Skip to content

Latest commit

 

History

History
executable file
·
614 lines (436 loc) · 20.3 KB

it-operations-quiz.md

File metadata and controls

executable file
·
614 lines (436 loc) · 20.3 KB

IT Operations

Q1. You are configuring a Wi-Fi base station using DHCP. Which items should you set or change?

  • A

  • Reset administrator password.

  • Set network name.

  • Set network security.

  • Set network password.

  • B

  • Reset administrator password.

  • Set network name.

  • Set network password.

  • C

  • Set network name.

  • Set network password.

  • Assign DNS servers.

  • D

  • Change administrator account name.

  • Set network password.

  • Set network name.

  • Assign DNS servers.

Q2. Can you connect a DisplayPort monitor to a USB-C port on your computer?

  • Yes. The DisplayPort cable plugs directly into the USB connector.
  • Yes. An adapter or dongle may be required.
  • No. While you can rig a connection, video quality will be poor.
  • No. The two standards are incompatible.

Q3. What is the I/O panel?

  • the location where expansion cards can connect to peripherals
  • a cluster of ports and connectors found on the back of the computer case
  • the switches that turn on, sleep, and turn off the computer
  • the portion of the motherboard where non-power cables connect

Q4. The computer consistently boots into Safe Mode. How would you address this issue?

  • Edit the Registry key that controls the boot sequence.
  • Hold the Shift key as Windows boots.
  • Check the MSCONFIG utility to ensure that Normal boot is selected.
  • Fix the issue in Safe Mode that is causing the system to restart in this mode.

Q5. Which choice is not a typical adjustment found on a monitor?

  • resolution
  • color temperature
  • contrast
  • brightness

Q6. Assuming that the gateway, modem, and switch are separate units, in what order should a small office or home office LAN be restarted?

  • A
  1. Modem
  2. Gateway
  3. Switch
  • B
  1. Modem
  2. Switch
  3. Gateway
  • C
  1. Gateway
  2. Switch
  • The order is not important.

Q7. A client needs to secure their cafe's wireless network, which is used only by employees. What is the best approach for a finite list of devices?

  • Limit access to specific MAC addresses.
  • Do not broadcast the SSID.
  • Apply a metered connection.
  • Apply a password.

Q8. Which hardware port would not be found on a typical gateway?

  • WAN
  • USB
  • LAN
  • uplink

Q9. The recent Windows update introduced some quirks in the system. How can you enter the Windows Recovery Environment to recover from the update?

  • Hold the Shift key when selecting the Restart command.
  • Restart in Safe Mode where the Recovery item is located on the Start menu.
  • Press the any key at the boot screen.
  • Go to the Task Manager Startup tab.

Q10. Which components are typically found on the motherboard?

  • ­ basic I/O graphics NIC battery expansion slots

  • ­ basic I/O cooling NIC graphics expansion slots

  • ­ basic I/O graphics NIC mass storage expansion slots

  • ­ basic I/O graphics NIC power supply expansion slots

Q11. What does the acronym RAID refer to?

  • Repeating Architecture for Internal Drives
  • Recoverable Advanced Integration and Duplication
  • Redundant Array of Independent Disks
  • Replicated Array of Internal Devices

Q12. To which internal component does the illustrated (P1) connector attach?

Q12

  • motherboard
  • I/O panel
  • power supply
  • primary mass storage

Q13. Your computer boots at very low resolution that cannot be increased through display settings. What is the most likely solution?

  • The connection between the display and the computer is loose.
  • You need to reinstall the display drivers.
  • You need to replace your monitor.
  • Some of your RAM is failing.

Q14. To which choice can the wget program be considered similar?

  • tracert
  • netstat
  • ping
  • cURL

Q15. Does an incognito window prevent websites from tracking your activity on the web?

  • No. Incognito mode only prevents the site from appearing in your browser history.
  • Yes. Incognito mode encrypts data packets, making it difficult for websites to track your activity.
  • No. Some websites track by ID, and if you sign into a site even in incognito, your activity is known.
  • Yes. Incognito mode blocks all cookies and tracking IDs and suppresses browser history.

Q16. What must you confirm before performing a processor upgrade?

  • The new processor is compatible with the current motherboard.
  • The new processor is the same type as the old.
  • The new processor is compatible with the operating system.
  • The new processor fits into the old processor's slot.

Q17. Which type of storage has the fastest data access speeds?

