You are on page 1of 18

Assessment System

Skip to Time Left | Skip to Navigation | Skip to Assessment Items

Take Assessment - Final Exam Chapter 1-10 - IT Essentials (Version 4.0)


Time Remaining:
Showing 1 to 49

99:99

Next>

Page:
GO

<Prev

A customer used the convert.exe utility to take advantage of NTFS security features. The customer later
discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted
back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
Run convertFAT32.exe.
Restore the data files that were backed up in preparation for the conversion.
Reset the file attribute to show hidden files.
Restart the computer after updating the hard drive to FAT32.

Which Windows tool should be run before upgrading the operating system?
Convert
Fdisk
Msconfig
Ntbackup

When installing the Windows XP operating system, a technician is given a choice of file systems to use. If
security is a requirement, which file system should be chosen?
FAT32
HPFS
NFS

NTFS

When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumabl
Which two consumables are associated with an inkjet printer? (Choose two.)
drum
ink cartridge
ink ribbon
paper
toner

Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Cho
two.)
Reboot the laptop.
Reinstall the operating system.
Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.

The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a ne
driver?
manufacturer's website
Microsoft Update website
printer installation disk
Windows Device Manager
Windows hardware profiles

What is the best way to fully ensure that data is unable to be recovered from a hard drive?
formatting the drive
deleting the partitions on the hard drive
overwriting data multiple times, rendering the data unusable
shattering the hard drive platters with a hammer

A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of th
first that the technician should take?
Reinstall the printer driver.
Ensure that there is paper in the paper tray.
Supply a spare printer for the user until the problem is solved.
Check the Device Manager on the user computer for hardware problems.

A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the
technician most likely caused the customer to complain?
The technician interrupted a number of times to ask questions.
The technician occasionally confirmed an understanding of the problem.
The customer was escalated to a level-two technician.
The technician ended the call without saying "Have a nice day".

10 A technician installed a network adapter in a computer and wants to test network connectivity. The ping
command can only receive a response from local workstations. What could be causing the problem?
The NIC driver is out of date.
The operating system is not compatible with the remote sites.
The TCP/IP protocol stack is not loaded.
The default gateway is not set.

11 A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology
should the technician use for supporting this access control method?
Ethernet and Star
FDDI and Ring
Token Ring and Double Ring
Wireless and Ring

12 A company uses a single computer to receive and test all Windows updates. When the most recent update wa
installed, several programs failed. What is the first course of action that a technician should attempt to remov
the update?

Run a System Restore from the last restore point.


Use the Add or Remove Hardware applet in the Control Panel to remove the update.
Restore the hard drive from the last system backup.
Use the Recovery Console to restore the operating system.

13 A customer needs to purchase a new power supply for a computer. What must be considered when selecting a
appropriate power supply?
The power supply converts DC to AC.
The power supply has sufficient wattage to support all components inside the computer.
The power supply provides at least 800 V.
The power supply must have both a P-8 and P-9 connector.

14 ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information the
store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
NIC
Wireless NIC
USB gateway
RAID adapter
multiple slave hard disk adapter

15 What is the purpose of an IRQ?


Perform input/output between the CPU and peripherals.
Establish peer-to-peer communication between devices and software.
Request information from the CPU.
Access the computer RAM for reading and writing.

16 A user reports that a printer is printing unknown characters on documents. What is a possible solution to this
issue?
Replace the toner or ink cartridge.
Uninstall and reinstall the printer driver.
Replace the paper with some from a new ream.
Delete the print job from the queue and print again.

17 A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and
diagnostic utilities. Where would the technician set the boot order for the PC?
My Computer
Control Panel
Device Manager
BIOS
Start Menu

18 When installing a service pack or security patches on an operating system, what should be done to protect the
system in the event of a faulty or aborted installation?
Create a restore point.
Check the updates for the latest ones.
Disable Automatic Updates to prevent interference with the current operation.
Test all aspects to ensure that the update is correct for the operating system.

19 Which network protocol is used to automatically assign an IP address to a computer on a network?


FTP
DHCP
ICMP
SMTP
APIPA

20 A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the serve
the administrator notices repeated, larger than normal pings to the server. What is the name of this type of att
multi-ping attack
phishing
ping bomb
ping of death
spoofing
zombie attack

21 A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on.
Which error message could this potentially cause?
device / service failed to start
floppy disk corrupted
invalid system disk
corrupted driver

22 When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to
network devices. Which class of IP addressing is being used to send these messages?
A
B
C
D
E

23 A technician needs to configure the hard drive on a computer so that there appears to be one drive for the
operating system and four drives for data from different applications. How can the hard drive be configured t
provide this perception?
Create five primary partitions.
Create one extended partition with five logical drives within it.
Create one primary partition and an extended partition with four logical drives within it.
Create five extended partitions.
Create one logical partition with five primary partitions within it.
Create one primary partition and one logical partition with four logical drives within it.

