You are on page 1of 8

IT Essentials (Version 4.

0) Final Exam Study Guide Chapters 1-10
Name: Timothy Althoff

1) Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.)
a) modem
b) network
c) parallel
d) serial
e) USB
2) Which type of scanner generally has high costs but produces top-quality images?
a) all-in-one
b) drum
c) handheld
d) flatbed
3) Which two types of connectors can be found on DVI cables? (Choose two.)

4) Which type of power connector is used to connect devices such as optical drives and hard
a) 20-pin
b) 24-pin
c) Berg
d) Molex
e) P8
f) P9
5) Which two interface types make it possible to attach different external components to laptops
and desktops without powering the computer off? (Choose two.)
a) ExpressCard
Page 1 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
b) FireWire
c) ISA
d) PCI
f) USB
6) A customer is upset and wants to speak to a specific technician to resolve a problem
immediately. The requested technician is away from the office for the next hour. What is the
best way to handle this call?
a) Refer the angry customer to a supervisor.
b) Advise the customer that the requested technician is out of the office and insist on trying to
resolve the problem.
c) Make an offer to help the customer immediately, and advise the customer that otherwise
the requested technician will call the customer back within two hours.
d) Ignore the request for the specific technician by walking through a step-by-step process
with the customer in an attempt to refocus the customer and solve the problem.
7) A company uses a single computer to receive and test all Windows updates. When the most
recent update was installed, several programs failed. What is the first course of action that a
technician should attempt to remove the update?
a) Run a System Restore from the last restore point.
b) Use the Add or Remove Hardware applet in the Control Panel to remove the update.
c) Restore the hard drive from the last system backup.
d) Use the Recovery Console to restore the operating system.
8) Why do mobile devices such as laptop computers use specially designed CPUs?
a) They consume less power.
b) They are smaller.
c) They are lighter.
d) They require customized cooling mechanisms.
9) Which two quick solutions are commonly recommended when a technician is troubleshooting
a laptop? (Choose two.)
a) Reboot the laptop.
b) Reinstall the operating system.
c) Disconnect the peripherals.
d) Have the customer verify the problem.
e) Call a level-2 technician.
10)When calculating the total cost of ownership of a printer it is necessary to consider the cost of
the consumables. Which two consumables are associated with an inkjet printer? (Choose
a) drum
b) ink cartridge
c) ink ribbon
d) paper
e) toner
11)A network administrator is troubleshooting a server that keeps crashing. While monitoring
traffic to the server, the administrator notices repeated, larger than normal pings to the server.
What is the name of this type of attack?
a) multi-ping attack
Page 2 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
b) phishing
c) ping bomb
d) ping of death
e) spoofing
f) zombie attack
12)Which power mode should be used by a laptop so that all the data is saved, all the
applications the user was working on are left open, and there is no power used by the laptop?
a) Hibernate
b) Suspend
c) Left on with no power mode
d) Soft shutdown
13)When installing a network adapter into a client computer, a technician notices that the
contacts on the adapter need to be cleaned. Which solution should the technician use to clean
the contacts?
a) glass cleaner
b) isopropyl alcohol
c) mild detergent
d) rubbing alcohol
e) slightly abrasive cleanser
14)Refer to the exhibit. Which sequence of steps describes the printing process used by a laser

a) 1,2,3,4,5,6
b) 2,5,3,4,1,6
c) 3,4,1,6,2,5
d) 4,2,6,5,3,1
15)The technician has been asked to upgrade the printer driver for an old printer. What is the
best source for a new driver?
a) manufacturer's website
b) Microsoft Update website
c) printer installation disk
d) Windows Device Manager
e) Windows hardware profiles
16)What characterizes spoofing?
a) Making data appear to come from a source other than the actual source.
b) Sending abnormally large amounts of data to a remote server to prevent user
access to the server services.
c) Intercepting or inserting false information in traffic between two hosts.
d) Sending bulk e-mail to individuals, lists, or domains intending to prevent users from
accessing e-mail.
17)What characterizes a DDoS attack?
a) Many hosts participate in a coordinated attack.
Page 3 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
b) Infected computers are called Daemons.
c) It is easy to identify the source of the attack.
d) All hosts must be in the same geographic area.
18)Which protocol adds security to remote connections?
a) FTP
c) NetBEUI
d) POP
e) SSH
19)Create one primary partition and one logical partition with four logical drives within it.A
computer can access devices on the same network but can not access devices on other
networks. What is the probable cause of this problem?
a) The cable is not connected properly to the NIC.
b) The computer has an invalid IP address.
c) The computer has an incorrect subnet mask.
d) The computer has an invalid default gateway address.
20) A technician is troubleshooting a computer that is experiencing hardware failure detected by
the BIOS. What is one way this failure is indicated?
a) The computer automatically boots into Safe Mode & displays a warning on the screen.
b) The screen flashes with a red background and displays a warning message.
c) The computer emits a pattern of beeps indicating the failing device.
d) The computer returns an error message indicating the I/O address of the failing device.
21) A technician has replaced a failing floppy drive. While testing the new drive, the technician
notices that the floppy drive light remains lit constantly. What is most likely the cause of the
a) The new floppy drive is faulty.
b) The ribbon cable is installed incorrectly.
c) The jumper settings are set incorrectly for the floppy drive.
d) The floppy drive has been disabled in the BIOS.
22) Which three things should be investigated first when troubleshooting a printer? (Choose 3.)
a) equipment power
b) corrupt print driver
c) low-ink warning
d) out of paper
e) operating system compatibility
f) firmware version
23) A technician needs to configure the hard drive on a computer so that there appears to be one
drive for the operating system and four drives for data from different applications. How can the
hard drive be configured to provide this perception?
a) Create five primary partitions.
b) Create one extended partition with five logical drives within it.
c) Create one primary partition and an extended partition with four logical drives within it.
d) Create five extended partitions.
e) Create one logical partition with five primary partitions within it.

Page 4 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
24)A user has been writing data to a USB flash memory drive. What should the user do before
removing the device?
a) Shut down the computer.
b) Click on the Safely Remove Hardware icon in the system tray then on the device.
c) Right-click on the drive in My Computer, then click on Remove Drive .
d) Remove the power to the drive.
25)Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800
a) DB-9
b) DB-25
c) IEEE 1284
d) IEEE 1394a
e) IEEE 1394b
26)Refer to the exhibit. Which three status LEDs are shown in the graphic? (Choose three.)
a) battery status
b) Bluetooth activity
c) caps lock
d) hard-drive activity
e) power on status
f) wireless activity
27)Which two general precautions should be taken before replacing any non-hot-swappable
laptop component? (Choose two.)
a) Disconnect the power cord.
b) Keep any component in a plastic bag until installation.
c) Remove any batteries.
d) Use carpets in cool areas.
e) Wear rubber-soled shoes to work with the computer.
28)ABC Company wants to configure laptops to automatically power components off to improve
battery life. Which power management control can be used to accomplish this?
b) AMD
c) UPS
29)A user is reporting that a new external hard drive is defective. The laptop will allow access to
the drive at times, and then will report that the drive cannot be found. Upon an initial
examination of the laptop, it is discovered that the user has ten USB devices connected to the
laptop. What is the best quick solution to this problem?
a) Remove all the peripherals except the hard drive and observe the results.
b) Move the laptop to another location and observe the results.
c) Replace the power adapter and observe the results.
d) Replace the USB hub and observe the results.
e) Flash the BIOS on the laptop and observe the results.
30)What is the default subnet mask for a Class A network?
Page 5 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
31)Which Windows tool should be run before upgrading the operating system?
a) Convert
b) Fdisk
c) Msconfig
d) Ntbackup
32)In the event of a catastrophic system or hardware failure, which Windows XP utility provides a
framework for saving and recovering the operating system?
a) Emergency Repair Disk (ERD)
b) Automated System Recovery (ASR)
c) Windows Recovery Manager (WRM)
d) Automated Windows Recovery (AWR)
e) System Restore (SR)
33)What is the purpose of an IRQ?
a) Perform input/output between the CPU and peripherals.
b) Establish peer-to-peer communication between devices and software.
c) Request information from the CPU.
d) Access the computer RAM for reading and writing.
34)Which protocol dynamically assigns IP addresses to network devices?
b) DNS
e) TCP
35)A technician is having trouble with laptops that keep overheating. What preventive
maintenance procedure can be performed on the laptops to reduce this problem?
a) Regularly replace the laptop battery.
b) Encourage users to run the laptop from the battery more often.
c) Encourage users to run the laptop from the AC adapter more often.
d) Remove and clean the CPU.
e) Clean the air vents.
f) Replace the fan.
36)A technician is asked to configure the time the system must be idle before the hard disk spins
down on all the Windows-based laptops in the company. The technician configured the power
options in Windows but it appears to have no effect. Where should the technician look to
enable power management?
a) Administrative Tools
c) Command Prompt
d) Safe mode
e) System Registry
37)Refer to the exhibit. Which type of removable media is depicted?
a) hard disk
Page 6 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
b) USB optical drive
c) PC card
d) flash drive
38)What are the four levels in the TCP/IP reference model.
a) HTTP, FTP, Telnet, SSH
c) application, transport, internetwork, network interface
d) application, presentation, session, transport
e) physical, data link, network, transport
39)Where can a user change the idle time after which a laptop will switch to standby mode?
a) Right-click the desktop, then click Power Modes > Standby.
b) Right-click My Computer, then click Properties > Hardware > Device Manager > ACPI.
c) Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.
d) Left-click Start > All Programs > Accessories > System Tools > Power Management.
40)Where in Windows XP can the shutdown, hibernate, and standby modes be configured?
a) Start > Control Panel > Power Options
b) Start > Control Panel > Administrative Tools
c) Start > Control Panel > Power Modes
d) Start > Control Panel > System
41)ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the
information they store. Which type of adapter will need to be installed on the servers to
accomplish the desired redundancy?
a) NIC
b) Wireless NIC
c) USB gateway
d) RAID adapter
e) multiple slave hard disk adapter
42)What is the logical topology used for the Ethernet architecture?
a) bus
b) double ring
c) extended star
d) ring
e) star
43)Which network device uses a MAC address table to segment the network?
a) concentrator
b) hub
c) PBX
d) router
e) switch
44)When analyzing a protocol used on the network, it is discovered that multicast messages are
being sent to network devices. Which class of IP addressing is being used to send these
a) A
b) B
c) C
d) D
e) E
Page 7 of 8
IT Essentials (Version 4.0) Final Exam Study Guide Chapters 1-10
45)When a Windows XP computer has completed the POST for each adapter card that has a
BIOS, what is the next step during the boot sequence?
a) BIOS reads the MBR.
b) NTDETECT.COM is used to detect any installed hardware.
c) NTDLR reads the registry files.
d) The WINLOGON.EXE program is started.
46)When installing the Windows XP operating system, a technician is given a choice of file
systems to use. If security is a requirement, which file system should be chosen?
a) FAT32
c) NFS
47)A technician wishes to boot a computer using a CD-ROM that contains a limited operating
system and diagnostic utilities. Where would the technician set the boot order for the PC?
a) My Computer
b) Control Panel
c) Device Manager
e) Start Menu
48)Which three benefits are gained by networking computers? (Choose three.)
a) decreased need of personal training
b) fewer peripherals needed
c) decreased computer-to-user ratio
d) lower cost licensing
e) increased user specialization
f) increased communication capabilities
49)A customer is angry and calls to complain that the service scheduled on his computer took
longer than expected. The technician reviews the work order and notices that the service was
performed by a new employee. How should the technician respond?
a) Verify that the computer is working properly now.
b) Listen to the complaint and then apologize for any inconvenience caused by the lengthy
service on the computer.
c) Explain that the repair technician sent to perform the repair is inexperienced.
d) Put the customer on hold until a supervisor is available.
50)Which three rules increase the level of password strength? (Choose three.)
a) Passwords should never expire.
b) Passwords should be a combination of letters and numbers.
c) Passwords should combine a user's special dates and initials so they can be
d) Passwords should be changed by the user after specific periods of time.
e) Password expiration and lockout policies should be clearly defined.
f) Passwords should be short to reduce the chances of users forgetting them.

Page 8 of 8