0% found this document useful (0 votes)
60 views6 pages

Reviewer For CSS NC II Written Exam

The document consists of a series of multiple-choice questions related to networking concepts, hardware, and software. Topics covered include network cables, LAN connections, networking devices, security measures, and computer components. It serves as a review guide for individuals preparing for the CSS NC II examination.

Uploaded by

yuniskqxz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views6 pages

Reviewer For CSS NC II Written Exam

The document consists of a series of multiple-choice questions related to networking concepts, hardware, and software. Topics covered include network cables, LAN connections, networking devices, security measures, and computer components. It serves as a review guide for individuals preparing for the CSS NC II examination.

Uploaded by

yuniskqxz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Reviewer for CSS NC II

1. ________ is a network cable where one end is T568-A while the other is T568-B.
a. Cross-over
b. Extreme
c. Roll – Over
d. Straight -Thru
2. In windows 7, when LAN connection has a cross and red indicator signifies that there is ______.
a. Emergency that needs attention
b. LAN update
c. Problem with the LAN driver
d. Virus in the LAN
3. Which of the following hardware components can connect over a computer network?
a. Network Driver
b. Network hardware Card
c. Network Interface Card
d. Network Module Card
4. It is a networking device that forwards data packets between computer networks.
a. Hub
b. Patch panel
c. Router
d. Wireless Access Point (WAP)
5. WI-FI is a trademarked phrase, which means _____.
a. IEEE. 801.11
b. IEEE. 802.11
c. IEEE. 803. 11
d. IEEE. 804.11

6. _______ is a collection of devices connected together in one physical location.

a. Campus Area Network (CAN)

b. Local Area Network (LAN)

c. Metropolitan Area Network (MAN)

d. Wide Area Network (WAN)

7. A type of Network that interconnects multiple local area network.

a. Campus Area Network (CAN)

b. Local Area Network (LAN)

c. Metropolitan Area Network (MAN)

d. Wide Area Network (WAN)


8. A computer program used to prevent, detect and remove possible threats to the systems.

a. Anti- virus software

b. Defragment software

c. Scandisk software

d. Direct software

9. _______ is a two or more PCs are connected and share resources without going through a
separate server computer.

a. Client server

b. Local Area Network

c. Peer to Peer Network

d. Personal Area Network

10. What IP address by the virtual machine to communication over the physical network?

a. Customer address

b. Internet address

c. Private address

d. Provider address

11. What type of version that protects unauthorized network access by utilizing a set-up password?

a. Terminal Key Integrity protocol (TKIP)

b. Wi-Fi Protected Setup (WPS)

c. WPA-2 Enterprise

d. WPA-2 Personal

12. ______________ consists of the user matrices and capability tables that govern the rights and
privileges of users.

a. Access control list

b. Statement of Policy

c. Systems Management

d. Systems Specific Policy


13. It occurs when an attacker or trusted insider steals data from computer system and demands
compensation for its return.

a. Information Extortion

b. Malicious Code

c. Theft

d. Threat

14. It monitors the initial security accreditation of an information system for tracing of changes.

a. Configuration Management

b. Continuous Assessment

c. Measurement and Metrics

d. Networking Monitoring

15. What services in Windows Server that enables administrators to migrate data to a lower- cost
and tape media on file servers?

a. Data Compression Service

b. File Screening Service

c. Remote Storage Service

d. Volume Shadow Copy Service

16. What is the common color for the USB 3.0 connector for Standard A receptacles and plugs?

a. Black

b. Blue

c. Red

d. White

17. What type of memory used in the Solid-State Drive (SSD) as a storage?

a. Dynamic Random Access Memory (DRAM)

b. Flash Memory

c. Read Only Memory (ROM)

d. Static Random Access Memory (SRAM)


18. It is originally, where the BIOS stored in a standard PC.

a. Hard Disk Drive (HDD)

b. Random Access Memory

c. Read Only Memory (ROM)

d. Solid State Drive (SSD)

19. _________________ is complete copy of everything stored on a physical optical disc.

a. Backup file

b. ISO image

c. Memory map

d. Stored File

20. What is the minimum requirement for hard disk capacity in Windows 10

a. 16 GB for 32-bit OS or 20 GB for 64-bit OS

b. 20 GB for 32-bit OS or 30 GB for 64-bit OS

c. 20 GB for 32-bit OS or 40 GB for 64-bit OS

d. 30 GB for 32-bit OS or 40 GB for 64-bit OS

21. Where do Windows device drivers store?

a. Computer

b. Driver and Settings

c. Hardware

d. Registry

22. What is the volt rating of the RED wire in power supply?

a. -5V

b. +5V

c. -12V

d. +12V

23. What is the spider -like interconnection in millions of pieces of information located on computers
around the cyber space?

a. Browser

b. E-commerce
c. Internet of Things (IOT)

d. Worl Wide Web

24. What application group that contains a client access point and with atleast one application
specific resource?

a. Active node

b. Cluster

c. Cluster resource

d. Virtual cluster server

25. A utility tool that test whether a particular host is reachable across an IP network.

a. Dxdiag

b. Netstat

c. Ping

d. Tracer

26. Which of the following keys is not appropriate to enter BIOS setup?

a. F1

b. F2

c. F5

d. F10

27. What enables users of windows that corrects any problems preventing from booting up
normally?

a. Disk cleanup

b. ipconfig

c. safe mode

d. task manager

28. What starts up recovery options in a computer that essentially boot into the RECOVERY partition
of the main drive?

a. Command prompt

b. repair Computer

c. Safe mode

d. System Recovery
29. A single physical hard drive can divide into multiple ______ hard drives.

a. Boot

b. Local

c. Logical

d. Single

30. What are the two types of interface used to communicate between the hard drive and the
computer motherboard?
a. Advanced technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA)

b. Advanced technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)

c. Industry Standard Architecture (ISA) and Advanced Technology Attachment (ATA)

d. Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA)

Structure Network

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy