IT Essentials Chapter 1 - 10 Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Colin2712
C
Colin2712
Community Contributor
Quizzes Created: 1 | Total Attempts: 641
| Attempts: 641 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. This wireless security protocol was created by Cisco to address weaknesses in WEP & WPA. ____________ is a good choice when using Cisco equipment in a Windows or Linux environment.  (1, 2 or 4 words)

Explanation

LEAP, also known as Lightweight Extensible Authentication Protocol, is a wireless security protocol created by Cisco to improve upon the weaknesses of WEP and WPA. It is a good choice when using Cisco equipment in both Windows and Linux environments.

Submit
Please wait...
About This Quiz
IT Essentials Quizzes & Trivia

The 'IT Essentials Chapter 1 - 10 Quiz' assesses knowledge on various IT topics including motherboard form factors, EEPROM technology, Firewire port capabilities, MSDS, disk management tools, and... see moreuser interface types. This quiz is crucial for learners aiming to enhance their understanding of essential IT concepts. see less

2. A ________ _______ is a type of TCP/IP attack that randomly opens TCP ports tying up the network resources. (2 words)

Explanation

A SYN flood is a type of TCP/IP attack where the attacker sends a large number of SYN requests to a target server, but does not complete the handshake process. This causes the server to keep waiting for a response, tying up its resources and preventing it from servicing legitimate requests. By opening TCP ports randomly, the attacker can overwhelm the network and disrupt its normal functioning.

Submit
3. A _________ can be erased without removing the chip. (1 or 6 words)

Explanation

EEPROM stands for Electronically Erasable Programmable Read Only Memory. This type of memory can be erased electronically without removing the chip. It allows for data to be written and erased multiple times, making it a versatile and reusable memory storage solution.

Submit
4. A _________ summarises about material identification, including hazardous ingredients etc. (1 or 4 words)

Explanation

The correct answer for this question is "MSDS, msds, Material Safety Data Sheet, material safety data sheet." An MSDS, also known as a Material Safety Data Sheet, provides a summary of information about material identification, including hazardous ingredients and other important safety information. It is a document that provides crucial details about the physical and chemical properties of a substance, as well as its potential hazards and precautions for safe handling and use.

Submit
5. Scandisk is an example of a disk management tool. (True or False)

Explanation

Scandisk is indeed an example of a disk management tool. It is a utility program used to check the integrity of a computer's hard disk drive for errors and fix them if necessary. Scandisk can also help to optimize the disk's performance by identifying and repairing bad sectors, cross-linked files, and other issues that may affect the disk's functionality. Therefore, the statement is true.

Submit
6. _______ dynamically assigns an IP address to network devices. (1 or 4 words)

Explanation

DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that dynamically assigns IP addresses to network devices. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration settings from a DHCP server. By using DHCP, network administrators can easily manage and allocate IP addresses to devices on their network, eliminating the need for manual configuration.

Submit
7. A _______ is one complete circle of data on a hard drive platter.

Explanation

A track is one complete circle of data on a hard drive platter. It is a concentric ring on the surface of the platter where data is stored. Each track is divided into sectors, which are the smallest units of data storage on a hard drive. The read/write head of the hard drive moves along the tracks to access and retrieve data.

Submit
8. ____________ is a type of social engineering, where the attacker pretends to represent a legitimate organisation. (1 word)

Explanation

Phishing is a type of social engineering where the attacker pretends to represent a legitimate organization. They typically use deceptive tactics such as email or messaging to trick individuals into providing sensitive information or clicking on malicious links. This can lead to identity theft, financial loss, or unauthorized access to personal accounts.

Submit
9. _______ is a type of Token Ring network. It runs on fibre-optic cable and is often used to connect several buildings in a office complex or university campus. (1 or 4 words)

Explanation

FDDI, which stands for Fiber Distributed Data Interface, is a type of Token Ring network. It utilizes fiber-optic cable and is commonly employed to establish connections between multiple buildings in an office complex or university campus.

Submit
10. ________ is a transport protocol that offers a connectionless service for delivery of data. Network management applications, network file systems and simple file transport use _______.

