Вы находитесь на странице: 1из 8

Close Window

Assessment System

1. Assessment 2. Assessment 3. Take


Selection Settings Assessment

Take Assessment - Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version


4.1)

Time Remaining:

1 Top of Form
The Internet is an example of which type of network?
LAN

SAN

WAN

WLAN
Bottom of Form
2 Top of Form
Which suite of protocols is used to transmit data across the Internet?
Appletalk

ARP

DNS

IPX/SPX

TCP/IP
Bottom of Form

3 Top of Form
Workers are required to access the company LAN when traveling. Which networking technology can provide
secure and encrypted access to the LAN?
ADSL

ISDN

VPN

WAN
Bottom of Form

4 Top of Form
Which two statements are true of network computing in contrast to non-network computing? (Choose two.)
File duplication is more likely.

Fewer peripherals are needed.

Resource conservation is decreased.

Application licensing costs are higher.

Centralized administration capabilities are enhanced.


Bottom of Form

5 Top of Form
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choo
three.)
The network is small with less than eight users.
The company network requires secure access to confidential information.

The users need a central database to store inventory and sales information.

Each user understands how to safely share files across a network.

The data gathered by the employees is critical and should be backed up on a regular basis.

All employees passed a strict background check as part of the corporate hiring practices.
Bottom of Form

6 Top of Form
Which Windows XP command displays the route taken by packets crossing an IP network?
iproute

netview

nslookup

ping

tracert
Bottom of Form

7 Top of Form
Which networking protocol translates a network name such as www.cisco.com to a unique IP address?
APIPA

ARP

DHCP

DNS

Proxy ARP
Bottom of Form

8 Top of Form
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
3280 ft (1000 m)

1640 ft (500 m)
984 ft (300 m)

607 ft (185 m)

328 ft (100 m)
Bottom of Form

9 Top of Form
A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation
the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a
computer to get such an IP address?
a bad network cable

interference from surrounding devices

reduced computer power supply output

static IP addressing with incomplete information


Bottom of Form

10 Top of Form
Which dotted decimal number is used to distinguish the network portion of an IP address from the host portio
default gateway

MAC address

physical address

subnet mask
Bottom of Form

11 Top of Form
What is the most commonly used DSL technology?
ADSL

HDSL

IDSL

SDSL

VDSL
Bottom of Form

12 Top of Form
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school
network. What is the first thing that the student should check?
the laptop battery level

the IP address that is assigned to the laptop

the power level of the wireless antenna

the available wireless networks within range

the distance from the school-owned wireless device


Bottom of Form

13 Top of Form
Which procedure is normally performed when connecting a computer to an Ethernet network for the first tim
Manually assign an IP address.

Configure the NIC for a MAC address.

Attach a cable that has an RJ-45 connector.

Configure the NIC for a specific network protocol.


Bottom of Form

14 Top of Form
Which device enables computers to be attached to a network without segmenting the network?
bridge

hub

router

switch
Bottom of Form

15 Top of Form
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.

The number of wires inside the cable.

The type of shielding used inside the cable.

The type of connectors required to terminate the cable.


Bottom of Form

Top of Form

Showing 1 of 2 <Prev Page: Next>


Bottom of Form

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

Close Window

Assessment System

1. Assessment 2. Assessment 3. Take


Selection Settings Assessment

Take Assessment - Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version


4.1)
Time Remaining:

16 Top of Form
What is true about the TIA/EIA?
It develops and maintains the 802 standards for LANs.

It establishes consensus processes among qualified groups.

It defined the Open Systems Interconnection networking model.

It developed standards to replace proprietary standards after U.S. telephone industry deregulation.
Bottom of Form

17 Top of Form
A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. Th
technician then notes that the link lights are not active on the NIC. Which two problems could be indicated b
this lack of activity? (Choose two.)
faulty NIC

bad IP address

faulty patch cord

unavailable DHCP server

incorrect protocol configuration


Bottom of Form

18 Top of Form
Why should network cables always be labeled?
to prevent cable wear

to improve appearance

to reduce network clutter

to save troubleshooting time


Bottom of Form

19 Top of Form
Which method is recommended in order to avoid problems with counterfeit network equipment?
Buy extra parts in case one fails.

Only install equipment that comes with a user manual.

Purchase equipment only through manufacturer-authorized partners.

Use items of uncertain authenticity only in non-mission critical applications.


Bottom of Form

20 Top of Form
Which two characteristics describe Ethernet technology? (Choose two.)
supported by IEEE 802.3 standards

supported by IEEE 802.5 standards

typically uses an average of 16 Mb/s for data transfer rates

uses a bus logical topology

uses a ring topology


Bottom of Form

Top of Form

Showing 2 of 2 <Prev Page: Next>


Bottom of Form

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
Bottom of Form
Top of Form
Bottom of Form