0% found this document useful (0 votes)
55 views7 pages

Technical Assessment For Engineer

This document contains a technical assessment for an engineer position consisting of 44 multiple choice questions testing knowledge of computer hardware, operating systems, networking, and troubleshooting. The questions cover topics such as single-user operating systems, Active Directory features, default DHCP lease durations, Windows safe mode components, causes of blue screens of death, VPN usage, strong passwords, email protocols, digital signatures, hardware components, TCP/IP protocols, network devices, expansion slots, wireless encryption standards, and steps for backing up data, removing USB drives, and performing operating system upgrades safely.

Uploaded by

mdsameer56456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views7 pages

Technical Assessment For Engineer

This document contains a technical assessment for an engineer position consisting of 44 multiple choice questions testing knowledge of computer hardware, operating systems, networking, and troubleshooting. The questions cover topics such as single-user operating systems, Active Directory features, default DHCP lease durations, Windows safe mode components, causes of blue screens of death, VPN usage, strong passwords, email protocols, digital signatures, hardware components, TCP/IP protocols, network devices, expansion slots, wireless encryption standards, and steps for backing up data, removing USB drives, and performing operating system upgrades safely.

Uploaded by

mdsameer56456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Technical Assessment for Engineer

Q-1) Which of the following is a single-user operating system?

 Windows
 MAC
 Ms-Dos : Answer
 None of these

Q-2) Which of the following is not a feature of Active Directory?


 The use of LDAP for transferring information
 Reliance on DNS for name resolution
 A flat domain namespace : Answer
 The ability to extend the schema

Q-3) What is the default duration of a lease in DHCP?


 6 Days
 8 Days : Answer
 10 Days
 16 Days
Q-4) Which of the following is not a component of Safe mode?
 Safe Mode
 Safe Mode With Networking
 Safe Mode with home drive : Answer
 Safe Mode With Command Prompt
Q-5) Which of the following shutdown method is often called Warm Boot?
 Shut Down
 Restart : Answer
 Sleep
 Hibernate
Q-6) What is the most likely cause of a Windows Error (Blue Screen of Death) on a typical
home computer?
 Bad computer memory (RAM) causes most Windows errors.
 Damage to the operating system (Windows) from a computer virus causes most
Windows errors. : Answer
 Bugs in Microsoft Windows cause most Windows errors.
 Bugs in non-Microsoft products cause most Windows errors.

Q-7) Which type of VPNs are used for home private and secure connectivity?
 Remote access VPNs : Answer
 Site-to-site VPNs
 Peer-to-Peer VPNs
 Router-to-router VPNs
Q-8) Which of the following is a strong password?

 19thAugust88
 Delhi88
 P@assw0rd : Answer
 Augustdelhi!

Q-9) Can you create a backup of Emails in Outlook?


 Yes : Answer
 No
Q-10) Which windows features can be accessed from the start menu?
 Help
 Windows Explorer
 Microsoft Network
 All of above : Answer

Q-11) By default we can save the file in?


 Desktop
 Recycle bin
 My document : Answer
 My computer
Q-12) which protocol is used to access e-mails from any machine and anywhere?

 PGP
 IMAP : Answer
 TCP
 POP
Q-13) Which of the following protocol is used to send email?

 POP3
 SMTP : Answer
 POP
 SNMP

Q-14) E-mail address is made up of?

 Single part
 Two parts : Answer
 Three parts
 Four parts
Q-15) Which one of the following statement is not correct for Digital signature?

 It is mechanism for authentication


 It cannot be duplicated
 It is created by encrypting information
 It is the scanned image of one’s signature : Answer
Q-16) Which tab does NOT belong in Outlook?
 View
 Folder : Answer
 Send / Receive
 Print
Q-17) Mailbox size can be checked in Outlook Web mail.

 True
 False : Answer

Q-18) Which of the following retains the information it's storing when the power to the
system is turned off?

 CPU
 ROM : Answer
 DRAM
 DIMM

Q-19) What type of connector is used to plug a telephone line into a modem?

 COM1
 RJ-11 : Answer
 RJ-45
 RJ-10

Q-20) Which of the following is the address of the router?

 The IP address
 The TCP address
 The subnet mask
 The default gateway : Answer

Q-21) Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?

 FTP
 SNMP : Answer
 SMTP
 RPC

Q-22) What are the four key functions of a computer system?

 input, processing, output, and storage : Answer


 keyboard, display, memory, and disk drive
 word processing, spreadsheets, database
 bits, bytes, words, and OSI

Q-23) Which of the following device is used to connect two systems, especially if the
systems use different protocols?

 hub
 bridge
 gateway : Answer
 repeater

Q-24) Which of the following is NOT a type of motherboard expansion slot?

 ISA
 PCI
 AGP
 ATX : Answer

Q-25) Which of the following condition is used to transmit two packets over a medium at
the same time?

 Contention
 Collision : Answer
 Synchronous
 None of the above

Q-26) What can greatly reduce TCP/IP configuration problems?

 WINS Server
 WINS Proxy
 DHCP Server : Answer
 PDC

Q-27) That kind of connectors are used to connect a PC power supply to a hard drive?

 AT
 Molex : Answer
 mini-molex
 P9

Q-28) What is the name of the card that controls read, write head and motor in the hard
disk ?

 Network Card
 NIC
 Disc Controller Card : Answer
 Network Controller Card
Q-29) What does an assigned IP address 169.254.0.12 indicate?

 The computer is using a dial-up modem.


 The computer is configured with a static IP address. : Answer
 The computer has been configured to work with a Linux system.
 The computer is being used as an Internet shared connection host.
 The computer is configured for DHCP and cannot connect to the DHCP server.

Q-30) Which two are examples of wireless encryption? (Select two answers)

 WEP : Answer
 VPN
 PPP
 MAC
 WPA : Answer

Q-31) Which item is an example of a physical network address?

 IP address
 MAC address : Answer
 Workstation name

Q-32, what does safe mode allow you to do


 Run windows without processing AUTOEXEC.BAT and CONFIG.SYS
 Skip loading the Registry
 Boot the system without scanning drives
 Start Windows using only basic files and drivers : Answer
Q-33, What should you do before physically removing a USB drive
 Use the Safely Remove icon : Answer
 Turn it off
 Shut down Windows
 Format the drive
Q-34, What should you do first before performing an upgrade to an Operating System
 Back up critical data : Answer
 Format the drive
 Back up the old OS
 FDISK the drive
Q-35, Which log file in the Event Viewer contains information concerning auditing
 Application
 Internet Explorer
 System
 Security : Answer
Q-36, What would you type to open the Device Manager in the Run prompt
 MMC
 Secpol.mmc
 Devmgmt.msc : Answer
 CMD
Q-37, The IP address of e-pspl.com is 10.255.200.1. You can ping the IP address but cannot
ping e-pspl.com. What is the most likely cause
 The ADDS server is down
 e-pspl.com is down
 The DHCP server is down
 The DNS server is down : Answer
Q-38, An application open in Windows, is not responding. Which of the following utilities
can you use to forcibly close the nonresponsive application
 Windows Explorer
 Task Manager : Answer
 Device Manager
 Application Manager
Q-39, Virtual memory is configured through which system tool
 Taskbar
 System control panel : Answer
 Virtual Configuration
 Memory Manager
Q-40, A user’s time and date keeps resetting to January 1st, 2020. What is the most likely
cause
 The BIOS needs to be updated
 The windows Date and Time Properties need to be modified
 Windows needs to be updated
 The lithium battery needs to be replaced : Answer
Q-41, What is the first program run on a computer when the computer boots up
 System software
 System operations
 None
 Operating system : Answer
Q-42, Which syntax will enable you to see your computer’s MAC address
 IPCONFIG /
 IPCONFIG / everything
 IPCONFIG / all : Answer
 PING / everything
Q-43, A user hands you her Laptop for repair. What should you do first before making any
changes
 Open the laptop and analyze the components inside
 Back up the important data : Answer
 Reinstall the operating system
 Modify the Registry
Q-44, Which of the following is not a hive in the Windows Registry
 HKEY_RESOURCES : Answer
 HKEY_LOCAL_MACHINE
 HKEY_CLASSES_ROOT
 HKEY_USERS

You might also like