TESDA ANSWER SHEET
1. This is the common color of a 3.0 USB connector. It is the standard Type- A
receptacle and plug.= BLUE
2. A Type of Memory used in the SSD (Solid-State Drive) as Storage.= FLASH
MEMORY
3. Where is the BIOS Stored in a Standard Computer? = READ ONLY MEMORY
4. A complete copy of everything stored on a physical optical disc is commonly
referred to as an = ISO IMAGE OR IMAGE
5. The minimum requirement for storage capacity required for Windows 10
Installation. =
16 GB FOR 32-BIT OS OR 20 GB FOR 64-BIT OS
6. A Windows Location where the device drivers store. = REGISTRY
7. What is the red wire on the PSU's (power supply) voltage rating? = +5
8. is a network cable where one end is T568A while the other
is T568B configuration = CROSS-OVER
9. In Windows 7, when LAN connection has across and red Indicator signifies that
there is
.= PROBLEM WITH THE LAN DRIVER
10.Which of the following hardware components can connect over a computer
network? =
NETWORK INTERFACE CARD
11.It is the networking device that forwards data packets between computer
networks. =
ROUTER
12.Wi-Fi is a trademark phrase, which means . = IEEE.802.11
13. is a collection of devices connected together in one physical location.
= LOCAL AREA NETWORK
14.A type of network that interconnects multiple local area network. =
WIDE AREA NETWORK
15.A computer program used to prevent, detect, and remove possible threats to
the system.
= ANTI-VIRUS SOFTWARE
16. Is a two or more PCs are connected and share resources
without going through a separate server computer. = PEER TO PEER
NETWORK
17.What IP address used by the virtual machine to communicate overthe physical
network?
= PROVIDER ADDRESS
18.What type of version that protects unauthorized network access by
utilizing a set-up password? = WPA2-PERSONAL
19. Consists of the user matrices, and capabilitytables that govern the
rights and privileges of users. = ACCESS CONTROL LIST
20.It occurs when an attacker or trusted insider steals data from a computer
system and demands compensation for its return. = INFORMATION
EXTORTION
21.It monitors the initial security accreditation of an information system
for tracking of changes. = CONTINUOUS ASSESSMENT
22.What services in Windows Server that enables administrators to
migrate data to a low-cost and tape media on fileservers? = REMOTE
STORAGE DEVICE
23.What application group that contains a Client Access Point and with at
least one application specific resource? = VIRTUAL CLUSTER SERVER
24.A utility tool test whether a particular host is reachable across an IP network.
= PING
25.Which of the following keys is not appropriate to enter BIOS setup? = F3
26.Allows a computer to boot up without unnecessary drivers, which makes it
easier to run diagnostics and uninstall unwanted apps. = SAFE MODE
27.What Starts up recovery options in a computer that essentially boot into the
RECOVERY partition of the main hard drive? = REPAIR COMPUTER
28.A single physical hard drive can divide into multiple hard drives. =
LOGICAL
29.What are the two types of interface used to communicate between the hard
drive and the computer motherboard? = ADVANCE TECHNOLOGY
ATTACHMENT (ATA) AND SERIAL ADVANCED TECHNOLOGY ATTACHMENT
(SATA)
30.What is the spider-like Interconnection in millions of pieces of information
located on computers around the cyber space? = WORLD WIDE WEB
31.A compound used to prevent overheating of CPU = THERMAL PASTE
32.What is the maximum cable length for USB 2.0? = 5 METERS
33.What software programs stores into a Read Only Memory (ROM)? = FIRMWARE
34.Disc image is also known as . = ISO IMAGE
35.What is the minimum hardware requirements of the computer RAM, for
Windows 10? =
1 GIGABYTE (GB) FOR 32-BIT OR 2GB FOR 64-BIT
36.An extension of Microsoft management console used to manage
hardware devices including device drivers. = DEVICE MANAGER
37.What is the volt rating of the YELLOW wire in a power supply? = +12V
38.A Yost cable ,Cisco cable ,and Console cable also known as . = ROLL
OVER
39.In server 2008, Local area Network (LAN) connection icon in a yellow
color indicator signifies .= NO CONNECTIVITY
40.Light Emitting Diode (LED) In Network Interface Card (NIC) has lights. = 2
41.Port is an application of network address translation (NAT) the directs a
communication request from one address and port number combination to
another . = FORWARDING
42.What is the alternative for wired connection that uses radio frequencies to
send signals between devices and a router ? = WIRELESS FIDELITY
43. is a computer made up of an interconnection of local area network
(LANs)within a limited geographical area ,e.g. corporate buildings . =
CAMPUS AREA NETWORK
44.What terms applies to the interconnection of LAN in a city into 5 to 50
kilometers ? =
SYSTEM AREA NETWORK
45.Who is assign to monitor the network security ,operation and network users? =
NETWORK ADMINISTRATOR
46. is used to store the user documents with large amount of memory
and storage space . = FILE SERVER
47.What IP address used by the virtual machine to communicate over the
physical network?
= PROVIDER ADDRESS
48.What type of version verifies network users though a server and
requires a more a complicated setup ,but provides additional security?
= WPA2-ENTERPRISE
49. Is a way to identify a specific process to which an internet or
other network message forwarded when it arrives at a server = PORT
NUMBER
50.An automated software program that executes certain commands when
it receive a specific input is . = BOT
51. enable administrators to configure storage thresholds on particular
set of data stored on server NTFS volumes = FILE SYSTEM QUOTA
52.What feature in window Server provides the ability to migrate workloads
between a source and target cluster ? = FAILOVER
53.What log files that records performance statistic based on the various
objects and instances available in Performance monitor ? = COUNTER
LOGS
54.The Recovery Console Command that examines the volume for errors and
repairs it . =
CHKSDSK
55.The computer system is functional if it is = NORMAL BOOTING
56.What kind of windows update lets you downloads and installs latest updates
versions? =
FULLY AUTOMATIC
57.What is the physically damaged cluster of storage on the hard drive ? = BAD
SECTOR
58.It occurs when two or more devices connected with the same IP address in
a computer network . = IP ADDRESS CONFLICT
59.What storage device should replace if frequent error messages appear
while moving files and booting up operating system? = HARD DISK
60.What Recovery Console Commands that writes a new master boot record
on the hard disk drive ? = FIXMBR
61.What is the maximum cable length for UBS 3.0 using a non-twisted
pair wire? = 3 METERS
62.M.2 is a form factor for . = STORAGE DRIVE
63.What kind of chip stores the settings in the BIOS? = REAL TIME
CLOCK/NON VOLATILE RANDOM ACCESS MEMORY (RTC/NVRAM)
CHIP
64.It is used as a substitute for actual disc, allowing users to run without
having to load a CD or DVD. = ISO FILE
65.What Windows edition has a program capable of restricting other users to
access certain program in a computer? = WINDOWS ULTIMATE
66.In what folder that the device can be found? = SYSTEM32
67.An Ideal voltage range on the hotwires of a Molex connector? = RED=
5V,YELLOW= 12V
68.What Ethernet cable used to connect computers to hubs & switches? =
STRAIGHT-THRU
69.A network interface controller also known as . = LAN CARD
70.What class of IP address is 192. 168.0.1? = CLASS C
71.A router that is design to operate in the internet backbone. = CORE
72. allow to define a list of devices and only allow those devices on Wi-Fi
network. =
MAC ADDRESS FILTERING
73.What type of network that connects thought signals, e.g. Infrared? =
WIRELESS PERSONAL AREA NETWORK
74. allows users to move around the coverage area in a line of
sight while maintaining a network connection. = WIDE AREA
NETWORK
75. is an enterprise-level heterogeneous backup and recovery suite.=
NETBACKUP
76.A type of serve that allow the central administrator and management of
network users and network resources. = DIRECTORY SERVER
77. is an information asset suffering damage, unintended modification or
disclosure. =
LOSS
78.The network security standard that tries to make connections between a
router and wireless devices faster and easier. = WPS
79.Which of the following is the most efficient in transferring larger
files? = FILE TRANSFER PROTOCOL
80.What technique used to gain unauthorized access to computers,wherein
the intruder sends messages with a source IP address? = SPOOFING
81.It enables administrators to define the types of file that can save within
a windows volume and folder. = FILE SCREENING
82.What log files that conserves disc space by ensuring that the performance
log file will not continue growing over certain limits? = NETWORK LOAD
BALANCING
83.A should be upgraded to receive and transmit strong signals to and
from other computer. = NETWORK CARD
84.A protocol that provides quick, automatic, and central management for the
distribution of IP addresses within a network. = DYNAMIC HOST CONTROL
PROTOCOL (DHCP)
85.What command-line tool used to find the IP address that corresponds
to a host or domain name? = NSLOOKUP
86.What is the problem of a computer if the time and date keeps on
resetting even after fixing in the BIOS? = CMOS BATTERY FAILURE
87.A tool used for checking the condition of the hard drive with signs like
“Good” “Caution” or “ bad”. = CRYSTALDISKINFO
88.A Task to do after planning to fix the network is . = IMPLEMENTING
THE SOLUTIONS
89.A process of scanning, Identifying, diagnosing and resolving problems,
errors and bugs in software. = SOFTWARE TROUBLESHOOTING
90. is a 24 pin USB connector system with a rotationally symmetrical
connector. =
UNIVERSAL SERIAL BUS (USB) C THUNDERBOLL
91.it facilitates communication between the CPU and other devices in the system.
=
CHIPSET
92.What option in the BIOS/UEFI used to over clock computers = VOLTAGE
BASIC INPUT OUTPUT SYSTEM (BIOS)
93.Minimum byte capacity of a bootable flash drive for Windows 10 is = 8GB
94.What is the minimum RAM requirement of servers 2012 R2? = 512 MB
95.IN Windows 7,Windows update and security is located in = SETTINGS
96.What voltages that ATX12V P1 connector provides for the motherboard? =
3,3V,5V,12V
97. defined as a structured network cabling system standard for
commercial buildings and between buildings in campus
environments. = ANSITA/TIA 568
98.in networking refers to places of related information that are transferred
through a network = CONNECTION
99.What Class of IP addressing is172.168.10.1? = CLASS B
100. What type of router enables an internal network to connect to external
network? =
EDGE
101. What pertain to the maximum data transfer rate of a network for internet
connection?
= BANDWIDTH
102. What type of a high speed network/subnetwork that composed of hosts
and interconnects using a variety of technology/topology? = STORAGE
AREA NETWORK
103. it acts like a border router to connect corporate sites to wired access lines
=
CUSTOMER PREMISES EQUIPMENT (CPE)
104. is a process of recognizing a users identity = AUTHENTICATION
105. A type of server that occupies a large portion of computing territory
between the database server and end user. = APPLICATION SERVER
106. In the context of security is a privilege or assigned permission for the
use of computer data or resources. = ACCESS
107. What media types of 10-megabit Ethernet that compose of broadband
coaxial cable carrying multiple baseband channels for a maximum length of
3,600 meters? = 10BASE-36
108. A network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. = FIREWALL
109. What term used refer when a system is unavailable = DOWNTIME
110. Which of the following commands used to certify the peer name
resolution in Active Directory? = NSLOOKUP
111. What active directory protocol used to access data from a database? =
LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)
112. Which of the following displays the measures and various real time
statistics on the system’s performing? = VIEW CURRENT ACTIVITY
113. What type of peripheral card having media access control address? =
NETWORK INTERFACE CARD
114. Which of the following is a term for the main patch panel that
links to every telecommunication room inside the building? =
VERTICAL CROSS-CONNECT
115. An enclosed or semi-enclosed channel that protects, routes and hides
cables and wires = RACEWAY
116. A material that slid before crimping both ends of a patch cable and
acts to reduce strain in a cable. = BOOT
117. What test verifies the operation of communication device by sending
and receiving data from the same port? = LOOPBACK TEST
118. What networking tool that monitors and intercepts traffic over the
computer network?
