ACHIEVEMENT TEST REVIEWER
GRADE 10
1. A database used to store users information,
computer information, printers...etc.
a. Active Directory (ADDS) b. Group Policy Unit
c. New Forest d. Domain Controller
• 2. A server responds to security authentication
request that running a windows server OS and
has AD DS.
• a. GMPC b. Domain Controller c. Admin
d. Users
• 3 .Is a collection of one or more domains
which may have one or more trees.
• a. tree b. domain c. forest d.
organizational unit
• 4. Group of objects, such as user accounts,
groups, and computers.
• a. forestb.tree c. domain d.
organizational unit
• 5. Is defined as a logical group of network
objects (computers, users, devices) that share
the same active directory database.
• a. domain b. forest c. tree d.
organizational unit
• 6. Is a group of domains share a common
scheme, linked together by a trust relationship
• a. forest b. tree c. organizational unit
d. domain
• 7. A feature of the Microsoft Windows family
of operating systems that control the working
environment of user accounts and computer
accounts.
• a. ADDS b. user c. group policy d.
client
• 8. Is a network server that automatically
provides and assigns IP addresses, default
gateways and other network parameters to
client devices.
• a. file server b. policy server c. mail server
d. DHCP Server
• 9. Is an interface that enables Active Directory
administrators to manage Group Policy
Objects (GPOs) from one console.
• a. Group Policy Management Console b.
Dynamic Host Configuration Protocol
• c. Active Directory Domain Services d.
All of the above
• 10. Is a tool in Active Directory that installs
and removes Active Directory Domain Services
and promotes domain controller.
• a. tree b. dc promo c. forest d.
domain
• 11. In a _______server, a scope is configured
to determine the address pool of IPs that the
server can provide to DHCP clients.
• a. DCPROMO b. ADDS c. DHCP d.
GMPC
• 12. A DHCP scope is a valid _____ of IP
addresses that are available for assignment or
lease to client computers on a particular
_______.
• a. client, tree b. domain, range c. forest,
domain d.range, subnet
• 13._______ determines which IP addresses
are provided to the clients.
• a. scope b. server c. domain d. client
• 14. A ____ will usually keep the same address
by periodically contacting the _____server to
renew the lease.
• a. GMPC, domain b. HosT, DHCP c.
Client, ADDS d. User, GPMC
• 15._________are leased to a host.
• a. URL b. Client c. Addresses d.
Domain
• 16. Group Policy can be used not to define
user, security and networking policies at the
machine level.
• a. true b. false c. maybe d.
none
• 17. Write a GPO Name and click OK. Click on
the created GPO, checked Link Enabled
• a. true b. false c. maybe d. none
• 18. Group Policy can be used to create,
security and policies at the server level.
• a. true b. false c. maybe d.
none
• 19. GPMC is a Feature in Windows Server
2008.
• a. true b. false c. maybe d.
none
• 20. Follow the series of steps provided in the
wizard, choose use existing domain forest.
• a. true b. false c. maybe d. none
• 21.Is a device that connects printers to client
computers over a network.
• a. print server b. file server c. mail
server d. Policy server
• 22. Are used together to redirect the path of
local folders (such as Document folder) to a
network location,while caching the contents
locally for increased spedd and availability.
• a. folder files b. Folder redirection c.
Network files d. Sharing files
• 23.Is a computer attached to a network that
provides a location for shared disk access.
• a. print server b. file server c.
Network server d. Shared server
• 24. Is an application protocol that used over
an Ip network to manage and access the
distributed directory information.
• a.LDAP b.L2TP c.PPTP
d.PPP
• 25. Is a domain controller that stores a copy of
all Active Directory objects in a forest.
• a. GPO b. global catalog c.Attributes
d.objects
• 26. Is task performed to identify, isolate and
rectify a fault so that the failed equipment or
system can be restored to an operational
condition within the tolerances or limits.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 27. Described as maintenance of equipment or
systems before fault occurs. It can be divided
into two subgroups: Planned Maintenance and
Conditioned-Based Maintenance.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 28. Is any variety of scheduled maintenance to
an object or item of equipment.
