Networks
Windows
Green IT
Surprise

Video
100
Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number? A. Password guessing attack B. Spoofing C. Phishing D. Replay attack
C. Phishing
100
Which of the following is a framework for defining reusable software components that perform a particular function or a set of functions in Microsoft Windows? A. SSID B. ActiveX C. Cookies D. JavaScript
B. ActiveX
100
QUESTION 59 Which of the following will you use to clean your laptop screen? Each correct answer represents a complete solution. Choose two. A. Detergent B. Slightly wet and soft cloth C. Rough cloth D. LCD screen cleaner
D. LCD screen cleaner B. Slightly wet and soft cloth
100
QUESTION 51 Which of the following is a program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors? A. Screensaver B. Monitor saver C. Debugger D. Spider
A. Screensaver
100
QUESTION 30 Your customer is using Windows Vista and complains about the quality of picture he is getting on his monitor. You find that you cannot adjust the refresh rate or the resolution. What is the most likely cause? A. The video card is not recognized by Windows. B. The monitor is not compatible with the video card. C. The video card has failed. D. The video card does not have enough video RAM.
A. The video card is not recognized by Windows.
200
You are trying to select a particular wireless encryption algorithm. You are concerned that it implements as much of the wireless 802.11i standard as possible. Which encryption algorithm should you implement? A. WEP2 B. WPA2 C. WPA D. WEP
B. WPA2
200
You have an older Windows 98 computer. You wish to upgrade to Windows Vista Home Basic. What must you do? A. First upgrade to Windows 2000 then upgrade to Vista Home Basic. B. First upgrade to Windows XP Pro, then upgrade to Vista Home Basic. C. Simply buy and install the Windows Vista Home Basic Upgrade.
D. First upgrade to Windows XP Home, then upgrade to Vista Home Basic.
200
Which of the following types of fire extinguishers are needed for combustible liquids' fire such as gasoline and kerosene? A. Class C B. Class B C. Class D D. Class A
B. Class B
200
Which of the following typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet? A. Thin client B. Cloud computing C. Application Virtualization D. Terminal services
B. Cloud computing
200
Which of the following statements about the DVI-I connector are true? Each correct answer represents a complete solution. Choose two. A. It contains 4 more pins than the DVI-D connector. B. It is used only for digital signal connection. C. It is used for both digital and analog signal connections. D. It contains 15 more pins than the DVI-D connector.
A. It contains 4 more pins than the DVI-D connector. C. It is used for both digital and analog signal connections.
300
QUESTION 45 Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet? A. Demilitarized zone (DMZ) B. Firewall C. Intrusion detection system (IDS) D. Packet filtering
C. Intrusion detection system (IDS)
300
Rick works as your assistant. He is configuring a computer running Windows XP Professional to connect to a network. He needs to get IP information in the command prompt. He asks you about the usage and brief description of various switches used with a command. Which of the following command switches will you suggest that he use to get the required information of the command? A. [command] /< B. [command] /+ C. [command] /> D. [command] /?
D. [command] /?
300
Which of the following types of batteries are considered as environmental hazards? Each correct answer represents a complete solution. Choose three. A. Button cell B. Lead-acid C. NiMH D. NiCd
A. Button cell B. Lead-acid D. NiCd
300
QUESTION 53 Which of the following protocols provides an encryption by using the Temporal Key Integrity Protocol (TKIP)? A. EAP B. WEP C. IPSec D. WPA
D. WPA
300
QUESTION 7 Which of the following are types of LCD monitors? Each correct answer represents a complete solution. Choose two. A. SVGA B. Active Matrix C. Passive Matrix D. X-Matrix
B. Active Matrix C. Passive Matrix
400
Daily Double********************************************************************** upto 1500 pts Which of the following firewalls inspects the actual contents of packets? A. Packet filtering firewall B. Application-level firewall C. Circuit-level firewall D. Stateful inspection firewall
B. Application-level firewall
400
Your office uses Windows Vista. This morning, a patch was applied automatically. Suddenly, the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their Device Manager, you notice there is no exclamation point next to the scanner. What should you do now? A. Reinstall Vista. B. Find a Vista compatible scanner. C. Manually uninstall and reinstall the device driver. D. Roll back the patch.
C. Manually uninstall and reinstall the device driver.
400
QUESTION 47 Under which environmental conditions is the risk of Electrostatic discharge (ESD) the highest? A. Low temperature B. High humidity C. Low humidity D. High temperature
C. Low humidity
400
QUESTION 54 Which type of memory chip has 168 pins? A. DMA B. DIMM C. DIP D. SIMM
B. DIMM
400
QUESTION 8 Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio? A. DVI B. S-Video C. SVGA D. HDMI
D. HDMI
500
QUESTION 48 Which of the following protocols is widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the Internet (VoIP)? A. LDAP B. ICMP C. UDP D. SIP
D. SIP
500
QUESTION 89 Your customers Windows XP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this? A. Simply put the Windows Recovery CD in and the recovery process will start. B. Reinstall Windows. C. Use the Windows Recovery Console with the Windows Recovery CD to put the system back in a working state. D. Simply uninstall any new software.
C. Use the Windows Recovery Console with the Windows Recovery CD to put the system back in a working state.
500
Which of the following types of batteries are used by toys and watches? A. Silver oxide B. Zinc-air C. Lead-acid D. Silver lead
A. Silver oxide
500
DAILY DOUBLE *****************************************************************1500 PTS TOP Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ? A. Hashing B. Symmetric C. Asymmetric D. Numeric
C. Asymmetric
500
QUESTION 35 Which of the following display standards provides four times more pixels than an 800 x 600 display? A. SXGA B. SXGA+ C. SVGA D. UXGA
D. UXGA