gigabyte (GB) for 32-bit or 4 GB for 64-bit 6. An extension of Microsoft management console used to manage hardware devices including device drivers. A. Console Manager B. Device Manager C. Hardware Manager D. Peripheral Manager 7. What is the volt rating of the YELLOW wire in a power supply? A. -5V B. +5V C. -12V D. +12V 8. A Yost cable, Cisco cable, and Console cable also known as \_\_\_\_. A. Cross-Over B. Extreme C. Straight --Thru D. Roll- Over 9. In Server 2008, Local Area Network (LAN) connection icon in a yellow color indicator signifies\_\_\_. A. Driver problem B. No connectivity C. Update D. Virus 10. Light Emitting Diode (LED) in network interface card (NIC) has \_\_\_ lights. A. 1 B. 2 C. 3 D. 4 11. Port \_\_\_\_ is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another. A. Evaluation B. Forwarding C. Request D. Standard 12. What is the alternative for wired connection that uses radio frequencies to send signals between devices and a router? A. Wireless Fidelity B. Wireless Finder C. Wireless Firmware D. Wireless Fix 13. \_\_\_ is a computer network made up of an interconnection of local area network (LANs) within a limited geographical area, e.g. corporate buildings A. Campus Area Network B. Metropolitan Area Network C. System Area Network D. Wide Area Network 14. What term applies to the interconnections of LAN in a city into 5 to 50 kilometers? A. Campus Area Network B. Local Area Network C. Metropolitan Area Network D. Wide Area Network 15. Who is assign to monitor the network security, operation and network users? A. Encoder B. End --user C. Network Administrator D. Network Technician 16. \_\_\_\_ is used to store the users documents with the large amount of memory and storage space. A. Application Server B. File Server C. Mail Server D. Print Server 17. What IP address used by virtual machine to communicate over the physical network? A. Customer address B. Internet address C. Private address D. Provider address 18. What type of version that verifies network users through a server and requires a more complicated setup, but provides additional security? A. Temporal Key Integrity Protocol (TKIP) B. WPA2-Enterprise C. WPA2-Personal D. Wi-Fi Protected Setup (WPS) 19. \_\_\_is a way to identify a specific process to which an internet or other network message forwarded when it arrives at a server. A. IP address B. PING C. Port Number D. Proxy server 20. An automated software program that executes certain commands when it receives a specific input is \_\_\_. A. Bot B. Malicious code C. Spyware D. Threat 21. \_\_\_\_enables administrators to configure storage thresholds on particular sets of data stored in server NTFS volumes A. Data Compression B. Extensible File Allocation Table (exFAT) C. Fat-formatted partition D. File System Quota 22. What featured in windows server provides the ability to migrate workloads between a source and target cluster? A. Failback B. Failover C. Live Migration D. Shared storage 23. What log files that record performance statistics based on the various performance objects and instances available in performance monitor? A. Circular logging B. Counter Logs C. Linear Logging D. View Log File Data 24. The Recovery Console Command that examines the volume for errors and repairs it. A. Bootcfg B. Bootrec C. Chkdsk D. Mbr 25. The computer system is functional if it is in \_\_\_. A. Auto shut off B. Change option C. Good option D. Normal booting 26. What windows update the downloads and installs latest version? A. Check update B. Full updates C. Fully automatic D. Semiautomatic 27. What is the physically damaged clusters of storage on the hard drive? A. Bad sector B. GUID partition title C. Master boot record (MBR) D. Volume 28. It occurs when two or more devices connected with the same IP address in a computer network A. Dynamic IP address conflict B. IP address conflict C. Private IP address conflict D. Static IP address 29. What storage devices should replace it frequent error messages appear while moving file and booting up operating system? A. Flash drive B. Hard disk C. Optical drive D. Random Access Memory 30. What recovery console commands that writes a new master boot records on the hard disk drive A. Bmrui B. Bootrec C. Chkdsk D. Fixmbr **MULTIPLE CHOICE** **SET C** 1. What is the maximum cable length for USB 3.0 using a non twisted pair wire A. 3 meters B. 4 meters C. 5 meters D. 10 meters 2. M.2 is a form factor for \_\_\_. A. Memory B. Motherboard C. Power supply D. Storage drive 3. What kind of chips stores the setting in the BIOS? A. Advanced Technology eXtended (ATX) Chip B. Basic input output system random access memory (BIOS RAM) Chip C. Complementary Metal Oxide Semiconductor Read only Memory (CMOS ROM) chip D. Real Time Clock/Non Volatile Random Access Memory (RTC/NVRAM) chip 4. It is used as a substitute for actual disc, allowing users to run software without having to load a CD or DVD. A. Bootsys file B. Cmd file C. Hyberfil file D. ISO file 5. What windows edition has a program capable or restricting other users to access certain programs in computer? A. Windows Extreme B. Windows Basic C. Windows Professional D. Windows ultimate 6. In what folder that the device driver can be found A. Drv B. Program files C. Registry D. System32 7. An ideal voltage range on the hotwires of a molex connector? A. Red =3.3V, Yellow=5v B. Red=5v, Yellow=3.3v C. Red= 5v, Yellow= 12v D. Red=5V, Yellow= 5v 8. What Ethernet cable used to connect computers to hubs and switches? A. Cross-over B. Extreme C. Roll-over D. Straight-thru 9. A network interface controller also known as \_\_\_. A. Hub B. LAN Card C. Switch D. WAP 10. What class of IP address is 192.168.0.1? A. Class A B. Class B C. Class C D. Class D 11. A router that is design to operate in the internet backbone. A. Bridge B. Core C. Edge D. Network 12. \_\_\_ allows to define a list device and only allow those devices on Wi-Fi network. A. MAC Address Filtering B. Service Set Identifier C. Wired Equivalent Privacy D. Wireless Security 13. What type of network that connects through signals, e. g. infrared? A. Campus Area Network B. Local Area Network C. Wireless Personal Area Network D. Wide Area Network 14. \_\_\_allows users to move around the converge area in a line of sight while maintaining a network connection. A. Campus Area Network B. Local Area Network C. Wide Area Network D. Wireless Local Area Network 15. \_\_\_is an enterprise-level heterogeneous backup and recovery suite. A. NetBackup B. NetCopy C. NetFile D. NetSave 16. A type of server that allows the central administration and management of network users and network resources. A. Application server B. Database server C. Directory server D. File server 17. \_\_\_ is an information asset suffering damage, unintended modification or disclosure. A. Attack B. Exploit C. Exposure D. Loss 18. The network security standard tries to make connections between a router and wireless devices faster and easier. A. TKIP B. WPS C. WPA2-enterprise D. WPA2-Personal 19. Which of the following is the most efficient in transferring larger files? A. Control protocol B. File transfer protocol C. Hypertext transfer protocol D. Network time protocol (NTP) 20. What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a IP address? A. Sniffers B. Spam C. Spoofing D. Spyware 21\. It enables administrators to define the types of file that can save within a windows volume and folder. A. File Classification Infrastructure B. File Compression C. File Encryption D. File Screening 22\. What second clustering technology provides by corresponding client requests across several servers with replicated configurations? A. Cluster quorum B.Hyper-V virtualization C. Network Load Balancing D. Quick Migration 23\. What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits? A. Circular Logging В. Counter Logs C. Linear Logging D. View Log File Data 24\. А should be upgraded to receive and transmit strong signals to and from other computer. A. Video card B.Memory card C.Network card D. Sim card 25\. A protocol that provides quick, automatic, and central management for the distribution of IP addresses within a network. A. Domain Name System (DNS) B. Dynamic Host Control Protocol (DHCP) C. Simple Mail Transfer Protocol (SMTP) D. Transmission Control Protocol (TCP) 26\. What command-line tool used to find the IP address that corresponds to a host or domain name? A. Ms dos B. Nslookup C. ping D. tracert 27\. What is the problem of a computer if the time and date keeps on resetting even after fixing in the BIOS? A. CMOS battery failure В. CPU overheating C. Flash memory failure D. System crashing 28\. A tool used for checking the condition of the hard drive with signs like \"Good\", \"Caution\" or \"Bad\". A. CrystalDiskinfo В. Defragmented C. Disk Management D. Scandisk 29\. A task to do after planning to fix the network is\_\_\_. A. Implementing the agreement B. Implementing the idea C. Implementing the result D. Implementing the solution 30\. A process of scanning, identifying, diagnosing and resolving problems, errors and bugs in software. A. Debugging B. Software diagnostic C. Software troubleshooting D. Testing **MULTIPLE CHOICE** **SET D** 1\. \_\_\_\_\_\_\_\_\_\_\_ is a 24 pin USB connector system with a rotationally symmetrical connector. A. Extreme Universal Serial Bus B. Super Universal Serial Bus C. Ultra Extreme D. Universal Serial Bus (USB) C Thunderbolt 2\. It facilitates communication between the CPU and other devices in the system. A. Basic Input Output System (BIOS) B. Bus C. Chipset D. Random Access Memory (RAM) 3\. What option in the BIOS/UEFI used to overclock computer? A. Clock Basic Input Output System(BIOS) B. Extreme Basic Input Output System (BIOS) C. Power Basic Input Output System (BIOS) D. Voltage Basic Input Output System (BIOS) 4\. Minimum byte capacity of a bootable flash drive for Windows 10 is\_ A. 4GB B. 8GB C. 16GB D. 32GB 5\. What is the minimum RAM requirement of Server 2012 R2? A. 512MB B. 1GB C. 2GB D. 4GB 6\. In Windows 7, Windows update and security is located in. A. Device Manager B. Programs C. Settings D. System Performance 7\. What voltages that ATX12V P1 connector provides for the motherboard? A. 3.3V, 5V B. 3.3V, 5V, 12V C. 3.3V, 12V D. 5V, 12V 8.\_\_\_\_\_\_\_\_\_\_ defined as a structured network cabling system standards for commercial buildings, and between buildings in campus environments. A. ANSI/TIA-567 B. ANSI/TIA-568 C. ANSI/TIA-566 D. ANSI/TIA-587 9\. In networking, through a networking \_\_\_\_\_\_\_\_\_ refers to pieces of related information that are transferred through the network A. Access B. Connection C. Packet D. Wi-Fi 10\. What Class of IP addressing is [[172.168.10.1?]](https://l.facebook.com/l.php?u=http%3A%2F%2F172.168.10.1%2F%3Ffbclid%3DIwAR08sxv2QoWKHRUiD2lvoukkPN_N1TDHK6ws1lORGy2xW42p1f6tqzdZmU8&h=AT0byV4HM3XNfVjdv5cF5b7EaRxVpnFkC34k3rW8wjH-NVtS0h4JYxYiR-mVPZQ5zdON92SKVBSKFYVw8AwYHnzdQZK0Yw2l6X0SH9FLmtivaOtQlU5tZMePtpDNDZNcFWXdUw) A. Class A B. Class B C. Class C D. Class D 11\. What type of router that enables an internal network to connect to external network? A. Broadband B. Core C. Edge D. Forwarding 12\. What pertains to the maximum data transfer rate of a network for internet connection? A. Backbone B. Backhaul C. Bandwidth D. Broadband 13\. What type of a high-speed network/subnetwork that composed of hosts and Interconnects using a variety of technology/topology? A. Campus Area Network B. Local Area Network C. Personal Area Network D. Storage Area Network 14\. It acts like a border router to connect corporate sites 10 wired access lines. A. Customer Premises Equipment (CPE) B. Network Transfer Equipment (NTE) C. Product Terminal Equipment (PTE) D. Virtual Control Equipment (VCE) 15\. Is a process of recognizing a user\'s identity. A. Authentication B. Authorization C. Encryption D. Identification 16\. A type of server that occupies a large portion of computing territory between the database server and end user. A. Application server B. Client server C. Directory server D. File server 17\. In the context of security, \_\_\_\_\_\_\_\_\_\_\_\_\_ is a privilege or assigned permission for the use of computer data or resources. A. Access B. Asset C. Attack D. Exploit 18\. What media types of 10-megabit Ethernet that compose of broadband coaxial cable carrying multiple baseband channels for a maximum length of 3,600 meters? A. 10Base-T B. 10BASE-2 C. 10BASE-5 D. 10BASE-36 19\. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A. Firewall B. Gateway C. Group Policy D. Media Access Control (MAC) 20\. What term used to refer when a system is unavailable? A. Downtime B. Recovery C. Reliability D. Unavailabilty 21\. Which of the following commands used to certify the peer name resolution in Active Directory? A. DCPROMO B. DNSCMD C. FORMAT D. NSLOOKUP 22\. What active directory protocol used to access data from a database? A. Dynamic Host Control Protocol (DHCP) B. File Transfer Protocol (FTP) C. Simple Mail Transfer Protocol (SMTP) D. Lightweight Directory Access Protocol (LDAP) 23\. Which of the following displays the measures and various real-time statistics on the system\'s performance? A. Counter Logs B. Counter Monitoring C. View Current Activity D. View Log File Data 24\. What type of peripheral card having media access control address? A. Firmware card B. Network interface card C. Peripheral component interconnect card D. Tuner card 25\. Which of the following is a term for the main patch panel that links to every telecommunication room inside the building? A. Lead extension B. Major distribution line C. Multiplexer D. Vertical cross-connect 26\. An enclosed or semi-enclosed channel that protects, routes and hides cables and wires A. Holder B. Rack C. Panel D. Raceway 27\. A material that slid before crimping both ends of a patch cable and acts to reduce strain in a cable. A. Boot B. Protector C. Shield D. Ring 28\. What test verifies the operation of communication device by sending and receiving data from the same port? A. Data link test B. Loopback test C. Routing test D. Signal test 29\. What networking tool that monitors and intercepts traffic over the computer network? A. Data link analyzer B. Frequency analyzer C. Packet-analyzer D. Protocol analyzer 30\. Resistance reading of an open wire is \_ A. Almost zero ohm B. Infinite ohms D. 1 **MULTIPLE CHOICE** **SET E** 1\. \_\_\_\_\_\_\_\_\_\_\_\_\_ is an interface standard for a serial bus for high-speed communications also referred as Institute of Electrical and Electronics Engineers (IEEE) 1394 interface. A. Firewire B. Universal Serial Bus (USB) C. Serial Advanced Technology Attachment (SATA) D. Thunderbolt 2\. A microchip to manage data communication between a CPU and a motherboard. A. Inclusive Controller Hub B. Input/Output Controller Hub C. Internal Controller Hub D. Intersystem Controller Hub 3\. A setup option In Unified Extensible Firmware Interface (UEFI)/Basic Input Output System (BIOS) that allows security settings to perform such tasks as locating the device. A. LoJack B. Remote PC On C. Tracker on D. Wake on LAN 4\. A text based command used for creating bootable flash drive. A. Boot B. Chkdsk C. Diskpart D. Format 5\. What is the minimum Random Access Memory (RAM) requirement of Server 2008 R2? A. 512MB B. 1GB C. 2GB D. 4GB 6\. In Windows 7, an indicator tells that a video driver has not installed. A. Displays bios setup only B. NO video display C. Only standard video is displayed D. Three short beeps 7\. A Volt meter reading of a shorted diode. A. Almost zero volt B. Equal to its source voltage C. Half of the source voltage D. Zero volt 8\. \_\_\_\_\_\_\_\_\_\_\_\_ is the process of joining two cable ends together. A. Cable conduiting B. Cable passing C. Cable pressing D. Cable splicing 9\. What is a hardware device that enables to connect serial devices across a network? A. Com Port B. Coaxial Cable C. Register Jack D. Terminal Server 10\. What Class of IP addressing is [[10.10.10.1?]](https://l.facebook.com/l.php?u=http%3A%2F%2F10.10.10.1%2F%3Ffbclid%3DIwAR3xOiRUVLiUBO3yIvdjdlZLBq--hLtmAH55iamafpqhbDbRphyNYiL3PkI&h=AT1oAMLuJAXF965IZPWaJfjudtG-60rTpJGQ9QF_xdwXw6_91YdxMJiW8Qvyl53PnKlhADJRZp0hnxVN0J4pLkwijTppLmAWFNFzfCFd3UpSF7JCwvsJ-oZ07z_-IYLNYm7rXg) A. Class A C. Class C D. Class D 11\. How many devices can connect to a wireless router? A. 250 B. 200 C. 150 D. 100 12\. A device that acts as a bridge between wireless clients and wired network is A. Access Point B. Broadband C. Hub D. Router 13\. A logical subnetwork that groups collection of devices from the same network switch. A. Enterprise Private Network B. Personal Area C. System Area Network D. Virtual Local Area Network 14\. It is the time lapse between data sent and when received, it can have a big impact on performance. A. Cycle B. Delay C. Gap D. Latency 15\. \_\_\_\_\_\_\_\_\_ which means pushing component to its limits and extremes. A. Interface Test B. Logic Test C. Stress Test D. Technical Test 16\. What type of server that enables large numbers users to exchange information near instantaneously and formerly known as Internet Relay Chat (IRC) Servers? A. Directory server B. Proxy Servers D. Server Platforms 17\. It ensures that information and programs are changing only in a specified and authorized manner. A. Availability B. Confidentiality C. Integrity D. Security 18\. What command-line network utility that displays network connections for TCP and routing tables? A. Connections.ixt B. Ipconfig C. Netstat D. Ping 19\. What set of rules that describe how software and hardware should interact within a network? A. Communications protocol B. Expanding the network C. Group policy D. Multihomed host 20\. What attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information? A. Bot B. Information Extortion C. Malicious code D. Polymorphic 21\. Set of rules for transferring files such as text, graphic images, sound, video and other multimedia files, on the World Wide Web (WWW). A. Accelerated File Transfer Protocol (AFTP) B. File Transfer Protocol C. Hypertext Transfer Protocol (HTTP) D. Simple Mail Transfer Protocol (SMTP) 22\. What is the traditional method used to access server data and using the server message block protocol over TCP/IP? A. File Resource Manager tools B. File System Monitoring C. System Management Tools D. Windows Folder Sharing 23\. What two command-line utilities used to export and import Active Directory object information? A. AllUsers, ldf and objectclass=user B. Csvde and Set-ADComputer C. Ldifde.exe and csvde.exe D. Ping.exe and ping /all 24\. A node in a computer network that allows data to flow from one discrete network to another. A. Gateway B. Hub C. Network Interface Card (NIC) D. Router 25\. What electrical quantities measured when performing continuity testing of twisted pair cable? A. Capacitance B. Conductance C. Inductance D. Resistance 26\. What type of backup used in hard drive, disc, flash drive and external drive that are housed on site? A. Differential Backup B. Incremental Backup C. Full Backup D. Local Backup 27\. What recovery tool in Windows fixes and scans computer problem that prevents computer from booting repeatedly? A. Boot sequence B. Restore point C. Repair and update D. Startup Repair 28\. \_\_\_\_\_\_\_\_ used to run commands for troubleshooting unbootable operating system. A. Master Boot Record B. Power On Self-Test C. Windows Recovery Environment D. Windows Update 29\. Which of the following electronic components need to discharge electrically before the replacement of parts? A. Capacitor B. Diode C. Resistor D. Transistor 30\. The most current wireless networking standard and can communicate with the older network standards. A. 802.11a B. 802.11b C. 802.11 g D. 802. 1171 **DESIGN AND DRAW NETWORK LAYOUT** **FILL OUT THE MAINTENANCE SERVICE FORM** **TOOLS AND EQUIPMENT** **GOOD** **BAD** **REMARKS** ------------------------------------ ---------- --------- ------------- SCREWDRIVER (PHILIPS) MECHANICAL PLIERS MULTITESTER LAN TESTER ANTI-STATIC DEVICE ROUTER WITH WIFI WIRELESS ACCESS POINT MODULAR BOX DESTOP COMPUTER UNINTERRUPTIBLE POWER SUPPLY (UPS) **DIAGNOSE AND IDENTIFY, FAULT AND DEFECT WITH POSSIBLE CAUSES BASED ON THE GIVEN SPECIFICATION** **FAULT/ DEFECT: NO DISPLAY** **POSSIBLE CAUSES:** **RECTIFICATIONS:** **FAULT/ DEFECT: NO POWER** **POSSIBLE CAUSES:** **RECTIFICATIONS:** **FAULT/ DEFECT: NO NETWORK CONNECTIVITY** **POSSIBLE CAUSES:** **RECTIFICATIONS:**

Tags

computer systems networking information technology
Use Quizgecko on...
Browser
Browser