Download - NT1110 Final Exam
NT1110 Final Exam
1. An example of something a user knows used for authentication is a __________.(1 point)
retina scan
thumbprint
PIN
signature
2. Biometrics is used to authenticate based on _______________________.(1 point)
something you know
something you are
something you have
something you do
3. Which file system provides the most features?
(1 point)
FAT
FAT16
FAT32
NTFS
4. Which BIOS option allows you to choose the DVD drive as the first boot device?
(1 point)
Advanced
Boot sequence
Memory configuration
Processor
5. Match the motherboard parts with the letters on the picture (10 points)
PCI Express slots
PCI Slots
North Bridge
CPU Socket 775
SATA Connectors
a. H
b.
F
c. B
d.
G
e. L
f. A
g M
South Bridge
DDR2 DIMM Memory Slots
IDE Connector
ATX Power Connector
Back panel connectors
.
h.
D
i. E
j. O
6. Typically, each sector of a magnetic hard disk stores __________ bytes of data (1 point)
8K
2K
1K
512
7. PATA drives are identified as _________________________. (1 point)
primary only
primary and secondary
secondary only
shadow drives
8. Sectors in a hard disk are organized into concentric circles called __________. (1 point)
grooves
lands
tracks
platters
9. Match the terms with their correct meaning (7 points)
LAN
OSI Model
Networking
FTP
TCP/IP
a. network that operates over a small geographic area; bandwidth is usually higher, like 100Mbps or 1000Mbps
b.
the protocol required for use of the Internet
c. contains 7 layers to help simplify understanding of networking and standardize the development of equipment for networking
d.
network that operates over a large geographic area; bandwidth is usually slower, like 1.44 Mbps or 128 kbps.
WAN
Bandwidth
e. connects computers over networks for the purpose of file transfer
f. the theoretical data capacity of a network
g.
two or more computers connected together for the purpose of communicating and sharing resources
10. Which of the following is not a Linux distribution?(1 point)
PCnix
Red Hat
SuSE
Ubuntu
11. Mini applications that provide a variety of services, such as connecting to the Internet to accessweather updates, are called __________.
(1 point)
applicons
gadgets
sidebars
windowizers
12. DDR SDRAM performs __________ transfer(s) per clock cycle (1 point)
8
4
2
1
13. This code/program uses beep codes to report hardware errors.(1 point)
Windows XP Device Manager
CMOS
POST
Boot loader
14. Which permission is needed to access and run programs?
(1 point)
List
Modify
Read and execute
Write
15. This type of memory is used in notebook computers. (1 point)
SIMM
SIPP
DIMM
SODIMM
16. This type of memory loses its data when power is turned off. (1 point)
RAM
ROM
Hard Disk
CMOS
17. Sending an email that tricks a user into providing personal information is a form of_______________.
(1 point)
baiting
phishing
pretexting
Trojan horsing
18. A firewall that protects against malicious traffic inbound and outbound is called a/an __________firewall.
(1 point)
one-way
two-way
pass through
filtering
19. Files encrypted with EFS cannot be opened by ________________________.
(1 point)
the user who encrypted them
EFS key holders
administrators
guest users
20. This technique is used to transfer data directly from the hard disk to memory (1 point)
DMA
PIO
IDE
SATA
21. Which is not a Windows account level?
(1 point)
Administrator
Guest
Limited
Supervisor
22. Eliminating passwords and other user information at shutdown is accomplished using(1 point)
auditing
clearing the Virtual Memory Pagefile
taking object ownership
the primary administrator account
23. Which graphical interface is used to explore the file system?
(1 point)
Windows Explorer
Internet Explorer
Control Panel
Command prompt
24. This operating system can be freely downloaded.
(1 point)
Linux
Mac OS X
Windows XP
Windows Vista
25. Where does the CMOS power come from when a computer is off?
(1 point)
A battery
CMOS does not need power.
The CMOS chip powers itself from a residual charge
Power supply keep-alive circuit
26. To lock a computer, _____________________________________.
(1 point)
press Ctrl Alt Del and select Lock Computer
type LOCK in a command prompt window
leave the computer unattended for 15 minutes
hold the L key down for 10 seconds
27. Which file system is used on a floppy disk?
(1 point)
NTFS
NFS
FAT
FAT32
28. Which operating system requires the fastest processor?(1 point)
Windows 2000
Windows XP 32-bit
Windows XP 64-bit
Windows Vista
29. Where are important system configuration parameters stored?
(1 point)
BIOS
CMOS
Hard disk
Boot sector
30. Which operating system has the largest market share?
(1 point)
DOS
Linux
Mac OS X
Windows
31. A program that examines data packets on the network and either blocks them or allows them iscalled a __________.
(1 point)
firewall
malware scanner
biometric scanner
network filter
32. Which is not a form of wireless protection?
(1 point)
WEP
WPA
WPA2
SSL
33. After power is turned on by the user, BIOS runs tests via __________.
(1 point)
CMOS routines
hard disk
POST
boot sector code
34. Which of these is not a BIOS security feature?
(1 point)
BIOS password
Chassis intrusion
Over-temperature limit
Boot sector protection
35. The first instructions to execute when the computer is turned on are in the __________.
(1 point)
BIOS
CMOS
hard disk
boot sector
36. Which is not a way that POST indicates an error?
(1 point)
Beep code
Error message on monitor
Hex error code
Log file on the hard disk
37. Which is not a type of dynamic memory? (1 point)
SRAM
SDRAM
DDR SDRAM
DDR2 SDRAM
38. This type of memory keeps its data when power is turned off and may not be altered (1 point)
RAM
ROM
Hard disk
CMOS
39. This type of memory can detect and correct errors. (1 point)
ECC
Parity
Non-parity
SDRAM
40. This type of BIOS can be upgraded via software.
(1 point)
RAM
Flash
ROM
DRAM
41. The starting point for adjusting hardware and user interface settings is __________.(1 point)
Internet Explorer
My Computer
Control Panel
the command prompt
42. Which type of memory frequently needs to be refreshed? (1 point)
Static
Dynamic
ROM
EEPROM
43. Today’s system BIOS resides on which of the following?
(1 point)
RAM
ROM
PROM
EEPROM
44. Viewing local and network drives is accomplished with which graphic utility?
(1 point)
Internet Explorer
My Computer
Control Panel
Command prompt
45. This file system supports the use of EFS(1 point)
FAT12
FAT16
FAT32
NTFS
46. Which of the following is used to encrypt an entire hard disk?
(1 point)
EFS
NTFS
BitLocker
Local Audit Policy
47. Primary and secondary hard disk drives are identified as __________ drives (1 point)
PATA
SATA
RAID
Host
48.