It-essentials v6.0 Pretest Exam Answers 2018

1. What is an advantage of purchasing a tablet rather than a laptop computer?

wireless capability

reduced size/weight*

quicker Internet access

easier typing capabilities

faster processing speed

increased number of possible attached devices

 

2. What is a possible hardware upgrade that can be used to add more storage space to a modern smartphone?

microSD*

hard disk

CompactFlash

USB flash drive

 

3. Which component would be located inside the computer case?

monitor

printer

RAM*

USB hard drive

 

4. Which two devices are output devices? (Choose two.)

keyboard

monitor*

mouse

printer*

video camera

 

5. Which hardware component must be installed in a PC to provide network connectivity?

PCI bus

serial port

network interface*

expansion slot

 

6. Refer to the exhibit. What does the symbol shown represent?

a folder which is a collection of subfolders and files*

a Word document stored on the disk

a database file

a program that is used to navigate the files stored on a disk

 

7. How can a section of text in a Notepad document be highlighted to be copied to another location within the document?

click the Copy icon, then drag the pointer over the text to be copied

double-click the words to be copied

move the pointer to the start of the text to be copied, press the Windows key, move the pointer to the end of the text, and click the Copy icon

click at the start of the text, drag the pointer to the end of the text, then release the button*

 

8. Refer to the exhibit.

Cisco It-essentials v6.0 Pretest question 8

Why is Undo in black, while the other items are in gray?

Commands are shown in black, while edit operations are shown in gray.

Groups of menu items alternate black and gray to make them easier to find.

There are no operations to undo, so this operation is unavailable.

There is no text to cut, copy, paste, or delete, so these operations are unavailable.*

 

9. Refer to the exhibit. What caused the pictured menu to appear on the user’s screen?

The user double-clicked a desktop icon.

The user right-clicked a desktop icon.*

The user highlighted an icon and then pressed Enter.

The user highlighted an icon and then pressed the Esc key.

 

10. Which two operating systems are used in smartphones? (Choose two.)

iOS*

OS X

Android*

Snow Leopard

Windows 7

 

11. A student purchased a new WiFi enabled tablet computer. What is required to connect this device to the Internet?

a 3G or 4G network

a telephone company

a wireless LAN*

a mobile phone service provider

 

12. Which two general precautions should be followed when using hand tools? (Choose two.)

Use tools that are the right size and right type.*

Always carry pointed tools by your side with the pointed end up.

Keep cutting tools sharp and in good condition.*

Carry the tools used most often in your pockets.

 

13. Which precaution should be taken before any electronic component is removed from a computer system?

place the computer on an insulating mat

make sure that the computer is unplugged*

attach a grounding wire to the case

use only approved metal tools

 

14. Which problem could occur if a screwdriver is used to pry the top off of a computer case?

The screwdriver could slip and cause harm to the technician or to nearby individuals.*

The screwdriver could cause deformation to the adapter cards.

The screwdriver could break and short out the motherboard.

The screwdriver could scratch the case, causing the motherboard to short circuit.

 

15. What would be the most environmentally friendly procedure to consider in the design of a server room?

Share one monitor with several servers.*

Implement power line conditioning and redundancy.

Filter the air in the room.

Maintain a constant room temperature throughout the year.

 

16. In the event that a mobile device is lost or stolen, which two procedures can help protect private information that is stored on the device? (Choose two.)

Use a secure email client.

Encrypt the storage media.*

Enable the device access password.*

Turn off the device when it is not in use.

Turn off the wireless connection when it is not in use.

 

17. What password would be considered a strong password?

password123

Excellent

18273645

Il0veMyj0b*

 

18. The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?

8

10

12*

15

 

19. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians that each work the same amount of time to perform the refresh?

5 hours

8 hours

10 hours

12 hours*

 

20. A classmate is creating an imaginary language. Here are some words the classmate has created:

stalopheah means good day
stalopjink means goodness
drahplunk means light house
flinsjink means happiness
plunkgrecki means house fly

What would your classmate use to mean “daylight”?

jinkstalop

stalopflins

heahflins

heahdrah*

drahjink

heahgrecki

 

21. A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use?

3G/4G

Wi-Fi

infrared

Bluetooth*

 

22. A customer connects a smartphone to a cloud service operated by the service provider. What can the cloud service provide to the customer?

phone calls

remote print

data storage*

device troubleshooting

 

23. What is the default subnet mask for the IP address 172.16.4.22?

255.255.255.255

255.255.255.0

255.255.0.0*

255.0.0.0

 

24. Which network protocol is used to automatically assign an IP address to a computer on a network?

FTP

DHCP*

ICMP

SMTP

APIPA

 

25. Match the icon to its likely associated use. (Not all options are used.)

 

26. Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?

DVI

HDMI*

PS/2

DB-15

 

27. Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

F1

F8*

F12

Alt-Z

Windows key

 

28. A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?

Computer Management

Device Manager*

My Computer

System Tools

 

29. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

Task Manager*

Add or Remove Programs

Event Viewer

System Restore

 

30. Which action can reduce the risk of ESD damage when computer equipment is being worked on?

working on a grounded antistatic mat*

lowering the humidity level in the work area

moving cordless phones away from the work area

keeping the computer plugged into a surge protector

 

31. When should a technician avoid wearing an antistatic wrist strap?

when installing RAM

when replacing a power supply unit*

when installing a hard drive

when opening a computer case

 

32. What can be tested with a digital multimeter?

wireless signal strength and access point positioning

basic functionality of computer ports

copper cable location

quality of electricity in computer components*

 

33. A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?

Grant the users read permissions on all files.

Give the users administrator rights on their computers.

Make the users members of a group called Backup Operators.*

Check the Folder is Ready for Archiving box in the properties of each folder.

 

34. What characterizes a DDoS attack?

Many hosts participate in a coordinated attack.*

Infected computers are called daemons.

It is easy to identify the source of the attack.

All hosts must be in the same geographic area.

 

35. Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?

Aim just above the flame, squeeze the lever, and sweep from side to side.

Aim at the base of the flame, squeeze the lever, and sweep from side to side.*

Aim directly at the center of the flame, squeeze the lever, and sweep from side to side.

Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame.

Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.

 

36. What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?

surge suppressor

uninterruptible power supply*

standby power supply

power inverter

 

37. Which measure can help control RFI effects on wireless networks?

Ensure the humidity and temperature levels are set as low as possible.

Ensure the number of wireless NICs exceeds the number of wireless phones.

Ensure the wireless network is on a different frequency than the offending source.*

Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.

 

38. A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

It cannot communicate outside its own network.*

It can communicate on the local network as well as on the Internet.

It can communicate with networks inside a particular company with subnets.

It has a public IP address that has been translated to a private IP address.

 

39. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?

22

53

80

143

443*

 

40. A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)

The total cost of the new solution is considerably lower.

Data is more secure in the event of hardware failures.*

Individual users are in control of their own computers and network resources.

Data resources and access are centrally controlled.*

Personnel costs are lower because a dedicated network administrator is no longer necessary.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.