This IT Essentials Chapter 1 - 10 Examination assesses knowledge on server redundancy, power management, boot sequences, hardware troubleshooting, and media identification. It is designed for learners seeking to improve their technical skills in handling and understanding IT infrastructure.
NIC
Wireless NIC
USB gateway
RAID adapter
Multiple slave hard disk adapter
Rate this question:
Hibernate
Suspend
Left on with no power mode
Soft shutdown
Rate this question:
Manufacturer's website
Printer installation disk
Windows Device Manager
Windows hardware profiles Windows hardware profiles Windows hardware profiles
Shut down the computer.
Click on the Safely Remove Hardware icon in the system tray then on the device.
Right-click on the drive in My Computer, then click on Remove Drive.
Remove the power to the drive.
Rate this question:
20-pin
24-pin
Berg
Molex
P8
P9
Rate this question:
Remove all the peripherals except the hard drive and observe the results.
Move the laptop to another location and observe the results.
Replace the power adapter and observe the results.
Replace the USB hub and observe the results.
Flash the BIOS on the laptop and observe the results.
Rate this question:
Hard disk
USB optical drive
PC card
Flash drive
Rate this question:
The computer automatically boots into Safe Mode and displays a warning on the The PC automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer emits a pattern of beeps indicating the failing device.
The computer returns an error message indicating the I/O address of the failing The computer returns an error message indicating the I/O device is weak.
Rate this question:
My Computer
Control Panel
Device Manager
BIOS
Start Menu
Rate this question:
Right-click the desktop, then click Power Modes > Standby.
Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI.
Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
Left-click Start > All Programs > Accessories > System Tools > Power Management.
Rate this question:
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
Rate this question:
DHCP
DNS
ICMP
RARP
TCP
Rate this question:
Glass cleaner
Isopropyl alcohol
Mild detergent
Rubbing alcohol
Slightly abrasive cleanser
Rate this question:
All-in-one
Drum
Handheld
Flatbed
Rate this question:
BIOS reads the MBR.
NTDETECT.COM is used to detect any installed hardware.
NTDLR reads the registry files.
The WINLOGON.EXE program is started.
Rate this question:
Regularly replace the laptop battery.
Encourage users to run the laptop from the battery more often.
Encourage users to run the laptop from the AC adapter more often.
Remove and clean the CPU.
Clean the air vents.
Replace the fan.
Rate this question:
Start > Control Panel > Power Options
Start > Control Panel > Administrative Tools
Start > Control Panel > Power Modes
Start > Control Panel > System
Rate this question:
Many hosts participate in a coordinated attack.
Infected computers are called Daemons.
It is easy to identify the source of the attack.
All hosts must be in the same geographic area.
Rate this question:
Disconnect the power cord.
Keep any component in a plastic bag until installation.
Remove any batteries.
Use carpets in cool areas.
Wear rubber-soled shoes to work with the computer.
Rate this question:
Passwords should never expire.
Passwords should be a combination of letters and numbers.
Passwords should be changed by the user after specific periods of time.
Password expiration and lockout policies should be clearly defined.
Passwords should be short to reduce the chances of users forgetting them.
Rate this question:
Making data appear to come from a source other than the actual source.
Sending abnormally large amounts of data to a remote server to prevent user access to the server services.
Intercepting or inserting false information in traffic between two hosts.
Sending bulk e-mail to individuals, lists, or domains intending to prevent users Sending bulk e-mail to individuals, domains to prevent users from accessing Sending bulk e-mail to individuals, domains to prevent users accessing e-mail.
Rate this question:
Multi-ping attack
Phishing
Ping bomb
Ping of death
Spoofing
Zombie attack
Rate this question:
Class A
Class B
Class C
Class D
Class E
Rate this question:
The new floppy drive is faulty.
The ribbon cable is installed incorrectly.
The jumper settings are set incorrectly for the floppy drive.
The floppy drive has been disabled in the BIOS.
Rate this question:
Run a System Restore from the last restore point.
Use the Add or Remove Hardware applet in the Control Panel to remove the update.
Restore the hard drive from the last system backup.
Use the Recovery Console to restore the operating system.
Rate this question:
The cable is not connected properly to the NIC.
The computer has an invalid IP address.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
Rate this question:
Perform input/output between the CPU and peripherals.
Establish peer-to-peer communication between devices and software.
Request information from the CPU.
Access the computer RAM for reading and writing.
Rate this question:
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.
Rate this question:
Administrative Tools
BIOS
Command Prompt
Safe mode
System Registry
Rate this question:
DB-9
DB-25
IEEE 1284
IEEE 1394a
IEEE 1394b
Rate this question:
Convert
Fdisk
Msconfig
Ntbackup
Rate this question:
Bus
Double ring
Extended star
Ring
Star
Rate this question:
Drum
Ink cartridge
Ink ribbon
Paper
Toner
Rate this question:
FTP
HTTP
NetBEUI
POP
SSH
Rate this question:
ExpressCard
PS/2
ISA
PCMCIA
USB
Rate this question:
Concentrator
Hub
PBX
Router
Switch
Rate this question:
HTTP, FTP, Telnet, SSH
TCP, IP, DNS, DHCP
Application, transport, internet work, network interface
Application, presentation, session, transport
Physical, data link, network, transport
Rate this question:
They consume less power.
They are smaller.
They are lighter.
They require customized cooling mechanisms.
Rate this question:
Decreased need of personal training
Fewer peripherals needed
Decreased computer-to-user ratio
Lower cost licensing
Increased user specialization
Increased communication capabilities
Rate this question:
Create five primary partitions.
Create one extended partition with five logical drives within it.
Create one primary partition and an extended partition with four logical drives within Create one primary partition with four logical drives within it.
Create five extended partitions.
Create one logical partition with five primary partitions within it.
Create one primary partition and one logical partition with four logical drives within it.
Rate this question:
Equipment power
Corrupt print driver
Low-ink warning
Out of paper
Operating system compatibility
Firmware version
Rate this question:
Quiz Review Timeline (Updated): Mar 15, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.