dimanche 25 novembre 2018

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 2018

  1. A user notices that the data transfer rate for the gigabit NIC in the user computer is much slower than expected. What is a possible cause for the problem?
    • The NIC duplex settings have somehow been set to half-duplex.*
    • The NIC wake-on-LAN setting is misconfigured.
    • Hibernation mode is causing the NIC to shutdown unexpectedly.
    • The NIC is configured to use both IPv4 and IPv6 at the same time.
  2. Two LEDs are usually present on a NIC. What are the two primary uses for these LEDs? (Choose two.)
    • to indicate the presence of a connection*
    • to indicate interference from another nearby wireless or electronic device
    • to indicate that the NIC has connected to a DHCP server
    • to indicate that the NIC is connected to a homegroup or workgroup
    • to indicate that data transfer activity is present*
  3. What is the purpose of the network profiles that are used to establish a new network connection on a Windows PC?
    • to configure NIC settings for the fastest network available
    • to remove the need for IP addresses when connecting to a network
    • to provide a list of ISPs that may be used for Internet access
    • to provide an easy way to configure or apply network functions based on the type of network to be joined*
  4. A wireless router is displaying the IP address of 192.168.0.1. What could this mean?
    • The NAT function is not working on the wireless router.
    • The wireless router still has the factory default IP address.*
    • Dynamic IP address allocation has been configured on the router and is functioning correctly.
    • The wireless router has been configured to use the frequencies on channel 1.
  5. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?
    • to disable broadcasting of the SSID
    • to enable different 802.11 standards
    • to provide stronger security modes
    • to avoid interference from nearby wireless devices*
  6. Which combination of user account and network location profile allows a user to become a member of a homegroup?
    • an admin account with a network location profile of Work
    • a guest account with a network location profile of Home
    • an admin user account with a network location of Public
    • a standard user account with a network location profile of Home*
  7. A business traveler connects to a wireless network with open authentication. What should the traveler do to secure confidential data when connecting to the business services?
    • Connect with a VPN.*
    • Change the network location profile to public.
    • Change the Windows firewall settings.
    • Manually configure an IP address, subnet mask, and default gateway.
  8. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used?
    • cable
    • DSL*
    • ISDN
    • POTS
  9. Which type of connection to the Internet is capable of the fastest transfer rates?
    • ISDN
    • POTS
    • satellite
    • cable
    • fiber*
  10. Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
    • ADSL
    • cellular*
    • ISDN
    • VPN
  11. A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)
    • The company only needs to pay for the amount of processing and storage capacity that it uses.*
    • Cloud services are billed at a fixed fee no matter how much processing and storage are used by the company.
    • Cloud services enable the company to own and administer its own servers and storage devices.
    • The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.*
    • Single-tenant data centers can easily grow to accommodate increasing data storage requirements.
    • As the amount of data that the company uses increases, it becomes impractical for the data to be stored and processed in a single-tenant data center.*
  12. Which Cloud computing service would be best for an organization that does not have the technical knowledge to host and maintain applications at their local site?
    • SaaS*
    • IaaS
    • PaaS
    • ITaaS
  13. A network client in a corporate environment reboots. Which type of server would most likely be used first?
    • DNS
    • DHCP*
    • e-mail
    • FTP
    • Telnet
    • web
  14. What is a common function of a proxy server?
    • to store frequently accessed web pages on the internal network*
    • to control who is permitted to access the internal network
    • to detect malicious signatures by monitoring traffic that is entering the internal network
    • to provide access to a shared pool of configurable computing resources
  15. ABC Company requires preventive maintenance for all local network cabling once a year. Which task should be included in the preventive maintenance program?
    • Disconnect and reconnect all patch cables.
    • Inspect all patch cables for breaks.*
    • Replace all labeling on the cables.
    • Replace all cable supports to prevent loose attachment points.
  16. What is a benefit of performing preventative maintenance at regular intervals?
    • reduction in network downtime*
    • reduction in connectivity
    • reduction in security threats
    • reduction in EMI and RFI
  17. A user cannot access the network. While the technician is checking the computer, the other users on the same network report that they are having the same problem. Further investigation shows that the LED lights on each NIC are not lit. What should the technician do next?
    • Check each computer to verify that they all have the same settings.
    • Report the problem to the network administrator.*
    • Attempt to ping devices on other networks.
    • Use nslookup to check network connectivity.
  18. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?
    • The PC default gateway address is missing or incorrect.*
    • The PC has an incorrect IP address.
    • The network cable connected to the user PC is faulty.
    • The NIC on the PC is faulty.
  19. A technician is investigating a report that a computer is unable to access network resources. The technician discovers that the computer has an IP address of 169.254.27.168. What is a logical first step in diagnosing this problem?
    • Attempt to ping the default gateway.
    • Check the NIC LED lights.*
    • Test that DNS is operating correctly.
    • Activate Network Discovery and File Sharing.
  20. A Windows 7 computer is unable to reach a mapped drive on a file server that is on another network within the organization. Further investigation shows that the user is able to use a printer that is connected to the same network as the computer. Which action should the technician perform next?
    • Verify that DNS name resolution is operating properly.
    • Inspect the network patch cable for wear or breaks.
    • Check Network Connection Details in the Windows GUI for the appropriate network connection.*
    • Check the link LED on the NIC.
  21. A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem? (Choose two.)
    • The wireless router is not broadcasting the SSID.*
    • The laptop has not received an IP address from the wireless router.
    • The wireless router is set to mixed mode.
    • The network does not support the wireless protocol in use by the laptop.*
    • The laptop must be configured with the office workgroup name.
  22. A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)
    • The Windows domain or workgroup name that is configured on the computer is incorrect.
    • The target web server is down.*
    • The computer has been assigned a static IP address.
    • DNS service is unavailable on the customer network.*
    • The HTTP protocol is not working properly on the target server.
  23. A technician uses the nbtstat -A 192.168.0.3 command. What does the technician expect to view in the command output?
    • current connections and statistics*
    • network adapter configuration information
    • a list of routers within the traffic path
    • computer accounts and domain specific information
  24. Fill in the blank.
    What is the acronym for the protocol that is used when securely communicating with a web server?
    • HTTPS*
  25. Match the definition to the of cloud.
    • Question
      ITE Chapter 8 Exam v6 Question 001
    • Answer
      ITE Chapter 8 Exam v6 Answer 001

