IT Operations Quiz 0% 0 Created on May 01, 2023 By Yadeno GelasaIT Operations IT IT Operations Quiz 1 / 74 1. Which one is an example of a top-level domain (TLD)? A. HTTP B. DNS C. // D. .NET 2 / 74 2. Which type of storage has the fastest data access speeds? A. Solid State Drive (SSD) B. SCSI Drive C. Secure Sockets Layer Drive (SSLD) D. Serial Attached Storage Device (SASD) 3 / 74 3. Which user has the smartest approach to online security? A. Jen uses the same password on each site, but with two-factor authentication B. Jackie uses the same password on each site, but with a different user name C. Jason uses a unique password for each site along with two-factor authentication D. Jarred uses a unique password for each site 4 / 74 4. What is the most direct way to change the desktop background in Windows OS? A. Run programs full-screen B. Right-click a blank part of the desktop C. Use settings (Windows) or preferences (Mac) D. Alter your user account settings or preferences 5 / 74 5. Networking wire is referred to as _____ A. coax cable B. Thin pair or twisted pair C. CAT-5 or CAT-6 Ethernet cable D. Asynchronous digital (AD) cable 6 / 74 6. The computer consistently boots into Safe Mode. How would you address this issue? A. Check the MSCONFIG utility to ensure that Normal boot is selected B. Hold the Shift key as Windows boots C. Fix the issue in Safe Mode that is causing the system to restart in this mode D. Edit the Registry key that controls the boot sequence 7 / 74 7. You power up your computer and it starts in Safe Mode. What should you do? A. Restart the computer B. Work as you normally do until the problem is resolved C. Reconfigures the startup sequence so that the system starts again normally D. Determine the cause and address the issue 8 / 74 8. Which program controls the Windows startup sequence? A. Task Manager B. The Computer Management Console C. MSCONFIG D. The UEFI 9 / 74 9. To which choice can the wget program be considered similar? A. Ping B. cURL C. Netstat D. Tracert 10 / 74 10. You are replacing a processor. How do you build the processor "sandwich" top-down? A. Fan, Processor, Paste, Socket B. Fan, Paste, Processor, Paste, Socket C. Fan, Processor, Socket D. Fan, Paste, Processor, Socket 11 / 74 11. Which service allows clients to work remotely and supplies the clients with an IP address on the same local area network as the office? A. DNS B. VPN C. FTP D. HTTP 12 / 74 12. What is the name of the hardware that provides a computer with network access? A. NIC B. RJ-45 C. Router D. BIOS 13 / 74 13. Which choice is not a typical adjustment found on a monitor? A. Brightness B. Resolution C. Contarst D. Color Temperature 14 / 74 14. An application is unresponsive. How can you effectively close it down? A. Restart the computer B. Sign out C. Use the Task Manager (Windows) or use Force Quit (Mac) D. Wait or set the application aside until it quits eventually on its own 15 / 74 15. Which action triggers a UAC warning? A. All settings changes in Windows B. Any action involving the user account, such as a password reset C. Any unauthorized access to the computer system D. An attempt to change a setting with consequences that affect the entire system 16 / 74 16. What are the long-term and short-term categories of storage in a computer? A. Memory and permanent (drive) storage B. RAM and ROM C. SSD and HDD D. Standard memory and cache memory 17 / 74 17. What is one difference between a drive and media? A. These are two terms for the same thing: storage B. The terms apply only to removable storage, where the drive is the slot and the media is the thumb drive or media card inserted into the slot C. A drive is hardware that reads media D. The drive is where the data is stored and the media is the data itself 18 / 74 18. Which statement most accurately describes the northbridge or host bridge? A. It is a high priority connection to the processor, also called the Memory Controller Hub B. It has been integrated into the southbridge to provide support for the CPU C. It provides mathematical and 3D physics support for the CPU in the absence of a GPU D. It is the peripheral and I/O controller, connected to the processor via the southbridge 19 / 74 19. A Bluetooth peripheral is prompting for a passcode to complete the pairing / connection process. What is the peripheral, most likely? A. Keyboard B. Mouse C. All of these answers D. Headset 20 / 74 20. The local network is up, but the computers cannot access the internet. Your internet configuration includes a modem, gateway (router) and a switch as separate