Computer Hardware and Networking Job

> A Lots Of Computer Hardware and Networking Job on The India's Number 1 Most Updated Jobsite. http://dreamjobshub.blogspot.com/ Don't Forget To Subscribe To This Website!!!!!!!!!

Search In This Blog OR Web

Jobs for Computer Hardware & Networking Professional.

Visit www.dreamjobshub.blogspot.com for Computer Hardware & Networking Professional's Jobs.

Jetking Online Dumps

For More Questions Contact Us
 Jetking Online Dumps for Module- 1

     1/1/1/5Multiple ChoiceMarks = 2
      Q. NO. 1which of the following are the 555 timer operating modes?
      1 . Astable multivibrator
      2 . Bistable multivibrator
      3 . Tristable multivibrator
      4 . none

      1/1/1/15Multiple ChoiceMarks = 2
      Q. NO. 2__________ is connected across the circuit component and ammeter
      is connected in _________ with circuit component.
      1 . voltmeter
      2 . series
      3 . parallel
      4 . ohmmeter

      1/1/1/6Multiple ChoiceMarks = 2
      Q. NO. 3The colour code used in the 23 K ohm resistor is:
      1 . Red
      2 . Orange
      3 . Orange
      4 . Green
      1/1/1/17Multiple ChoiceMarks = 2
      Q. NO. 4Which of the following statements are related to inductor?
      1 . inductor is made up of coils
     2 . inductor opposes current
      3 . opposes the change in flow of current.
      4 . unit of inductor is known as inductance
      1/1/1/14Multiple ChoiceMarks = 2
      Q. NO. 5Which of the following are the light dependent resistors?
      1 . transistor
      2 . thermistor
      3 . photocell
      4 . none
      1/1/2/14Blanks Single ChoiceMarks = 1
      Q. NO. 1________________ rotates around the nucleus.
      1 . Electrons
      2 . Proton
      3 . Neutron
      4 . Helium
      1/1/2/1Blanks Single ChoiceMarks = 1
      Q. NO. 2the constituents of an atom are proton,neutrons and _____________
      1 . electron
      2 . positron
      3 . Both
      4 . None of above
      1/1/2/30Blanks Single ChoiceMarks = 1
      Q. NO. 3The electrons in the outermost orbit are called ______ electrons
      1 . valence
      2 . covalent
      3 . acceptor
      4 . donor
      1/1/2/36Blanks Single ChoiceMarks = 1
      Q. NO. 4When we double the resistance, the current is reduced to ______
      its former value.
      1 . one fourth
      2 . one half
      3 . one eighth
      4 . one tenth
      1/1/2/6Blanks Single ChoiceMarks = 1
      Q. NO. 5We do soldering in __________.
      1 . Electrical connection
      2 . Mechanical connect
      3 . Chemical reaction
      4 . Civil connection
      1/1/3/17True Or FalseMarks = 1
      Q. NO. 1MOSFET has low packing density.
      1 . TRUE
      2 . FALSE
      1/1/3/31True Or FalseMarks = 1
      Q. NO. 2Usually the emitter is grounded.
      1 . TRUE
      2 . FALSE
      1/1/3/6True Or FalseMarks = 1
      Q. NO. 3Choke input filter consists of inductor connected in parallel with
      a filter capacitor.
      1 . TRUE
      2 . FALSE
      1/1/3/16True Or FalseMarks = 1
      Q. NO. 4The size of the depletion region of JFET can be controlled by
      voltage VGS.
      1 . TRUE
      2 . FALSE
      1/1/3/45True Or FalseMarks = 1
      Q. NO. 5Kirchoff's Voltage law states that "In a closed circuit sum of
      voltage rises is equal to the sum of voltage drops".
      1 . TRUE
      2 . FALSE
      1/1/4/63Single ChoiceMarks = 1
      Q. NO. 1The center part of the atom, which is called the nucleus, consists
      of
      1 . electrons and neutrons.
      2 . electrons and protons
      3 . electrons
      4 . protons and neutrons
      1/1/4/29Single ChoiceMarks = 1
      Q. NO. 2PCB stands for ______________.
      1 . Printed Carol Board
      2 . Printed Circuit Board
      3 . Both
      4 . None
      1/1/4/1Single ChoiceMarks = 1
      Q. NO. 3LED converts electrical energy into _________ energy.
      1 . Light
      2 . Mechanical
      3 . Thermal
      4 . Sound
      1/1/4/52Single ChoiceMarks = 1
      Q. NO. 4Like poles __________ according to Couloumbs law.
      1 . Attract
      2 . Repel
      3 . Remain invert
      4 . None
      1/1/4/12Single ChoiceMarks = 1
      Q. NO. 5Photo transistor is also a ___________ device.
      1 . P-N Junction
      2 . Semi Conductor
      3 . Light Sensitive
      4 . All
      1/2/5/11Multiple ChoiceMarks = 2
      Q. NO. 1Different types of counters are:
      1 . Asynchronous
      2 . Synchronous
      3 . Ribbon Counter
      4 . Ripple Counter
      1/2/5/4Multiple ChoiceMarks = 2
      Q. NO. 2Basic laws of Boolean Algebra
      1 . Commutative Law
      2 . Associative Law
      3 . Distributive Law
      4 . OR Law
      1/2/5/3Multiple ChoiceMarks = 2
      Q. NO. 3Universal Gates are
      1 . NAND
      2 . NOR
      3 . EX-OR
      4 . AND
      1/2/5/8Multiple ChoiceMarks = 2
      Q. NO. 4Unipolar logic families are of the following types:
      1 . CMOS
      2 . HMOS
      3 . PMOS
      4 . PNMOS
      1/2/5/10Multiple ChoiceMarks = 2
      Q. NO. 5According to the Duality Theorem following statement is true.
      1 . Each OR sign is changed to an AND sign.
      2 . 0 is complemented to 1
      3 . Each AND is changed to an OR
      4 . None of above.
      1/2/6/2Blanks Single ChoiceMarks = 1
      Q. NO. 1Digital circuits are considered to be ______________.
      1 . Small and inexpensive
      2 . Of MSI and LSI type of construction
      3 . Reliable
      4 . All
     1/2/6/14Blanks Single ChoiceMarks = 1
      Q. NO. 2NOT gate IC No. ______________.
      1 . 7408
      2 . 7486
      3 . 7480
      4 . 7404
      1/2/6/7Blanks Single ChoiceMarks = 1
      Q. NO. 3D-flip-flop can be designed using _____________ flip-flop.
      1 . T flip-flop
      2 . D flip-flop
      3 . none
      4 . RS flip-flop
      1/2/6/1Blanks Single ChoiceMarks = 1
      Q. NO. 4NOT Gate is used to produce __________ complement.
      1 . One's
      2 . Two's
      3 . Both
      4 . None
      1/2/6/6Blanks Single ChoiceMarks = 1
      Q. NO. 5An encoder is a curcuit which _____________.
      1 . Convert a single active i/p signal
      2 . Gate a single active o/p signal
      3 . Used to decimal to B.C. D.
      4 . A seven segment
      1/2/7/5True Or FalseMarks = 1
      Q. NO. 1BCD stand for binary cost decimal
      1 . TRUE
      2 . FALSE
      1/2/7/15True Or FalseMarks = 1
      Q. NO. 2Register is an example of sequential logic ckts.
      1 . TRUE
      2 . FALSE
      1/2/7/7True Or FalseMarks = 1
      Q. NO. 3In case of half adder output of AND gate is borrow.
      1 . TRUE
      2 . FALSE
      1/2/7/3True Or FalseMarks = 1
      Q. NO. 4Most significant bit of each number is always on right side.
      1 . TRUE
      2 . FALSE
      1/2/7/30True Or FalseMarks = 1
      Q. NO. 5We can use NAND gate instead of NOT Gate.
      1 . TRUE
      2 . FALSE
      1/2/8/86Single ChoiceMarks = 1
      Q. NO. 1The octal number system has a radix of 8 because we use __________
      bits to represent (quantities).
      1 . 10
      2 . 2
      3 . 3
      4 . 16
      1/2/8/32Single ChoiceMarks = 1
      Q. NO. 2Flip-Flop is set if outputs:
      1 . Q=0, Compliment of Q=1
      2 . Q=1, Compliment of Q=0
      3 . Q=1, Compliment of Q = 1
      4 . Q=0, Compliment of Q=0
     1/2/8/69Single ChoiceMarks = 1
      Q. NO. 3By adding two numbers 110 and 001 we will get:
      1 . 101
      2 . 110
      3 . 111
      4 . 010
     1/2/8/10Single ChoiceMarks = 1
      Q. NO. 4555 Works in __________ modes.
      1 . Astable
      2 . Tristable
      3 . Quadrastable
      4 . None of these
     1/2/8/26Single ChoiceMarks = 1
      Q. NO. 5In D Type Flip-Flop, Q=1, When
      1 . D=0
      2 . D=1
      3 . D=0,1
      4 . D is connected to clock
      1/3/9/18Multiple ChoiceMarks = 2
      Q. NO. 1The basic elements of a microprocessor are :
      1 . ALU, memory
      2 . ALU, control unit
      3 . ALU, memory, I/O devices
      4 . ALU, control unit, memory
      1/3/9/10Multiple ChoiceMarks = 2
      Q. NO. 2In microprocessor architecture ,flag indicates
      1 . the number of the microprocessor
      2 . the name of the manufacturer
      3 . the internal status of the CPU
      4 . the bit size of the microprocessor
     1/3/9/23Multiple ChoiceMarks = 2
      Q. NO. 3Data transfer is controlled through:
      1 . EI & SIM
      2 . DI & RIM
      3 . EI & DI
      4 . SIM & RIM
      1/3/9/17Multiple ChoiceMarks = 2
      Q. NO. 4Volatile storage is a device in which data is lost:
      1 . with time
      2 . when power is removed
      3 . when program is over
      4 . none
     1/3/9/30Multiple ChoiceMarks = 2
      Q. NO. 5Trap is _________.
      1 . Non-maskable interrupt
      2 . Maskable Interrupt
      3 . Highest Priority
      4 . Lowest Priority
      1/3/10/47Blanks Single ChoiceMarks = 1
      Q. NO. 1Hard Disk is _____________.
      1 . Plain Memory
      2 . Storage Device
      3 . Primary Memory
      4 . None
     1/3/10/45Blanks Single ChoiceMarks = 1
      Q. NO. 2No. of bits stored in a register is called ___________.
      1 . Binary Data
      2 . Memory Word
      3 . Serial Data
      4 . Memory Bits
     1/3/10/14Blanks Single ChoiceMarks = 1
      Q. NO. 31 KB byte = __________.
      1 . 1000 bytes
      2 . 1024 bytes
      3 . 1028 bytes
      4 . None
      1/3/10/3Blanks Single ChoiceMarks = 1
      Q. NO. 4S0 and S1 of 8085 microprocessor are _________ signals.
      1 . Data
      2 . Status
      3 . Control
      4 . External
     1/3/10/39Blanks Single ChoiceMarks = 1
      Q. NO. 58085 has ________ no. of flags.
      1 . 3
      2 . 4
      3 . 5
      4 . 6
     1/3/11/19True Or FalseMarks = 1
      Q. NO. 1ALU stores the memory.
      1 . TRUE
      2 . FALSE
      1/3/11/4True Or FalseMarks = 1
      Q. NO. 2The PROM chips can be programmed only once.
      1 . TRUE
      2 . FALSE
      1/3/11/18True Or FalseMarks = 1
      Q. NO. 3Program counter is not a memory pointer.
      1 . TRUE
      2 . FALSE
      1/3/11/13True Or FalseMarks = 1
      Q. NO. 4The primary memory of the PC is made up of magnetic material.
      1 . TRUE
      2 . FALSE
      1/3/11/16True Or FalseMarks = 1
      Q. NO. 5Address Bus is unidirectional bus.
      1 . TRUE
      2 . FALSE
      1/3/12/4Single ChoiceMarks = 1
      Q. NO. 1A 16-bit address bus is capable of accessing _________ bytes in
      the primary locations.
      1 . 2 with power 13.
      2 . 2 with power 12
      3 . 2 with power 14
      4 . 2 with power 16
     1/3/12/20Single ChoiceMarks = 1
      Q. NO. 2A compiler translates a ___________ language program into machine
      language.
      1 . Low-level
      2 . Machine language
      3 . High-level
      4 . All of above
     1/3/12/22Single ChoiceMarks = 1
      Q. NO. 3A byte is defined as a group of:
      1 . 8 bits
      2 . 4 bits
      3 . 16 bits
      4 . 32 bits
   1/3/12/29Single ChoiceMarks = 1
      Q. NO. 48088 is a ___________ bit device.
      1 . 8 bit
      2 . 16 bit
      3 . 32 bit
      4 . 4 bit
     1/3/12/26Single ChoiceMarks = 1
      Q. NO. 5LED's are:
      1 . Input device
      2 . Output Device
      3 . Memory device
      4 . CPU device
      2/4/13/20Multiple ChoiceMarks = 2
      Q. NO. 1The three main system files of windows 98 are,
      1 . IO.SYS
      2 . MS-DOS.SYS
      3 . COMMAND.COM
      4 . FDISK
     2/4/13/16Multiple ChoiceMarks = 2
      Q. NO. 2Following are the limitations of computer,
      1 . Computers cannot think on its own.
      2 . Computers have no intuition
      3 . Computers do not learn from experience.
      4 . None
     2/4/13/13Multiple ChoiceMarks = 2
      Q. NO. 3_____is used for making the presentation.
      1 . MS power point
      2 . MS exel
      3 . MS windows
      4 . MS word
     2/4/13/8Multiple ChoiceMarks = 2
      Q. NO. 4Setup, the executable file used for installation of Win98 has
      ___________ extension.
      1 . exe
      2 . Com
      3 . Bat
      4 . None
     2/4/13/22Multiple ChoiceMarks = 2
      Q. NO. 5By using FDISK command we can,
      1 . Create DOS partition or logical DOS drive.
      2 . Set active partition.
      3 . Format the Disk
      4 . Display partition information.
      2/4/14/5Blanks Single ChoiceMarks = 1
      Q. NO. 1The name of a program in MS word is displayed on _________ .
      1 . Menu Bar
      2 . Title Bar
      3 . Tool Bar
      4 . None
     2/4/14/20Blanks Single ChoiceMarks = 1
      Q. NO. 2___________ logical function is used to join two or more
      conditions.
      1 . OR
      2 . NOT
      3 . AND
      4 . None
     2/4/14/23Blanks Single ChoiceMarks = 1
      Q. NO. 3EDIT command is used to __________.
      1 . Change the contents of the file.
      2 . Change the contents of the directory.
      3 . Only view the file.
      4 . Copy the file.
     2/4/14/9Blanks Single ChoiceMarks = 1
      Q. NO. 4To search for a specific word we use _________.
      1 . Index tab
      2 . Exit tab
      3 . Tree tab
      4 . Option tab
    2/4/14/13Blanks Single ChoiceMarks = 1
      Q. NO. 5To identify the beginning of a chapter _________ options is used.
      1 . Landmark
      2 . Sigma
      3 . Stopper
      4 . Bookmark
      2/4/15/19True Or FalseMarks = 1
      Q. NO. 1XCopy command copies executable files only.
      1 . TRUE
      2 . FALSE
      2/4/15/5True Or FalseMarks = 1
      Q. NO. 2Diskcopy is an external command.
      1 . TRUE
      2 . FALSE
    2/4/15/7True Or FalseMarks = 1
      Q. NO. 3jetking@rediffmail.com is an e-mail i.d.
      1 . TRUE
      2 . FALSE
      2/4/15/9True Or FalseMarks = 1
      Q. NO. 4Pivot table is a feature of MS-Excel.
      1 . TRUE
      2 . FALSE
      2/4/15/15True Or FalseMarks = 1
      Q. NO. 5Full form of ALU is Addition Logic Units.
      1 . TRUE
      2 . FALSE