Explanation

User Datagram Protocol (UDP) is a transport protocol that offers a connectionless service for delivery of data. It is commonly used by network management applications, network file systems, and simple file transport. UDP does not provide reliable delivery or error checking, making it suitable for applications that prioritize speed over accuracy, or where occasional data loss is acceptable.

Submit
11. Which two of the following are common motherboard form factors? (Choose 2)

Explanation

ATX and NLX are the common motherboard form factors. ATX (Advanced Technology eXtended) is a widely used motherboard form factor that provides a standard size and layout for computer components. NLX (New Low eXtended) is another common form factor that was popular in the 1990s. Both ATX and NLX provide standardized dimensions and mounting hole placements, allowing for compatibility with various computer cases and components. OCR and PSU are not motherboard form factors.

Submit
12. Look at the list below and decide what is the correct boot sequence.

a. POST is run
b. NTLDR reads the boot.ini file
c. BIOS reads the MBR
d. NTLDR loads ntoskrnl.exe and hal.dll
e. ntoskrnl.exe starts winlogon.exe

Explanation

The correct boot sequence is a, c, b, d, e. First, the POST (Power-On Self Test) is run to check the hardware. Then, the BIOS reads the MBR (Master Boot Record) which contains the boot loader. Next, the boot loader (NTLDR) reads the boot.ini file to determine the operating system to load. After that, NTLDR loads the necessary files ntoskrnl.exe and hal.dll. Finally, ntoskrnl.exe starts winlogon.exe, which initializes the Windows login process.

Submit
13. How many devices can be attached to a single Firewire port?

Explanation

The correct answer is 63 because Firewire ports have the ability to support up to 63 devices connected to a single port. This is possible due to the daisy-chaining capability of Firewire, where multiple devices can be connected in a series using a single port. Each device in the chain acts as a node, allowing for a large number of devices to be connected to a single port.

Submit
14. Which registry key contains all information relating to hardware and software in the system?

Explanation

HKEY_LOCAL_MACHINE is the correct answer because it is the registry key that contains all information relating to hardware and software in the system. This key stores configuration settings for the entire system, including information about installed hardware devices, software settings, and system preferences. It is a crucial part of the Windows operating system and is used by various applications and services to access and modify system settings.

Submit
15. There are two different types of user interface, which of the following are correct?  (Choose 2)

Explanation

CLI and GUI are the correct types of user interfaces. CLI stands for Command Line Interface, which allows users to interact with a computer system by typing commands into a text-based interface. GUI stands for Graphical User Interface, which uses visual elements such as icons, menus, and windows to allow users to interact with a computer system. Both CLI and GUI are widely used in different operating systems and software applications to provide different levels of interaction and usability for users.

Submit
16. Which partion of a hard drive is the operating system booted from?

Explanation

The operating system is booted from the primary partition of a hard drive. The primary partition is the main partition on the hard drive that contains the necessary files for the operating system to start up and run. It is the partition that is typically set as active and is the first partition that the computer looks for when booting up. The other options, extended and logical partitions, are used for storing data and creating additional partitions within the primary partition.

Submit
17. What is the 4th step in the Laser printing process? (Choose 1)

Explanation

The 4th step in the Laser printing process is "Developing." Developing involves applying toner to the electrostatically charged drum, which creates the image or text that needs to be printed. The toner is attracted to the charged areas on the drum, forming the desired image. This step is crucial in transferring the image onto the paper during the subsequent steps of the printing process.

Submit
18. This is also know as a file allocation table and is the smallest unit of space used for storing data. (Choose 1)

Explanation

A cluster is the smallest unit of space used for storing data in a file allocation table (FAT). The FAT is also known as a file allocation table and is responsible for keeping track of which clusters are allocated to each file on a storage device. Therefore, a cluster is the correct answer as it is the unit of space used for storing data in the FAT.

Submit
19. Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose 2)

Explanation

EPP and ECP are the two modes of operation within the IEEE 1284 standard that allow bi-directional communication. EPP stands for Enhanced Parallel Port and ECP stands for Extended Capabilities Port. Both modes support two-way communication between the computer and the peripheral device, allowing data to be transferred in both directions. This enables functions such as printing, scanning, and data exchange between the computer and the peripheral device.

