It is the most common form of computer network.
Local Area Network
It is a group of services hosted on a network which is a private structure and has the internet-like service
provision.
Intranet
It enables you to manage network traffic, group physically dispersed nodes into logical area networks
and isolate network traffic.
Virtual Local Area Network
It is a device that converts instructions from the network protocol stack into electric signals.
Network Adapter
Which of the following is not a LAN Physical Topology?
Crown
Which of the following is not a Physical WAN Components?
Network Adapter
Which of the following is not a Wireless LAN Standards?
802.11 h
It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic
management, performs firewall functions and makes routing decisions based upon traffic priority.
Switch
What is the IEEE 802 Standards for Local Wireless Networks?
IEEE 802.11
Which of the following is not the common network architecture types?
WiMax
It is the foundation of the Internet naming scheme and it supports accessing resources by using
alphanumeric names.
DNS Server
It a server that is used to access the corporate resources from outside the corporate network.
Remote Access Server
It provides storage for the users' files and share folders that contain users' files.
File Server
It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration.
DHCP Server
It allows you to control which role functionality is installed and enabled.
Role Services
It is a computer that is dedicated to running network-aware application software.
Application Server
Which of the following is not a Server Role of Windows Server 2008 R2?
Windows Power Shell
It holds a copy of AD DS and responds to request for active directory information.
Domain Controller
It is a tool used to remove system-specific data from the Windows operating system, configure windows
to start in audit mode, configure the windows operating system to start the Windows Welcome phase
and reset Windows Product activation.
Sysprep
Which of the following version of Windows are allowed for Upgrade?
Windows Vista SP1
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and
replace an existing operating system on a partition.
Clean Installation
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view
information.
Usability
It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows
with Windows 7 but all user applications, files and settings are retained.
Upgrade Installation
Which of the following is not a Specialized version of Windows 7?
Windows 7 Professional
It is a downloadable application that helps windows user identify which edition of Windows 7 meets
their needs.
Windows Upgrade Advisor
It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware,
running more reliably and providing more consistent performance than previous versions of Windows.
Reliability and Performance
Which of the following is not an advantage of installing a 64-bit edition of Windows 7?
It supports 16-bit Windows on Windows (WOW) environment
It is one of the Considerations on why using the option of Upgrade rather than Migrate.
Does not require the reinstallation of applications
It provides authenticaltion, host operations of master roles, hosting the global catalog and support
group policies and sysvol.
Domain Controller
It enables IT Administrator to automate one-to-many management of users and computers.
Group Policy
It is a collection of Domain Trees.
Forest
It is an object that contains all of the information that defines a user in Windows Server 2008 R2.
User Account
It enables users to log on to the domain to gain access to the network resources and it is reside in Active
Directory.
Domain User Accounts
It enables the user to log on and access resources on a specific computer and usually reside in SAM.
Local User Accounts
Which of the following is a main type of group?
Distribution
It is a collection of user accounts, computer accounts, contacts and other groups that you can manage as
a single unit.
Groups
It is the non-contiguous storage of data on a volume
Disk Fragmentation
It contains the partition table for the disk and a small amount of executable code called as the master
boot code.
Master Boot Record Disk
It is a graphical user interface that is used to manage disks and volumes both basic and dynamic, locally
or on remote computers.
Disk Management
It is a dynamic volume that joins areas of unallocated space disks into a single logical disk
Spanned Volume
It is a way for you to limit use of disk space on a volume for each user to conserve disk space.
Disk Quotas
It is a scriptable command line utility that create scripts to automate disk related task.
Diskpart
It is a dynamic volume that encompasses available free-space from single, dynamic, hard disk drive.
Simple Volume
It is a small software program that allows a hardware device to communicate with a computer
Drivers
It contains an array of partition entries describing the start and end LBA of each partition on disk.
GUID Partition (GPT)
It is a feature of Windows 7 that allows windows 7 to be backward compatible
Windows XP mode
It defines the type of access granted to a user, group, or computer for a file or folder.
NTFS Permission
It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft
Windows Server 2000 or later
Kerberos v5
It is the process of verifying the identity of something or someone.
Authentication
It is a method of sharing folders that allows you to share folders quickly.
Basic Sharing
It is a new authentication features that controls the ability of online IDs to authenticate to a computer.
Online Identity Integration
It is a method of sharing folders that allow multiple default public folders for each computer and files
shared with same computer and with same network.
Public Sharing
It is the process of determining whether something or someone has permission to access the resources
Authorization
It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses
enhanced metafile format (EMF) as the spool file format.
GDI based printing
How many bits are there in an IP version 4 address?
32 bits
Which of the following is not an IPv6 Address types?
Broadcast
It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet.
This address must be unique, routable on the internet and must be assigned by IANA.
Public IP Address
What is the binary notation for the 255.255.255.0 subnet mask?
11111111.11111111.11111111.00000000
APIPA stands for:
Automatic Private IP Addressing
What type of notation does IP version 6 address uses?
Hexadecimal
172.16.0.0 /12 is what type of IPv4 Address.
Private IP Address
It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host
ID.
Subnet Mask
How many bits are there in an IP version 6 address?
128 bits
It is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets.
Default Gateway
Which of the following is not a way to improve the signal strength?
None of the Choices
Where will you see the Manage Wireless Networks tool in your PC?
Control Panel
It is a wireless network modes that allows a wireless network adapters connects directly to another
wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet
connection among multiple computers and devices.
Ad hoc mode
What is the maximum bit rate for the 802.11n technologies?
600mbps
Strong EAP methods provide strong authentication
IEEE 802.1X
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption
used by medium and large organization.
WPA-Enterprise
It is a type of network that interconnect devices by means of radio waves instead of wires and cables.
Wireless Network
Which of the following statement is not correct?
You can configure the client computer by going to the accessories in the start menu and clicking the
network options.
It allows the administrators to identify which software is allowed to run and was initially added to
Windows XP and Windows Server 2003.
Software Restriction Policies
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to
run on user desktops.
Applocker
It is a software that is designed to deliberately harm a computer.
Malicious Software
It enables the IT Administrators to automate one-to-several management of users and computers.
Group Policy
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete
browsing history to maintain privacy because there are no logs kept or tracks made during browsing
InPrivate Browsing
It is a security feature that simplifies the ability of users to run as standard users and perform all
neccessary daily tasks
User Account Control
It is one of the feature of Windows 7 that encrypts the computer operating system and data stored on
the operating system volume.
Bitlocker
This are equivalents to door locks, employee badges and security systems. It protects the computer and
networks from intrusions.
Firewall
It is the built-in encryption tool for Windows file systems
Encrypting File Systems
It is a central location for viewing messages about your system and the starting point for diagnosing and
solving issues with your system.
Action Center
Provides a timeline of system changes and reliability. It also provides a system stability chart and reports
on software installations and software or hardware failures.
Reliability Monitor
It is the measurement on how quickly the computer completes a task.
Performance
Which of the following is not a Performance Monitor tool?
Windows Memory Diagnostics Tool
It provides assistance in resolving network-related issues
Windows Network Diagnostics Tool
It is the measurement of how a system conforms to expected behavior
Reliability
It is an administrative tool for managing user settings and computer settings across a network.
Window Update Group Policy
Which of the following is not a Boot-option for troubleshooting startup problems?
None of the choices
Checks for symptoms of defective computer memory and usually can be started from administratve
tools in the control panel
Windows Memory Diagnostics Tool