• a. Condition Based Maintenance b.
Planned Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 29 Is a maintenance strategy that uses the
actual condition of the asset to decide what
maintenance needs to be done.
• a. Condition Based Maintenance b. Planned
Maintenance
• c. Corrective maintenance d. Preventive
maintenance
• 30. Includes tests, measurements,
adjustments, and parts replacement,
performed specifically to prevent faults from
occurring.
• a. Preventive maintenance b.
Maintenance Procedure
• c. Planned maintenance d. Condition
Based Maintenance
• 31. Check the computer and remove any
malware that you will find. On Windows
computers, try resetting the network
connection. Reboot the computer if necessary.
• a. Network Downtime b. Computer
Firewall Malfunctions
• c. Computer Glitches d. IP Address
Conflicts
• 32. Ensure your wired or wireless network
hardware is switched on and plugged in.
• a. Computer Firewall Malfunctions b. IP
Address Conflicts
• c. Unplugged Network Cable d.
Outside Wireless Signal Range
• 33. Are a way to protect the investment in
data. By having several copies of the data, it
does not matter as much if one is destroyed.
• a. Usage Issue b. Back up issue
• c. Warning issue d. Warranty issue
• 34. Customer's claim for repair or replacement
of, or compensation for non-performance or
under-performance of an item as provided for.
• a. Usage Issue b. Back up issue
• c. Warning issue d. Warranty issue
• 35. All programs on the computer run slowly.
• a. Computer issue b. Warning issuec.
Usage issue d.malware issue
• 36. Is a problem from the standpoint of
blocking fan vents, or, if deep enough, actually
insulating parts, causing overheating, but
unless it contains substantial amounts of
corrosive or conductive material.
• a. warning issue b. Dust issue c. Usage
issue d. All of the above
• 37. A malfunction within the electronic circuits
or electromechanical components (disks,
tapes) of a computer system. Recovery from a
hardware failure requires repair or
replacement of the offending part.
• a. Malware issues b. Hardware issues c.
Warning issue d. All of the above
• 38. any software intentionally designed to
cause damage to a computer, server, client, or
computer network.
• a. Malware issues b. Hardware issues c.
Warning issue d. All of the above
• 39. Is a Command Prompt command used to
check a hard drive or other disk drive for
errors and repair them if possible.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.all of the
above
• 40. Is the process of Files become fragmented
when data is written to disk, and there is not
enough contiguous.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.all of the
above
• 41. Is the process of backing up the operating
system, files and system-specific
useful/essential data.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.all of the
above
• 42. Is a utility in Microsoft Windows designed
to increase access speed by rearranging files
stored on a disk to occupy contiguous storage
locations.
• a. Disk Defragmentation b. Checkdisk
Command c. System Backup d.Disk
Defragmenter
• 43. Click ________ and on the search and run
bar type
• a. start menu b. disk c.chkdsk
d.all of the above
• 44. Type in ___ to open the Command Line
Interface.
• a. start menu b. CMD c.chkdsk
d.all of the above
• 45. On the command prompt type in
“________” to run Check Disk and allow the
setting to run.
• a. start menu b. CMD c.CHKDSK
d.all of the above
• 46. Click start menu, select All Programs,
choose Accessories, then select _________.
• a. start menu b. system tools
c.process d.all of the above
• 47. From the system tools, select
Disk_________.
• a. defragmenter b. system tools
c.process d.all of the above
• 48. Operate the Disk Defragmenter
• *Choose the _____you want to
Defragment.
• a. defragmenter b. disk c.process
d.all of the above
• 49. Then, click _________.
• a. defragmenter b. system tools
c.process d. analyze disk
• 50. After the analysis, select Defragment Disk
to run the defragmentation __________.
• a. defragmenter b. system tools
c.process d. analyze disk