1) The
-------------- is a centralized location
for providing the tools for managing the printers,drivers,queues and shares.
a) Print
folder
b) Print
Management Console
c) Windows
Security Center
d) Network
folder
Ans b
2) Window
Vista allows us to configure the Automatic backup settings using the Back up
file wizard.
a) True
b) False
Ans a
3) The
------------- is a complete restoration of our system.
a) System
Restore
b) Window
Restore
c) System
Repair
d) Windows
Complete PC backup
Ans d
4) In
Windows Vista “AERO” is acronym for
a) Authentic,
Energetic, Reflective & Open
b) Authenticate,
Energetic, Reflective & Outsource
c) Authenticate,
Energy, Relaxive & Open
d) Authentic,
Energy, Related & Operating
Ans a
5) The
---------------- interface in Windows Vista improves the clarity in appearance.
a) Windows
Media Cennter
b) Window
AERO
c) Windows
Defender
d) Windows
Boot Manager
Ans b
6) ---------------- area contains the icons for programs and
services running in the background.
a) Taskbar
b) Notification
c) Control
Panel
d) Gadgets
Ans b
7) A
Power Plan is a collection of hardware & system settings that manages how our
computer uses power.
a) True
b) False
Ans a
8) “Power
Plan” available in Windows Vista are
a) Balanced
b) Power
Saver
c) High
Performance
d) Hibernating
e) Sleeping
Ans a,b,c
9) The
XYZ company wants to choke up certain program which may access by some of the
employee that may cause damage to their computer system . Which method should
be used to choke up those programs
a) Bypassing
Logon Screen
b) Restricting
access to websites
c) Monitoring
users activities
d) Blocking
specific program
Ans
d
10) Two
types of Drivers are
a) Signed
b) Unsigned
c) Encrypt
d) Decrypt
Ans a,b
11) A
------------ driver is a device driver that includes a digital signature.
a) Unsigned
b) Encrypt
c) Decrypt
d) Signed
Ans d
12) The
unsigned drivers are device drivers, which do not have a digital signature and
therefore they are potentially harmful for our system
a) True
b) False
Ans a
13) When
user tries to install a particular driver without administrative privileges.
Window Vista automatically installs drivers from trusted publishers and denies
installations from other categories.
a) True
b) False
Ans a
14) A
------------ signature is an electronic signature that is used to authenticate
the identity and reliability of a set of files.
a) binary
b) analog
c) digital
d) octal
Ans c
15) The
----------------- driver is signed by
organizations other than Microsoft.
a) Windows
Signing Authority
b) Unsigned
c) Trusted
Publisher
d) Untrusted
Publisher
Ans c
16) A
----------- is a collection of computers that are connected within a Local Area
Network.
a) Domain
b) Host
name
c) Workgroup
d) Server
Ans c
17) The
Workgroup name can exceed more than 15 characters
a) True
b) False
Ans b
18) “NDF”
acronym for
a) Networking
Diagnostic Framework
b) Network
Diagnostic Framework
c) Network
Digital Framework
d) Network
Diagnostic Firewall
Ans b
19) Security
threats can be categorize into
a) Viruses
b) Worms
c) Spyware
d) All
Above
e) None
Ans d
20) The
-------------------Center is the central location for administrating the
various security components present in the system
a) Windows
Firewall
b) Windows
Defender
c) Windows
Security
d) Windows
Updates
Ans c
21) Exeptions
are set on a specific program or port address, to allow it from being blocked
by the firewall
a) True
b) False
Ans a
22) Inbound
& Outbound rules allow or block the incoming & outgoing connections
respectively.
a) True
b) False
Ans a
23) -------------- allows us to configure firewall settings from
the Command prompt
a) Windows
Server Update Services
b) Group
Policy Object Editor
c) Netsh
Utility
d) Windows
Firewall with Advanced Settings
Ans c
24) Which
key has to be pressed to see the tool bar in IE7 in Vista
a) Ctrl
b) Alt
c) Esc
d) Shift
Ans b
125)
Security zones provided by IE7 in Vista
A
Internet
A
Local Intranet
B
Trusted Sites
C
Restricted Sites
D
All Above
E
None
Ans e
126)
Phishing is a trick, used to hack personal
or financial information such as security number and credit card number through
email messages and website hacker.
