CISCO In 23 Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By G.squires
G
G.squires
Community Contributor
Quizzes Created: 1 | Total Attempts: 184
Questions: 19 | Attempts: 184

SettingsSettingsSettings
CISCO Quizzes & Trivia

Cisco Final Exam


Questions and Answers
  • 1. 

    Ram, temporary storage comes in many different forms name 2 from the list given?

    • A.

      DDR

    • B.

      SDRAM

    • C.

      SSAM

    • D.

      DSDRDRA

    • E.

      SDEEMA

    Correct Answer(s)
    A. DDR
    B. SDRAM
    Explanation
    The question asks for two forms of temporary storage from the given list. The correct answer is DDR and SDRAM, which are both types of RAM (Random Access Memory) commonly used in computers.

    Rate this question:

  • 2. 

    When should you not wear a protective wrist strap???

    • A.

      When leaving the building

    • B.

      When working on a monitor case

    • C.

      When working on a power supply

    • D.

      Just as a fashion accessory

    Correct Answer
    C. When working on a power supply
    Explanation
    When working on a power supply, it is important not to wear a protective wrist strap. This is because power supplies can carry high voltages, and wearing a wrist strap could potentially create a path for the electrical current to flow through the body, resulting in electric shock or injury. Therefore, it is necessary to remove the wrist strap when working on a power supply to ensure safety.

    Rate this question:

  • 3. 

    Safety tools within the pc are...............,  .....................,  .............................

    Correct Answer
  • 4. 

    Name 2 different printer??

    • A.

      Inkjet

    • B.

      Laserjet

    • C.

      Fast Jet

    • D.

      Mission control

    • E.

      Ultra Double Dulex High Roller Printer

    Correct Answer(s)
    A. Inkjet
    B. Laserjet
    Explanation
    The correct answer is Inkjet and Laserjet because these are two different types of printers commonly used in the market. Inkjet printers use liquid ink sprayed onto the paper to create images, while Laserjet printers use a laser beam to transfer toner onto the paper. Both printers have their own advantages and disadvantages, making them suitable for different printing needs.

    Rate this question:

  • 5. 

    Writing is which step in the 6 step process??

    • A.

      1

    • B.

      34

    • C.

      3

    • D.

      6

    • E.

      2

    Correct Answer
    C. 3
    Explanation
    The correct answer is 3. In a 6 step process, writing is the third step. This suggests that there are two steps that come before writing and three steps that come after it. Without further context, it is not possible to determine what the specific steps are or what the process is about.

    Rate this question:

  • 6. 

    What research tools are available for technicians for the list below??

    • A.

      Technical Websites

    • B.

      News of the world

    • C.

      Girlfriends Mum

    • D.

      Fountain of knowledge

    • E.

      Search engines

    Correct Answer(s)
    A. Technical Websites
    E. Search engines
    Explanation
    The available research tools for technicians are technical websites and search engines. Technical websites provide specific information and resources related to their field of expertise, making them valuable sources for technicians. Search engines, on the other hand, allow technicians to search for information and resources across the internet, providing a wide range of sources and data. The other options mentioned, such as "News of the world," "Girlfriends Mum," and "Fountain of knowledge," are not research tools specifically designed for technicians and may not provide relevant or reliable information for their work.

    Rate this question:

  • 7. 

    SLA stands for..............................................?

    Correct Answer(s)
    Service level agreement
    service level agreement
    Explanation
    SLA stands for Service Level Agreement. A Service Level Agreement is a contract between a service provider and a customer that outlines the level of service that will be provided. It defines the metrics, responsibilities, and expectations of both parties. SLAs are commonly used in the IT industry to ensure that services are delivered at an agreed-upon level of quality.

    Rate this question:

  • 8. 

    A Desktop Operating system is...............................??

    • A.

      Multiple users

    • B.

      Single user

    • C.

      World wide

    • D.

      Not available in space

    • E.

      Yorkshire only

    Correct Answer
    B. Single user
    Explanation
    A desktop operating system is designed to be used by a single user at a time. It provides a user-friendly interface and allows the user to perform various tasks such as running applications, managing files, and accessing the internet. Unlike server operating systems which are designed to support multiple users simultaneously, a desktop operating system focuses on providing a personalized and individualized experience for a single user.

    Rate this question:

  • 9. 

    Manipulating OS files can be accessed through....................??

    • A.

      NT Kernel

    • B.

      Multiple Users

    • C.

      MSconfig

    • D.

      Bios

    • E.

      Dancing queen

    Correct Answer
    C. MSconfig
    Explanation
    MSconfig is a system configuration utility in Windows operating systems that allows users to manipulate OS files. It provides a user-friendly interface to manage startup programs, services, and other system settings. Through MSconfig, users can enable or disable specific files or programs, making it a suitable option for manipulating OS files. The other options mentioned in the question, such as NT Kernel, Multiple Users, Bios, and Dancing queen, are not directly related to manipulating OS files.

    Rate this question:

  • 10. 

    NTFS can be converted to FAT32 and vice versa.... (true or false)

    Correct Answer
    Explanation
    True. NTFS (New Technology File System) and FAT32 (File Allocation Table 32-bit) are both file systems used by Windows operating systems. It is possible to convert a partition or disk from NTFS to FAT32 or vice versa using various tools or built-in Windows utilities. However, it is important to note that the conversion process may result in data loss, and there are limitations and restrictions involved in converting between these file systems.

    Rate this question:

  • 11. 

    CPU's within a Laptop are......................??

