0% found this document useful (0 votes)
4 views9 pages

Written Exam

The document is a written exam consisting of multiple-choice questions covering topics related to computer systems, network management, and cybersecurity. It includes questions on disk management, antivirus practices, IP classes, malware types, and Active Directory functionalities. Answer keys are provided for the questions, along with sections for enumeration and fill-in-the-blank responses.

Uploaded by

kean.servida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views9 pages

Written Exam

The document is a written exam consisting of multiple-choice questions covering topics related to computer systems, network management, and cybersecurity. It includes questions on disk management, antivirus practices, IP classes, malware types, and Active Directory functionalities. Answer keys are provided for the questions, along with sections for enumeration and fill-in-the-blank responses.

Uploaded by

kean.servida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

WRITTEN EXAM

Multiple Choice

1. What is the primary purpose of disk management tools?

a. To delete all files from the computer


b. To organize, maintain, and optimize disk storage
c. To browse the internet
d. To install software

2. What should you do to maintain the effectiveness of antivirus protection?

a. Disable software updates and firewall


b. Only use it during virus outbreaks
c. Use it only once a month
d. Regularly update antivirus software

3. This IP Class generally allocated to Internet Service Provider and large networks, like college
or hospital.

a. Class D
b. Class C
c. Class B
d. Class A

4. How does a worm differ from a virus?

a. A worm requires human action to spread, while a virus does not


b. A worm replicates itself without human action, while a virus needs human action to spread
c. A worm disrupts system functionality, while a virus only spreads data
d. A worm encrypts data, while a virus deletes files

5. Which practice is critical for maintaining computer virus protection?

a. Regularly update antivirus and antispyware software


b. Disable firewalls to improve system performance
c. Avoid downloading software updates to save space
d. Open attachments from unknown senders cautiously
6. Which of the following best describes adware?

a. Malicious software that collects sensitive information


b. A type of malware that spreads without user interaction
c. A tool used to encrypt and hold data hostage
d. Unwanted or malicious advertisements that can slow computer performance

7. This function enables the connection and move data packets between any devices in a
network.

a. Addressing
b. Switching and Routing
c. Routing
d. Subnetting

8. Which tool is used to organize fragmented data for better performance?

a. Disk Formatter
b. Disk Defragmenter
c. Disk Checker
d. Disk Space Analyzer

9. What is the main consequence of a ransomware attack?

a. The attacker steals your credentials


b. Your data is locked and held for ransom
c. Your system is slowed down
d. Your device displays unwanted advertisements

10. The address 192.168.1.13 is located on the "street" named "192.168.1". Based on this
format, what does the number “13” represent?

a. House System
b. House Apartment
c. House Loaning or House Loan
d. House Number or House Name

11. What is a computer virus and how does it spread?

a. A program that collects user data and spreads by human action


b. A program that replicates itself by infecting files or system areas
c. A program that encrypts data and holds it for ransom
d. A program that causes software crashes without replication
12. What is adware commonly referred to as?

a. Spam
b. Malware
c. Spyware
d. Ransomware

13. What is the default or common IP Address in a device?

a. 192.168.1.1 or 192.168.0.1
b. 192.168.1.1 or 193.168.0.1
c. 192.168.1.1 or 194.168.0.0
d. 192.168.1.1 or 195.168.0.1

14. What is an important practice to enhance computer virus protection?

a. Open attachments from unknown sources


b. Avoid using antivirus software altogether
c. Download software only from trusted websites
d. Never update the operating system

15. An IP Class that ranges from 0.0.0.0 to 127.255.255.255

a. Class A
b. Class B
c. Class C
d. Class E

16. What command is used to check and repair disk errors?

a. CMD
b. CHKDSK
c. MSConfig
d. Diskpart

17. What is the main function of spyware?

a. Collects user activity data without their knowledge


b. Disrupts system performance by causing software bugs
c. Allows users to gain administrative control of their systems
d. Encrypts files and demands ransom for their release
18. A 32-bit number represented in four parts.

a. Subnet Mask
b. MAC Address
c. IP Address
d. Domain Name System (DNS)

