• 1. 
    What best describes an encrypted message?

  • A cipher.
  • Plain text.
  • A key.
  • An algorithm.
  • 2. 
    What is a role of an Internet Service Provider?

  • Upgrade operating system.
  • Configure wireless network.
  • Enable WAN communications.
  • Distribute applications to hosts.
  • 3. 
    What is a stage in the production of a risk assessment?

  • Ensure loose cables are secured.
  • Estimate the impact of the hazard.
  • Conduct environmental impact study.
  • Circulate fire safety policy.
  • 4. 
    What piece of protective equipment is most important when installing a computer hard drive?

  • A correctly installed NIC card.
  • An anti-static wrist band.
  • Rubber-soled shoes.
  • A screw driver.
  • 5. 
    What is the mail reason for a software licensing?

  • To ensure the version you have is legal
  • To keep versions up to date
  • To limit the number of copies
  • To make it easier to make copies.
  • 6. 
    What method of user training will cause the least distribution to the operation of a business?

  • Phased upgrade.
  • Simultaneous upgrade.
  • Virtual upgrade.
  • Sandboxed upgrade.
  • 7. 
    What measure best shows communications network performance?

  • Megabytes stored.
  • Gigabits transferred per second.
  • CPU cycles per second.
  • maximum hop time.
  • 8. 
    What is the command line to display a computer's IP address?

  • ShowIP.
  • ConfigIP.
  • IPconfig.
  • IPshow.
  • 9. 
    What is the most important business requirement for IT system?

  • To look good to clients.
  • To manage expectations.
  • To respond to customers' needs.
  • To have current technologies at all times.
  • 10. 
    What definition best describes a metric?

  • A numbering system.
  • A networking topology.
  • A system of measurement.
  • A new tablet computer.
  • 11. 
    What definition best describes Linux?

  • It can install Windows based software.
  • It is open source and can be modified.
  • There is only one version that never needs updating.
  • It is easy to use for inexperienced developers.
  • 12. 
    What is a boot loader error also known as?

  • LDR error.
  • DIR error.
  • MBR error.
  • RDL error.
  • 13. 
    What is a type of email protocol?

  • NTP.
  • SQLs.
  • DHCP.
  • POP.
  • 14. 
    In networking, what is the purpose of a bridge?

  • It joins 4 networks together.
  • It joins two cables together.
  • It joins two networks together.
  • It divides the storage capacity of a network.
  • 15. 
    What is a correct IT helpdesk procedure?

  • To deal with important queries only.
  • To log calls with major problems.
  • To write a detailed report on all calls received.
  • To log all calls received.
  • 16. 
    What is primary purpose of user training?

  • It provides a needed analysis.
  • It generates reliable test data.
  • It compiles with installation directives.
  • It ensures the correct operation of software.
  • 17. 
    What tool will show coverage of a wireless LAN?

  • A continuity tester.
  • A signal strength meter.
  • A portable oscilloscope.
  • A time domain reflectometer
  • 18. 
    Which definition best describes active listening?

  • taking notes whilst communicating.
  • Making eye contact whilst listening.
  • Concentrating on more than one person talking.
  • Ignoring the person talking to you.
  • 19. 
    What is the purpose of project management templates?

  • They produce consistently structured documentation.
  • they ensure software is delivered on time.
  • They optimize cost control for application.
  • They develop error-free systems.
  • 20. 
    What global organization provides a framework for auditing quality in IT systems?

  • International Standard Organization.
  • Internet Engineering Task Force.
  • United Nations.
  • Domain Name Registrar
  • 21. 
    How does data flow in a ring network?

  • It moves through a central hub.
  • It waits for a network token before moving.
  • It may collide with data from other hosts.
  • It passes onto a cable with terminators at both ends.
  • 22. 
    What helpdesk technique is the best way to find the cause of a problem?

  • Consult the fault log.
  • Ask direct questions.
  • Search the solutions database.
  • Refer to the assets register.
  • 23. 
    What tool is a common electrical testing device?

  • A circuit breaker.
  • A soldering iron.
  • A multi-meter.
  • An oscilloscope.
  • 24. 
    What is an example of storage media?

  • SATA controller
  • CD drive.
  • SD card
  • Data archive.
  • 25. 
    Which device is a type of cabling infrastructure?

  • Bluetooth transmitter.
  • Wireless access point.
  • Gigabit backbone
  • USB powered hub.
  • 26. 
    What is legacy software?

  • It is open source.
  • It is developed in- house.
  • It belongs to the manufacturer.
  • It is older or non-current.
  • 27. 
    Which action is a boot option?

  • Open in safe mode.
  • Load application.
  • Renew partition tables.
  • Format CMOS settings.
  • 28. 
    What type of legislation protects intellectual property rights?

  • Data protection legislation.
  • Copyright legislation
  • Computer misuse legislation
  • Financial services legislation.
  • 29. 
    What is the best way to find a fault on a computer?

  • Diagnostic software.
  • Remote desktop.
  • Ask the user.
  • Online user group.
Report Question