Assessment Test

  1. Which of the following is not considered a system component that can be found inside a computer?

    1. CPU
    2. RAM
    3. PCIe graphics adapter
    4. Motherboard
  2. Which of the following is a physical memory format installed directly in today’s desktop computer systems?

    1. DIMM
    2. HDD
    3. SSD
    4. eMMC
  3. Which of the following are components that can commonly be found on a motherboard? (Choose all that apply.)

    1. Slots
    2. Fan connectors
    3. Gyroscope
    4. Scanner
    5. HDD
  4. What suffix indicates that the capacity of an optical disc is roughly twice that of its standard counterpart?

    1. DL
    2. R
    3. RW
    4. RE
  5. What is the name of the standard power connector that has been used with larger drives since the first IBM personal computers were introduced?

    1. AT system connector
    2. Berg
    3. Molex
    4. ATX system connector
  6. Except in the case of RAID 0, which two things do all types of RAID offer?

    1. Faster read speeds
    2. Faster write speeds
    3. Redundancy
    4. Fault tolerance
    5. Ability to restore automatically from tape after a drive failure
  7. You are installing a new graphics adapter in a Windows 7 system. Which of the following expansion slots is designed for high-speed, 3D graphics adapters?

    1. USB
    2. FireWire
    3. PCI
    4. PCIe
  8. A user complains that changing from a VGA graphics card to one that supports the latest HDMI revision has resulted in not being able to play back certain content from the computer. Some content does play back, however. What could be the problem?

    1. Digital signal required
    2. Resolution too low
    3. DRM
    4. VGA cable not compatible
  9. Which of the following are modular ports used in data communications? (Choose two.)

    1. RG-6
    2. RJ-45
    3. RJ-11
    4. Thunderbolt
    5. RG-11
  10. The ________________is the measurement of the number of pixels an LCD monitor can display without the image appearing distorted.

    1. Native resolution
    2. Contrast ratio
    3. Pixelation
    4. Base frequency
  11. Which of the following is not a common monitor technology?

    1. LCD
    2. Plasma
    3. OLED
    4. Super PMOLED
  12. What can be used at the check-in desk of a doctor’s office to prevent patients from viewing confidential information?

    1. An antiglare filter
    2. A privacy filter
    3. An LED-backlit display
    4. A thin client
  13. Which of the following is a standard computer that can access resources locally as well as from servers but requires no specialized enhancements?

    1. Gaming PC
    2. Home server
    3. Thin client
    4. Thick client
  14. Which of the following is a requirement for virtualization workstations?

    1. Enhanced video
    2. Enhanced audio
    3. Maximum RAM and CPU cores
    4. RAID array
  15. Which of the following is not a requirement for a home server PC?

    1. TV tuner
    2. Print and file sharing services
    3. Gigabit NIC
    4. RAID array
  16. Which network connectivity device stops broadcasts from being sent to computers on a different network segment?

    1. Hub
    2. Switch
    3. Router
    4. Firewall
  17. Which layer of the OSI model has the important role of providing error checking?

    1. Session layer
    2. Presentation layer
    3. Application layer
    4. Transport layer
  18. On which port does FTP run by default?

    1. 21
    2. 25
    3. 63
    4. 89
  19. Which of the following protocols can be used by a client to access email on a server?

    1. DNS
    2. FTP
    3. SMTP
    4. IMAP
  20. Which of the following is a company that provides direct access to the Internet for home and business computer users?

    1. ASP
    2. ISP
    3. DNS
    4. DNP
  21. What is the data throughput provided by one ISDN bearer channel?

    1. 16Kbps
    2. 56Kbps
    3. 64Kbps
    4. 128Kbps
  22. Which LCD component in a laptop is responsible for providing brightness?

    1. Backlight
    2. Inverter
    3. Screen
    4. Backdrop
  23. Your laptop has 2GB of installed memory and uses shared video memory. If the video card is using 512MB, how much is left for the rest of the system?

    1. 2GB
    2. 1.5GB
    3. 512MB
    4. Cannot determine
  24. Which of the following standards supports both PCIe and USB 3.0?

