Chapter 15 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
/
0 Comments
ITEssentials Chapter 15 (score 100%) cheked 100% Cisco ITEss
01.A technician is trobleshoouting a networked computer. The technician has gathered as much information as possible from the user and now needs to verify obvious issues. Which two action should the technician perform? ()Schoose two)
• Clear the network log files;
• Change the default gateway;
• Verify the computer IP information;
• Change the router configuration;
• Check activity on the routers.
02.Which statement is true about network maintenance?
• Cable supports are used to identify the devices to which the cables are connected;
• If a network device is making an unusual sound the device should be turned off immediately;
• Educating users on IT policies and procedures is an example of proactive network maintenance;
• Preventive maintenance should not be performed regularly because it interrupts network activity.
• Cable supports are used to identify the devices to which the cables are connected;
• If a network device is making an unusual sound the device should be turned off immediately;
• Educating users on IT policies and procedures is an example of proactive network maintenance;
• Preventive maintenance should not be performed regularly because it interrupts network activity.
03.A technician is concerned that a wireless router is missing current security features. What action could be taken to address this issue?
• Disable the SSID broadcast;
• Check for an updated firmware version;
• Configure mixed mode wireless operation;
• Assign static IP addresess to the wireless devices.
• Disable the SSID broadcast;
• Check for an updated firmware version;
• Configure mixed mode wireless operation;
• Assign static IP addresess to the wireless devices.
04.A company purchases several wireless NICs at a great price. After installing the NICs, they find that the user cannot connect to the 2,4 GHz wireless network. What is a likely cause of the problem?
• The NICs are designed for the 802.11a standard;
• The NICs are designed for the 802.11b standard;
• The NICs are designed for the 802.11g standard;
• The NICs are designed for the 802.11n standard via USB;
• The NICs are designed for the 802.11a standard;
• The NICs are designed for the 802.11b standard;
• The NICs are designed for the 802.11g standard;
• The NICs are designed for the 802.11n standard via USB;
05.In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
• Advanced;
• Content,
• Privacy;
• Security.
• Advanced;
• Content,
• Privacy;
• Security.
06.A technician is working on a workstation that has an IP address of 169.254.25.34. The technician found that the computer cannot connect to the Internet and the network cable to the computer had been disconnected. Which command can a technician use to get a new IP address once the cable is reconnected?
• nslookup;
• net continue;
• ipconfig /renew;
• nbtstat /new.
• nslookup;
• net continue;
• ipconfig /renew;
• nbtstat /new.
07.Which three ports are used by SMTP, POP and IMAP ? (Choose three)
• 21
• 25
• 69
• 110
• 127
• 143
• 21
• 25
• 69
• 110
• 127
• 143
08.A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?
• Use jumpers on the motherboard to configure the drive as slave;
• List the drive as slave in the CMOS;
• Connect the drive after the twist in the PATA cable;
• Use jumpers on the drive to configure the drive as slave.
• Use jumpers on the motherboard to configure the drive as slave;
• List the drive as slave in the CMOS;
• Connect the drive after the twist in the PATA cable;
• Use jumpers on the drive to configure the drive as slave.
09.Which protocol provides secure transport of data from the company web server to remote users?
• HTTP
• HTTPS
• NetBEUI
• DNS
• HTTP
• HTTPS
• NetBEUI
• DNS
10.The network technician is researching the best way connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (choose three)
• availability;
• distance;
• operating system;
• protocols;
• reliability;
• speed.
• availability;
• distance;
• operating system;
• protocols;
• reliability;
• speed.
11.Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
• Clear the browser history;
• Change the default browser;
• Reset the file sharing permissions;
• Delete the temporary Internet files.
• Clear the browser history;
• Change the default browser;
• Reset the file sharing permissions;
• Delete the temporary Internet files.
12.ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
• data inspection;
• logical survey;
• plant inspection;
• site survey.
• data inspection;
• logical survey;
• plant inspection;
• site survey.
13.A user is reporting intermittent loss of connectivity to the network. No other users have reported similar issues. What preventive maintenance task would likely identify the problem?
• Listen for unusual sounds from the core network devices;
• Ensure that all switches have the latest firmware installed;
• Check for a damaged network cable at the user workstation;
• Verify the attachment points between network devices in the core of the network.
• Listen for unusual sounds from the core network devices;
• Ensure that all switches have the latest firmware installed;
• Check for a damaged network cable at the user workstation;
• Verify the attachment points between network devices in the core of the network.
14.A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
• Ask the IT department to permit port 25 through the firewall;
• Request that the person sending the e-mail attach only one picture per e-mail message;
• Check DNS settings on the computer used to receive the e-mail;
• Request that the person sending the photographs archive all e-mail messages before sending e-mail.
• Ask the IT department to permit port 25 through the firewall;
• Request that the person sending the e-mail attach only one picture per e-mail message;
• Check DNS settings on the computer used to receive the e-mail;
• Request that the person sending the photographs archive all e-mail messages before sending e-mail.
15.When planning the network in a new bulding, the technician notes that the company requires cabling that can extend up to 295ft (90m) with enchanged banwith support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on network?
• Cat3
• Cat5
• Cat5e
• Cat6A
• Cat3
• Cat5
• Cat5e
• Cat6A
16.Which two protocols are used to receive e-mail? (choose two)
• DHCP
• SNMP
• IMAP
• POP3
• SSH
• DHCP
• SNMP
• IMAP
• POP3
• SSH
17.Which two hazard exist when working with fiber optic cabling (choose two)
• Chemicals;
• Copper strands;
• Electricity;
• Glass splinters;
• Connectors.
• Chemicals;
• Copper strands;
• Electricity;
• Glass splinters;
• Connectors.
18.Students on the college network need to be able to view folder names and data in files stored on the Windows based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accesing the file server?
• Change;
• Execute;
• Read;
• Write.
• Change;
• Execute;
• Read;
• Write.
19.A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
• The employee is using the wrong protocol;
• The employee is using an incorrect username or password;
• An incorrect IP address is configured in the FTP client;
• An incorrect port number is configured in the FTP client.
• The employee is using the wrong protocol;
• The employee is using an incorrect username or password;
• An incorrect IP address is configured in the FTP client;
• An incorrect port number is configured in the FTP client.
20.What are two ways to assign an IP address to wirekess NIC? (choose two)
• Assign a static address;
• Use ARP;
• Use the net command with the static option;
• Use WEP;
• Use the net command with the automatic option;
• Use DHCP.
• Assign a static address;
• Use ARP;
• Use the net command with the static option;
• Use WEP;
• Use the net command with the automatic option;
• Use DHCP.