IT Essentials-Chapter 8: PC Hardware and Software
(Version 4.1)
Chapter 8
Exam - IT Essentials: PC Hardware and Software (Version 4.1)
jawaban
|
pertanyaan
|
WAN
|
The Internet is an example of which type
of network?
|
TCP/IP
|
Which suite of protocols is used to
transmit data across the Internet?
|
subnet mask
|
Which dotted decimal number is used to
distinguish the network portion of an IP address from the host portion?
|
ADSL
|
What is the most commonly used DSL
technology?
|
1- The
company network requires secure access to confidential information.
2- The users need a central database to store inventory
and sales information.
3- The data gathered by the employees is critical and
should be backed up on a regular basis
|
Which three factors are reasons to
choose a client/server model for a network instead of peer-to-peer? (Choose
three.)
|
1- The
number of twists in the wires inside the cable
2- The number of wires inside the cable.
|
Which two factors are used to determine
the different categories of UTP cabling? (Choose two.)
|
tracert
|
Which Windows XP command displays the
route taken by packets crossing an IP network?
|
328 ft (100 m)
|
What is the maximum range a data signal
can travel through a 1000BASE-T network segment?
|
1- supported by IEEE 802.3 standards
2- uses a bus logical topology
|
Which two characteristics describe
Ethernet technology? (Choose two.)
|
hub
|
Which device enables computers to be
attached to a network without segmenting the network?
|
a bad network cable
|
A student is helping a friend with a home
computer that can no longer access the Internet. Upon investigation, the
student discovers that the computer has been assigned the IP address
169.254.100.88. What could cause a computer to get such an IP address?
|
the available wireless networks within
range
|
A student brings a laptop to a school
that has wireless access. The laptop is not connecting to the school network.
What is the first thing that the student should check?
|
Attach a cable that has an RJ-45
connector.
|
Which procedure is normally performed
when connecting a computer to an Ethernet network for the first time?
|
VPN
|
Workers are required to access the
company LAN when traveling. Which networking technology can provide secure
and encrypted access to the LAN?
|
1- Fewer
peripherals are needed
2- Centralized administration capabilities are
enhanced.
|
Which two statements are true of network
computing in contrast to non-network computing? (Choose two.)
|
It developed standards to replace
proprietary standards after U.S. telephone industry deregulation.
|
What is true about the TIA/EIA?
|
1- faulty
NIC
2- faulty patch cord
|
A technician installs a new NIC in a PC
and connects an Ethernet patch cord from the NIC to a wall jack. The
technician then notes that the link lights are not active on the NIC. Which
two problems could be indicated by this lack of activity? (Choose two.)
|
to save troubleshooting time
|
Why should network cables always be
labeled?
|
Purchase equipment only through
manufacturer-authorized partners.
|
Which method is recommended in order to
avoid problems with counterfeit network equipment?
|
DNS
|
Which networking protocol translates a
network name such as www.cisco.com to a unique IP address?
|
Chapter 8
Exam - IT Essentials: PC Hardware and Software (Version 4.1)
jawaban
|
pertanyaan
|
WAN
|
The Internet is an example of which type
of network?
|
TCP/IP
|
Which suite of protocols is used to
transmit data across the Internet?
|
subnet mask
|
Which dotted decimal number is used to
distinguish the network portion of an IP address from the host portion?
|
ADSL
|
What is the most commonly used DSL
technology?
|
1- The
company network requires secure access to confidential information.
2- The users need a central database to store inventory
and sales information.
3- The data gathered by the employees is critical and
should be backed up on a regular basis
|
Which three factors are reasons to
choose a client/server model for a network instead of peer-to-peer? (Choose
three.)
|
1- The
number of twists in the wires inside the cable
2- The number of wires inside the cable.
|
Which two factors are used to determine
the different categories of UTP cabling? (Choose two.)
|
tracert
|
Which Windows XP command displays the
route taken by packets crossing an IP network?
|
328 ft (100 m)
|
What is the maximum range a data signal
can travel through a 1000BASE-T network segment?
|
1- supported by IEEE 802.3 standards
2- uses a bus logical topology
|
Which two characteristics describe
Ethernet technology? (Choose two.)
|
hub
|
Which device enables computers to be
attached to a network without segmenting the network?
|
a bad network cable
|
A student is helping a friend with a home
computer that can no longer access the Internet. Upon investigation, the
student discovers that the computer has been assigned the IP address
169.254.100.88. What could cause a computer to get such an IP address?
|
the available wireless networks within
range
|
A student brings a laptop to a school
that has wireless access. The laptop is not connecting to the school network.
What is the first thing that the student should check?
|
Attach a cable that has an RJ-45
connector.
|
Which procedure is normally performed
when connecting a computer to an Ethernet network for the first time?
|
VPN
|
Workers are required to access the
company LAN when traveling. Which networking technology can provide secure
and encrypted access to the LAN?
|
1- Fewer
peripherals are needed
2- Centralized administration capabilities are
enhanced.
|
Which two statements are true of network
computing in contrast to non-network computing? (Choose two.)
|
It developed standards to replace
proprietary standards after U.S. telephone industry deregulation.
|
What is true about the TIA/EIA?
|
1- faulty
NIC
2- faulty patch cord
|
A technician installs a new NIC in a PC
and connects an Ethernet patch cord from the NIC to a wall jack. The
technician then notes that the link lights are not active on the NIC. Which
two problems could be indicated by this lack of activity? (Choose two.)
|
to save troubleshooting time
|
Why should network cables always be
labeled?
|
Purchase equipment only through
manufacturer-authorized partners.
|
Which method is recommended in order to
avoid problems with counterfeit network equipment?
|
DNS
|
Which networking protocol translates a
network name such as www.cisco.com to a unique IP address?
|
Tidak ada komentar:
Posting Komentar