SlideShare a Scribd company logo
1 of 15
Download to read offline
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
[Updated Constantly]
IT Essentials (ITE v6.0 + v7.0) Chapter 6 Exam Answers 100%
Users in a recently installed wireless network are complaining of slow data transfer and
frequent loss of connectivity. The technician checks that the wireless security is correctly
implemented, and there is no evidence of unauthorized users on the network. Which two
problems might the technician suspect? (Choose two.)
 There is interference from outside sources.*
 The DHCP server is faulty.
 The wireless signal is too weak.*
 The antenna on the access point is too powerful.
 The network passwords need to be reissued to the users.
Explanation: Normally, the closer a wireless NIC is to an access point, the faster the
connectivity. This problem does not require the network password to be reissued. The
combination of the low bandwidth and the intermittent connectivity is pointing towards a weak
signal or interference from outside sources.
2. A wired network is undergoing several changes that could leave it vulnerable to connection
by unauthorized devices while the work is in progress. Which two temporary measures would
enable the authorized devices to continue to have network access but prevent unauthorized
devices from connecting? (Choose two.)
 Disable DNS.
 Disable SSID broadcast.
 Disable DHCP.*
 Subnet the network.
 Assign static IP addresses to the authorized devices.*
Explanation: Disabling DHCP and assigning static IP addresses only to authorized devices will
prevent unauthorized devices from automatically obtaining IP address information. Without
the correct IP address information, the unauthorized devices will not be able to communicate
over the network. Disabling DNS will result in all connected devices no longer automatically
being able to communicate with network resources by name (IP addresses would have to be
used.), but will not prevent unauthorized devices from connecting and enabling potentially
malicious access from occurring. Subnetting the network will change the range of IP
addresses used but not prevent unauthorized network access. Disabling SSID broadcasts is
only applicable to wireless networks, not wired networks.
HERE
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
3. What two default wireless router settings can affect network security? (Choose two.)
 The SSID is broadcast.*
 MAC address filtering is enabled.
 WEP encryption is enabled.
 The wireless channel is automatically selected.
 A well-known administrator password is set.*
Explanation: Default settings on wireless routers often include broadcasting the SSID and
using a well-known administrative password. Both of these pose a security risk to wireless
networks. WEP encryption and MAC address filtering are not set by default. The automatic
selection of the wireless channel poses no security risks.
4. A network technician is checking a computer to see if the DHCP client is working correctly.
The technician issues the ipconfig /all command. Which two parameters should the technician
review? (Choose two.)
 description
 default gateway*
 host name
 media state
 subnet mask *
Explanation: A DHCP server can provide several parameters such as IP address, subnet mask,
default gateway, and other optional parameters. The host name, media state, and description
are present even if a DHCP server is not found.
5. A technician is troubleshooting a problem where the user claims access to the Internet is
not working, but there was access to the Internet the day before. Upon investigation, the
technician determines that the user cannot access the network printer in the office either. The
network printer is on the same network as the computer. The computer has 169.254.100.88
assigned as an IP address. What is the most likely problem?
 The computer cannot communicate with a DHCP server.*
 The IP default gateway on the computer is incorrect.
 The network interface card driver needs to be updated.
 The router that connects this network to other networks is down.
Explanation: In a network employing dynamic IP addressing, if a computer cannot
communicate with the DHCP server to obtain an IP address, the Windows operating system
automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
In this case, the computer can only communicate with computers connected to the same
network within this IP address range.
6. A user can print to a printer that is on the same network, but the traffic of the user cannot
reach the Internet. What is a possible cause of the problem?
 The PC default gateway address is missing or incorrect.*
 The PC has an incorrect IP address.
 The network cable connected to the user PC is faulty.
 The NIC on the PC is faulty.
Explanation: The default gateway IP address is used to reach other networks, including the
Internet.
7. Port triggering has been configured on a wireless router. Port 25 has been defined as the
trigger port and port 113 as an open port. What effect does this have on network traffic?
 Any traffic that comes into port 25 allows outgoing port 113 to be used.
 All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
 Any traffic that is using port 25 going out of the internal network will also be allowed to
transmit out port 113.
 All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal
network through port 113.*
Explanation: Port triggering is used to allow inbound traffic through the firewall based on
outbound traffic. The trigger occurs when an application makes use of a specific port on the
internal network. An external port on the firewall is then opened. This allows for temporary
passage of traffic through inbound ports to a specific device.
8. A PC is not able to connect to a wired network. Pinging the loopback address is successful,
but the gateway cannot be reached. On the network switch all the interface lights are on,
except for the interface connected to the PC. The LED on the network card is off. What is the
most likely cause of this problem?
 The gateway needs to be fixed.
 The network cable is faulty.*
 The network switch is faulty.
 The PC has an incorrect IP address for the DNS server.
Explanation: The network card is working if the loopback address can be pinged. The LED on
the network card being off points towards a faulty cable or a bad connection.
9. The current IP configuration of a small company is done manually and is time-consuming.
Because of increased network growth, a technician needs a simpler way for IP configuration of
workstations. Which service would simplify the workstation IP configuration task?
 APIPA
 DHCP*
 DIPS
 ICMP
Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process.
A DHCP server automatically assigns host IP addresses.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
10. A technician troubleshooting a network problem has used CLI commands to determine that
a computer has not been allocated a correct IP address from the DHCP server. Which
command can the technician use to solve this problem?
 ping
 ipconfig/release
 tracert
 ipconfig/renew*
Explanation: The command ipconfig/renew will cause the computer to request a new IP
address from the DHCP server. The command ipconfig/release will remove the current IP
address but will not request a new address. The commands ping and tracert are used to test
network connectivity.
11. Which network protocol is used to automatically assign an IP address to a computer on a