A
True
B
False
Ans a
127)
Pop-up blocer provides three levels for
alertness
A
Low
B
Medium
C
High
D
Above
E
Below
Ans a,b,c
128)
A small text files that stores the user
information on the computer are
A
Form data
B
Cookies
C
Passwords
D
Temporary Internet files
Ans b
129)
One of the staff of Jetking company is not
being able to find an e-mail in their inbox that has been sent by other
employee of Jetking . When they contacted sender confirms that the e-mail has
been sent . What do you think is the problem here
A
The e-mail has been flagged
B
The e-mail has been moved to Junk E-mail
folder
C
The e-mail doen not have the digital
signature
D
The e-mail has not yet reached
Ans b
130)
The How often do you want to create a
backup? Screen allows you to --------- the backup
A
Schedule
B
Restore
C
Save
D
Delete
Ans a
131)
When we create a Complete PC backup , our
harddisk should be formatted to use
A
NTFS
B
EFS
C
FAT 32
D
FAT 64
Ans a
132)
Advanced Restore does not provide you the
---------- option
A
Files from the latest backup made on this
computer
B
Files from an older backup made on this
computer
C
Files from a backup made on different
computer
D
Files from a backup from a backup media
Ans d
133.
The pen process against the screen is known as _________________.
e) Stylus
f)
Tap
g) Convertible
h) Applying
ink
Answer: D
134.Change the waiting time for
the screen saver from _____________.
i)
Wait pop-up menu
j)
Time pop-up menu
k) Theme
pop-up menu
l)
Screen saver pop-up menu
Answer:
A
135._____________ shows the
information about the graphics adapter installed on the computer.
m) Adapter
tab
n) Color
management tab
o) Monitor
tab
p) Troubleshooting
tab
Answer: A
136.Windows Vista allows you to
set the screen refresh rate in __________________.
q) Adapter
tab
r) Color
management tab
s)
Monitor tab
t)
Troubleshooting tab
Answer: C
137.__________________ option
enables you to hide the taskbar.
u) Keep
the taskbar on top of other windows
v) Show
Quick Launch
w) Auto-hide
the taskbar
x) Lock
the taskbar
Answer: C
138.The ___________________ power
plan provides full performance for the system with saving power.
y) Power
saver plan
z) Balanced
plan
aa) High
performance plan
bb) Low
performance plan
Answer: B
139.The Wellizon Textile Co. has
four sections Marketing, accounts, Manufacturing and Export. The company uses
Windows Vista Operating system. The system operator wants to change the desktop
background. But he is facing problem while applying any image as desktop
background from the graphic file. The problem may occur if the graphic file format
is:
a. .jpg
or .jpeg
b. .bmp
or .dib
c.
.png
d. .mfd
Answer: D
140.The three types of user
accounts are Standard Account, Administrator Account and ___________ Account.
cc) Personal
dd) Guest
ee) Protected
ff) Shared
Answer:
B
141.___________account is used by
temporary users of a computer.
gg) Shared
hh) Personal
ii) Standard
jj) Guest
Answer:
D
142.The ____________tool has to
be used for deleting a particular account.
kk) Administrator
Accounts
ll) User
Accounts
mm)
Guests Accounts
nn) Standard
Accounts
Answer:
B
143.The maximum length of a
password cannot exceed ________characters.
oo) 4
pp) 100
qq) 127
rr) 12
Answer:
C
144.The user with
_____________rights can set or change a password of other users.
ss) Guest
tt) Administrative
uu) Standard
vv) Advanced
Answer:
B
145.Members of this group can log
on to the computer remotely.
ww) Replicator
xx) Offer
Remote Assistance Helpers
yy) Remote
Desktop Users
zz) Power Users
Answer:
C
146.The _________________policy
stores a password as text which provides better security level.
aaa)
Enforce password history
bbb)
Minimum password age
ccc) Password
must meet complexity requirements
ddd)
Store password using reversible encryption
for all users in the domain
Answer: D
147.The Wellizon Textile Company
is facing problem as there are visitors who use the computers for a short while
and have to be provided with credentials of employees. The engineer wants to
provide an account using which the employee’s data cannot be accessed by the
visitors. Which method should he use to restrict visitors from accessing the
personal files and folders?
eee) Administrator
Account
fff) Guest
Account
ggg)
Standard Account
hhh)
Temporary Account
Answer: A
148.The Wellizon Textile Company
wants to choke up certain program which may access by some of the employee that
may cause damage to their computer system. Which method should be used to choke
up those programs?
iii) Bypassing
Logon Screen
jjj) Restricting
access to websites
kkk)
Monitoring users activities
lll) Blocking
specific program
Answer: D
249.When
you install or configure a new device the __________ feature takes care of the
installation.
a. Installation
Wizard
b. Automatic
Installation
c.
Plug and Play
d. Normal
Installation
Answer: C
149.When you install a signed or
unsigned driver you have to give your consent in the ___________ dialog box.
a. Warning
b. Credentials
c.
Administrator
d. UAC
Answer: D
150.The __________ Manager is a
control which allows users to view the information about all the installed and
connected Plug and Play devices.
a. Driver
b. General
c.
Device
d. Control
Answer: C