= PACKET ANALYZER
119. Resistance reading of an open wire is = INFINITE OHMS
120. is an interface standard for a serial bus for high-speed
communications also referred as institute for Electrical and Electronics
Engineer (IEEE) 1394 interface. = FIREWIRE
121. A microchip to manage data communication between a CPU and a
motherboard. =
INPUT/OUTPUT CONTROLLER HUB
122. A Setup option in Unified Extensible Firmware Interface (UEFI) Basic Input
Output System (BIOS) that allows security settings to perform such tasks as
locating the device.
= LOJACK
123. A text based command used for creating bootable flash drive = DISKPART
124. What is the minimum Random Access Memory (RAM) requirement of
Server 2008 R2? = 512MB
125. In Windows 7, an indicator tells that the video driver has not
installed.= ONLY STANDARD VIDEO IS DISPLAYED
126. A Volt meter reading of a shorted diode. = ZERO VOLT
127. is the purpose of joining two cables ends together. =
CABLE SPLICING
128. What is the hardware device that enables to connect serial
devices across a network? = TERMINAL SERVER
129. What Class of IP addressing is 10.10.10.1? = CLASS A
130. How many device can connect to a wireless router? = 250
131. A device that acts as a bridge between wireless clients and wired network
is .
= ACCESS POINT
132. A logical subnetwork that groups collection of devices from the same
nework switch.
= VIRTUAL LOCAL AREA NETWORK
133. It is the time lapse between data send and when received, it can have a
big impact on performance. = LATENCY
134. which means pushing components to its limit and extremes. =
STRESS TEST
135. What type of server that enables large numbers users to exchange
information near instantaneously and formerly known as Internet Relay Chat
(IRC) Servers? =
REAL-TIME COMMUNICATION SERVER
136. It ensures that information and programs are changing only in a
specified and authorized manner. = INTERGRITY
137. What command-line network utility that displays network connections
for TCP and routing tables? = NETSTAT
138. What set of rules that describe how software and hardware should
interact within a network? = COMMUNICATIONS PROTOCOL
139. What attack includes the execution of viruses, worms, trojan horses, and
active Web scripts with the intent to destroy or steal information? =
MALICIOUS CODE
140. Set of rules for transferring files such as text. graphic images, sound,
video and other multimedia files, on the World Wide Web (WWW). =
HYPERTEXT TRANSFER PROTOCOL (HTTP)
141. What is the traditional method used to access server data and using
the server message block protocol over TCP/IP? = WINDOWS FOLDER
SHARING
142. What two command-line utilities used to export and import Active
Directory object information? = LDIFDE.EXE AND CSVDE.EXE
143. A node in a computer network that allows data to flow from one discrete
network to another. = GATEWAY
144. What electrical quantities measured when performing continuity
testing of twisted pair cable? = RESISTANCE
145. What types of backup used in hard drive, disc, flash drive and external
drive that are housed on site? = LOCAL BACKUP
146. What recovery tool in windows fixes and scans computer problem
that prevents computer from booting repeatedly? = STARTUP REPAIR
147. used to run commands for troubleshooting unbootable operating
system.
= WINDOS RECOVERY ENVIRONMENT
148. Which of the following electronic components need to discharge
electrically before the replacement of parts? = CAPACITOR
149. The most current wireless netwoking standard and can communicate
with the older network standards. = 802.11n