devices. what should you do? A. Restart the modem B. Restart the gateway (router) C. Restart all computers on the network D. Do nothing. Wait until service is restored 21 / 74 21. Can you connect a DisplayPort monitor to a USB-C port on your computer? A. Yes. The DisplayPort cable plugs directly into the USB connector B. No. The two standards are incompatible C. No. While you can rig a connection, video quality will be poor D. Yes. An adapter or dongle may be required 22 / 74 22. Which characters are not allowed in a filename? A. Anything other than a letter, number or space B. Spaces, periods and commas C. !, ^, &, (, ), and " D. , /, :, ? and * 23 / 74 23. Someone is about to update a software driver. What would be a wise thing to do first? A. Backup all files B. Sign out of the operating system C. Save data and close programs D. Remove the older driver 24 / 74 24. How many wire pairs are in a CAT-5 cable? A. 8 B. 4 C. 5 D. 16 25 / 74 25. The primary mass storage device is divided into two partitions. What would explain this arrangement? A. The drive is partitioned to maintain compatilibility with older versions of the operating system B. The system has two users who are each getting a partition C. There is one partition for the operating system and a separate partition for user data D. All drives contain a second partition for the MBR (Master Boot Record) 26 / 74 26. _____ is type of power connector A. SATA B. PCI C. Edison D. Molex 27 / 74 27. Tania was told to address an issue in the UEFI. How is it accessed? A. By using the System Configuration Utility (MSCONFIG) B. On the network C. From the computer's startup menu D. From the BIOS 28 / 74 28. After plugging in an external 3.5mm microphone. you stop hearing sound from the speakers. What is the most likely source of the problem? A. You have plugged the microphone into the 3.5mm audio output jack B. The computer has connected to a nearby Bluetooth headset C. The sound is muted D. The sound card has crashed 29 / 74 29. Jan is setting up a coffee shop's wireless network. Given the number of Wi-fi networks within range, which are the best choices for a 2.4GHz Wi-fi channel? A. 1, 2, 8 B. 3, 6, 9 C. 1, 6, 11 D. 3, 10, 12, 30 / 74 30. A _____ allows you to plug computers into a central location to communicate on the same local area network. A. Firewall B. Wireless Access Point C. Layer 2 Switch D. Server 31 / 74 31. A client needs to secure their cafe's wireless network, which is used only by employees. What is the best approach for a finite list of devices? A. Apply a password B. Do not broadcast the SSID C. Limit access to specific MAC addresses D. Apply a metered connection 32 / 74 32. Tania was told to change a setting in the UEFI. How is it accessed? A. From the BIOS B. From the computer's startup menu C. On the network D. By using the System Configuration Utility (MSCONFIG) 33 / 74 33. You think that the internet is down. How can you know for certain? A. All of these answers B. The power is out C. You cannot reach any webistes D. The lights on the modem are off 34 / 74 34. What is the most important thing to do before opening a computer case? A. Ground yourself B. Disconnect all of the cables C. Close your programs, sign out of your account and turn off the computer D. Turn off and unplug the computer 35 / 74 35. Walt's computer is several years old and he wants to ensure that the system works until he gets a replacement. What should he do first? A. Obtain an extended warranty B. Run a file check utility C. Backup his data D. Ensure that the system is protected against malware 36 / 74 36. On a trackpad, What gesture commonly replaces "center mouse wheel" for things like scrolling through documents? A. Force click and drag B. Pinch outward C. Two-finger swipe D. Scroll with thumb instead 37 / 74 37. Which components are typically found on the motherboard? A. Basic I/O, graphics, NIC, power supply, expansion slots B. Basic I/O, graphics, NIC, battery, expansion slots C. Basic I/O, cooling, NIC, graphics, expansion slots D. Basic I/O, graphics, NIC, mass storage, expansion slots 38 / 74 38. While planning a conference at a centre in the mountains, you call ahead to ensure that it has broadband internet access. Which connection type would be an unsuitable choice? A. Dail-up B. DSL C. Fiber optic D. Cable 39 / 74 39. What is referred to by SSID? A. Service Set Identifier, a wireless network's name B. The server-side ID used to identify devices on a network C. The MAC address broadcast for a wireless network D. An older security protocol for Wi-Fi networks 40 / 74 40. Which is the standard color coding for audio jacks? A. Red: Microphone / Green: Speakers B. Green: Microphone / Pink: Speakers C. Green: Speakers / Pink: Microphone D. Gray: Microphone / Black: Speakers 41 / 74 41. Mass storage inside a desktop computer case is usually found where? A. In a drive cage B. In an expansion slot C. Attached to the front of the case D. On the motherboard 42 / 74 42. Which choice is not a current mass storage type? A. NVMe B. HDD C. SSD D. MO 43 / 74 43. What is the I/O panel? A. The location where expansion cards can connect to peripherals B. The portion of the motherboard where non-power cables connect C. A cluster of ports and connectors found on the back of the computer case D. The Switches that turn on, sleep and turn off the computer 44 / 74 44. What is a fixed disk? A. Mass storage that has been repaired B. Any mass storage device that is not a SSD? C. Non-removable mass storage D. Any internal mass storage device 45 / 74 45. Which key assists limited keyboard layouts (such as on a laptop) with accessing the full range of keys? A. Meta B. Fn C. Alt (Windows) or Option (Mac) D. Shift 46 / 74 46. What are the best tools to use for cleaning a computer? A. Air can, microfiber cloth, alcohol wipes, flashlight B. Handheld vacuum cleaner, ammonia, alcohol, microfiber cloth C. Handheld vacuum cleaner, air can, soft flashlight D. Air can, screwdriver, soft cloth, household cleaner 47 / 74 47. Angela ran a diagnostic that shows an ever-decreasing amount of memory in her computer. What could be the problem? A. DRAM is failing B. Another user has signed into the system C. A program has a memory leak D. There is no problem. It's normal for available memory to decrease the longer you use the system 48 / 74 48. Miguel is working on the computer and Jen needs to use it for a moment. What can miguel do to provide for an easy transition? A. Sign out B. Let Jen take over C. Shutdown the system D. Restart the computer 49 / 74 49. Which is an example of a phishing attack? A. Bob receives an email from his bank, asking him to click a link to verify his account B. Yousef sees an onscreen notification indicating that an operating system is pending and instructing him to click a link to continue C. After visiting a website, Carla notices that her computer is running slowly D. Ellen's email inbox is flooded with unwanted advertising 50 / 74 50. Does an incognito window prevent websites from tracking your activity on the web? A. No. Incognito mode only prevents the site from appearing in your browser history B. No. Some websites track by ID and if you sign into a site even in incognito, your activity is known C. Yes. incognito mode encrypts data packets, making it difficult for websites to track your activity D. Yes. incognito mode blocks all cookies and tracking IDs and suppresses browser history 51 / 74 51. What is the process of moving data and programs from an old computer to a new one called? A. Migration B. An official term does not exist, though it is colloquially referred to as a "brain transplant" C. Profile transfer D. Account cloning 52 / 74 52. Assuming that the gateway, modem and switch are separate units, in what order should a small office or home office LAN be restarted? A. Modem, Switch, Gateway B. Gateway, Switch C. The order is not important D. Modem, Gateway, Switch 53 / 74 53. A computer power supply is measured in ____? A. watts B. hertz C. amperes D. volts 54 / 74 54. The recent Windows update introduced some quirks in the system. How can you enter the Windows Recovery Environment to recover from the update? A. Press any key at the boot screen B. Hold the Shift key when selecting the Restart command C. Go to the Task Manager Startup tab D. Restart in Safe Mode where the Recovery item is located on the Start menu 55 / 74 55. The operating system tells you that a file is busy. What is the fastest way to attempt to make the file un-busy? A. Run a disk-checking utility B. Close open programs C. Restart the computer D. Review the output of the netstat utility to check for incoming connections to the file 56 / 74 56. Your computer boots at very low resolution that cannot be increased through display settings. What is the most likely solution? A. The connection between the display and the computer is loose B. Some of your RAM is failing C. You need to reinstall the display drivers D. You need to replace your monitor 57 / 74 57. Which statement about a modular power supply is true? A. It is built from a cluster of smaller, easier-to-install power supplies B. Its cables are detachable C. Its power output can be varied to save electricity D. It has dedicated power reserved for different computer components 58 / 74 58. To which internal component does the P1 connector attach? A. Power Supply B. Motherboard C. I/O Panel D. Primary Mass Storage 59 / 74 59. The mouse pointer is behaving erratically. What should you do first? A. Use the keyboard instead B. Clean the mouse, specifically its optical sensor and ensure that you are using it on the proper surface C. Restart the computer D. Disassemble the mouse to look for loose parts or corrosion 60 / 74 60. You receive a malware warning regarding a specific file. Which approach should you take to ensure you do not have false positive? A. Quarantine the file B. Run a thorough scan to validate the results C. Restart in Safe Mode to remove the file D. Remove the file 61 / 74 61. Which security tool can be doubled up to offer additional protection without being redundant? A. Anti-Virus B. Account protection C. Backup D. Firewall 62 / 74 62. The client / server model best represents _____ A. An application consisting of cooperating programs across the internet B. Any program run by a user C. A subscription service on the web D. Multiple hosts interacting with a single computer 63 / 74 63. What is the difference between a USB hub and a powered USB hub? A. Powered hubs are external to the computer case B. The powered hub has a power supply and is suitable for running powered peripherals C. A powered USB hub is found on the computer case, all other ubs are non-powered D. The powered hub supplies 12V of power, whereas the standard hub only 5V 64 / 74 64. What must you confirm before performing a processor upgrade? A. The new processor fits into the old processor's slot B. The new processor is the same type as the old C. The new processor is compatible with the operating system D. The new processor is compatible with the current motherboard 65 / 74 65. Which I/O components are typically found in a chipset on the motherboard? A. Display Adapter, Networking, Audio and Basic I/O B. USB, SATA and Internal Communications C. I/O components are not on the motherboard, They are located on the rear of the case D. The Processor, RAM and Expansion Cards 66 / 74 66. You are configuring a Wi-Fi base station using DHCP. Which items should you set or change? A. Change administrator account name, set network password, set network name, assigns DNS servers B. Reset administrator password, set network name, set network password C. Set network name, set network password, assigns DNS servers D. Reset administrator password, set network name, set network security, set network password 67 / 74 67. Which part of the network assigns an IP address? A. IP address are always assigned manually B. The gateway/router using DHCP C. The modern using TCP/IP protocol D. The device's NIC based on the MAC addressIP 68 / 74 68. Expansion cards follow which current interface standard? A. MCA B. PCIe C. ISA D. PCMCIA 69 / 74 69. Which hardware port would not be found on a typical gateway? A. Uplink B. USB C. WAN D. LAN 70 / 74 70. You notice that a program crashes at a specific time. Which tool can you use in Windows to discover the cause? A. Task Manager B. Resource Monitor C. Performance Monitor D. Event Viewer 71 / 74 71. What is the technical reason why you must properly eject media? A. The Storage Inventory Manager (SIM) can lose its drive references, which may corrupt other storage in the system B. File I/O is buffered, If you remove the media before the buffer is cleared, files remain open and potentially corrupt C. The computer must stop the 5-volt signal to media, otherwise the drive may sort D. The drive must receive the eject signal and turn itself off, dropping the DTR signal and indicating the media is safe to remove 72 / 74 72. If you had a 255.255.255.0 subnet mask, how many usable IP addresses would you have for hosts? A. 24 B. 255 C. 254 D. 256 73 / 74 73. What does the acronym RAID refer to? A. Redundant Array of Independent Disk B. Replicated Array of Internal Devices C. Repeating Architecture for Internal Drives D. Recoverable Advanced Integration and Duplication 74 / 74 74. How can you tell that the website you are visiting is sending and receiving data that has been encrypted? A. You are using an incognito window B. You can't tell because a website's security settings are not readily apparent in a browser window C. The site requires a login and password D. The URL is HTTPS Your score isShare Your Result! Facebook You can follow me here! 0% Restart quiz Exit