Principles of Operating Systems and its Applications


Network AdapterIt is a device that converts instructions from the network protocol stack into electric signals.
None of the choicesWhich of the following is not a Boot-option for troubleshooting startup problems?
NTFS PermissionIt defines the type of access granted to a user, group, or computer for a file or folder.
Create an executable rule from the Application Control PolicyYou are the administrator for a large organization with multiple Windows Server 2008 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the sales group. How do you stop the sales group from accessing this one application?
GroupsIt is a collection of user accounts, computer accounts, contacts and other groups that you can manage as a single unit.
DistributionWhich of the following is a main type of group?
IEEE 802.1XStrong EAP methods provide strong authentication
Disk FragmentationIt is the non-contiguous storage of data on a volume
FirewallThis are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions.
GDI based printingIt is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format.
802.11 hWhich of the following is not a Wireless LAN Standards?
PerformanceIt is the measurement on how quickly the computer completes a task.
GUID Partition (GPT)It contains an array of partition entries describing the start and end LBA of each partition on disk.
Group PolicyIt enables IT Administrator to automate one-to-many management of users and computers.
Windows Upgrade AdvisorIt is a downloadable application that helps windows user identify which edition of Windows 7 meets their needs.
Windows 7 ProfessionalWhich of the following is not a Specialized version of Windows 7?
Remote DesktopIt is a windows 7 feature that enables user to connect to their desktop computer from another device.
SwitchIt is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, performs firewall functions and makes routing decisions based upon traffic priority.
Local User AccountsIt enables the user to log on and access resources on a specific computer and usually reside in SAM.
UsabilityIt is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information.
Disk ManagementIt is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally or on remote computers.
Domain User AccountsIt enables users to log on to the domain to gain access to the network resources and it is reside in Active Directory.
Simple VolumeIt is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive.
DriversIt is a small software program that allows a hardware device to communicate with a computer
32 bitsHow many bits are there in an IP version 4 address?
From Accessories, click Connect to a Network ProjectorYou use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. You need to connect to the projector from your computer. What should you do?
Subnet MaskIt specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.
IntranetIt is a group of services hosted on a network which is a private structure and has the internet-like service provision.
User Account ControlIt is a security feature that simplifies the ability of users to run as standard users and perform all neccessary daily tasks
InPrivate BrowsingIt is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing
BitlockerIt is one of the feature of Windows 7 that encrypts the computer operating system and data stored on the operating system volume.
Windows Memory Diagnostics ToolWhich of the following is not a Performance Monitor tool?
Reliability MonitorProvides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures.
128 bitsHow many bits are there in an IP version 6 address?
Network AdapterWhich of the following is not a Physical WAN Components?
Control PanelWhere will you see the Manage Wireless Networks tool in your PC?
Malicious SoftwareIt is a software that is designed to deliberately harm a computer.
WPA-EnterpriseIt is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption used by medium and large organization.
Spanned VolumeIt is a dynamic volume that joins areas of unallocated space disks into a single logical disk
AuthorizationIt is the process of determining whether something or someone has permission to access the resources
Reliability and PerformanceIt is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows.
Default GatewayIt is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
User AccountIt is an object that contains all of the information that defines a user in Windows Server 2008 R2.
WiMaxWhich of the following is not the common network architecture types?
BroadcastWhich of the following is not an IPv6 Address types?
Local Area NetworkIt is the most common form of computer network.
Windows XP modeIt is a feature of Windows 7 that allows windows 7 to be backward compatible
Public IP AddressIt is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.
Upgrade InstallationIt is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.
ApplockerIt is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops.
Mirrored volumesAlexandria is the payroll manager and stores critical file on her local drive for added security on her Windows 7 computer. She wants to ensure that she is using the disk configuration with the most fault tolerance and the highest level of consistent availability. Which of the following provisions should she use?
Does not require the reinstallation of applicationsIt is one of the Considerations on why using the option of Upgrade rather than Migrate.
Restore Windows by using the most recent System Restore pointYou are a desktop administrator for an enterprise organization. A user applies a device update from the manufacturer, and now the computer is displaying error messages. The user has critical documents on the computer that need to be preserved. You need to restore the computer to an operating state and preserve applications and data. What should you do?
Domain ControllerIt provides authenticaltion, host operations of master roles, hosting the global catalog and support group policies and sysvol.