network?
 FTP
 DHCP*
 ICMP
 SMTP
 APIPA
Explanation: A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP
addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends
email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic
Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain
addresses even when a DHCP server is not present.
12. What security technique could provide secure access to a server located in a small office
without the expense of implementing a DMZ or purchasing a hardware firewall?
 implement hash encoding for all wireless devices
 implement MAC address filtering
 implement port forwarding*
 implement basic security on all wireless access points
Explanation: Port forwarding provides a rule-based method to direct traffic between devices on
separate networks. This method provides access to devices across the Internet in a less
expensive way than using a DMZ.
13. A group of users is unable to connect to the network. When testing several of the PCs and
issuing the command ipconfig, the technician notices that all of them have an IP address in
the 169.254.x.x range. What is the most likely cause of this problem?
 The Internet connection is down.
 The DHCP server is not operational.*
 The gateway address is incorrect.
 The DNS server is not operational.
Explanation: If the PCs are not able to connect to a DHCP, they will be allocated an IP address
within the range 169.254.0.0 – 169.254.255.255.
14. What is the correct compressed format of the IPv6 address
2001:0db8:eeff:000a:0000:0000:0000:0001?
 2001:db8:eeff:a::1*
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 2001:db8:eeff:a:1
 2001:db8:eeff:a::0001
 2001:db8:eeff:a:::1
Explanation: There are two rules for IPv6 address compression. Rule 1: leading zeros in any
hextet can be removed. Rule 2: contiguous hextets of all zeros can be compressed to a double
colon. Rule two can only be applied once.
15. What is the proper CIDR prefix notation for a subnet mask of 255.0.0.0?
 /8*
 /16
 /24
 /32
Explanation: The proper CIDR notation for a subnet mask of 255.0.0.0 is /8. This is because
the /8 indicates that the first eight bits of the subnet mask are set to binary 1.
16. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is
the purpose of adjusting the channel?
 to disable broadcasting of the SSID
 to enable different 802.11 standards
 to provide stronger security modes
 to avoid interference from nearby wireless devices*
Explanation: Channels 1, 6, and 11 are selected because they are 5 channels apart. thus
minimizing the interference with adjacent channels. A channel frequency can interfere with
channels on either side of the main frequency. All wireless devices need to be used on
nonadjacent channels.
17. Which network server is malfunctioning if a user can ping the IP address of a web server
but cannot ping the web server host name?
 the DNS server*
 the DHCP server
 the FTP server
 the HTTP server
Explanation: If pings are successful to an IP address but not to a host name, then the problem
may be that a DNS server cannot be accessed.
18. Multiple users report that the workstations are assigned a 169.254.x.x IP address. The
users are able to communicate only between each other. What is a possible solution?
 Restart the DNS server.
 Statically configure a default gateway on each workstation.
 Verify the network cable on all user machines.
 Restart the DHCP server.*
Explanation: When a network device automatically obtains the IP address 169.254.x.x, it is
unable to receive an IP address from a DHCP server. The DHCP server should be restarted to
ensure that it is operational.
19. An administrator deploys wireless access points across the office to provide wireless
network connectivity to users. Each workstation receives an IP address via DHCP. After a file
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
server with a static IP is connected to the wired network, the administrator receives an IP
address conflict message. What is a possible solution?
 Restart the DHCP server.
 Change the IP address of the file server with the ipconfig /release and ipconfig /renew
commands.
 Change the static IP configured on the file server.*
 Connect the file server to the wireless network.
Explanation: If an IP address conflict message is displayed, then a single IP address is being
used more than once on the same network. To solve this issue, the administrator needs to give
a different static IP address to the server on the network.
20. A workstation has been moved from the first floor to the fifth floor within an organization.
The user is now reporting that the workstation cannot connect to the network. A technician
suspects that the workstation could not obtain an IP address from a DHCP server. What is a
possible cause of the problem?
 An IP address conflict occurred.
 The DHCP server is misconfigured.
 The workstation has been configured with a static IP address.*
 The default gateway address is misconfigured on the workstation.
Explanation: In most cases in an organization, when a computer is moved from one
department to another, it needs a new IP address to connect to the network. When a computer
is configured with a static IP address, it will not initiate the process of obtaining a new IP
address from DHCP servers.
21. A device has been assigned the IPv6 address of
2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?
 2001:0db8:cafe:4500:1000:00d8:0058:00ab
 2001:0db8:cafe:4500
 1000:00d8:0058:00ab*
 00ab
Explanation: The address has a prefix length of /64. Thus the first 64 bits represent the
network portion, whereas the last 64 bits represent the host portion of the IPv6 address.
22. Which IPv6 address represents the most compressed form of the IPv6 address
2001:0db8:cafe:0000:0835:0000:0000:0aa0/80?
 2001:0db8:cafe:0000:0835::0aa0/80
 2001:db8:cafe:0000:0835::aa0/80
 2001:0db8:cafe:0000:0835::0aa/80
 2001:db8:cafe::0835::aa0/80
 2001:db8:cafe:0:835::aa0/80*
Explanation: There are two rules that exist to help in the reduction of the number of digits
within an IPv6 address: Rule 1 is used to remove any leading 0s. After applying rule 1 to
2001:0db8:cafe:0000:0835:0000:0000:0aa0/80, we calculate the outcome as
2001:db8:cafe:0:835:0:0:aa0/80. Rule 2 is used to replace any group of consecutive zeros once
throughout the IPv6 address. After applying rule 2 to 2001:db8:cafe:0:835:0:0:aa0/80, we
calculate the outcome as 2001:db8:cafe:0:835::aa0/80.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
23. After having talked to the customer, a network technician suspects that an invalid IP
address is the most likely cause of a network issue. Which step of the troubleshooting process
does this represent?
 Identify the problem.
 Test the theory to determine the cause.
 Establish a theory of probable cause.*
 Establish a plan of action to resolve the problem and implement the solution.
Explanation: Before a solution can be proposed or tested, the technician has to first talk to the
customer to identify the problem, and establish a theory of probable cause.
24. Which filtering method uses the physical address to specify exactly which device is
allowed or blocked from sending data on a network?
 MAC address filtering*
 port forwarding
 port triggering
 whitelisting
Explanation: MAC address filtering specifies exactly which device MAC addresses are allowed
to or blocked from sending data on your network.
25. How many bits are used to represent an IPv6 address?
 128*
