CISCO It Essentials Revision Test

19 Questions

Settings
CISCO Quizzes & Trivia

Soul Destroying Cisco IT Essentials Reviosn Quiz


Questions and Answers
  • 1. 
    When choosing a case what must be considered?
    • A. 

      Size, Availiable space, Vents

    • B. 

      Model Type, Power Supply

    • C. 

      Model type, appearance, status display

    • D. 

      All of the above

  • 2. 
    A single USB can support how many separate devices?
    • A. 

      128

    • B. 

      127

    • C. 

      67

    • D. 

      63

  • 3. 
    What would a class C fire extinguisher used for?
    • A. 

      Paper, wood, plastic, cardboard

    • B. 

      Electrical equipment

    • C. 

      Gasoline,kerosene or organic solvents

    • D. 

      Combustable metals

  • 4. 
    • A. 

      Interference from generators and lighting.

    • B. 

      Sudden increase in voltage that lasts for a very short period and exceeds 100 percent of normal voltage on a line.

    • C. 

      Dramatic increase in voltage above the normal flow of electric current.

    • D. 

      Fluctuating voltages over a very short period of time

  • 5. 
    What connection is used to connect the Floppy drive?
    • A. 

      Molex

    • B. 

      Mini-Molex

    • C. 

      Berg

    • D. 

      SATA power connector

  • 6. 
    How many pins does a SATA cable have?
    • A. 

      Six

    • B. 

      Seven

    • C. 

      Eight

    • D. 

      Nine

  • 7. 
    When gathering information from a customer what sort of questions should be used to gather general information?
    • A. 

      Open-ended

    • B. 

      Close-ended

    • C. 

      Technical

    • D. 

      Specific

  • 8. 
    How many beeps will be emitted when the OS is booting properly?
    • A. 

      1

    • B. 

      2

    • C. 

      4

    • D. 

      5

  • 9. 
    • A. 

      Executes 1 program at a time, can only address 1MB of system memory at a time.

    • B. 

      Has access to all memory in a computer, including virtual memory.

    • C. 

      Allows a real mode application to run within a protected mode operating system.

    • D. 

      Creates an environment of an earlier OS for applications that are not compatible with the current OS.

  • 10. 
    What best describes a Network OS?
    • A. 

      Supports multiple users

    • B. 

      Runs multiple applications

    • C. 

      Robust and Redundant

    • D. 

      Provides increased security comopared to desktop OS

    • E. 

      All of above

  • 11. 
    What is the best way to keep your laptop healthy?
    • A. 

      Backup all files regularly

    • B. 

      Replace parts every 6 months

    • C. 

      Clean regularly

    • D. 

      Reinstall the OS every 12 months

  • 12. 
    PC Express cards have what pin connections?
    • A. 

      12 -24

    • B. 

      24 - 32

    • C. 

      34 - 54

    • D. 

      64 - 128

  • 13. 
    USB 2.0 has a transfer rate of what?
    • A. 

      54Mbps

    • B. 

      128Mbps

    • C. 

      400Mbps

    • D. 

      480Mbps

    • E. 

      800Mbps

  • 14. 
    What is step 5 of the troubleshooting process?
    • A. 

      Try quick solutions first

    • B. 

      Gather data from the computer

    • C. 

      Evaluate problem and implement solution

    • D. 

      Close with customer

  • 15. 
    In data transmission what is it called when data flows in one direction at a time?
    • A. 

      Simplex

    • B. 

      Half-Duplex

    • C. 

      Duplex

    • D. 

      DSL

  • 16. 
    IP Addresses can be divided into categories. What is Class B defined as?
    • A. 

      Large networks, implemented by large companies in some countries

    • B. 

      Medium sized networks, implemented by universites

    • C. 

      Experimental testing

    • D. 

      Special use for multicasting

    • E. 

      Small networks, implemented by ISPs for customer subscriptions

  • 17. 
    What does a Class A Subnet mask look like?
    • A. 

      255.0.0.0

    • B. 

      255.255.0.0

    • C. 

      255.255.255.0

    • D. 

      255.255.255.255

  • 18. 
    .............................. is an attack that uses "Zombies" to make tracing the origin of the attack difficult.
    • A. 

      SYN Flood

    • B. 

      DNS Poisoning

    • C. 

      Spoofing

    • D. 

      DDoS

  • 19. 
    Rtretre
    • A. 

      Rtrtr

    • B. 

      Rgre