Windows XP Networking MCQs

Windows XP Networking MCQs

The following Windows XP Networking MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Windows XP Networking. We encourage you to answer these 40+ multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: The administrator of XYZ company finds that one of the users in his network is trying to upload some unwanted material. He needs to prevent that user from uploading that immediately without effecting the work of other users who are accessing shared folders from the server. How should he disconnect that user without wasting time?

A.   Disconnect user from computer management

B.   Change the share folder permissions

C.   Shutdown the server

D.   Unplugged the network cable from server

2: Multiple display is configured for User A but one user application failed to display on the secondary display. Troubleshoot.

A.   Check if VGA driver is installed

B.   Check if application works on primary display

C.   Check if the problem is only with secondary display

D.   Check if Boot.ini file is properly edited

3: How should the default Microsoft Error reporting feature in Windows XP be disabled?

A.   My computer--properties--Advanced--Error reporting

B.   Control Panel--user accounts--disable error reporting

C.   Control panel�Task Bar and Start Menu�Disable Error reporting

D.   My computer properties�system restore�Disable Error reporting

4: Which method would be used to repair the following error - "NTLDR is missing"?

A.   Safe mode

B.   Directory service restore method

C.   Recovery console

D.   Reinstall operating system

5: A user in the network is unable to open Internet Explorer in Windows XP. There is suspicion about some corrupted system files. The user's computer needs to be repaired with minimum effort. Which command should be run to check the system file status?

A.   sfc

B.   sigverif

C.   nslookup

D.   netsh

6: How should the recovery console from a system be uninstalled?

A.   Run winnt32 /cmdcons /uninstall

B.   Delete hidden cmdcons from system drive and edit boot.ini file

C.   Recovery console once installed can never be uninstalled

D.   Run format command on that drive where recovery console is installed

7: Which of the following protocols is used in class D?

A.   ICMP

B.   RPC

C.   IGMP

D.   IP

8: Which additional features are available in NTFS as compared to FAT?

A.   Disk quotas

B.   Encryption

C.   Folder level permission

D.   Ownership

9: If a user gets "Destination Host Unreachable" error, what is the root cause of message?

A.   DNS

B.   WINS

C.   Default Gateway

D.   Hop Count

10: Which of the following commands is used to check the port status?

A.   nbtstat

B.   nslookup

C.   netstat

D.   pathping

11: By which of the following components can replication traffic be controlled and managed?

A.   Organizational Units

B.   Sites

C.   Distribution Groups

D.   Trees

12: What does represent when dir command is run on c: drive? 11/14/2005 12:35 pm abc

A.   Shared folder

B.   Damaged folder

C.   Folders without any permission

D.   Mounted drive

13: What is the binary form of 150.210.99.5?

A.   11001011.00111011.11110000.10101010

B.   10010110.11010010.01100011.00000101

C.   10010111.11010011.01101111.11111000

D.   10001111.01111100.01110100.11100011

14: Which of the following items can be recovered if user account is deleted in Windows XP?

A.   Desktop items

B.   e-mail messages

C.   Internet favorite

D.   My document folders

E.   Rights and permissions

15: Which of the following commands would be used to open registry?

A.   regedit

B.   regedt32

C.   regedt16

D.   regedit32

E.   registryedit

16: A test folder consists of unattend.txt and i386 folder on drive C. Which command should be used for unattended installation on server1 if distribution share folder name is test located at server1?

A.   c:>test>i386>winnt32 /unattend:c:\test\unattend.txt /s:c:\test i386

B.   c:>test>i386>winnt /unattend:c:\test\unattend.txt /s:c:\test i386

C.   c:>test>i386>winnt32 /u:c:\test\unattend.txt /s:c:\test i386

D.   c:>test>i386>winnt32 /unattend:c:\test\unattend.txt /source:c:\test i386

17: When Administrator tries to open a folder created in the desktop, he gets an error message " Access is denied". How can the administrator access that folder?

A.   Create a new folder with the same name

B.   Move the folder to NTFS volume

C.   Assign himself the Full control permission on security Tab of the folder

D.   Remove any deny permissions on the folder to administr

18: What are the physical components of Active Directory?

A.   Domain

B.   Organizational Units

C.   Domain Controllers

D.   Trees

E.   Childs

F.   Sites

19: How can you troubleshoot "stop memory errors" and the drivers causing the errors?

A.   Small memory dump

B.   Kernel memory dump

C.   Complete memory dump

D.   Small dump directory

20: Which protocol is used by Global catalog for searching objects in Domain?

A.   PPTP

B.   IP sec

C.   PPP

D.   LDAP

E.   SLIP

21: Why is a user not able to access the sharing and security permissions tab on folder?

A.   He is not permitted to do so

B.   Simple file sharing is enabled

C.   User is trying to create folder on FAT

D.   He should be added to administrator group

22: What does Author Mode mean in MMC (Microsoft Management Console)?

A.   Multiple windows

B.   Add/Remove snap-ins

C.   No access to open new windows

D.   New Task pad views

E.   No New Task Pad Views

23: Which feature is used at the folder level, so that any temporary copy of an encrypted file is also encrypted?

A.   SSL

B.   EFS

C.   Recovery agent

D.   All of the above

24: What is the private IP range of Class-B?

A.   10.0.0.0 - 10.255.255.255

B.   172.0.0.0 - 172.255.255.255

C.   172.16.0.0 - 172.31.255.255

D.   172.16.0.0 - 172.31.255.255

25: How can the priority of the processes be set?

A.   Performance Monitor

B.   Network Monitor

C.   Local Security Policy

D.   Task Manager

26: Where should the complete IRQ list in Windows XP be checked?

A.   Computer management >> Device manager >> View resource by type

B.   Control panel >> Power option >> Advanced IRQ

C.   Device manager >> Select the device resources

D.   IRQ can only be checked from BIOS

27: Which of the following protocols are used in authenticating RRAS users?

A.   MD5

B.   MS-CHAP

C.   MS-CHAP v2

D.   PAP

E.   EAP

F.   PPTP

28: Which of the following protocols are used to establish a remote Desktop Connection?

A.   RDP

B.   SMTP

C.   IP

D.   UDP

E.   HTTP

29: Which command is used to encrypt or decrypt files?

A.   cipher

B.   compact

C.   encrypt

D.   netsh

E.   ssh

30: Which protocol/method is used to encrypt data over the network?

A.   EFS

B.   Kerberos

C.   SSL

D.   None of the above

31: What does "Principle of Least Privilege" mean?

A.   Never allow any permissions to user on shared folder

B.   Always grant the Read permissions to Everyone

C.   Use deny instead of allow permissions

D.   Assign most restrictive permissions on resources

32: When can password reset disk be used?

A.   To delete all user passwords

B.   To set all user passwords at once

C.   To change old password without knowing the old password

D.   To create a new password list

33: Which of the following are the differences between NT DNS and 2000 DNS?

A.   Win 2000 supports Active-Directory Integrated Zone

B.   IXFR is the feature of Win NT DNS

C.   Secure Dynamic zones can be configured in Win 2000 DNS

D.   Zone transfer can be restricted to only Authorized DNS Server in Win 2000

34: A user in a company left the job. The administrator wants to decrypt all data because of loss of owner private key. Who can recover the decrypted data?

A.   Members of power group

B.   Recovery agent

C.   Data can't be recovered once private key is lost

D.   It can be recovered by create a new user account with the same name

35: A user in a network reports that someone in the network is sending him unwanted messages. How will the system administrator find out about the machine from where messages are generated?

A.   Event Viewer

B.   Message.log file from System Root

C.   Performance Monitor

D.   System Information

36: Choose the 24 bit format of IP Address in Decimal form.

A.   255.255.255.240

B.   255.255.255.192

C.   255.255.255.0

D.   255.255.255.252

37: What does the term "member server" mean?

A.   Client running on workgroup

B.   Server joined in forest as ADC

C.   Server that is a member of a Domain, but not configured as a DC

D.   Print server configured on any Child Domain Controllers

38: Which tool is used for installing Win XP Professional onto multiple computers by using disk cloning?

A.   Riprep.exe

B.   Setupmgr.exe

C.   Sysprep.exe

D.   RIS

39: Which three additional features, among the following, are available in Windows XP Professional editions compared to the home edition?

A.   IIS

B.   Remote desktop

C.   Compression

D.   EFS

E.   Convert utility

F.   Print permissions

40: When the administrator tries to convert basic disk to dynamic disk from computer management, he finds no options for conversion. Identify the reason.

A.   There is no unformatted free space available

B.   No NTFS partition exists on Basic Disk

C.   The disk is in a portable computer

D.   The disk is a removable disk

41: Internet Connection Firewall ( ICF) should be replaced with which of the following firewalls after installing Windows XP SP 2?

A.   NAT

B.   Proxy server

C.   Windows firewall

D.   ICS

42: A basic disk has Windows 2000 professional installed on NTFS. When administrator converts it to dynamic disk and tries to install windows XP professional, installation fails. Identify the cause.

A.   XP can't be installed on dynamic disk

B.   Both operating systems can't be installed on the same drive

C.   There can be only one NTFS partition in disk

D.   Fresh installation is not possible in dynamic disk

43: User is trying to shutdown another system by using Shutdown command from XP. An error message is displayed " Access is denied". Troubleshoot this error message.

A.   User is not authenticated

B.   Invalid syntax is used

C.   Destination computer is not reachable

D.   User is restricted from using shutdown command

44: User A in a network required the permissions to change the system time in Windows XP as workgroup. How should he be granted the above permissions without affecting others?

A.   Use Power User Group

B.   Use Administrators Group

C.   Grant him the right to change the system time

D.   Grant him to change the system permission from Date and Time Properties

45: What do administrative shared folder names always end with?

A.   $

B.   #

C.   @

D.   %

46: Why does the administrator fail to rename the drive letter of the system partition in Basic Disk?

A.   Drive letters once formatted can never be renamed

B.   Drive letters can only be modified in dynamic disks

C.   System/boot partition drive letters cannot be modified

D.   Drive letters need to be formatted in NTFS

47: What could be done to improve the performance of Windows XP Professional in one's computer?

A.   Reduce the size of Page file

B.   Run Disk De-fragmentation

C.   Increase the size of Page file

D.   Set the Adjust For Best Performance optiong

48: Which of the following utilities are used to improve disk performance?

A.   Disk clean-up

B.   Disk de-fragmentation

C.   Check disk

D.   Increasing the size of page file

E.   All of the above

49: Which among the following are true regarding dynamic disks?

A.   There can be any number of logical drives in the dynamic disk

B.   There can be only one extended partition in dynamic disk

C.   Dynamic disk can't be reverted back to basic disk

D.   1 MB of free disk space is required for conversion

E.   Dynamic disk is implemented for RAID support