Vous êtes sur la page 1sur 41

Cau: 001 A user deals with important strategic deals of the company.

There is a chance of data theft from his computer system, so he wants to have a protected system. As a Tech Support Professional, which file system will you use to meet the user's requirement? A: FAT B: FAT32 C: NTFS D: CDFS Dap An: C Cau: 002 A user is facing problem in opening, modifying, and creating new files, as these processes have become very slow. Even with sufficient disk space, the disk performance has slowed down over a period of time. After enquiring with the user it was found that a lot of file creation and subsequent deletion operations had taken place recently. As a PC technician, what will be your first action for troubleshooting this problem? A: Check the fragmentation status of your disk and run disk defragmenter. B: Use chkdsk to find any bad sectors. C: Convert partitions from the FAT or FAT32 file system to NTFS. D: Create one more disk partitions and ask user to use new partitions for new files. Dap An: A Cau: 003 John needs to mount a Windows OS hard disk partition which is 20 GB to a Linux OS and is successfully able to do it. Which type of file system on the Windows OS would have made this possible? A: FAT B: FAT16 C: FAT32 D: NTFS Dap An: C Cau: 004 When a new card is installed on a Windows Server 2000 computer, it gets installed automatically. What is this feature? A: PnP B: DMA C: Registry D: IRQ Dap An: A Cau: 005 John switches on his computer, but the system does not start up and gives a continuous beep. Which of the following devices may not be working properly? A: Motherboard B: Video card C: Floppy drive D: Controller Dap An: A Cau: 006

Marcs computer keeps crashing every time he uses it for more than 30 minutes approximately after which it recovers on its own. However, if he plugs his computer in an air conditioned room, he can use his computer for as long as he wants. What could be the potential problem with Marcs computer? A: RAM is faulty B: Motherboard is faulty C: Processors heat sink is faulty D: Sound Card is faulty Dap An: C Cau: 007 John has built a custom computer using individual hardware components. When he starts up the computer, he hears one long beep and two short beeps. How should he troubleshoot this problem? A: He should check for monitor power, video cable and display adapter. B: He should check if all RAM chips are seated firmly. C: He should swap the RAM chips D: He should replace the hard disk. Dap An: A Cau: 008 Mark, the Network Administrator of Mc Millan Inc is receiving weired complaints from the employees who are using company's custom messenger application to chat with one another. When a user supplies his/her username and password to the messenger it gives an error message "Invalid username or password, try again". The user tries again and is successful, and is able to chat. This happens every time when the messenger application is started. Mark suspects this as a possible security attack. From the symptoms given above identify what type of security threat are the employees facing? A: Spaing attack B: Trojan Horse attack C: Worm attack D: Virus attack Dap An: B Cau: 009 Marc encounters Inaccessible boot device (Stop 0x7b) error during the setup process of Windows 2000 on the server. What could be the potential problem with the system? A: boot sector virus B: Boot controller conflict C: Registry corrupt D: Problem with hard disk device driver or drive controller Dap An: D Cau: 010 As per the security instructions in the WAP Manual, John changes the SSID to a unique name. However he still finds that certain Windows 2000 users are able to make unauthorized access to the Internet via a WAP device. What additional measures should he undertake to attain maximum security? A: Keep changing SSID regularly B: Encrypt using WEP key C: Use WPA with SSID

D: Use WPA2 with AES Dap An: B Cau: 011 McMillan Inc. is setting up a new office in the same city so that it can expand its business. However, it wants to retain Windows servers in the current office and use their capacity to service all the users in the new office. Additionally, users in new office should be able to access file servers with the same ease as they used to do in old office. What is the suggested approach that the company should follow to fulfill this requirement? A: Configure different subnets in both the offices and connect them using a broadband connection B: Stretch the network cable from the old office to new office and plug it into a switch C: Configure WAN network using Routers & XDSL Connection D: Configure MAN network using leased lines Dap An: D Cau: 012 Smith is designing Wireless network for his SOHO Company and needs to create a security policy. What would be the most relevant and effective policy that he can choose? A: SSID with pre-shared key B: WEP key C: 801.1x with WPA D: Preshared Key with WPA Dap An: D Cau: 013 Jerry wants to connect a parallel printer to his PC. Which of the following cables will he require to connect the printer? A: A cable with 25-pin male connector at the printer end and a 9-pin female connector ay the PC end. B: A cable with 36-pin Centronics or mini-Centronics connector for the printer end and a DB25 male plug at the PC end. C: A cable with 36-pin Centronics or mini-Centronics connector at the PC end and a DB25 male plug at the printer end. D: A cable with 25-pin male connector at the PC end and a 9-pin female connector at the printer end. Dap An: B Cau: 014 Maria wants to connect a serial printer to her PC. Which of the following cables will she require to connect the printer? A: A cable with a 25-pin male connector for the printer end and a 9-pin female connector for the PC end. B: A cable with a 36-pin Centronics or mini-Centronics connector for the PC end and a DB25 male plug for the printer end. C: A cable with a 36-pin Centronics or mini-Centronics connector for the printer end and a DB25 male plug for the PC end. D: A cable with a 25-pin male connector for the PC end and a 9-pin female connector for the printer end. Dap An: A

Cau: 015 Which of the following statements refers to a Laser printer? A: It works by firing microscopic amount of inks at the paper. B: It produces output by firing pins in a print head at an inked ribbon, which touches and leaves marks on the paper. C: It works by fixing a toner to the page surface. The toner is applied using electrostatic charging. D: It works using a heat transfer process but without the use of toner. Dap An: C Cau: 016 George has added a new scanner to his PC. When he restarted his PC, it has generated an error while booting. Which of the following methods is an effective way to recover from the preceding malconfiguration error? A: By using Recovery console. B: By using MSCONFIG. C: By using System Restore. D: By using Last Known Good Control Set. Dap An: D Cau: 017 Jane is a hardware engineer at Wilson Technologies Inc. He has to create a report on current hardware configuration by using Windows Device Manager. Which of the following options will help him access the Windows Device Manger? A: By selecting System Properties --> Hardware Tab. B: By selecting Start --> Programs --> Administrative Tools. C: By running EVENTVWR.EXE. D: By using DXDIAG tool. Dap An: A Cau: 018 Jane has installed an application on her PC. When she tries to load the application, she receives an "Access Denied" error. What could be the reason for this error? A: The file or folder has been deleted or renamed. B: Jane does not have permission to execute the application. C: The application has crashed. D: The application requires the user to write to the application's directory and user does not have the permission to write to that directory. Dap An: D Cau: 019 Jane has bought a new Notebook computer. She is facing a problem that the cursor wanders across the screen without any input. Which of the following checks should she perform to diagnose the preceding problem? A: Check whether the latest driver is installed and then complete the synchronization procedure. B: Check whether the function keys have been disabled by accident. C: Check whether the AC adapter is working or not. D: Check the power management settings in Windows or CMOS. Dap An: A Cau: 020

George is a network administrator at Bluestar Networks Inc. He has to setup a Wireless LAN setup for the company. Which of the following IEEE 802 standards should he use to meet the preceding requirements? A: 802.2 B: 802.3 C: 802.5 D: 802.11 Dap An: D Cau: 021 John is working as a vendor for Wilson Technologies. He is posted in a rural area and wants to counicate with the company through emails, for which he requires an internet connection. Which of the following Broad services will help him to meet his requirements? A: Satellite B: Leased lines C: DSL D: Cable Dap An: A Cau: 022 Samuel has setup a peer-to-peer network in which he can receive and make calls free from call charges. But the main problem he is facing is that the call quality is patchy and the call is not secure. Which of the following technologies is he using to make these calls? A: DSL B: VoIP C: ISDN D: Leased Lines Dap An: B Cau: 023 Sam has been provided the following IP address: 172.23.3.229 Identify the class to which the preceding IP address belongs. A: The given address is classless B: The given address belongs to Class B C: The given address belongs to Class A D: The given address belongs to Class C Dap An: B Cau: 024 Sam has been provided the following IP address: 122.23.3.22 Identify the class to which the preceding IP address belongs. A: The given address is classless B: The given address belongs to Class A C: The given address belongs to Class B D: The given address belongs to Class C Dap An: B Cau: 025 Which of the following options refers to the IP address of the router to which packets destined for a remote network should be sent by default? A: Subnet Mask