      2/4/16/28Single ChoiceMarks = 1
      Q. NO. 1A font is
      1 . different size of characters.
      2 . different Style of characters
      3 . both
      4 . none
     2/4/16/27Single ChoiceMarks = 1
      Q. NO. 2Mail merge is used
      1 . to merge source document with data source.
      2 . to mail the copies
      3 . copies the files
      4 . none.
     2/4/16/15Single ChoiceMarks = 1
      Q. NO. 3In MS-Word picture tool is found in:
      1 . View
      2 . Edit
      3 . Insert
      4 . None
     2/4/16/5Single ChoiceMarks = 1
      Q. NO. 4windows98 Bootable floppy is made up of :
      1 . Config.sys, autoexec.bat ,Command.com
      2 . Himem.sys, command.com, Config.sys
      3 . Command.com, Msdos.sys, Io.sys
      4 . Command.com,Io.sys,Autoexec.bat
      2/4/16/22Single ChoiceMarks = 1
      Q. NO. 5__________ contains a variety of useful clip-art.
      1 . Clip art gallery
      2 . Art gallery
      3 . Photo gallery
      4 . None
      5/8/29/37Single ChoiceMarks = 1
      Q. NO. 1There is enough in world for every man's need but not enough for
      one man's greed. Your views about this:
      1 . This is just philosophy
      2 . This is a fact
      3 . Both A and B
      4 . None
     5/8/29/22Single ChoiceMarks = 1
      Q. NO. 2Jetking has a long history of:
      1 . 10 years
      2 . 20 years
      3 . 30 years
      4 . 55 years
      5/8/29/16Single ChoiceMarks = 1
      Q. NO. 3Which statement is not suitable for the process of communication?
      1 . Define the mesage accurately
      2 . Remember your last 5 days itinerary
      3 . Use appropriate words/gestures to symbolize its meaning
      4 . Consider reciever's background to concide meanings
     5/8/29/6Single ChoiceMarks = 1
      Q. NO. 4Which is the nearest word to "Consequences" ?
      1 . Ignorance
      2 . Immediate
      3 . Penalty
      4 . Conscience
      5/8/29/5Single ChoiceMarks = 1
      Q. NO. 5What is time management?
      1 . Counting of hours
      2 . Not Pioritizing time
      3 . Study of time
      4 . Life Management
      5/8/29/3Single ChoiceMarks = 1
      Q. NO. 6What is non-verbal communication?
      1 . No Hand gestures
      2 . Giving instructions
      3 . Facial expressions
      4 . None
      5/8/29/13Single ChoiceMarks = 1
      Q. NO. 7What certificates are provided from Novell company?
      1 . RHCE
      2 . CCNA
      3 . CNE
      4 . MCSE
      5/8/29/39Single ChoiceMarks = 1
      Q. NO. 8Atul narrate a story to Mr. Vinod , and vinod narrates the same
      story to Tapesh. After the story there is conflicts between Atul and
      Tapesh the reason for the conflicts:
      1 . Communication gap
      2 . Lack of effective communication
      3 . When story narrated by Vinod and Tapesh, the actual message was
      modified.
      4 . All are right.
      5/8/29/47Single ChoiceMarks = 1
      Q. NO. 9Physiological barrier means:
      1 . Stammering problem
      2 . Noise pollution
      3 . Listening Problem
      4 . Both 1 and 3
      5/8/29/42Single ChoiceMarks = 1
      Q. NO. 10Purity means
      1 . removal of negative thoughts
      2 . Cleanliness
      3 . Not dirty
      4 . None

Jetking Online Dumps for Module-2

For More Questions Contact Us.

Exam paper module 2

Multiple Choice Marks = 1
Q. NO. 1 You have noticed on your network that users are having difficulty accessing Web pages. The pages seem to time out and fail. Which three of the following tools in Windows XP Professional can help you diagnose your problem?
1 . ping
2 . ipconfig
3 . hostname
4 . arp
5 . nslookup


37/61/200/4 Multiple Choice Marks = 1
Q. NO. 2 The Setup Manager Wizard allows you to configure which three of the following installation options?
1 . Distribution method.
2 . Advanced Settings.
3 . Regional Settings.
4 . Language Settings.
5 . General Settings.


37/61/200/2 Multiple Choice Marks = 1
Q. NO. 3 TCP/IP is installed on each PC within a network. You can communicate within the network but are unable to access the Internet. Which of the following TCP/IP settings must be properly configured for Internet access?
1 . IP Address
2 . MAC address
3 . Default Gateway
4 . DNS Server
5 . SubNet Mask


37/61/200/5 Multiple Choice Marks = 1
Q. NO. 4 What three classes of information are written into a log file?
1 . Errors
2 . Warnings
3 . Recommendations
4 . Analysis
5 . Information


37/61/200/9 Multiple Choice Marks = 1
Q. NO. 5 Which of the following are the features of the NTFS file system? (Choose all that apply)
1 . Encryption
2 . Disk Quota
3 . NTFS Compression
4 . NTFS Permission for Local Security
5 . None of the Above


37/61/200/7 Multiple Choice Marks = 1
Q. NO. 6 In which of the Windows Vista edition, Parental Control is not available? (Choose all that apply)
1 . Home Basic
2 . Home Premium
3 . Business
4 . Ultimate
5 . Enterprise


37/61/200/11 Multiple Choice Marks = 1
Q. NO. 7 Press _________________to open a special page of thumbnails for all open tabs.(Select One)
1 . Ctrl + W
2 . Ctrl + T
3 . Ctrl + Tab
4 . Ctrl + Q
5 . None of Above


37/61/200/6 Multiple Choice Marks = 1
Q. NO. 8 Which three of the following are advantages of the NTFS file system over the FAT or FAT32 systems?
1 . The NTFS file system is more reliable.
2 . The NTFS file system is better for dual-booting.
3 . The NTFS file system provides greater security.
4 . The NTFS file system stores files more efficiently.
5 . The NTFS file system is supported by all legacy versions of Windows.


