d. Netsh
C:\windows\system32\slmgr.vbs –ato
16.
An
IPv4 address consists of _______ bits.
a. 4
b. 8
c. 32
d. 64
17.
The
number of addresses in a class C block is?
a. 10000
b. 12000
c. 256
d. 100
18.
Loopback
address in IPV6?
a. 00:11
b. ::1
c. 1
d. 127.0.0.1
19.
Which
of the following data center type provide maximum uptime?
a. Tier0
b. Tier1
c. Tier2
d. Tier4
20.
Which
RAID types use parity for data protection?
a. RAID 11
b. RAID 0
c. RAID 12
d. RAID 5
21.
What
is the minimum number of disks required for RAID1?
a. 1
b. 2
c. 4
d. 5
22.
Which
statement(s) about IPv6 addresses are true?
a.
Leading
zeroes are required
b.
Two colons (::) are used to represent successive
hexadecimal fields of zeros.
c.
Two
colons (::) are used to separate fields.
d.
None
of the above
23.
Which
file system provides you quota and security?
a.
NTFS
b. FST
c. FAT
d. FAT32
24.
DHCP
(dynamic host configuration protocol) provides _____ to the client.
a) IP address
b) MAC address
c) url
d) none of the mentioned
25.
DHCP
is used for
a) IPv6
b) IPv4
c) both (a) and (b)
d) none of the mentioned
26.
Which
of the following server is required to resolve Server name into IP and
vice-versa?
a. WDS
b. DNS
c. FTP
d. IP SERVER
27.
Which
of the following disc type will be used for 10TB HDD drive?
a. MBR
b.
GPT
c. SSD
d. SCSI
28.
What
must be installed before you install the DFS service on a server to create a
domain based DFS namespace?
A.
WSUS
B.
File Services
C.
WSRM
D.
WDS
29.
Which
of the following local groups is added on a file server to enable a user at a
remote site to take manual backups of a file server once a week to a
removable USB 2.0 device, that will be then transported by courier to your
organization’s head office location?
A.
Remote Desktop Users
B.
Administrators
C.
Backup Operators
D.
Power Users
30.
Mukesh
works in a company that has an AD DS forest that consists of a forest root
domain plus five domains. He should create a group that contains 70 users who
require access to resources in all six domains. All the user accounts are
located in the forest root domain. Which of the following group scope he
should use?
A. Universal
B. Domain local
C. Local
D. Global
31.
Logical components of Active Directory Domain
Services (AD DS) :
a)
Domain controllers
b)
Read‑only domain controllers (RODC)
c)
Domains
d)
folder
32.
What is FSMO :
a)
Flexible
single master operations .
b)
Flexible single master output .
c)
Flexible source master operation.
d)
None.
33.
Worm is program or algorithm that :
a)
Replicates
itself automatically.
b)
Does not replicate itself.
c)
Does not infect computer programs.
d)
All
34.
Application
that monitor activity with express permission :
a)
Spyware
b)
Adware
c)
Malware
d)
Spam
35.
Outgoing mail server
:
a)
SMTP
b)
POP3
c)
IMAP
d)
All
36.
Incoming mail servers are (choose two) :
a)
SMTP
b)
POP3
c)
IMAP
d)
exchange
37.
What is FQDN
a)
The DNS Tree structure.
b)
Active Directory replication method.
c)
The complete
domain name.
d)
DNS servers outside of that network.
38.
Forward Lookup Zones:
a)
Resolves
names to IP addresses
b)
Resolves IP Addresses into name
c)
None
d)
All
39.
A firewall is :
a)
The firewall is resistant to attacks
b)
The firewall is the only transit point between
networks
c)
The firewall enforces the access control policy
d)
All
40.
A Proxy Server is a computer program that :
a)
acts as an intermediary between a web browser and a
web server
b)
To give users rapid access to popular web
destinations
c)
to store frequently requested pages
d)
All
41.
IPv4 Minimum packet size:
a)
576 bytes
b)
1280 bytes
c)
1024 bytes
d)
None
42.
IPv6 Allocate __ bits for internal subnetting :
a)
45
b)
48
c)
16
d)
64
43.
In RODC the changes to Active Directory objects are
a)
Possible
b)
Not possible
44.
The data link layer consists of two sub-layers which
are (choose2):
a)
Media Access
Control (MAC)
b)
Logical Link
Control (LLC)
c)
Transmission Control Protocol (TCP)
d)
User Datagram Protocol (UDP)
45.
Ethernet (IEEE 802.3) and Wireless networks (IEEE
802.11) are the commonly used ___ technologies
a)
LAN
b)
WAN
c)
MAN
d)
None
46.
A dynamic disk does not have a partition table
a)
True
b)
False
47.
You cannot convert Dynamic back to basic without
erasing all the data
a)
True
b)
False
48.
POST is used for testing, identifying, initialising the RAM, CPU, DMA controllers,
and various components of the chipset.
a)
True
b)
False
49.
User limit in Windows Server 2012 Essentials
Edition :
a)
25
b)
15
c)
30
d)
0
50.
Windows Server 2012 Foundation Edition supports
Active Directory Certificate Services
a)
True
b)
False
|