UGRD-CS6206 - Principles of Operating System and Applications
It is the built-in encryption tool for Windows
file systems |
Encrypting File Systems |
It is the foundation of the Internet naming scheme
and it supports accessing resources by using alphanumeric names. |
DNS Server |
It is the most common form of computer network. |
Local Area Network |
It is the non-contiguous storage of data on a
volume |
Disk Fragmentation |
It is the process of determining whether something
or someone has permission to access the resources |
Authorization |
It is the process of verifying the identity of
something or someone. |
Authentication |
It provides assistance in resolving
network-related issues |
Windows Network
Diagnostics Tool |
It provides storage for the users' files and share
folders that contain users' files. |
File Server |
It reduces the complexity and amount of
administrative work by using automatic TCP/IP configuration. |
DHCP Server |
Provides a timeline of system changes and
reliability. It also provides a system stability chart and reports on
software installations and software or hardware failures. |
Reliability Monitor |
Strong EAP methods provide strong authentication |
IEEE 802.1X |
This are equivalents to door locks, employee
badges and security systems. It protects the computer and networks from
intrusions. |
Firewall |
What is the IEEE 802 Standards for Local Wireless
Networks? |
IEEE 802.11 |
Which of the following is a main type of group? |
Distribution |
Which of the following is not a Boot-option for
troubleshooting startup problems? |
None of the choices |
Which of the following is not a LAN Physical
Topology? |
Crown |
Which of the following is not a Performance
Monitor tool? |
Windows Memory
Diagnostics Tool |
It is a collection of Domain Trees. |
Forest |
It is a collection of user accounts, computer
accounts, contacts and other groups that you can manage as a single unit. |
Groups |
It is a computer that is dedicated to running
network-aware application software. |
Application Server |
It is a device that converts instructions from the
network protocol stack into electric signals. |
Network Adapter |
It is a device that provides wiring concentrator
functionality like a hub but it also enables network traffic management,
performs firewall functions and makes routing decisions based upon traffic
priority. |
Switch |
It is a downloadable application that helps
windows user identify which edition of Windows 7 meets their needs. |
Windows Upgrade Advisor |
It is a dynamic volume that encompasses available
free-space from single, dynamic, hard disk drive. |
Simple Volume |
It is a feature of Windows 7 that allows windows 7
to be backward compatible |
Windows XP mode |
It is a graphical user interface that is used to
manage disks and volumes both basic and dynamic, locally or on remote
computers. |
Disk Management |
It is a group of services hosted on a network
which is a private structure and has the internet-like service provision. |
Intranet |
It is a method of sharing folders that allow
multiple default public folders for each computer and files shared with same
computer and with same network. |
Public Sharing |
It is a method of sharing folders that allows you
to share folders quickly. |
Basic Sharing |
It is a new authentication features that controls
the ability of online IDs to authenticate to a computer. |
Online Identity
Integration |
It is a new Windows 7 security feature that
enables IT professionals to specify exactly what is allowed to run on user
desktops. |
Applocker |
It is a scriptable command line utility that
create scripts to automate disk related task. |
Diskpart |
It is a security feature that simplifies the
ability of users to run as standard users and perform all neccessary daily
tasks |
User Account Control |
It is a small software program that allows a
hardware device to communicate with a computer |
Drivers |
It is a software that is designed to deliberately
harm a computer. |
Malicious Software |
It is a strong authentication (with strong EAP
method) and strong (TKIP) or very strong (AES) encryption used by medium and
large organization. |
WPA-Enterprise |
It is a tool used to remove system-specific data
from the Windows operating system, configure windows to start in audit mode,
configure the windows operating system to start the Windows Welcome phase and
reset Windows Product activation. |
Sysprep |
It is a type of IPv4 Address that is required by
the devices and host that connect directly to the Internet. This address must
be unique, routable on the internet and must be assigned by IANA. |
Public IP Address |
It is a type of network that interconnect devices
by means of radio waves instead of wires and cables. |
Wireless Network |
It is a type of printing wherein it is used by
legacy application in pre-vista version of windows that uses enhanced
metafile format (EMF) as the spool file format. |
GDI based printing |