B: Default Gateway C: DNS Server D: WNS Server Dap An: B Cau: 026 Which of the following options identifies both the network to which the device is attached and also its unique identity on that network? A: IP Address B: Subnet Mask C: Default Gateway D: DNS Server Dap An: A Cau: 027 Which of the following network devices is responsible for carrying packets from one network to another? A: Network Adapter B: Hubs C: Switches D: Router Dap An: D Cau: 028 Which of the following network devices regenerates signals? A: Switch B: Passive Hub C: Active Hub D: Repeater Dap An: C Cau: 029 Which of the following options measures the numbers of bits that can be transferred reliably per second using the particular transmission medium? A: EMI B: Bandwidth C: Distortion D: Attenuation Dap An: B Cau: 030 Which of the following options allows administrator to configure the startup mode? A: NTBACKUP B: MSCONFIG C: NTDS.DIT D: BOOT.INI Dap An: B Cau: 031 Which of the following applications provides a Windows interface to some of the configuration information contained in the Registry?

A: System Information B: Device Manager C: Event Viewer D: DXDIAG Dap An: A Cau: 032 Which of the following switches is used with ATTRIB coand to clear the system attribute? A: +A B: -A C: +S D: -S Dap An: D Cau: 033 Which of the following codes for original IBM PC refers to a Motherboard problem? A: 1 short beep. B: 2 short beeps. C: 1 long, 1 short beep. D: 3 long beeps. Dap An: C Cau: 034 Which of the following codes for original IBM PC refers to Display adapter error (EGA,VGA)? A: 1 long, 3 short beeps. B: No beep. C: 3 long beeps. D: 1 long, 1 short beep. Dap An: A Cau: 035 John has installed an adapter card on his PC. However, the system does not recognize the adapter card. John checks the compatibility and finds that the adapter card is compatible to the system and is installed properly. Which of the following checks should John perform next? A: Check that there is no dirt affecting the connection between the contacts on the card edge and the slot. B: Check that the correct input language is set. C: Check the fuse on the plug. D: Check that the function keys have not been disabled. Dap An: A Cau: 036 George has attached a mouse to his PC but the mouse pointer does not move. He first cleaned the internal rollers and then checked whether the connector is plugged into the correct PS/2 port. He finds that the mouse is not connected properly and connects it appropriately. However, he is still facing the same problem. What should John do next to troubleshoot the problem? A: Reboot the PC. B: Check that there is no dust affecting the connection between the connector and the port. C: Check the refresh rate and resolution settings for the video driver. D: Swap the ports for the keyboard and mouse connectors.

Dap An: A Cau: 037 George has installed a sound card in his PC. However, he is not able to play songs through a CD. He has ensured that all the equipments are plugged into the correct connectors and that the speaker volume knob is adjusted correctly. Identify the check which George should perform to play the CD? A: Check that the audio cable from the CD drive is connected to the sound card. B: Check whether the CD drive is compatible with the sound card. C: Check whether the sound card supports the audio file format. D: Check whether the CD is inserted properly. Dap An: A Cau: 038 Consider the following checks that should be applied to troubleshoot the display problems on a TFT screen: a) Check that the cutoff switch is not stuck. b) Test the inverter using a bulb or multimeter. c) Check that the laptop is set to use the TFT. d) Check the power management settings in Windows or CMOS to ensure that the energy saving mode is not being used. e) Check that the video card is good by using an external monitor. Identify the correct sequence of steps that should be performed to troubleshoot the display problem in a Laptop using TFT screen. A: b >> c >> a >> e >> d B: b >> c >> a >> d >> e C: c >> a >> e >> d >> b D: c >> a >> d >> e >> b Dap An: C Cau: 039 John is facing flickering image problem in his PC. He has checked the video cable connector and ensured that no pin is bent. Identify the check that he should perform next to troubleshoot the problem. A: Check the brightness and contrast controls. B: Check the Sound/Multimedia properties from the Control Panel. C: Check that the correct input language is set. D: Check refresh rate and resolution settings for the video driver. Dap An: D Cau: 040 What will be the hexadecimal address corresponding to the binary address 0010 0000 1000 1111? A: 208F B: 20416 C: 206F D: 20AF Dap An: A Cau: 041

What will be the hexadecimal address corresponding to the binary address 0110 0100 1001 1011? A: 549A B: 549B C: 649B D: 649A Dap An: C Cau: 042 What will be the hexadecimal address corresponding to the binary address 1110 0101 1000 1101? A: E58D B: E59D C: D48E D: D58C Dap An: A Cau: 043 What will be the hexadecimal address corresponding to the binary address 1010 1101 1100 1011? A: ADCB B: ABCD C: AB5C D: ABDC Dap An: A Cau: 044 What will be the hexadecimal address corresponding to the binary address 0110 0111 1001 1111? A: 679F B: 679E C: 689F D: 568E Dap An: A Cau: 045 Which of the following options utilizes sector sparing and transaction tracking to provide reliable data transfer? A: NTFS B: FAT C: FAT32 D: CMOS Dap An: A Cau: 046 Which of the following Core Boot Files refers to the Mini SCSI Disk driver? A: BOOTSECT.DOS B: NTBOOTDD.SYS C: ntuser.dat D: BOOT.INI Dap An: B

Cau: 047 Which of the following Core Boot Files refers to the Operating System Menu? A: BOOTSECT.DOS B: NTLDR C: BOOT.INI D: NTOSKRL.EXE Dap An: C Cau: 048 Which of the following shortcut keys displays the Start Menu? A: Windows+D B: Ctrl+Tab C: Ctrl+Esc D: Shift+Tab Dap An: C Cau: 049 Which of the following shortcuts is used to display the Run dialog box? A: Windows + D B: Windows + R C: Ctrl + Esc D: Ctrl + Tab Dap An: B Cau: 050 Which of the following options is used as a recording device in a Flatbed Scanner? A: CCFL B: CCD C: Photo diode D: Laser Dap An: B Cau: 051 Which of the following attributes of LCD causes a ghosting or trail effect when the value of the attribute is high? A: Response rate B: Luminance C: Contrast ratio D: Viewing angle Dap An: A Cau: 052 Which of the following is a set of concentric circles in the context of the internal structure of a hard disk? A: Platter B: Tracks C: Sector D: Cylinder Dap An: B

Cau: 053 Which of the following allows the drive to pass information back to software, and this may allow diagnostic software to warn the user of an impending failure? A: ATAPI B: SCSI C: CMOS D: SMART Dap An: D Cau: 054 Which of the following CD standards refers to the Data CDs (Mode 1) and compressed audio CDs (mode which defines 5 stages of compression)? A: Yellow book B: Red book C: Orange book D: Green book Dap An: A Cau: 055 John has installed a PATA drive on his PC, but the system is not able to access the Hard Disk. Which of the following checks should John perform to make the Hard disk accessible? A: Check the IDE drive jumpers are set to single/master/slave as appropriate. B: Check that the host adapter driver is working. C: Check that the CMOS parameters are set to 1.44 MB. D: Check chip seating. Dap An: A Cau: 056 Mac had installed a new hard disk in a PC. He wants to format the hard disk in such a manner that an NTFS file system is created on the disk partition. Which of the following techniques should he apply to create required file system on the disk partition? A: Low-Level Formatting B: Partitioning C: High-Level Formatting D: Disk Management Dap An: C Cau: 057 George wants to store sound tracks of variety of languages in a disc and wants to prevent the illegal copying of discs. Which of the following disc provides an encryption system to prevent the illegal copying of discs? A: DVD-ROM B: DVD-Video C: DVD-Audio D: DVD-RAM Dap An: B Cau: 058 Which of the following statements is correct in reference to ROM BIOS chip? A: It is often known as Firmware.

