IT Essentials Chapter 1 - 10 Quiz

25 Questions | Total Attempts: 614

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

IT Essentials chapters 1 - 10 test quiz.


Questions and Answers
  • 1. 
    Which two of the following are common motherboard form factors? (Choose 2)
    • A. 

      ATX

    • B. 

      OCR

    • C. 

      NLX

    • D. 

      PSU

  • 2. 
    A _________ can be erased without removing the chip. (1 or 6 words)
  • 3. 
    How many devices can be attached to a single Firewire port?
    • A. 

      1

    • B. 

      9

    • C. 

      63

    • D. 

      51

    • E. 

      127

  • 4. 
    A _________ summarises about material identification, including hazardous ingredients etc. (1 or 4 words)
  • 5. 
    Scandisk is an example of a disk management tool. (True or False)
  • 6. 
    There are two different types of user interface, which of the following are correct?  (Choose 2)
    • A. 

      DOS

    • B. 

      CLI

    • C. 

      API

    • D. 

      GUI

    • E. 

      PnP

  • 7. 
    Look at the list below and decide what is the correct boot sequence.a. POST is runb. NTLDR reads the boot.ini filec. BIOS reads the MBRd. NTLDR loads ntoskrnl.exe and hal.dlle. ntoskrnl.exe starts winlogon.exe
    • A. 

      A, c, e, d, b

    • B. 

      E, c, d, b, a

    • C. 

      A, c, b, d, e

    • D. 

      D, b, e, a, c

  • 8. 
    Which registry key contains all information relating to hardware and software in the system?
    • A. 

      HKEY_CURRENT_USER

    • B. 

      HKEY_CURRENT_CONFIG

    • C. 

      HKEY_LOCAL_MACHINE

    • D. 

      HKEY_USERS

    • E. 

      HKEY_CLASSES_ROOT

  • 9. 
    _______ is a type of Token Ring network. It runs on fibre-optic cable and is often used to connect several buildings in a office complex or university campus. (1 or 4 words)
  • 10. 
    Which layer of the OSI model establishes, manages and terminates the connections between the local and remote applications.
    • A. 

      Presentation

    • B. 

      Physical

    • C. 

      Transport

    • D. 

      Session

    • E. 

      Data Link

  • 11. 
    _______ dynamically assigns an IP address to network devices. (1 or 4 words)
  • 12. 
    Which partion of a hard drive is the operating system booted from?
    • A. 

      Extended

    • B. 

      Active

    • C. 

      Primary

    • D. 

      Logical

  • 13. 
    Which IEEE wireless standard allows transfer rates up to 54Mbps @ 5GHz?
    • A. 

      802.11g

    • B. 

      802.11b

    • C. 

      802.11a

    • D. 

      802.11n

  • 14. 
    ________ is a transport protocol that offers a connectionless service for delivery of data. Network management applications, network file systems and simple file transport use _______.
  • 15. 
    Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose 2)
    • A. 

      EPP

    • B. 

      DLP

    • C. 

      DPI

    • D. 

      ECP

    • E. 

      PPM

  • 16. 
    A _______ is one complete circle of data on a hard drive platter.
  • 17. 
    This is also know as a file allocation table and is the smallest unit of space used for storing data. (Choose 1)
    • A. 

      Track

    • B. 

      Sector

    • C. 

      Cluster

    • D. 

      FAT

  • 18. 
    During the POST process, how many beeps indicates an error with the processor? (Choose 1)
    • A. 

      7 Beeps

    • B. 

      2 Beeps

    • C. 

      5 Beeps

    • D. 

      11 Beeps

    • E. 

      6 Beeps

  • 19. 
    ____________ is a type of social engineering, where the attacker pretends to represent a legitimate organisation. (1 word)
  • 20. 
    Which of the following are not TCP/IP attacks? (Choose 2)
    • A. 

      Replay

    • B. 

      SYN Flood

    • C. 

      Worm

    • D. 

      DDoS

    • E. 

      Spam

  • 21. 
    What benefits does NTFS provide over FAT32? (Choose 2)
    • A. 

      File and folder level permissions

    • B. 

      Limit of 4GB files

    • C. 

      Smaller clusters use more of the available space

    • D. 

      Compatible with Windows 95/98/Me

    • E. 

      Supports 4.17 million files per volume

  • 22. 
    This wireless security protocol was created by Cisco to address weaknesses in WEP & WPA. ____________ is a good choice when using Cisco equipment in a Windows or Linux environment.  (1, 2 or 4 words)
  • 23. 
    Which wireless security protocol is used by devices that employ Wireless Application Protocol? (Choose 1)
    • A. 

      WPA

    • B. 

      WEP 128

    • C. 

      WTLS

    • D. 

      LEAP

    • E. 

      SSID

  • 24. 
    A ________ _______ is a type of TCP/IP attack that randomly opens TCP ports tying up the network resources. (2 words)
  • 25. 
    What is the 4th step in the Laser printing process? (Choose 1)
    • A. 

      Fusing

    • B. 

      Developing

    • C. 

      Cleaning

    • D. 

      Transferring

    • E. 

      Conditioning

Back to Top Back to top