It is a way for you to limit use of disk space on
a volume for each user to conserve disk space. |
Disk Quotas |
It is a Windows Authentication Method that is used
by windows 7 clients and server running Microsoft Windows Server 2000 or
later |
Kerberos v5 |
It is a wireless network modes that allows a
wireless network adapters connects directly to another wireless network
adapter for the purpose of temporarily sharing of files, presentations or an
internet connection among multiple computers and devices. |
Ad hoc mode |
It is an administrative tool for managing user
settings and computer settings across a network. |
Window Update Group
Policy |
It is an enhanced privacy features of Internet
Explorer 8 that inherently more secure that using delete browsing history to
maintain privacy because there are no logs kept or tracks made during
browsing |
InPrivate Browsing |
It is an object that contains all of the
information that defines a user in Windows Server 2008 R2. |
User Account |
It is one of the Considerations on why using the
option of Upgrade rather than Migrate. |
Does not require the
reinstallation of applications |
It is one of the feature of Windows 7 that
encrypts the computer operating system and data stored on the operating
system volume. |
Bitlocker |
It is one of the Key Features of Windows 7 that
simplify a user's ability to organize, search for, and view information. |
Usability |
It is one of the Key Features of Windows 7 that
takes advantage of modern computing hardware, running more reliably and
providing more consistent performance than previous versions of Windows. |
Reliability and
Performance |
It is one of the Options for Installing Windows 7
where in you install Windows 7 on a new partition and replace an existing
operating system on a partition. |
Clean Installation |
It is one of the Options for Installing Windows 7
where in you replace an existing version of Windows with Windows 7 but all
user applications, files and settings are retained. |
Upgrade Installation |
Which of the following is not a Physical WAN
Components? |
Network Adaptor |
Which of the following is not a Server Role of
Windows Server 2008 R2? |
Windows Power Shell |
Which of the following is not a Specialized
version of Windows 7? |
Windows 7 Professional |
Which of the following is not a way to improve the
signal strength? |
None of the Choices |
Which of the following is not a Wireless LAN
Standards? |
802.11 h |
Which of the following is not an advantage of
installing a 64-bit edition of Windows 7? |
It supports 16-bit
Windows on Windows (WOW) environment |
Which of the following is not the common network
architecture types? |
WiMax |
Which of the following statement is not correct? |
You can configure the
client computer by going to the accessories in the start menu and clicking
the network options. |
Which of the following version of Windows are
allowed for Upgrade? |
Windows Vista SP1 |
What type of notation does IP version 6 address
uses? |
Hexadecimal |
It specifies which part of an IPv4 address is the
network ID and which part of the IPv4 address is the Host ID. |
Subnet Mask |
What is the maximum bit rate for the 802.11n
technologies? |
600mbps |
It is the measurement on how quickly the computer
completes a task. |
Performance |
It provides authenticaltion, host operations of
master roles, hosting the global catalog and support group policies and
sysvol. |
Domain Controller |
Where will you see the Manage Wireless Networks
tool in your PC? |
Control Panel |
It is a dynamic volume that joins areas of
unallocated space disks into a single logical disk |
Spanned Volume |
It is a device, usually a router, on a TCP/IP
internet that forwards IP packets to other subnets. |
Default Gateway |
You are the system administrator for a large
organization that uses Windows Server R2 and Windows 7. You have a Windows 7
machine and have enabled System Protection. You want the machine to retain
only the last System Protection snapshot that was taken. What should you do? |
Run Disk Cleanup for
System Restore and then run Shadow Copies |
You are the administrator for a large organization
with multiple Windows Server 2008 domain controllers and multiple domains.
You have a Windows 7 machine that is set up for all users to access. You have
an application called StellApp.exe that everyone on this Windows 7 computer
can use except for the sales group. How do you stop the sales group from
accessing this one application? |
Create an executable
rule from the Application Control Policy |
Alexandria is the payroll manager and stores
critical file on her local drive for added security on her Windows 7
computer. She wants to ensure that she is using the disk configuration with
the most fault tolerance and the highest level of consistent availability.
Which of the following provisions should she use? |
Mirrored volumes |
You are the system administrator for your company.
