clean-5

Wisata

Budaya

Kuliner

Kerajaan

kota

Suku

» » » » Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1
Refer to the exhibit. Which type of network cable is shown?
    #fiber-optic

2  
Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
    #encapsulation

3  
When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? (Choose three.)
    #The price is much less than expected.
    #The equipment appears to be performing at a substandard level.
    #The packaging appears to be substandard compared to the packaging of other Cisco purchases.

4  
Which protocol is used to automatically configure network devices?
    #DHCP
  
5   
Which protocol lacks support for encryption and can be initiated from a computer command prompt?
    #Telnet

6   
Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
    #cellular
   
7   
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
    #The number of twists in the wires inside the cable.
    #The number of wires inside the cable.
   
8   
Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
    #mesh
   
9   
Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
    #VPN client

10   
A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols?
    #The bank encrypts the web page information that is sent and received.
   
11
What is the purpose of the device that uses the 198.133.219.43 address?
    #It is the device that translates domain names to IP addresses.
   
12   
Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
    #Cisco Brand Protection Team
   
13   
Which digital technology provides an upstream speed that is typically less than the downstream speed?
    #ADSL
   
14   
Which utility can be used to determine end-to-end connectivity between source and destination?
    #Ping

15   
Which Windows XP command displays the route taken by packets crossing an IP network?
    #tracert

16   
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
    #Manually assign an IP address.
   
17   
A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
    #the available wireless networks within range
   
18   
Which device enables computers to be attached to a network without segmenting the network?
    #hub

19   
Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
    #star

20   
Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
    #Data Link
   
21   
Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
    #802.11g
   
22   
A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
    #carry the data stream
   
23   
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
    #328 ft (100 m)

24   
A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be?
    #The Windows firewall stops pings.
   
25   
What is one difference between a network domain and a workgroup?
    #A domain provides centralized control.
   
26   
Which three protocols are associated with e-mail? (Choose three.)
    #IMAP
    #POP3
    #SMTP

27   
A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
    #fiber optic

28   
Which two characteristics describe Ethernet technology? (Choose two.)
    #supported by IEEE 802.3 standards
    #uses a bus logical topology
   
29   
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
    #The company network requires secure access to confidential information.
    #The users need a central database to store inventory and sales information.
    #The data gathered by the employees is critical and should be backed up on a regular basis.
   
30   
Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
    #Computers listen to the network for clearance to send data.

About CATATAN ANAK RONGGOLAWE

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
«
Next
Newer Post
»
Previous
Older Post

10 comments:

  1. Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
    #Manually assign an IP address. not correct ...
    correct - Attach a cable that has an RJ-45 connector.

    ReplyDelete
  2. Thank you very very very very very very very much for these person who provides this helpful questions and answers. I failed the test for 2 times and I was mad. Hopefully, this questions will support me a lots because i had seen most of the questions in the test. Again thank you very very very very very very very much. If you could ,would you also download chapter 9 please.

    ReplyDelete
  3. Looks ok to me but I can see that some of the answers here are wrong, I suggest studying instead lol

    ReplyDelete
  4. Nice Post and It will be useful for every one

    WebIndia InfoTech

    ReplyDelete
  5. hi..Im student from Informatics engineering, this article is very informative, thanks for sharing :)

    ReplyDelete

Kerajaan