Sei sulla pagina 1di 6

Computer Test

1.Which one of the following computer network is built on the top of another network?

A. prior network

B. chief network

C. prime network

D. overlay network

E. none

Test Result: D

2. Which one of the following extends a private network across public networks?

A. local area network

B. virtual private network

C. enterprise private network

D. storage area network

E. none

Answer: B

3. DNS can be pictured as an inverted hierarchical tree structure with one root node at top and a
maximum of

A. 128 level

B. 129 level

C. 130 level

D. 131 level

E. 132 level

Ans: A

4. Routing is done on which layer

A. Datalink Layer

B. Session Layer
C. Network layer

D. Transport Layer

E. Application layer

Ans: C

5. Which is not a valid type of routing

A. Static routing

B. Default routing

C. Dynamic routing

D. Custom routing

E. none of these

Ans: D

6) Combination of two or more networks are called

A. Internetwork

B. WAN

C. MAN

D. LAN

E. none of these

Ans: A

7) Which protocol uses an autonomous system number for activation

A. IGRP

B. RIP

C. Both of above

D. None of above

Ans: A

8) Pat address translation is also termed as


A. NAT Fast

B. NAT Static

C. Overloading Static

D. NAT Overload

E. none of these

Ans: D

9) A communication path way that transfers data from one point to another is called

A. Link

B. Node

C. Medium

D. Topology

E. none of these

Ans: A

10) Increasing the RAM of a computer typically improves performance because:

A. Virtual memory increases

B. Larger RAMs are faster

C. Fewer page faults occur

D. Fewer segmentation faults occur

E. NONE OF THESE

Ans: C

11) Virtual memory is

A. Large secondary memory

B. Large main memory

C. Illusion of large main memory


D. all of these

E. None of the above

Ans: C

12) Page fault occurs when

A. When a requested page is in memory

B. When a requested page is not in memory

C. When a page is corrupted

D. When an exception is thrown

E. none of these

Ans: B

13) A user level process in Unix traps the signal sent on a Ctrl-C input, and has a signal handling routine
that saves appropriate files before terminating the process. When a Ctrl-C input is given to this process,
what is the mode in which the signal handling routine executes?

A. kernel mode

B. HTTP, TELNET

C. FTP, SMTP

D. HTTP, SMTP

E. something else

Ans: A

14) Which one of the following statements is NOT correct about HTTP cookies?

A. A cookie is a piece of code that has the potential to compromise the security of an Internet user

B. A cookie gains entry to the user’s work area through an HTTP header

C. A cookie has an expiry date and time

D. Cookies can be used to track the browsing pattern of a user at a particular site

E. none of these
Ans: A

15) One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following
statements best explains the need for this field?

A. It can be used to prioritize packets

B. It can be used to reduce delays

C. It can be used to optimize throughput

D. It can be used to prevent packet looping

E. none of these

Ans: D

16) You deploy several tablet PCs that run Windows 10 Enterprise. You need to minimize power usage
when the user presses the sleep button. What should you do?

A. In Power Options, configure the sleep button settings to Sleep.

B. In Power Options, configure the sleep button settings to Hibernate.

C. Configure the active power plan to set the system cooling policy to passive.

D. Disable the C-State control in the computer’s BIOS.

Ans: B

17) A disaster recovery plan should contain data, hardware, and software that are critical for a business.
Which of the following are disaster recovery planning steps? Each correct answer represents a complete
solution. Choose all that apply.

A. Prioritize business processes

B. Monitor the Plan

C. Identify alternate sites

D. Identify and assess the risks

Ans: A, C, D.

18) Which of the following refers to a digital storage system directly attached to a server or workstation,
without a storage network in between?

A. DAS
B. SAS

C. NAS

D. SAN

Ans: A

19) Which of the following is described in the following statement:

“It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as
Volume Boot Sector, if the boot drive is unpartitioned.”

A. POST

B. BIOS

C. SBR

D. MBR

Ans: D

20) Which of the following types of logs contains the event such as valid or invalid logon attempts and
access to designated objects such as files, folders, printers, etc?

A. Application logs

B. System logs

C. Security logs

D. Setup logs

Ans: C

Potrebbero piacerti anche