1.
Which two of the following are common motherboard form factors? (Choose 2)
Correct Answer(s)
A. ATX
C. NLX
Explanation
ATX and NLX are the common motherboard form factors. ATX (Advanced Technology eXtended) is a widely used motherboard form factor that provides a standard size and layout for computer components. NLX (New Low eXtended) is another common form factor that was popular in the 1990s. Both ATX and NLX provide standardized dimensions and mounting hole placements, allowing for compatibility with various computer cases and components. OCR and PSU are not motherboard form factors.
2.
A _________ can be erased without removing the chip. (1 or 6 words)
Correct Answer(s)
EEPROM
Electronically Erasable Programmable Read Only Memory
electronically erasable programmable read only memory
Explanation
EEPROM stands for Electronically Erasable Programmable Read Only Memory. This type of memory can be erased electronically without removing the chip. It allows for data to be written and erased multiple times, making it a versatile and reusable memory storage solution.
3.
How many devices can be attached to a single Firewire port?
Correct Answer
C. 63
Explanation
The correct answer is 63 because Firewire ports have the ability to support up to 63 devices connected to a single port. This is possible due to the daisy-chaining capability of Firewire, where multiple devices can be connected in a series using a single port. Each device in the chain acts as a node, allowing for a large number of devices to be connected to a single port.
4.
A _________ summarises about material identification, including hazardous ingredients etc. (1 or 4 words)
Correct Answer
MSDS
msds
Material Safety Data Sheet
material safety data sheet
Explanation
The correct answer for this question is "MSDS, msds, Material Safety Data Sheet, material safety data sheet." An MSDS, also known as a Material Safety Data Sheet, provides a summary of information about material identification, including hazardous ingredients and other important safety information. It is a document that provides crucial details about the physical and chemical properties of a substance, as well as its potential hazards and precautions for safe handling and use.
5.
Scandisk is an example of a disk management tool. (True or False)
Correct Answer
True
true
Explanation
Scandisk is indeed an example of a disk management tool. It is a utility program used to check the integrity of a computer's hard disk drive for errors and fix them if necessary. Scandisk can also help to optimize the disk's performance by identifying and repairing bad sectors, cross-linked files, and other issues that may affect the disk's functionality. Therefore, the statement is true.
6.
There are two different types of user interface, which of the following are correct? (Choose 2)
Correct Answer(s)
B. CLI
D. GUI
Explanation
CLI and GUI are the correct types of user interfaces. CLI stands for Command Line Interface, which allows users to interact with a computer system by typing commands into a text-based interface. GUI stands for Graphical User Interface, which uses visual elements such as icons, menus, and windows to allow users to interact with a computer system. Both CLI and GUI are widely used in different operating systems and software applications to provide different levels of interaction and usability for users.
7.
Look at the list below and decide what is the correct boot sequence.a. POST is runb. NTLDR reads the boot.ini filec. BIOS reads the MBRd. NTLDR loads ntoskrnl.exe and hal.dlle. ntoskrnl.exe starts winlogon.exe
Correct Answer
C. A, c, b, d, e
Explanation
The correct boot sequence is a, c, b, d, e. First, the POST (Power-On Self Test) is run to check the hardware. Then, the BIOS reads the MBR (Master Boot Record) which contains the boot loader. Next, the boot loader (NTLDR) reads the boot.ini file to determine the operating system to load. After that, NTLDR loads the necessary files ntoskrnl.exe and hal.dll. Finally, ntoskrnl.exe starts winlogon.exe, which initializes the Windows login process.
8.
Which registry key contains all information relating to hardware and software in the system?
Correct Answer
C. HKEY_LOCAL_MACHINE
Explanation
HKEY_LOCAL_MACHINE is the correct answer because it is the registry key that contains all information relating to hardware and software in the system. This key stores configuration settings for the entire system, including information about installed hardware devices, software settings, and system preferences. It is a crucial part of the Windows operating system and is used by various applications and services to access and modify system settings.