B: It is a coin cell lithium battery. C: It is volatile in nature. D: It is a small block of high-speed memory that enhances PC performance by caching code and data from relatively slow system RAM and passing it to the CPU on demand. Dap An: A Cau: 059 Jack is a hardware engineer at Infosuper system Inc. He has to assemble a PC which can support SSE3 and Virtualization Technology. Which of the following Intel Processors should he use to meet the desired requirements? A: Intel Pentium Core Duo Processor. B: Intel Pentium M Processor. C: Intel Pentium 4 Processor D: Intel Pentium III Processor Dap An: A Cau: 060 Jack is a Hardware engineer at Bluestar technologies Inc. He has to assemble a PC that can support SSE2 and XD. Which of the following Intel Processors should he use to meet the requirements? A: Intel Pentium Core Duo Processor. B: Intel Pentium M Processor. C: Intel Pentium 4 Processor. D: Intel Pentium III Processor. Dap An: B Cau: 061 John is a designer at Wilson Technologies Inc. He has to scan images and use them at the time of designing. For this, he needs to connect a Scanner to his PC. Which of the following adapter cards should he use to connect the scanner? A: SCSI card B: Sound card C: Wi-Fi Adapter card D: NIC Dap An: A Cau: 062 Which of the following refers to the computer science principle "locality of reference" ? A: It explains how cache memory works and why it is so effective. B: It means that many processing elements perform the same operations on different data. C: It refers to the way that the CPU can be installed on the motherboard. D: It refers to the number of bits that can be transmitted at one time. Dap An: A Cau: 063 The component used to hold the processor in place with the help of clips and connecting the motherboard electrically to the processor, is known as____________. A: Counication port B: Memory slot C: Processor sockets D: Chipset

Dap An: C Cau: 064 Internal bus is NOT used to connect_____________ A: CDROM Drive B: Memory C: CPU D: System controller Dap An: A Cau: 065 Choose a DC voltage that power supply does NOT have? A: +3.3 volts B: +5 volts C: -3.3 volts D: -5 volts Dap An: C Cau: 066 ___________ are used for high-end user computers that require extra devices and adapter cards, but not as many as a server. A: Full-Tower Case B: Midi-Tower Case C: Mini-Tower case D: Small Form Factor (SFF) Case Dap An: B Cau: 067 Which is coon cooling system that is used to cool the case, power supply, adapter cards, and CPUs? A: Heat Sink B: Fans C: Thermal Compound D: Liquid Cooling Systems Dap An: B Cau: 068 John, a technician, needs to install digital camera on his computer. His main concern is that whether digital camera can connect to his workstation properly. Which of the following connections can be used to connect digital camera to his computer? A: PS/2 B: USB C: Serial D: Parallel Dap An: B Cau: 069 John purchased a computer a few years back that used AMD Athlon XP processor. He now wants to switch to an Intel Pentium D processor. Is this possible? How? A: Yes, it is possible because AMD and Intel have compatible designs for all sockets B: No, because socket 9 onwards, AMD and Intel processors have compatible socket designs.

C: Yes, it is possible if both the processor use same number of bits for their data and address buses. The socket design does not matter. D: No, because the designs were compatible only till socket 7 Dap An: D Cau: 070 Mark is an Administrative officer in Marx International Inc. His company hires people on daily wages. However, due to work requirements these people need to access multiple secured sites within the company and for this they need to be provided with temporary identity cards. How should Mark ensure that each temporary employee is provided with a new identity card everyday that accurately identifies his/her identification information? A: Provide the employees with a stamped paper to identify them B: Provide the employees with permanent cards without any pictures to identify them C: Click pictures using webcam and create temporary cards using computer and printer D: Provide temporary tokens for authorization and have manned security to ensure that proper identification checks are made Dap An: C Cau: 071 John needs to order a Joystick to play a game that he recently installed on his computer. What considerations should John keep in mind to ensure that he orders the right type of joystick that matches the hardware of his computer? A: The joystick should have a RJ-45 connector so that it can be plugged into joystick port of the computer B: The connector type should be MIDI or USB so that the joystick can be connected to the MIDI or USB port on the computer C: The connector type of the joystick should AUI so that it can be connected to the MIDI port D: The joystick should have an RCA connector so that it can be plugged into the USB port of the computer Dap An: B Cau: 072 John is planning to create a data processing-intensive crossword generator software. He had recently purchased a good quality processor with L1 and L2 caches but wants to increase its speed to allow his game to be tested well. Which of the following methods can he use to increase the speed of his processor at minimal cost? A: Purchase another processor with L3 cache also. B: Use overclocking C: Use throttling D: Buy a new processor that supports MMX Dap An: B Cau: 073 A user complains that very often, while printing the documents his laser printer produces dirty smudges on the paper. He tried replacing the toner cartridges but the issue is still the same. How will you troubleshoot this problem? A: Reinstall or update the printer drivers B: Replace the fuser C: Replace the paper feeder roller D: Replace the roller in the toner cartridge Dap An: B

Cau: 074 Your client complains that his laser printer is printing but quite often it produces stripes, blotches and faint printout. How will you troubleshoot this problem? A: Right click the printer in the Printers and Faxes window and uncheck Pause Printing. B: Update or replace the printer driver. C: Check the page setup options in the applications or the properties of the printer. D: Replace the toner cartridge. Dap An: D Cau: 075 Mr. Dylan owned a laptop computer, which he used extensively in his office. Now his son, Wally, is insisting him to buy a desktop for listening to his favorite mp3s on the computer. Dylan does not want to spend too much money on a new system. Suggest an alternative that he can use to avail the functionality of a desktop system on his laptop. A: Connect the laptop with the Internet. B: Buy a docking station. C: Buy an MP3 player. D: Upgrade his laptop. Dap An: B Cau: 076 A customer is having an inkjet printer that is not working properly. There is no output on the paper. What could be the possible cause? A: Broken suction pump B: Wrong type of paper C: Blocked nozzles D: Hole in an ink cartridge Dap An: C Cau: 077 A user complains that he is unable to find a cord or plug to connect his brand-new PDA to the workstation. Reading through the PDA manual, you note that nothing is mention about additional cords to interface with the PDA. All other functions of the PDA appear to be working. Which of the following conclusion is most likely correct? A: The PDA uses wireless connections to transfer data B: The PDA's NIC is defective C: The PDA is missing cabling D: The PDA's operating system does not support networking Dap An: A Cau: 078 Which of the following is a service that can be accessed from the Start menu to select and install maintenance updates that scan the computer automatically and list available updates for already installed Windows? A: Patch Management B: Windows Update C: Product Activation D: Setup Recovery Dap An: B

Cau: 079 Which statement is NOT TRUE about Disk Management Tool? A: Disk Management Tool is used to display, create, and remove partitions on the drives. B: Disk Management Tool is used to determine the amount of free space on a partition. C: Disk Management Tool is used to convert partitions from the FAT or FAT32 file system to NTFS. D: Disk Management Tool is used to view file and folder properties stored on the disk. Dap An: D Cau: 080 Which of the following is NOT a control panel utility in Windows operating system? A: Add /Remove Programs B: Add Hardware C: Search D: Mouse Dap An: C Cau: 081 Which of the following statements is NOT true about My Computer in Windows XP? A: It is a graphical tool to manage files and folders on a computer. B: It is available as a shortcut icon on the Windows desktop. C: It provides access to your local drives. D: It displays list of all the running services on your computer. Dap An: D Cau: 082 Which of the following statements is NOT true regarding My Network Places in Windows operating system? A: It is used to display or add shortcuts to network locations. B: It is used to view and connect to other computers on the network. C: It is used to add and remove programs to a host computer. D: It is used to create, modify and delete files and folders located in remote computers. Dap An: C Cau: 083 John has formatted the primary partition on his hard disk as NTFS. However, on installing Windows 98 the setup program is not able to detect this partition. What could be the possible issue with this installation? A: Hard disk got corrupted B: Windows Installer has some technical fault C: BOOT.INI is corrupted D: Windows 98 does not support NTFS Dap An: D Cau: 084 Ken is developing an application that will streamline the counication across two network devices as per the OSI model regulations. However, packets are getting lost due to data flow mismatch occurring at two corresponding OSI layers of the devices. To isolate the counication problem he decides to use packet sniffing. Which area of the packet should he check to validate if layers were appending correct control information? A: Header

