Professional Documents
Culture Documents
IT Essentials 1-6 Checkpoint Exam v5 2016
IT Essentials 1-6 Checkpoint Exam v5 2016
2. When upgrading a CPU, what must be applied between the new CPU
and the heat sink/fan?
A. Adhesive gel or paste
B. Penetrating oil
C. Thermal compound
D. Lubricating grease
3. After a Windows operating system has been installed, which program
would a technician use to select the programs that will run at startup?
A. Task Manager
B. Msconfig
C. Ntldr
D. Regedit
4. What is the default file system used during a fresh installation of
Windows 7?
A. FAT32
B. FAT16
C. HPFS
D. NTFS
5. Which type of device would be used on a laptop to verify the identity of
a user?
A. A biometric identification device
B. A MIDI device
C. A touch screen
D. A digitizer
11. Which location on a hard disk is used by the BIOS to search for
operating system instructions in order to boot a PC?
A. The Windows partition
B. The logical drive
C. The active partition
D. The extended partition
12. A technician is troubleshooting a computer that is experiencing
hardware failure detected by the BIOS. What is one way this failure is
indicated?
A. The computer returns an error message that indicates the I/O address
of the failing device.
B. The computer automatically boots into Safe Mode and displays a
warning on the screen.
C. The computer emits a pattern of beeps indicating the failing
device.
D. The screen flashes with a red background and displays a warning
message.
13.
Refer to the exhibit. Which two port types are shown in the graphic?
A. USB
B. Parallel
C. Serial
D. Network
E. Modem
14. What is the purpose of RAID adapters?
A. To provide enhanced audio and graphic capabilities
B. To connect multiple storage devices for redundancy or speed
C. To allow older PCI technology expansion slots to be used
D. To connect peripheral devices to a PC to improve performance
15. A technician has installed a new sound card in a PC but it is not
operating correctly. Where should the technician look to investigate driver
problems?
A. My computer
B. Computer Management
C. Device Manager
D. System Tools
16. After a computer is powered on, Windows 7 fails to start. What initial
procedure would a technician use to deal with this failure?
A. Boot from a Windows 7 installation media and access the System
Restore utility.
B. Access the Control Panel and choose Restore Files from Backup from
the System and Security menu.
C. Create a System Repair Disc and restore the image.
D. Press the F2 key during the boot process and start the computer is
Safe Mode.
17. A technician wants to create a new partition on a new additional hard
drive. Which tool should be used?
A. Disk Management
B. Scandisk
C. Disk Defragmenter
D. Device Manager
E. Chdsk
18. A technician notices that an application is not responding to
commands and that the computer seems to respond slowly when
applications are opened. What is the best administrative tool to force the
release of system resources from the unresponsive application?
A. System Restore
B. Event Viewer
C. Task Manager
D. Add or Remove Programs
19. Which key or key sequence pressed during the boot process will allow
a user to start a Windows PC using the last known good configuration?
A. Windows key
B. F12
C. Alt-Z
D. F1
E. F8
E. Device Manager
25. A technician just terminated some fiber optic cable and needs to
properly dispose of the hazardous waste created during the termination.
Where should the technician look for the proper disposal method for the
waste?
A. ESD
B. EPA
C. MSDS
D. FEMA
26. A school is adding computers to a classroom that has none. What
type of LAN would the school choose to take advantage of commonly
implemented wired technologies?
A. Token Ring
B. 802.11n
C. Ethernet
D. WiMAX
27. A customer has a computer for a home business, but wants to have
another computer as a web server. What would be the best solution for
the customer to share the monitor, mouse, and keyboard between the two
computers?
A. multipurpose device
B. access point
C. KVM switch
D. network switch
E. USB hub
28. What is the default TCP destination port number or number
combination that is used for SSH connections?
A. 20/21
B. 22
C. 23
D. 25
E. 80
29. A technician installed a network adapter in a computer and wants to
test network connectivity. The ping command can receive responses from
workstations on the same subnet but not from remote workstations. What
could be causing the problem?
A. The NIC driver is out of date.
B. The default gateway is incorrect.
C. The operating system is not compatible with the remote sites.
D. The TCP/IP protocol stack is not loaded.
30. Which product is recommended to remove the dust from inside a
computer?
A. compressed air
B. household vacuum cleaner
C. damp cloth
D. dry cloth
31. Which command should a computer technician use on a PC to restore
protected system files with known good versions?
A. defrag
B. chkdsk
C. sfc/scannow
D. msconfig
32. The current IP configuration of a medium size company with several
subnets is done manually and is time-consuming. Because of increased
network growth, a technician needs a simpler way for IP configuration of
workstations. Which service or protocol would simplify the workstation IP
configuration task?
A. ICMP
B. DNS
C. APIPA
D. DHCP
33. What are the four layers in the TCP/IP reference model?
A. application, presentation, internet, network access
B. application, transport, internet, data link
C. application, transport, internet, network access
D. application, presentation, session, transport
E. physical, data link, internet, transport
34. A PC that running the Windows 7 operating system has slowed down
over a period of time and now takes a long time to launch applications
and open various documents. What can be done to remedy the problem?