Submit
20. Which IEEE wireless standard allows transfer rates up to 54Mbps @ 5GHz?

Explanation

The correct answer is 802.11a. This IEEE wireless standard allows transfer rates up to 54Mbps at 5GHz.

Submit
21. Which layer of the OSI model establishes, manages and terminates the connections between the local and remote applications.

Explanation

The Session layer of the OSI model is responsible for establishing, managing, and terminating the connections between the local and remote applications. It sets up and maintains the session between the two communicating devices, allowing them to exchange data. This layer handles tasks such as session establishment, synchronization, and session termination, ensuring reliable communication between applications.

Submit
22. What benefits does NTFS provide over FAT32? (Choose 2)

Explanation

NTFS provides file and folder level permissions, which means that users can have different levels of access and control over specific files and folders. This allows for better security and privacy control. Additionally, NTFS uses smaller clusters, which means that it can make more efficient use of the available storage space on a disk compared to FAT32. Smaller clusters reduce wasted space and allow for more efficient storage allocation.

Submit
23. During the POST process, how many beeps indicates an error with the processor? (Choose 1)

Explanation

During the POST process, the system performs a series of tests to check the hardware components. The number of beeps produced by the system speaker indicates the type of error encountered. In this case, 5 beeps indicate an error with the processor. This could be due to a faulty or improperly installed processor, or a problem with the motherboard's connection to the processor.

Submit
24. Which of the following are not TCP/IP attacks? (Choose 2)

Explanation

Worm and Spam are not TCP/IP attacks because they do not exploit vulnerabilities in the TCP/IP protocol stack or target specific TCP/IP protocols. Worms are self-replicating malware that spread through networks, while Spam refers to unsolicited bulk emails. On the other hand, Replay, SYN Flood, and DDoS attacks are all TCP/IP attacks. Replay attacks involve the interception and retransmission of network data, SYN Flood attacks exploit the TCP three-way handshake process, and DDoS attacks overwhelm a target system with a flood of traffic.

Submit
25. Which wireless security protocol is used by devices that employ Wireless Application Protocol? (Choose 1)

Explanation

WTLS (Wireless Transport Layer Security) is the correct answer because it is specifically designed for securing wireless communication in devices that use the Wireless Application Protocol (WAP). WTLS provides encryption, authentication, and integrity protection for data transmitted over wireless networks. It is a lightweight security protocol that is optimized for the constraints of wireless devices, making it suitable for mobile applications. WPA (Wi-Fi Protected Access) and WEP 128 (Wired Equivalent Privacy) are wireless security protocols used in Wi-Fi networks, but they are not specifically associated with WAP. LEAP (Lightweight Extensible Authentication Protocol) and SSID (Service Set Identifier) are not security protocols but rather authentication methods and network identifiers, respectively.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 21, 2009
    Quiz Created by
    Colin2712
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
This wireless security protocol was created by Cisco to address...
A ________ _______ is a type of TCP/IP attack that randomly opens TCP...
A _________ can be erased without removing the chip. (1 or 6...
A _________ summarises about material identification, including...
Scandisk is an example of a disk management tool. (True or False)
_______ dynamically assigns an IP address to network devices. (1 or 4...
A _______ is one complete circle of data on a hard drive platter.
____________ is a type of social engineering, where the attacker...
_______ is a type of Token Ring network. It runs on fibre-optic cable...
________ is a transport protocol that offers a connectionless service...
Which two of the following are common motherboard form factors?...
Look at the list below and decide what is the correct boot sequence.a....
How many devices can be attached to a single Firewire port?
Which registry key contains all information relating to hardware and...
There are two different types of user interface, which of the...
Which partion of a hard drive is the operating system booted from?
What is the 4th step in the Laser printing process? (Choose 1)
This is also know as a file allocation table and is the smallest unit...
Which two modes of operation within the IEEE 1284 standard allow...
Which IEEE wireless standard allows transfer rates up to 54Mbps @...
Which layer of the OSI model establishes, manages and terminates the...
What benefits does NTFS provide over FAT32? (Choose 2)
During the POST process, how many beeps indicates an error with the...
Which of the following are not TCP/IP attacks? (Choose 2)
Which wireless security protocol is used by devices that employ...
Alert!

Advertisement