B: Base C: Address D: Data Dap An: A Cau: 085 John observed that his companys network faces a lot of congestion due to the VoIP calls made to other offices located in different parts of the world by using the Skype software (peer-to peer). However, counication is essential for this company to do business. What can be an effective solution to implement VoIP without causing network congestion? A: Only allow less that 20 connections at any point of time B: Use any other VoIP software C: Have a dedicated bandwidth allocated to VoIP connection D: Implement VoIP using fully digital Private Branch Exchanges (PBX) and assign dedicated bandwidth Dap An: D Cau: 086 What type of network setup must be there, such that the printer's access by the workstations present in the network is controlled in a centralized manner? A: Peer-to-Peer network B: Client-Server network C: Wireless network D: Personnel area network Dap An: B Cau: 087 You want to form a network with 5 computers, such that each computer administers the resources it provides. Which of the following type of network will you form? A: Peer- to -Peer network B: Client-Server network C: Wireless network D: Personnel area network Dap An: A Cau: 088 Which of the following statements can be best described the Cable Modem counication? A: It transmits voice and data over phone lines hand has basic rate and primary rate service. B: Transmit digital signals over existing telephone line. C: Transmit data over very long distance. D: A high speed way to transmit both data and TV signals on the same physical media. Dap An: D Cau: 089 SMTP protocol can be best described by which of the following statements? A: A counication protocol that allows you to transfer voice packets over the IP based network. B: A counication protocol that allows you to upload and download files over the Internet. C: A counication protocol to download web pages from the web server to the client browser. D: A counication protocol to send e-mails to a mail server. Dap An: D

Cau: 090 Which fo the following statements is TRUE about DNS Service? A: DNS is a network service that provides automatic assignment of IP addresses and other TCP\IP configuration information on network systems that are configured as DHCP client. B: DNS is the primary name resolution service on the internet as well as private IP networks. C: DNS is Microsoft's NetBIOS name resolution service which was developed to reduce the number of NetBIOS name resolution broadcast on networks that use NetBIOS naming. D: DNS is a terminal emulation protocol that enables a user at one site to simulate a session on a remote host. Dap An: B Cau: 091 __________ is a technique for tricking a user into revealing confidential information by requesting it in an official-looking email. A: Phishing B: Worms C: Boot sector viruses D: Spam Dap An: A Cau: 092 An unwanted software that runs in the background to monitor system activities and send personal user data to a third party is called ______________. A: Trojans B: Worms C: Spyware D: Spam Dap An: C Cau: 093 A security measure that tracks user operating activities by recording selected type of events in a log is called __________________. A: Authentication B: Access Control C: Auditing D: Password Management Dap An: C Cau: 094 An IEEE standard used to provide a port based authentication mechanism for wireless counication using 802.11a and 802.11b protocols is ____________. A: 802.1x B: WLTS C: 802.11i D: WPA Dap An: A Cau: 095 A security measure that gives an administrator the ability to allow or deny access to resources, objects and data is called ____________________.

A: Authentication B: Access Control C: Auditing D: Password Management Dap An: B Cau: 096 You have to visit the customer's site to troubleshoot a problem. How can you perform your best in the least time while working at the problem? A: Assign a part of your task to the customer so that you can quickly finish with the problem. B: Help yourself to food or drink to make the customer feel comfortable. C: Ask the customer to shift the system to an isolated room. D: Do not allow interruptions, such as phone calls, when you are working at a customer's site. Dap An: D Cau: 097 A customer complains that his monitor is not working the day after he has purchased it. Which of the following is an important troubleshooting question to ask a user when gathering information about an issue? A: Who caused this issue? B: How much did your monitor cost? C: When you say your monitor is not working, what problem are you having - will it not switch on?" D: Did you faced similar problems with your previous monitor also? Dap An: C Cau: 098 Which of the following statements indicates collective responsibility initiative undertaken by the customer service executive while resolving an issue with the customer on the phone? A: "Can you check the printer cables for a loose fit" B: "Let's see whether any of the printer cables are loosely plugged" C: "Go ahead and check the printer cables for a loose plug" D: "Can you call someone to check for a loose fit of printer cables" Dap An: A Cau: 099 You have to visit the customer's site to troubleshoot a problem. How will you maintain yourself at the customer's site? A: Help yourself to food or drink to make the customer feel comfortable. B: Keep the area in which you are working clean and tidy and leave it as you found it. C: Do allow phone interruptions, to show the customer how busy you are. D: While explaining the problem to the customer make it sound simple, so that the customer does not panic at the situation. Dap An: B Cau: 100 A customer has called you up and complains that his computer is not working the day after he has purchased it. How will you respond to this situation? A: You will act positively and be in control of the call B: You will apologize to the customer for the inconvenience and transfer the call to your supervisor.

C: You will not respond to the customer's call and put down the phone. D: You will sympathize with the customer and tell him that its not you but your company who stands responsible for this. Dap An: A Cau: 101 The ________ connects nodes over a network using a central control unit called the hub. A: Cellular category B: Mesh model C: Star topology D: Bus topology Dap An: C Cau: 102 Which of the following statements is NOT true regarding networks? A: Networks enable sharing of information across the multiple computers. B: Networks can be divided into four network topologies: mesh, cellular, star, and bus. C: Networks enable centralization of data management. D: The first network called the ARPANET was created by DOD with the help of Advanced Research Projects Agency (ARPA). Dap An: B Cau: 103 Consider the following statements: Statement A: The resources and software capabilities that are shared by the nodes in a network are coonly known as services. Statement B: The coon services provided in a network include file, print, message, application, and database services. Which of the following is true with respect to the above statements? A: Statement A is True and Statement B is False. B: Statement A is False and Statement B is True. C: Both, Statement A and Statement B, are True. D: Both, Statement A and Statement B, are False. Dap An: C Cau: 104 Consider the following statements: Statement A: Server is a computer with high processing power, which provides services to the other computers in a network. Statement B: In a client-server network setup, the server is not responsible for processing the requests sent by the clients. Which of the following is true with respect to the above statements? A: Statement A is True and Statement B is False. B: Statement A is False and Statement B is True. C: Both, Statement A and Statement B, are True. D: Both, Statement A and Statement B, are False. Dap An: A

Cau: 105 ARPA stands for __________. A: Advanced Repeater Projects Agency B: Advanced Research Projects Administration C: Advanced Research Projects Agency D: Advanced Rear Projects Agency Dap An: C Cau: 106 In case of fiber-optic cables, which transmission mode is used for transmitting data over long distances? A: Multimode B: Single mode C: Infrared D: Radio Dap An: B Cau: 107 Infrared transmissions support up to ________ at shorter distances. A: 16 Mbps B: 10 Mbps C: 100 Mbps D: 50 Mbps Dap An: A Cau: 108 Which of the following statements is true for coaxial cables? A: It uses copper wires, which are good conductors of electricity. B: Coaxial cables provide effective protection against EMI during data transmissions. C: It uses light rays instead of electricity to transmit data. D: It can be differentiated into the two categories, single-mode and multimode. Dap An: B Cau: 109 Consider the following statements: Statement A: The bus topology connects all the nodes on a network to a main cable called bus. Statement B: In the bus topology, each packet that is placed on the bus contains the address of the destination node and is transmitted only in one direction along the bus. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, Statement A and statement B, are True. D: Both, Statement A and statement B, are False. Dap An: A Cau: 110 Which of the following statements is true regarding the AppleTalk Data Stream Protocol (ADSP) protocol? A: This protocol facilitates file sharing between network nodes.