37/61/200/1 Multiple Choice Marks = 1
Q. NO. 9 Which of the following processors fall below Windows Vista’s minimum recommended requirements? (Choose all that apply)
1 . 3.0 GHz Pentium IV
2 . 500 MHz Pentium III
3 . 1 GHz Pentium III
4 . 700 MHz Pentium III
5 . None of Above


37/61/200/10 Multiple Choice Marks = 1
Q. NO. 10 Which two of the following protocols are used for sending and receiving email?
1 . SMTP
2 . HTTP
3 . PPP
4 . POP
5 . SNMP
PART OVER
37/61/202/4 Single Choice Marks = 1
Q. NO. 1 The maximum length of a password cannot exceed ________characters.
1 . 4
2 . 100
3 . 127
4 . 12
5 . None of


37/61/202/3 Single Choice Marks = 1
Q. NO. 2 ___________account is used by temporary users of a computer.
1 . Shared
2 . Personal
3 . Standard
4 . Guest
5 . None of Above


37/61/202/2 Single Choice Marks = 1
Q. NO. 3 The three types of user accounts are Standard Account, Administrator Account and ___________ Account.
1 . Personal
2 . Guest
3 . Protected
4 . Shared
5 . None of Above


37/61/202/5 Single Choice Marks = 1
Q. NO. 4 The user with _____________rights can set or change a password of other users.
1 . Guest
2 . Administrative
3 . Standard
4 . Advanced
5 . None of Above


37/61/202/10 Single Choice Marks = 1
Q. NO. 5 ________enables you to use previous version of driver when the driver you are using causes system instability.
1 . Plug and Play
2 . Device Manager
3 . Driver
4 . Driver Rollback
5 . None of Above


37/61/202/7 Single Choice Marks = 1
Q. NO. 6 The _________________policy stores a password as text which provides better security level
1 . Enforce password history
2 . Minimum password age
3 . Password must meet complexity requirements
4 . password using reversible encryption for all users in the domain
5 . None of Above


37/61/202/8 Single Choice Marks = 1
Q. NO. 7 When you install or configure a new device the __________ feature takes care of the installation.
1 . Installation Wizard
2 . Automatic Installation
3 . Plug and Play
4 . Normal Installation
5 . None of Above


37/61/202/1 Single Choice Marks = 1
Q. NO. 8 __________________ option enables you to hide the taskbar.
1 . Keep the taskbar on top of other windows
2 . Show Quick Launch
3 . Auto-hide the taskbar
4 . Lock the taskbar
5 . None of Above


37/61/202/6 Single Choice Marks = 1
Q. NO. 9 Members of this group can log on to the computer remotely.
1 . Replicator
2 . Offer Remote Assistance Helpers
3 . Remote Desktop Users
4 . Power Users
5 . None of Above


37/61/202/9 Single Choice Marks = 1
Q. NO. 10 When you install a signed or unsigned driver you have to give your consent in the ___________ dialog box.
1 . Warning
2 . Credentials
3 . Administrator
4 . UAC
5 . None of Above
PART OVER
37/61/201/13 Single Choice Marks = 1
Q. NO. 1 The ______________ option is used to merge the registry.
1 . Export
2 . Import
3 . Load hive
4 . Unload hive
5 . None of Above


37/61/201/14 Single Choice Marks = 1
Q. NO. 2 The __________ command is used to reduce the size of a volume by a specified amount.
1 . Shrink
2 . Reduce
3 . Remove
4 . Delete
5 . None of Above


37/61/201/11 Single Choice Marks = 1
Q. NO. 3 The STOP error is also known as_______ screen error
1 . Red
2 . Green
3 . Blue
4 . Black
5 . None of Above


37/61/201/5 Single Choice Marks = 1
Q. NO. 4 Before upgrading to Windows Vista, at least ______________ free space must be available in the Windows XP volume.
1 . 15 GB
2 . 256 MB
3 . 10 GB
4 . 11 GB
5 . None of Above


37/61/201/1 Single Choice Marks = 1
Q. NO. 5 The ______________ interface in Windows Vista improves the clarity in appearance.
1 . Windows Easy Transfer
2 . Windows Instant Search
3 . Widows Aero
4 . Windows Media Centre
5 . None of Above


37/61/201/8 Single Choice Marks = 1
Q. NO. 6 The pen process against the screen is known as _________________.
1 . Stylus
2 . Tap
3 . Convertible
4 . Applying ink
5 . None of Above


37/61/201/6 Single Choice Marks = 1
Q. NO. 7 The ______________ recovery option in Windows Vista enables automatic rebuilding of the installation.
1 . Startup Repair
2 . System Restore
3 . Windows Complete PC Restore
4 . Windows Memory Diagnostic Tool
5 . None of Above


37/61/201/7 Single Choice Marks = 1
Q. NO. 8 The special screen of Tablet PC hardware is known as___________.
1 . Stylus
2 . Tap
3 . Applying Ink
4 . Slate
5 . None of Above


37/61/201/3 Single Choice Marks = 1
Q. NO. 9 The ______________ edition of Windows Vista supports BitLocker Drive Encryption.
1 . Windows Vista Ultimate
2 . Windows Vista Home Basic
3 . Windows Vista Premium
4 . Windows Vista Business
5 . None of Above


37/61/201/2 Single Choice Marks = 1
Q. NO. 10 The Windows Meeting Place feature in Windows Vista enables sharing of desktop of up to ______________ users.
1 . Five
2 . Ten
3 . Fifteen
4 . Seven
5 . None of Above
PART OVER
37/61/203/13 True Or False Marks = 1
Q. NO. 1 A spanned volume can exist only on a Basic disk.
1 . TRUE
2 . FALSE


37/61/203/2 True Or False Marks = 1
Q. NO. 2 Network mapping uses LLTD protocol.
1 . TRUE
2 . FALSE


37/61/203/4 True Or False Marks = 1
Q. NO. 3 A spyware can be stopped using Windows Defender.
1 . TRUE
2 . FALSE


37/61/203/3 True Or False Marks = 1
Q. NO. 4 The hostname command is used to display the host name of the current computer.
1 . TRUE
2 . FALSE


37/61/203/8 True Or False Marks = 1
Q. NO. 5 Press the "Tab" key to view the menu bar in IE7.
1 . TRUE
2 . FALSE


37/61/203/12 True Or False Marks = 1
Q. NO. 6 The documents that are being printed and waiting to be printed are called Print Jobs.
1 . TRUE
2 . FALSE


37/61/203/7 True Or False Marks = 1
Q. NO. 7 The Windows Security Center is notified by a CD icon in the notification area.
1 . TRUE
2 . FALSE


37/61/203/6 True Or False Marks = 1
Q. NO. 8 An administrator is provided two tokens.
1 . TRUE
2 . FALSE


37/61/203/10 True Or False Marks = 1
Q. NO. 9 The Offline files are a copy of the files located on the Network.
1 . TRUE
2 . FALSE


37/61/203/11 True Or False Marks = 1
Q. NO. 10 A mapped folder will be assigned a unique Drive Letter.
1 . TRUE
2 . FALSE
PART OVER
37/62/204/10 Multiple Choice Marks = 1
Q. NO. 1 Which Devices would be MOST susceptible to ESD (Electrostatic Discharge) Damage? (Choose Two)
1 . CPUs
2 . Monitors
3 . Printers
4 . Memory Chips.
5 . None of above


37/62/204/14 Multiple Choice Marks = 1
Q. NO. 2 You want to upgrade your slot1 motherboard. Which of the following chips are available in the slot1 package? (Choose three)
1 . P 233
2 . PII 233
3 . PIII 333
4 . PIII 800
5 . AMD Athlon


37/62/204/1 Multiple Choice Marks = 1
Q. NO. 3 Which of the following are the major hard drive settings in the CMOS? (Choose three.)
1 . Heads.
2 . Tracks.
3 . Volume.
4 . Sector.
5 . Cylinder


37/62/204/19 Multiple Choice Marks = 1
Q. NO. 4 Some one placed a BIOS password on a computer and forgot the password. What should you do? (Choose two)
1 . Boot to a floppy and fdisk the drive.
2 . Temporarily remove the CMOS battery.
3 . Go into BIOS setup and delete the password.
4 . Clear the CMOS by shortening the CMOS jumper.
5 . Boot down the computer while holding down the key.


37/62/204/20 Multiple Choice Marks = 1
Q. NO. 5 What are the minimum hardware components required for the POST to pass? (Choose all that apply.)
1 . CPU
2 . RAM
3 . Mouse
4 . Hard drive
5 . Video Card


37/62/204/30 Multiple Choice Marks = 1
Q. NO. 6 Which processors will fit in the same socket? (Choose three.)
1 . AMD K7.
2 . Cyrix MLL.
3 . AMD K6.
4 . Pentium II
5 . Pentium MMX.


37/62/204/33 Multiple Choice Marks = 1
Q. NO. 7 Which processors use a slot 1 connection on a motherboard? (Choose two.)
1 . AMD K7
2 . PENTUIM II
3 . PENTIUM III
4 . PENTIUM PRO
5 . PENTIUM II XEON


37/62/204/36 Multiple Choice Marks = 1
Q. NO. 8 Which CPU socket 7-based? (Select all that apply.)
1 . Pentium I
2 . Pentium II
3 . AMD Athlon
4 . Pentium MMX
5 . 8085


37/62/204/22 Multiple Choice Marks = 1
Q. NO. 9 What is the main difference between AT and ATX motherboards? (Choose two)
1 . PS/2 port
2 . BNC connector
3 . Soft power switch
4 . Serial connectors
5 . Parallel connectors


37/62/204/15 Multiple Choice Marks = 1
Q. NO. 10 What must you do to attach a new IDE hard drive? (Choose three)
1 . Select a unique ID
2 . Set the termination jumpers
3 . Set the master/slave jumper
4 . Ensure proper cable orientation
5 . Install drive bay and secure it properly


37/62/204/8 Multiple Choice Marks = 1
Q. NO. 11 Which of the following settings can be changed in the computers CMOS? (Select Two)?
1 . Computer Data & Time
2 . CD-ROM drive Letter
3 . Type of Floppy Drive
4 . Ram Memory Size.
5 . None of above


37/62/204/13 Multiple Choice Marks = 1
Q. NO. 12 Which priority settings are given to the SCSI ID number? (Choose two)
1 . 0 lowest
2 . 0 highest
3 . 1 lowest
4 . 15 lowest
5 . 15 highest


37/62/204/2 Multiple Choice Marks = 1
Q. NO. 13 Your newly appointed Smart Computers trainee wants to know what the standard I/O Port Addresses for the 3 standard LPT Ports on a PC system are. What would your reply be? (Choose three)
1 . Ox278.
2 . Ox378
3 . Ox3BC
4 . Ox3F8
5 . Ox3FF


37/62/204/5 Multiple Choice Marks = 1
Q. NO. 14 What is the benefit of an Energy Star compliant computer? (Choose two)
1 . Will last longer before breaking down.
2 . Is manufactured with less toxic chemicals.
3 . Runs cooler.
4 . Uses less electricity
5 . None of above


37/62/204/11 Multiple Choice Marks = 1
Q. NO. 15 Which events increase the chances of a motherboard failure? (Choose two)
1 . Power being lost while updating the BIOS.
2 . Power being lost while updating the printer.
3 . Connecting a USB device with the power on.
4 . Connecting a PS/2 mouse with the power on.
5 . Connecting a serial mouse with the power on.
PART OVER
37/62/205/18 Single Choice Marks = 1
Q. NO. 1 The ___________ bus standard introduces by IBM is not used presently.
1 . PCI
2 . MCA
3 . VESA
4 . ISA
5 . None of above