 48
 32
 12
26. How many bits are used to represent the host address of a computer with the IP address of
192.168.1.25 and a subnet mask of 255.255.255.0?
 8*
 48
 32
 12
27. How many bits are used to represent the host address of a computer with the IP address of
192.168.1.25 and a subnet mask of 255.255.255.0?
 8*
 48
 32
 4
28. How many bits are used to represent the host address of a computer with the IP address of
192.168.1.25 and a subnet mask of 255.255.255.0?
 8*
 128
 32
 4
29. How many bits are used to represent the network address of a host with an IP address of
192.168.150.16 and a subnet mask of 255.255.0.0?
 16*
 128
 32
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 4
30. How many bits are used to represent the network address of a host with an IP address of
192.168.150.16 and a subnet mask of 255.255.0.0?
 16*
 128
 32
 42
31. How many bits are used to represent the OUI part of the MAC address of a NIC card?
 24*
 8
 128
 42
32. How many bits are used to represent the OUI part of the MAC address of a NIC card?
 24*
 8
 128
 64
33. How many bits are used to represent a MAC address?
 48*
 8
 128
 64
34. How many bits are used to represent a MAC address?
 48*
 128
 8
 132
IT Essentials v6.0:
1. What would be a reason for a computer user to use the Task Manager Performance tab?
 to increase the performance of the CPU
 to view the processes that are running and end a process if needed
 to view the services that are currently running on the PC
 to check the CPU usage of the PC *
2. Which feature in Windows 7 and 8 allows a user to temporarily view the desktop that is
behind open windows by moving the mouse over the right edge of the taskbar?
 Peek*
 Snap
 Shake
 Search
 jump lists
 thumbnail previews
3. What is the minimum amount of RAM and hard drive space required to install 64-bit
Windows 8 on a PC?
 1 GB RAM and 10 GB hard disk space
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 1 GB RAM and 16 GB hard disk space
 2 GB RAM and 16 GB hard disk space
 2 GB RAM and 20 GB hard disk space*
 4 GB RAM and 16 GB hard disk space
 4 GB RAM and 20 GB hard disk space
4. After upgrading a computer to Windows 7, a user notices that the UAC (User Account
Control) panel appears more frequently. How can the user reduce the frequency with which the
UAC appears?
 Reinstall all user programs in Compatibility Mode.
 Replace the graphics card with one that meets the minimum hardware requirements for
Windows 7.
 Lower the UAC setting in the Change User Account Control settings dialog box of the User
Accounts control panel.*
 In the Performance Options dialog box of the Performance Information and Tools control
panel, choose Adjust for Best Performance.
5. Which Windows utility allows Windows 7 and 8 users to quickly and easily share files and
folders?
 HomeGroup*
 Action Center
 Services
 Device Manager
6. Which Windows administrative tool displays the usage of a number of computer resources
simultaneously and can help a technician decide if an upgrade is needed?
 Services
 Event Viewer
 Component Services
 Performance Monitor *
7. Which type of startup must be selected for a service that should run each time the computer
is booted?
 automatic*
 boot
 manual
 start
 startup
8. Which Windows tool allows an administrator to organize computer management tools in
one location for convenient use?
 Task Scheduler
 Services console
 Performance Monitor console
 Microsoft Management console *
9. To which category of hypervisor does the Microsoft Virtual PC belong?
 Type 1
 Type 2*
 Type 3
 Type 4
10. What are two advantages of using PC virtualization? (Choose two.)
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 It protects the host machine from viruses attacks.
 It allows multiple operating systems to run on a single PC simultaneously.*
 It boosts the performance of the host machine through virtualization.
 It can provide cost savings.*
 It allows network threat identification.
11. A college uses virtualization technology to deploy information security courses. Some of
the lab exercises involve studying the characteristics of computer viruses and worms. What is
an advantage of conducting the lab exercises inside the virtualized environment as opposed to
using actual PCs?
 The lab exercises are performed faster inside of the virtualized environment.
 The virtualization environment has better tools to develop mitigation solutions.
 Virus and worm attacks are more easily controlled in a virtualized environment, thus helping
to protect the college network and its devices from attack.*
 The viruses and worms will have limited functionality inside the virtualized environment.
12. A software engineer is involved in the development of an application. For usability tests,
the engineer needs to make sure that the application will work in both Windows 7 and
Windows 8 environments. The features and functions must be verified in the actual OS
environment. The engineer is using a Windows 7 workstation. What two technologies can help
the engineer achieve the usability tests? (Choose two.)
 dual boot*
 two separate CPUs
 storage redundancy
 client-side virtualization*
 two separate hard disks
13. A technician needs to use an application that is not supported by Windows operating
systems on the PC. How can the technician make this application run on the PC?
 Use the Windows Compatibility mode.
 Install the application with elevated permissions as administrator.
 Create a virtual machine with an operating system that supports the application.*
 Install the application in safe mode.
14. What preventive maintenance action should be taken to help improve system security?
 Automate any antivirus scanners.*
 Defragment the hard drive.
 Perform backups regularly.
 Error check the hard drive.
15. Which Windows 7 feature would an administrator use to configure a computer to delete
temporary files from the hard drive at 3:00 AM each day?
 Disk Cleanup
 Task Scheduler*
 Device Manager
 Computer Management
16. Which command is used from the Windows command prompt to schedule a program to run
at a specific time?
 AT*
 CMD
 TASKLIST
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 TASKKILL
17. When troubleshooting a printer problem, a technician finds that the operating system was
automatically updated with a corrupt device driver. Which solution would resolve this issue?
 Roll back the driver.*
 Restart both the computer and the printer.
 Scan the downloaded driver file with a virus scanner.
 Upload the correct driver to the printer.
18. Which two Windows utilities can be used to help maintain hard disks on computers that
have had long periods of normal use? (Choose two.)
 Disk Cleanup*
 Disk Maintenance
 Disk Defragmenter*
 Disk Partition
 Disk Format
19. What is a common step that a technician can take to determine the cause of an operating
system problem?
 Boot into Safe Mode to determine if the problem is driver related.*
 Test the power supply.
 Document the time spent to resolve the problem.
 Check the fan connections and ensure the fan is working properly.
20. Which question is an open ended question that could be used when helping a customer
troubleshoot a Windows problem?
 Can you boot the operating system?
 Have you changed your password recently?
 Do you get a login prompt when the computer boots?
 What programs have you installed recently? *
21. A user reports that logging into the workstation fails after a display driver has been