B: This protocol provides the services of the Session layer of the OSI model. C: This protocol is subdivided into three applications: AppleShare File Server (AFS), AppleShare Print Server (APS), and AppleShare PC (APC). D: This protocol establishes connections between network nodes and various servers. Dap An: B Cau: 111 Which of the following protocol suites is used for counication between personal computers and mainframes (IBM Hosts)? A: TCP/IP B: IPX/SPX C: DLC D: AppleTalk Dap An: C Cau: 112 In the __________ transmission, only one node can transmit data at a time. A: Simplex B: Half-duplex C: Duplex D: MAC Dap An: A Cau: 113 Logical Link Control (LLC) and Media Access Control (MAC) are two sublayers of __________. A: Data Link layer B: Network layer C: Transport layer D: Session layer Dap An: A Cau: 114 Consider the following statements: Statement A: The NBP protocol maps the names of nodes with their addresses. Statement B: The RTMP protocol is used for the management of routing information. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: C Cau: 115 Which of the following statements is true about the Internet Protocol? A: It enables reliable connection-oriented data transfers between the two nodes. B: It guarantees delivery of data packets. C: It performs error reporting and datagram fragmentation and reassembly. D: It enables the exchange of electronic mails (e-mails) between two nodes. Dap An: C

Cau: 116 Consider the following statements: Statement A: Telnet enables remote login for users. Statement B: File Transfer Protocol (FTP) allows transfer of files between local and remote hosts. Which of the following is true with respect to the above statements? A: Both, statement A and statement B, are False. B: Both, statement A and statement B, are True. C: Statement A is True and statement B is False. D: Statement A is False and statement B is True. Dap An: B Cau: 117 Consider the following statements: Statement A: The Application layer controls the network and transmit data across network. Statement B: The Data Link layer converts the raw data bits from the Physical layer into frames. Which of the following is true with respect to the above statements? A: Both, Statement A and statement B, are True. B: Both, Statement A and statement B, are False. C: Statement A is True and statement B is False. D: Statement A is False and statement B is True. Dap An: D Cau: 118 Which of the following layers contains a number of protocols that provide services, such as emails, Web browsing, and remote login by users? A: Application layer B: Internet layer C: Transport layer D: Network Access layer Dap An: A Cau: 119 Which of the following is used to identify the best path for sending data packets over a network? A: Routing B: Packet switching C: Multicasting D: Multiplexing Dap An: A Cau: 120 Earthen Wares Inc. had a network of 200 computers. Recently, the company has undergone a major expansion and 300 more employees have been recruited. The network has now expanded to 500 computers. Network users are now complaining of a major slow down in the network speed. As a network administrator, what you should do to increase the speed of the network? A: Implement repeaters to strengthen the networking signal. B: Implement a hub and manage the network centrally.

C: Segment the network and use a bridge to connect the segments. D: Use a CSU/DSU to connect computers of the network. Dap An: C Cau: 121 The Network layer is responsible for _____________________________. A: providing unique network addresses to each node within the network B: transforming data bits from the Physical layer into groups called frames C: providing the interface between the user and the network D: encoding and decoding data in a mutually agreeable format Dap An: A Cau: 122 Consider the following statements: Statement A: The IEEE 802.1 LAN standard provides information regarding the prerequisites for the interface of LAN standards. Statement B: The IEEE 803.2 is a part of the Logical Link Control (LLC) sub-layer of the Data Link layer. Which of the following is true with respect to the above statements? A: Both, statement A and statement B, are False. B: Both, statement A and statement B, are True. C: Statement A is True and statement B is False. D: Statement A is False and statement B is True. Dap An: C Cau: 123 Diane Frye is a network administrator at Supersoft2000. She is giving a presentation on SNA protocol suite to her juniors. One of her juniors asks her that there is a protocol in the SNA suite which supports remote connections through leased or dialup connections and provides point-topoint, multipoint, half-duplex, and full-duplex transactions. Which protocol of the SNA suite has these features? A: DIA B: SDLC C: VTAM D: APPN Dap An: B Cau: 124 New Sky Infotec has a network consisting of 800 computers. Recently, the network traffic has become increasingly slow. The network administrator, John Dalton, has decided to segment the network into two parts with 400 computers in each segment. Each network uses different topologies. Which of the following devices should he use to connect these two networks? A: Router B: Gateway C: Brouter D: Bridge Dap An: A Cau: 125

Red Sky IT System has its main office in New York that has 200 computers. There are two branch offices located in Detroit and New Jersey consisting of two computers each. The organization wants to implement a fast as well as cost effective way of maintaining connectivity between all the offices using digital lines. Which of the following technologies should the organization implement to meet the requirement? A: X.25 B: ATM C: SONET D: SDH Dap An: A Cau: 126 BlueMoon Inc. has recently opened another branch at a distance of 150 metres from the branch existing in the same city. Its network administrator observed that the signal traversing through their network transmission media is degrading and distorting as the length of the network segment has increased. Which of the following devices can best solve the above problem? A: Network Interface Card B: Terminal server C: Repeater D: Gateway Dap An: C Cau: 127 David Wong is a networking intern at Certified Carriers. He is studying the IPX/SPX protocol suite as part of his networking project. He is looking for a protocol that provides fast and connectionless service. In addition, it should also be able to provide routing services. Which protocol would best suit his requirements? A: SAP B: IPX C: SPX D: RIP Dap An: B Cau: 128 William, the network administrator at EarthenWare Systems, needs to set up a LAN of 15 computers based on the bus topology using coaxial cables. Determine the type of connector that will be used to connect the computers. A: DB-25 B: RJ-45 C: T-Connectors D: DB-9 Dap An: C Cau: 129 FernTech Inc. uses an ISDN line to connect its offices located in New York and Boston. George, the network administrator of FernTech connects the router at the New York office to the line in order to establish the connection between the two networks. However, after the company office shifts to the new building, the network faces EMI problems on the line. Predict the possible cause for this problem.

A: The router is defected because of which the electro-magnetic interferences have increased. B: The CSU unit is defected because of which the electro-magnetic interferences have increased. C: The internal LAN transmission is defected because of which the electro-magnetic interferences have increased. D: The atmosphere is not clear because of which the electro-magnetic interferences have increased. Dap An: B Cau: 130 GlobalSoft Inc. has offices in New York, New Jersey, and San Francisco. The network of GlobalSoft Inc. is based on an ISDN leased line. The regional marketing mangers of the company wants to conduct a video conference between the top management and the regional marketing heads. Determine the ISDN service that will be used to conduct this videoconference. A: The PRI ISDN service with 23 B and a D channel will be used to conduct the video conference B: The PRI ISDN service with 30 B and 2 D channel will be used to conduct the video conference C: The PRI ISDN service with 30 B and a D channel will be used to conduct the video conference D: The PRI ISDN service with 2 B and a D channel will be used to conduct the video conference Dap An: A Cau: 131 David Bernard is a renowned scientist studying the field of ISDN technology. A suit is being conducted on the prospects of expansion of wireless and mobile networks and David Bernard has been invited as the guest of honor. He will also conduct a session about the latest developments in the field. This lecture is being broadcast at a transmission rate of 64 Kbps over the Internet to many universities all over North America. Which type of system will be used to carry out this session? A: Synchronous Optical NETwork B: Synchronous Digital Hierarchy C: T-carrier systems D: E-carrier systems Dap An: C Cau: 132 The Data Link layer is responsible for ______________________________. A: providing unique network addresses to each node within the network B: transforming data bits from the Physical layer into groups called frames C: controlling the network traffic D: organizing messages into segments or breaking large segments into smaller segments Dap An: B Cau: 133 Consider the following statements: Statement A: In Duplex transmission, either node can transmit while the other node can receive data. Statement B: In half-duplex transmission, both the nodes can transmit as well as receive data at the same time. Which of the following is true with respect to the above statements?