    1. PC Card
    2. PlugCard
    3. ExpandCard
    4. ExpressCard
  25. When using a capacitive touchscreen on a mobile device, what is the most common tool used to input data?

    1. Keyboard
    2. Trackball
    3. Stylus
    4. Finger
  26. Which technology used by e-Readers gives them longer battery life than tablets?

    1. Lithium-polymer battery
    2. Low-power backlight
    3. Electrophoretic ink
    4. Capacitive touchscreen
  27. What is the name of the mode that allows two NFC-enabled devices to transmit data to each other?

    1. Emulation mode
    2. Peer-to-peer mode
    3. Reader/writer mode
    4. Ad hoc mode
  28. What is the function of the laser in a laser printer?

    1. It heats up the toner so that it adheres to the page.
    2. It charges the paper so that it will attract toner.
    3. It creates an image of the page on the drum.
    4. It cleans the drum before a page is printed.
  29. What is the component called that stores the material that ends up printed to the page in a laser printer?

    1. Toner cartridge
    2. Ink cartridge
    3. Laser module
    4. Laser cartridge
  30. What service was created by Apple to allow iPhones and iPads to print without installing printer drivers?

    1. TCP printing
    2. Bonjour
    3. AirPrint
    4. iPrint
  31. Your laser printer has recently starting printing vertical white lines on the documents that it prints. What is the most likely cause of the problem?

    1. The print driver is faulty.
    2. The fuser is not heating properly.
    3. There is toner on the transfer corona wire.
    4. There is a scratch on the EP drum.
  32. You are working with a Windows 7 computer that is assigned IP configuration information from a central server. You wish to refresh the IP information on the system manually. Which of the following commands would you use?

    1. IPCONFIG /refresh
    2. IPCONFIG /all
    3. IPCONFIG /renew
    4. WINIPCFG /all
  33. One laser printer in your office experiences frequent paper jams. What is the most likely cause of the problem?

    1. Worn paper feed rollers.
    2. Faulty stepper motor.
    3. Faulty fuser assembly.
    4. The EP drum isn’t advancing properly.
  34. One of your network users was recently caught browsing pornographic websites at work. Which of the following servers could be installed to prohibit this activity?

    1. Web
    2. Security
    3. Proxy
    4. DNS
  35. Google Docs is an example of what type of cloud service?

    1. SaaS
    2. IaaS
    3. PaaS
    4. GaaS
  36. Which type of software is required to run client-side virtualization on your home network?

    1. Terminal emulation
    2. Process replication
    3. Hyperthreading
    4. Hypervisor
  37. Which of the following are popular mobile-device operating systems? (Choose all that apply.)

    1. Android
    2. Windows 7
    3. Ubuntu
    4. iOS
  38. Which of the following protocols can be used in close range to transfer data between a mobile device and a computer system or to allow media to stream from the mobile device to an audio system?

    1. SMTP
    2. Bluetooth
    3. NFC
    4. Pegasus
  39. What term refers to copying data between a mobile device and a computer system to mirror such things as contacts, programs, pictures, and music?

    1. Calibration
    2. Remote wipe
    3. Pairing
    4. Synchronization
  40. Which of the following computer components can retain a lethal electrical charge even after the device is unplugged? (Choose two.)

    1. Monitor
    2. Processor
    3. Power supply
    4. RAM
  41. Roughly how much time spent communicating should be devoted to listening?

    1. 23 percent
    2. 40 percent
    3. 50 percent
    4. 80 percent
  42. You have found prohibited content on a user’s machine and need to follow proper procedures. What is the term used to describe the handling of evidence from discovery to delivery to the proper authorities?

    1. First response
    2. Chain of custody
    3. Data preservation
    4. Documentation flow changes
  43. Which of the following is a security mechanism used by HTTPS to encrypt web traffic between a web client and server?

    1. IPSec
    2. SSL
    3. L2TP
    4. PPPoE
  44. Which of the following are 4G technologies? (Choose all that apply.)

    1. LTE
    2. GSM
    3. CDMA
    4. WiMax
  45. Which of the following standards is also known as CardBus?

    1. PCMCIA 1.0
    2. PCMCIA 2.0
    3. PCMCIA 5.0
    4. ExpressCard
  46. When lifting heavy equipment, what is the proper technique?

