0% found this document useful (0 votes)
9 views9 pages

Final Question Client Server

The document contains multiple-choice questions (MCQs) related to client-server computing, Active Directory, and DHCP processes. It covers topics such as client-server models, DNS records, Group Policy, and storage connectivity protocols like iSCSI. Each question provides four answer options, testing knowledge on various aspects of computer networking and system administration.

Uploaded by

Binod SAdhikari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Final Question Client Server

The document contains multiple-choice questions (MCQs) related to client-server computing, Active Directory, and DHCP processes. It covers topics such as client-server models, DNS records, Group Policy, and storage connectivity protocols like iSCSI. Each question provides four answer options, testing knowledge on various aspects of computer networking and system administration.

Uploaded by

Binod SAdhikari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Client server computing

4th Semester

MCQ’s

1. ________________ refers to computing technologies in which the hardware


and software components are distributed across a network.
A) User and System
B) User and file server
C) Client and Server
D) User and database server

2. Client is any process that ____________.


A) Requests specific services from the server process
B) Provide services to the server process
C) Give response
D) None of the above

3. Thin client is __________.


A) The one that conducts maximum processing on client side
B) The one that conducts minimum processing on client side
C) The one that conducts minimum processing on server side
D) The one that conducts maximum processing on server side

4. The possible client/server topology are


A) Single client, single server
B) Multiple clients, single server
C) Multiple clients, multiple servers
D) All of the above

5. In three tier client/server model _________.


A) Application server is responsible for data storage
B) Application server receive user events
C) Application logic is loaded into application server
D) Application server control the user interface and presentation of data.
6. Which type of client server model allows clients to directly communicate
with each other without a central server?
A) Two tier
B) Three tier
C) One tier
D) N-Tier

7. In host based processing


A) Client is just a dump terminal
B) Presentation logic and application logic resides in client computer
C) Application logic resides in client computer
D) All application processing is done at the client

8. Front end system is a part of information system that


A) Provide services to the end user
B) Directly accessed and interacted with by the end user to
receive or utilize back end capabilities of host system
C) That sends data to the end user
D) None of the above

9. What is the primary purpose of a forest in Active Directory?


A) Grouping users in a domain
B) Sharing a common schema and configuration
C) Managing DNS settings
D) Implementing DHCP services

10. Which tool is commonly used to promote a Windows Server to a


domain controller?
A) Active Directory Users and Computers
B) DNS Manager
C) Server Manager
D) Hyper-V Manager

11. In the context of Active Directory, what does CDC stand for?
A) Child Domain Controller
B) Central Domain Controller
C) Configuration Domain Controller
D) Clustered Domain Controller
12. What is child domain controller in Active directory?
A) A server that manages only child domains
B) A read-only domain controller
C) A domain controller in a subordinate domain
D) A domain controller with limited access rights

13. In Active Directory, what is the relationship between a Child


Domain Controller and its Parent Domain?
A) Independent
B) Bidirectional
C) Subordinate
D) Peer

14. What is the primary role of a DNS server in a Windows Server


environment?
A) Assigning IP addresses
B) Managing Active Directory users
C) Configuring group policies
D) Resolving domain names to IP addresses

15. Which service is commonly associated with an IIS server?


A) Web service
B) Domain Name Service
C) DHCP service
D) File services

16. In which scenario is read only domain controller (RODC) most


commonly deployed?
A) In main data center
B) In branch offices or remote locations
C) As a primary domain controller
D) In development environments

17. What is the purpose of a Global Catalog in an Active Directory forest?


A) Stores a copy of all Active Directory objects
B) Provides a comprehensive list of all domains in the forest
C) Manages DNS records for the forest
D) Handles DHCP requests for the forest

18. What is the main advantage of deploying a Read-Only Domain


Controller (RODC) in a branch office?
A) Faster logon times for users
B) Centralized management of group policies
C) Increased DNS resolution speed
D) Reduced security risks for remote locations
19. Which record type in DNS is used to associate an IP address with a
domain name?
A) CNAME
B) MX
C) A
D) PTR
Note : A stands for Address record. The 'A' record maps a domain or
subdomain to a specific IPv4 address.

20. What does acronym TTL stands for?


A) Time to Learn
B) Time to Load
C) Time To Link
D) Time to Live

21. In a DHCP server, what is the purpose of the DHCP lease duration?
A) Determines the lease cost for clients
B) Sets the maximum number of DHCP clients
C) Specifies the time a client can use an assigned IP address
D) Configures the DNS server address for clients

22. What is iSCSI, and how does it facilitate storage connectivity in a


network environment?
A) A protocol for secure web browsing
B) A file-sharing service
C) A storage networking protocol over TCP/IP
D) A database management system

23. What is the primary advantage of using iSCSI for storage connectivity
over traditional storage area network (SAN) solutions?
A) Higher cost-effectiveness
B) Lower data transfer speed
C) Limited scalability
D) Exclusive compatibility with Windows servers

24. In Hyper-V, what is a snapshot, and how does it differ from a backup?
A) Snapshots capture the state of a virtual machine at a specific
point in time, while backups store the entire VM configuration.
B) Snapshots and backups are terms used interchangeably in Hyper-V.
C) Backups are automatic, while snapshots need to be manually initiated.
D) Snapshots are only applicable to physical servers.

25. Which Group Policy setting is commonly used to enforce security


policies, such as password complexity requirements, on Windows client
machines?
A) Account Lockout Policy
B) User Rights Assignment
C) Security Options
D) Password Policy

26. What is Group Policy in Windows Server used for?


A) Managing hardware resources
B) Configuring Activee Directory users
C) Centralized management of system settings
D) Controlling network protocols

27. Which tool is commonly used to create and manage Group Policy
Objects (GPOs) in Windows server?
A) Active directory users and computers
B) Group policy management console (GPMC)
C) Windows Powershell
D) Computer Management Console

28. Which group policy setting is commonly used to deploy software


applications to windows computers?
A) Account policies
B) Security options
C) Software Installation
D) Administrative Templates

29. Which command line tool is used to force an immediate update of


Group policy settings on a windows Client?
A) gpedit.msc
B) gpupdate
C) gpresult
D) gpmc.msc

30. In SNMP, what is the purpose of the MIB (Management Information


Base)?
A) It provides a database of device IP addresses.
B) It defines the hierarchical structure and data types for managed
objects.
C) It encrypts SNMP messages for secure communication.
D) It configures SNMP traps for alerting.

31. Which DNS record type is used to map IP addresses to hostnames in


reverse DNS lookups?
A) PTR
B) A
C) CNAME
D) MX
Note: The PTR record associates an IP address with a domain name,
providing the reverse mapping of the more common "A" (Address)
record, which maps hostnames to IP addresses.

32. How does iSCSI differ from traditional Fibre Channel in terms of storage
connectivity?
A) iSCSI is a hardware-based solution, while Fibre Channel is software-based.
B) iSCSI uses standard Ethernet networks, while Fibre Channel
requires specialized hardware.
C) iSCSI is exclusively designed for Windows servers, while Fibre Channel is
platform-independent.
D) iSCSI and Fibre Channel have identical configurations and performance
characteristics.

33. Which feature in Hyper-V allows for the movement of a running virtual
machine from one host to another with minimal downtime?
A) Hyper-V Replica
B) Dynamic Memory
C) Live Migration
D) Checkpoint

34. What does the "D" in DORA stand for in the DHCP process?
A) Data
B) Discovery
C) Distribution
D) Dynamic

35. During the DHCP process, what is the purpose of the


"Discover" message sent by a client?
A) Requesting an IP address
B) Discovering available DHCP servers
C) Confirming lease duration
D) Declaring network connectivity

36. In the DHCP DORA process, what is the typical method used by
a DHCP client to send a "Request" to a DHCP server?
A) Unicast
B) Broadcast
C) Multicast
D) Any of the above
37. What is the primary role of the DHCP server during the "Offer"
phase of the DHCP process?
A) Assigning an IP address to the client
B) Confirming the client's lease duration
C) Proposing an available IP address to the client
D) Verifying the client's MAC address
38. What is the purpose of the "Acknowledge" (ACK) message sent
by the DHCP server during the DHCP process?
A) Confirming acceptance of the IP address lease
B) Acknowledging receipt of the client's "Discover" message
C) Requesting additional configuration details
D) Assigning a new IP address to the client

39. During the DHCP process, what happens if the client does not
receive an "Acknowledge" (ACK) message from any DHCP
server?
A) The client retries the "Discover" phase.
B) The client reverts to a static IP address.
C) The client retransmits the "Request" message.
D) The client sends a "Release" message to the server.

40. Client is any process that ____________.


A) Requests specific services from the server process
B) Provide services to the server process
C) Give response
D) None of the above

41. In mainframe computer, the client is


A) Just a dump terminal
B) With a little processing capacity
C) With its own processing capacity and memory space
D) None of the above

42. The main functions of client system is ________.


A) Accept and processes database request
B) Managing the user interface
C) Provides recovery control
D) Ensures that integrity constraints are not violated

43. In N-tier client/server model, the business logic is


A) Centralized
B) Located in client side
C) Located in server side
D) None of the above.
44. Which of the following is the component of client server application?
A) Hardware
B) Software
C) Communication middleware
D) All of the above

45. Communication middleware __________.


A) Provides interface to the end users.
B) Ensures messages between client and servers are properly
routed and delivered.
C) Checks the validity of the request
D) Is a idle machine

46. ___________ and ___________ are also called as fat client.


A) Host based and server based processing
B) Server based and client based processing
C) Client based and cooperative processing.
D) Host based and client based processing

47. What is the disadvantage of thin client in a client server architecture?


A) High resource comsumption
B) Limited processing capabilities
C) Independence from the server
D) Enhanced security risk

48. Which is the factors that influence the success of client server
computing
A) Internetworking
B) Interoperability
C) Compatible environments
D) All of the above

49. ____________ is not the logical components of active directory.


A) Domain
B) Tree
C) Site
D) Forest
50. In the Discover of DORA, the IP address of Destination is ________.
A) 255.255.255.255
B) 0.0.0.0
C) 169.254.0.12
D) None of the above

You might also like