A. Dr. Watson
B. System Restore
C. Disk Defragmenter
D. Chkdsk
35. A computer is assigned an IP address of 169.254.33.16. What can be
said about the computer, based on the assigned address?
A. it cannot communicate outside its own network.
B. it has a public IP address that has been translated to a private IP
address.
C. it can communicate on the local network as well as on the Internet.
D. it can communicate with networks inside a particular company with
subnets.
36. A user complains about being unable to connect to the wireless
network. Which two actions should be part of troubleshooting the wireless
connection? (Choose two.)
A. Verify in the laptop software whether any wireless networks are
detected.
B. Verify that the laptop is plugged into an electrical outlet.
C. Reconfigure TCP/IP settings on the laptop.
D. Try moving the laptop to different places to see if a signal can be
detected.
E. Reinsert the laptop battery.
37. Which recommendation should be observed when replacing existing
memory?
A. The new memory should exceed the capacity of the hard drive.
B. The new memory should operate at the same speed as the hard drive.
C. The new memory should be as fast or faster than existing
memory.
D. The new memory should be as fast or faster as the cache found in the
processor.
38. A network specialist has been hired to install a network in a company
that assembles airplane engines. Because of the nature of the business,
44. A specific computer has an issue that could not be resolved by the
help desk technician. The on-site technician finds that Windows updates
have been disabled. The technician re-enables the update service,
configures the computer for automatic updates, downloads and installs all
missing updates, ensures the computer boots successfully, and verifies
with the customer that the issue has been resolved. Which step, if any, is
next?
A. Document the findings, actions, and outcomes.
B. Establish a plan of action to resolve the problem and implement the
solution.
C. Verify full system functionality and, if applicable, implement preventive
measures.
D. Test the theory to determine the cause.
E. No further action needed.
45. A technician is designing a hardware preventive maintenance plan for
a company. Which strategy should be included in the plan?
A. Omit performing maintenance operations on components until the
equipment malfunction.
B. Schedule and document routine maintenance tasks.
C. Avoid performing maintenance operations on plug and play devices
that are controlled by the operating system.
D. Only clean equipment that is requested by the customer.
46. A helpdesk technician takes a call, Good morning, this is the
helpdesk. My name is Greg. How may I help you today? The frantic caller
states, My computer will not turn on and I have a presentation in 15
minutes. The technician responds, Now calm down and let us see what
we can do. The technician then proceeds to lead the caller through the
process of checking power cables and power lights. Which
troubleshooting step is being used at this point?
A. Identify the problem.
B. Establish a plan of action to resolve the problem.
C. Implement a solution.
D. Verify full system functionality and, if applicable, implement preventive
measures.
E. Establish a theory of probable cause.
47. On a computer that will not boot, which two actions are recommended
in the troubleshooting process after verifying the obvious issues such as
power to the computer and display, non-bootable media, and the BIOS
boot order options? (Choose two.)
A. Reinstall the operating system.
B. Remove unnecessary peripherals.
C. Replace computer components one at a time until the problem is
solved.
D. Reset the BIOS settings to factory default.
E. Use the Last Known Good Configuration.
F. Reinstall the user applications.
48. Which type of standard interface allows users to connect and
disconnect peripheral devices while the computer is running without
having to restart?
A. PATA
B. SATA
C. USB
D. IDE
49. What is the most important reason for the company that the
preventive maintenance be done?
A. Preventive maintenance helps to protect the computer equipment
against future problems.
B. Preventive maintenance enables the IT manager to check on the
location and state of the computer assets.
C. Preventive maintenance provides an opportunity for junior technicians
to obtain more experience in a non-threatening or problem.
D. Preventive maintenance allows the IT department to regularly monitor
the contents of user hard drives to ensure computer use policies are
being followed.
50. What is the distance limitation of a single data run for UTP cabling
without adding networking devices?
A. 33 ft (10 m)
B. 100 ft (31 m)
C. 330 ft (100 m)
D. 500 ft (154 m)
A PC that running the Windows 7 operating system has slowed down over
a period of time and now takes a long time to launch applications and
open various documents. What can be done to remedy the problem?
Run CHKDSK;
Run Dr.Watson;
Run System Restore;
Run Disk Defragmenter.
Which type of device would be used on a laptop to verify the ide ntity of a
user?
a MIDI devices
What is the most important reason for a company to ensure that computer
preventive maintenance is done?
Preventive maintenance helps to protect the computer equipment
against future problems.
When installing a network adapter into a client computer, a technician
notices that the contacts on the adapter need to be cleaned. Which
solution should the technician use to clean the contacts?
isopropyl alcohol
mild detergent
slightly abrasive cleanser
glass cleaner
Refer to the exhibit. Which two port types are shown in the graphic?
parallel
Serial
network
USB
modem