Networking XP Test 2016 – Upwork Test Answers

Till 27 February 2016, this Upwork Networking XP Test attended by 8,969 freelancers and total 1,340 freelancers qualified it. Please Try to review each questions and answers properly. Take your time. Maybe you can have Top Result in Upwork Networking XP Test.

Do you need prove? watch this video.

Upwork Networking XP Test 2016

1 Answered Test Questions:
1. The administrator of XYZ company finds that one of the users in his network is trying to upload some unwanted material. He needs to prevent that user from uploading that immediately without effecting the work of other users who are accessing shared folders from the server. How should he disconnect that user without wasting time?
Answers:
a. Disconnect user from computer management
a. Change the share folder permissions
a. Shutdown the server
a. Unplugged the network cable from server

49 NOT Answered Yet Test Questions:
(hold on, will be updated soon)
2. Which command is used to encrypt or decrypt files?
Answers:
a. cipher
a. compact
a. encrypt
a. netsh
a. ssh
3. Multiple display is configured for User A but one user application failed to display on the secondary display. Troubleshoot.
Answers:
a. Check if VGA driver is installed
a. Check if application works on primary display
a. Check if the problem is only with secondary display
a. Check if Boot.ini file is properly edited
4. How should the default Microsoft Error reporting feature in Windows XP be disabled?
Answers:
a. My computer–properties–Advanced–Error reporting
a. Control Panel–user accounts–disable error reporting
a. Control panel�Task Bar and Start Menu�Disable Error reporting
a. My computer properties�system restore�Disable Error reporting
5. Which method would be used to repair the following error – “NTLDR is missing”?
Answers:
a. Safe mode
a. Directory service restore method
a. Recovery console
a. Reinstall operating system
6. A user in the network is unable to open Internet Explorer in Windows XP. There is suspicion about some corrupted system files. The user’s computer needs to be repaired with minimum effort. Which command should be run to check the system file status?
Answers:
a. sfc
a. sigverif
a. nslookup
a. netsh
7. How should the recovery console from a system be uninstalled?
Answers:
a. Run winnt32 /cmdcons /uninstall
a. Delete hidden cmdcons from system drive and edit boot.ini file
a. Recovery console once installed can never be uninstalled
a. Run format command on that drive where recovery console is installed
8. Which of the following protocols is used in class D?
Answers:
a. ICMP
a. RPC
a. IGMP
a. IP
9. Which additional features are available in NTFS as compared to FAT?
Answers:
a. Disk quotas
a. Encryption
a. Folder level permission
a. Offline files
a. Ownership
10. If a user gets “Destination Host Unreachable” error, what is the root cause of message?
Answers:
a. DNS
a. WINS
a. Default Gateway
a. Hop Count
11. Which of the following commands is used to check the port status?
Answers:
a. nbtstat
a. nslookup
a. netstat
a. pathping
12. By which of the following components can replication traffic be controlled and managed?
Answers:
a. Organizational Units
a. Sites
a. Distribution Groups
a. Trees
13. What does represent when dir command is run on c: drive?
11/14/2005 12:35 pm abc
Answers:
a. Shared folder
a. Damaged folder
a. Folders without any permission
a. Mounted drive
14. What is the binary form of 150.210.99.5?
Answers:
a. 11001011.00111011.11110000.10101010
a. 10010110.11010010.01100011.00000101
a. 10010111.11010011.01101111.11111000
a. 10001111.01111100.01110100.11100011
15. Which of the following items can be recovered if user account is deleted in Windows XP?
Answers:
a. Desktop items
a. e-mail messages
a. Internet favorite
a. My document folders
a. Rights and permissions
16. Which of the following commands would be used to open registry?
Answers:
a. regedit
a. regedt32
a. regedt16
a. regedit32
a. registryedit
17. A test folder consists of unattend.txt and i386 folder on drive C. Which command should be used for unattended installation on server1 if distribution share folder name is test located at server1?
Answers:
a. c:>test>i386>winnt32 /unattend:c:\test\unattend.txt /s:c:\test i386
a. c:>test>i386>winnt /unattend:c:\test\unattend.txt /s:c:\test i386
a. c:>test>i386>winnt32 /u:c:\test\unattend.txt /s:c:\test i386
a. c:>test>i386>winnt32 /unattend:c:\test\unattend.txt /source:c:\test i386
18. When Administrator tries to open a folder created in the desktop, he gets an error message ” Access is denied”. How can the administrator access that folder?
Answers:
a. Create a new folder with the same name
a. Move the folder to NTFS volume
a. Assign himself the Full control permission on security Tab of the folder
a. Remove any deny permissions on the folder to administrator
19. What are the physical components of Active Directory?
Answers:
a. Domain
a. Organizational Units
a. Domain Controllers
a. Trees
a. Childs
a. Sites
20. How can you troubleshoot ‘stop memory errors’ and the drivers causing the errors?
Answers:
a. Small memory dump
a. Kernel memory dump
a. Complete memory dump
a. Small dump directory
21. What is the maximum character length of user name in Windows XP?
Answers:
a. 14 character
a. 16 character
a. 20 character
a. 24 character
22. Which protocol is used by Global catalog for searching objects in Domain?
Answers:
a. PPTP
a. IP sec
a. PPP
a. LDAP
a. SLIP
23. Why is a user not able to access the sharing and security permissions tab on folder?
Answers:
a. He is not permitted to do so
a. Simple file sharing is enabled
a. User is trying to create folder on FAT
a. He should be added to administrator group
24. What does Author Mode mean in MMC (Microsoft Management Console)?
Answers:
a. Multiple windows
a. Add/Remove snap-ins
a. No access to open new windows
a. New Task pad views
a. No New Task Pad Views
25. Which feature is used at the folder level, so that any temporary copy of an encrypted file is also encrypted?
Answers:
a. SSL
a. EFS
a. Recovery agent
a. All of the above
26. What is the private IP range of Class-B?
Answers:
a. 10.0.0.0 – 10.255.255.255
a. 172.0.0.0 – 172.255.255.255
a. 172.16.0.0 – 172.31.255.255
a. 180.16.0.0 – 180.31.255.255
27. How can the priority of the processes be set?
Answers:
a. Performance Monitor
a. Network Monitor
a. Local Security Policy
a. Task Manager
28. Where should the complete IRQ list in Windows XP be checked?
Answers:
a. Computer management >> Device manager >> View resource by type
a. Control panel >> Power option >> Advanced IRQ
a. Device manager >> Select the device resources
a. IRQ can only be checked from BIOS
29. Which of the following protocols are used in authenticating RRAS users?
Answers:
a. MD5
a. MS-CHAP
a. MS-CHAP v2
a. PAP
a. EAP
a. PPTP
30. Which of the following protocols are used to establish a remote Desktop Connection?
Answers:
a. RDP
a. SMTP
a. IP
a. UDP
a. HTTP
31. Which protocol/method is used to encrypt data over the network?
Answers:
a. EFS
a. Kerberos
a. SSL
a. None of the above
32. What does “Principle of Least Privilege” mean?
Answers:
a. Never allow any permissions to user on shared folder
a. Always grant the Read permissions to Everyone
a. Use deny instead of allow permissions
a. Assign most restrictive permissions on resources
33. When can password reset disk be used?
Answers:
a. To delete all user passwords
a. To set all user passwords at once
a. To change old password without knowing the old password
a. To create a new password list
34. Which of the following are the differences between NT DNS and 2000 DNS?
Answers:
a. Win 2000 supports Active-Directory Integrated Zone
a. IXFR is the feature of Win NT DNS
a. Secure Dynamic zones can be configured in Win 2000 DNS
a. Zone transfer can be restricted to only Authorized DNS Server in Win 2000
35. A user in a company left the job. The administrator wants to decrypt all data because of loss of owner private key. Who can recover the decrypted data?
Answers:
a. Members of power group
a. Recovery agent
a. Data can’t be recovered once private key is lost
a. It can be recovered by create a new user account with the same name
36. A user in a network reports that someone in the network is sending him unwanted messages. How will the system administrator find out about the machine from where messages are generated?
Answers:
a. Event Viewer
a. Message.log file from System Root
a. Performance Monitor
a. System Information
37. Choose the 24 bit format of IP Address in Decimal form.
Answers:
a. 255.255.255.240
a. 255.255.255.192
a. 255.255.255.0
a. 255.255.255.252
38. What does the term ‘member server’ mean?
Answers:
a. Client running on workgroup
a. Server joined in forest as ADC
a. Server that is a member of a Domain, but not configured as a DC
a. Print server configured on any Child Domain Controllers
39. Which tool is used for installing Win XP Professional onto multiple computers by using disk cloning?
Answers:
a. Riprep.exe
a. Setupmgr.exe
a. Sysprep.exe
a. RIS
40. Which three additional features, among the following, are available in Windows XP Professional editions compared to the home edition?
Answers:
a. IIS
a. Remote desktop
a. Compression
a. EFS
a. Convert utility
a. Print permissions
41. When the administrator tries to convert basic disk to dynamic disk from computer management, he finds no options for conversion. Identify the reason.
Answers:
a. There is no unformatted free space available
a. No NTFS partition exists on Basic Disk
a. The disk is in a portable computer
a. The disk is a removable disk
42. Internet Connection Firewall ( ICF) should be replaced with which of the following firewalls after installing Windows XP SP 2?��
Answers:
a. NAT
a. Proxy server
a. Windows firewall
a. ICS
43. A basic disk has Windows 2000 professional installed on NTFS. When administrator converts it to dynamic disk and tries to install windows XP professional, installation fails. Identify the cause.
Answers:
a. XP can’t be installed on dynamic disk
a. Both operating systems can’t be installed on the same drive
a. There can be only one NTFS partition in disk
a. Fresh installation is not possible in dynamic disk
44. A user is trying to shutdown another system by using Shutdown command from XP. An error message is displayed ” Access is denied”. Troubleshoot this error message.
Answers:
a. User is not authenticated
a. Invalid syntax is used
a. Destination computer is not reachable
a. User is restricted from using shutdown command
45. User A in a network required the permissions to change the system time in Windows XP as workgroup. How should he be granted the above permissions without affecting others?
Answers:
a. Use Power User Group
a. Use Administrators Group
a. Grant him the right to change the system time
a. Grant him to change the system permission from Date and Time Properties
46. What do administrative shared folder names always end with?
Answers:
a. $
a. #
a. @
a. %
47. Why does the administrator fail to rename the drive letter of the system partition in Basic Disk?
Answers:
a. Drive letters once formatted can never be renamed
a. Drive letters can only be modified in dynamic disks
a. System/boot partition drive letters cannot be modified
a. Drive letters need to be formatted in NTFS
48. What could be done to improve the performance of Windows XP Professional in one’s computer?
Answers:
a. Reduce the size of Page file
a. Run Disk De-fragmentation
a. Increase the size of Page file
a. Set the Adjust For Best Performance option
49. Which of the following utilities are used to improve disk performance?
Answers:
a. Disk clean-up
a. Disk de-fragmentation
a. Check disk
a. Increasing the size of page file
a. All of the above
50. Which among the following are true regarding dynamic disks?
Answers:
a. There can be any number of logical drives in the dynamic disk
a. There can be only one extended partition in dynamic disk
a. Dynamic disk can’t be reverted back to basic disk
a. 1 MB of free disk space is required for conversion
a. Dynamic disk is implemented for RAID support

Please follow and like to help us:

Leave a Reply

Your email address will not be published. Required fields are marked *