Class 5 Computer Chapter 2 Windows Operating System Quiz 1 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What type of device looks at a packet and forwards it based on its destination IP address?
2. If you want to access Event Viewer directly, from what location is this possible?
3. A(n) ..... address is assigned by a DHCP server.
4. Hardware and Software can't communicate without an operating system
5. Name the operating system that allows only one user to use the operating system at any given time
6. What mechanism do wireless networks use to access the network?
7. At what point in the network does the responsibility of the Network Administrator end and the telecommunications provider begin?
8. What do you call a password that is at least seven characters long and uses three of the following categories of characters (uppercase, lowercase, numbers, and special)?
9. On which OSI layer do routers function?
10. What do the initials CIA stand for in relation to security?
11. A ..... is like a containers, in which we can store similar type of files.
12. At which layer of the OSI model are VLANs found?
13. What name does Windows Server 2008 R2 use for Terminal services?
14. Which wildcard character is used for quicker search?
15. What is the process of giving an individual access to a system or resource called?
16. What type of firewall works at the session layer, creates a connection, and allows packets to flow between two hosts without further checking?
17. What protocol is used with L2TP to encrypt data?
18. Which Windows 7 feature lets you adjust a laptop's power plan and screen brightness?
19. ..... is the process of decreasing the size of files or folders.
20. Which action commonly results in the User Account Control dialog box opening?
21. Which three editions of Windows 7 are widely available in the retail sector?
22. What type of cable should be used within air handling spaces of a building?
23. What service on a Windows network is used to translate between NetBIOS names/computer names and IP addresses?
24. Which layer in the OSI model do MAC addresses and switches use?
25. ..... refers to the container that is used to store different files on the computer
26. What protocol does the ping command use to test network connectivity?
27. In which model does each host have their own security database?
28. If you want to protect specific folders on a DVD from unauthorized access, which of the following is the best choice to use?
29. What is the most common form of authentication?
30. An Operating System is a program that helps the user to communicate between the software and .....
31. What is a free download for Windows 7 Professional, Enterprise, and Ultimate that supports legacy applications inside of a virtual Windows XP machine running on Windows 7?
32. What speed does FDDI use?
33. How many bits are in an IPv6 address?
34. What protocol automatically sets the IP configuration for a client?
35. ..... is used to send packets from one network to another.
36. What category of ports are numbered from 49152 to 65535?
37. The term OS is the short form of?
38. What are the two best things that you can do to protect your computer from viruses and other forms of malware?
39. Which Internet Explorer 9 feature displays messages and alerts at the bottom of the browser window?
40. When copy and pasting, how do we do it by only using our keyboard and mouse?(NO RIGHT CLICKING)
41. What do you call the process whereby a user is identified via a username and password?
42. Which DMZ configuration uses one firewall with three interfaces?
43. Which Windows 7 installation requires System Center Configuration Manager (SCCM) for network deployments?
44. Which of the following is a characteristic of single-mode fiber?
45. What is the default subnet mask for a class B network?
46. Most people have this operating system in their computer system
47. What command is used to add static routes to a Windows computer?
48. Which tool scans your computer and produces a report of any Windows 7 compatibility issues with your computer?
49. ..... are small pictures that represent programs, files or folders, or other things on the desktop
50. What command tests network connectivity while showing you each hop along the way?
51. After you synchronize files between your computer and a network location, what are the files on your computer known as?
52. What setting forces users to change their password?
53. What type of firewall do you use to block access to certain websites or instant messengers?
54. What type of device is designed to inspect traffic, detect malicious activity, and take steps to mitigate the malicious activity?
55. ..... authentication is the term used to describe two or more authentication methods used to authenticate someone.
56. What does GUI stand for?
57. Operating system is not an essential software of a computer.
58. A(n) ..... is a route that must be manually defined on each router.
59. Which of the following is not a fiber connector?
60. What type of device isolates a network by filtering the packets that can enter it?