A: Statement A is True and Statement B is False. B: Statement A is False and Statement B is True. C: Both, Statement A and Statement B, are True. D: Both, Statement A and Statement B, are False. Dap An: D Cau: 134 Consider the following statements: Statement A: The IEEE 802.3 standard is used for 1-persistent CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) LAN, which is coonly known as Ethernet. Statement B: Using the CSMA protocol, a node transmits data packets whenever it finds the channel or the transmission media idle. Which of the following is true, with respect to the above statements? A: Both, statement A and statement B, are False. B: Both, statement A and statement B, are True. C: Statement A is True and statement B is False. D: Statement A is False and statement B is True. Dap An: B Cau: 135 Red Infosystems is setting up a network for 100 computers to accoodate new recruits in its production department. The management wants the network to be efficient and has instructed the network administrator, Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, Keith has decided to subnet the network. The network address allocated for this network is 194.168.10.0. Keith has decided to divide the network into four subnets. Determine the subnet mask for this network. A: 255.255.255.240 B: 255.255.192.0 C: 255.255.256.0 D: 255.255.224.0 Dap An: A Cau: 136 An internetwork is using the TCP/IP protocol suite for counication. This network is used for downloading music and movie files, which can be viewed using online music and movie software. Determine the layer on which this software will run. A: Internet layer B: Network Access layer C: Application layer D: Transport layer Dap An: C Cau: 137 Jim needs to create a TCP/IP addressing scheme for his organization. How many network Ids he must allow while defining the subnet mask for the network? A: One for each subnet and host ID

B: One for each subnet and WAN connection C: One for each subnet and each router interface D: One for each network adapter installed on each host and each router interface Dap An: B Cau: 138 David is a network administrator in SuperGraphics Inc. The network in his organization uses an address of 172.30.0.0/16. He will initially need 25 subnets with 1000 hosts in each subnet. There might be a need for 55 subnets. Which subnet mask should David configure to meet these requirements? A: 255.255.240.0 B: 255.255.248.0 C: 255.255.252.0 D: 255.255.254.0 Dap An: C Cau: 139 Simon, the network administrator at ITech Inc, has received complaints regarding the slow rate of data transfer over the network. After checking the speed and flow of data, Simon wants to check the route being used for data transfer and the maximum number of hops in the path to the destination host. Which utility will help him to find out this information? A: Simon will need to use the Ping utility with the /count option to check the hop count and the path of data transfer. B: Simon will need to use the IPConfig utility with the /renew option to check the latest information about the path used by the router. C: Simon will need to use the TFTP service to check the rate of data transfer and then apply the IPConfig utility with the /renew option to check the count option to check current number of hops used in the path. D: Simon will need to use the tracert utility to check the path of the router and apply the h option to check the maximum number of hops in the path to the destination host. Dap An: D Cau: 140 Tim Hogan is the network administrator for Red International Inc. He is setting up a private network for the organization and has set up the DHCP server to allocate IP addresses dynamically to the hosts and the mail server. However, after a week of installing the network, Tim observes that the hosts are not able to connect to the mail server. What is the possible cause for this problem? A: Tim needs to allocate addresses statically. B: Tim needs to configure the TCP/IP default gateway. C: Tim needs to assign a specific port number to the mail server. D: Tim needs to assign a reserved IP address to the mail server. Dap An: D Cau: 141 Tom Grant is the network administrator at Global Systems Inc. He needs to design the network setup for his organization. More than 1650000 hosts will be connected in the network. Which IP addressing class would best meet his requirement? A: Class C B: Class D C: Class A

D: Class B Dap An: C Cau: 142 Shawn is downloading his favorite jigsaw puzzle through the Internet. The file is downloaded as an HTML Web page. Assuming that the TCP/IP protocol is used for performing this task, which layer(s) is used to download the file and save it in the correct format on Shawns computer? A: The file is downloaded at the Application layer and is saved on the Transport layer. B: The file is downloaded and saved at the Application layer. C: The file is downloaded at the Application layer and is saved on the Presentation layer. D: The file is downloaded and saved at the Internet Layer. Dap An: B Cau: 143 Two subnets need to be created for a Class C network implemented in EarthenWares. Determine the number of hosts that can exist within a subnet. A: 8190 B: 64 C: 62 D: 8868 Dap An: C Cau: 144 Red Square Inc. is an upcoming virtual music store in North America. The company has increased its distribution globally and provides the facility to order music CDs over the Internet. The Web site is comprehensive and allows visitors to listen to music online. In order to promote their virtual music store, the company frequently organizes concerts, which can be seen live over the Internet. In order to view these concerts, the customers need to subscribe to the Web site. Each subscriber receives a login name and password using which he/she can log in, view, and listen to the concert. The Web site maintains the subscribers as user groups and uses streaming audio/video to send data packets to multiple computers. Determine the IP addressing scheme that will be used by these user groups while viewing and listening to the concert. A: The subscribers will use their respective subnet IDs for teleconferencing. B: The subscribers will need a multicast IP address provided by the Class D IP addresses. C: The subscribers will use the network addresses of the other networks in order to route data packets to particular users. D: The subscribers will need to use reserved IP addresses to teleconference over a secure network setup. Dap An: B Cau: 145 Research Infotech needs to set up a small network for performing its research and development on the new wireless technologies using the Internet. The network needs to be fast and efficient. In addition, the users should be able to use the Internet only for accessing relevant Web sites. Permissions for accessing chat rooms should not be allowed. Which type of server can be used to implement such a network setup? A: Newgroup servers B: Proxy and cache servers C: Catalog servers D: News servers Dap An: B

Cau: 146 Demi Chang is a network administrator in AB Corporation. She is using IIS to provide Web services in the organization. She needs to configure IIS to send and receive mails over the Internet. Which IIS component she should use to do this? A: WWW B: FTP C: SMTP D: NNTP Dap An: C Cau: 147 Which of the following statements is true about a mirrored server? A: It stores a copy of data contained in another servers. B: It is used to make available the same business transaction to multiple users across the Internet. C: It is used for user authentication. D: It is used to store the repository of certificates. Dap An: A Cau: 148 Robert Russel is a Web administrator in Red Sky Inc. He needs to install a Web server in his organization. His primary requirement is that the server must be platform independent and it should enable its users to add functionality to their environments easily. Which Web server best meets the requirements? A: IIS Web server B: Apache server C: Personal Web server D: FTP server Dap An: B Cau: 149 Which of the following services enable users to set up sites for uploading and downloading files? A: SMTP B: NNTP C: FTP D: CGI Dap An: C Cau: 150 Consider the following statements: Statement A: WS-FTP is FTP server software. Statement B: Microsoft Exchange is FTP server software. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: A

Cau: 151 BlueEye Inc. is a multinational organization. The frequency and size of files transferred between the office and its clients is quite high, in the order of hundreds. Which of the following services should the organization use to transfer more files in lesser amount of time? A: Front Page Server Extensions B: File Transfer Protocol (FTP) C: Mailing list services D: Network News Transfer Protocol (NNTP) service Dap An: B Cau: 152 Which of the following statements is a correct explanation to httpd daemon? A: It is a service that controls the Web server and the http services. B: It enables users to add functionality to the existing source code. C: It is used to invoke Internet super daemon, inetd. D: It helps in subscribing the services of the mailing list. Dap An: A Cau: 153 Which of the following statements explains the correct use of the TELNET service? A: Enables users to counicate with other users. This service needs to be run for managing receipt/delivery of mails. B: Enables file transfer across machines, using the HTTP protocol. C: Enables users a set of bulletin boards on different subjects. D: Enables users to log in remotely to a server. This service is used for allowing the clients to log on to a remote server. Dap An: D Cau: 154 Marilyn Jones is a Web administrator in SmartLabs Inc. Her company has an internetwork. The company plans to keep streaming video and audio content over this internetwork. Which of the following internetworking servers would be most appropriate in the current scenario? A: Domain Name Servers B: News servers C: Media servers D: Transaction servers Dap An: C Cau: 155 Which of the following statements is the correct explanation of action attribute? A: This specifies the type of control that will be displayed on the form to accept user input. B: This stores the value entered by the user in the control. C: This indicates that a check box or a radio button is selected. D: This attribute is used to specify the target where the form data is transmitted. Dap An: D Cau: 156 Consider the following statements: Statement A: HTTP stands for Hyper text transmission protocol.