37/62/205/10 Single Choice Marks = 1
Q. NO. 2 Overclocking the microprocessor ____________.
1 . increases processor speed
2 . changes the BIOS setting
3 . enables multitasking
4 . enables multiprocessing
5 . None of above


37/62/205/14 Single Choice Marks = 1
Q. NO. 3 The ___________ memory is an electrically programmable device.
1 . FLASH
2 . VIDEO
3 . PROM
4 . EPROM
5 . None of above


37/62/205/13 Single Choice Marks = 1
Q. NO. 4 Virtual memory is a___________ memory area.
1 . Real
2 . Imaginary
3 . Virtual
4 . Storage
5 . None of above


37/62/205/6 Single Choice Marks = 1
Q. NO. 5 CISC stands for____________________________.
1 . common instruction set computing
2 . common interpreter set computing
3 . complex instruction set computing
4 . complex interpreter set computing
5 . None of above


37/62/205/11 Single Choice Marks = 1
Q. NO. 6 The _________________ socket has a leaver to install the microprocessor on the motherboard.
1 . Leaver Insertion force
2 . No Insertion Force
3 . Low Insertion Force
4 . Zero Insertion Force
5 . None of above


37/62/205/16 Single Choice Marks = 1
Q. NO. 7 The _____________ provides the back-up power to the CMOS.
1 . Battery
2 . CMOS supply
3 . Supply
4 . CMOS Setup
5 . None of above


37/62/205/15 Single Choice Marks = 1
Q. NO. 8 You can connect LAN card to the_____________ slot.
1 . AGP
2 . PCX
3 . PCI
4 . AGX
5 . None of above


37/62/205/4 Single Choice Marks = 1
Q. NO. 9 ____________ convert digital data to analog and vice versa
1 . Modem
2 . Facsimile(FAX)
3 . Video Cards
4 . LAN Card
5 . None of above


37/62/205/12 Single Choice Marks = 1
Q. NO. 10 Memory bank is a ___________ unit of memory in a computer.
1 . Physical
2 . Virtual
3 . Logical
4 . Pre-installed
5 . None of above


37/62/205/17 Single Choice Marks = 1
Q. NO. 11 The _________ chip controls communication between the cpu and the memory.
1 . South bridge
2 . Flash ROM
3 . Controller
4 . Northbridge
5 . None of above


37/62/205/8 Single Choice Marks = 1
Q. NO. 12 Intel ____________ is RISC microprocessor.
1 . Itanium
2 . Xeon
3 . Pentium Me
4 . Celeron
5 . None of above


37/62/205/23 Single Choice Marks = 1
Q. NO. 13 The ___________ key was the addition to the numeric keypad in the 101- key enhanced model.
1 . Division
2 . Num Lock
3 . +
4 . Delete
5 . None of above


37/62/205/19 Single Choice Marks = 1
Q. NO. 14 The speed of the CD-RW drive is specified using ____________ speeds.
1 . one
2 . two
3 . three
4 . four
5 . None of above


37/62/205/5 Single Choice Marks = 1
Q. NO. 15 The__________ produces the visual effects on the monitor.
1 . Monitor card
2 . Display card
3 . Adapter
4 . Display cable.
5 . None of above
PART OVER
37/62/206/7 Single Choice Marks = 1
Q. NO. 1 The head actuator is connected to a motor called the______________.
1 . spindle
2 . steeple
3 . stepper
4 . track locator
5 . None of above


37/62/206/11 Single Choice Marks = 1
Q. NO. 2 The concentric rings on the hard disk platter are known as ____________.
1 . Tracks
2 . Sectors
3 . Circles
4 . Rounds
5 . None of above


37/62/206/3 Single Choice Marks = 1
Q. NO. 3 The Minimum operating temperature of the hard disk drive is___________.
1 . 5 degree Celsius
2 . 10 degree Celsius
3 . 15 degree Celsius
4 . 20 degree Celsius
5 . 25 degree Celsius


37/62/206/18 Single Choice Marks = 1
Q. NO. 4 The speed of the CD drive is specified using a number followed by the alphabet________.
1 . W
2 . X
3 . Y
4 . Z
5 . None of above


37/62/206/6 Single Choice Marks = 1
Q. NO. 5 The 3.5 inch floppy disk drive rotates the floppy disk at a speed of __________ rpm.
1 . 100
2 . 200
3 . 300
4 . 400
5 . 500


37/62/206/8 Single Choice Marks = 1
Q. NO. 6 The bezel is the _____________.
1 . faceplate
2 . stepper motor
3 . power cable
4 . connector
5 . None of above


37/62/206/22 Single Choice Marks = 1
Q. NO. 7 ___________ standard supports data transmission at a speed of up to 56Kbps.
1 . V32
2 . V34
3 . V42
4 . X2
5 . None of above


37/62/206/10 Single Choice Marks = 1
Q. NO. 8 Which software is used to align the misaligned read write head of the floppy disk?
1 . Nero
2 . Super Format
3 . AlignIT
4 . Drive Probe
5 . None of above


37/62/206/1 Single Choice Marks = 1
Q. NO. 9 The power supply unit converts AC to ________.
1 . BC
2 . CC
3 . DC
4 . EC
5 . None of above


37/62/206/12 Single Choice Marks = 1
Q. NO. 10 You can connect ___________ hard disks to a single controller using ATA.
1 . 1
2 . 2
3 . 3
4 . 4
5 . None of above


37/62/206/15 Single Choice Marks = 1
Q. NO. 11 How many hard disks can you connect using the Serial ATA?
1 . 1
2 . 2
3 . 3
4 . 4
5 . None of above


37/62/206/16 Single Choice Marks = 1
Q. NO. 12 The _____________ layer of the CD reflects the laser beam.
1 . Plastic
2 . Acrylic
3 . Aluminum
4 . Label
5 . None of above


37/62/206/20 Single Choice Marks = 1
Q. NO. 13 The process of converting the binary information into analog signal is called ______________.
1 . modulation
2 . transformation
3 . conversion
4 . demodulation
5 . None of above


37/62/206/24 Single Choice Marks = 1
Q. NO. 14 You can use ___________ scanner for scanning larger individual sheets of paper.
1 . Slide
2 . Sheet
3 . Sheet fed
4 . Drum
5 . None of above


37/62/206/19 Single Choice Marks = 1
Q. NO. 15 The ______________ Keyboard was introduce to help users suffering from stress-related disorder of the wrist.
1 . Cordless
2 . Optical
3 . Ergonomic
4 . Programming
5 . None of above
PART OVER
37/62/207/24 True Or False Marks = 1
Q. NO. 1 Scanner is a output Device.
1 . TRUE
2 . FALSE


37/62/207/2 True Or False Marks = 1
Q. NO. 2 Floppy disk use flash memory for storage.
1 . TRUE
2 . FALSE


37/62/207/5 True Or False Marks = 1
Q. NO. 3 Socket 939 is developed by AMD.
1 . TRUE
2 . FALSE


37/62/207/12 True Or False Marks = 1
Q. NO. 4 "format a: /q" enables you to perform a quick format.
1 . TRUE
2 . FALSE


37/62/207/11 True Or False Marks = 1
Q. NO. 5 The Molex connector connects to the Floppy Disk Drive.
1 . TRUE
2 . FALSE


37/62/207/15 True Or False Marks = 1
Q. NO. 6 We can create Bootable CD disc using Ahead Nero Software.
1 . TRUE
2 . FALSE


37/62/207/21 True Or False Marks = 1
Q. NO. 7 TFT means Thick film Transistor.
1 . TRUE
2 . FALSE


37/62/207/16 True Or False Marks = 1
Q. NO. 8 Firewire is IEEE 2482.
1 . TRUE
2 . FALSE


37/62/207/17 True Or False Marks = 1
Q. NO. 9 The PS/2 mouse uses IRQ 12 line.
1 . TRUE
2 . FALSE


37/62/207/19 True Or False Marks = 1
Q. NO. 10 DSL Means Digital Subscriber Line.
1 . TRUE
2 . FALSE


37/62/207/20 True Or False Marks = 1
Q. NO. 11 The internal SCSI cable is Coaxial.
1 . TRUE
2 . FALSE


37/62/207/3 True Or False Marks = 1
Q. NO. 12 ALU stands for Arithmetic and logic Unit.
1 . TRUE
2 . FALSE


37/62/207/6 True Or False Marks = 1
Q. NO. 13 R.I.S.C Means Reduced Instruction Set Computing.
1 . TRUE
2 . FALSE


37/62/207/9 True Or False Marks = 1
Q. NO. 14 The LPX form factor is used for low profile system cases.
1 . TRUE
2 . FALSE


37/62/207/18 True Or False Marks = 1
Q. NO. 15 PS/2 connector is 5 pins.
1 . TRUE
2 . FALSE
PART OVER
44/75/252/88 Single Choice Marks = 1
Q. NO. 1 “Well lit” means ______.
1 . Proper lighting
2 . Dim lighting
3 . No lights
4 . All
5 . None


44/75/252/21 Single Choice Marks = 1
Q. NO. 2 -------------did you do at work today? (Select Correct Option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/93 Single Choice Marks = 1
Q. NO. 3 I am looking _____ the System administrator.
1 . To
2 . From
3 . For
4 . All are true
5 . None of the above


44/75/252/33 Single Choice Marks = 1
Q. NO. 4 You -----------work late if you want. (Select correct option)
1 . can
2 . can not
3 . must
4 . must not
5 . None of the Above


44/75/252/71 Single Choice Marks = 1
Q. NO. 5 Peer means __________.
1 . People at the same level
2 . Team mates
3 . Colleagues
4 . All
5 . None


44/75/252/90 Single Choice Marks = 1
Q. NO. 6 There is a laptop ___ the managers room
1 . At
2 . On
3 . Across
4 . In
5 . None of the above


44/75/252/82 Single Choice Marks = 1
Q. NO. 7 Right age for voting is.
1 . 17
2 . 18
3 . 19
4 . 20
5 . 21


44/75/252/84 Single Choice Marks = 1
Q. NO. 8 Sorry is the work to be when a person is.
1 . Happy
2 . Doing work
3 . Hurt
4 . All
5 . None


44/75/252/76 Single Choice Marks = 1
Q. NO. 9 Hi, ________are my books.
1 . This
2 . That
3 . These
4 . They
5 . None


44/75/252/113 Single Choice Marks = 1
Q. NO. 10 It ______ rain today.
1 . Can
2 . Might
3 . May
4 . All
5 . None


44/75/252/61 Single Choice Marks = 1
Q. NO. 11 __________ are you from
1 . Which
2 . Where
3 . From Where
4 . Both A and B
5 . None of the above


44/75/252/83 Single Choice Marks = 1
Q. NO. 12 What is the meaning of the apologizing
1 . Thank You
2 . Excuse Me
3 . Sorry
4 . Pardon
5 . Hi


44/75/252/34 Single Choice Marks = 1
Q. NO. 13 I can help you but I -------- complete my work.(Select correct option)
1 . can
2 . can not
3 . must
4 . must not
5 . None of the above


