-
General Knowledge
-
General Topics
- Abbreviations
- Books and Authors
- Famous Academies and Institutes
- First in India (Man)
- First in India (Women)
- Important Dates
- Famous Personalities
- Public Administration Science
- Astronomy
- Biology
- Botany
- Chemistry
- Physics
- Zoology
- Inventions and Scientists Geography
- Geographical Epithets India
- Geographical Epithets World
- Places Associated with Industries in India
- National Parks and Sanctuaries
- Towns on River Banks History
- Indian History and Culture
- Indian National Movement
- Indian Polity and Constitution
- Ancient Period in Indian History
- World History
- Governor General of India Culture
- Languages
- Indian Dance and Music
- Classical Dances of India
- Folk Dances in India and Tribal Dances in India
- Famous Dancers, Instrumentalists, Vocalists in India World
- First in the World
- Parliament Names
- United Nation Organizations (UNO)
- World's Famous News Agencies
- World Industries
- National Emblems
- Countries and Alternative Names
- Countries and Capitals
- View More topics...
- General Aptitude
- Problems on Ages
- Alligation and Mixture
- Area
- Arithmetic Progression
- Average
- Banker's Discount
- Boats and Streams
- Calendar
- Chain Rule
- Clock
- Compound Interest
- Decimal Fraction
- Height and Distance
- Logarithms
- Mensurations
- Numbers
- Odd Man Out and Series
- Partnership and Share
- Percentage
- Permutation and Combination
- Pipes and Cisterns
- Probability
- Problems on H.C.F and L.C.M
- Problems on Numbers
- Problems on Trains
- Profit and Loss
- Races and Games
- Ratio and Proportion
- Simple Interest
- Simplification
- Stocks and Shares
- Surds and Indices
- Time and Distance
- Time and Work
- True Discount
- Volume & Surface Areas
- General English
- Antonyms
- Synonyms
- Vocabulary Test
- One Word Substitution
- Sentence Completion
- Sentence Improvement
- Idioms & Phrases
- Homonyms
- Word Formation
- Active & Passive Voice
- Direct and Indirect Speech
- Spotting Errors
- Double Synonyms
- Choose the Appropriate Filter
- Spelling Test
- Transformation
- Reconstruction of Sentence
- Chooose the Correct or Incorrect Sentence
- Networking
- Interview Questions
-
Programming
- .NET
- Java
- ASP.NET
- C++
- Perl
- Python
- Ruby and Rails
- Struts
- Core Java
- Hibernate Database
- DB2
- MS SQL Server
- MySQL
- Oracle
- SQL
- DBMS
- Data Warehousing
- Data structures and Algorithms Cisco
- CCNA
- CCNP Routing
- CCNP Switching
- Internetworking
- Border Gateway Protocol Windows
- MCSE
- Exchange Server
- Windows Server 2008
- DNS & Active Directory
- Firewall Questions Linux
- Unix
- Linux Server Administrator
- Linux System Administrator
- Linux File Manipulation
- Database
- Home
- Server Administration
- Comptia Server +
Instructions
- Total Questions 20
- Each question carry 1 mark
- Must answer all the questions (otherwise report card will not be generated)
- If you dont want to take a test, simply click the check answers button and view all the answers with explanations
- Do Not Refresh the Page
- No Time Limit
- Good Luck :)
You Scored % - /
Correct Answers :
[A]
Explanation :
On Linux-based systems a common host-based firewall is iptables, which replaces a previous package called ipchains. It has the ability to accept or drop packets.
Correct Answers :
[D]
Explanation :
It is possible to specify a maximum number of MAC addresses allowed on a port.
Correct Answers :
[A]
Explanation :
The user's computer is the supplicant, the access device (WAP, Dial in the server or VPN server) is the authenticator, and the RADIUS or TACACs + server is the authentication server.
Correct Answers :
[B]
Explanation :
CAT5 transmits data at speed up to 100 Mbps and specifies cable lengths up to 100 meters.
Correct Answers :
[D]
Explanation :
HTTPS is a secure form of HTTP that uses port 443.
Correct Answers :
[A]
Explanation :
Combining physical links can be done using proprietary methods, and there is also an IEEE standard for the process called 802.3ad, later replaced by 802.1ax-2008.
Correct Answers :
[A]
Explanation :
Each part of this address communicates information. The left half of the address is called the Organizationally Unique Identifier (OUI). It identifies the vendor who made the interface. The right half is called the Universally Administered Address (UAA). It will be unique for each interface made by the vendor. Together they make a globally unique MAC address.
Correct Answers :
[B]
Explanation :
In the Grandfather-Father-Son (GFS) backup scheme, three sets of backups are defined. Most often these three definitions are daily, weekly, and monthly.
Correct Answers :
[A]
Explanation :
If you create the backup using checksums (which is an option with many utilities), it will allow you to check that the data has not changed since it was made or that it has been corrupted or damaged.
Correct Answers :
[B]
Explanation :
You will need the last full backup tape and the last differential tape. Each differential tape contains all changes that occurred since the last full backup.
Correct Answers :
[C]
Explanation :
With a multimeter you can measure voltage, current, and resistance.
Correct Answers :
[A]
Explanation :
It is a balancing act to keep humidity at the right level since low humidity causes ESD and high humidity causes moisture condensation.
Correct Answers :
[B]
Explanation :
Backplanes are advantageous in that they provide data and control signal connectors for the hard drives. They also provide the interconnection for the front I/O board, power and locator buttons, and system/component status LEDs. Unfortunately, this creates a serious single point of failure because if the backplane fails, we lose communication with the servers to which it is connected.
Correct Answers :
[C]
Explanation :
The steps in order are
- Identify the problem and determine the scope.
- Establish a theory of probable cause.
- Test the theory to determine the cause.
- Establish a plan of action to resolve the problem and notify impacted users.
- Implement the solution or escalate as appropriate.
- Verify full system functionality and, if applicable, implement preventive measures.
- Perform a root cause analysis.
- Document findings, actions, and outcomes throughout the process.
Correct Answers :
[B]
Explanation :
The tracert command (traceroute in Linux and Unix) is used to trace the path of a packet through the network on routers.
Correct Answers :
[B]
Explanation :
Some of the things you can specify using this feature are the only MAC address or addresses allowed to send traffic in the port, the total number of MAC addresses that can transmit on the port, and an action to be taken when a violation occurs (either shut the port down or prevent transmissions by the guilty MAC address).
Correct Answers :
[A]
Explanation :
If the message comes with no source IP address, that means the message is coming from the local router (the default gateway of the sender). If it has a source IP address of the sender, then it is another router in the path.
Correct Answers :
[D]
Explanation :
The sudo fdisk -l command lists the partitions on a Linux system.
Correct Answers :
[A]
Explanation :
fstab (File System Table) is a file used by Linux operating systems to mount partitions on boot.
Correct Answers :
[B]
Explanation :
In Linux this handled by GRUB.
|
|
||||||||||||||||||||||||||||