9.
_______ is a type of Token Ring network. It runs on fibre-optic cable and is often used to connect several buildings in a office complex or university campus. (1 or 4 words)
Correct Answer
FDDI
Fiber Distributed Data Interface
Explanation
FDDI, which stands for Fiber Distributed Data Interface, is a type of Token Ring network. It utilizes fiber-optic cable and is commonly employed to establish connections between multiple buildings in an office complex or university campus.
10.
Which layer of the OSI model establishes, manages and terminates the connections between the local and remote applications.
Correct Answer
D. Session
Explanation
The Session layer of the OSI model is responsible for establishing, managing, and terminating the connections between the local and remote applications. It sets up and maintains the session between the two communicating devices, allowing them to exchange data. This layer handles tasks such as session establishment, synchronization, and session termination, ensuring reliable communication between applications.
11.
_______ dynamically assigns an IP address to network devices. (1 or 4 words)
Correct Answer
DHCP
Dynamic Host Conficuration Protocol
Explanation
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that dynamically assigns IP addresses to network devices. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration settings from a DHCP server. By using DHCP, network administrators can easily manage and allocate IP addresses to devices on their network, eliminating the need for manual configuration.
12.
Which partion of a hard drive is the operating system booted from?
Correct Answer
C. Primary
Explanation
The operating system is booted from the primary partition of a hard drive. The primary partition is the main partition on the hard drive that contains the necessary files for the operating system to start up and run. It is the partition that is typically set as active and is the first partition that the computer looks for when booting up. The other options, extended and logical partitions, are used for storing data and creating additional partitions within the primary partition.
13.
Which IEEE wireless standard allows transfer rates up to 54Mbps @ 5GHz?
Correct Answer
C. 802.11a
Explanation
The correct answer is 802.11a. This IEEE wireless standard allows transfer rates up to 54Mbps at 5GHz.
14.
________ is a transport protocol that offers a connectionless service for delivery of data. Network management applications, network file systems and simple file transport use _______.
Correct Answer
User Datagram Protocol
UDP
Explanation
User Datagram Protocol (UDP) is a transport protocol that offers a connectionless service for delivery of data. It is commonly used by network management applications, network file systems, and simple file transport. UDP does not provide reliable delivery or error checking, making it suitable for applications that prioritize speed over accuracy, or where occasional data loss is acceptable.
15.
Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose 2)
Correct Answer(s)
A. EPP
D. ECP
Explanation
EPP and ECP are the two modes of operation within the IEEE 1284 standard that allow bi-directional communication. EPP stands for Enhanced Parallel Port and ECP stands for Extended Capabilities Port. Both modes support two-way communication between the computer and the peripheral device, allowing data to be transferred in both directions. This enables functions such as printing, scanning, and data exchange between the computer and the peripheral device.
16.
A _______ is one complete circle of data on a hard drive platter.
Correct Answer(s)
Track
Explanation
A track is one complete circle of data on a hard drive platter. It is a concentric ring on the surface of the platter where data is stored. Each track is divided into sectors, which are the smallest units of data storage on a hard drive. The read/write head of the hard drive moves along the tracks to access and retrieve data.
17.
This is also know as a file allocation table and is the smallest unit of space used for storing data. (Choose 1)
Correct Answer
C. Cluster
Explanation
A cluster is the smallest unit of space used for storing data in a file allocation table (FAT). The FAT is also known as a file allocation table and is responsible for keeping track of which clusters are allocated to each file on a storage device. Therefore, a cluster is the correct answer as it is the unit of space used for storing data in the FAT.
18.
During the POST process, how many beeps indicates an error with the processor? (Choose 1)
Correct Answer
C. 5 Beeps
Explanation
During the POST process, the system performs a series of tests to check the hardware components. The number of beeps produced by the system speaker indicates the type of error encountered. In this case, 5 beeps indicate an error with the processor. This could be due to a faulty or improperly installed processor, or a problem with the motherboard's connection to the processor.
