CSS Knowledge
CSS Knowledge
1. ___________ is a network cable where one end is T568-A while the other is T568-B
Configuration.
a. Straight-thru
b. Roll-over
c. Cross-over cable
d. Extreme Feedback
4. What enables users of Windows that correct any problems preventing from booting up
normally?
a.Safe mode
b.IPConfig
c.Task Manager
d.Disk cleanup
5. A utility tool that test whether a particular host is reachable across an IP Network.
a. Netstat
b. Dxdiag
c. Ping
d. Tracer
7. A single physical hard drive can divide into multiple _______ Hard drives.
a.Single
b.Boot
c.Logical
d.Local
10. What is the common color for the USB 3.0 connector Standard A receptacles and
plugs?
a.Black
b.Red
c.Blue
d.White
13. What is the volt rating of the RED wire in a power supply?
a.-5V
b.-12V
c.+5V
d.+12V
14. What is the minimum requirement for hard disk drive capacity in Windows 10?
a.20 GB for 32-bit OS or 30 GB for 64-bit OS
b.30 GB for 32-bit OS or 40 GB for 64-bit OS
c.20 GB for 32-bit OS or 40 GB for 64-bit OS
d.16 GB for 32-bit OS or 20 GB for 64-bit OS
15. In windows 7, when LAN connection has a cross and red indicator signifies that there
is _______.
a.Emergency that needs attention
b.LAN update
c.Problem with the LAN driver
d.Virus in the LAN
16. What are the two types of interface use to communicate between the hard drive and
the computer motherboard?
a.Parallel Advance Technology Attachment (PATA) and Industry Standard Architecture
(ISA)
b.Advanced Technology Attachment (ATA) and Serial Advanced Technology
c.Advanced Technology Attachment (ATA) and Parallel Advanced Technology
d.Industry Standard Attachment (PATA) and Industry Standard Architecture (ISA)
17. _______ is a two or more PCs are connected and share resources without going
through a separate server computer.
a.Peer to Peer network
b.Client Server
c.Local Area Network
d.Personal Area Network
18. Which of the following hardware components can connect over a computer network?
a.Network Module Card
b.Network Driver
c.Network Hardware Card
d.Network Interface Card
19. What Starts up recovery options in a computer that essentially RECOVERY partition
of the main hard drive?
a.Safe Mode
b.System Restore
c.Command prompt
d.Repair Computer
20. What services in Windows Server that enables administrator to migrate data to a
lower-cost and tape media on file servers?
a.Remote Storage Service
b.File Screening Service
c.Data Compression Service
d.Volume Shadow Copy Service
21. What Application group that contains a Client Access Point and with at least one
application specific resource?
a.Virtual Cluster Server
b.Cluster resource
c.Active node
d.Cluster
22. What type of memory used in the Solid State Drive (SSD) as a storage?
a.Read Only Memory (ROM)
b.Static Random Access Memory (SRAM)
c.Flash Memory
24. What IP address used by the virtual machine to communicate over the physical
network?
a.Provider Address
b.Private Address
c.Customer address
d.Internet Address
25. It occurs when an attacker or trusted insider steaks data from a computer system and
demands compensation for its return.
a.Malicious code
b.Information extortion
c.Threat
d.Theft
26. __Consist of the user matrices, and capability tables that govern the rights and
privileges of users.
a.Systems Management
b.Statement of Policy
c.Systems-Specific Policy
d.Access control list
27. It monitors the initial security accreditation of an information system for tracking of
changes.
a.Configuration Management
b.Network Monitoring
c.Measurement and Metrics
d.Continuous Assessment
28. What type of version that protects unauthorized network access by utilizing a set-up
password?
a.Wi-Fi Protected Setup (WPS)
b.WPA2-Enterprise
c.Temporal Key Integrity Protocol (TKIP)
d.WPA2-Personal
29. A computer program use to prevent, detect, and remove possible threats to the
system.
a. Scandisk Software
b. Anti-Virus Software
c.Defragment software
d.Direct Software
1. What IP address used by the virtual machine to communicate over the physical
network?
a.Internet Address
b.Provider address
c.Private Address
d.Customer address
2. _____ is used to store the user documents with a large amount of memory and storage
space.
