You are on page 1of 20

Answ

Question er
1. Radio waves are limited to low transmission capacities from ________.

1,1 Mbps to 5 Mbps


2,1 Mbps to 8 Mbps 1
3,1 Mbps to 10 Mbps
4,1 Mbps to 6 Mbps

2. Consider the following statements:

Statement A: Server is a computer with high processing power, which provides services to
the other computers in a network.

Statement B: In a client-server network setup, the server is not responsible for processing 1
the requests sent by the clients.

Which of the following is true with respect to the above statements?


1,Statement A is True and Statement B is False.
2,Statement A is False and Statement B is True.
3,Both, Statement A and Statement B, are True.
4,Both, Statement A and Statement B, are False.

3. ARPA stands for __________.


1,Advanced Repeater Projects Agency 3
2,Advanced Research Projects Administration
3,Advanced Research Projects Agency
4,Advanced Rear Projects Agency

4. In case of fiber-optic cables, which transmission mode is used for transmitting data over
long distances?
1,Multimode 2
2,Single mode
3,Infrared
4,Radio

5. Infrared transmissions support up to ________ at shorter distances.


1,16 Mbps 1
2,10 Mbps
3,100 Mbps
4,50 Mbps
6. Consider the following statements:

Statement A: The bus topology connects all the nodes on a network to a main cable called
bus.

Statement B: In the bus topology, each packet that is placed on the bus contains the 1
address of the destination node and is transmitted only in one direction along the bus.

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, Statement A and statement B, are True.
4,Both, Statement A and statement B, are False.
Which of the following statements is true regarding the AppleTalk Data Stream Protocol
(ADSP) protocol?
1,This protocol facilitates file sharing between network nodes.

2,This protocol provides the services of the Session layer of the OSI model. 2

3,This protocol is subdivided into three applications: AppleShare File Server (AFS),
AppleShare Print Server (APS), and AppleShare PC (APC).
4,This protocol establishes connections between network nodes and various servers.

Which of the following protocol suites is used for communication between personal
computers and mainframes (IBM Hosts)?
1,TCP/IP 3
2,IPX/SPX
3,DLC
4,AppleTalk
Consider the following statements:

Statement A: The NBP protocol maps the names of nodes with their addresses.

Statement B: The RTMP protocol is used for the management of routing information. 3

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.
Which of the following is true about the Internet Protocol?
1,It enables reliable connection-oriented data transfers between the two nodes. 3
2,It guarantees delivery of data packets.
3,It performs error reporting and datagram fragmentation and reassembly.
4,It enables the exchange of electronic mails (e-mails) between two nodes.
Consider the following statements:

Statement A: The Application layer converts the raw data bits from the physical layer into
frames.

Statement B: The Data Link layer converts the raw data bits from the Physical layer into 4
frames.

Which of the following is true with respect to the above statements?


1,Both, Statement A and statement B, are True.
2,Both, Statement A and statement B, are False.
3,Statement A is True and statement B is False.
4,Statement A is False and statement B is True.

Which of the following layers contains a number of protocols that provide services, such as
e-mails, Web browsing, and remote login by users?
1,Application layer 1
2,Internet layer
3,Transport layer
4,Network Access layer

Earthen Wares Inc. had a network of 200 computers. Recently, the company has
undergone a major expansion and 300 more employees have been recruited. The network
has now expanded to 500 computers. Network users are now complaining of a major slow
down in the network speed. What should Timothy Burt, the network administrator, do to
increase the speed of the network? 3
1,Implement repeaters to strengthen the networking signal.
2,Implement a hub and manage the network centrally.
3,Segment the network and use a bridge to connect the segments.
4,Use a CSU/DSU to connect computers of the network.

The Network layer is responsible for:


1,Providing unique network addresses to each node within the network 1
2,Transforming data bits from the Physical layer into groups called frames
3,Providing the interface between the user and the network
4,Encoding and decoding data in a mutually agreeable format
Consider the following statements:

Statement A: The IEEE 802.1 LAN standard provides information regarding the
prerequisites for the interface of LAN standards.

Statement B: The IEEE 803.2 is a part of the Logical Link Control (LLC) sub-layer of the
Data Link layer. 3

Which of the following is true with respect to the above statements?


1,Both, statement A and statement B, are False.
2,Both, statement A and statement B, are True.
3,Statement A is True and statement B is False.
4,Statement A is False and statement B is True.

Diane Frye is a network administrator at Supersoft2000. She is giving a presentation on


SNA protocol suite to her juniors. One of her juniors asks her if there is a protocol in the
SNA suite that supports remote connections through leased or dialup connections and
provides point-to-point, multipoint, half-duplex, and full-duplex transactions. Which
2
protocol of the SNA suite has these features?
1,DIA
2,SDLC
3,VTAM
4,APPN

BlueMoon Inc. has recently opened another branch at a distance of 150 metres from the
branch existing in the same city. Its network administrator observed that the signal
traversing through their network transmission media is degrading and distorting as the
length of the network segment has increased. Which of the following devices can best
solve the above problem? 3
1,Network Interface Card
2,Terminal server
3,Repeater
4, Gateway
David Wong is a networking intern at Certified Carriers. He is studying the IPX/SPX protocol
suite as part of his networking project. He is looking for a protocol that provides fast and
connectionless service. In addition, it should also be able to provide routing services.
Which protocol would best suit his requirements?

1,SAP
2
2,IPX

3,SPX

4,RIP
William, the network administrator at EarthenWare Systems, needs to set up a LAN of 15
computers based on the bus topology using coaxial cables. Determine the type of
connector that will be used to connect the computers. 3
1,DB-25
2,RJ-45
3,T-Connectors
4,DB-9
FernTech Inc. uses an ISDN line to connect its offices located in New York and Boston.
George, the network administrator of FernTech connects the router at the New York office
to the line in order to establish the connection between the two networks. However, after
the company office shifts to the new building, the network faces EMI problems on the line.
Predict the possible cause for this problem.
1,The router is defected because of which the electro-magnetic interferences have
increased. 2
2,The CSU unit is defected because of which the electro-magnetic interferences have
increased.
3,The internal LAN transmission is defected because of which the electro-magnetic
interferences have increased.
4,The atmosphere is not clear because of which the electro-magnetic interferences have
increased.
GlobalSoft Inc. has offices in New York, New Jersey, and San Francisco. The network of
GlobalSoft Inc. is based on an ISDN leased line. The regional marketing mangers of the
company wants to conduct a videoconference between the top management and the
regional market heads regarding the target market segments as per the current business
strategy. Determine the ISDN service that will be used to conduct this videoconference.
1,The PRI ISDN service with 23 B and a D channel will be used to conduct the
videoconference 1
2,The PRI ISDN service with 30 B and 2 D channel will be used to conduct the
videoconference
3,The PRI ISDN service with 30 B and a D channel will be used to conduct the
videoconference
4,The PRI ISDN service with 2 B and a D channel will be used to conduct the
videoconference

David Bernard is a renowned scientist studying the field of ISDN technology. A summit is
being conducted on the prospects of expansion of wireless and mobile networks and David
Bernard has been invited as the guest of honor. He will also conduct a session about the
latest developments in the field. This lecture is being broadcast at a transmission rate of
64 Kbps over the Internet to many universities all over North America. Which type of 3
system will be used to carry out this session?
1,Synchronous Optical NETwork
2,Synchronous Digital Hierarchy
3,T-carrier systems
4,E-carrier systems
Consider the following statements:

Statement A: In Duplex transmission, either node can transmit while the other node can
receive data.

Statement B: In half-duplex transmission, both the nodes can transmit as well as receive 4
data at the same time.

Which of the following is true with respect to the above statements?