19.
____________ is a type of social engineering, where the attacker pretends to represent a legitimate organisation. (1 word)
Correct Answer
Phishing
phishing
Explanation
Phishing is a type of social engineering where the attacker pretends to represent a legitimate organization. They typically use deceptive tactics such as email or messaging to trick individuals into providing sensitive information or clicking on malicious links. This can lead to identity theft, financial loss, or unauthorized access to personal accounts.
20.
Which of the following are not TCP/IP attacks? (Choose 2)
Correct Answer(s)
C. Worm
E. Spam
Explanation
Worm and Spam are not TCP/IP attacks because they do not exploit vulnerabilities in the TCP/IP protocol stack or target specific TCP/IP protocols. Worms are self-replicating malware that spread through networks, while Spam refers to unsolicited bulk emails. On the other hand, Replay, SYN Flood, and DDoS attacks are all TCP/IP attacks. Replay attacks involve the interception and retransmission of network data, SYN Flood attacks exploit the TCP three-way handshake process, and DDoS attacks overwhelm a target system with a flood of traffic.
21.
What benefits does NTFS provide over FAT32? (Choose 2)
Correct Answer(s)
A. File and folder level permissions
C. Smaller clusters use more of the available space
Explanation
NTFS provides file and folder level permissions, which means that users can have different levels of access and control over specific files and folders. This allows for better security and privacy control. Additionally, NTFS uses smaller clusters, which means that it can make more efficient use of the available storage space on a disk compared to FAT32. Smaller clusters reduce wasted space and allow for more efficient storage allocation.
22.
This wireless security protocol was created by Cisco to address weaknesses in WEP & WPA. ____________ is a good choice when using Cisco equipment in a Windows or Linux environment. (1, 2 or 4 words)
Correct Answer(s)
LEAP
Lightweight Extensible Authentication Protocol
EAP-Cisco
Explanation
LEAP, also known as Lightweight Extensible Authentication Protocol, is a wireless security protocol created by Cisco to improve upon the weaknesses of WEP and WPA. It is a good choice when using Cisco equipment in both Windows and Linux environments.
23.
Which wireless security protocol is used by devices that employ Wireless Application Protocol? (Choose 1)
Correct Answer
C. WTLS
Explanation
WTLS (Wireless Transport Layer Security) is the correct answer because it is specifically designed for securing wireless communication in devices that use the Wireless Application Protocol (WAP). WTLS provides encryption, authentication, and integrity protection for data transmitted over wireless networks. It is a lightweight security protocol that is optimized for the constraints of wireless devices, making it suitable for mobile applications. WPA (Wi-Fi Protected Access) and WEP 128 (Wired Equivalent Privacy) are wireless security protocols used in Wi-Fi networks, but they are not specifically associated with WAP. LEAP (Lightweight Extensible Authentication Protocol) and SSID (Service Set Identifier) are not security protocols but rather authentication methods and network identifiers, respectively.
24.
A ________ _______ is a type of TCP/IP attack that randomly opens TCP ports tying up the network resources. (2 words)
Correct Answer
SYN flood
Explanation
A SYN flood is a type of TCP/IP attack where the attacker sends a large number of SYN requests to a target server, but does not complete the handshake process. This causes the server to keep waiting for a response, tying up its resources and preventing it from servicing legitimate requests. By opening TCP ports randomly, the attacker can overwhelm the network and disrupt its normal functioning.
25.
What is the 4th step in the Laser printing process? (Choose 1)
Correct Answer
B. Developing
Explanation
The 4th step in the Laser printing process is "Developing." Developing involves applying toner to the electrostatically charged drum, which creates the image or text that needs to be printed. The toner is attracted to the charged areas on the drum, forming the desired image. This step is crucial in transferring the image onto the paper during the subsequent steps of the printing process.