updated. The user insists that the password is typed in correctly. What is the most likely cause
of the problem?
 The password has changed.
 The Caps Lock key is set to on.*
 A display driver update failed.
 The display setting has changed after a driver update.
22. A user reports that a video editing program does not work properly after a sound mixing
program is installed. The technician suspects that a compatibility issue might be the cause of
the problem. What should the technician do to verify this theory?”
 Update Windows OS.
 Update the video editing software.
 Uninstall the sound mixing software.*
 Check if an update of the sound mixing software is available.
23. A user reports to a technician that his computer freezes without any error messages. What
are two probable causes? (Choose two.)
 An update has corrupted the operating system.*
 A process is not using enough system resources.
 The power supply is failing.*
 The MBR is corrupted.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 The boot order is not set correctly in BIOS.
24. A technician is trying to fix a Windows 7 computer that displays an “Invalid Boot Disk”
error after POST. What is a possible cause of the error?
 The boot.ini file is corrupt.
 The ntldr.exe file is corrupt.
 The ntdetect.com file is corrupt.
 The boot order is not set correctly in the BIOS.*
Older Version:
25. Which network device makes forwarding decisions based on the destination MAC address
that is contained in the frame?
 repeater
 hub
 switch*
 router
26. A customer is considering a multipurpose device to create a home network. Which three
devices are usually integrated into a multipurpose network device? (Choose three.)
 email server
 router*
 switch*
 web server
 wireless access point*
 print server
27. Which technology would be recommended for a business that requires workers to access
the Internet while visiting customers at many different locations?
 ADSL
 VPN
 cellular*
 ISDN
28. When is a dial-up connection used to connect to an Internet provider?
 when a high-speed connection is provided over a cable TV network
 when a digital connection is provided using ISDN
 when a regular telephone line is used*
 when a cellular telephone provides the service
29. Which type of connection to the Internet is capable of the fastest transfer rates?
 ISDN BRI
 dial-up
 ISDN PRI
 cable*
30. Which statement describes the logical topology for a LAN?
 It describes how computers access the LAN medium.*
 It depicts the locations of main routers and switches in a LAN.
 It lists the number of computers, routers, and switches on the LAN.
 It defines how computers connect to a LAN.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
31. ABC Company requires preventive maintenance for all local network cabling once a year.
Which task should be included in the preventive maintenance program?
 Replace all labeling on the cables.
 Replace all cable supports to prevent loose attachment points.
 Disconnect and reconnect all patch cables.
 Inspect all patch cables for breaks.*
32. What is an example of network maintenance?
 immediately turning off a network device if the network device is making an unusual sound
 educating users on IT policies and procedures*
 using cable supports to identify the devices to which the cables are connected
 not doing preventive maintenance regularly if the maintenance interrupts network activity
33. Which technology is most often used to connect devices to a PAN?
 Bluetooth*
 IEEE 802.11n wireless
 fiber optic cabling
 coaxial cabling
34. Which three layers of the OSI model map to the application layer of the TCP/IP model?
(Choose three.)
 data link
 application*
 network
 transport
 physical
 session*
 presentation*
35. A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What
is the interface ID of the device?
 ba01
 0607:1234:aa10:ba01*
 2001:0DB8:75a3
 2001:0DB8
36. What is a characteristic of the UDP protocol?
 low overhead*
 error correction
 guaranteed delivery
 end-to-end establishment before delivery
37. What would be a disadvantage of configuring a wireless router or access point to operate
only in accordance with the 802.11g protocol standard?
 802.11a wireless devices will not be able to connect to the wireless network.*
 The 802.11g standard does not support static IP addressing.
 The 802.11g standard does not support advanced network security features.
 Using only 802.11g will cause multiple SSIDs to be broadcast.
38. What is the maximum segment length that is specified by the 1000BASE-T standard?
 1640 ft (500 m)
 984 ft (300 m)
 328 ft (100 m)*
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
 3280 ft (1000 m)
 607 ft (185 m)
39. Which two characteristics describe Ethernet technology? (Choose two.)
 It is supported by IEEE 802.3 standards.*
 It is supported by IEEE 802.5 standards.
 It typically uses an average of 16 Mb/s for data transfer rates.
 It uses a ring topology.
 It uses the CSMA/CD access control method.*
40. Which three factors are reasons for a company to choose a client/server model for a
network instead of peer-to-peer? (Choose three.)
 The company network requires secure access to confidential information.*
 Each user understands how to safely share files across a network.
 All employees passed a strict background check as part of the corporate hiring practices.
 The data gathered by the employees is critical and should be backed up on a regular basis.*
 The network is small with fewer than eight users.
 The users need a central database to store inventory and sales information.*
41. What benefit is provided by a computer data network?
 increased security
 decentralized administration
 resource sharing*
 simplified troubleshooting
42. When would a printer be considered a network host?
 when it is connected to a workstation
 when it is connected to a laptop
 when it is connected to a switch*
 when it is connected to a PC
43. What is identified by the 100 in the 100BASE-TX standard?
 the maximum cable distance in meters
 the series number of the standard
 the maximum number of network nodes
 the maximum bandwidth in Mb/s*
44. A user installs a new gigabit NIC in a PC. The user notices that the data transfer rate is
much slower than expected. What should the user do to fix the problem?
 Change the NIC duplex setting from half duplex to full duplex.*
 Disable sleep mode.
 Disable hibernation mode.
 Change the value assigned to the NIC wake-on-LAN setting.
45. A company adds a few refurbished computers to a network. The company finds, however,
that the refurbished computers perform significantly worse than the original networked
computers do. The original computers performed much faster with applications that required
the transfer of data over the network. What should the company technicians do?
 Check if the refurbished computers are using a VPN.
 Check if the network interface cards in the refurbished computers are limited to 10 Mb/s.*
 Check if subnet mask is correct.
 Check if the gateway address is correct.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html
46. A user notices that the data transfer rate for the gigabit NIC in the user computer is much
slower than expected. What is a possible cause for the problem?
 The NIC is configured to use both IPv4 and IPv6 at the same time.
 The NIC duplex settings have somehow been set to half-duplex.*
 The NIC wake-on-LAN setting is misconfigured.
 Hibernation mode is causing the NIC to shutdown unexpectedly.

