1) We
can create our own Power Plan
a) True
b) False
Ans a
2) Windows
Firewall can help prevent hackers or malicious software from gaining access to
our computer through the Internet or network
a) True
b) False
Ans a
3) --------------- options enables us to hide the task bar
a) Show
Quick Launch
b) Auto
hide the task bar
c) Keep
the task bar on the top of the other window
d) Lock
the task bar
Ans b
4) By
default, Guest Account is-------------
a) Disabled
b) Enabled
Ans
a
5) The
----------- tool has to be used for deleting a particular account
a) User
Account
b) Guest
Account
c) Administrator
Account
d) Standard
Account
Ans a
6) The
-------------- policy stores a password as text which provides better security
level
a) Enforce
password history
b) Minimum
password age
c) Password
must meet complexity requirement
d) Stores
password using reversible encryption for all users in the domain
Ans d
7) XYZ
company is facing problem as there are visitors who use the computer for a
short while and have to be provided with credentials of employee. The engineer
want to provide an account using which the employee’s data can’t be accessed by
the visitors which method we use
a) Administrator
Account
b) Standard
Account
c) Guest
Account
d) Temporary
Account Ans c
8) The Boot.ini file is saved in
a) Active Directory
b) NTLDR
c) System Memory
d) System Partition
Ans d
9) ---------------- is the process of collecting all the scattered files & folders
a) Fragmentation
b) Defragmentation
c) Disk Cleanup
d) Disk Check
Ans b
10) --------- means exchanging data between the RAM and the paging files.
a) Virtual
Memory
b) Disk-Fragmentation
c) Paging
d) Demand
Paging
Ans d
11) In
-------------- backup,selected files & folder have a marker
a) Normal
Backup
b) Incremental
Backup
c) Daily
Backup
d) Differential
Backup
Ans d
12) A
striped volume supports up to ______________ dynamic disks.
a) 16
b) 32
c) 18
d) 24
Ans b
13) We
require at least _____________ dynamic disks to create a spanned volume.
a) 2
b) 4
c) 16
d) 18
Ans a
14) ________________
reduces the waiting time of the documents.
a) Printer
Pooling
b) Printer
Sharing
c) Additional
Driver
d) Printer
Port
Ans a
15) _____________
is a software interface between the operating system and the print devices.
a) Printer
Server
b) Printer
c) Printer
Port
d) Local
Printer
Ans c
16) Once
you attach a ____________ to your computer, the Windows Vista automatically
install the necessary device drivers for printing.
a) Printer
b) Printer
Server
c) Plug
& Play Printer
d) Print
jobs
Ans c
17)
The ____________ mode restore the latest
hard disk state before the computer turns off.
a) UPS
b) Hibernate
c) APM
d) Balanced
Ans b
18) ____________________
controls the peripheries device of a computer
a) Device
Manager
b) Driver
c) Devices
d) Driver
Signature checking
Ans b
19) You
can troubleshoot the I/O devices, using the ________________.
a) Device
Manager
b) Add
Hardware Wizard
c) System
Information
d) Direct
Diagnostics
Ans a
20) A
shared folder is identified with a symbol of a _______ below its icon.
a) Hand
b) Underline
c) Star
d) None
of above
Ans a
21) A
__________ folder is folder on another computer that has been made available
for other users on the network.
a) Data
b) Read
only
c) Shared
d) None
Ans c
22) Is
the process of encoding data, preventing it from unauthorized acess.
a) Encryption
b) Decryption
c) Coding
d) All
e) None
Ans a
23) The
right side of the taskbar is known as ______________.