Kerberos v5It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later
Basic SharingIt is a method of sharing folders that allows you to share folders quickly.
Reliability and PerformanceIt is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows.
IntranetIt is a group of services hosted on a network which is a private structure and has the internet-like service provision.
Virtual Private NetworkThis are point-to-point connection across a private or public network. It uses special protocols, called tunneling protocol to make a virtual call to a virtual port.
Software Restriction PoliciesIt allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.
Windows Vista SP1Which of the following version of Windows are allowed for Upgrade?
Remote Access ServerIt a server that is used to access the corporate resources from outside the corporate network.
600mbpsWhat is the maximum bit rate for the 802.11n technologies?
Automatic Private IP AddressingAPIPA stands for:
Ad hoc modeIt is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices.
From the Action Center, open the Windows Update window.Your company network includes desktop computers that have Windows 7 installed. Microsoft updates are applied automatically at a scheduled time. A use1- reports that a proprietary application has stopped working. You need to uninstall the most recent update from Microsoft. What should you do first?
IEEE 802.11What is the IEEE 802 Standards for Local Wireless Networks?
DiskpartIt is a scriptable command line utility that create scripts to automate disk related task.
It supports 16-bit Windows on Windows (WOW) environmentWhich of the following is not an advantage of installing a 64-bit edition of Windows 7?
Public SharingIt is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network.
Disk QuotasIt is a way for you to limit use of disk space on a volume for each user to conserve disk space.
DHCP ServerIt reduces the complexity and amount of administrative work by using automatic TCP/IP configuration.
Encrypting File SystemsIt is the built-in encryption tool for Windows file systems
Master Boot Record DiskIt contains the partition table for the disk and a small amount of executable code called as the master boot code.
Run Disk Cleanup for System Restore and then run Shadow CopiesYou are the system administrator for a large organization that uses Windows Server R2 and Windows 7. You have a Windows 7 machine and have enabled System Protection. You want the machine to retain only the last System Protection snapshot that was taken. What should you do?
Windows Memory Diagnostics ToolChecks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel
AuthenticationIt is the process of verifying the identity of something or someone.
CrownWhich of the following is not a LAN Physical Topology?
Online Identity IntegrationIt is a new authentication features that controls the ability of online IDs to authenticate to a computer.
Windows Power ShellWhich of the following is not a Server Role of Windows Server 2008 R2?
None of the ChoicesWhich of the following is not a way to improve the signal strength?
11111111.11111111.11111111.00000000What is the binary notation for the subnet mask?
Clean InstallationIt is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition.
ForestIt is a collection of Domain Trees.
Remote AssistanceIt is a windows 7 feature that enables support staff to connect to a remote desktop computer.
Windows Network Diagnostics ToolIt provides assistance in resolving network-related issues
Domain ControllerIt holds a copy of AD DS and responds to request for active directory information.
You can configure the client computer by going to the accessories in the start menu and clicking the network options.Which of the following statement is not correct?
ReliabilityIt is the measurement of how a system conforms to expected behavior
RecoveryYou are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use?
Window Update Group PolicyIt is an administrative tool for managing user settings and computer settings across a network.
Control PanelKayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the keyboard speed and the mouse pointer rate. Which utility should she use to configure the keyboard and mouse properties?
HexadecimalWhat type of notation does IP version 6 address uses?
DNS ServerIt is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.
Application ServerIt is a computer that is dedicated to running network-aware application software.
SysprepIt is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.
File ServerIt provides storage for the users' files and share folders that contain users' files.
Role ServicesIt allows you to control which role functionality is installed and enabled.
Network AdaptorWhich of the following is not a Physical WAN Components?
Group PolicyIt enables the IT Administrators to automate one-to-several management of users and computers.
Action CenterIt is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system.
DirectAccessIt provides transparent access to internal network resources whenever they are connected to the Internet. It also enables the IT Professionals to manage remote computers outside of the office and does not require a VPN connection.
Wireless NetworkIt is a type of network that interconnect devices by means of radio waves instead of wires and cables.
Virtual Local Area NetworkIt enables you to manage network traffic, group physically dispersed nodes into logical area networks and isolate network traffic.
Private IP Address172.16.0.0 /12 is what type of IPv4 Address.
Windows XP with SP2Your company has asked you to implement Network Access Protection(NAP) on the network. You already have Windows Server 2008 installed on your servers but your organization wants to know which client operating systems will support NAP. What operating system does not support NAP?