Statement B: When a client accesses the Web server, the HTTP gateway intercepts the request and determines how to connect to and counicate with the Web server. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: B Cau: 157 Consider the following statements: Statement A: Type is an attribute of FORM tag. Statement B: Name is an attribute of INPUT element. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: B Cau: 158 Which of the following statements is true for the method attribute? A: This attribute specifies the way in which the data can be transmitted from the form to the Web server. B: This attribute is used to specify the target where the form data is transmitted. C: This specifies the type of control that will be displayed on the form to accept user input. D: This stores the value entered by the user in the control. Dap An: A Cau: 159 Consider the following statements: Statement A: Value button is a valid HTML form control. Statement B: Check box is a valid HTML form control. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: B Cau: 160 What does IDS stand for? A: Intrusion Detection Standard B: Intrusion Detection System C: Intrusion Data System D: Intrusion Digital Signature Dap An: B Cau: 161 Which of the following statements is NOT a measure for securing a Web server? A: Remove or disable all unused services from the server.

B: Allow remote administration. C: Limit the number of persons who have administrator or root-level access. D: Monitor the connections to the server with the help of IDS. Dap An: B Cau: 162 Which of the following statements is true for cryptosystem? A: Cryptosystems are of three types: syetric, asyetric, and RSA. B: Asyetric cryptosystems use the same key for both encrypting and decrypting data. C: Syetric cryptosystems use two separate keys for encryption. D: In a cryptosystem, before data can be exchanged between two parties, the key must be shared between them. Dap An: D Cau: 163 Samuel is network administrator in Bluesoft Inc. Lately, he is getting complaints from the network users that they are repeatedly getting e-mail messages that with huge files attached. This is causing the users e-mail box to crash. Which DoS attack are they referring to? A: Ping of death B: SYN flood C: Spaing D: Mail bomb Dap An: D Cau: 164 Identify the firewall with the following characteristics: 1. Filters packets at the Network layer and examines packet headers against an access control list 2. Checks for all the connections made to a local network 3. Allows only those connections that are from a trusted source and are considered safe 4. Ensures that the users behind the firewall have access to the Internet 5. Ensures that the privacy of the internal network is maintained A: Stateful multilayer inspection firewalls B: Proxy server firewalls C: Packet filter firewalls D: Circuit-level gateways Dap An: A Cau: 165 Which of the following statements best describes the Sniffing? A: A technique used to deliver an e-mail message to someone who might otherwise not choose to receive it. B: A technique used to passively intercept and copy all network traffic on a system, a server, a router, or a firewall. C: A technique used redirect data that is being exchanged between two authorized entities to one or more unauthorized entities. D: A technique used to send abnormally large ping packets to a specific computer. Dap An: B Cau: 166

What does DES stand for? A: Digital Encryption Standard B: Data Encryption System C: Data Encryption Standard D: Digital Encryption System Dap An: C Cau: 167 _______ supports minimum key sizes of 128, 192, and 256 bits. A: Triple (DES) B: DES C: Rons Code D: AES Dap An: D Cau: 168 _________ is the process used for breaking ciphers. A: Cryptographic mechanism B: Cryptanalysis C: Cryptology D: Decryption Dap An: B Cau: 169 Consider the following statements: Statement A: Unauthorized access to information can be prevented by making the contents of the messages unreadable for all except by the intended recipient. Statement B: The term cryptosystems is used for encryption mechanisms. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: C Cau: 170 Consider the following statements: Statement A: Smart card provides tamper-proof authentication and non-repudiation. Statement B: Authentication is the process of ensuring that data, whether in transit or stored on the network, is not tampered with in any way. Which of the following is true with respect to the above statements? A: Statement A is True and statement B is False. B: Statement A is False and statement B is True. C: Both, statements A and B, are True. D: Both, statements A and B, are False. Dap An: A Cau: 171 Which of the following components does NOT belong to the PKI framework? A: Certification Authority (CA) B: PKI client

C: Revoke Authority (RA) D: Digital certificates Dap An: C Cau: 172 Identify the process for TCP connection that uses the following steps: 1. The first node requests counication by sending a packet with the sequence number and SYN bit. 2. The second node acknowledges the receipt of the data and responds with an acknowledgement (ACK) that contains the sequence number plus one, and its own sequence number back to the first node. 3. The first node responds and the counication between the two nodes proceeds. A: Broadcast storm B: Three-way handshake C: Spaing D: Multi-access handshake Dap An: B Cau: 173 Identify the type of DoS attack that takes place in the following manner: 1. An intruder sends an excessive number of faked broadcast packets to all the computers in a network. 2. Each computer forwards these packets to the specified fake target address, increasing the amount of network traffic excessively. 3. These packets remain on the network, moving from one computer to another, until they completely choke the network. 4. The high increase in the network traffic prevents the attacked computer from processing packets containing real data. A: Sniffing B: SYN flood C: Spoofing D: Broadcast storm Dap An: D Cau: 174 Identify the networking technology: When an external entity accesses an internal network resource, the external IP address is mapped to a fixed IP address. When an internal node accesses an external resource, its device maps a private IP address to the first IP address that is available from a pool of globally unique IP addresses. A: Secure Socket Layer (SSL) B: Socket Server (SOCKS) C: Transport Layer Security (TLS) D: Network Address Translation (NAT) Dap An: D Cau: 175 Which of the following coands can be used to sort the content of the file, emp_data, the field delimiter used is : (colon)? A: sort t : emp_data B: sort : emp_data

C: sort d : emp_data D: sort emp_data Dap An: A Cau: 176 The CustomerCalls file present under the Customer directory needs to be edited. The Customer directory is present in your home directory. Which of the following coands should you use to edit the file? A: cat ~/CustomerCalls B: vi ~/CustomerCalls C: vi ~/Customer/CustomerCalls D: cat ~/Customer/CustomerCalls Dap An: C Cau: 177 Stella wants to change the password for her login id on the Linux server. She gives the coand passwd. As she enters her old password, the system displays passwd: Authentication token manipulation error. What can be the reason? A: Stella should have used password coand. B: Stella does not have permission to change her password. C: The old password entered by Stella was incorrect. D: The Linux server is not connected to network. Dap An: C Cau: 178 Radio waves are limited to low transmission capacities from ________. A: 1 Mbps to 5 Mbps B: 1 Mbps to 8 Mbps C: 1 Mbps to 10 Mbps D: 1 Mbps to 6 Mbps Dap An: C Cau: 179 Consider the following statements: Statement A: Character device files read and write the data one character at a time. Statement B: A modem is an example of a character device file. Which of the following is correct with respect to the above two statements? A: Statement A is True and Statement B is False. B: Statement A is False and Statement B is True. C: Both, Statement A and Statement B, are True. D: Both, Statement A and Statement B, are False. Dap An: C Cau: 180 Consider the following statements: Statement A: In Linux operating system, there are two types of data stored on the disk, one is the related data and the other is the actual data. Statement B: Actual data is the physical content of the file. Related data is data pertaining to the files location in the filesystem and all its other attributes, such as the owner of the file, the permission of the file, and the type of file.