    1. Get the heaviest part closest to your body and lift with your legs.
    2. Get the heaviest part closest to your body and lift with your back.
    3. Get the lightest part closest to your body and lift with your legs.
    4. Get the lightest part closest to your body and lift with your back.
  47. Which of the following is a chip that is integrated into PATA drives, as opposed to being mounted on a daughter card?

    1. Controller
    2. CPU
    3. Host adapter
    4. IDE
  48. After SATA was introduced, what was the retroactive term used for the original ATA specification?

    1. EIDE
    2. IDE
    3. PATA
    4. SCSI
  49. Which of the following is a virtual machine manager—the software that allows the virtual machines to exist?

    1. Comptroller
    2. Shell
    3. Kernel
    4. Hypervisor
  50. Which of the following would not be considered a standard permission in Windows using NTFS?

    1. Full Control
    2. Modify
    3. Allow
    4. Write
  51. Which feature is designed to keep Windows current by automatically downloading updates such as patches and security fixes and installing these fixes automatically?

    1. Security Center
    2. Action Center
    3. Windows Update
    4. Windows Anytime
  52. With dynamic storage, which of the following partition types are possible?

    1. Complex, bridged, or mirrored
    2. Simple, spanned, or striped
    3. Simple, complex, or interleaved
    4. Spanned, interleaved, or striped
  53. You have been told to use Task Manager to change the priority of a process to Below Normal. This equates to a base priority of what?

    1. 2
    2. 4
    3. 6
    4. 8
  54. Encrypting File System (EFS) is available in which editions of Windows 7? (Choose all that apply.)

    1. Professional
    2. Home Premium
    3. Enterprise
    4. Ultimate
    5. Business
  55. Which of the following can provide electrical power over Ethernet cabling?

    1. PoE
    2. QoS
    3. DoS
    4. WoL
  56. With which type of duplexing do communications travel in both directions but in only one direction at any given time?

    1. Full
    2. Half
    3. Auto
    4. Mechanical
  57. Which applet in Windows Vista is the primary interface for configuring synchronization of offline files?

    1. Synchronization Wizard
    2. Action Center
    3. Merge
    4. Sync Center
  58. Which Control Panel applet allows you to administer, as well as deploy, component services and configure behavior like security?

    1. SFC
    2. Data Sources
    3. Component Services
    4. DDR
  59. In Windows, the Account Lockout Counter in an Account Lockout policy keeps track of the number of invalid attempts before lockout occurs. The default is 0 (meaning the feature is turned off), but it can be set from 1 to what?

    1. 9999
    2. 999
    3. 99
    4. 24
  60. What Windows operating system tool can be used to block access from the network (be it internal or the Internet)?

    1. Windows Firewall
    2. Windows Defender
    3. Advanced Security
    4. Device Manager
  61. Which of the following are programs that enter a system or network under the guise of another program? (Choose the best answer.)

    1. Worms
    2. Trojans
    3. Rootkits
    4. Spyware
  62. Which of the following involves applying a strong magnetic field to initialize the media before tossing it away?

    1. Fraying
    2. Fracking
    3. Degaussing
    4. Spreading
  63. Which term is synonymous with MAC filtering?

    1. Disabling Autorun
    2. Shredding
    3. Port disabling
    4. Network Lock
  64. Which of the following is a copy of your system configuration at a given point in time?

    1. Restore point
    2. MBR
    3. Registry
    4. BOOT.INI
  65. Which of the following could be described as a small, deviously ingenious program that replicates itself to other computers, generally causing those computers to behave abnormally? (Choose the best answer.)