      Older Version

  26. What is a good source for safely downloading Android apps?
    • the Apple App Store
    • iTunes
    • freeware sites
    • Google Play*
  27. What two functions can be performed with the home button on an iOS mobile device? (Choose two.)
    • lock the device
    • the same functions as the Android navigation buttons*
    • start voice control*
    • reset the device to the factory default
    • start the TouchFLO interface
  28. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)
    • A custom OS may reduce sandboxing features.
    • The operating system can be fine-tuned to improve the speed of the device.*
    • The operation of the carrier cellular network may be affected.
    • The user interface can be extensively customized.*
    • The root directory of the device is blocked.
  29. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
    • to erase all personal data from the device
    • to remotely lock the device if it is stolen
    • to return the device to the default factory state
    • to place the device into a power saving state*
    • to restore and re-synchronize the device
    • to help prevent theft of private information*
  30. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
    • to return the device to the default factory state
    • to prevent unauthorized use of the device.*
    • to remotely lock the device if it is stolen
    • to help prevent theft of private information*
    • to restore and re-synchronize the device
    • to erase all personal data from the device
  31. What is an advantage of using flash memory to store data in mobile devices?
    • Flash memory has a drive head that moves, reducing the seek time to locate data.
    • Flash memory requires very little power to store and retrieve data.*
    • Flash memory is not affected by ESD.
    • Flash memory is highly resistant to water and cold.
  32. What are two touchscreen characteristics that are used by most mobile devices? (Choose two.)
    • an electrical field of the screen that is interrupted when the user touches the screen*
    • three layers responsible for conducting electricity with a small air gap between them
    • a glass screen that is coated with a capacitor
    • two transparent layers of material capable of conducting electricity*
    • two colored layers of material capable of conducting electricity
  33. Which component is field-replaceable in most mobile devices?
    • memory card*
    • RAM
    • touchscreen
    • CPU
  34. Which mobile device troubleshooting procedure is correct?
    • When a problem appears with a mobile device, the owner should analyze if it is cost-effective to fix it.*
    • Mobile devices change so rapidly in design and functionality it is always better to replace the device rather than repair it.
    • Mobile device problems always result in sending the device to the manufacturer for troubleshooting.
    • Every time a mobile devices freezes, the owner can reinitialize it by pressing the reset button.
  35. A user accidentally drops a mobile device into a pool. What corrective action should be taken?
    • Contact the manufacturer for repair or replacement.*
    • Use a hair dryer to dry the phone.
    • Open the device and replaced damaged components.
    • If the mobile device does not turn on, throw it away and buy a new one.
  36. After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?
    • Buy a new power button and replace it.
    • Disassemble the phone and look for heat related damage.
    • Return the phone to the manufacturer for repair.*
    • Place the phone in a refrigerated space and allow the unit to cool down.
  37.  After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues? (Choose two.)
    • a software problem*
    • a touchscreen problem
    • a cell service problem
    • a circuit board problem
    • a memory problem*
  38. Which scenario or situation would prevent a user from upgrading the OS on an Android device?
    • The software copyright was not obtained before the installation.
    • The correct patches were not installed.
    • The hardware does not meet specifications.*
    • Permission was not obtained from the manufacturer.
  39. Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)
    • The GPS locator must be enabled.
    • The passcode must be disabled.
    • Sandboxing must be enabled.
    • The device must be powered on.*
    • The device must be connected to a network.*
  40. Which two items common to both Android and iOS devices can be remotely backed up? (Choose two.)
    • photos
    • settings
    • contacts*
    • calendar*
    • messages
  41. Which statement is true about wireless connectivity on an Android mobile device?
    • If the network SSID is not being broadcast, the device will not be able to connect to the network.
    • When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.*
    • The Android OS does not support wireless connectivity that uses WPA2 security.
    • If a Wi-Fi network is secured with a password, the network must be manually configured on the device.
  42. This is a flash item. Please click below to answer this item.
  43. In the context of mobile devices, what does the term tethering involve?
    • connecting a mobile device to a USB port on a computer in order to charge the mobile device
    • connecting a mobile device to a hands-free headset
    • connecting a mobile device to another mobile device or computer to share a network connection*
    • connecting a mobile device to a 4G cellular network
  44. Which statement is true about industry standards for cellular networks?
    • First generation cellular standards are mostly digital standards.
    • Third generation cellular standards require a maximum of 1 Gb/s for devices moving slowly, such as when a user has a mobile device and is walking.
    • Cellular standards have made it more difficult and expensive to make calls to people that are on a different network.
    • Cell phones that use a single standard can often only be used in specific geographic areas.*
  45. Which statement about synchronizing a mobile device to a PC is true?
    • To synchronize data on an iOS device, iTunes must be installed on the PC.*
    • Motocast USB can be used to synchronize data when using an iOS device.
    • iOS synchronization can only be performed over a USB connection.
    • Data on Android devices cannot be synchronized with a PC.
  46. A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?
    • MIME
    • POP3
    • SMTP
    • IMAP*
  47. Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?
    • simple passcode
    • pattern*
    • remote wipe
    • slide
  48. Which term describes the ability of a mobile device to recognize when two or more points of contact are made on the screen?
    • large touch
    • many touch
    • multitouch*
    • long touch

Aucun commentaire:

Enregistrer un commentaire

CCNA Security v2.0 Final Exam Answers 2018

Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA f...