COMPUTER SYSTEMS SERVICING NC 11 Assessment Test
COMPUTER SYSTEMS SERVICING NC 11 Assessment Test
1. What Is the common color for the USS 3.0 connector for Standard A receptacles and plugs?
A. Black
B. Blue
C. Red
D. White
2. What type of memory used in the Solid State Drive (SSD) as a storage?
A. Dynamic Random Access Memory (DRAM)
B. 8. Flash memory
C. Read Only Memory (ROM)
D. Static Random Access Memory (SRAM)
5. What is the minimum requirement for hard disk drive capacity in Windows 10?
A. 16 GB for 32-bit OS or 20 GB for 64-blt OS
B. 20 GB for 32-bit OS or 30 GB for 64-blt OS
C. 20 GB for 32-bit OS or 40 GB for 64-bit OS
D. 30 GB for 32blt OS or 40 GB for 64-bit OS
8. _____ is a network cable where one end is T568-A while the other is T568-B configuration.
A. Cross-Over
B. Extreme
C. Roll-Over
D. Straight-Thru
9. In Windows 7, when LAN connection has a cross and red indicator signifies that there is _____
A. emergency that needs attention
B. LAN update
C. problem with the LAN driver
D. virus in the LAN
10. Which of the following hardware components can connect over a computer network?
A. Network Driver
B. Network Hardware Card
C. Network Interface Card
D. Network Module Card
11. It is a networking device that forwards data packets between computer networks.
A. Hub
B. Patch Panel
C. Router
D. Wireless Access Point (WAP)
15. A computer program used to prevent, detect, and remove possible threats to the system.
A. Anti-virus software
B. Defragment software
C. Scandisk Software
D. Direct Software
16. _____ is a two or more PCs are connected and share resources without going through a separate server
computer.
A. Client Server
B. 8. Local Area Network
C. Peer to peer network
D. Personal Area Network
17. What IP address used by the virtual machine to communicate over the physical network?
A. Customer address
B. Internet address
C. Private address
D. Provider address
18. What type of version that protects unauthorized network access by utilizing a set up password?
A. Temporal Key Integrity Protocol (TKIP)
B. Wi-Fi Protected Setup (WPS)
C. WPA2-Enterprise
D. WPA2-Personal
19. _____ consists of the user matrices, and capability tables that govern the rights and privileges of users.
A. Access control list
B. Statement of Policy
C. Systems Management
D. Systems-Specific Policy
20. It occurs when an attacker or trusted insider steals data from a computer system and demands compensation
for its return.
A. Information Extortion
B. Malicious code
C. Theft
D. Threat
21. It monitors the initial security accreditation of an information system for tracking of changes.
A. Configuration Management
B. Continuous Assessment
C. Measurement and Metrics
D. Network Monitoring
22. What services in Windows Server that enables administrators to migrate data to a lower-cost and tape media on
file servers?
A. Data Compression Service
B. File Screening Service
C. Remote Storage Service
D. Volume Shadow Copy Service
23. What Application group that contains a Client Access Point and with at least one application specific resource?
A. Active node
B. Cluster
C. Cluster resource
D. Virtual cluster server
24. A utility tool that test whether a particular host is reachable across an IP network.
A. Dxdiag
B. Netstat
C. Ping
D. Tracer
25. Which of the following keys is not 1ppropr1ate to enter BIOS setup?
A. F1
B. F2
C. F5
D. F10
26. What enables users of Windows that corrects any problems preventing from booting up normally?
A. Disk cleanup
B. IPconfig
C. Safe mode
D. Task Manager
27. What Starts up recovery options in a computer that essentially boot Into the RECOVERY partition of the main
hard drive?
A. Command Prompt
B. Repair Computer
C. Safe mode
D. System Restore
28. A single physical hard drive can divide into multiple hard drives.
A. Boot
B. Local
C. Logical
D. Single
29. What are the two types of interface used to communicate between the hard drive and the computer
motherboard?
A. Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA)
B. Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)
C. C. Industry Standard Architecture (ISA) and Advanced Technology Attachment (ATA)
D. Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA)
30. What is the spider-like interconnection in millions of pieces of information located on computers around the
cyber space?
A. Browser
B. E-commerce
C. Internet of Things (IOT)
D. World wide web