1,Statement A is True and Statement B is False.
2,Statement A is False and Statement B is True.
3,Both, Statement A and Statement B, are True.
4,Both, Statement A and Statement B, are False.
Consider the following statements:

Statement A: The IEEE 802.3 standard is used for 1-persistent CSMA/CD (Carrier Sense
Multiple Access/ Collision Detection) LAN, which is commonly known as Ethernet.

Statement B: Using the CSMA protocol, a node transmits data packets whenever it finds
the channel or the transmission media idle.
2

Which of the following is true, with respect to the above statements?

1,Both, statement A and statement B, are False.


2,Both, statement A and statement B, are True.
3,Statement A is True and statement B is False.
4,Statement A is False and statement B is True.
Red Infosystems is setting up a network for 100 computers to accommodate new recruits
in its production department. The management wants the network to be efficient and has
instructed the network administrator, Keith Turner, to ensure this, while setting up the
network. In order to establish an efficient network, Keith has decided to subnet the
network. The network address allocated for this network is 194.168.10.0. Keith has
decided to divide the network into four subnets. Determine the subnet mask for this
network.
1,255.255.255.240

1
2,255.255.192.0

3,255.255.256.0

4,255.255.224.0

Jim needs to create a TCP/IP addressing scheme for his organization. How many network
Ids he must allow while defining the subnet mask for the network?
1,One for each subnet and host ID 2
2,One for each subnet and WAN connection
3,One for each subnet and each router interface
4,One for each network adapter installed on each host and each router interface

David is a network administrator in SuperGraphics Inc. The network in his organization


uses an address of 172.30.0.0/16. He will initially need 25 subnets with 1000 hosts in each
subnet. There might be a need for 55 subnets. Which subnet mask should David configure
to meet these requirements? 3
1,255.255.240.0
2,255.255.248.0
3,255.255.252.0
4,255.255.254.0

Tim Hogan is the network administrator for Red International Inc. He is setting up a private
network for the organization and has set up the DHCP server to allocate IP addresses
dynamically to the hosts and the mail server. However, after a week of installing the
network, Tim observes that the hosts are not able to connect to the mail server. What is
the possible cause for this problem? 4
1,Tim needs to allocate addresses statically.
2,Tim needs to configure the TCP/IP default gateway.
3,Tim needs to assign a specific port number to the mail server.
4,Tim needs to assign a reserved IP address to the mail server.

Tom Grant is the network administrator at Global Systems Inc. He needs to design the
network setup for his organization. More than 1 650 000 hosts will be connected in the
network. Which IP addressing class would best meet his requirement? 3
1,Class C
2,Class D
3,Class A
4,Class B
Red Square Inc. is an upcoming virtual music store in North America. The company has
increased its distribution globally and provides the facility to order music CDs over the
Internet. The Web site is comprehensive and allows visitors to listen to music online. In
order to promote their virtual music store, the company frequently organizes concerts,
which can be seen live over the Internet. In order to view these concerts, the customers
need to subscribe to the Web site. Each subscriber receives a login name and password
using which he/she can log in, view, and listen to the concert. The Web site maintains the
subscribers as user groups and uses streaming audio/video to send data packets to 2
multiple computers. Determine the IP addressing scheme that will be used by these user
groups while viewing and listening to the concert.
1,The subscribers will use their respective subnet IDs for teleconferencing.
2,The subscribers will need a multicast IP address provided by the Class D IP addresses.
3,The subscribers will use the network addresses of the other networks in order to route
data packets to particular users.
4,The subscribers will need to use reserved IP addresses to teleconference over a secure
network setup.

Research Infotech needs to set up a small network for performing its research and
development on the new wireless technologies using the Internet. The network needs to
be fast and efficient. In addition, the users should be able to use the Internet only for
accessing relevant Web sites. Permissions for accessing chat rooms should not be allowed. 2
Which type of server can be used to implement such a network setup?
1,Newgroup servers
2,Proxy and cache servers
3,Catalog servers
4,News servers
Which of the following is true about a mirrored server?
1,It stores a copy of data contained in another servers.
2,It is used to make available the same business transaction to multiple users across the 1
Internet.
3,It is used for user authentication.
4,It is used to store the repository of certificates.

Robert Russel is a Web administrator in Red Sky Inc. He needs to install a Web server in
his organization. His primary requirement is that the server must be platform independent
and it should enable its users to add functionality to their environments easily. Which Web
2
server best meets the requirements?
1,IIS Web server
2,Apache server
3,Personal Web server
4,FTP server
Which of the following is the correct use of the TELNET service?
1,Enables users to communicate with other users. This service needs to be run for
managing receipt/delivery of mails.
2,Enables file transfer across machines, using the HTTP protocol.

4
3,Enables users a set of bulletin boards on different subjects.
4,Enables users to log in remotely to a server. This service is used for allowing the clients
to log on to a remote server.
Marilyn Jones is a Web administrator in SmartLabs Inc. Her company has an internetwork.
The company plans to keep streaming video and audio content over this internetwork.
Which of the following internetworking servers would be most appropriate in the current
scenario? 3
1,Domain Name Servers
2,News servers
3,Media servers
4,Transaction servers
Consider the following statements:

Statement A: Input is an attribute of FORM tag.

Statement B: Name is an attribute of INPUT element.


2

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.
Which of the following is the true for method attribute?
1,This attribute specifies the way in which the data can be transmitted from the form to
the Web server. 1
2,This attribute is used to specify the target where the form data is transmitted.
3,This specifies the type of control that will be displayed on the form to accept user input.
4,This stores the value entered by the user in the control.
Consider the following statements:

Statement A: Value button is a valid HTML form control.

Statement B: Checkbox button is a valid HTML form control.


2

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.

What does IDS stand for?


1,Intrusion Detection Standard 2
2,Intrusion Detection System
3,Intrusion Data System
4,Intrusion Digital Signature
Which of the following is true for cryptosystem?
1,Cryptosystems are of three types: symmetric, asymmetric, and RSA.
2,Asymmetric cryptosystems use the same key for both encrypting and decrypting data. 4
3,Symmetric cryptosystems use two separate keys for encryption.
4,In a cryptosystem, before data can be exchanged between two parties, the key must be
shared between them.

Samuel is network administrator in Bluesoft Inc. Lately, he is getting complaints from the
network users that they are repeatedly getting e-mail messages that with huge files
attached. This is causing the users’ e-mail box to crash. Which DoS attack are they
referring to? 4
1,Ping of death
2,SYN flood
3,Spamming
4,Mail bomb
Identify the firewall with the following characteristics:

1. Filters packets at the Network layer and examines packet headers against an access
control list

2. Checks for all the connections made to a local network

3. Allows only those connections that are from a trusted source and are considered safe
1
4. Ensures that the users behind the firewall have access to the Internet

5. Ensures that the privacy of the internal network is maintained


1,Stateful multilayer inspection firewalls
2,Proxy server firewalls
3,Packet filter firewalls
4,Circuit-level gateways

Sniffing is:
1,A technique used to deliver an e-mail message to someone who might otherwise not
choose to receive it
2
2,A technique used to passively intercept and copy all network traffic on a system, a
server, a router, or a firewall
3,A technique used redirect data that is being exchanged between two authorized entities
to one or more unauthorized entities
4,A technique used to send abnormally large ping packets to a specific computer

What does DES stand for?


1,Digital Encryption Standard 3
2,Data Encryption System
3,Data Encryption Standard
4,Digital Encryption System

_______ supports minimum key sizes of 128, 192, and 256 bits.
1,Triple (DES) 4
2,DES
3,Ron’s Code
4,AES
_________ is the process used for breaking ciphers.
1,Cryptographic mechanism 2
2,Cryptanalysis
3,Cryptology
4,Decryption
Consider the following statements:

Statement A: Smart card provides tamper-proof authentication and non-repudiation.