44/75/252/19 Single Choice Marks = 1
Q. NO. 14 ------------did you keep the routers? (Select Correct Option)
1 . What
2 . Where
3 . how much
4 . All the above
5 . None


44/75/252/77 Single Choice Marks = 1
Q. NO. 15 _______ is this
1 . Which
2 . Whim
3 . Who
4 . All
5 . None


44/75/252/109 Single Choice Marks = 1
Q. NO. 16 He goes to office _______
1 . By taxi
2 . In taxi
3 . on taxi
4 . With taxi
5 . None


44/75/252/18 Single Choice Marks = 1
Q. NO. 17 ------------ was going in your mind in the morning?(Select Correct Option)
1 . What
2 . Where
3 . how much
4 . All the above
5 . None


44/75/252/23 Single Choice Marks = 1
Q. NO. 18 -------------did you go last Friday? (Select correct option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/44 Single Choice Marks = 1
Q. NO. 19 IT has ------------ future than retail industry.(Select Correct Option)
1 . good
2 . better
3 . best
4 . All the above
5 . None


44/75/252/68 Single Choice Marks = 1
Q. NO. 20 I ______ pens in my bag.
1 . Has
2 . Havind
3 . Have
4 . Am have
5 . None


44/75/252/102 Single Choice Marks = 1
Q. NO. 21 We have a ______ items on the list.
1 . Very
2 . Too
3 . Lots of
4 . Quite a lot
5 . None


44/75/252/20 Single Choice Marks = 1
Q. NO. 22 -------------time do you have?(Select Corrrect option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/70 Single Choice Marks = 1
Q. NO. 23 Hierarchy means _______.
1 . Organizational structure
2 . Designation
3 . Order of post
4 . All
5 . None


44/75/252/1 Single Choice Marks = 1
Q. NO. 24 There ------ a lot of DVDs on the table. (Use Was / Were in the sentences)
1 . Was
2 . Were
3 . Will
4 . All the above
5 . None


44/75/252/103 Single Choice Marks = 1
Q. NO. 25 The cost of this PC is not _____ much.
1 . Very
2 . Big
3 . Cost
4 . Too
5 . All


44/75/252/66 Single Choice Marks = 1
Q. NO. 26 Children born together are called.
1 . Twins
2 . Together born child
3 . Joint children
4 . All
5 . None


44/75/252/108 Single Choice Marks = 1
Q. NO. 27 _______butter in the fridge.
1 . There is any
2 . There is no
3 . There is no any
4 . are not any
5 . All are true


44/75/252/81 Single Choice Marks = 1
Q. NO. 28 Is the pen drive storage device
1 . True
2 . False
3 . Both a and b
4 . All
5 . None


44/75/252/27 Single Choice Marks = 1
Q. NO. 29 You -------carry your I – card with you. (Select correct Option)
1 . can
2 . can not
3 . must
4 . must not
5 . None of The Above


44/75/252/91 Single Choice Marks = 1
Q. NO. 30 I went to the server room ____ look for him.
1 . For
2 . To
3 . From
4 . All are true
5 . None Of the above


44/75/252/48 Single Choice Marks = 1
Q. NO. 31 Are you --------------- watch movie? (Select Correct option)
1 . go to
2 . going to
3 . going for
4 . All the above
5 . None


44/75/252/47 Single Choice Marks = 1
Q. NO. 32 I am -----------shopping.(Select correct Option)
1 . go to
2 . going to
3 . going for
4 . All the above
5 . None


44/75/252/45 Single Choice Marks = 1
Q. NO. 33 Which computer is ------------? (Select Correct Option)
1 . Cheap
2 . Cheaper
3 . Cheapest
4 . All the above
5 . None


44/75/252/89 Single Choice Marks = 1
Q. NO. 34 May I have a glass of water _____ ?
1 . OK
2 . Could
3 . Sorry
4 . Please
5 . None of the above


44/75/252/115 Single Choice Marks = 1
Q. NO. 35 She is awesome means
1 . Ugly
2 . Good
3 . Bad
4 . Beautiful
5 . All are true


44/75/252/104 Single Choice Marks = 1
Q. NO. 36 Is there any other computer store ____ it?
1 . Across
2 . By
3 . Near
4 . Along
5 . Both b & c


44/75/252/22 Single Choice Marks = 1
Q. NO. 37 -------------does this DVD cost? (Select correct Option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/106 Single Choice Marks = 1
Q. NO. 38 The Showroom is _____ the big Computer Store.
1 . Next
2 . On
3 . Opposite
4 . In
5 . All are true


44/75/252/16 Single Choice Marks = 1
Q. NO. 39 ------------- did you pay for this expensive pen drive?(Select Correct option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/17 Single Choice Marks = 1
Q. NO. 40 ------------ was the trainer's name? (Select The Correct Option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/79 Single Choice Marks = 1
Q. NO. 41 Who is used for ________.
1 . Person
2 . object
3 . Feelings
4 . Opinion
5 . None


44/75/252/98 Single Choice Marks = 1
Q. NO. 42 I _____ know if the train is late.
1 . Does not
2 . Was not
3 . Were not
4 . Do not
5 . None


44/75/252/25 Single Choice Marks = 1
Q. NO. 43 -------------did you do after meeting? (Select correct option)
1 . What
2 . Where
3 . How much
4 . All the above
5 . None


44/75/252/50 Single Choice Marks = 1
Q. NO. 44 I am --------------swimming at the weekend. (Select correct Option)
1 . go to
2 . going to
3 . going for
4 . All the above
5 . None


44/75/252/31 Single Choice Marks = 1
Q. NO. 45 You -------smoke in the office premises. (Select correct Option)
1 . can
2 . can not
3 . must
4 . must not
5 . None of The Above


44/75/252/97 Single Choice Marks = 1
Q. NO. 46 Do you _____ coffee
1 . Drinks
2 . Drank
3 . Drunk
4 . Drink
5 . None of the above


44/75/252/46 Single Choice Marks = 1
Q. NO. 47 I ----------- market everyday. (Slect Correct Option)
1 . go to
2 . going to
3 . going for
4 . all the above
5 . none


44/75/252/75 Single Choice Marks = 1
Q. NO. 48 _________ you a trainer?
1 . Was
2 . Is
3 . Are
4 . All
5 . None


44/75/252/26 Single Choice Marks = 1
Q. NO. 49 You -------afford to come late to work. (Select correct option)
1 . can
2 . can not
3 . must
4 . must not
5 . None of the Above


44/75/252/35 Single Choice Marks = 1
Q. NO. 50 You ----------back answer your parents. (Select correct option)
1 . can
2 . can not
3 . must
4 . must not
5 . None of the Above
Jetking Online Dumps for Module-3


For More Question You Can Contact Us

Part- A

Case 1 : "What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?";
optinon no. 1= "network service";
Optinon No. 2= "directory service";
Optinon No. 3= "Directory Infrastructure";
Optinon No. 4= "NT directory";
Correct Answer= "B";
Answer With Explanation= "A directory service allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications. Without the efficiency of a directory service, businesses would have difficulty keeping up with demands for fast-paced data exchange.";
Case 2 :  = "A __________ is defined as one or more IP subnets that are connected by fast links.";
optinon no. 1= "domain";
Optinon No. 2= "network";
Optinon No. 3= "site";
Optinon No. 4= "forest";
Correct Answer= "C";
Answer With Explanation= "A site is defined as one or more IP subnets that are connected by fast links. In most circumstances, all computers that are connected via a single LAN will constitute a single site. Within Active Directory, sites are used to optimize the replication of Active Directory information across small or large geographic areas.";


Case 3 :
= "What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?";
optinon no. 1= "Configuration NC";
Optinon No. 2= "Schema NC";
Optinon No. 3= "Domain NC";
Optinon No. 4= "DC NC";
Correct Answer= "B";
Answer With Explanation= "The schema partition, or Schema NC, contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory.";


Case 4 :
= "What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?";
optinon no. 1= "SYSVOL";
Optinon No. 2= "AD";
Optinon No. 3= "C$";
Optinon No. 4= "VOLMGR";
Correct Answer= "A";
Answer With Explanation= "The SYSVOL shared folder exists on all domain controllers and is used to store Group Policy Objects, login scripts, and other files that are replicated domain-wide.";


Case 5 :
= "What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?";
optinon no. 1= "Minimal Installation Option";
Optinon No. 2= "Server Core";
Optinon No. 3= "Server Standard";
Optinon No. 4= "Minimal Server Environment (MSE)";
Correct Answer= "B";
Answer With Explanation= "One of the key new features of Windows Server 2008 is Server Core, a special installation option that creates a minimal environment for running only specific services and roles. Server Core runs almost entirely without a graphical user interface (GUI), which means that it needs to be administered exclusively from the command line.";


Case 6 :
= "What is the minimum amount of storage space required for the Active Directory installation files?";
optinon no. 1= "100 MB";
Optinon No. 2= "150 MB";
Optinon No. 3= "200 MB";
Optinon No. 4= "250 MB";
Correct Answer= "C";
Answer With Explanation= "200 MB minimum free space is required for Active Directory database files.";


Case 7 :
= "When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?";
optinon no. 1= "Schema Admins";
Optinon No. 2= "Enterprise Admins";
Optinon No. 3= "Global Admins";
Optinon No. 4= "Forest Admins";
Correct Answer= "A";
Answer With Explanation= "Microsoft recommends adding administrators to the Schema Admins group only for the duration of the administrative task at hand.";


Case 8 :
= "When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.";
optinon no. 1= "Default-Site";
Optinon No. 2= "Site-Default";
Optinon No. 3= "Default-Site-Name";
Optinon No. 4= "Default-First-Site-Name";
Correct Answer= "D";
Answer With Explanation= "When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site called Default-First-Site-Name, which you can see in the Active Directory Sites and Services tool.";


Case 9 :
= "What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?";
optinon no. 1= "dcdiag";
Optinon No. 2= "netdiag";
Optinon No. 3= "dcpromo";
Optinon No. 4= "netstat";
Correct Answer= "A";
Answer With Explanation= "Dcdiag is a command-line tool used for monitoring Active Directory. When run from a command prompt, this tool can perform connectivity and replication tests, report errors that occur, report DNS registration problems, analyze the permissions required for replication, and analyze the state of domain controllers within the forest.";


Case 10 :
= "When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.";
optinon no. 1= "primary";
Optinon No. 2= "masthead";
Optinon No. 3= "bridgehead";
Optinon No. 4= "global catalog";
Correct Answer= "C";
Answer With Explanation= "When replicating information between sites, Active Directory will designate a bridgehead server in each site to act as a gatekeeper in managing site-to-site replication. This allows intersite replication to update only one domain controller within a site.";


Case 11 :
= "What defines a chain of site links by which domain controllers from different sites can communicate?";
optinon no. 1= "site link bridge";
Optinon No. 2= "site chain";
Optinon No. 3= "site chain bridge";
Optinon No. 4= "site link chain";
Correct Answer= "A";
Answer With Explanation= "A site link bridge defines a chain of site links by which domain controllers from different sites can communicate. In Cases in which there is a centralized site that connects two branch sites via site links, the site link bridge creates a direct link between the branch sites using the total cost of both site links to the central site.";


