100% found this document useful (1 vote)
222 views

FOURTH QUARTER EXAM in CSS-G10-2022-2023

This document appears to be a practice exam for a computer systems servicing course. It contains 47 multiple choice questions testing knowledge of topics like securing servers, client-server networks, server hardware, network operating systems, server administration tools in Windows Server, and specific server roles. The questions cover concepts in areas such as security, networking, servers, operating systems, and server management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
222 views

FOURTH QUARTER EXAM in CSS-G10-2022-2023

This document appears to be a practice exam for a computer systems servicing course. It contains 47 multiple choice questions testing knowledge of topics like securing servers, client-server networks, server hardware, network operating systems, server administration tools in Windows Server, and specific server roles. The questions cover concepts in areas such as security, networking, servers, operating systems, and server management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

FOURTH QUARTER EXAMINATION IN T.L.

E/ICT
(Computer System Servicing)
Name: Score:
Year/Section: Date:
Direction: Choose an item that best answers each statement. Write only the letter of your choice in the
space before the number.
1. Assuming that you are the Systems Administrator of the company, what is the best thing you should do
to secure data on the server?
A. Secure backup B. Implement encryption C. Record the data D. Secure anti-virus
2. Which of the following is NOT A CLIENT?
A. Smartphone B. Personal Computer C. Satellites D. Tablet
3. Having the characteristic of being so powerful and expensive machine.
A. CPU B. Personal Computer C. Client D. Server
4. Any process that requests specific services from the server.
A. Mobile Phone B. Client C. Server D. Webpage
5. The following are using server for the clients, EXCEPT:
A. Facebook B. Banks C. Cinemas D. Google
6. Any process that provides requested services from the client.
A. Mobile Phone B. Client C. Server D. Webpage
7. It is a computer used for storing huge datafiles and applications.
A. CPU B. Personal Computer C. Client D. Server
8. Which of the following is the main advantage of client-server network?
A. Supporting a shared database or site to be obtained or updated by many computers.
B. It delivers high performance.
C. feasible for businesses to share information.
D. keeping only one control center for the operation.
9. It is a machine or computer with a basic hardware configuration.
A. Client B. Server C. Tablet D. Mobile phone
10. The illustration below can be described as:

A. Client-server network B. LAN Network C. Computer network D. Networking


11. It is a computer intended for use as a server that built in an upright cabinet that stands alone.
A. Blade Server B. Tower Server C. DNS D. Rack Server
12. Any process where it is automatically assigns an IP address and other information to each host on the
network hence it can communicate efficiently with other endpoints.
A. Active Directory B. Terminal Server C. Mail Server D. DHCP Server
13. It is the Internet's system for converting alphabetic names into numeric IP addresses.
A. DNS Server B. Blade Server C. Open-Source Server D. Telnet Server
14. Acts as an intermediary between the user's computer and the Internet.
A. Print server B. Terminal Server C. Proxy Server D. FTP server
15. The following are SERVER HARDWARES, EXCEPT
A. Tower Server B. Print Server C. Blade Server D. Rack Server
16. It is a server that is called a computer, acts as an intermediary between the user's computer and the
Internet and allows client computers to make indirect network connections to other network services.
A. Proxy server B. DHCP Server C. Active Directory Server D. DNS name
17. It is a program that uses HTTP to serve the files that form Web pages to users, in response to their
requests. A. DNS name B. Proxy server C. Active Directory Server D. DHCP Server
18. It consists of several services that run on Windows Server to manage permissions and access to
networked resources.
A. Active Directory Server B. DHCP Server C. DNS name D. Proxy server
19. It automatically assigns an IP address and other information to each host on the network.
A. DHCP Server B. Active Directory Server C. DNS name D. Proxy server
20. It is a computer system that sends and receives email using standard email services protocols.
A. Mail Server B. Application Server C. Print Server D. Terminal
Server
21. It accepts print jobs from the computers and sends the jobs to the appropriate printers.
A. Print Server B. Terminal Server C. Mail Server D. Application Server
22. a network device that enables connections to multiple client server network systems and connect to a
LAN network. A. Terminal Server B. Mail Server C. Application Server D. Print Server
23. This type of server acts as a set of components accessible to the software developer through a standard
API defined for the platform itself.
A. Application Server B. Print Server C. Terminal Server D. Mail Server
24. It allow users to share resources and files located on their computers and to access shared resources
found on other computers.A. Peer to Peer B. Client/Server C. One to many D. Many to many
25. allow the network to centralize functions and applications in one or more dedicated file servers.
A. Client/Server B. Peer to Peer C. One to many D. Many to many
26. Which of the following is NOT an advantage of Client/Server Network?
A. Maintenance B. Scalability C. Interoperability D. Flexibility
27. The following are considered popular Network Operating Systems EXCEPT:
A. Windows 7 B. Linux/UNIX C. Macintosh OS X D. MS Windows Server
28. It is designed with the sole purpose of supporting workstations, database, application, file and printer
access shared between multiple computers in a network.
A. Operational logic B. Network Operating System C. Network System D. OHS
29. Which of the following is NOT an advantage of Peer to peer Network?
A. Security B. Setup C. Less initial expense D. Decentralized
30. Part of the basic interface that contains tools for systems administrators and advanced users.
A. Administrative tool B. Server manager C. Configuration D. Initial configuration task
31. Part of configuration that helps you to schedule automated task that perform action on specific time or
when certain event occurs.
A. Task Scheduler B. WMI Control C. Local Users and Groups D. Firewall
32. This area includes a table listing installed features on your computer and provides command links to
add and remove features. A. Roles Summary B. Configuration C. Features Summary D. Diagnostics
33. Server Manager console having the lists of roles that are installed in the computer (server) in
alphabetical order. A. Features Summary B. Configuration C. Diagnostics D. Roles Summary
34. Which of the following processor supports Windows Server 2008 R2 version?
A. 64-bit B. 32-bit C. Both 32 and 64-bit D. None of these
35. performs disk -related task such as creating and formatting partitions and volumes and assigning
drive letters. A. Disk Management B. Backup C. WMI Control D. Services
36. It is a tool that enables you to configure WMI settings on a remote or local computer.
A. WMI Control B. Disk Management C. Services D. Backup
37. provides a set of wizards and other tools for you to perform basic backup and recovery tasks for the
server. A. Backup B. Services C. Disk Management D. WMI Control
38. It is an application type that runs in the system background without a user interface.
A. Services B. Backup C. WMI Control D. Disk Management
39. helps you to schedule automated tasks that performs action on specific time or when certain event
occurs.A. Task Scheduler B. Windows Firewall C. Users and Group D. Device Manager
40. It helps you to protect the computers on your network.
A. Windows Firewall B. Users and Group C. Device Manager D. Task Scheduler
41. is a collection of administrative tools that you can use to manage a single local computer or remote
computer.
A. Users and Group B. Device Manager C. Task Scheduler D. Windows Firewall
42. you can use this to install and update the drivers for hardware devices, change the hardware settings
and troubleshoot the problems.
A. Device Manager B. Task Scheduler C. Windows Firewall D. Users and Group
43. It examines how programs you run affect your computer’s performance, both in real time and by
collecting log data for later analysis.
A. Windows Performance Monitor C. Event Viewer
B. Server Manager D. Power Button
44. snap-in that enables you to browse and manage event logs.
A. Event Viewer B. Power Button C. Server Manager D. Windows Performance Monitor
45. It allows you to view a detailed snapshot of the server’s identity information, selected security
configuration options and the installed roles and features.
A. Server Manager B. Event Viewer C. Power Button D. Windows Performance Monitor
46. Stores information about the objects on the network and makes this information available to users
and network administrators.
A. AD DS B. DHCP C. Print Server D. AD CS
47. Provides technologies that help you manage storage, enable file replication and manage shared folders.
A. File Services B. WSUS C. Hyper-V D. AD DS
48. It provides name resolution for TCP/IP networks
A. DNS B. AD RMS C. DHCP D. Web Server
49. Enables you to centrally configure, manage and provide temporary IP addresses and related
information for client computers.
A. DHCP B. AD DS C. DNS D. Print and Documents Services
50. Used to create certification authorities and related role services that allow you to issue and manage
certificate used in the variety of applications.
A. AD CS B. AD DS C. DNS D. DHCP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy