You are on page 1of 12

NT1110 Final Exam 1. An example of something a user knows used for authentication is a __________.

(1 point) retina scan thumbprint PIN signature 2. Biometrics is used to authenticate based on _______________________. (1 point) something you know something you are something you have something you do 3. Which file system provides the most features? (1 point) FAT FAT16 FAT32 NTFS 4. Which BIOS option allows you to choose the DVD drive as the first boot device? (1 point) Advanced Boot sequence Memory configuration Processor 5. Match the motherboard parts with the letters on the picture (10 points)

PCI Express slots PCI Slots North Bridge CPU Socket 775 SATA Connectors

a. H b. F c. B d. G e. L f. A g. M h. D i. E

South Bridge DDR2 DIMM Memory Slots IDE Connector ATX Power Connector Back panel connectors

j. O

6. Typically, each sector of a magnetic hard disk stores __________ bytes of data (1 point) 8K 2K 1K 512 7. PATA drives are identified as _________________________. (1 point) primary only primary and secondary secondary only shadow drives 8. Sectors in a hard disk are organized into concentric circles called __________. (1 point) grooves lands tracks platters 9. Match the terms with their correct meaning (7 points) LAN OSI Model Networking FTP a. network that operates over a small geographic area; bandwidth is usually higher, like 100Mbps or 1000Mbps b. the protocol required for use of the Internet c. contains 7 layers to help simplify understanding of networking and standardize the development of equipment for networking d. network that operates over a large geographic area; bandwidth is usually slower, like 1.44 Mbps or 128 kbps.

TCP/IP WAN Bandwidth

e. connects computers over networks for the purpose of file transfer f. the theoretical data capacity of a network g. two or more computers connected together for the purpose of communicating and sharing resources

10. Which of the following is not a Linux distribution? (1 point) PCnix Red Hat SuSE Ubuntu 11. Mini applications that provide a variety of services, such as connecting to the Internet to access weather updates, are called __________. (1 point) applicons gadgets sidebars windowizers 12. DDR SDRAM performs __________ transfer(s) per clock cycle (1 point) 8 4 2 1 13. This code/program uses beep codes to report hardware errors. (1 point) Windows XP Device Manager CMOS POST Boot loader 14. Which permission is needed to access and run programs?

(1 point) List Modify Read and execute Write 15. This type of memory is used in notebook computers. (1 point) SIMM SIPP DIMM SODIMM 16. This type of memory loses its data when power is turned off. (1 point) RAM ROM Hard Disk CMOS 17. Sending an email that tricks a user into providing personal information is a form of _______________. (1 point) baiting phishing pretexting Trojan horsing 18. A firewall that protects against malicious traffic inbound and outbound is called a/an __________ firewall. (1 point) one-way two-way

pass through filtering 19. Files encrypted with EFS cannot be opened by ________________________. (1 point) the user who encrypted them EFS key holders administrators guest users 20. This technique is used to transfer data directly from the hard disk to memory (1 point) DMA PIO IDE SATA 21. Which is not a Windows account level? (1 point) Administrator Guest Limited Supervisor 22. Eliminating passwords and other user information at shutdown is accomplished using (1 point) auditing clearing the Virtual Memory Pagefile taking object ownership the primary administrator account 23. Which graphical interface is used to explore the file system? (1 point)

Windows Explorer Internet Explorer Control Panel Command prompt 24. This operating system can be freely downloaded. (1 point) Linux Mac OS X Windows XP Windows Vista 25. Where does the CMOS power come from when a computer is off? (1 point) A battery CMOS does not need power. The CMOS chip powers itself from a residual charge Power supply keep-alive circuit 26. To lock a computer, _____________________________________. (1 point) press Ctrl Alt Del and select Lock Computer type LOCK in a command prompt window leave the computer unattended for 15 minutes hold the L key down for 10 seconds 27. Which file system is used on a floppy disk? (1 point) NTFS NFS FAT

FAT32 28. Which operating system requires the fastest processor? (1 point) Windows 2000 Windows XP 32-bit Windows XP 64-bit Windows Vista 29. Where are important system configuration parameters stored? (1 point) BIOS CMOS Hard disk Boot sector 30. Which operating system has the largest market share? (1 point) DOS Linux Mac OS X Windows 31. A program that examines data packets on the network and either blocks them or allows them is called a __________. (1 point) firewall malware scanner biometric scanner network filter 32. Which is not a form of wireless protection?

(1 point) WEP WPA WPA2 SSL 33. After power is turned on by the user, BIOS runs tests via __________. (1 point) CMOS routines hard disk POST boot sector code 34. Which of these is not a BIOS security feature? (1 point) BIOS password Chassis intrusion Over-temperature limit Boot sector protection 35. The first instructions to execute when the computer is turned on are in the __________. (1 point) BIOS CMOS hard disk boot sector 36. Which is not a way that POST indicates an error? (1 point) Beep code Error message on monitor

Hex error code Log file on the hard disk 37. Which is not a type of dynamic memory? (1 point) SRAM SDRAM DDR SDRAM DDR2 SDRAM 38. This type of memory keeps its data when power is turned off and may not be altered (1 point) RAM ROM Hard disk CMOS 39. This type of memory can detect and correct errors. (1 point) ECC Parity Non-parity SDRAM 40. This type of BIOS can be upgraded via software. (1 point) RAM Flash ROM DRAM 41. The starting point for adjusting hardware and user interface settings is __________. (1 point) Internet Explorer My Computer

Control Panel the command prompt 42. Which type of memory frequently needs to be refreshed? (1 point) Static Dynamic ROM EEPROM 43. Todays system BIOS resides on which of the following? (1 point) RAM ROM PROM EEPROM 44. Viewing local and network drives is accomplished with which graphic utility? (1 point) Internet Explorer My Computer Control Panel Command prompt 45. This file system supports the use of EFS (1 point) FAT12 FAT16 FAT32 NTFS 46. Which of the following is used to encrypt an entire hard disk? (1 point)

EFS NTFS BitLocker Local Audit Policy 47. Primary and secondary hard disk drives are identified as __________ drives (1 point) PATA SATA RAID Host 48.

You might also like