24 A technician is asked to configure the time the system must be idle before the hard disk spins down on all the
Windows-based laptops in the company. The technician configured the power options in Windows but it appe
to have no effect. Where should the technician look to enable power management?
Administrative Tools
BIOS
Command Prompt
Safe mode

System Registry

25 Which two types of connectors can be found on DVI cables? (Choose two.)

26 A user has been writing data to a USB flash memory drive. What should the user do before removing the dev
Shut down the computer.
Click on the Safely Remove Hardware icon in the system tray then on the device.
Right-click on the drive in My Computer, then click on Remove Drive .

Remove the power to the drive.

27 What do the terms refresh rate, interlace, and aspect ratio explain?
hard drive efficiency
audio signal
scanner output
image properties of a monitor

28 Which Registry file contains information about all software that is installed on a Windows XP computer?
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_CURRENT_CONFIG

29 When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the n
step during the boot sequence?
BIOS reads the MBR.
NTDETECT.COM is used to detect any installed hardware.
NTDLR reads the registry files.
The WINLOGON.EXE program is started.

30 A customer reports that after using a computer for over a year, the computer now takes more time to access th
files. Which management tool can be used first, before any other complex procedure?
fdisk
format
defrag
disk management
system file checker

31 Which network device uses a MAC address table to segment the network?
concentrator

hub
PBX
router
switch

32 What characterizes spoofing?

Making data appear to come from a source other than the actual source.
Sending abnormally large amounts of data to a remote server to prevent user access to the server services
Intercepting or inserting false information in traffic between two hosts.
Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

33 Which power mode should be used by a laptop so that all the data is saved, all the applications the user was
working on are left open, and there is no power used by the laptop?
Hibernate
Suspend
Left on with no power mode
Soft shutdown

34 Because of the potential for electric shock, which two computer components should only be serviced by
authorized personnel? (Choose two.)
hard drive
video card
power supply
CRT monitor
ink jet printer

35 Which two general precautions should be taken before replacing any non-hot-swappable laptop component?
(Choose two.)
Disconnect the power cord.
Keep any component in a plastic bag until installation.
Remove any batteries.
Use carpets in cool areas.

Wear rubber-soled shoes to work with the computer.

36 What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
The peripherals can be plugged in and out without turning the laptop off.
Data transfer is more controlled than using the parallel or serial ports.
The peripherals do not need drivers to communicate with the OS.
Connections are much more reliable.

37 A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been us
a limited local user account for a number of years. The owner wishes to install a new piece of software, but th
user account does not have the necessary permissions. Which type of account does the owner need to use to
install the new software?
server
administrator
root
unlimited

38 A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer.
What can be done to remove these print jobs?
Cancel the jobs in the printer queue.
Select landscape or portrait image layout.
Set the printed image to colors or to grayscale.
Adjust the settings to match the colors on the screen to the colors on the printed sheet.

39 Which protocol adds security to remote connections?


FTP
HTTP
NetBEUI
POP
SSH

40 Which two technologies enable printers to be accessed by multiple network users? (Choose two.)

Wi-Fi
SCSI
Ethernet
USB
IEEE 1394

41 Where can a user change the idle time after which a laptop will switch to standby mode?
Right-click the desktop, then click Power Modes > Standby.
Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI.
Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
Left-click Start > All Programs > Accessories > System Tools > Power Management.

42 What is the purpose of SCSI and RAID adapters?


to allow obsolete EISA technology expansion slots to be used
to provide enhanced audio and graphic capabilities
to connect storage devices such as hard disk drives to a PC
to connect peripheral devices to a PC to improve performance

43 A student enables file sharing on a laptop so that a friend can access music files. Which type of service is bei
configured?
FTP
peer-to-peer
Telnet
DHCP
DNS

44 A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker mak
the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing
aspect ratio
dot pitch
HVC

refresh rate

45 A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
Scandisk
Disk Management
Chkdsk
Defrag
Device Manager

46 A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. T
customer seems unable to perform the task. What should the technician do?

Explain to the customer that it is a simple task and ask the customer to try it again.
Ask the customer to find someone with more experience to perform the task.
Tell the customer that another technician will explain the task .
Determine whether the customer would prefer to receive the instructions in another form, such as e-maile
illustrated written instructions.
47 A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the
floppy drive light remains lit constantly. What is most likely the cause of the problem?
The new floppy drive is faulty.
The ribbon cable is installed incorrectly.
The jumper settings are set incorrectly for the floppy drive.
The floppy drive has been disabled in the BIOS.

48 A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the r
upgraded the equipment but then found that when all the devices are powered up they become unreliable, wit
some PCs shutting down. What may cause this power problem?

The printer is creating electrical noise when it is printing, which causes the computers to shut off.
The power consumption of all devices is too much for the electrical circuit that is provided.
The power consumption of all the computers and printers operating simultaneously is causing a power su
The power requirements of the printer warm-up cycle cause a spike, which results in the computers shutt
down.

49 A small business has used a high quality configurable flatbed scanner to scan a number of photographs to pri
as large posters. However, the quality of the images printed as posters is poor. What should the user do?
Replace the flatbed scanner with an all-in-one device.
Use OCR software when scanning the photographs.
Save the scanned file in JPEG not TIFF format.
Increase the resolution of the scanner.