a.Mail Server
b.Print Server
c.File server
d.Application Server
7. What is the minimum hardware requirements of the computer RAM, for Windows 10?
a.1 gigabyte (GB for 32-bit or 2 GB for 64-bit
b.1 gigabyte (GB for 32-bit or 4 GB for 64-bit
c.4 gigabyte (GB for 32-bit or 4 GB for 64-bit
d.2 gigabyte (GB for 32-bit or 2 GB for 64-bit
9. What Recovery Console Commands that writes a new master boot record on the hard
disk drive?
a.Bootrec
b.fixmbr
c.Bmrui
d.Chkdsk
12. What is the volt rating of the YELLOW wire in a power supply?
a.-5V
b.-12V
c.+5V
d.+12V
13. Port _________is an application of network address translation (NAT) that redirects a
communication request from one address and port number combination to another.
a.Request
b.Forwarding
c.Evaluation
d.Standard
14. The Recovery Console Command that examines the volume for errors and repairs it.
a.Bootrec
b.Bootcfg
c.Chkdsk
d.Mbr
15. Light Emitting Diode (LED) in Network Interface Card (NIC) has ______ Lights.
a.3
b.4
c.2
d.1
16. What is the physically damage cluster of storage on the hard drive?
a.GUID Partition Table
b.Bad sector
c.Master Boot Record (MBR)
d.Volume
17. Who is assign to monitor the network security, operation and network users?
a.Encoder
b.End-User
c.Network Administrator
d.Network Technician
18. What storage device should replace if frequent error messages appear while moving
files and booting up operating system?
a.Hard Disk
b.Random Access Memory
c.Flash drive
d.Optical Drive
20. It occurs when two or more devices connected with the same IP address in a
computer network.
a.Static IP Address error
b.Dynamic IP Address conflict
c.Private IP Address error
d.IP Address conflict
21. What feature in Windows Server provides the ability to migrate workloads between a
source and target cluster?
a.Live Migration
b.Failback
c.Failover
d.Shared storage
22. What log files that record performance statistics based on the various performance
object and instances available in Performance Monitor?
a.Counter Logs
b.View Log File Data
c.Circular Logging
d.Linear Logging
23. What is the alternative for wired connection that uses radio frequencies to send
signals between devices and a router?
a.Wireless Fix
b.Wireless Firmware
c.Wireless Fidelity
d.Wireless Router
24. What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?
Question 24Answer
a.Metropolitan Area Network
b.Campus Area Network
c.Wide Area Network
d.System Area Network
26. In Server 2008, Local Area Network (LAN) connection icon in a yellow color
indicator it is signifies______?
a.Update
b.Virus
c.Driver problem
d.No Connectivity
28. What type of version that verifies network users through a server and requires a more
complicated setup, but provides additional security?
a.Wi-FI Protected Setup (WPS)
b.WPA2-Personal
c.Temporal Key Integrity Protocol (TKIP)
d.WPA2-Enterprise
29. What windows update that downloads and install latest version?
a.Fully automatic
b.Semiautomatic
c.Full updates
d.Check update
30. A Yost cable, Cisco cable, and a Console cable also known as __________.
a.Cross-over
b.Straight-Thru
c.Roll-over
d.Extreme
CSS Knowledge-Based SET-C
6. What log files that conserves disk space by ensuring that the performance log file will
not continue growing over certain limits?
a.Circular Logging
b.Counter Logs
c.Linear Logging
d.View Log File Data
8. ______ allows to define a list of devices and only allow those devices on WI-FI
network.
a.Service Set Identifier
b.Wireless Security
c.MAC Address Filtering
d.Wired Equivalent Privacy
9. The network security standard that tries to make connections between a router and
wireless devices faster and easier.
a.WPA2-Enterprise
b.WPS
c.TKIP
d.WPA2-Personal
10. A progress of scanning, identifying, diagnosing and resolving problems, errors and
bugs in software.
a.Software diagnostic
b.Software Troubleshooting
c.Testing
d.Debugging
11. What second clustering technology provides by corresponding client requests across
several servers with replicated configurations?