    1. Rogue
    2. Redirector
    3. Virus
    4. Pop-up

Answers to Assessment Test

  1. C. System components are essential for the basic functionality of a computer system. Many of the landmarks found on the motherboard can be considered system components, even expansion slots to a degree. What you plug into those slots, however, must be considered peripheral to the basic operation of the system. For more information, see Chapter 1.
  2. A. Except for DIMMs, all options represent some form of secondary storage, all of which are covered in Chapter 2. For more information, see Chapter 1.
  3. A, B. Motherboards commonly have RAM slots and expansion slots. Older motherboards even had CPU slots. Modern motherboards have connectors for powering cooling fans. Gyroscopes are most commonly found in mobile devices. Scanners are external devices. Although there might be one or more types of HDD interfaces built into the motherboard, the HDD itself is not. For more information, see Chapter 1.
  4. A. DL stands for double or dual layer. With DVDs, the capacity almost doubles, but with Blu-ray discs, it actually does. For more information, see Chapter 2.
  5. C. The standard peripheral power connector, or Molex connector, is commonly used on larger drives because it allows more current to flow to the drive than smaller peripheral connectors. For more information, see Chapter 2.
  6. C, D. Except for RAID 0, all implementations of RAID offer a way to recover from the failure of at least one drive, which is an example of fault tolerance, through the implementation of some mechanism that stores redundant information for that purpose. Some RAID types offer faster read and/or write performance. RAID 1, for instance does not guarantee either. For more information, see Chapter 2.
  7. D. Although technically PCI could be used for graphics adapters, PCIe supports high-speed, 3D graphic video cards. PCIe offers better performance than older graphics adapters. USB and FireWire can stream video, but they are not used for attachment of graphics adapters. For more information, see Chapter 3.
  8. C. Digital rights management (DRM), using High-bandwidth Content Protection (HDCP), is supported by adapters and monitors that support HDMI and later versions of DVI. If the content is protected, HDMI in the adapter will use HDCP to encrypt the stream across the cable, and the monitor will use HDCP to decrypt it for playback. From the information given, it cannot be assumed that the monitor changed when the adapter did. As a result, the monitor might have an older DVI-D port that uses a passive converter to receive the HDMI cable’s signal but that does not support HDCP. The signal over the HDMI cable is always digital. As a result, a VGA cable, which only supports analog signals, cannot be used when a DVI-D or HDMI interface is involved. HDMI supports all resolutions supported by a VGA interface. For more information, see Chapter 3.
  9. B, C. RJ-11 ports are used in analog telephony, and they allow modems attached to computer serial ports to transmit modulated digital information across the public switched telephone network (PSTN). RJ-45 ports are used by various network interface controller (NIC) cards for attachment to networks such as Ethernet. RG-6 and RG-11 are coaxial cable types, and Thunderbolt connectors are not modular. For more information, see Chapter 3.
  10. A. The native resolution refers to how many pixels an LCD screen can display (across and down) without distortion. The native resolution is based on the placement of the actual transistors that create the image by twisting the liquid crystals. The contrast ratio is the measurement between the darkest color and the lightest color that an LCD screen can display. For more information, see Chapter 4.
  11. D. Although there is a Super AMOLED display, employing active-matrix technology, there is no corresponding “super” passive-matrix version. The other technologies exist and are discussed in further detail in Chapter 4.
  12. B. Privacy filters are used to limit the viewing angle for a monitor. With such filters, the screen image becomes indiscernible when viewed at just a few degrees from center. For more information, see Chapter 4.
  13. D. A thick client is any computer system with a standard configuration. The gaming PC has enhancements over thick clients to their CPU, video, audio, and cooling. The home server PC must have specialized capabilities and services along with a faster NIC than the thick client and a RAID array. The thin client is a lesser device in comparison to the thick client, but that cost-saving feature is its enhancement. These less expensive computers can connect over the network to servers for their operating system images and applications. For more information, see Chapter 5.
  14. C. Virtualization workstations require more RAM than standard systems and need to be equipped with as many multicore processors as possible. Video and audio are not resources that need to be enhanced for such workstations. Although a RAID array is a wise addition whenever servers with valuable information are involved, a virtualization workstation does not require one. For more information, see Chapter 5.
  15. A. A TV tuner card is a requirement for a home theater PC but not for a home server. The other options are among those features that are required. For more information, see Chapter 5.
  16. C. A router does not pass along broadcasts to computers on other segments. Hubs and switches send broadcasts along because they do not segment traffic at the logical network address level. See Chapter 6 for more information.
  17. D. A key role of the Transport layer is to provide error checking. The Transport layer also provides functions such as reliable end-to-end communications, segmentation and reassembly of larger messages, and combining smaller messages into a single larger message. See Chapter 6 for more information.
  18. A. FTP listens on port 21. See Chapter 7 for more information.
  19. D. The IMAP and POP3 protocols can be used to retrieve email from mail servers. See Chapter 7 for more information.
  20. B. An Internet service provider (ISP) provides direct access to the Internet. See Chapter 8 for more information.
  21. C. An ISDN B (bearer) channel provides 64Kbps data throughput. A home-based BRI ISDN provides two B channels. See Chapter 8 for more information.
  22. A. The backlight provides light to the LCD screen. The inverter provides power to the backlight, and the screen displays the picture. See Chapter 9 for more information.
  23. B. If the laptop is using shared video memory, then the system memory is shared with the video card. If the video card is using 512MB (half a gigabyte), then there is 1.5GB left for the system. See Chapter 9 for more information.
  24. D. ExpressCard supports PCIe and USB 3.0. See Chapter 9 for more information.
  25. D. Capacitive touchscreens react to slight changes in electrical charges. The human finger is used as an input device for capacitive touchscreens. For more information, see Chapter 10.
  26. C. e-Readers use electrophoretic ink, also known as E Ink. E Ink uses less energy than other LCD displays, prolonging battery life. For more information, see Chapter 10.
  27. B. Card emulation mode, reader/writer mode, and peer-to-peer mode are the three valid NFC communication modes. For two devices to transmit to each other, they will use peer-to-peer mode. For more information, see Chapter 10.
  28. C. The laser creates an image on the photosensitive drum that is then transferred to the paper by the transfer corona. The fuser heats up the toner so that it adheres to the page. The transfer corona charges the page, and the eraser lamp cleans the drum before a page is printed. A rubber blade is also used to remove toner physically from the drum. See Chapter 11 for more information.
  29. A. Laser printers use toner, which they melt to the page in the image of the text and graphics being printed. A toner cartridge holds the fine toner dust until it is used in the printing process. See Chapter 11 for more information.
  30. C. AirPrint was created by Apple to let iPhones and iPads print without installing a printer driver. See Chapter 11 for more information.
  31. C. Toner on the transfer corona wire is most likely the cause of white streaks on printouts. A scratch or a groove in the EP drum causes vertical black lines. If the fuser was not heating properly, toner would not bond to the paper and you would have smearing. Faulty print drivers will cause garbage to print or there will be no printing at all. See Chapter 12 for more information.
  32. C. The IPCONFIG utility can be used with Windows computers to see the networking configuration values at the command line. It is one of the most commonly used command-line utilities that can be used in troubleshooting and network configurations. To renew IP configuration information, the IPCONFIG /renew command is used to force the DHCP server to renew the IP information assigned to the system. See Chapter 12 for more information.
  33. A. The most likely cause of those listed is a worn paper feed roller. Stepper motors control the back-and-forth motion of a print head in an inkjet printer. If the fuser assembly were faulty, the images would smear. See Chapter 12 for more information.
  34. C. A proxy server can be configured to block access to websites containing potentially objectionable material. See Chapter 20 for more information.
  35. A. Google Docs is software, so it is an example of Software as a Service (SaaS). See Chapter 20 for more information.
  36. D. The hypervisor is the key piece of software needed for virtualization. See Chapter 20 for more information.
  37. A, D. Google’s Android and Apple’s iOS are two of the most popular operating systems for mobile devices on the market. The other two are not. Although some mobile operating systems are based on Linux or UNIX, Ubuntu is a Linux distribution not used for mobile devices. For more information, see Chapter 21.
