Sunteți pe pagina 1din 5

1. Basic Rate Interface is a type of ISDN Line .

T / F

2. STP and UTP Cables are used in both STAR and RING Topologies T / F

3. Wireless LAN’s are now called as WIFI. T / F

4. Segment Length of BUS Topology is 185 to 500 meters. T / F

5. For wireless networking IEEE 802.11 standard is used. T / F

6. Transmission Speed of STAR Topology is 10/100/1000 Mbps. T / F

7. Most widely used topology is RING. T / F

8. WAN is limited only to a single Network. T / F

9. LAN is very expensive to setup and configure. T / F

10. Wireless networking is replacing cables these days. T / F

11. Wireless networks are slow as compared to traditional networks. T / F

12. Fiber Optic cables is slow than copper wire cable. T / F

13. Gateway is used to amplify signal caused due to attenuation. T / F

14. Segment Length of STAR topology is 99 meters. T / F

15. MESH is used in satellite networks. T / F

16. OSI model is used to configure TCP/IP. T / F

17. TCP/IP has 7 classes. T / F

18. is called Loopback Address. T / F

19. is Class D address. T / F

20. Range of Class A is 1 - 127. T / F

21. Range of Class B is 192 - 223. T / F

22. Range of Class C is 128 - 191. T / F

23. It is not required to assign IP Address in a NON-TCP/IP network. T / F

24. When two or more computers are connected a network is created. T / F

25. Medium is required for connecting devices on a network. T / F

26. CSMA/CD is used in Star Topology. T / F

Page 1 of 5 Prepared by: Computer Collegiate

27. CSMA/CA is used in Ring Topology. T / F

28. Ring is an Active Topology. T / F

29. Bus is Passive Topology. T / F

30. OSI Model describes different steps for data transmission. T / F

31. Physical Layer of OSI model sends packets on physical medium. T / F

32. Network Layer provides routes for transmission of data. T / F

33. Data Link Layer creates data packets in OSI model. T / F

34. Protocol is a language computers uses to communicate. T / F

35. NETBEUI is a non-routable protocol used in small LANs. T / F

36. PING is used to test TCP/IP connectivity. T / F

37. IP Address can be assigned automatically to all nodes on the network. T / F

38. IP address must be unique for all nodes on the network. T / F

39. TCP/IP is required to connect to internet. T / F

40. IRQ is the signal that a peripheral or program uses to request service from the CPU. T / F

41. Modem is used in Dialup Lines. T / F

42. When a packet reaches from one network to another routed is performed. T / F

43. CISCO is a manufacture of routers. T / F

44. Cross cable is used to connect two computers without using Switch. T / F

45. Peripherals can be shared on the network. T / F

46. Mobile phones can be a part of the network. T / F

47. Roaming profile is available to all user on network. T / F

48. DSL is a high speed internet connectivity line. T / F

49. DNS resolves hostname to IP address . T / F

50. T1 line bandwidth is 1.5 Mbps. T / F

51. Firewalls are used to protect from attacks of intruders. T / F

52. When you can not connect to other network check for LOOPBACK address. T / F

53. Windows 2003 Server supports RAID1 and RAID5. T / F

54. Windows 2003 Data Center is the most powerful in Windows 2003 Family. T / F

55. Local Users can logon across all networks. T / F

Page 2 of 5 Prepared by: Computer Collegiate
56. Share permissions work for local logon. T / F

57. Full Control is the most powerful permission for sharing. T / F

58. In read only permission user can not delete a shared file. T / F

59. Device Manager provides all hardware related information for troubleshooting. T / F

60. Add Remove Software is tool which install software in Windows 2000. T / F

61. If you are unable to load windows properly you can start windows in safe mode. T / F

62. You can use Regedit to control and install new hardware. T / F

63. System Information provides comprehensive information about software. T / F

64. IPconfig is tool used to test TCP/IP connectivity. T / F

65. We can find a computer on the network using find tool. T / F

66. A computer name can not be changed. T / F

67. boot.ini is used to manage Time for OS Loader. T / F

68. Pagefile.sys is virtual memory file. T / F

69. %systemroot% displays folder when Windows 2003 is installed. T / F

70. Map is called short cut to resource on a network using a drive letter. T / F

71. Control Panel is used to personalize you computer. T / F

72. Digital Signature verifies if a file being used is verified by Microsoft. T / F

73. We can create many Hardware profiles. T / F

74. Administrative Tools are found in Control panel. T / F

75. Recommended File system for Windows 2003 is NTFS. T / F

76. FAT32 is not supported by Windows 2003 Server. T / F

77. Windows 98 can not read NTFS file system. T / F

78. Administrator is less powerful than Guest. T / F

79. Page file can be created on many partitions. T / F

80. Format is logical procedure which creates sectors & tracks on media. T / F

81. When many users are combined for management a group is created T / F

82. Domain is the name of administrative unit across the network T / F

83. Domain Controller manages the network. T / F

84. Windows 2000 Professional can be a domain controller T / F

Page 3 of 5 Prepared by: Computer Collegiate

85. There can be more than one domain controllers of the domain T / F

86. We can install Windows 2000 professional and windows 98 on a same pc T / F

87. Windows XP Professional is the next version of Windows 2000 Professional T / F

88. Windows 2003 Server is used when we need a powerful and secure server software. T / F

89. In read permission user cannot delete a shared file. T / F

90. In full control permission user can not print a file. T / F

91. NTFS file system supports special permission on file T / F

92. Event Viewer Tool provides system logs. T / F

93. Event Viewer has 3 types of log files. T / F

94. Admin Log is one the log files provided by event viewer T / F

95. Security Log file can be viewed by normal users. T / F

96. Event viewer must be read be administrator daily in order to check server. T / F

97. Task Manager provides CPU usage and memory usage of files. T / F

98. Performance monitor give graphical statistics about usage of memory T / F

99. Performance monitor give graphics statistics about many features of Server T / F

100. IIS is a Microsoft Web Server. T / F

101. Registry Editor is good tool edit registry settings T / F

102. Regedit64 is a new tool in Windows 2000 Server T / F

103. Duplication of data on 2 drives is called Disk Mirroring. T / F

104. NTFS permissions are lost when files are copied to FAT32 Volume. T / F

105. Password length must be at least 6 characters T / F

106. MCSE certification is demonstration based. T / F

107. EFS requires NTFS T / F

108. Shadow Copy makes user possible to have multiple version of files. T / F

109. Disk Quota is used to manage disk space allocation to servers. T / F

110. Administrator is allotted all space of Hard disk in Quota T / F

Page 4 of 5 Prepared by: Computer Collegiate

111. RAID is very expensive to implement T / F

112. Parity is error correction in Word Processors T / F

113. Parity bit is included in Data strings T / F

114. Daily Backup backups up those files which are never backed up T / F

115. HCL is used in Windows. T / F

116. NWLink protocol is used to connect to Netware OS Clients T / F

117. NTBackup recommends to use DVD as backup media T / F

118. SVCHOST.EXE manages startup of services T / F

119. DOS has 4 boot able files T / F

120. DOS supports Multiprocessor Environment T / F

121. Windows 2003 Server Enterprise is web server. T / F

122. Multiple IP Addresses can be added in Windows XP Professional T / F

123. Basic Disk has partitions and Dynamic uses Volumes T / F

124. Auditing is enabled in Windows 2003 Server by default T / F

125. Active Directory Server(ADS) required DNS for working T / F

126. ISA Server creates a system policy upon installation to deny access from all networks.
127. Web Listeners are used to open port 80 on ISA Server.
128. netstat can be used to view which IP are using Port 8080 and 80.
129. OU’s are used to isolates AD Objects.
130. Groups are used to manage objects in bulk.
131. Dial in Access required for VPN users connecting through ISA Server.
132. Dial in Access in not required connecting to Terminal Servers.
133. We can configure AD to deny logon for user1 on PC123.
134. We can configure AD that user1 can logon only to PC123.
135. In Windows Server 2003 complex password policy can not be relaxed.
136. In ISA 2004 Caching is enabled by default.
137. Content download is performed at a specific interval of a URL.
138. L2TP is less secure than PPTP.
139. ISA Server 2004 is recommended for configuring SITE to SITE VPN connections.

Page 5 of 5 Prepared by: Computer Collegiate