0% found this document useful (0 votes)
49 views

ACHIEVEMENT TEST REVIEWER10 Ict Css

1. This document contains 50 multiple choice questions about various IT topics such as Active Directory, Group Policy, DHCP, maintenance procedures, backup strategies, troubleshooting common issues, and disk maintenance and optimization tools in Windows. 2. The questions cover topics like the functions of Active Directory components, Group Policy administration, DHCP server configuration and scopes, different types of maintenance procedures, reasons for backups, potential computer issues and solutions, malware risks, and how to use the Check Disk and Disk Defragmentation utilities. 3. Answering the questions would test knowledge of fundamental IT administration concepts and tasks like managing user and system policies, networking configuration, issue diagnosis and resolution, data protection, and disk maintenance best practices.

Uploaded by

Hei Dee
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

ACHIEVEMENT TEST REVIEWER10 Ict Css

1. This document contains 50 multiple choice questions about various IT topics such as Active Directory, Group Policy, DHCP, maintenance procedures, backup strategies, troubleshooting common issues, and disk maintenance and optimization tools in Windows. 2. The questions cover topics like the functions of Active Directory components, Group Policy administration, DHCP server configuration and scopes, different types of maintenance procedures, reasons for backups, potential computer issues and solutions, malware risks, and how to use the Check Disk and Disk Defragmentation utilities. 3. Answering the questions would test knowledge of fundamental IT administration concepts and tasks like managing user and system policies, networking configuration, issue diagnosis and resolution, data protection, and disk maintenance best practices.

Uploaded by

Hei Dee
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 51

ACHIEVEMENT TEST REVIEWER

GRADE 10
1. A database used to store users information,
computer information, printers...etc.
a. Active Directory (ADDS) b. Group Policy Unit
c. New Forest d. Domain Controller
• 2. A server responds to security authentication
request that running a windows server OS and
has AD DS.
• a. GMPC b. Domain Controller c. Admin
d. Users
• 3 .Is a collection of one or more domains
which may have one or more trees.
• a. tree b. domain c. forest d.
organizational unit
• 4. Group of objects, such as user accounts,
groups, and computers.
• a. forestb.tree c. domain d.
organizational unit
• 5. Is defined as a logical group of network
objects (computers, users, devices) that share
the same active directory database.
• a. domain b. forest c. tree d.
organizational unit
• 6. Is a group of domains share a common
scheme, linked together by a trust relationship
• a. forest b. tree c. organizational unit
d. domain
• 7. A feature of the Microsoft Windows family
of operating systems that control the working
environment of user accounts and computer
accounts.
• a. ADDS b. user c. group policy d.
client
• 8. Is a network server that automatically
provides and assigns IP addresses, default
gateways and other network parameters to
client devices.
• a. file server b. policy server c. mail server
d. DHCP Server
• 9. Is an interface that enables Active Directory
administrators to manage Group Policy
Objects (GPOs) from one console.
• a. Group Policy Management Console b.
Dynamic Host Configuration Protocol
• c. Active Directory Domain Services d.
All of the above
• 10. Is a tool in Active Directory that installs
and removes Active Directory Domain Services
and promotes domain controller.
• a. tree b. dc promo c. forest d.
domain
• 11. In a _______server, a scope is configured
to determine the address pool of IPs that the
server can provide to DHCP clients.
• a. DCPROMO b. ADDS c. DHCP d.
GMPC
• 12. A DHCP scope is a valid _____ of IP
addresses that are available for assignment or
lease to client computers on a particular
_______.
• a. client, tree b. domain, range c. forest,
domain d.range, subnet
• 13._______ determines which IP addresses
are provided to the clients.
• a. scope b. server c. domain d. client
• 14. A ____ will usually keep the same address
by periodically contacting the _____server to
renew the lease.
• a. GMPC, domain b. HosT, DHCP c.
Client, ADDS d. User, GPMC
• 15._________are leased to a host.
• a. URL b. Client c. Addresses d.
Domain
• 16. Group Policy can be used not to define
user, security and networking policies at the
machine level.
• a. true b. false c. maybe d.
none
• 17. Write a GPO Name and click OK. Click on
the created GPO, checked Link Enabled
• a. true b. false c. maybe d. none
• 18. Group Policy can be used to create,
security and policies at the server level.
• a. true b. false c. maybe d.
none
• 19. GPMC is a Feature in Windows Server
2008.
• a. true b. false c. maybe d.
none
• 20. Follow the series of steps provided in the
wizard, choose use existing domain forest.
• a. true b. false c. maybe d. none
• 21.Is a device that connects printers to client
computers over a network.
• a. print server b. file server c. mail
server d. Policy server
• 22. Are used together to redirect the path of
local folders (such as Document folder) to a
network location,while caching the contents
locally for increased spedd and availability.
• a. folder files b. Folder redirection c.
Network files d. Sharing files
• 23.Is a computer attached to a network that
provides a location for shared disk access.
• a. print server b. file server c.
Network server d. Shared server
• 24. Is an application protocol that used over
an Ip network to manage and access the
distributed directory information.
• a.LDAP b.L2TP c.PPTP
d.PPP
• 25. Is a domain controller that stores a copy of
all Active Directory objects in a forest.
• a. GPO b. global catalog c.Attributes
d.objects
• 26. Is task performed to identify, isolate and
rectify a fault so that the failed equipment or
system can be restored to an operational
condition within the tolerances or limits.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 27. Described as maintenance of equipment or
systems before fault occurs. It can be divided
into two subgroups: Planned Maintenance and
Conditioned-Based Maintenance.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 28. Is any variety of scheduled maintenance to
an object or item of equipment.
• a. Condition Based Maintenance b.
Planned Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 29 Is a maintenance strategy that uses the
actual condition of the asset to decide what
maintenance needs to be done.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 30. Includes tests, measurements,
adjustments, and parts replacement,
performed specifically to prevent faults from
occurring.
• a. Preventive maintenance b.
Maintenance Procedure
• c. Planned maintenance d. Condition
Based Maintenance
• 31. Check the computer and remove any
malware that you will find. On Windows
computers, try resetting the network
connection. Reboot the computer if necessary.
• a. Network Downtime b. Computer
Firewall Malfunctions
• c. Computer Glitches d. IP Address
Conflicts
• 32. Ensure your wired or wireless network
hardware is switched on and plugged in.
• a. Computer Firewall Malfunctions b. IP
Address Conflicts
• c. Unplugged Network Cable d.
Outside Wireless Signal Range
• 33. Are a way to protect the investment in
data. By having several copies of the data, it
does not matter as much if one is destroyed.