You are configuring the services on a Windows 7 computer. You want to ensure
that if a service fails to load, it will attempt to restart. Which tab of the
service`s Properties dialog box should you use? |
Recovery |
Your company network includes desktop computers
that have Windows 7 installed. Microsoft updates are applied automatically at
a scheduled time. A use1- reports that a proprietary application has stopped
working. You need to uninstall the most recent update from Microsoft. What
should you do first? |
From the Action Center,
open the Windows Update window. |
It provides transparent access to internal network
resources whenever they are connected to the Internet. It also enables the IT
Professionals to manage remote computers outside of the office and does not
require a VPN connection. |
DirectAccess |
Which of the following is not an IPv6 Address
types? |
Broadcast |
It is a windows 7 feature that enables user to
connect to their desktop computer from another device. |
Remote Desktop |
You are a desktop administrator for an enterprise
organization. A user applies a device update from the manufacturer, and now
the computer is displaying error messages. The user has critical documents on
the computer that need to be preserved. You need to restore the computer to
an operating state and preserve applications and data. What should you do? |
Restore Windows by
using the most recent System Restore point |
It enables you to manage network traffic, group
physically dispersed nodes into logical area networks and isolate network
traffic. |
Virtual Local Area Network |
It holds a copy of AD DS and responds to request
for active directory information. |
Domain Controller |
It allows you to control which role functionality
is installed and enabled. |
Role Services |
It a server that is used to access the corporate
resources from outside the corporate network. |
Remote Access Server |
it is the foundation of the Internet naming scheme
and it supports accessing resources by using alphanumeric names. |
DNS Server |
It enables the user to log on and access resources
on a specific computer and usually reside in SAM. |
Local User Accounts |
It enables users to log on to the domain to gain
access to the network resources and it is reside in Active Directory. |
Domain User Accounts |
It enables IT Administrator to automate
one-to-many management of users and computers. |
Group Policy |
You have a computer that runs Windows 7. The
computer is a member of a workgroup. You use Encrypting File System (EFS) to
protect your local files. You need to ensure that you can decrypt EFS files
on the computer if you forget your password. What should you do? |
From User Accounts, Select Manage
your file encryption certificates. |
You are evaluating the purchase a netbook computer
that has the following hardware: 1.6-gigahertz (GHz) 32-bit
processor 1024-MB RAM
1 video card that uses shared memory 4-G8 solid state drive You need to ensure that you can install Windows 7
Enterprise on the netbook computer. Which hardware component should you
change or add? |
storage device |
Your company network includes desktop computers
that have Windows 7 installed. Microsoft updates are applied automatically at
a scheduled time. A use1- reports that a proprietary application has stopped
working. You need to uninstall the most recent update from Microsoft. What
should you do first? |
From the Action Center, open the
Windows Update window. |
You install the Windows Automated Installation Kit
(WAIK) for Windows 7 on a computer that runs Windows 7. You want to deploy a
Windows image (WIM) file to other computers in the domain. You need to
capture the operating system, computer configuration, and applications
installed on the computer to a WIM file. What should you do before you
capture the image? |
Run ScanState.exe |
You manage a network device by using a web
interface. You perform all critical Windows updates so that the computer now
runs Internet Explorer 10. After performing these updates, the layout of the
network device web page displays incorrectly. Other web pages display
correctly. You need to resolve this issue. What should you do? |
Add the network device web page
to the trusted sites zone |
You are a desktop administrator for an enterprise
organization. A user applies a device update from the manufacturer, and now
the computer is displaying error messages. The user has critical documents on
the computer that need to be preserved. You need to restore the computer to
an operating state and preserve applications and data. What should you do? |
Restore Windows by using the most
recent System Restore point |
You are the administrator for a large organization
with multiple Windows Server 2008 domain controllers and multiple domains.
You have a Windows 7 machine that is set up for all users to access. You have
an application called StellApp.exe that everyone on this Windows 7 computer
can use except for the sales group. How do you stop the sales group from
accessing this one application? |
Create an executable rule from
the Application Control Policy |
You are the network manager for a small company.
You have a junior IT administrator who did some installations last week on a
Windows 7 machine. How can you see what applications were installed last week
on the Windows 7 machine? |
View the informational events of
Reliability Monitor |
You are the network administrator for Stellacon
Corporation. User in the sales department have been complaining that the
Sales application is slow to load. Using Performance Monitor, you create a
baseline report for one of the computers, monitoring memory, the processor,
the disk subsystem, and the network subsystem. You notice that the disk
subsystem has a high load of activity. What other subsystem should you
monitor before you can know for sure whether you have a disk subsystem
bottleneck? |
Memory |
You are the network administrator for a large
organization that uses both Windows Server 2008 R2 and Windows 7. One of the
Windows 7 machines needs to be backed up daily. You perform an image backup
on the Windows 7 machine. The Windows 7 machine then gets struck by a virus
and will not start up properly. What can you do to get the Windows 7 machine
up and running the fastest possible way |
Start the computer from the
Windows 7 DVD and then use the System Image Recovery tool |
You are the system administrator for a large
organization that uses Windows Server R2 and Windows 7. You have a Windows 7
machine and have enabled System Protection. You want the machine to retain
only the last System Protection snapshot that was taken. What should you do? |
Run Disk Cleanup for System
Restore and then run Shadow Copies |
Alexandria is the payroll manager and stores
critical file on her local drive for added security on her Windows 7
computer. She wants to ensure that she is using the disk configuration with
the most fault tolerance and the highest level of consistent availability.
Which of the following provisions should she use? |
Mirrored volumes |
You are the system administrator for your company.
You are configuring the services on a Windows 7 computer. You want to ensure
that if a service fails to load, it will attempt to restart. Which tab of the
service`s Properties dialog box should you use? |
Recovery |
Kayla is dissatisfied with the configuration of
her keyboard and mouse. She wants to reset the keyboard speed and the mouse
pointer rate. Which utility should she use to configure the keyboard and
mouse properties? |
Control Panel |
You are the network administrator for your
organization. You have been asked by the owner of the company to verify that
all drivers installed on the Windows 7 machines are signed drivers. How do
you accomplish this task? |
Run Sigverif.exe at the command
prompt |
You are the network administrator for a large
organization. You are in charge of implementing company policies. One company
policy states that you have to prevent Internet Explorer from saving any data
during a user`s browsing session. How do you accomplish this? |
Run the browsers in the InPrivate
session |
You use a portable computer that has Windows 7
Enterprise SP1 installed. A conference room at your company has a network
projector installed on a server within the company network. You need to
connect to the projector from your computer. What should you do? |
From Accessories, click Connect
to a Network Projector |
You administer an Active Directory domain that
includes portable computers that have Windows 7 SP1 installed. You log on to
one of the portable computers by using a domain user account and install a
new device for a bar-code scanner. You restart the portable computer after
installing the new device driver. You successfully log on to the computer by
using a domain user account. After logging on, you discover that the bar-code
scanner is not working due to a driver error. You try to remove the installed
driver, but the Roll Back Driver option is unavailable. You need to be able
to roll back the driver to its previous version. What should you do? |
Run the Device Manager by using
elevated permissions |
You are the network administrator for a small
company that has just switched its machines from Windows XP to Windows Vista
and Windows 7. One of the users who has Windows Vista asks you why there is a
vertical sidebar on the screen. What feature of Windows Vista is this? |
Windows Sidebar |
Your company has asked you to implement Network
Access Protection(NAP) on the network. You already have Windows Server 2008
installed on your servers but your organization wants to know which client
operating systems will support NAP. What operating system does not support
NAP? |
Windows XP with SP2 |
It is one of the features of Mobile Computers
wherein it synchronizes various content including music, video, contacts,
calendar events, web browser favorites and other files between Windows Mobile
devices and Windows 7 |
Windows Mobile Device Center |
It is a method of turning a computer on or off
wherein the system state is saved to memory. |
Sleep or Standby |
This Power plan saves power on a mobile computer
by reducing system performance. Its primary purpose is to maximize the
battery life. |
Power Saver |
It is a windows 7 feature that enables user to
