CSIS 83 Exam 2 Directions: Use the template word file provided in class. Copy your answer file to your U: drive. 1. 2. 3. 4. 5. 6. 7. What type of device enables you to connect it to Windows 7 and then automatically configure itself for use? A. Free device B. Plug and play device C. PCI device D. Signed device What tool do you use to disable a device? A. Windows Explorer D. Device Manager B. Regedit C. Add/Remove Drivers How do you identify a device in the Device Manager that is having problems? A. There is a red X. B. There is an exclamation point. C. There is a down arrow. D. It is flashing. You just connected a large USB drive. You try to make it a dynamic disk, but the option is not available to you. What is the problem? A. You don’t have the correct drive loaded. B. The drive is disabled. C. Dynamic disks are not supported on USB disks. D. The drive needs to be powered on. You want Windows 7 to implement RAID 1. What do you need to do? A. Enable Write caching on the first disk. B. Enable Write Caching on the second disk. C. Convert the basic disk to dynamic disks. D. Convert the dynamic disk to basic disks. Where do you find the Disk Management console? A. Control Panel B. Computer Management console C. Device Manager D. Regedit Which of the following gives you the best read access performance? A. Simple disk B. Spanned disk C. Mirrored disk D. Stripped disk 1 CSIS 83 Exam 2 8. 9. What is the default subnet mask for a host with the address of 220.67.34.87? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 How many bits is an IPv4 address? A. 10. 11. 14. C. 24 D. 32 Global unicast addresses B. Link-Local addresses C. Unique local unicast addresses D. Multicast addresses What command is used to configure and monitor various network parameters on a computer running Windows 7 including configuring IP addresses and default gateways? net B. netsh C. nslookup D. ipconfig What command is used to test network connectivity to another host? ipconfig B. ping C. nslookup D. netstat What defines the type of access granted to an object or object attribute? A. Permission B. Right C. Authentication key D. Fingerprints What is the minimum standard NTFS permission to change permissions of a file or folder? A. 15. 16 A. A. 13. B. What type of IPv6 address is used by hosts when communicating with neighboring hosts on the same link? A. 12. 4 Full Control B. Modify C. Read D. When you move a file from a folder in the C drive to a folder in the D drive, which permissions does the file retain? A. Permissions assigned to the source folder B. Permissions assigned to the target folder C. No permissions D. Full permissions to Everyone 2 Write CSIS 83 Exam 2 16. 17. 18. 19. 20. You have a shared folder on an NTFS volume. What is the best way to share folders and lock it down? A. Set Everyone to have full control share permissions and lock it down with NTFS permission. B. Set Everyone to have full control NTFS permissions and lock it down with Share permissions. C. Set Everyone to have full control NTFS and share permissions and lock it down with file attributes. D. Lock it down with both share and NTFS permissions. Which search tool is NOT a method for Windows 7 to search for files? A. The search box on the Start menu B. The search box located at the top of the open window C. The search box at the top of the library D. The search box in the desktop You have a shared folder on an NTFS volume. Which one of the following statements is true? A. A user who accesses the folder remotely has the same or more restrictive access permissions than if she accesses the folder locally. B. A user who accesses the folder remotely has less restrictive access permissions than if she accesses the folder locally. C. A user who accesses the folder remotely has the same access permissions than if she accesses the folder locally. D. A user who accesses the folder remotely has more restrictive access permissions than if she accesses the folder locally. Which of the following is NOT a share permission for a standard shared folder in Windows 7? A. Full Control B. Change C. Modify D. Read What permission do you have to give for a user to change the configuration of a printer? A. Allow Manage Printers B. Allow Manage Documents C. Allow Full Control for Documents D. Allow Modify for Printers 3 CSIS 83 Exam 2 21. 22. 23. 24. 25. You add a printer directly to the network using a built-in Ethernet card. Now you want to load the printer onto your computer. Which of the following is true? A. The printer is considered a local printer. B. The printer is considered a network printer. C. The printer needs to be moved so that it can be plugged directly into the Windows computer. D. The printer needs to be assigned a name such as http://servername/printername. If you print a document and get garbled text, what is most likely the problem? A. The print spooler becomes unresponsive. B. The printer is not using the right ink-cartridge. C. The printer has not been calibrated. D. You are using the incorrect driver. What do you call a program designed to enable other programs to work with a particular printer without concerning themselves with the specifics of the printer’s hardware and internal language. A. Print device B. Printer C. Spooler D. Print driver You want to access the C drive remotely on a computer called PC1, but it has not been manually shared. If you are an administrator, how can you access it? A. Access it through \\PC1\C. B. Access it through \\PC1\C$. C. Access it through \\PC1\CDrive. D. Access it through \\PC1\Drives\C. You have two users who share a Windows 7 Business Edition. Both users are working on a presentation for the annual stock report. You want to give both users access to the report without giving access to the other user’s data files. What should you do? A. Give the appropriate NTFS permissions to each user's My Documents folder. B. Have the users log in with the same account. C. Instruct the users to store the report in the public folder. D. Instruct the users to log out and log in as the other user's report. 4 CSIS 83 Exam 2 26. 27. When you copy a file from a folder in the C drive to another folder in the C drive, which permissions does the file retain? A. Permissions assigned to the source folder B. Permissions assigned to the target folder C. No permissions D. Full permissions to Everyone What do you call permissions that are directly assigned to a file or folder? A. 28. 30. 31. C. Blocked ipconfig B. netsh C. pathpig A. Network mask B. Default gateway C. NAT D. DNS D. Primary D. nslookup What command do you use to view your IPv4 interfaces on a computer running Windows 7? A. netsh interface ipv4 show interfaces B. netsh interface ipv4 set address name all C. netsh interface ipv4 add interface D. netsh interface ipv4 set address name source What address is considered the loopback address? 192.168.1.1 B. 172.0.0.255 C. 127.0.0.1 How many bits is an IPv6 address? A. 33. Inherited What address is used by a local host when you need to forward packets to the host on a different subnet? A. 32. B. What command helps you test name resolution? A. 29. Explicit 24 B. 32 C. 64 D. 128 Why do you need to keep your drives defragged? A. It keeps your drive from filling up. B. It keeps your drive clean from viruses. C. It keeps your drive optimized for better performance. D. It keeps your drive free from errors. 5 D. 1.1.1.1 CSIS 83 Exam 2 34. What option would you use with the chkdsk command to fix problems that it finds? A. 35. 39. 40. C. /c D. No option is required. 2 B. 4 C. 8 D. 16 1 TB B. 2 TB C. 4 TB D. 8 TB For a subnet mask of 255.255.255.0, what is the CIDR notation? A. 38. /x What is the largest disk you can use with the MBR partitioning style? A. 37. B. How many primary partitions can you have on a disk with a MBR partitioning style? A. 36. /f /8 B. /16 C. /24 D. /32 You share a couple of folders in your Windows 7 computer. Unfortunately, they are not visible on anyone’s network map so that users can find the shares easily. What is most likely the problem? A. You need to enable the Network Discovery service. B. You did not give the proper NTFS permissions. C. You did not give the proper Share permissions. D. You did not register your system in your DNS server. You just upgraded your sound card driver. Unfortunately, there is no sound. What should you do? A. Disable the device. B. Uninstall the device and try again. C. Roll back the driver. D. Update the device driver again. Which Microsoft method ensures that you load only reliable drivers? A. Use Plug and Play drivers. B. Use PCI and AGP drivers. C. Use signed drivers. D. Use hibernate capable drivers. 6
© Copyright 2026 Paperzz