More Related Content

What's hot

IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersIT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersITExamAnswers.net
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersITExamAnswers.net
 
IT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 1 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 1 Exam AnswersITExamAnswers.net
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
install active directory and configure domain controller
install active directory and configure domain controllerinstall active directory and configure domain controller
install active directory and configure domain controllerAlRomaniRashad
 
Popular network devices
Popular network devicesPopular network devices
Popular network devicesMahesh_Naidu
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)welcometofacebook
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfBT Digital
 
Sobanski odl summit_2015
Sobanski odl summit_2015Sobanski odl summit_2015
Sobanski odl summit_2015John Sobanski
 
Mail server on cisco packet tracer
Mail server on cisco packet tracerMail server on cisco packet tracer
Mail server on cisco packet tracerJalalMiah5
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 

What's hot (20)

IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersIT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
 
IT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 1 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
install active directory and configure domain controller
install active directory and configure domain controllerinstall active directory and configure domain controller
install active directory and configure domain controller
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)
 
Nat pat
Nat patNat pat
Nat pat
 
Configure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdfConfigure Mikrotik Khmer.pdf
Configure Mikrotik Khmer.pdf
 
Sobanski odl summit_2015
Sobanski odl summit_2015Sobanski odl summit_2015
Sobanski odl summit_2015
 
Chapter10
Chapter10Chapter10
Chapter10
 
Mail server on cisco packet tracer
Mail server on cisco packet tracerMail server on cisco packet tracer
Mail server on cisco packet tracer
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
1. computer networks u1 ver 1.0
1. computer networks u1 ver 1.01. computer networks u1 ver 1.0
1. computer networks u1 ver 1.0
 
What is Ping
What is PingWhat is Ping
What is Ping
 
Xampp Workshop
Xampp WorkshopXampp Workshop
Xampp Workshop
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Adafruit_IoT_Platform
Adafruit_IoT_PlatformAdafruit_IoT_Platform
Adafruit_IoT_Platform
 

Similar to IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers

Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.igede tirtanata
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersĐồng Quốc Vương
 
Link i pv4
Link i pv4Link i pv4
Link i pv4NARESH A
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utilitytumetr1
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.ArcyJeromeGallardo2
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCCNA4Answers
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersĐồng Quốc Vương
 

Similar to IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers (20)

Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.
 
Ccna 1 9
Ccna 1  9Ccna 1  9
Ccna 1 9
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
ccna 4 final 2012
ccna 4 final 2012ccna 4 final 2012
ccna 4 final 2012
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
12 ict.pptx
12 ict.pptx12 ict.pptx
12 ict.pptx
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Computer Network
Computer Network Computer Network
Computer Network
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 Answers
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 