Case 12 :
= "How many FSMO roles does Active Directory support?";
optinon no. 1= "2";
Optinon No. 2= "5";
Optinon No. 3= "10";
Optinon No. 4= "12";
Correct Answer= "B";
Answer With Explanation= "Active Directory supports five FSMO roles. Their functionality is divided between domain-wide and forest-wide FSMOs.";


Case 13 :
= "How many RID Masters can a domain have?";
optinon no. 1= "1";
Optinon No. 2= "2";
Optinon No. 3= "3";
Optinon No. 4= "5";
Correct Answer= "A";
Answer With Explanation= "Each domain can have only one RID Master.";


Case 14 :
= "What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?";
optinon no. 1= "role transfer";
Optinon No. 2= "role migration";
Optinon No. 3= "role seizure";
Optinon No. 4= "role separation";
Correct Answer= "C";
Answer With Explanation= "The role seizure procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role. Seizing a role can be defined as a forced, permanent transfer.";


Case 15 :
= "What special identity group contains all authenticated users and domain guests?";
optinon no. 1= "Power Users";
Optinon No. 2= "Everyone";
Optinon No. 3= "Batch";
Optinon No. 4= "Authenticated Users";
Correct Answer= "B";
Answer With Explanation= "Windows Server 2008 uses special identity groups to represent a class of users or the system itself. The Everyone group is a special identity group that contains all authenticated users and domain guests.";


Case 16 :
= "__________ name refers to each user’s login name.";
optinon no. 1= "Common";
Optinon No. 2= "Distinguished";
Optinon No. 3= "SAM account";
Optinon No. 4= "AD Name";
Correct Answer= "C";
Answer With Explanation= "The SAM account name refers to each user’s login name—the portion to the left of the ‘@’ within a User Principal Name.";


Case 17 :
= "You cannot manually modify the group membership of or view the membership lists of __________ groups.";
optinon no. 1= "distribution";
Optinon No. 2= "domain local";
Optinon No. 3= "special identity";
Optinon No. 4= "universal";
Correct Answer= "C";
Answer With Explanation= "You cannot manually modify the group membership of special identity groups, nor can you view their membership lists.";


Case 18 :
= "What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?";
optinon no. 1= "DCPROMO";
Optinon No. 2= "LDIFDE";
Optinon No. 3= "CSVDE";
Optinon No. 4= "NSLOOKUP";
Correct Answer= "B";
Answer With Explanation= "Like CSVDE, the LDAP Data Interchange Format Directory Exchange (LDIFDE) utility can be used to import or export Active Directory information. It can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema, if necessary. It also can be used to import data from other directory services, such as Novell NetWare.";


Case 19 :
= "Which of the following is a benefit of implementing a public key infrastructure (PKI)?";
optinon no. 1= "Users no longer need to remember passwords.";
Optinon No. 2= "All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.";
Optinon No. 3= "Smart cards can be used from remote locations, such as a home office, to provide authentication services.";
Optinon No. 4= "All of the above";
Correct Answer= "D";
Answer With Explanation= "The benefits of implementing a PKI include: users no longer need to remember passwords; all information is stored on the smart card, making it difficult for anyone except the intended user to use or access it; security operations, such as cryptographic functions, are performed on the smart card itself rather than on the network server or local computer; smart cards can be used from remote locations, such as a home office, to provide authentication services; and the risk of remote attacks using a username and password is significantly reduced by smart cards.";


Case 20 :
= "What method of authentication requires a smart card and a PIN to provide more secure access to company resources?";
optinon no. 1= "two-factor authentication";
Optinon No. 2= "dual authentication";
Optinon No. 3= "complex authentication";
Optinon No. 4= "strong authentication";
Correct Answer= "A";
Answer With Explanation= "A smart card is a credit cardsized device or a token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise. This two-factor authentication method requires a smart card and a PIN to provide more secure access to company resources. It has been implemented by many high-security organizations.";


Case 21 :
= "What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?";
optinon no. 1= "PKI server";
Optinon No. 2= "smart card enrollment station";
Optinon No. 3= "smart card verification station";
Optinon No. 4= "Certification Authority (CA)";
Correct Answer= "B";
Answer With Explanation= "Prior to deploying smart cards, you must set up at least one computer as a smart card enrollment station, which is a dedicated workstation that allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation.";


Case 22 :
= "Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.";
optinon no. 1= "97";
Optinon No. 2= "68";
Optinon No. 3= "127";
Optinon No. 4= "142";
Correct Answer= "C";
Answer With Explanation= "Windows passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length.";


Case 23 :
= "What is a method of controlling settings across your network?";
optinon no. 1= "Group Policy";
Optinon No. 2= "Active Directory";
Optinon No. 3= "FSMO roles";
Optinon No. 4= "MMC";
Correct Answer= "A";
Answer With Explanation= "Group Policy is a method of controlling settings across your network. Group Policy consists of user and computer settings on the Windows Server 2008, Windows Server 2003 family, Microsoft Windows 2000 family, Window Vista, and Microsoft Windows XP Professional platforms that can be implemented during computer startup and shutdown and user logon and logoff.";


Case 24 :
= "What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?";
optinon no. 1= "Group Policies";
Optinon No. 2= "Group Policy Settings";
Optinon No. 3= "Group Policy Objects";
Optinon No. 4= "Group Policy Links";
Correct Answer= "C";
Answer With Explanation= "Group Policy Objects (GPOs) contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU. The GPO must be associated with the container to which it is applied.";


Case 25 :
= "What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?";
optinon no. 1= "Reverse Processing";
Optinon No. 2= "Switchback Processing";
Optinon No. 3= "Loopback Processing";
Optinon No. 4= "Repeat Processing";
Correct Answer= "C";
Answer With Explanation= "Loopback processing is a Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace.";


Case 26 :
= "Local GPO settings are stored in what folder on a computer?";
optinon no. 1= "%systemroot%/System32/GroupPolicy";
Optinon No. 2= "%systemroot%/System32/Drivers/GroupPolicy";
Optinon No. 3= "%systemroot%/System32/Drivers/Etc/GroupPolicy";
Optinon No. 4= "%systemroot%/System/GroupPolicy";
Correct Answer= "A";
Answer With Explanation= "Each computer running Windows Server 2008, Windows Server 2003, Windows XP Professional, or Windows 2000 has only one local GPO, and the settings in that local GPO will apply to all users who log on to the computer. The local GPO settings are stored on the local computer in the %systemroot%/System32/GroupPolicy folder.";


Case 27 :
= "What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?";
optinon no. 1= "Fine-Grained Password Policies";
Optinon No. 2= "Fine-Tuned Password Policies";
Optinon No. 3= "Restricted Password Policies";
Optinon No. 4= "Custom Password Policies";
Correct Answer= "A";
Answer With Explanation= "Fine-Grained Password Policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain.";


Case 28 :
= "Where can you configure the Group Policy refresh interval?";
optinon no. 1= "Computer Configuration\\System\\Group Policy";
Optinon No. 2= "User Configuration\\Administrative Templates\\System\\Group Policy";
Optinon No. 3= "Computer Configuration\\Administrative Templates\\System\\Group Policy";
Optinon No. 4= "Computer Configuration\\Administrative Templates\\Group Policy";
Correct Answer= "C";
Answer With Explanation= "The setting for the refresh interval for computers is located in the Computer Configuration\\Administrative Templates\\System\\Group Policy node in the Group Policy Object Editor window for a GPO.";


Case 29 :
= "Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?";
optinon no. 1= ".exe";
Optinon No. 2= ".msi";
Optinon No. 3= ".mse";
Optinon No. 4= ".inf";
Correct Answer= "B";
Answer With Explanation= "Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into an .msi file. An .msi file is a relational database file that is copied to the target computer system with the program files it deploys.";


Case 30 :
= "Modifications to .msi files require transform files, which have the __________ extension.";
optinon no. 1= ".msit";
Optinon No. 2= ".mse";
Optinon No. 3= ".msx";
Optinon No. 4= ".mst";
Correct Answer= "D";
Answer With Explanation= "At times, you may need to modify Windows Installer files to better suit the needs of your corporate network. Modifications to .msi files require transform files, which have an .mst extension.";


Case 31 :
= "When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?";
optinon no. 1= "Unrestricted";
Optinon No. 2= "Restricted";
Optinon No. 3= "Basic User";
Optinon No. 4= "Disallowed";
Correct Answer= "C";
Answer With Explanation= "The Basic User software restriction policy prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users.";


Case 32 :
= "What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?";
optinon no. 1= "Linked Group Policy Objects";
Optinon No. 2= "Group Policy Inheritance";
Optinon No. 3= "Delegation";
Optinon No. 4= "Management";
Correct Answer= "C";
Answer With Explanation= "The Delegation tab displays groups and users with permission to link, perform modeling analyses, or read group policy results information. Modeling is the same as Planning mode using RsoP.";


Case 33 :
= "What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?";
optinon no. 1= "Block Policy Propagation";
Optinon No. 2= "Block Policy Inheritance";
Optinon No. 3= "Remove Policy Inheritance";
Optinon No. 4= "Remove Policy Propagation";
Correct Answer= "B";
Answer With Explanation= "Using the Block Policy Inheritance policy setting, you can prevent policy settings from applying to all child objects at the current level and all subordinate levels. Although the Block Policy Inheritance setting is useful in some circumstances, it may be necessary to have a policy apply only when certain conditions exist or only to a certain group of people.";


Case 34 :
= "How many WMI filters can be configured per GPO?";
optinon no. 1= "one";
Optinon No. 2= "two";
Optinon No. 3= "three";
Optinon No. 4= "five";
Correct Answer= "A";
Answer With Explanation= "Only one WMI filter can be configured per GPO. After it is created, a WMI filter can be linked to multiple GPOs.";


Case 35 :
= "To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?";
optinon no. 1= "Active Directory Restore";
Optinon No. 2= "Active Directory Maintenance";
Optinon No. 3= "Directory Services Maintenance";
Optinon No. 4= "Directory Services Restore";
Correct Answer= "D";
Answer With Explanation= "To perform a System State restore in Windows Server 2008, you will boot the DC into Directory Services Restore Mode and then use the wbadmin command-line utility.";


Case 36 :
= "In Windows Server 2008, you must back up __________ rather than only backing up the System State data.";
optinon no. 1= "critical volumes";
Optinon No. 2= "system volumes";
Optinon No. 3= "MBR records";
Optinon No. 4= "MX records";
Correct Answer= "A";
Answer With Explanation= "Windows Server 2008 does not back up or recover System State data in the same way as servers that run Windows Server 2003 or Windows Server 2000. In Windows Server 2008, you must back up critical volumes rather than only backing up the System State data.";


Case 37 :
= "To back up Active Directory, you must install what feature from the Server Manager console?";
optinon no. 1= "Active Directory Backup Client";
Optinon No. 2= "Windows Backup Utility";
Optinon No. 3= "Windows Server Backup";
Optinon No. 4= "BackupExec";
Correct Answer= "C";
Answer With Explanation= "the Server Manager console.";


