Principles of Operating Systems and Its Applications

CS6206 Principles of Operating Systems and Its Applications
(Final Q1, Q2 & Final Exam)


 

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How many bits are there in an IP version 4 address?

Select one:

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

APIPA stands for:

Select one:

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the binary notation for the 255.255.255.0 subnet mask?

Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.

Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.

Select one:

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.

Select one:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

172.16.0.0 /12 is what type of IPv4 Address.

Select one:

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

How many bits are there in an IP version 6 address?

Select one:

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What type of notation does IP version 6 address uses?

Select one:

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is not an IPv6 Address types?

Select one:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a type of network that interconnect devices by means of radio waves instead of wires and cables.

Select one:

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption used by medium and large organization.

Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Strong EAP methods provide strong authentication

Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Where will you see the Manage Wireless Networks tool in your PC?

Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following statement is not correct?

Select one:

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the maximum bit rate for the 802.11n technologies?

Select one:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is not a way to improve the signal strength?

Select one:

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices.

Select one:

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is the measurement on how quickly the computer completes a task.

Select one:

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is the measurement of how a system conforms to expected behavior

Select one:

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is not a Performance Monitor tool?

Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It provides assistance in resolving network-related issues

Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Checks for symptoms of defective computer memory and usually can be started from administratve tools in the control panel

Select one:

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures.

Select one:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following is not a Boot-option for troubleshooting startup problems?

Select one:

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is an administrative tool for managing user settings and computer settings across a network.

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a central location for viewing messages about your system and the starting point for diagnosing and solving issues with your system.

Select one:

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a software that is designed to deliberately harm a computer.

Select one:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It enables the IT Administrators to automate one-to-several management of users and computers.

Select one:

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is the built-in encryption tool for Windows file systems

Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is one of the feature of Windows 7 that encrypts the computer operating system and data stored on the operating system volume.

Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops.

Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a security feature that simplifies the ability of users to run as standard users and perform all neccessary daily tasks

Select one:

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It allows the administrators to identify which software is allowed to run and was initially added to Windows XP and Windows Server 2003.

Select one:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions.

Select one:

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing

Select one:

Feedback

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You have a computer that runs Windows 7. The computer is a member of a workgroup. You use Encrypting File System (EFS) to protect your local files. You need to ensure that you can decrypt EFS files on the computer if you forget your password. What should you do?

Select one:

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are evaluating the purchase a netbook computer that has the following hardware:

 

1.6-gigahertz (GHz) 32-bit processor

1024-MB RAM

1 video card that uses shared memory

4-G8 solid state drive

 

You need to ensure that you can install Windows 7 Enterprise on the netbook computer. Which hardware component should you change or add?

Select one:

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Your company network includes desktop computers that have Windows 7 installed. Microsoft updates are applied automatically at a scheduled time. A use1- reports that a proprietary application has stopped working. You need to uninstall the most recent update from Microsoft. What should you do first?

Select one:

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7. You want to deploy a Windows image (WIM) file to other computers in the domain. You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file. What should you do before you capture the image?

Select one:

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You manage a network device by using a web interface. You perform all critical Windows updates so that the computer now runs Internet Explorer 10. After performing these updates, the layout of the network device web page displays incorrectly. Other web pages display correctly. You need to resolve this issue. What should you do?

Select one:

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are a desktop administrator for an enterprise organization. A user applies a device update from the manufacturer, and now the computer is displaying error messages. The user has critical documents on the computer that need to be preserved. You need to restore the computer to an operating state and preserve applications and data. What should you do?

Select one:

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the administrator for a large organization with multiple Windows Server 2008 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the sales group. How do you stop the sales group from accessing this one application?

Select one:

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the network manager for a small company. You have a junior IT administrator who did some installations last week on a Windows 7 machine. How can you see what applications were installed last week on the Windows 7 machine?

Select one:

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the network administrator for Stellacon Corporation. User in the sales department have been complaining that the Sales application is slow to load. Using Performance Monitor, you create a baseline report for one of the computers, monitoring memory, the processor, the disk subsystem, and the network subsystem. You notice that the disk subsystem has a high load of activity. What other subsystem should you monitor before you can know for sure whether you have a disk subsystem bottleneck?

Select one:

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the network administrator for a large organization that uses both Windows Server 2008 R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily. You perform an image backup on the Windows 7 machine. The Windows 7 machine then gets struck by a virus and will not start up properly. What can you do to get the Windows 7 machine up and running the fastest possible way?

Select one:

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the system administrator for a large organization that uses Windows Server R2 and Windows 7. You have a Windows 7 machine and have enabled System Protection. You want the machine to retain only the last System Protection snapshot that was taken. What should you do?

Select one:

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Alexandria is the payroll manager and stores critical file on her local drive for added security on her Windows 7 computer. She wants to ensure that she is using the disk configuration with the most fault tolerance and the highest level of consistent availability. Which of the following provisions should she use?

Select one:

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use?

Select one:

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the keyboard speed and the mouse pointer rate. Which utility should she use to configure the keyboard and mouse properties?

Select one:

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the network administrator for your organization. You have been asked by the owner of the company to verify that all drivers installed on the Windows 7 machines are signed drivers. How do you accomplish this task?

Select one:

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the network administrator for a large organization. You are in charge of implementing company policies. One company policy states that you have to prevent Internet Explorer from saving any data during a user`s browsing session. How do you accomplish this?

Select one:

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. You need to connect to the projector from your computer. What should you do?

Select one:

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You log on to one of the portable computers by using a domain user account and install a new device for a bar-code scanner. You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You need to be able to roll back the driver to its previous version. What should you do?

Select one:

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

You are the network administrator for a small company that has just switched its machines from Windows XP to Windows Vista and Windows 7. One of the users who has Windows Vista asks you why there is a vertical sidebar on the screen. What feature of Windows Vista is this?

Select one:

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Your company has asked you to implement Network Access Protection(NAP) on the network. You already have Windows Server 2008 installed on your servers but your organization wants to know which client operating systems will support NAP. What operating system does not support NAP?

Select one:

Feedback

Question 21

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is one of the features of Mobile Computers wherein it synchronizes various content including music, video, contacts, calendar events, web browser favorites and other files between Windows Mobile devices and Windows 7

Select one:

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a method of turning a computer on or off wherein the system state is saved to memory.

Select one:

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

This Power plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize the battery life.

Select one:

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a windows 7 feature that enables user to connect to their desktop computer from another device.

Select one:

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a windows 7 feature that enables support staff to connect to a remote desktop computer.

Select one:

Feedback

Question 26

Correct
Mark 1.00 out of 1.00
Flag question

Question text

This are point-to-point connection across a private or public network. It uses special protocols, called tunneling protocol to make a virtual call to a virtual port.

Select one:

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It provides transparent access to internal network resources whenever they are connected to the Internet. It also enables the IT Professionals to manage remote computers outside of the office and does not require a VPN connection.

Select one:

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It caches content from remote and web servers in the branch location so users can quickly access the content. This cache can be hosted centrally in the branch location or distributed across user PCs.

Select one:

Feedback