Recently uploaded

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers

  • 1. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html [Updated Constantly] IT Essentials (ITE v6.0 + v7.0) Chapter 6 Exam Answers 100% Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)  There is interference from outside sources.*  The DHCP server is faulty.  The wireless signal is too weak.*  The antenna on the access point is too powerful.  The network passwords need to be reissued to the users. Explanation: Normally, the closer a wireless NIC is to an access point, the faster the connectivity. This problem does not require the network password to be reissued. The combination of the low bandwidth and the intermittent connectivity is pointing towards a weak signal or interference from outside sources. 2. A wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)  Disable DNS.  Disable SSID broadcast.  Disable DHCP.*  Subnet the network.  Assign static IP addresses to the authorized devices.* Explanation: Disabling DHCP and assigning static IP addresses only to authorized devices will prevent unauthorized devices from automatically obtaining IP address information. Without the correct IP address information, the unauthorized devices will not be able to communicate over the network. Disabling DNS will result in all connected devices no longer automatically being able to communicate with network resources by name (IP addresses would have to be used.), but will not prevent unauthorized devices from connecting and enabling potentially malicious access from occurring. Subnetting the network will change the range of IP addresses used but not prevent unauthorized network access. Disabling SSID broadcasts is only applicable to wireless networks, not wired networks. HERE
  • 2. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html 3. What two default wireless router settings can affect network security? (Choose two.)  The SSID is broadcast.*  MAC address filtering is enabled.  WEP encryption is enabled.  The wireless channel is automatically selected.  A well-known administrator password is set.* Explanation: Default settings on wireless routers often include broadcasting the SSID and using a well-known administrative password. Both of these pose a security risk to wireless networks. WEP encryption and MAC address filtering are not set by default. The automatic selection of the wireless channel poses no security risks. 4. A network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (Choose two.)  description  default gateway*  host name  media state  subnet mask * Explanation: A DHCP server can provide several parameters such as IP address, subnet mask, default gateway, and other optional parameters. The host name, media state, and description are present even if a DHCP server is not found. 5. A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?  The computer cannot communicate with a DHCP server.*  The IP default gateway on the computer is incorrect.  The network interface card driver needs to be updated.  The router that connects this network to other networks is down. Explanation: In a network employing dynamic IP addressing, if a computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255.
  • 3. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html In this case, the computer can only communicate with computers connected to the same network within this IP address range. 6. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?  The PC default gateway address is missing or incorrect.*  The PC has an incorrect IP address.  The network cable connected to the user PC is faulty.  The NIC on the PC is faulty. Explanation: The default gateway IP address is used to reach other networks, including the Internet. 7. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?  Any traffic that comes into port 25 allows outgoing port 113 to be used.  All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.  Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.  All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.* Explanation: Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device. 8. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?  The gateway needs to be fixed.  The network cable is faulty.*  The network switch is faulty.  The PC has an incorrect IP address for the DNS server. Explanation: The network card is working if the loopback address can be pinged. The LED on the network card being off points towards a faulty cable or a bad connection. 9. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?  APIPA  DHCP*  DIPS  ICMP Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.
  • 4. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html 10. A technician troubleshooting a network problem has used CLI commands to determine that a computer has not been allocated a correct IP address from the DHCP server. Which command can the technician use to solve this problem?  ping  ipconfig/release  tracert  ipconfig/renew* Explanation: The command ipconfig/renew will cause the computer to request a new IP address from the DHCP server. The command ipconfig/release will remove the current IP address but will not request a new address. The commands ping and tracert are used to test network connectivity. 11. Which network protocol is used to automatically assign an IP address to a computer on a network?  FTP  DHCP*  ICMP  SMTP  APIPA Explanation: A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain addresses even when a DHCP server is not present. 12. What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?  implement hash encoding for all wireless devices  implement MAC address filtering  implement port forwarding*  implement basic security on all wireless access points Explanation: Port forwarding provides a rule-based method to direct traffic between devices on separate networks. This method provides access to devices across the Internet in a less expensive way than using a DMZ. 13. A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?  The Internet connection is down.  The DHCP server is not operational.*  The gateway address is incorrect.  The DNS server is not operational. Explanation: If the PCs are not able to connect to a DHCP, they will be allocated an IP address within the range 169.254.0.0 – 169.254.255.255. 14. What is the correct compressed format of the IPv6 address 2001:0db8:eeff:000a:0000:0000:0000:0001?  2001:db8:eeff:a::1*
  • 5. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  2001:db8:eeff:a:1  2001:db8:eeff:a::0001  2001:db8:eeff:a:::1 Explanation: There are two rules for IPv6 address compression. Rule 1: leading zeros in any hextet can be removed. Rule 2: contiguous hextets of all zeros can be compressed to a double colon. Rule two can only be applied once. 15. What is the proper CIDR prefix notation for a subnet mask of 255.0.0.0?  /8*  /16  /24  /32 Explanation: The proper CIDR notation for a subnet mask of 255.0.0.0 is /8. This is because the /8 indicates that the first eight bits of the subnet mask are set to binary 1. 16. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?  to disable broadcasting of the SSID  to enable different 802.11 standards  to provide stronger security modes  to avoid interference from nearby wireless devices* Explanation: Channels 1, 6, and 11 are selected because they are 5 channels apart. thus minimizing the interference with adjacent channels. A channel frequency can interfere with channels on either side of the main frequency. All wireless devices need to be used on nonadjacent channels. 17. Which network server is malfunctioning if a user can ping the IP address of a web server but cannot ping the web server host name?  the DNS server*  the DHCP server  the FTP server  the HTTP server Explanation: If pings are successful to an IP address but not to a host name, then the problem may be that a DNS server cannot be accessed. 18. Multiple users report that the workstations are assigned a 169.254.x.x IP address. The users are able to communicate only between each other. What is a possible solution?  Restart the DNS server.  Statically configure a default gateway on each workstation.  Verify the network cable on all user machines.  Restart the DHCP server.* Explanation: When a network device automatically obtains the IP address 169.254.x.x, it is unable to receive an IP address from a DHCP server. The DHCP server should be restarted to ensure that it is operational. 19. An administrator deploys wireless access points across the office to provide wireless network connectivity to users. Each workstation receives an IP address via DHCP. After a file