  • Secure Sockets Layer drive
  • solid-state drive
  • serial attached storage device
  • SCSI drive

Q18. A Bluetooth peripheral is prompting for a passcode to complete the pairing/connection process. What is the peripheral, most likely?

  • keyboard
  • all of these answers
  • mouse
  • headset

Q19. Walt's computer is several years old and he wants to ensure that the system works until he gets a replacement. What should he do first?

  • Run a file check daily.
  • Obtain an extended warranty.
  • Back up his data.
  • Ensure that the system is protected against malware.

Q20. What is one difference between a drive and media?

  • The drive is where the data is stored and the media is the data itself.
  • A drive is hardware that reads media.
  • These are two terms for the same thing: storage.
  • The terms apply only to removable storage, where the drive is the slot and the media is the thumb drive or media card inserted into the slot.

reference: a drive is a device capable of interacting with data recorded on a media; this media can be removable or non-removable.

Q21. Mass storage inside a desktop computer case is usually found where?

  • in an expansion slot
  • attached to the front of the case
  • in a drive cage
  • on the motherboard

Q22. Which statement about a modular power supply is true?

  • It is built from a cluster of smaller, easier-to-install power supplies.
  • Its power output can be varied to save electricity.
  • Its cables are detachable.
  • It has dedicated power reserved for different computer components.

Q23. Which program controls the Windows startup sequence?

  • MSCONFIG
  • Task Manager
  • the Computer Management Console
  • the UEFI

Q24. Angela ran a diagnostic that shows an ever-decreasing amount of memory in her computer. What could be the problem?

  • DRAM is failing.
  • A program has a memory leak.
  • There is no problem. It's normal for available memory to decrease the longer you use the system.
  • Another user has signed into the system

Q25. Which type of power connector is this?

Q24

  • Edison
  • Molex
  • SATA
  • PCI

Q26. What is the most important thing to do before opening a computer case?

  • Turn off and unplug the computer.
  • Disconnect all of the cables.
  • Close your programs, sign out of your account, and turn off the computer.
  • Ground yourself.

Q27. On a trackpad, what gesture commonly replaces "center mouse wheel" for things like scrolling through documents?

  • pinch outward
  • scroll with thumb instead
  • two-finger swipe
  • force click and drag

Q28. What is the name of the hardware that provides a computer with network access?

  • BIOS
  • RJ-45
  • NIC
  • Router

Q29. Networking wire is referred to as _.

  • CAT-5 or CAT-6 Ethernet cable
  • thin pair or twisted pair
  • asynchronous digital (AD) cable
  • coax cable

Q30. Miguel is working on the computer, and Jen needs to use it for a moment. What can Miguel do to provide for an easy transition?

  • Shut down the system.
  • Sign out.
  • Restart the computer.
  • Let Jen take over.

Q31. A _ allows you to plug computers into a central location to communicate on the same local area network.

  • server
  • layer 2 switch
  • wireless access point
  • firewall

reference

Q32. After plugging in an external 3.5mm microphone, you stop hearing sound from the speakers. What is the most likely source of the problem?

  • You have plugged the microphone into the 3.5mm audio output jack.
  • The sound is muted.
  • The sound card has crashed.
  • The computer has connected to a nearby Bluetooth headset.

Q33. You think that the Internet is down. How can you know for certain?

  • all of these answers.
  • You cannot reach any websites.
  • The power is out.
  • The lights on the modem are off.

Q34. An application is unresponsive. How can you effectively close it down?

  • Restart the computer.
  • Sign out.
  • Wait or set the application aside until it quits eventually on its own.
  • Use the Task Manager (Windows) or use Force Quit (Mac).

Q35. How can you tell that the website you are visiting is sending and receiving data that has been encrypted?

  • The URL is HTTPS.
  • You are using an incognito window.
  • The site requires a login and password.
  • You can't tell because a website's security settings are not readily apparent in a browser window.

Q36. The client/server model best represents _.

  • multiple hosts interacting with a single computer
  • an application consisting of cooperating programs across the Internet
  • any program run by a user
  • a subscription service on the web

Q37. The primary mass storage device is divided into two partitions. What would explain this arrangement?

  • There is one partition for the operating system and a separate partition for user data.
  • All drives contain a second partition for the MBR (Master Boot Record).
  • The drive is partitioned to maintain compatibility with older versions of the operating system.
  • The system has two users who are each getting a partition.

Q38. You are replacing a processor. How do you build the processor "sandwich", top-down?