Which of the following is correct with respect to the above two statements? A: Statement A is True and Statement B is False. B: Statement A is False and Statement B is True. C: Both, Statement A and Statement B, are True. D: Both, Statement A and Statement B, are False. Dap An: D Cau: 181 Angela is currently working in the games directory and needs to create a subdirectory, exams, in the study directory. Which coand should she give? (Click the Exhibit button to view the directory structure.) A: mkdir ~/exams B: md ~/exams C: mkdir ~/study/exams D: mkdir ./study/exams Dap An: C Cau: 182 Jim needs to delete a directory, temp, along with all its subdirectories and files. Which coand enables him to delete the temp directory, present in ~/jim/temp? A: rm ~/jim/temp B: mv ~/jim/temp C: rm r /~jim/temp D: rm f ~/jim/temp Dap An: C Cau: 183 You want to store the details of the users currently logged in the Linux system into the file, userlist. Which of the following coands would you use for this purpose? A: who > userlist B: ls > userlist C: wc userlist D: more userlist Dap An: A Cau: 184 The Collection file is being edited using the vi editor. While editing the file, the coand <Esc>dd is given. Which of the following statements is true about the given coand? A: The coand deletes a character at the current cursor position. B: The coand deletes the line at which the cursor is currently positioned. C: The coand saves the file. D: The coand saves the file and quits the vi editor. Dap An: B Cau: 185 Which of the following coands can be used for redirecting the error messages to the file, err_msg? A: cat test2 > err_msg B: cat test2 2> err_msg C: cat test2 0 > err_mesg D: cat test 1> err_mesg

Dap An: B Cau: 186 The Collection file is being edited using the vi editor. While editing the file, the coand <Esc>x is given. Which of the following statements is true about the given coand? A: The coand deletes a character at the current cursor position. B: The coand deletes the line at which the cursor is currently positioned. C: The coand saves the file. D: The coand saves the file and quits the vi editor. Dap An: A Cau: 187 Which of the following coands can be used to append content of the file, emp, to the file, new_emp? A: cat emp new_emp B: cat emp > new_emp C: cat emp >> new_emp D: cat emp < new_emp Dap An: C Cau: 188 Philip has a file, Cust_records, containing details of all the customers of his company. The fields in Cust_records file are separated by delimiter, -. The format of the file is given below: Cust_ID-Cust_Name-State-Contact He wants a list of the customer names and their contacts who lives in New York. He also wants to know the total number of customers residing in New York. Which coand will he use to display both results? A: grep c "New York" Cust_records | tr s " " | cut d " " f2,3,4 B: grep "New York" Cust_records | cut d "-" f2,4; grep -c "New York" Cust_records C: grep "New York" Cust_records | wc l | cut f2,3,8 D: grep "New York" Cust_records | tr s " " | wc f2,3,8 | wc l Dap An: B Cau: 189 Stella is working as a data entry operator in Global Systems. She has a login account on the Linux server in her office. Her home directory is /home/stella. Identify the coand to move all files having temp anywhere in their names from the /home/stella/progs directory to her home directory. A: mv ~/progs/*temp* ~/ B: cp ~/progs/*temp* ~/ C: cp ~/stella/progs/*temp /home/stella D: mv ~/progs/temp* ~/stella Dap An: A Cau: 190 Peter is a prograer in BlueMoon Computers and he uses vi editor to write the program codes. He frequently needs to save the program using the coand, :w!. However, there is some defect in the ! key, for which he need to give the coand multiple time. This causes lot of inconvenience to him while writing a program. Therefore, he decides to create a shortcut coand, F5, to save the file. Identify which of the following coands should he use? A: :ab :w! <F5>

B: :map <F5> :w! C: :map :w! F5 D: :ab <F5> :w! Dap An: B Cau: 191 Tom is a System Administrator with Deez Telecounications. He wants to know the total number of user logins created in the Linux network. Which of the following coands displays this information? A: who | wc w B: grep c "users" /etc/users C: who | wc c D: wc -l /etc/passwd Dap An: D Cau: 192 Stephen Sterling is working as a Project Manager in Smart Software. He is handling a team of developers who are working on Linux platform. The whole team belongs to same group. Stephen has created a new file, named Guidelines, which has default file permission 664. Stephen wants to change the file permission so that other members of his group cannot write to the Guidelines file and no other users could read this file. Which coand will change the permission of the Guidelines file, as required by Stephen? A: chmod u+x,g-w,o+r Guidelines B: chmod 600 Guidelines C: chmod 622 Guidelines D: chmod g-w,o-r Guidelines Dap An: D Cau: 193 Stella is working in Personnel Department of SuperGraphics. She has less disk space on her computer. Most of her files are stored in her home directory. Therefore, she decides to display all the files and directories contained in her home directory with their sizes. Assuming that Stella is currently in her home directory, which of the following coands is the correct coand? A: ls -l | tr -s " " | cut -d" " f2,5 B: ls -l | cut -d" " -f9,5 | tr s C: ls -l | tr -s " " | cut -d" " -f9,5 D: ls -l | cut -d" " -f9,5 Dap An: C Cau: 194 Philip has a file, Emp_records, containing at least 1500 records of the employees who work in his company. The fields in Emp_records file are separated by a space. The format of the file is as shown below: ID FirstName LastName Contact Philip wants to sort all records on the basis of LastName, within which on the basis of FirstName, but in descending order and redirect the output to SortEmplNames file. Which coand will he use to perform the above task? A: sort +2 3 +1 2 r o SortEmplNames Emp_records B: sort +1 2 +2 3 r o SortEmplNames Emp_records C: sort -2 +1 3 +2 -r o SortEmplNames Emp_records D: sort +1 2 3 r o SortedEmployeeNames Emp_records

Dap An: A Cau: 195 Alice is a prograer in Red Sky IT Systems and creates a program, prog1, which requires the employee code and employee name as input, but in sorted order. The employee_code and employee_name are stored in the file, Employee, as first and third field, respectively. However, Alice also wants to store the sorted record in the file, sort_emp. Identify the correct coand to perform these tasks? A: sort Employee | cut f1,3 | prog1 B: sort Employee | cut f1,3 | tee sort_emp C: cut f1,3 Employee | sort | tee sort_emp | prog1 D: cut f1,3 Employee | sort | prog1 | tee sort_emp Dap An: C Cau: 196 Alice has created four files, Expense1.txt, Expense2.txt, Expense3.txt, and Expense4.txt that contain the information about the expenses of each quarter, respectively. She needs to redirect the output of each file to the file, YearExpense. Any error, should be redirected to the /root/error/err file. Which of the following coands will accomplish the task? A: cat E*[1-4].txt 0>> YearExpense > /root/error/err B: cat E*[1-4].txt 1>> YearExpense 2> /root/error/err C: cat E*[1-4].txt 1>> YearExpense 0> /root/error/err D: cat E*.txt 0>> YearExpense 2> /root/error/err Dap An: B Cau: 197 Jim is creating a file in the vi editor. He is typing the text in the insert mode. While typing the text, he notices that the line number two, which he inserted, is wrong. He will have to delete the line number two. He tries dd coand at line number two, but it does not solve his purpose. What can be the reason? A: He needs to use the dw coand to delete the line. B: He needs to press <Ctrl> dd to delete the line. C: He needs to press <Esc> dd to delete the line. D: He needs to press <Ctrl> 2dd to delete the line. Dap An: C Cau: 198 Which coand will recursively delete the /home/jack/progs directory? A: rmdir /home/jack/progs B: rmdir r /home/jack/progs C: rm /home/jack/progs D: rm -r /home/jack/progs Dap An: D Cau: 199 The content of the Billdetails file needs to be modified. Which of the following coands should you use to modify the file? A: cat Billdetails B: vi Billdetails C: rm Billdetails D: grep Billdetails

Dap An: B Cau: 200 Paul has logged in to the Linux server and wants to store the names of files present in his home directory into the datalist file. Which of the following coands should Paul use to perform this task? A: who > datalist B: ls > datalist C: ls datalist D: who datalist Dap An: B

Vous aimerez peut-être aussi