connect to their desktop computer from another device. |
Remote Desktop |
It is a windows 7 feature that enables support
staff to connect to a remote desktop computer. |
Remote Assistance |
This are point-to-point connection across a
private or public network. It uses special protocols, called tunneling
protocol to make a virtual call to a virtual port. |
Virtual Private Network |
It provides transparent access to internal network
resources whenever they are connected to the Internet. It also enables the IT
Professionals to manage remote computers outside of the office and does not
require a VPN connection. |
Direct Access |
It caches content from remote and web servers in
the branch location so users can quickly access the content. This cache can
be hosted centrally in the branch location or distributed across user PCs. |
Branch Cache |
How many bits are there in an IP version 4
address? |
32 bits |
APIPA stands for: |
Automatic Private IP Addressing |
What is the binary notation for the 255.255.255.0
subnet mask? |
11111111.11111111.11111111.00000000 |
It specifies which part of an IPv4 address is the
network ID and which part of the IPv4 address is the Host ID. |
Subnet Mask |
It is a device, usually a router, on a TCP/IP
internet that forwards IP packets to other subnets. |
Default Gateway |
It is a type of IPv4 Address that is required by
the devices and host that connect directly to the Internet. This address must
be unique, routable on the internet and must be assigned by IANA. |
Public IP Address |
172.16.0.0 /12 is what type of IPv4 Address. |
Private IP Address |
How many bits are there in an IP version 6
address? |
128 bits |
What type of notation does IP version 6 address
uses? |
Hexadecimal |
Which of the following is not an IPv6 Address
types? |
Broadcast |
It is a type of network that interconnect devices
by means of radio waves instead of wires and cables |
Wireless Network |
It is a strong authentication (with strong EAP
method) and strong (TKIP) or very strong (AES) encryption used by medium and
large organization. |
WPA-Enterprise |
Strong EAP methods provide strong authentication |
IEEE 802.1X |
Where will you see the Manage Wireless Networks
tool in your PC? |
Control Panel |
Which of the following statement is not correct? |
You can configure the client
computer by going to the accessories in the start menu and clicking the
network options. |
What is the maximum bit rate for the 802.11n
technologies? |
600mbps |
Which of the following is not a way to improve the
signal strength? |
None of the Choices |
It is a wireless network modes that allows a
wireless network adapters connects directly to another wireless network
adapter for the purpose of temporarily sharing of files, presentations or an
internet connection among multiple computers and devices. |
Ad hoc mode |
It is the measurement on how quickly the computer
completes a task. |
Performance |
It is the measurement of how a system conforms to
expected behavior |
Reliability |
Which of the following is not a Performance
Monitor tool? |
Windows Memory Diagnostics Tool |
Windows Memory Diagnostics Tool |
Windows Network Diagnostics Tool |
Checks for symptoms of defective computer memory
and usually can be started from administratve tools in the control panel |
Windows Memory Diagnostics Tool |
Provides a timeline of system changes and
reliability. It also provides a system stability chart and reports on
software installations and software or hardware failures. |
Reliability Monitor |
Which of the following is not a Boot-option for
troubleshooting startup problems? |
None of the choices |
It is an administrative tool for managing user
settings and computer settings across a network |
Window Update Group Policy |
It is a central location for viewing messages about
your system and the starting point for diagnosing and solving issues with
your system. |
Action Center |
It is a software that is designed to deliberately
harm a computer. |
Malicious Software |
It enables the IT Administrators to automate
one-to-several management of users and computers |
Group Policy |
It is the built-in encryption tool for Windows
file systems |
Encrypting File Systems |
It is one of the feature of Windows 7 that
encrypts the computer operating system and data stored on the operating
system volume. |
Bitlocker |
It is a new Windows 7 security feature that
enables IT professionals to specify exactly what is allowed to run on user
desktops. |
Applocker |
It is a security feature that simplifies the
ability of users to run as standard users and perform all neccessary daily
tasks |
User Account Control |
It allows the administrators to identify which
software is allowed to run and was initially added to Windows XP and Windows
Server 2003. |
Software Restriction Policies |
This are equivalents to door locks, employee
badges and security systems. It protects the computer and networks from
intrusions. |
Firewall |
It is an enhanced privacy features of Internet
Explorer 8 that inherently more secure that using delete browsing history to
maintain privacy because there are no logs kept or tracks made during
browsing |
InPrivate Browsing |
No comments:
Post a Comment