Statement B: Authentication is the process of ensuring that data, whether in transit or


1
stored on the network, is not tampered with in any way.

Which of the following is true with respect to the above statements?


1,Statement A is True and statement B is False.
2,Statement A is False and statement B is True.
3,Both, statements A and B, are True.
4,Both, statements A and B, are False.

Which of the following components does NOT belong to the PKI framework?
1,Certification Authority (CA) 3
2,PKI client
3,Revoke Authority (RA)
4,Digital certificates
Identify the process for TCP connection that uses the following steps:

1. The first node requests communication by sending a packet with the sequence number
and SYN bit.

2. The second node acknowledges the receipt of the data and responds with an
acknowledgement (ACK) that contains the sequence number plus one, and its own
2
sequence number back to the first node.

3. The first node responds and the communication between the two nodes proceeds.
1,Broadcast storm
2,Three-way handshake
3,Spamming
4,Multi-access handshake
Identify the networking technology:

When an external entity accesses an internal network resource, the external IP address is
mapped to a fixed IP address.

When an internal node accesses an external resource, it’s device maps a private IP 4
address to the first IP address that is available from a pool of globally unique IP addresses.
1,Secure Socket Layer (SSL)
2,Socket Server (SOCKS)
3,Transport Layer Security (TLS)
4,Network Address Translation (NAT)

Which of the following is the correct expansion of the term CASE?


1,Computer Aided Software Engineering 1
2,Computer Aided System Engineering
3,Computer Aided Software Enterprise
4,Computer Aided System Enterprise

________ is the first activity of the Development phase.


1,Implementation 3
2,Testing
3,Analysis
4,Design

________ is the last activity of the Development phase.


1,Design 4
2,Construction
3,Testing
4,Implementation

Which of the following communication media is the cost-effective solution for users
seeking an independent communications network and connects a large number of
geographically dispersed sites? 2
1,ISDN Integrated Services Digital Network (ISDN)
2,Very Small Aperture Terminals (VSAT)
3,Wireless
4,Digital Subscriber Line (DSL)
In which of the following technologies, computers provide a powerful and efficient way to
store, retrieve, analyze, or predict biological data in the form of text, trees, maps, and
pathways?
1,E-learning 2
2,Bioinformatics
3,Embedded system
4,IP telephony

Which of the following technologies covers e-mail/Web scanning and malicious mobile
code (MMC) management?
1,Embedded system 3
2,Biometrics
3,Content security
4,Firewall
Which of the following is NOT the feature of eShop?
1,Products are marketed using Media 4
2,Payment is online
3,Products will be delivered at home
4,Products sold at higher prices

In which of the following, a mobile client can be alerted and informed about the presence
of various services within the specified area?
1,L-commerce 1
2,M-commerce
3,T-commerce
4,E-commerce

The keywords to drive the activities during the analysis period are __________________.
1,Discovery and information 2
2,Discovery and understanding
3,Understanding and information
4,Data and understanding

Which of the following statements is true?


1,With CRM, there is a slower response to customer inquiries. 4
2,The CRM obtains information that can be kept confidential from other business partners.
3,CRM cannot identify the most profitable customer.
4,CRM provides better understanding of customers.
Which of the following statements is NOT true for smart cards?
1,Smart Cards can be used to pay for parking at parking meters or to get on subways,
trains, or buses.
2,Smart Cards can be used to dial a connection on a telephone and be charged on a per-
call basis. 4
3,Smart Cards can be used to give hospitals or doctors personal data without filling out a
form.
4,Smart Cards can be used to establish your identity when logging on to an Internet access
provider or to an online bank.
Which of the following three files must be located in the root directory in order to
successfully boot MS-DOS?

1,MSDOS.SYS, IO.SYS, and COMMAND.COM


1
2,CONFIG.SYS, COMMAND.COM, and AUTOEXEC.BAT
3,FILES, STACKS, and BUFFERS
4,HIMEM.SYS, EMM386.EXE, and COMMAND.COM

Which DOS commands is used to create a self-booting disk?