  • fan, paste, processor, socket
  • fan, processor, socket
  • fan, paste, processor, paste, socket
  • fan, processor, paste, socket

Q39. The operating system tells you that a file is busy. What is the fastest way to attempt to make the file un-busy?

  • Run a disk-checking utility.
  • Close open programs.
  • Restart the computer.
  • Review the output of the netstat utility to check for incoming connections to the file.

Q40. Which service allows clients to work remotely and supplies the clients with an IP address on the same local area network as the office?

  • DNS
  • FTP
  • VPN
  • HTTP

Q41. Al is about to update a software driver. What would be a wise thing to do first?

  • Back up all files.
  • Save data and close programs.
  • Remove the older driver.
  • Sign out of the operating system.

Q42. What is the process of moving data and programs from an old computer to a new one called?

  • migration
  • An official term does not exist, though it is colloquieally referred to as a "brain transplant."
  • profile transfer
  • account cloning

reference

Q43. The local network is up, but the computers cannot access the Internet. Your Internet configuration includes a modem, gateway (router), and a switch as separate devices. What should you do?

  • Do nothing. Wait until service is restored.
  • Restart all computers on the network.
  • Restart the gateway (router).
  • Restart the modem.

Q44. You notice that a program crashes at a specific time. Which tool can you use in Windows to discover the cause?

  • Task Manager
  • Event Viewer
  • Performance Monitor
  • Resource Monitor

Q45. While planning a conference at a center in the mountains, you call ahead to ensure that it has broadband Internet access. Which connection type would be an unsuitable choice?

  • DSL
  • fiber optic
  • cable
  • dial-up

Q46. What is a fixed-disk?

  • mass storage that has been repaired
  • nonremovable mass storage
  • any internal mass storage device
  • any mass storage device that is not a SSD

Q47. What are the long-term and short-term categories of storage in a computer?

  • memory and permanent (drive) storage
  • SSD and HDD
  • RAM and ROM
  • standard memory and cache memory

Reference

Q48. What is referred to by SSID?

  • Service Set Identifier, a wireless network's name
  • an older security protocol for Wi-Fi networks
  • the server-side ID used to identify devices on a network
  • the MAC address broadcast for a wireless network

Reference

Q49. Which is the standard color coding for audio jacks?

  • Gray: microphone / Black: speakers
  • Red: microphone / Green: speakers
  • Green: microphone / Pink: speakers
  • Green: speakers / Pink: microphone

Q50. Which key assists limited keyboard layouts (such as on a laptop) with accessing the full range of keys?

  • Alt (Windows) or Option (Mac)
  • Meta
  • Fn
  • Shift

Q51. You power up your computer and it starts in Safe Mode. What should you do?

  • Restart the computer
  • Work as you normally do until the problem is resolved
  • Reconfigure the startup sequence so that the system starts again normally
  • Determine the cause and address the issue

Idea behind the answer: let's go for a quick restart to see whether the problem fixes itself or not, then only try to determine the cause and address the issue.

Q52. Which security tool can be doubled up to offer additional protection without being redundant?

  • account protection
  • firewall
  • antivirus
  • backup

Q53. The mouse pointer is behaving erratically. What should you do first?

  • Use the keyboard instead
  • Restart the computer
  • Clean the mouse, specifically its optical sensor, and ensure that you are using it on the proper surface
  • Disassemble the mouse to look for loose parts or corrosion

Q54. How many wire pairs are in a CAT-5 cable?

  • 8
  • 4
  • 5
  • 16

Q55. What is the difference between a USB hub and a powered USB hub?

  • The powered hub has a power supply and is suitable for running powered peripherals.
  • A powered USB hub is found on the computer case; all other hubs are non-powered.
  • The powered hub supplies 12V of power, whereas the standard hub only 5V.
  • Powered hubs are external to the computer case.

Q56. Which of the following users has the smartest approach to online security?

  • Jarred uses a unique password for each site.
  • Jen uses the same password on each site, but with two-factor authentication.
  • Jason uses a unique password for each site along with two-factor authentication.
  • Jackie uses the same password on each site, but with a different user name.

Q57. Which is an example of a phishing attack?

  • Yousef sees an onscreen notification indicating that an operating system is pending and instructing him to click a link to continue.
  • After visiting a website, Carla notices that her computer is running slowly.
  • Bob receives an email from his bank, asking him to click a link to verify his account.
  • Ellen's email inbox is flooded with unwanted advertising.

Q58. You receive a malware warning regarding a specific file. Which approach should you take to ensure that you do not have false positive?

  • Restart in Safe Mode to remove the file.
  • Remove the file.
  • Run a thorough scan to validate the results.
  • Quarantine the file.

Q59. What are the best tools to use for cleaning a computer?

  • Handheld vacuum cleaner, air can, soft flashlight.
  • air can, microfiber cloth, alcohol wipes, flashlight.
  • handheld vacuum cleaner, ammonia, alcohol, microfiber cloth.
  • air can, screwdriver, soft cloth, household cleaner.

Q60. A computer power supply is measured in _.

  • watts
  • hertz
  • amperes
  • volts

Q61. If you had a 255.255.255.0 subnet mask, how many usable IP addresses would you have for hosts?

  • 24
  • 255
  • 254
  • 256

Q62. Tania was told to change a setting in the UEFI. How is it accessed?

  • by using the System Configuration Utility (MSCONFIG)
  • from the BIOS
  • from the computer's startup menu
  • on the network

Q63. What is the technical reason why you must properly eject media?

  • File I/O is buffered. If you remove the media before the buffer is cleared, files remain open and potentially corrupt.
  • The Storage Inventory Manager (SIM) can lose its drive references, which may corrupt other storage in the system.
  • The drive must receive the eject signal and turn itself off, dropping the DTR signal and indicating the media is safe to remove.
  • The computer must stop the 5-volt signal to media, otherwise the drive may short.

Q64. Which part of the network assigns an IP address?

  • the modem using TCP/IP protocol
  • the gateway/router using DHCP
  • the device's NIC based on the MAC address
  • IP addresses are always assigned manually

Q65. Expansion cards follow which current interface standard?

  • MCA
  • PCMCIA
  • ISA
  • PCIe

Q66. Which action triggers a UAC warning?

  • all settings changes in Windows
  • any unauthorized access to the computer system
  • an attempt to change a setting with consequences that affect the entire system
  • any action involving the user account, such as a password reset

Q67. Which choice is not a current mass storage type?

  • SSD
  • MO
  • HDD
  • NVMe

Q68. Which statement most accurately describes the north-bridge or host-bridge?

  • It is a high priority connection to the processor, also called the Memory Controller Hub.
  • It has been integrated into the southbridge to provide support for the CPU.
  • It is the peripheral and I/O controller, connected to the processor via the southbridge.
  • It provides mathematical and 3D physics support for the CPU in the absence of a GPU.

Q69. Which characters are not allowed in a filename?

  • anything other than a letter, number, or space
  • spaces, periods, and commas
  • \, /, :, ?, and *
  • !, ^, &, (,), and "

Q70. What is the most direct way to change the desktop background in Windows OS?

  • Alter your user account settings or preferences.
  • Right-click a blank part of the desktop.
  • Run programs full-screen.
  • Use Settings (Windows) or Preferences (Mac).

Q71. Which I/O components are typically found in a chipset on the motherboard?

  • USB, SATA and internal communications
  • display adapter, networking, audio, and basic I/O
  • the processor, RAM, and expansion cards
  • I/O components are not on the motherboard. They are located on the rear of the case

Q72. What does the acronym RAID refer to?

  • Redudant Array of Independent Disk
  • Repeating Architecture for Internal Drives
  • Recoverable Advanced Integration and Duplication
  • Replicated Array of Internal Devices

Q73. What is an example of a top-level domain (TLD)?

  • NET
  • HTTP
  • //
  • DNS

Q74. Jan is setting up a coffee shop's wireless network. Given the number of Wi-Fi networks within range, which are the best choices for a 2.4GHz Wi-Fi channel?

  • 3, 6, 9
  • 3, 10, 12
  • 1, 6, 11
  • 1, 2, 8

Q75. When elevated access is required, what steps must a user take?

  • Type the administrator account password.
  • Hold the Shift key and try again.
  • Sign out and sign in again with an administrator account.
  • User account permissions are elevated in Settings or Preferences.

Q76. What is a duplex printer?

  • a printer that also acts as a scanner, copier. and fax machine
  • a printer with automatic and manual feeding mechanism
  • a printer than can print on both sides of a sheet of paper
  • a printer has two paper trays

Q77. Which choice is not an internal computer upgrade?

  • primary storage
  • I/O devices
  • memory
  • expansion card