ACHIEVEMENT TEST REVIEWER10 Ict Css
ACHIEVEMENT TEST REVIEWER10 Ict Css
GRADE 10
1. A database used to store users information,
computer information, printers...etc.
a. Active Directory (ADDS) b. Group Policy Unit
c. New Forest d. Domain Controller
• 2. A server responds to security authentication
request that running a windows server OS and
has AD DS.
• a. GMPC b. Domain Controller c. Admin
d. Users
• 3 .Is a collection of one or more domains
which may have one or more trees.
• a. tree b. domain c. forest d.
organizational unit
• 4. Group of objects, such as user accounts,
groups, and computers.
• a. forestb.tree c. domain d.
organizational unit
• 5. Is defined as a logical group of network
objects (computers, users, devices) that share
the same active directory database.
• a. domain b. forest c. tree d.
organizational unit
• 6. Is a group of domains share a common
scheme, linked together by a trust relationship
• a. forest b. tree c. organizational unit
d. domain
• 7. A feature of the Microsoft Windows family
of operating systems that control the working
environment of user accounts and computer
accounts.
• a. ADDS b. user c. group policy d.
client
• 8. Is a network server that automatically
provides and assigns IP addresses, default
gateways and other network parameters to
client devices.
• a. file server b. policy server c. mail server
d. DHCP Server
• 9. Is an interface that enables Active Directory
administrators to manage Group Policy
Objects (GPOs) from one console.
• a. Group Policy Management Console b.
Dynamic Host Configuration Protocol
• c. Active Directory Domain Services d.
All of the above
• 10. Is a tool in Active Directory that installs
and removes Active Directory Domain Services
and promotes domain controller.
• a. tree b. dc promo c. forest d.
domain
• 11. In a _______server, a scope is configured
to determine the address pool of IPs that the
server can provide to DHCP clients.
• a. DCPROMO b. ADDS c. DHCP d.
GMPC
• 12. A DHCP scope is a valid _____ of IP
addresses that are available for assignment or
lease to client computers on a particular
_______.
• a. client, tree b. domain, range c. forest,
domain d.range, subnet
• 13._______ determines which IP addresses
are provided to the clients.
• a. scope b. server c. domain d. client
• 14. A ____ will usually keep the same address
by periodically contacting the _____server to
renew the lease.
• a. GMPC, domain b. HosT, DHCP c.
Client, ADDS d. User, GPMC
• 15._________are leased to a host.
• a. URL b. Client c. Addresses d.
Domain
• 16. Group Policy can be used not to define
user, security and networking policies at the
machine level.
• a. true b. false c. maybe d.
none
• 17. Write a GPO Name and click OK. Click on
the created GPO, checked Link Enabled
• a. true b. false c. maybe d. none
• 18. Group Policy can be used to create,
security and policies at the server level.
• a. true b. false c. maybe d.
none
• 19. GPMC is a Feature in Windows Server
2008.
• a. true b. false c. maybe d.
none
• 20. Follow the series of steps provided in the
wizard, choose use existing domain forest.
• a. true b. false c. maybe d. none
• 21.Is a device that connects printers to client
computers over a network.
• a. print server b. file server c. mail
server d. Policy server
• 22. Are used together to redirect the path of
local folders (such as Document folder) to a
network location,while caching the contents
locally for increased spedd and availability.
• a. folder files b. Folder redirection c.
Network files d. Sharing files
• 23.Is a computer attached to a network that
provides a location for shared disk access.
• a. print server b. file server c.
Network server d. Shared server
• 24. Is an application protocol that used over
an Ip network to manage and access the
distributed directory information.
• a.LDAP b.L2TP c.PPTP
d.PPP
• 25. Is a domain controller that stores a copy of
all Active Directory objects in a forest.
• a. GPO b. global catalog c.Attributes
d.objects
• 26. Is task performed to identify, isolate and
rectify a fault so that the failed equipment or
system can be restored to an operational
condition within the tolerances or limits.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 27. Described as maintenance of equipment or
systems before fault occurs. It can be divided
into two subgroups: Planned Maintenance and
Conditioned-Based Maintenance.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 28. Is any variety of scheduled maintenance to
an object or item of equipment.
• a. Condition Based Maintenance b.
Planned Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 29 Is a maintenance strategy that uses the
actual condition of the asset to decide what
maintenance needs to be done.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 30. Includes tests, measurements,
adjustments, and parts replacement,
performed specifically to prevent faults from
occurring.
• a. Preventive maintenance b.
Maintenance Procedure
• c. Planned maintenance d. Condition
Based Maintenance
• 31. Check the computer and remove any
malware that you will find. On Windows
computers, try resetting the network
connection. Reboot the computer if necessary.
• a. Network Downtime b. Computer
Firewall Malfunctions
• c. Computer Glitches d. IP Address
Conflicts
• 32. Ensure your wired or wireless network
hardware is switched on and plugged in.
• a. Computer Firewall Malfunctions b. IP
Address Conflicts
• c. Unplugged Network Cable d.
Outside Wireless Signal Range
• 33. Are a way to protect the investment in
data. By having several copies of the data, it
does not matter as much if one is destroyed.