  • 6. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html server with a static IP is connected to the wired network, the administrator receives an IP address conflict message. What is a possible solution?  Restart the DHCP server.  Change the IP address of the file server with the ipconfig /release and ipconfig /renew commands.  Change the static IP configured on the file server.*  Connect the file server to the wireless network. Explanation: If an IP address conflict message is displayed, then a single IP address is being used more than once on the same network. To solve this issue, the administrator needs to give a different static IP address to the server on the network. 20. A workstation has been moved from the first floor to the fifth floor within an organization. The user is now reporting that the workstation cannot connect to the network. A technician suspects that the workstation could not obtain an IP address from a DHCP server. What is a possible cause of the problem?  An IP address conflict occurred.  The DHCP server is misconfigured.  The workstation has been configured with a static IP address.*  The default gateway address is misconfigured on the workstation. Explanation: In most cases in an organization, when a computer is moved from one department to another, it needs a new IP address to connect to the network. When a computer is configured with a static IP address, it will not initiate the process of obtaining a new IP address from DHCP servers. 21. A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?  2001:0db8:cafe:4500:1000:00d8:0058:00ab  2001:0db8:cafe:4500  1000:00d8:0058:00ab*  00ab Explanation: The address has a prefix length of /64. Thus the first 64 bits represent the network portion, whereas the last 64 bits represent the host portion of the IPv6 address. 22. Which IPv6 address represents the most compressed form of the IPv6 address 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80?  2001:0db8:cafe:0000:0835::0aa0/80  2001:db8:cafe:0000:0835::aa0/80  2001:0db8:cafe:0000:0835::0aa/80  2001:db8:cafe::0835::aa0/80  2001:db8:cafe:0:835::aa0/80* Explanation: There are two rules that exist to help in the reduction of the number of digits within an IPv6 address: Rule 1 is used to remove any leading 0s. After applying rule 1 to 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80, we calculate the outcome as 2001:db8:cafe:0:835:0:0:aa0/80. Rule 2 is used to replace any group of consecutive zeros once throughout the IPv6 address. After applying rule 2 to 2001:db8:cafe:0:835:0:0:aa0/80, we calculate the outcome as 2001:db8:cafe:0:835::aa0/80.
  • 7. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html 23. After having talked to the customer, a network technician suspects that an invalid IP address is the most likely cause of a network issue. Which step of the troubleshooting process does this represent?  Identify the problem.  Test the theory to determine the cause.  Establish a theory of probable cause.*  Establish a plan of action to resolve the problem and implement the solution. Explanation: Before a solution can be proposed or tested, the technician has to first talk to the customer to identify the problem, and establish a theory of probable cause. 24. Which filtering method uses the physical address to specify exactly which device is allowed or blocked from sending data on a network?  MAC address filtering*  port forwarding  port triggering  whitelisting Explanation: MAC address filtering specifies exactly which device MAC addresses are allowed to or blocked from sending data on your network. 25. How many bits are used to represent an IPv6 address?  128*  48  32  12 26. How many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?  8*  48  32  12 27. How many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?  8*  48  32  4 28. How many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?  8*  128  32  4 29. How many bits are used to represent the network address of a host with an IP address of 192.168.150.16 and a subnet mask of 255.255.0.0?  16*  128  32
  • 8. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  4 30. How many bits are used to represent the network address of a host with an IP address of 192.168.150.16 and a subnet mask of 255.255.0.0?  16*  128  32  42 31. How many bits are used to represent the OUI part of the MAC address of a NIC card?  24*  8  128  42 32. How many bits are used to represent the OUI part of the MAC address of a NIC card?  24*  8  128  64 33. How many bits are used to represent a MAC address?  48*  8  128  64 34. How many bits are used to represent a MAC address?  48*  128  8  132 IT Essentials v6.0: 1. What would be a reason for a computer user to use the Task Manager Performance tab?  to increase the performance of the CPU  to view the processes that are running and end a process if needed  to view the services that are currently running on the PC  to check the CPU usage of the PC * 2. Which feature in Windows 7 and 8 allows a user to temporarily view the desktop that is behind open windows by moving the mouse over the right edge of the taskbar?  Peek*  Snap  Shake  Search  jump lists  thumbnail previews 3. What is the minimum amount of RAM and hard drive space required to install 64-bit Windows 8 on a PC?  1 GB RAM and 10 GB hard disk space
  • 9. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  1 GB RAM and 16 GB hard disk space  2 GB RAM and 16 GB hard disk space  2 GB RAM and 20 GB hard disk space*  4 GB RAM and 16 GB hard disk space  4 GB RAM and 20 GB hard disk space 4. After upgrading a computer to Windows 7, a user notices that the UAC (User Account Control) panel appears more frequently. How can the user reduce the frequency with which the UAC appears?  Reinstall all user programs in Compatibility Mode.  Replace the graphics card with one that meets the minimum hardware requirements for Windows 7.  Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control panel.*  In the Performance Options dialog box of the Performance Information and Tools control panel, choose Adjust for Best Performance. 5. Which Windows utility allows Windows 7 and 8 users to quickly and easily share files and folders?  HomeGroup*  Action Center  Services  Device Manager 6. Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed?  Services  Event Viewer  Component Services  Performance Monitor * 7. Which type of startup must be selected for a service that should run each time the computer is booted?  automatic*  boot  manual  start  startup 8. Which Windows tool allows an administrator to organize computer management tools in one location for convenient use?  Task Scheduler  Services console  Performance Monitor console  Microsoft Management console * 9. To which category of hypervisor does the Microsoft Virtual PC belong?  Type 1  Type 2*  Type 3  Type 4 10. What are two advantages of using PC virtualization? (Choose two.)
  • 10. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  It protects the host machine from viruses attacks.  It allows multiple operating systems to run on a single PC simultaneously.*  It boosts the performance of the host machine through virtualization.  It can provide cost savings.*  It allows network threat identification. 11. A college uses virtualization technology to deploy information security courses. Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs?  The lab exercises are performed faster inside of the virtualized environment.  The virtualization environment has better tools to develop mitigation solutions.  Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack.*  The viruses and worms will have limited functionality inside the virtualized environment. 12. A software engineer is involved in the development of an application. For usability tests, the engineer needs to make sure that the application will work in both Windows 7 and Windows 8 environments. The features and functions must be verified in the actual OS environment. The engineer is using a Windows 7 workstation. What two technologies can help the engineer achieve the usability tests? (Choose two.)  dual boot*  two separate CPUs  storage redundancy  client-side virtualization*  two separate hard disks 13. A technician needs to use an application that is not supported by Windows operating systems on the PC. How can the technician make this application run on the PC?  Use the Windows Compatibility mode.  Install the application with elevated permissions as administrator.  Create a virtual machine with an operating system that supports the application.*  Install the application in safe mode. 14. What preventive maintenance action should be taken to help improve system security?  Automate any antivirus scanners.*  Defragment the hard drive.  Perform backups regularly.  Error check the hard drive. 15. Which Windows 7 feature would an administrator use to configure a computer to delete temporary files from the hard drive at 3:00 AM each day?  Disk Cleanup  Task Scheduler*  Device Manager  Computer Management 16. Which command is used from the Windows command prompt to schedule a program to run at a specific time?  AT*  CMD  TASKLIST