a.Quick Migration
b.Cluster quorum
c.Network Load Balancing
d.Hyper-V Virtualization
14. What technique use to gain unauthorized access to computers, wherein the intruder
sends messages with a source IP address?
a.Spam
b.Spyware
c.Sniffers
d.Spoofing
16. ____ Allows users to move around the coverage area in a line of sight while
maintaining a network connection.
a.Campus Area Network
b.Local Area Network
c.Wireless Local Area Network
d.Wide Area Network
17. What windows edition as a program capable of restricting other users to access
certain programs in a computer?
a.Windows basic
b.Windows Extreme
c.Windows Ultimate
d.Windows Professional
18. A ___________ should be upgraded to received and transmit strong signals to and
from other computers.
a.Video Card
b.Network Card
c.Sim Card
d.Memory Card
19. What is the problem of a computer if the time and date keeps on resetting even after
fixing in the BIOS?
a.Flash Memory failure
b.System cashing
c.CPU Overheating
d.CMOS battery failure
20. It is used as a substitute for actual disc, allowing users to run software without having
to loa a CD or DVD.
a.CMD File
b.Hyberfil File
c.Bootsys File
d.ISO file
21. It enables administrators to define the types of file that can save within a Windows
volume and folder.
a.File Screening
b.File Compression
c.File Classification Infrastructure
d.File Encryption
22. What type of network that connects through signals, e.g. infrared?
a.Wired Equivalent Privacy
b.Campus Area Network
c.Local Area Network
d.Wireless Security
26. What command-line tool used to find IP addresses that corresponds to a host or
domain name?
a.Tracert
b.NSlookup
c.Ping
d.Ms DOS
27. A protocol that provides quick, automatic, and central management for the
distribution of IP addresses within a network.
a.Dynamic Host Control Protocol (DHCP)
b.Simple Mail Transfer Protocol (SMTP)
c.Transmission Control Protocol (TCP)
d.Domain Name System (DNS)
28. What is the maximum cable length for USB 3.0 using a non-twisted pair wire?
a.5 meters
b.4 meters
c.10 meters
d.3 meters
29. A tool used for checking the condition of the hard drive with signs like “Good”.
“Caution” or “Bad”.
a.Scandisk
b.Defragmented
c.Disk Management
d.Crystal Disk Info
30. A type of server that allows the central administration and management of network
users and network resources.
a.Database Server
b.Directory Server
c.Application Server
d.File Server
2. Which of the following is a term for the main patch panel that links to every
telecommunication room inside the building?
a.Vertical cross-connect
b.Multiplexer
c.Lead extension
d.Major distribution line
7. Which of the following displays the measures and various real-time statistics on the
system’s performance?
a.Counter Monitoring
b.View Current Activity
c.Counter Logs
d.View Log File Data
10. ______ defined as a structured network cabling system standards for commercial
buildings, and between buildings in campus environments.
a.ANSI/TIA-567
b.ANSI/TIA-587
c.ANSI/TIA-568
d.ANSI/TIA-566
11. An enclosed or semi-enclosed channel that protects, routes and hides cables and
wires.
a.Panel
b.Holder
c.Rack
d.Raceway
12. A material that slid before crimping both ends of a patch cable and acts to reduce
strain in a cable.
a.Protector
b.Ring
c.Boot
d.Shield
13. Which of the following commands used to certify the peer name resolution in Active
Directory?
a.DCPROMO
b.DNSCMD
c.FORMAT
d.NSLOOKUP
15. What test verifies the operation of communication device by sending and receiving
data from the same port?
a.Data link test
b.Loopback test
c.Routing test
d.Signal test
17. It acts like a border router to connect corporate sites to wired access lines.
a.Product Terminal Equipment (PTE)
b.Virtual Control Equipment (VCE)
c.Customer Premises Equipment (CPE)
d.Network Transfer Equipment (NTE)
19. A network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
a.Media Access Control (MAC)
b.Firewall
c.Gateway
d.Group Policy
26. It facilitates communication between the CPU and other devices in the system.
a.Random Access Memory (RAM)
b.Bus
c.Chipset
d.Basic Input Output System (BIOS)
27. ___________ is used to store the user documents with a large amount of memory and
storage space.