19. An IP Class that are reserved for a service called Multicast

a. Class A
b. Class B
c. Class C
d. Class D

20. An IP Class that ranges from 240.0.0.0 - 255.255.255.255

a. Class B
b. Class C
c. Class D
d. Class E

21. To uniquely identify each host or computer or device participating in Network

a. Addressing
b. Switching and Routing
c. Subnetting
d. Routing

22. Which tool is commonly used to clean up unnecessary files from a disk?

a. Task Manager
b. Disk Cleanup
c. Device Manager
d. Windows Defender

23. Why is it important to perform regular disk maintenance?

a. To fill up storage space faster


b. To ensure better system performance and prevent data loss
c. To delete important system files
d. To increase internet speed
24. What is the primary purpose of a rootkit in malware attacks?

a. To display unwanted advertisements


b. To replicate itself and spread across networks
c. To provide hackers with remote control of a victim's device
d. To collect user activity data without their knowledge

25. What value can be developed by regularly managing your disk storage?
a. Laziness
b. Responsibility
c. Procrastination
d. Indifference

26. Which of the following can cause a disk to slow down?

a. Regular backups
b. Too many unnecessary files and fragmented data
c. Proper file organization
d. Regular system updates

27. What is the main benefit of organizing your files into folders?

a. It helps free up space on your disk


b. It makes it easier to locate and manage files
c. It speeds up internet connection
d. It increases storage capacity

28. The purpose of this was to create another partition in an IP Address after network part.

a. Subnet
b. IP Address
c. Domain Name System (DNS)
d. MAC Address

29. What does an Organizational Unit (OU) do in Active Directory?

a. Stores files
b. Organizes users and computers
c. Connects to the internet
d. Monitors network speed
30. What is an Organizational Unit used for?

a. To group users and apply settings


b. To manage computer hardware
c. To change network settings
d. To monitor network traffic

31. What is the first step to create an OU in Active Directory?

a. Right-click the domain and select "New OU"


b. Type the OU name
c. Click the Start button
d. Open Microsoft Word

32. What should you name the first Organizational Unit for admin accounts?

a. Admin
b. Users
c. IT
d. Servers

33. After creating the Admin OU, what’s the next step?

a. Create the User OU


b. Create a new domain
c. Assign a password
d. Delete the Admin OU

34. Which option should be selected for admin accounts' password settings?

a. User can change password


b. Password never expires
c. User logon name
d. Set a password expiration date

35. What happens after creating an admin account?

a. The account goes into the Admin OU


b. The account is deleted
c. The password needs to be reset
d. The user is logged out
36. What is an optional field when creating a user account?

a. First name
b. Email address
c. Last name
d. Initials

37. How many user accounts do you need to create in the User OU?

a. One
b. Two
c. Three
d. Four

38. What do you do to create more admin accounts?

a. Create a new OU for each account


b. Copy an existing admin account
c. Delete the admin account
d. Add the admin account to the User OU

39. What is the purpose of backup software?



a. Create partitions​
b. Organize fragmented data​
c. Restore data in case of disk failure​
d. Compress files​

40. Why is disk management important?


a. It allows users to access the internet faster
b. It ensures optimal performance and prevents data loss
c. It increases storage capacity
d. It installs software automatically
Enumeration

41-44. These are the objects inside of the network where it is usually stored inside of Active
Directory (AD).

45-48. Give atleast 4 Types of Malware

Fill in the blanks (2pts)


49-50. DHCP stands for?
51-52. ADDS stands for?
53-54. DNS stands for?

Differentiation
55-60. Forest VS. Domain
ANSWER KEYS:​
Enumeration:​
1. B. 41. Users
2. D. 42. Computers
3. B 43. Groups
4. B. 44. Organizational Unit
5. A. 45-48. Malware, Spyware, Ransomware,
6. D. Adware, Rootkits, Worms, Software Bug
7. A
8. B. Fill in the blanks:
9. B. 49-50 Dynamic Host Configuration Protocol
10. D. 51-52 Active Directory Domain Services
11. A 53-54 Domain Name System
12. A.
13. A.
14. C.
15. A
16. B
17. A.
18. C
19. D
20. D
21. A
22. B
23. B
24. C.
25. B
26. B
27. B
28. A
29. B
30. A
31. A
32. A
33. A
34. B
35. A
36. D
37. C
38. B
39. C.
40. B.

You might also like