    • A.

      ABC1

    • B.

      ACPI

    • C.

      LALALALALALA

    • D.

      French Dwarves

    • E.

      PCI

    Correct Answer
    B. ACPI
    Explanation
    ACPI stands for Advanced Configuration and Power Interface. It is a standard that allows the operating system to control the power management of the computer's hardware. Specifically, ACPI enables the operating system to manage the CPU's power states, such as sleep mode and hibernation, as well as other hardware components. Therefore, the correct answer is ACPI.

    Rate this question:

  • 12. 

    CPU's for a laptop are............................?? 

    • A.

      Universal

    • B.

      Compact

    • C.

      Unavailable

    • D.

      External

    • E.

      In TREE Sections

    Correct Answer
    B. Compact
    Explanation
    The given question asks about the type of CPUs for a laptop. The correct answer, "Compact," implies that the CPUs used in laptops are designed to be small and space-saving. This is because laptops have limited space compared to desktop computers, so compact CPUs are necessary to fit within the laptop's smaller form factor.

    Rate this question:

  • 13. 

    Name 2 different types of network??

    • A.

      Wan

    • B.

      BOB

    • C.

      WLAN

    • D.

      WELPO

    • E.

      BCGTI

    Correct Answer(s)
    A. Wan
    C. WLAN
    Explanation
    The question asks for two different types of networks. The options provided are Wan, BOB, WLAN, WELPO, and BCGTI. Out of these options, Wan and WLAN are the correct answers. Wan stands for Wide Area Network, which is a network that covers a large geographical area, typically connecting multiple smaller networks. WLAN stands for Wireless Local Area Network, which is a wireless network that allows devices to connect and communicate within a limited area, such as a home or office.

    Rate this question:

  • 14. 

    Peer to peer networks have........................??

    • A.

      Radar antennas

    • B.

      Complex radio

    • C.

      TSP connection

    • D.

      No central point of control

    • E.

      Port Talbot

    Correct Answer
    D. No central point of control
    Explanation
    Peer to peer networks do not rely on a central point of control to manage and coordinate the communication between devices. Instead, each device in the network acts as both a client and a server, allowing for direct communication and file sharing between peers. This decentralized approach provides greater flexibility, scalability, and resilience to the network, as there is no single point of failure.

    Rate this question:

  • 15. 

    Protocols are.......................??

    • A.

      Football boots

    • B.

      A set of rules or standards

    • C.

      CPU switchable

    • D.

      Hard-disk related

    • E.

      Common within OS Windows

    Correct Answer
    B. A set of rules or standards
    Explanation
    Protocols refer to a set of rules or standards that govern the way in which devices communicate with each other in a network. These rules define the format, timing, sequencing, and error control of data transmission. By following these protocols, devices can ensure that data is transmitted accurately and efficiently. Therefore, the correct answer for this question is "A set of rules or standards."

    Rate this question:

  • 16. 

    Wireless Ethernet has certain protocols, 802.15.1 is for what connection??

    • A.

      CPU

    • B.

      Wi-Fi

    • C.

      Port Talbot

    • D.

      99% sausage

    • E.

      Bluetooth

    Correct Answer
    E. Bluetooth
    Explanation
    The correct answer is Bluetooth. Bluetooth is a wireless technology that allows devices to connect and communicate with each other over short distances. It is commonly used for connecting devices such as smartphones, tablets, and headphones to other devices like speakers, computers, and car stereos. The given question is asking about the protocol 802.15.1, which is the technical specification for Bluetooth connections. Therefore, the correct answer is Bluetooth.

    Rate this question:

  • 17. 

    Worms can ......................??

    • A.

      Disappear

    • B.

      Self replicate

    • C.

      Vanish

    • D.

      Run away

    • E.

      Destroy everything

    Correct Answer
    B. Self replicate
    Explanation
    Worms have the ability to self-replicate, meaning they can produce offspring without the need for mating with another individual. This process allows worms to increase their population rapidly and colonize new areas. Self-replication is a common characteristic of many types of worms, including earthworms and parasitic worms. By reproducing asexually, worms can ensure the survival of their species even in challenging environments.

    Rate this question:

  • 18. 

    Java script works with which application??

    • A.

      HTML addresses

    • B.

      Data protection

    • C.

      Web pages

    • D.

      Common wealth

    • E.

      Antivirus

    Correct Answer
    A. HTML addresses
    Explanation
    JavaScript works with HTML addresses. JavaScript is a programming language that is used to add interactivity and dynamic features to web pages. It can be embedded directly into HTML code and is executed by web browsers. JavaScript allows developers to manipulate HTML elements, handle user interactions, and perform various operations on web pages. Therefore, the correct answer is HTML addresses.

    Rate this question:

  • 19. 

    Spoofing uses what to gain access...............??

    • A.

      Pretend to be helpful for information

    • B.

      Random window closure

    • C.

      Tree types of access

    • D.

      Interception of data

    • E.

      Zombie profiles

    Correct Answer
    A. Pretend to be helpful for information
    Explanation
    Spoofing is a technique used by malicious actors to gain unauthorized access to systems or information. In this context, "pretending to be helpful for information" refers to a type of spoofing known as social engineering. Social engineering involves manipulating individuals into divulging sensitive information or granting access to secure systems by pretending to be a trusted source or providing assistance. This can include tactics such as phishing emails or phone calls, where the attacker poses as a legitimate entity in order to deceive the target into revealing confidential data.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 10, 2009
    Quiz Created by
    G.squires
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.