Long Test css11
Long Test css11
I. Multiple Choice. Read and understand each item carefully. Write the letter of the correct answer
on space provider. (2pts each)
1. __________ checks the integrity of files and folders on a hard drive by scanning the file system.
a. Defrag
b. System file checker
c. Scandisk
d. Disk Cleanup
2. __________ tests the integrity of circuits and the quality of electricity in computer components.
a. Digital multimeter
b. Loopback adapter
c. Toner probe
d. Network tester
3. A _______________ is a set of steps to guide you through what needs to be done to thoroughly test the installation. It is designed
to help you work more effectively and to make sure you test everything that needs testing.
a. Test procedure
b. Defragmentation
c. Stress testing
d. Documentation
4. It is a non-functional form of testing which validates system against heavy network traffic, underclocking, overclocking, and
maximum request for resource utilization. It is also called ‘endurance testing’.
a. Defragmentation
b. Documentation
c. Stress testing
d. Test procedure
33
5. Adding more ______________ will help your computer system’s speed.
a. CPU
b. ROM
c. BIOS
d. RAM
6. A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution,
and other secure network services between two networked computers is known as:
a. TFTP
b. SSH
c. Telnet
d. RDP
7. Which of the following statements is correct regarding the functions of OSI model and TCP/IP protocols?
a. The network layer is responsible for path determination and logical addressing
b. The transport layer controls access to the physical media
c. TCP and UDP are network layer protocols
d. TCP and UDP are transport layer protocols
8. Which of the following statements is true regarding the operation of a transparent bridge (switch)?
a. The bridge learns destination mac addresses from frames and places them in the bridging table so that frames may be sent to the
correct port and filtered from others.
b. The bridge learns source mac addresses and places them in the bridging table so that frames may be sent to the correct port and
filtered from others.
c. The last unicast frame in a traffic flow must be flooded by the bridge.
d. Broadcast frames are filtered by default on transparent bridges.
9. Select the advantages of a LAN:
a. Initial setup is expensive.
b. Software & files can be shared
c. Peripherals can be shared
d. It is easily expandable
10. Which command is used to determine if an IP access list is enabled on a particular interface?
a. Show access-lists
b. Show IP interface
c. Show interface
d. Show interface access-lists
11. If you want to network computers far from each other how are you going to network the computers?
a. Use a repeater or extender
b. Use CAT6 cable to enhance connectivity
c. Use a wireless router
d. Use a server-based connection
12. After configuring the network interface card, how will you test the connectivity of your network?
a. PING the connection to check the network connectivity
b. Use a VLAN software to perform the test
c. Type IPCONFIG/ALL to check connectivity
d. Press start, all programs, network testing
13. You want to test the connection between a PC-to-PC network. How are you going to do this?
a. Check the cable if connected to both computer NICs
b. Test the circuitry of the network
c. Use net groper in this testing method
d. Use a crossover cable in connecting two computers
14. How are you are going to set or configure a network?
a. Change workgroup name and computer name; change IP address for all computers.
b. Workgroup name should not be identical to process the network.
c. There should be a DNS in each computer.
d. Activate the DHCP addon.
15. You would want to stress test your computer’s temperature, how are you going to perform this operation?
a. Overclock your CPU to test the temperature.
b. Undervolt the computer in the BIOS.
c. Use same voltage and clocks.
d. Use an application software from the internet.
1. FDISK: -
3. Format: -
4. ScanDisk or CHKDSK–
5. Defragmentation: