Вы находитесь на странице: 1из 12

CHAPTER 7

1. How many devices can a Bluetooth device connect to simultaneously?


 127
 7
 10
 24
 5
2. A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is
the host identifier of the device?
 2001:0DB8:75a3
 0607:1234:aa10:ba01
 2001:0DB8
 ba01
3. Which layer of the OSI model is responsible for logical addressing and routing?
 application
 data link
 network
 transport
4. When would a printer be considered a network host?
 when it is connected to a switch
 when it is connected to a workstation
 when it is connected to a laptop
 when it is connected to a PC
5. Which device provides wireless connectivity to users as its primary function?
 switch
 router
 access point
 modem
6. Which technology is most often used to connect devices to a PAN?
 coaxial cabling
 Bluetooth
 fiber optic cabling
 IEEE 802.11n wireless
7. Which three factors are reasons for a company to choose a client/server model for a
network instead of peer-to-peer? (Choose three.)
 The network is small with fewer than eight users.
 The company network requires secure access to confidential information.
 The users need a central database to store inventory and sales information.
 Each user understands how to safely share files across a network.
 The data gathered by the employees is critical and should be backed up on a regular basis.
 All employees passed a strict background check as part of the corporate hiring practices.
8. What is a characteristic of a WAN?
 It connects multiple networks that are geographically separated.
 It spans across a campus or city to enable sharing of regional resources.
 It is typically owned and managed by a single home or business.
 It requires a wireless access point to connect users to the network.
9. Which three layers of the OSI model map to the application layer of the TCP/IP model?
(Choose three.)
 application
 presentation
 session
 transport
 network
 data link
 physical
10. What is the correct order of the layers of the TCP/IP model from the top layer to the
bottom?
 application, session, network, data link, physical
 application, internet, network access, transport
 network access, transport, internet, application
 application, transport, internet, network access
11. What TCP/IP model layer is responsible for MAC addressing?
 network access
 internet
 transport
 application
12. What PDU is associated with the network layer of the OSI model?
 data
 frame
 packet
 segment
13. Which two layers of the OSI model correspond to the functions of the TCP/IP model
network access layer? (Choose two.)
 physical
 data link
 network
 transport
 session
14. What is identified by the 100 in the 100BASE-TX standard?
 the maximum bandwidth in Mb/s
 the maximum cable distance in meters
 the maximum number of network nodes
 the series number of the standard
15. Which two characteristics describe Ethernet technology? (Choose two.)
 It is supported by IEEE 802.3 standards.
 It is supported by IEEE 802.5 standards.
 It typically uses an average of 16 Mb/s for data transfer rates.
 It uses the CSMA/CD access control method.
 It uses a ring topology.
16. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz
ranges?
 802.11n
 802.11g
 802.11b
 802.11a
17. A customer is considering a multipurpose device to create a home network. Which three
devices are usually integrated into a multipurpose network device? (Choose three.)
 web server
 switch
 router
 email server
 wireless access point
 print server
18. Which network device makes forwarding decisions based on the destination MAC address
that is contained in the frame?
 repeater
 hub
 switch
 router
19. A router uses IP addresses to forward traffic from one network to other networks.
20. A network specialist has been hired to install a network in a company that assembles
airplane engines. Because of the nature of the business, the area is highly affected by
electromagnetic interference. Which type of network media should be recommended so
that the data communication will not be affected by EMI?
 STP
 coaxial
 fiber optic
 UTP
21. Which term describes a type of coaxial cable?
 RG-6
 568A
 UTP
 Cat 5e
22. Which pairs of wires change termination order between the 568A and 568B standards?
 green and orange
 green and brown
 blue and brown
 brown and orange
23. Which two types of signal interference are reduced more by STP than by UTP? (Choose
two.)
 RFI
 white noise
 MDF
 dispersion
 EMI
24. How many host addresses are available on a network with a subnet mask of 255.255.0.0?
 65,534
 254
 16,777,214
 1024
25. A technician is troubleshooting a problem where the user claims access to the Internet is
not working, but there was access to the Internet the day before. Upon investigation, the
technician determines that the user cannot access the network printer in the office either.
The network printer is on the same network as the computer. The computer has
169.254.100.88 assigned as an IP address. What is the most likely problem?
 The computer cannot communicate with a DHCP server.
 The IP default gateway on the computer is incorrect.
 The network interface card driver needs to be updated.
 The router that connects this network to other networks is down.
26. What is a characteristic of the UDP protocol?
 low overhead
 guaranteed delivery
 error correction
 end-to-end establishment before delivery

CHAPTER 8

1. A user notices that the data transfer rate for the gigabit NIC in the user
computer is much slower than expected. What is a possible cause for
the problem?
 The NIC duplex settings have somehow been set to half-duplex.
 The NIC wake-on-LAN setting is misconfigured.
 Hibernation mode is causing the NIC to shutdown unexpectedly.
 The NIC is configured to use both IPv4 and IPv6 at the same time.
2. Two LEDs are usually present on a NIC. What are the two primary
uses for these LEDs? (Choose two.)
 to indicate the presence of a connection
 to indicate interference from another nearby wireless or electronic device
 to indicate that the NIC has connected to a DHCP server
 to indicate that the NIC is connected to a homegroup or workgroup
 to indicate that data transfer activity is present
3. What is the purpose of the network profiles that are used to establish
a new network connection on a Windows PC?
 to configure NIC settings for the fastest network available
 to remove the need for IP addresses when connecting to a network
 to provide a list of ISPs that may be used for Internet access
 to provide an easy way to configure or apply network functions based on the type of network
to be joined
4. A wireless router is displaying the IP address of 192.168.0.1. What
could this mean?
 The NAT function is not working on the wireless router.
 The wireless router still has the factory default IP address.
 Dynamic IP address allocation has been configured on the router and is functioning correctly.
 The wireless router has been configured to use the frequencies on channel 1.
5. A technician is configuring the channel on a wireless router to either
1, 6, or 11. What is the purpose of adjusting the channel?
 to disable broadcasting of the SSID
 to enable different 802.11 standards
 to provide stronger security modes
 to avoid interference from nearby wireless devices
6. Which combination of user account and network location profile
allows a user to become a member of a homegroup?
 an admin account with a network location profile of Work
 a guest account with a network location profile of Home
 an admin user account with a network location of Public
 a standard user account with a network location profile of Home
7. A business traveler connects to a wireless network with open
authentication. What should the traveler do to secure confidential
data when connecting to the business services?
 Connect with a VPN.
 Change the network location profile to public.
 Change the Windows firewall settings.
 Manually configure an IP address, subnet mask, and default gateway.
8. A technician has been asked to configure a broadband connection for
a teleworker. The technician has been instructed that all uploads and
downloads for the connection must use existing phone lines. Which
broadband technology should be used?
 cable
 DSL
 ISDN
 POTS
9. Which type of connection to the Internet is capable of the fastest
transfer rates?
 ISDN
 POTS
 satellite
 cable
 fiber
10. Which technology would be recommended for a business that
requires workers to access the Internet while visiting customers at
many different locations?
 ADSL
 cellular
 ISDN
 VPN
11. A small company is considering moving many of its data center
functions to the cloud. What are three advantages of this plan?
(Choose three.)
 The company only needs to pay for the amount of processing and storage capacity that it
uses.
 Cloud services are billed at a fixed fee no matter how much processing and storage are used
by the company.
 Cloud services enable the company to own and administer its own servers and storage
devices.
 The company can increase processing and storage capacity as needed and then decrease
capacity when it is no longer needed.
 Single-tenant data centers can easily grow to accommodate increasing data storage
requirements.
 As the amount of data that the company uses increases, it becomes impractical for the data to
be stored and processed in a single-tenant data center.
12. Which Cloud computing service would be best for an
organization that does not have the technical knowledge to host and
maintain applications at their local site?
 SaaS
 IaaS
 PaaS
 ITaaS
13. A network client in a corporate environment reboots. Which
type of server would most likely be used first?
 DNS
 DHCP
 e-mail
 FTP
 Telnet
 web
14. What is a common function of a proxy server?
 to store frequently accessed web pages on the internal network
 to control who is permitted to access the internal network
 to detect malicious signatures by monitoring traffic that is entering the internal network
 to provide access to a shared pool of configurable computing resources
15. ABC Company requires preventive maintenance for all local
network cabling once a year. Which task should be included in the
preventive maintenance program?
 Disconnect and reconnect all patch cables.
 Inspect all patch cables for breaks.
 Replace all labeling on the cables.
 Replace all cable supports to prevent loose attachment points.
16. What is a benefit of performing preventative maintenance at
regular intervals?
 reduction in network downtime
 reduction in connectivity
 reduction in security threats
 reduction in EMI and RFI
17. A user cannot access the network. While the technician is
checking the computer, the other users on the same network report
that they are having the same problem. Further investigation shows
that the LED lights on each NIC are not lit. What should the technician
do next?
 Check each computer to verify that they all have the same settings.
 Report the problem to the network administrator.
 Attempt to ping devices on other networks.
 Use nslookup to check network connectivity.
18. A user can print to a printer that is on the same network, but the
traffic of the user cannot reach the Internet. What is a possible cause
of the problem?
 The PC default gateway address is missing or incorrect.
 The PC has an incorrect IP address.
 The network cable connected to the user PC is faulty.
 The NIC on the PC is faulty.
19. A technician is investigating a report that a computer is unable
to access network resources. The technician discovers that the
computer has an IP address of 169.254.27.168. What is a logical first
step in diagnosing this problem?
 Attempt to ping the default gateway.
 Check the NIC LED lights.
 Test that DNS is operating correctly.
 Activate Network Discovery and File Sharing.
20. A Windows 7 computer is unable to reach a mapped drive on a
file server that is on another network within the organization. Further
investigation shows that the user is able to use a printer that is
connected to the same network as the computer. Which action
should the technician perform next?
 Verify that DNS name resolution is operating properly.
 Inspect the network patch cable for wear or breaks.
 Check Network Connection Details in the Windows GUI for the appropriate network
connection.
 Check the link LED on the NIC.
21. A user has taken a personal laptop to work. The laptop is
unable to discover the name of the office wireless network. What are
two potential causes of this problem? (Choose two.)
 The wireless router is not broadcasting the SSID.
 The laptop has not received an IP address from the wireless router.
 The wireless router is set to mixed mode.
 The network does not support the wireless protocol in use by the laptop.
 The laptop must be configured with the office workgroup name.
22. A network technician attempts to ping www.example.net from a
customer computer, but the ping fails. Access to mapped network
drives and a shared printer are working correctly. What are two
potential causes for this problem? (Choose two.)
 The Windows domain or workgroup name that is configured on the computer is incorrect.
 The target web server is down.
 The computer has been assigned a static IP address.
 DNS service is unavailable on the customer network.
 The HTTP protocol is not working properly on the target server.
23. A technician uses the nbtstat -A 192.168.0.3 command. What
does the technician expect to view in the command output?
 current connections and statistics
 network adapter configuration information
 a list of routers within the traffic path
 computer accounts and domain specific information
24. Fill in the blank.
What is the acronym for the protocol that is used when securely
communicating with a web server?
 HTTPS
25. Match the definition to the of cloud.
 Question

ITE – IT Essentials Chapter 8 Exam Answers v6.0 2018 2019 100% 01

 Answer
1. Which two statements are true of a laptop CPU when compared to a desktop CPU?
(Choose two.)

 Laptop CPUs operate at higher clock speeds.


 Laptop CPUs use smaller cooling devices.
 Laptop CPUs consume more power.
 Laptop CPUs are interchangeable with desktop CPUs.
 Laptop CPUs are designed to produce less heat.
2. Which laptop component makes use of throttling to reduce power consumption and heat?
 CPU
 motherboard
 optical drive
 hard drive
3. Why are SODIMMs well suited for laptops?

 They have a small form factor.


 They connect to external ports.
 They do not produce heat.
 They are interchangeable with desktops.
4. What is a characteristic of laptop motherboards?
 Laptop motherboards use the same form factors as desktop motherboards.
 Laptop motherboards are proprietary.
 Laptop motherboards use standard form factors.
 Laptop motherboard components are compatible with desktop motherboards.
5. Which laptop component converts DC power to AC power?

 fluorescent tube
 inverter
 power supply
 backlight
6. Where is a Wi-Fi antenna commonly located on a laptop?

 on an external USB adapter


 above the laptop screen
 next to the keyboard
 on the side of the laptop
7. Which two methods can be used to configure laptop ACPI power options? (Choose two.)
 BIOS settings
 Windows Power Options utility
 Windows UAC settings
 Windows AERO theme settings
 power dial
8. A user needs to connect a Bluetooth device to a laptop. Which type of cable is needed to
accomplish this?
 None. Bluetooth connections are wireless.
 VGA cable
 USB cable
 EIA/TIA 232 cable
 parallel cable
9. A technician has installed a wireless Ethernet card in a Windows 7 laptop. Where would
the technician configure a new wireless connection?
 Control Panel > Networking and Sharing Center > Set up a new connection or network
 Control Panel > Administrative Tools > Services
 Control Panel > Internet Options
 Control Panel > System > Device Manager
10. Which technology provides laptops the ability to function on a cellular network?
 mobile hotspot
 Bluetooth
 infrared
 802.11 Wi-Fi
11. A technician is trying to remove a SODIMM module from a laptop. What is the correct way
to do this?
 Press outward on the clips that hold the sides of the SODIMM.
 Pull outward by holding the center of the SODIMM module.
 Apply downward force on the SODIMM module.
 Desolder the SODIMM module.
12. When replacing or adding memory to a laptop, where can a technician find the maximum
amount of RAM each memory slot can support?
 BIOS
 System Properties window
 POST screen
 website of manufacturer
13. What should be done immediately after a CPU is latched in and screwed down to a laptop
motherboard?
 The heat sink should be attached to the CPU.
 The cooling fan should be fastened to the motherboard.
 The power cable should be attached from the cooling fan to the motherboard.
 The locked down CPU should be protected with thermal paste.
14. Which technology allows a mobile device to establish wireless communication with
another mobile device by touching them together?
 Bluetooth
 NFC
 IR
 Lightning connector
15. Which technology will allow a mobile device to share an Internet connection with other
devices via tethering?
 infrared
 Bluetooth
 near field communication
 Wi-Fi
16. What are two differences between an e-reader and a tablet device? (Choose two.)
 An e-reader only supports Wi-Fi connectivity but a tablet can support both Wi-Fi and cellular
connectivity.
 An e-reader commonly has longer battery life than a tablet device.
 A tablet device is usually lighter in weight than an e-reader.
 A tablet device screen may be harder to read in direct sunlight than an e-reader screen.
 A tablet uses an electronic paper technology that provides better performance than an e-
reader.
17. What type of device is commonly used to measure and collect daily activity data for
achieving personal goals?

 phablet
 smart camera
 fitness monitor
 Global Positioning System
18. A technician has been asked to decide which laptop components should be cleaned on a
monthly basis as part of a maintenance routine. What are two examples of components
that should be included? (Choose two.)

 exterior case
 keyboard
 CPU
 optical drive
 RAM
19. To clean laptops, which two products are recommended? (Choose two.)
 cotton swabs
 mild cleaning solution
 ammonia
 rubbing alcohol
 car wax
20. What two steps must be taken before performing a cleaning procedure on a laptop
computer? (Choose two.)
 Disconnect the laptop from the electrical outlet.
 Remove all installed batteries.
 Wipe the surface of the touch pad.
 Clean the screen with a cloth.
 Insert the cleaning disk into the optical drive.
 Backup the registry.
21. What is the first step in the process of troubleshooting a laptop?
 Identify the problem.
 Establish probable causes.
 Determine the exact cause.
 Verify full functionality.
22. What is the next step in the troubleshooting process after a solution has been
implemented on a laptop?
 Verify the solution.
 Document the solution.
 Ask the customer to explain the problem.
 Return the device to the customer.
23. While troubleshooting a mobile device, a technician determines that the battery is not
holding a charge. What is the next step in the troubleshooting process?
 Implement a solution.
 Document the findings.
 Determine the exact cause.
 Verify the solution and full system functionality.
24. A technician notices that a laptop display appears stretched and pixelated. What is a
probable cause of this?
 The display properties are incorrectly set.
 The power management features are incorrectly set.
 The power inverter is failing.
 The screen has been burned in.
 One of the RAM modules is failing.
25. A user with a company-issued smartphone notices that there is a gap at the end of the
device. A technician examines the smartphone and discovers that the battery is swollen.
What should the technician do next?

 Use the smartphone until the battery is completely discharged.


 Clean the battery leads with baking soda.
 Replace the battery.
 Use a multimeter to see if the output voltage is within range.

Вам также может понравиться