1
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the
monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
#refresh rate
2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network
devices. Which class of IP addressing is being used to send these messages?
#D
3
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which
error message could this potentially cause?
#invalid system disk
4
What characterizes spoofing?
#Making data appear to come from a source other than the actual source.
5
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next
step during the boot sequence?
#BIOS reads the MBR.
6
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables.
Which two consumables are associated with an inkjet printer? (Choose two.)
#ink cartridge
#paper
7
Which protocol adds security to remote connections?
#SSH
8
What is the purpose of an IRQ?
#Request information from the CPU.
9
A wireless LAN is being deployed inside the new park ranger, one room office that is located at the highest part of the

national park. When the testing was completed, the technicians reported that occasionally, the wireless LAN signal is
affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)
#the number of wireless devices that are used in the wireless LAN
#the large number of trees that surround the office
10
When installing a service pack or security patches on an operating system, what should be done to protect the
system in the event of a faulty or aborted installation?
#Create a restore point.
11
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the
technician use for supporting this access control method?
#Ethernet and Star
12
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
#shattering the hard drive platters with a hammer
13
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the
Windows-based laptops in the company. The technician configured the power options in Windows but it appears to
have no effect. Where should the technician look to enable power management?
#System Registry
14
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What
can be done to remove these print jobs?
#Cancel the jobs in the printer queue.
15
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store.
Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
#RAID adapter
16
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The
customer seems unable to perform the task. What should the technician do?
#Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed,
illustrated written instructions.
17
Which two technologies enable printers to be accessed by multiple network users? (Choose two.)
#Wi-Fi
#Ethernet
18
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
#Uninstall and reinstall the printer driver.
19
Which network device uses a MAC address table to segment the network?
#router

20
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating
system and four drives for data from different applications. How can the hard drive be configured to provide this
perception?
#Create one primary partition and one logical partition with four logical drives within it.
21
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the
technician most likely caused the customer to complain?
#The technician interrupted a number of times to ask questions.
22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first
that the technician should take?
#Check the Device Manager on the user computer for hardware problems.
23
Which Registry file contains information about all software that is installed on a Windows XP computer?
#HKEY_LOCAL_MACHINE
24
A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network
communication. Which resolution would prevent this action?
#Change the SSID that is being used on the wireless network.
25
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose
two.)
#Disconnect the power cord.
#Remove any batteries.
26
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working
on are left open, and there is no power used by the laptop?
#Hibernate
27
What is the purpose of SCSI and RAID adapters?
#to connect storage devices such as hard disk drives to a PC
28
Which network protocol is used to automatically assign an IP address to a computer on a network?
#DHCP
29
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered
that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the
customer noticed all of the data files are missing. What should the customer do next?
#Restore the data files that were backed up in preparation for the conversion.
30
Which two components normally require a laptop to be powered down and the battery removed before removing the
components? (Choose two.)
#internal hard drive

#RAM
31
A customer reports that after using a computer for over a year, the computer now takes more time to access the files.
Which management tool can be used first, before any other complex procedure?
#defrag
32
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an
appropriate power supply?
#The power supply has sufficient wattage to support all components inside the computer.
33
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
#The peripherals can be plugged in and out without turning the laptop off.
34
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as
large posters. However, the quality of the images printed as posters is poor. What should the user do?
#Increase the resolution of the scanner.
35
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
#Click on the Safely Remove Hardware icon in the system tray then on the device.
36
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command
can only receive a response from local workstations. What could be causing the problem?
#The default gateway is not set.
37
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two
comparisons should the technician make? (Choose two.)
#Inkjet printers are less expensive than laser printers.
#The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.
38
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the
administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
#ping of death
39
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
#Disk Management
40
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
#Reboot the laptop.
#Disconnect the peripherals.
41
A company uses a single computer to receive and test all Windows updates. When the most recent update was
installed, several programs failed. What is the first course of action that a technician should attempt to remove the
update?

#Run a System Restore from the last restore point.


42
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room
upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some
PCs shutting down. What may cause this power problem?
#The power consumption of all devices is too much for the electrical circuit that is provided.
43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is
a requirement, which file system should be chosen?
#NTFS
44
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy
drive light remains lit constantly. What is most likely the cause of the problem?
#The ribbon cable is installed incorrectly.
45
Which two types of connectors can be found on DVI cables? (Choose two.)

46
Which Windows tool should be run before upgrading the operating system?
#Ntbackup
47
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new
driver?
#manufacturer's website
48
Where can a user change the idle time after which a laptop will switch to standby mode?
#Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
49
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a
limited local user account for a number of years. The owner wishes to install a new piece of software, but the user
account does not have the necessary permissions. Which type of account does the owner need to use to install the
new software?
#administrator
50
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being
configured?
#peer-to-peer
51
What do the terms refresh rate, interlace, and aspect ratio explain?
#image properties of a monitor
52

A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic
utilities. Where would the technician set the boot order for the PC?
#BIOS