• a. Usage Issue b. Back up issue


• c. Warning issue d. Warranty issue
• 34. Customer's claim for repair or replacement
of, or compensation for non-performance or
under-performance of an item as provided for.

• a. Usage Issue b. Back up issue


• c. Warning issue d. Warranty issue
• 35. All programs on the computer run slowly.
• a. Computer issue b. Warning issuec.
Usage issue d.malware issue
• 36. Is a problem from the standpoint of
blocking fan vents, or, if deep enough, actually
insulating parts, causing overheating, but
unless it contains substantial amounts of
corrosive or conductive material.
• a. warning issue b. Dust issue c. Usage
issue d. All of the above
• 37. A malfunction within the electronic circuits
or electromechanical components (disks,
tapes) of a computer system. Recovery from a
hardware failure requires repair or
replacement of the offending part.
• a. Malware issues b. Hardware issues c.
Warning issue d. All of the above
• 38. any software intentionally designed to
cause damage to a computer, server, client, or
computer network.
• a. Malware issues b. Hardware issues c.
Warning issue d. All of the above
• 39. Is a Command Prompt command used to
check a hard drive or other disk drive for
errors and repair them if possible.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.all of the
above
• 40. Is the process of Files become fragmented
when data is written to disk, and there is not
enough contiguous.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.all of the
above
• 41. Is the process of backing up the operating
system, files and system-specific
useful/essential data.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.all of the
above
• 42. Is a utility in Microsoft Windows designed
to increase access speed by rearranging files
stored on a disk to occupy contiguous storage
locations.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.Disk
Defragmenter
• 43. Click ________ and on the search and run
bar type
• a. start menu b. disk c.chkdsk
d.all of the above
• 44. Type in ___ to open the Command Line
Interface.
• a. start menu b. CMD c.chkdsk
d.all of the above
• 45. On the command prompt type in
“________” to run Check Disk and allow the
setting to run.
• a. start menu b. CMD c.CHKDSK
d.all of the above
• 46. Click start menu, select All Programs,
choose Accessories, then select _________.
• a. start menu b. system tools
c.process d.all of the above
• 47. From the system tools, select
Disk_________.
• a. defragmenter b. system tools
c.process d.all of the above
• 48. Operate the Disk Defragmenter
• *Choose the _____you want to
Defragment.
• a. defragmenter b. disk c.process
d.all of the above
• 49. Then, click _________.
• a. defragmenter b. system tools
c.process d. analyze disk
• 50. After the analysis, select Defragment Disk
to run the defragmentation __________.
• a. defragmenter b. system tools
c.process d. analyze disk

You might also like