1,Boot a:/s

2,FDISK a:/s
3,Format a:/s
4,MEM a:/s
A ________ is a special area of memory reserved to hold data and instructions recently
accessed from another location.
1,Stack 3
2,Cookie
3,Cache
4,Cluster

If the BIOS did not locate the boot record in the floppy or hard drive, what kind of error is
shown on the screen?

2
1,Windows Protection Error
2,Non-System Disk or Disk Error
3,Error in Loading System Files
4,Bluescreen Error

Which of the following is a hidden file, located under the C:\Windows directory, which
contains all information about the system’s hardware configuration, and is checked by the
system for the first part of Registry file?
1
1,SYSTEM.DAT
2,USER.DAT
3,AUTOEXEC.BAT
4,WIN.INI

You have installed a new Windows 2000 Professional client in your network and manually
assigned it a valid IP address. However, when you try to browse the network, nothing is
displayed. Which network utility should you use to display the current IP settings in
Windows 2000 systems and serve as a starting point for troubleshooting?
3

1,WINIPCFG
2,TRACERT
3,IPCONFIG /ALL
4,ARP

Douglas shared a folder on his machine. Which of the following permission is assigned to
the share by default?
1,Read Only for Everyone 2
2,Full Control for Everyone
3,Full Control for CREATER OWNER
4,Read Only for CREATER OWNER

Each time Windows 95 boots up successfully, the Registry files are backed up with the
____________file extension.

1
1,.DA0
2,.DAT
3,.BAK
4,.CAB
When you select the F8 option for Step-by-Step startup, the system generates a
__________file.
1,CONFIG.SYS 3
2,IO.SYS
3,BOOTLOG.TXT
4,MSDOS.SYS

The NTFS structure uses 64-bit entries to keep track of the storage on the disk. The core
component of the NTFS system is the __________ that contains information about each file
being stored on the disk.
3
1,Volume file
2,Log file
3,Master File Table
4,Quota Table
During the Windows 9x startup process, which is the file that tracks the components and
drivers of Windows 9x that are successfully loaded and initialized?
1,BOOTLOG.TXT
2,EMM386.EXE

1
3,SYSTEM.DA0
4,WIN.COM

The network for a department of ABC Corp. needs to be set up. This network should be set
up using a cabling medium that will ensure secure data transmission. In addition, the
cabling medium should offer signaling rates in excess of 200,000 Mbps. Which of the
following cabling medium could be used in the given situation?

1,Coaxial Cabling should be used


2,Fiber Optic Cabling should be used
2

3,UTP Cabling should be used


4,STP Cabling should be used
Which of the following permissions enables a user to make changes to subfolders, display
attributes and permissions, as well as to run executable file types?
1,Change
2,Execute
3,Write
2
4,Read

Which of the following administrative tools is stored under the Documents and Settings
directory, and contains system information and settings that are specific to the user?
1,User profiles
2,Group Policies
3,Network Share Permissions
1
4,NTFS Rights

There is a file with the name SlsExp.txt on your machine. You want to secure this file so
that nobody is able to view it and modify it. How will you set the attributes for this file?

1
1,Type ATTRIB +R +H SlsExp.txt on the command line.
2,Type ATTRIB -R -H SlsExp.txt on the command line.
3,Type ATTRIB –RH SlsExp.txt on the command line.
4,Type ATTRIB +RH SlsExp.txt on the command line.
Web pages can be loaded onto the desktop and automatically updated from the Web. This
type of operation is referred to as _________.
1,Duplexing
2,Active Channel

2
3,Active Desktop
4,Mirroring

Files and folders can be encrypted from the command line using the _____ command.
1,Mem 2
2,Cipher
3,Ver
4,Setver
Which of the following Windows 9x components is used to hold information about the
system hardware that has been identified by the enumeration or detection processes of
the Plug-and-Play system?

1
1,Registry
2,GDI
3,USER Files
4,Kernel
In XYZ Solutions, the employees in different shifts are working on Windows 98 operating
system. In order to maintain and govern the rights and privileges of different users, certain
guidelines are framed in order to restrict the user access, so that when a user logs on to
the system, Windows 98 checks the user’s configuration information. What are these
guidelines known as?
1

1,System Policies
2,Registry Editor
3,Policy editor
4,Policies security
IP addresses exist in the numeric format of XXX.YYY.ZZZ.AAA. This format of specifying
addresses is referred to as the dotted decimal notation. Each address consists of four
______ separated by dots (.).

1,4-bit fields
2,2-bit fields

3,8-bit fields
4,6-bit fields

Which of the following technologies provides high-speed communication links by using the
existing telephone lines to generate bandwidths ranging up to 9Mb/s or more?

2
1,ISDN Connection
2,Digital Subscriber Lines
3,Dialup Networking
4,Satellite Internet Access
SoftPro Pvt. Ltd. has set up a new office. As a part of the process for implementing
security, they want to restrict access to the internal network so that specific types of items
or addresses are not allowed to pass between the networks. Which of the following
security measures should be taken to control the traffic between the networks?

1,They should use the Kerberos to protect their company network


2,They should use the Digital certificates to protect their company network

3,They should set up the firewall program to protect their company network.
4,They should combine various certificates with security standards such as the IP Security
Protocol

You are using IEEE 802.11b standard for transmitting data over wireless LAN. You want to
ensure secure transmission of data by the workstations. Which of the following methods is
the best way to ensure secure transmission of data?
4
1,Enable Authentication feature of the IEEE 802.11b standard.
2,Enable Encrypt data transmission feature of the IEEE 802.11b standard.
3,Enable Authorization feature of the IEEE 802.11b standard.
4,Enable the WEP function of the IEEE 802.11b standard.
As the System Administrator of a Software development firm, Jack wants to protect his
network from outside attacks by preventing unwanted connections from Internet devices.
How can he ensure the security of his network?

1,Implement Virtual Private Networks


4

2,Implement IP Security Protocol (IPSec)


3,Implement Digital Certificate
4,Implement Firewall
85. You need to start the system in _________ startup mode to locate and correct the 3
“Missing Core File” problem?
1,Safe Mode Without Compression

2,Safe Mode

3,Safe mode using the Command Prompt Only


4,Step-by-Step Confirmation
86. Jack Halls has purchased a computer with the following configuration:

Processor – Pentium II

Speed – 233 Mhz

Ram – 64 MB

HDD – 2 GB

CD-ROM – 12X
3

87. He wants to install Windows XP on the computer. He creates two partitions of 1 GB


each on the hard disk. When he attempts to install the operating system on the first
partition, the installation fails mid-way and the installation wizard gives a stop error. What
could be the cause of the problem?

1,The computer has some applications, which are conflicting with Windows XP.
2,The computer does not have sufficient hard disk space to install Windows XP.
3,The computer does not have the required partition size to install Windows XP.
4,The computer’s CD drive is not compatible with Windows XP.

88. You are the administrator of a company named Firmware Corporation. One of the users
shuts down his computer and when he starts it, the computer does not boot up. You
suspect that the file system boot sector is corrupted. How can you resolve this problem? 3
1,Use recovery console to fix the MBR
2,Reboot the system again, it will automatically correct the problem
3,Use the F8 option at start up and select Last Known Good Configuration.
4,Use the Emergency Repair Disk to repair the problem.
89. As the system administrator of ABL Incorporation Inc., you receive a complaint from a
user stating that he can see files in a folder but cannot access any of the files. The user is
working on Windows 2000 operating system. What could be the possible cause of the
complaint?

1,The user might have been assigned the Read permission at the folder level.
2
2,The user might have been assigned the List permission at the folder level.

3,The user might have been assigned the Execute permission at the folder level.
4,The user might have been assigned the Deny Access over the folder.

You might also like