  38. B. Bluetooth allows you to pair a mobile device to a computer or to a device such as an automotive sound system or headset. Data can be transferred between devices, and media can be streamed from the mobile device. For more information, see Chapter 21.
  39. D. Synchronizing a mobile device with a computer system allows you to mirror personal data between the devices, regardless of which one contains the most current data. Calibration refers to matching the device’s and user’s perceptions of where the user is touching the screen. Remote wipes allow you to remove personal data from a lost or stolen device. Pairing is what must be done in Bluetooth for two Bluetooth devices to connect and communicate. For more information, see Chapter 21.
  40. A, C. Monitors and power supplies can retain significant electrical charges, even after they’re unplugged. Don’t open the back of a monitor or the power supply unless you are specifically trained to do so. See Chapter 23 for more information.
  41. C. Roughly half the time spent communicating should be devoted to listening. See Chapter 23 for more information.
  42. B. Chain of custody describes the procedure used to track handling and the location of evidence in the event of an incident such as discovering illegal or improper material on a user’s computer. See Chapter 23 for more information.
  43. B. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS).
  44. A, D. WiMax and LTE are the two current 4G cellular technologies. GSM and CDMA are 3G technologies.
  45. C. PCMCIA 5.0 is also known as CardBus.
  46. A. When lifting heavy equipment, center the weight as close to your body as possible. Then, keep your back straight and lift with your legs.
  47. A. A controller chip is responsible for encoding data to be stored on the disk platters as well as performing geometry translation for the BIOS. Translation is necessary because the true number of sectors per track of the hard disk drive system usually exceeds what is supported by the BIOS.
  48. C. IDE (ATA-1) and EIDE (ATA-2 and later) were specific nicknames for the ATA series of standards. Although ATA is technically accurate, it refers to legacy IDE standards as well as newer SATA standards. Instead of using the term ATA to be synonymous with IDE and EIDE, as had been done in the past, the term PATA was coined, referring to the parallel nature of IDE communications. The term PATA differentiates the IDE and EIDE form of ATA from Serial ATA. SCSI is a related, yet completely different type of technology.
  49. D. The hypervisor is a virtual machine manager—the software that allows the virtual machines to exist.
  50. C. Standard permissions are collections of special permissions, including Full Control, Modify, Read & Execute, Read, and Write.
  51. C. Windows includes Windows Update, a feature designed to keep Windows current by automatically downloading updates such as patches and security fixes and installing these fixes automatically.
  52. B. Windows supports both basic and dynamic storage. Basic can have a primary and an extended partition, while dynamic can be simple, spanned, or striped.
  53. C. For applications that don’t need to drop all of the way down to Low, this equates to a base priority of 6.
  54. A, C, D. EFS is available in the Professional, Enterprise, and Ultimate editions of Windows 7, allowing for encryption/decryption on files stored in NTFS volumes.
  55. A. Power over Ethernet (PoE) is a handy technology to supply both power and an Ethernet connection. The purpose of Power over Ethernet (PoE) is pretty much described in its name: Electrical power is transmitted over twisted-pair Ethernet cable (along with data).
  56. B. With half duplex, communications travel in both directions but in only one direction at any given time.
  57. D. The Sync Center in Windows Vista is the primary interface for configuring synchronization.
  58. C. Component Services allows you to administer as well as deploy component services and configure behavior like security.
  59. B. It can be set from 1 to 999.
  60. A. Windows Firewall (Start ➢ Control Panel ➢ Windows Firewall) is used to block access from the network (be it internal or the Internet).
  61. B. Trojans are programs that enter a system or network under the guise of another program. While rootkits may do this, it is not their primary feature and thus not the best answer for this question.
  62. C. Degaussing involves applying a strong magnetic field to initialize the media (this is also referred to as disk wiping). This process helps ensure that information doesn’t fall into the wrong hands.
  63. D. On a number of wireless devices, the term Network Lock is used in place of MAC filtering, and the two are synonymous.
  64. A. A restore point is a copy of your system configuration at a given point in time. It’s like a backup of your configuration but not necessarily your data.
  65. C. A computer virus is a small, deviously ingenious program that replicates itself to other computers, generally causing those computers to behave abnormally. Generally speaking, a virus’s main function is to reproduce.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.237.79