  • 11. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  TASKKILL 17. When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?  Roll back the driver.*  Restart both the computer and the printer.  Scan the downloaded driver file with a virus scanner.  Upload the correct driver to the printer. 18. Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? (Choose two.)  Disk Cleanup*  Disk Maintenance  Disk Defragmenter*  Disk Partition  Disk Format 19. What is a common step that a technician can take to determine the cause of an operating system problem?  Boot into Safe Mode to determine if the problem is driver related.*  Test the power supply.  Document the time spent to resolve the problem.  Check the fan connections and ensure the fan is working properly. 20. Which question is an open ended question that could be used when helping a customer troubleshoot a Windows problem?  Can you boot the operating system?  Have you changed your password recently?  Do you get a login prompt when the computer boots?  What programs have you installed recently? * 21. A user reports that logging into the workstation fails after a display driver has been updated. The user insists that the password is typed in correctly. What is the most likely cause of the problem?  The password has changed.  The Caps Lock key is set to on.*  A display driver update failed.  The display setting has changed after a driver update. 22. A user reports that a video editing program does not work properly after a sound mixing program is installed. The technician suspects that a compatibility issue might be the cause of the problem. What should the technician do to verify this theory?”  Update Windows OS.  Update the video editing software.  Uninstall the sound mixing software.*  Check if an update of the sound mixing software is available. 23. A user reports to a technician that his computer freezes without any error messages. What are two probable causes? (Choose two.)  An update has corrupted the operating system.*  A process is not using enough system resources.  The power supply is failing.*  The MBR is corrupted.
  • 12. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  The boot order is not set correctly in BIOS. 24. A technician is trying to fix a Windows 7 computer that displays an “Invalid Boot Disk” error after POST. What is a possible cause of the error?  The boot.ini file is corrupt.  The ntldr.exe file is corrupt.  The ntdetect.com file is corrupt.  The boot order is not set correctly in the BIOS.* Older Version: 25. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?  repeater  hub  switch*  router 26. A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)  email server  router*  switch*  web server  wireless access point*  print server 27. Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?  ADSL  VPN  cellular*  ISDN 28. When is a dial-up connection used to connect to an Internet provider?  when a high-speed connection is provided over a cable TV network  when a digital connection is provided using ISDN  when a regular telephone line is used*  when a cellular telephone provides the service 29. Which type of connection to the Internet is capable of the fastest transfer rates?  ISDN BRI  dial-up  ISDN PRI  cable* 30. Which statement describes the logical topology for a LAN?  It describes how computers access the LAN medium.*  It depicts the locations of main routers and switches in a LAN.  It lists the number of computers, routers, and switches on the LAN.  It defines how computers connect to a LAN.
  • 13. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html 31. ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program?  Replace all labeling on the cables.  Replace all cable supports to prevent loose attachment points.  Disconnect and reconnect all patch cables.  Inspect all patch cables for breaks.* 32. What is an example of network maintenance?  immediately turning off a network device if the network device is making an unusual sound  educating users on IT policies and procedures*  using cable supports to identify the devices to which the cables are connected  not doing preventive maintenance regularly if the maintenance interrupts network activity 33. Which technology is most often used to connect devices to a PAN?  Bluetooth*  IEEE 802.11n wireless  fiber optic cabling  coaxial cabling 34. Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)  data link  application*  network  transport  physical  session*  presentation* 35. A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What is the interface ID of the device?  ba01  0607:1234:aa10:ba01*  2001:0DB8:75a3  2001:0DB8 36. What is a characteristic of the UDP protocol?  low overhead*  error correction  guaranteed delivery  end-to-end establishment before delivery 37. What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11g protocol standard?  802.11a wireless devices will not be able to connect to the wireless network.*  The 802.11g standard does not support static IP addressing.  The 802.11g standard does not support advanced network security features.  Using only 802.11g will cause multiple SSIDs to be broadcast. 38. What is the maximum segment length that is specified by the 1000BASE-T standard?  1640 ft (500 m)  984 ft (300 m)  328 ft (100 m)*
  • 14. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html  3280 ft (1000 m)  607 ft (185 m) 39. Which two characteristics describe Ethernet technology? (Choose two.)  It is supported by IEEE 802.3 standards.*  It is supported by IEEE 802.5 standards.  It typically uses an average of 16 Mb/s for data transfer rates.  It uses a ring topology.  It uses the CSMA/CD access control method.* 40. Which three factors are reasons for a company to choose a client/server model for a network instead of peer-to-peer? (Choose three.)  The company network requires secure access to confidential information.*  Each user understands how to safely share files across a network.  All employees passed a strict background check as part of the corporate hiring practices.  The data gathered by the employees is critical and should be backed up on a regular basis.*  The network is small with fewer than eight users.  The users need a central database to store inventory and sales information.* 41. What benefit is provided by a computer data network?  increased security  decentralized administration  resource sharing*  simplified troubleshooting 42. When would a printer be considered a network host?  when it is connected to a workstation  when it is connected to a laptop  when it is connected to a switch*  when it is connected to a PC 43. What is identified by the 100 in the 100BASE-TX standard?  the maximum cable distance in meters  the series number of the standard  the maximum number of network nodes  the maximum bandwidth in Mb/s* 44. A user installs a new gigabit NIC in a PC. The user notices that the data transfer rate is much slower than expected. What should the user do to fix the problem?  Change the NIC duplex setting from half duplex to full duplex.*  Disable sleep mode.  Disable hibernation mode.  Change the value assigned to the NIC wake-on-LAN setting. 45. A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers do. The original computers performed much faster with applications that required the transfer of data over the network. What should the company technicians do?  Check if the refurbished computers are using a VPN.  Check if the network interface cards in the refurbished computers are limited to 10 Mb/s.*  Check if subnet mask is correct.  Check if the gateway address is correct.
  • 15. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html 46. A user notices that the data transfer rate for the gigabit NIC in the user computer is much slower than expected. What is a possible cause for the problem?  The NIC is configured to use both IPv4 and IPv6 at the same time.  The NIC duplex settings have somehow been set to half-duplex.*  The NIC wake-on-LAN setting is misconfigured.  Hibernation mode is causing the NIC to shutdown unexpectedly.