CISCO IT Essentials Revision Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Markhurd
M
Markhurd
Community Contributor
Quizzes Created: 1 | Total Attempts: 5,008
Questions: 19 | Attempts: 5,008

SettingsSettingsSettings
CISCO IT Essentials Revision Test - Quiz

Soul Destroying Cisco IT Essentials Reviosn Quiz


Questions and Answers
  • 1. 

    When choosing a case what must be considered?

    • A.

      Size, Availiable space, Vents

    • B.

      Model Type, Power Supply

    • C.

      Model type, appearance, status display

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    When choosing a case, it is important to consider several factors. The size of the case should be appropriate for the components you plan to install. Available space is crucial to ensure that all the necessary components fit comfortably inside the case. Vents are important for proper airflow and cooling. The model type and power supply should be compatible with your system requirements. Additionally, the appearance and status display of the case can be important for aesthetic purposes and monitoring system performance. Therefore, all of the above factors must be considered when choosing a case.

    Rate this question:

  • 2. 

    A single USB can support how many separate devices?

    • A.

      128

    • B.

      127

    • C.

      67

    • D.

      63

    Correct Answer
    B. 127
    Explanation
    A single USB can support up to 127 separate devices. This is because USB devices are assigned unique addresses, and the USB protocol allows for a maximum of 127 addresses. Therefore, a USB hub can connect multiple devices to a single USB port on a computer or other host device, allowing them to communicate and transfer data simultaneously.

    Rate this question:

  • 3. 

    What would a class C fire extinguisher used for?

    • A.

      Paper, wood, plastic, cardboard

    • B.

      Electrical equipment

    • C.

      Gasoline,kerosene or organic solvents

    • D.

      Combustable metals

    Correct Answer
    B. Electrical equipment
    Explanation
    A class C fire extinguisher is used for electrical equipment. Electrical fires are caused by electrical faults or malfunctions, and they require a specific type of extinguisher that is designed to safely extinguish the fire without conducting electricity. Using a class C fire extinguisher on electrical fires helps to prevent further damage and ensures the safety of individuals attempting to extinguish the fire.

    Rate this question:

  • 4. 

    What is a Power surge?

    • A.

      Interference from generators and lighting.

    • B.

      Sudden increase in voltage that lasts for a very short period and exceeds 100 percent of normal voltage on a line.

    • C.

      Dramatic increase in voltage above the normal flow of electric current.

    • D.

      Fluctuating voltages over a very short period of time

    Correct Answer
    C. Dramatic increase in voltage above the normal flow of electric current.
    Explanation
    A power surge refers to a sudden and significant increase in voltage that surpasses the normal flow of electric current. This surge occurs for a very short duration and can cause damage to electrical devices and appliances. It is typically caused by factors such as lightning strikes, generator interference, or faults in the power grid.

    Rate this question:

  • 5. 

    What connection is used to connect the Floppy drive?

    • A.

      Molex

    • B.

      Mini-Molex

    • C.

      Berg

    • D.

      SATA power connector

    Correct Answer
    C. Berg
    Explanation
    The Berg connection is used to connect the Floppy drive.

    Rate this question:

  • 6. 

    How many pins does a SATA cable have?

    • A.

      Six

    • B.

      Seven

    • C.

      Eight

    • D.

      Nine

    Correct Answer
    B. Seven
    Explanation
    A SATA cable typically has seven pins. This type of cable is commonly used to connect storage devices such as hard drives or solid-state drives to a computer's motherboard. The seven pins are responsible for transmitting data and providing power to the connected device.

    Rate this question:

  • 7. 

    When gathering information from a customer what sort of questions should be used to gather general information?

    • A.

      Open-ended

    • B.

      Close-ended

    • C.

      Technical

    • D.

      Specific

    Correct Answer
    A. Open-ended
    Explanation
    Open-ended questions should be used to gather general information from a customer. Open-ended questions allow the customer to provide detailed and descriptive responses, providing a deeper understanding of their needs and preferences. These questions encourage the customer to share their thoughts, opinions, and experiences, enabling the gathering of comprehensive and valuable information. In contrast, close-ended questions limit the customer's response options to predefined choices, technical questions focus on specific technical details, and specific questions narrow down the scope of the information being gathered.

    Rate this question:

  • 8. 

    How many beeps will be emitted when the OS is booting properly?

    • A.

      1

    • B.

      2

    • C.

      4

    • D.

      5

    Correct Answer
    A. 1
    Explanation
    When the OS is booting properly, only one beep will be emitted. This is a common indication that the system has successfully completed the boot process and is ready for use.

    Rate this question:

  • 9. 

    What is Virtual real mode?

    • A.

      Executes 1 program at a time, can only address 1MB of system memory at a time.

    • B.

      Has access to all memory in a computer, including virtual memory.

    • C.

      Allows a real mode application to run within a protected mode operating system.

    • D.

      Creates an environment of an earlier OS for applications that are not compatible with the current OS.

    Correct Answer
    C. Allows a real mode application to run within a protected mode operating system.
    Explanation
    Virtual real mode refers to the capability of allowing a real mode application to run within a protected mode operating system. This means that a program designed to run in the older real mode can still be executed within a modern protected mode environment. This enables compatibility for applications that are not compatible with the current operating system, providing an environment that mimics an earlier OS while running within a protected mode system.

    Rate this question:

  • 10. 

    What best describes a Network OS?

    • A.

      Supports multiple users

    • B.

      Runs multiple applications

    • C.

      Robust and Redundant

    • D.

      Provides increased security comopared to desktop OS

    • E.

      All of above

    Correct Answer
    E. All of above
    Explanation
    A Network OS is a type of operating system that supports multiple users, runs multiple applications, is robust and redundant, and provides increased security compared to a desktop OS. This means that a Network OS can handle the demands of a network environment by allowing multiple users to access and use the system simultaneously, running various applications concurrently, ensuring reliability and availability through redundancy, and offering enhanced security features to protect the network from potential threats. Therefore, the correct answer is "All of the above."

    Rate this question:

  • 11. 

    What is the best way to keep your laptop healthy?

    • A.

      Backup all files regularly

    • B.

      Replace parts every 6 months

    • C.

      Clean regularly

    • D.

      Reinstall the OS every 12 months

    Correct Answer
    C. Clean regularly
    Explanation
    Regularly cleaning your laptop is the best way to keep it healthy. Dust, dirt, and debris can accumulate over time, causing overheating and potentially damaging the internal components. Regular cleaning helps to prevent this buildup and ensures that the laptop runs efficiently. It is important to use appropriate cleaning tools and methods to avoid causing any damage to the laptop.

    Rate this question:

  • 12. 

    PC Express cards have what pin connections?

    • A.

      12 -24

    • B.

      24 - 32

    • C.

      34 - 54

    • D.

      64 - 128

    Correct Answer
    C. 34 - 54
    Explanation
    PC Express cards have 34 - 54 pin connections. This means that the card is designed to fit into a PC Express slot that has a corresponding number of pins. The pin connections allow the card to communicate with the computer and transfer data.

    Rate this question:

  • 13. 

    USB 2.0 has a transfer rate of what?

    • A.

      54Mbps

    • B.

      128Mbps

    • C.

      400Mbps

    • D.

      480Mbps

    • E.

      800Mbps

    Correct Answer
    D. 480Mbps
    Explanation
    USB 2.0 has a transfer rate of 480Mbps. This means that it can transfer data at a speed of 480 megabits per second. This high transfer rate allows for fast and efficient data transfer between devices connected through USB 2.0 ports.

    Rate this question:

  • 14. 

    What is step 5 of the troubleshooting process?

    • A.

      Try quick solutions first

    • B.

      Gather data from the computer

    • C.

      Evaluate problem and implement solution

    • D.

      Close with customer

    Correct Answer
    C. Evaluate problem and implement solution
    Explanation
    Step 5 of the troubleshooting process is to evaluate the problem and implement a solution. This step involves analyzing the gathered data, identifying the root cause of the problem, and devising a plan to fix it. It requires careful evaluation of the available information and applying problem-solving techniques to come up with an effective solution. Once the solution is determined, it can be implemented to resolve the issue at hand.

    Rate this question:

  • 15. 

    In data transmission what is it called when data flows in one direction at a time?

    • A.

      Simplex

    • B.

      Half-Duplex

    • C.

      Duplex

    • D.

      DSL

    Correct Answer
    B. Half-Duplex
    Explanation
    Half-duplex is the correct answer because it refers to a mode of data transmission where data flows in only one direction at a time. In this mode, communication can happen in both directions, but not simultaneously. This means that while one device is transmitting data, the other device can only receive it, and vice versa. It is different from simplex, where data flows in only one direction, and duplex, where data flows in both directions simultaneously. DSL (Digital Subscriber Line) is a technology used for high-speed internet access and is not related to the question.

    Rate this question:

  • 16. 

    IP Addresses can be divided into categories. What is Class B defined as?

    • A.

      Large networks, implemented by large companies in some countries

    • B.

      Medium sized networks, implemented by universites

    • C.

      Experimental testing

    • D.

      Special use for multicasting

    • E.

      Small networks, implemented by ISPs for customer subscriptions

    Correct Answer
    B. Medium sized networks, implemented by universites
    Explanation
    Class B IP addresses are defined as medium-sized networks implemented by universities. This class of IP addresses provides a larger range of available addresses compared to Class A, making it suitable for organizations that require a moderate number of network addresses. Class B addresses have a network portion of 16 bits and can support up to 65,536 hosts per network. This allocation allows universities and other medium-sized organizations to have sufficient IP addresses to accommodate their network infrastructure and users.

    Rate this question:

  • 17. 

    What does a Class A Subnet mask look like?

    • A.

      255.0.0.0

    • B.

      255.255.0.0

    • C.

      255.255.255.0

    • D.

      255.255.255.255

    Correct Answer
    A. 255.0.0.0
    Explanation
    A Class A subnet mask is represented by the IP address 255.0.0.0. In this subnet mask, the first octet (255) is fully filled with 1s, indicating that the network portion of the IP address is 8 bits long. The remaining three octets (0.0.0) are filled with 0s, indicating that the host portion of the IP address is 24 bits long. This subnet mask allows for a large number of network addresses and a smaller number of host addresses, making it suitable for large networks.

    Rate this question:

  • 18. 

    .............................. is an attack that uses "Zombies" to make tracing the origin of the attack difficult.

    • A.

      SYN Flood

    • B.

      DNS Poisoning

    • C.

      Spoofing

    • D.

      DDoS

    Correct Answer
    D. DDoS
    Explanation
    A DDoS (Distributed Denial of Service) attack overwhelms a target system with a flood of traffic from multiple sources, making it difficult to trace the origin of the attack. This is because the attack is distributed across multiple "Zombies" or compromised devices, which makes it challenging to pinpoint the actual attacker.

    Rate this question:

  • 19. 

    Rtretre

    • A.

      Rtrtr

    • B.

      Rgre

    Correct Answer
    A. Rtrtr

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 10, 2009
    Quiz Created by
    Markhurd
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.