a.Mail Server
b.Application Server
c.File server
d.Print Server
28. In the context of security, _______ is a privilege or assigned permission for the use of
computer data or resources.
a.Exploit
b.Attack
c.Asset
d.Access
29. What type of router that enables an internal network to connect to external network?
a.Edge
b.Forwarding
c.Core
d.Broadband
30. A type of server that occupies a large portion of computing territory between the
database server and end user.
a.Client server
b.File server
c.Application server
d.Directory server
2. What is the traditional method used to access server data and using the server message
block protocol over TCP/IP?
a.System Management Tools
b.File System Monitoring
c.File Resource Manager Tools
d.Windows Folder Sharing
3. What two command-line utilities used to export and import Active Directory Object
Information?
a.Ping.exe and ping /all
b.Csvde and Set-ADComputer
c.AllUsers.ldf and objectclass=user
d.Ldifde.exe and csvde.exe
4. What command-line network utility that displays network connections for TCP and
routing tables?
a.Ping
b.Ipconfig
c.Netstat
d.Connections.txt
6. What is the minimum Random Access Memory (RAM) requirement of Server 2008
R2?
a.1GB
b.4GB
c.2GB
d.512MB
Feedback
9. It ensures that information and programs are changing only in a specified and
authorized manner
a.Security
b.Integrity
c.Availability
d.Confidentiality
10. What type of backup used in hard drive, disc, flash drive and external drive that are
housed on site?
a.Local Backup
b.Full Backup
c.Incremental Backup
d.Differential Backup
11. It is the time lapse between data sent and when received, it can have a big impact on
performance.
a.Cycle
b.Gap
c.Latency
d.Delay
12. set of rules that describe how software and hardware should interact within a
network?
a.Communications protocol
b.Expanding The Network
c.Group Policy
d.Multihomed host
13. Set of rules for transferring files such as text, graphic images, sound, video and other
multimedia files, on the World Wide Web (WWW)
a.Accelerated File Transfer Protocol (AFTP)
b.Simple Mail Transfer Protocol (SMTP)
c.File Transfer Protocol
d.Hypertext Transfer Protocol(HTTP)
15. What is a hardware device that enables to connect serial devices across a network?
a.Register Jack
b.Coaxial Cable
c.Terminal Server
d.Com Port
16. The most current wireless networking standard and can communicate with the older
network standards.
a.802.11g
b.802.11b
c.802.11n
d.802.11a
17. Which of the following electronic components need to discharge electrically before
the replacement of parts?
a.Capacitor
b.Resistor
c.Diode
d.Transistor
18. What attack includes the execution of viruses, worms, Trojan horses, and active Web
scripts with the intent to destroy or steal information?
a.Information Extortion
b.Malicious Code
c.Polymorphic
d.Bot
19. A node in a computer network that allows data to flow from one discrete network to
another.
a.Gateway
b.Router
c.Hub
d.Network Interface Card (NIC)
20. A device that acts as a bridge between wireless clients and wired network is___.
a.Broadband
b.Access Point
c.Router
d.Hub
21. ___is an interface standard for a serial bus for high-speed communications also
referred as Institute of Electrical and Electronics Engineers (IEEE) 1394 interface.
a.Firewire
b.Serial Advanced Technology Attachment (SATA)
c.Universal Serial Bus (USB)
d.Thunderbolt
22. A text based on command used for creating bootable flash drive.
a.Chkdsk
b.Boot
c.Format
d.Diskpart
25. What recovery tool in Windows fixes and scans computer problem that prevents
computer from booting repeatedly?
a.Repair and update
b.Startup Repair
c.Boot sequence
d.Restore Point
27. A logical subnetwork that groups collection of devices from the same network switch.
a.System Area Network
b.Personal Area
c.Virtual Local Area Network
d.Enterprise Private Network
28. What electrical quantities measured when performing continuity testing of twisted
pair cable?
a.Inductance
b.Conductance
c.Resistance
d.Capacitance
29. What type of server that enables large numbers users to exchange information near
instantaneously and formerly known as Internet Relay Chat (IRC) Servers?
a.Directory Server
b.Server Platforms
c.Real-Time Communication Server
d.Proxy Servers