a) Quick
Launch bar
b) Start
Menu
c) Notification
Area
d) Tool
Bar
Ans c
24) The
____________ consists of logon information, such as password and user name.
a) Local
Group
b) Local
user account
c) User
profile
d) User
Account
Ans d
25) An
administrator is provided ----------- tokens
a) One
b) Two
c) Three
d) Four
Ans b
26) The
Window Security Center is notified by a icon known as
a) Shield
b) Rod
c) Arrow
d) CD
Ans a
27) ------------
is a Software that is installed on the user’s computer without the user’s
consent
a) Viruses
b) Worm
c) Spy
ware
d) Antivirus
Ans c
28) Window
Vista contains tools for managing the Window Firewall
a) Windows
Firewall
b) Windows
Firewall with Advanced Security
c) Group
Policy Object Editor
d) Netsh
Utility
e) All
Above
Ans e
29) If
the firewall is turned On ,all outside sources will be prevented from
connecting to the computer, except the programs that are included in the
Exceptions Tab.
a) True
b) False
Ans a
30) Window
Firewall can be used to configure only Inbound Exceptions
a) True
b) False
Ans a
31) Windows
Firewall with Advanced Security can be used to configure Inbound & Outbound
Exceptions
a) True
b) False
Ans a
32) Using
------------ the administrator has to
enter a password for a particular operation that requires elevation of
privileges.
a) Prompt
For Consent
b) Prompt
For Credentials
c) Elevate
without Prompting
d) None
Ans b
33) The
----------------policy can be used to
directly modify Account an local policies, Public key policies & IP
Security policy for our local computer
a) Group
Secrity
b) Local
Security
c) Genearal
Security
d) Editor
Security
Ans b
34) ---------------- are required to establish a relation ship
between a user and a computer.
a) Temporary
Account
b) Local
Account
c) User
Account
d) Both
a & b
Ans c
35) The
maximum length of a password can’t exceed -------------- characters
a) 10
b) 100
c) 150
d) 127
Ans d
36) A
---------- signature is an electronic signature that is used to authenticate
the identity and reliability of a set of files
a) Analog
b) Digital
c) Both
a & b
d) None
Ans b
37) ----------- drivers involves replacing the old drivers
with the recent versions of drivers
a) Upgrading
b) Updating
c) Roll
Back
d) None
Ans b
38) Enables
us to use the previous version of a hardware driver when the driver we are
using causes system inability.
a) Device
Rollback
b) Driver
Rollback
c) Driver
Installation
d) All
of Above
Ans b
39) If
the signature is altered , Windows Vista prompts with a ------------ that
suggests the user to stop the installation
a) Warning
b) Credentials
c) Administrator
d) UAC
Ans d
40) When
you install or configure a new device the ------------- feature care of the
installation
a) Installation
Wizard
b) Automatic
Installation
c) Plug
and Play
d) Normal
Installation
Ans c
41) The
XYZ company is facing problems while using computers, as there are certain
devices which are removed from the computer but the device drivers are still
present. The engineer wants to fix the problem so that the computer works properly.
What should be done to fix the problem
a) Install
new Drivers
b) Replace
Drivers
c) Uninstall
Drivers
d) Delete
Drivers
Ans c
42) The
------------ allows us to map the IP network addresses are used by the data
link protocol
a) TCP
b) ARP
c) ICMP
d) IGMP
Ans
b
43) Ipv6
uses ----------- bit IP addresses.
a) 32
b) 64
c) 128
d) 256
Ans c
44) DOS
stands for:
a) Disk
operating system
b) Dos
operating system
c) Display
operating system
d) None
of these
Ans: a
45) FORMAT
command is used to:
a) Create
disk partition
b) Delete
a disk partition
c) Update
a disk partition
d) Format
the disk partition
e) All
of the above
Ans: d
46) DOS
is an example of Graphical user operating system
a) True
b) False
Ans: b
47) Autoexec.bat
is a system file of Windows XP operating system
a) True
b) False
Ans: a
48) Which
DOS attributes is used by backup programs:
a) Read-only
b) Archive
c) Hidden
d) System
Ans: b
49) XCOPY
command is used to:
a) Compress
the disk
b) Copy
the files to the different directory
c) Copy
the contents of more than one directory at a time.
d) Change
the directory
e) All
of the above
Ans: c
50) Fast
user switching is available
in________operating system
a) Windows
Vista
b) Windows
XP
c) Windows
NT
d) Windows
Me
Ans: b