Case 38 :
= "What is the process by which one DNS server sends a name resolution request to another DNS server?";
optinon no. 1= "resolution";
Optinon No. 2= "translation";
Optinon No. 3= "referral";
Optinon No. 4= "propagation";
Correct Answer= "C";
Answer With Explanation= "The process by which one DNS server sends a name resolution request to another DNS server is called a referral. Referrals are essential to the DNS name resolution process.";


Case 39 :
= "What DNS server contains no zones and hosts no domains?";
optinon no. 1= "secondary domain controller";
Optinon No. 2= "global catalog server";
Optinon No. 3= "secondary DNS server";
Optinon No. 4= "caching-only server";
Correct Answer= "D";
Answer With Explanation= "A DNS server that contains no zones and hosts no domains is called a caching-only server. If you have Internet clients on your network but do not have a registered domain name and are not using Active Directory, you can deploy caching-only servers that provide Internet name resolution services for your clients.";


Case 40 :
= "What Windows Server 2008 service can you use to protect sensitive data on a Windows network?";
optinon no. 1= "AD FS";
Optinon No. 2= "AD FTP";
Optinon No. 3= "AD FSMO";
Optinon No. 4= "AD RMS";
Correct Answer= "D";
Answer With Explanation= "Active Directory Rights Management Service (AD RMS) is a Windows Server 2008 service that you can use to protect sensitive data on a Windows network. In particular, it enables owners of data stored within RMS-capable applications (such as word processing or spreadsheet applications) to control who can open, modify, or print a document and even who can print or forward confidential email messages.";


Case 41 :
= "What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?";
optinon no. 1= "Identity Lifecycle Management";
Optinon No. 2= "General Lifecycle Management";
Optinon No. 3= "Microsoft Lifecycle Management";
Optinon No. 4= "Lifecycle of Software Management";
Correct Answer= "A";
Answer With Explanation= "Identity Lifecycle Management (ILM) enables network administrators and owners to configure access rights for users during the user’s entire life cycle within an organization. This includes providing a user account, modifying access rights as a user’s role changes within an organization, and finally deprovisioning a user account when the user’s relationship with an organization is ended.";


Case 42 :
= "What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?";
optinon no. 1= "RSA SecureID";
Optinon No. 2= "digital certificates";
Optinon No. 3= "smart cards";
Optinon No. 4= "biometric device";
Correct Answer= "C";
Answer With Explanation= "Smart cards are small physical devices, usually the size of a credit card or keychain fob, that have a digital certificate installed on them. By using a smart card reader (a physical device attached to a workstation), users can use a smart card to authenticate to an Active Directory domain, access a Website, or authenticate to other secured resources, typically by entering a numeric personal identification number (PIN) instead of a password.";


Case 43 :
= "What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?";
optinon no. 1= "Web Enrollment";
Optinon No. 2= "Web Responder";
Optinon No. 3= "enterprise CA";
Optinon No. 4= "Online Responder";
Correct Answer= "D";
Answer With Explanation= "The Online Responder service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status.";

Part- B 
      Question No. 1 :
  "A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.";
Option No.- 1= "domain controller";
Option No.- 2= "domain manager";
Option No.- 3= "global catalog";
Option No.- 4= "DNS server";
Correct Option is= "A";
Explanation of Answer= "A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a domain controller (DC). A domain controller is a server that stores the Active Directory database and authenticates users with the network during logon.";


  
Question No. 2 :
  "What protocol has become an industry standard that enables data exchange between directory services and applications?";
Option No.- 1= "NTDS";
Option No.- 2= "LDAP";
Option No.- 3= "NDIS";
Option No.- 4= "AD";
Correct Option is= "B";
Explanation of Answer= "Active Directory’s scalability and integration capabilities result from its use of industry standards for naming formats and directory functions, specifically the Lightweight Directory Access Protocol (LDAP). Since the introduction of LDAP, this protocol has become an industry standard that enables data exchange between directory services and applications.";


     
Question No. 3 :
  "What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?";
Option No.- 1= "A records";
Option No.- 2= "MX records";
Option No.- 3= "SRV records";
Option No.- 4= "SOA records";
Correct Option is= "C";
Explanation of Answer= "SRV records are the locator records within DNS that allow clients to locate an Active Directory domain controller or global catalog.";


     
Question No. 4 :
  "What is the process of replicating DNS information from one DNS server to another?";
Option No.- 1= "replication";
Option No.- 2= "DNS push";
Option No.- 3= "zone transfer";
Option No.- 4= "DNS update";
Correct Option is= "C";
Explanation of Answer= "A zone transfer is the process of replicating DNS information from one DNS server to another.";


     
Question No. 5 :
  "What type of trust relationship allows you to create two-way transitive trusts between separate forests?";
Option No.- 1= "shortcut";
Option No.- 2= "cross-forest";
Option No.- 3= "external";
Option No.- 4= "real";
Correct Option is= "B";
Explanation of Answer= "Cross-forest trust relationships were introduced in Windows Server 2003; they allow you to create two-way transitive trusts between separate forests.";


     
Question No. 6 :
  "What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?";
Option No.- 1= "primary lookup";
Option No.- 2= "secondary lookup";
Option No.- 3= "forward lookup";
Option No.- 4= "reverse lookup";
Correct Option is= "C";
Explanation of Answer= "Forward lookup zones are necessary for computer hostname–to–IP address mappings, which are used for name resolution by a variety of services. For example, when a user requests access to a server based on its hostname, the request is passed to a DNS server to resolve the hostname to an IP address. Most queries are based on forward lookups.";


     
Question No. 7 :
  "What DLL must be registered to use the Schema Management snap-in?";
Option No.- 1= "schmmgnt32.dll";
Option No.- 2= "schemamanagement.dll";
Option No.- 3= "schmmgmt.dll";
Option No.- 4= "adschm.dll";
Correct Option is= "C";
Explanation of Answer= "The schmmgmt.dll DLL is not registered by default in Windows Server 2008 and needs to be added manually to run the Schema Management MMC snap-in.";


     
Question No. 8 :
  "Replication within Active Directory will occur when which of the following conditions is met?";
Option No.- 1= "An object is added or removed from Active Directory.";
Option No.- 2= "The value of an attribute has changed.";
Option No.- 3= "The name of an object has changed.";
Option No.- 4= "All of the above";
Correct Option is= "D";
Explanation of Answer= "Replication within Active Directory will occur when an object is added or removed from Active Directory, the value of an attribute has changed, or the name of an object has changed.";


     
Question No. 9 :
  "What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?";
Option No.- 1= "Dcdiag";
Option No.- 2= "Repdiag";
Option No.- 3= "Repadmin";
Option No.- 4= "Netstat";
Correct Option is= "C";
Explanation of Answer= "Repadmin is a command-line tool used to manually create a replication topology if site link bridging is disabled if the network is not fully routed.";


     
Question No. 10 :
  "Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated.";
Option No.- 1= "urgent";
Option No.- 2= "immediate";
Option No.- 3= "fast";
Option No.- 4= "pushed";
Correct Option is= "A";
Explanation of Answer= "Certain operations, such as a password change or an account lockout, will be transmitted using urgent replication, which means that the change will be placed at the “beginning of the line” and will be applied before any other changes that are waiting to be replicated.";


     
Question No. 11 :
  "Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?";
Option No.- 1= "Relative Identifier Master";
Option No.- 2= "Infrastructure Master";
Option No.- 3= "Domain Naming Master";
Option No.- 4= "Schema Master";
Correct Option is= "C";
Explanation of Answer= "The Domain Naming Master role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest. When any of these is created, the Domain Naming Master ensures that the name assigned is unique to the forest.";


     
Question No. 12 :
  "What types of memberships are stored in the global catalog?";
Option No.- 1= "domain local";
Option No.- 2= "universal";
Option No.- 3= "global";
Option No.- 4= "local workstation";
Correct Option is= "B";
Explanation of Answer= "Domain local and global group memberships are stored at the domain level; universal group memberships are stored in the global catalog.";


     
Question No. 13 :
  "What console must be used to move the Domain Naming Master FSMO role?";
Option No.- 1= "Active Directory Users and Computers";
Option No.- 2= "Active Directory Forests and Domains";
Option No.- 3= "Active Directory Schema";
Option No.- 4= "Active Directory Domains and Trusts";
Correct Option is= "D";
Explanation of Answer= "The Active Directory Domains and Trusts console must be used to move the Domain Naming Master FSMO role.";


     
Question No. 14 :
  "What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?";
Option No.- 1= "NETDIAG";
Option No.- 2= "NSLOOKUP";
Option No.- 3= "CSVDE";
Option No.- 4= "DCPROMO";
Correct Option is= "C";
Explanation of Answer= "The Comma-Separated Value Directory Exchange (CSVDE) command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file. These files can be created in any text editor. This command-line utility only imports or exports new objects; it cannot modify or delete existing objects.";


     
Question No. 15 :
  "What special identity group is used by the system to allow permission to protected system files for services to function properly?";
Option No.- 1= "Network Service";
Option No.- 2= "Restricted";
Option No.- 3= "Service";
Option No.- 4= "Self";
Correct Option is= "C";
Explanation of Answer= "The service special identity group is used by the system to allow permission to protected system files for services to function properly. It includes all security principals: users, groups, or computers that are currently logged on as a service.";


     
Question No. 16 :
  "When using CSVDE, what is the first line of the text file that uses proper attribute names?";
Option No.- 1= "header row";
Option No.- 2= "header record";
Option No.- 3= "name row";
Option No.- 4= "name record";
Correct Option is= "B";
Explanation of Answer= "The CSVDE command-line utility allows an administrator to import or export Active Directory objects. It uses a .csv file that is based on a header record, which describes each part of the data. A header record is simply the first line of the text file that uses proper attribute names.";


     
Question No. 17 :
  "Which of the following is not a characteristic of a strong password?";
Option No.- 1= "at least eight characters in length";
Option No.- 2= "at least one character from each of the previous character types";
Option No.- 3= "is not your birth date";
Option No.- 4= "differs significantly from other previously used passwords";
Correct Option is= "C";
Explanation of Answer= "A strong password has the following characteristics: at least eight characters in length; contains upperQuestion No. and lowerQuestion No. letters, numbers, and nonalphabetic characters; at least one character from each of the previous character types; and differs significantly from other previously used passwords.";


     
Question No. 18 :
  "What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?";
Option No.- 1= "CKI";
Option No.- 2= "PKI";
Option No.- 3= "DKI";
Option No.- 4= "PCI";
Correct Option is= "B";
Explanation of Answer= "Smart cards contain a chip that stores user information such as the user’s private key for certificate-related services; user credentials, such as the username; and a public key certificate. This requires the implementation of a public key infrastructure (PKI). PKI is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography.";


     
Question No. 19 :
  "What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?";
Option No.- 1= "enrollment agent";
Option No.- 2= "enrollment credential";
Option No.- 3= "enrollment verification";
Option No.- 4= "enrollment authority";
Correct Option is= "A";
Explanation of Answer= "Enrollment agent certificates are generated by the enterprise CA and are used to generate a smart card logon certificate for users in the organization. Because these enrollment agent certificates can generate smart cards with authentication credentials for anyone in the organization, you should make sure strong security policies are in place for issuing enrollment agent certificates.";


     
Question No. 20 :
  "What process applies Group Policy settings to various containers within Active Directory?";
Option No.- 1= "attaching";
Option No.- 2= "linking";
Option No.- 3= "connecting";
Option No.- 4= "nesting";
Correct Option is= "B";
Explanation of Answer= "You can configure one or more GPOs within a domain and then use a process called linking, which applies these settings to various containers within Active Directory. You can link multiple GPOs to a single container or link one GPO to multiple containers throughout the Active Directory structure.";


     
Question No. 21 :
  "The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.";
Option No.- 1= "Default Domain Controller";
Option No.- 2= "Default Domain";
Option No.- 3= "Default";
Option No.- 4= "Domain";
Correct Option is= "B";
Explanation of Answer= "The Default Domain Policy is linked to the domain, and its settings affect all users and computers in the domain.";


     
Question No. 22 :
  "What policies work with folder redirection to provide the ability to cache files locally?";
Option No.- 1= "registry-based";
Option No.- 2= "software installation";
Option No.- 3= "folder redirection";
Option No.- 4= "offline file storage";
Correct Option is= "D";
Explanation of Answer= "Offline file storage works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible.";


     
Question No. 23 :
  "What is the path to the default GPT structure for a domain?";
Option No.- 1= "%systemroot%\\sysvol\\sysvol\\domain.com\\Policies";
Option No.- 2= "%systemroot%\\sysvol\\domain.com\\Policies";
Option No.- 3= "%systemroot%\\domain.com\\Policies";
Option No.- 4= "%systemroot%\\Policies";
Correct Option is= "A";
Explanation of Answer= "The Group Policy templates (GPT) folder structure is located in the shared SYSVOL folder on a domain controller. The path to the default GPT structure for the cohowinery.com domain is %systemroot%\\sysvol\\sysvol\\cohowinery.com\\Policies\\. Replace %systemroot% with the folder location for the operating system files.";


     
Question No. 24 :
  "What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?";
Option No.- 1= "Local Policy";
Option No.- 2= "Security Policy";
Option No.- 3= "Audit Policy";
Option No.- 4= "None of the above";
Correct Option is= "C";
Explanation of Answer= "The Audit Policy section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access. Auditing can be used to track user activities and system activities.";


     
Question No. 25 :
  "What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?";
Option No.- 1= "Folder Sharing";
Option No.- 2= "Folder Redirection";
Option No.- 3= "Desktop Redirection";
Option No.- 4= "Profile Redirection";
Correct Option is= "B";
Explanation of Answer= "Folder Redirection is a Group Policy folder located within the User Configuration node of a Group Policy linked to an Active Directory container object. Folder redirection provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer. Contents of folders on a local computer located in the Documents and Settings folder can be redirected including the Documents, Application Data, Desktop, and Start Menu folders.";


     
Question No. 26 :
  "Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).";
Option No.- 1= "PKI Policies";
Option No.- 2= "Secure Key Policies";
Option No.- 3= "Public Key Policies";
Option No.- 4= "Private Key Policies";
Correct Option is= "C";
Explanation of Answer= "The settings available in the Public Key Policies area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI). Group Policy is not required to create a PKI, but like other Group Policy settings, the benefit lies in the ability to automate processes, provide consistency, and ease management across your network.";


     
Question No. 27 :
  "__________ files are used to apply service packs and hotfixes to installed software.";
Option No.- 1= "Update";
Option No.- 2= "Patch";
Option No.- 3= "Upgrade";
Option No.- 4= "Enhanced";
Correct Option is= "B";
Explanation of Answer= "Windows Installer files with the .msp extension serve as patch files. Patch files are used to apply service packs and hotfixes to installed software. Unlike an .msi file, a patch package does not include a complete database. Instead, it contains, at minimum, a database transform procedure that adds patching information to the target installation package database.";


     
Question No. 28 :
  "Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?";
Option No.- 1= "hash rule";
Option No.- 2= "certificate rule";
Option No.- 3= "Path rule";
Option No.- 4= "all of the above";
Correct Option is= "D";
Explanation of Answer= "Four types of software restriction rules can be used to govern which programs can or cannot run on your network. These are hash rules, certificate rules, path rules, and network zone rules.";


     
Question No. 29 :
  "What policies are designed to identify software and control its execution?";
Option No.- 1= "Software Restriction";
Option No.- 2= "Software Execution Prevention";
Option No.- 3= "Malicious Software Detection";
Option No.- 4= "Malicious Software Removal Policies";
Correct Option is= "A";
Explanation of Answer= "First introduced in Windows Server 2003 and Windows XP operating systems, the options in the Software Restriction Policies node provide organizations greater control in preventing potentially dangerous applications from running. Software restriction policies are designed to identify software and control its execution. In addition, administrators can control who will be affected by the policies.";


     
Question No. 30 :
  "What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?";
Option No.- 1= "Effective Permissions";
Option No.- 2= "Resultant Set of Policy";
Option No.- 3= "Effective Set of Policy";
Option No.- 4= "Applied Policy";
Correct Option is= "B";
Explanation of Answer= "Resultant Set of Policy (RSoP) is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing.";


     
Question No. 31 :
  "Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?";
Option No.- 1= "Group Policy Simulator";
Option No.- 2= "Group Policy Planning";
Option No.- 3= "Group Policy Modeling";
Option No.- 4= "Group Policy Results";
Correct Option is= "D";
Explanation of Answer= "The Group Policy Results feature in Group Policy Management is equivalent to the Logging mode within the Resultant Set of Policy MMC snap-in. Rather than simulating policy effects, such as the Group Policy Modeling Wizard, Group Policy Results obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment.";


     
Question No. 32 :
  "What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?";
Option No.- 1= "Block Policy Inheritance";
Option No.- 2= "Policy Delegation";
Option No.- 3= "Group Based Filtering";
Option No.- 4= "Security Group Filtering";
Correct Option is= "D";
Explanation of Answer= "The Security Group Filtering method uses the GPO’s Security tab to determine user and group account access to the policy.";


     
Question No. 33 :
  "What manual process defragments the Active Directory database in addition to reducing its size?";
Option No.- 1= "online defragmentation";
Option No.- 2= "local defragmentation";
Option No.- 3= "remote defragmentation";
Option No.- 4= "offline defragmentation";
Correct Option is= "D";
Explanation of Answer= "Offline defragmentation is a manual process that defragments the Active Directory database in addition to reducing its size. Performing an offline defragmentation is not considered to be a regular maintenance task. You should only perform an offline defragmentation if you need to recover a significant amount of disk space.";


     
Question No. 34 :
  "The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored.";
Option No.- 1= "objects";
Option No.- 2= "counters";
Option No.- 3= "items";
Option No.- 4= "classes";
Correct Option is= "A";
Explanation of Answer= "The Reliability and Performance Monitor uses categories to organize the items that can be monitored, which are referred to as performance objects.";


     
Question No. 35 :
  "What is the command-line component of the Windows Server Backup snap-in?";
Option No.- 1= "wbadm";
Option No.- 2= "wbadmin";
Option No.- 3= "backadm";
Option No.- 4= "ntbackup";
Correct Option is= "B";
Explanation of Answer= "Windows Server 2008 allows several different restoration methods depending on the goals for your restore. You can use wbadmin, which is the command-line component of the Windows Server Backup snap-in.";


     
Question No. 36 :
  "Server Backup does not support the use of which type of backup media?";
Option No.- 1= "CD drives";
Option No.- 2= "DVD drives";
Option No.- 3= "hard drives";
Option No.- 4= "magnetic tape";
Correct Option is= "D";
Explanation of Answer= "Windows Server Backup supports the use of CD and DVD drives as backup destinations, but does not support magnetic tapes as backup media. Additionally, you cannot perform backups to dynamic volumes.";


     
Question No. 37 :
  "What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?";
Option No.- 1= "DNS";
Option No.- 2= "DHCP";
Option No.- 3= "NetBIOS";
Option No.- 4= "ADFS";
Correct Option is= "A";
Explanation of Answer= "The Domain Name System (DNS) is the name resolution mechanism computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server. The names that you associate with the Internet, such as the names of Internet servers in Uniform Resource Locators (URLs) and the domain names in email addresses, are part of the DNS namespace and are resolvable by DNS name servers.";


     
Question No. 38 :
  "What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records?";
Option No.- 1= "secondary zone";
Option No.- 2= "stub zone";
Option No.- 3= "primary zone";
Option No.- 4= "forwarder zone";
Correct Option is= "C";
Explanation of Answer= "A primary zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records.";


     
Question No. 39 :
  "What are the highest-level DNS servers in the entire namespace?";
Option No.- 1= "top-level name server";
Option No.- 2= "root name server";
Option No.- 3= "authoritative name server";
Option No.- 4= "upstream name server";
Correct Option is= "B";
Explanation of Answer= "At the top of the domain hierarchy are the root name servers, which are the highest-level DNS servers in the entire namespace. They maintain information about the top-level domains.";


     
Question No. 40 :
  "In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship?";
Option No.- 1= "user organizations";
Option No.- 2= "account organizations";
Option No.- 3= "computer organizations";
Option No.- 4= "resource organizations";
Correct Option is= "B";
Explanation of Answer= "Account organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship.";


     
Question No. 41 :
  "What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization?";
Option No.- 1= "Active Directory Users and Computers";
Option No.- 2= "Group Policy";
Option No.- 3= "Active Directory Certificate Services";
Option No.- 4= "Active Directory Domains and Trusts";
Correct Option is= "C";
Explanation of Answer= "The new Active Directory Certificate Services (AD CS) role in Windows Server 2008 is a component within Microsoft’s larger Identity Lifecycle Management (ILM) strategy. The role of AD CS in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization.";


     
Question No. 42 :
  "What enables a user to manually create a certificate request file using the Certificates MMC snap-in?";
Option No.- 1= "PKI";
Option No.- 2= "Certificate Request Wizard";
Option No.- 3= "Autoenrollment Wizard";
Option No.- 4= "Enrollment ACL";
Correct Option is= "B";
Explanation of Answer= "The Certificate Request Wizard enables a user to manually create a certificate request file using the Certificates MMC snap-in. This wizard creates a request file that can be used by the Certification Authority MMC to generate a certificate based on the request.";


     
Question No. 43 :
  "What is used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security or auditing?";
Option No.- 1= "enrollment agents";
Option No.- 2= "smart cards";
Option No.- 3= "Certificate Authority";
Option No.- 4= "access point";
Correct Option is= "A";
Explanation of Answer= "Enrollment agents are used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security, auditing, and so on. An enrollment agent typically consists of a dedicated workstation that is used to install certificates onto smart cards, thus preconfiguring a smart card for each person’s use.";


    Part- C

 

Latest dream job for Student of Jetking Institute, HCL CDC, Data Expert, GT Institute, A-Set, NIIT

A Lots Of Computer Hardware and Networking Job on The India's Number 1 Most Updated Jobsite. http://dreamjobshub.blogspot.com/ Don't Forget To Subscribe To This Website!!!!!!!!!