Last Updated on October 26, 2019 by Admin
IT Essentials Chapter 7 Exam Online 2019
ITE -- Chapter 7
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
ITE — Chapter 7
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
1 pointsHow many devices can a Bluetooth device connect to simultaneously?Correct
Incorrect
Bluetooth is a short range wireless technology that is used for personal area network (PAN) devices such as cell phones, keyboards, headsets, and mice. A Bluetooth device can connect to a maximum of seven other devices using this 2.4 GHz technology.Hint
Bluetooth is a short range wireless technology that is used for personal area network (PAN) devices such as cell phones, keyboards, headsets, and mice. A Bluetooth device can connect to a maximum of seven other devices using this 2.4 GHz technology.
-
Question 2 of 25
2. Question
1 pointsA device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?Correct
Incorrect
An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607:1234:aa10:ba01.Hint
An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607:1234:aa10:ba01. -
Question 3 of 25
3. Question
1 pointsWhich layer of the OSI model is responsible for logical addressing and routing?Correct
Incorrect
The network layer of the OSI model is responsible for routing and logical addressing. The application layer is responsible for network services to support applications. The data link layer is responsible for physical addressing and access to the network media. The transport layer is responsible for reliable transport and flow control of data across the network.Hint
The network layer of the OSI model is responsible for routing and logical addressing. The application layer is responsible for network services to support applications. The data link layer is responsible for physical addressing and access to the network media. The transport layer is responsible for reliable transport and flow control of data across the network. -
Question 4 of 25
4. Question
1 pointsWhen would a printer be considered a network host?Correct
Incorrect
When a printer is connected directly to a networking device, such as a hub, switch, or router, it is considered to be a network host.Hint
When a printer is connected directly to a networking device, such as a hub, switch, or router, it is considered to be a network host. -
Question 5 of 25
5. Question
1 pointsWhich device provides wireless connectivity to users as its primary function?Correct
Incorrect
A switch connects multiple devices to a network. A router will forward traffic between networks. A wireless router will connect multiple wireless devices to a network. An access point will provides wireless connectivity to multiple devices and has fewer features than a wireless router. A modem will connect a home or small office to the Internet.Hint
A switch connects multiple devices to a network. A router will forward traffic between networks. A wireless router will connect multiple wireless devices to a network. An access point will provides wireless connectivity to multiple devices and has fewer features than a wireless router. A modem will connect a home or small office to the Internet. -
Question 6 of 25
6. Question
1 pointsWhich technology is most often used to connect devices to a PAN?Correct
Incorrect
A personal-area network (PAN) connects wireless devices that are within close proximity of an individual person. Bluetooth network technology commonly provides the connectivity.Hint
A personal-area network (PAN) connects wireless devices that are within close proximity of an individual person. Bluetooth network technology commonly provides the connectivity. -
Question 7 of 25
7. Question
3 pointsWhich three factors are reasons for a company to choose a client/server model for a network instead of peer-to-peer? (Choose three.)Correct
Incorrect
Client/server networks are the best choice when designing networks that require centralized security and user account control, or where data needs to be in one location for easy backups. Peer-to-peer networks do not support centralized security and the data must be located and secured on each individual PC.Hint
Client/server networks are the best choice when designing networks that require centralized security and user account control, or where data needs to be in one location for easy backups. Peer-to-peer networks do not support centralized security and the data must be located and secured on each individual PC. -
Question 8 of 25
8. Question
1 pointsWhat is a characteristic of a WAN?Correct
Incorrect
A WAN (wide-area network) is used to connect networks that are geographically separated and is typically owned by a service provider. The service provider contracts out WAN services to individuals and organizations.Hint
A WAN (wide-area network) is used to connect networks that are geographically separated and is typically owned by a service provider. The service provider contracts out WAN services to individuals and organizations. -
Question 9 of 25
9. Question
3 pointsWhich three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)Correct
Incorrect
The TCP/IP model and OSI model perform similar functions. However, the TCP/IP model uses four layers and the OSI model uses seven layers. The layers in each model can be mapped to each other as follows:
OSI application -> TCP/IP application
OSI presentation -> TCP/IP application
OSI session -> TCP/IP application
OSI transport -> TCP/IP transport
OSI network -> TCP/IP internet
OSI data link -> TCP/IP network access
OSI physical -> TCP/IP network accessHint
The TCP/IP model and OSI model perform similar functions. However, the TCP/IP model uses four layers and the OSI model uses seven layers. The layers in each model can be mapped to each other as follows:
OSI application -> TCP/IP application
OSI presentation -> TCP/IP application
OSI session -> TCP/IP application
OSI transport -> TCP/IP transport
OSI network -> TCP/IP internet
OSI data link -> TCP/IP network access
OSI physical -> TCP/IP network access -
Question 10 of 25
10. Question
1 pointsWhat is the correct order of the layers of the TCP/IP model from the top layer to the bottom?Correct
Incorrect
The OSI model has 7 layers and the TCP/IP model has 4. Both models encapsulate data from the sender and prepare it for transport to a receiver over some type of networkHint
The OSI model has 7 layers and the TCP/IP model has 4. Both models encapsulate data from the sender and prepare it for transport to a receiver over some type of network -
Question 11 of 25
11. Question
1 pointsWhat TCP/IP model layer is responsible for MAC addressing?Correct
Incorrect
The TCP/IP model divides network communication functions into four layers. MAC addressing and physical network components are the responsibility of the network access layer.Hint
The TCP/IP model divides network communication functions into four layers. MAC addressing and physical network components are the responsibility of the network access layer. -
Question 12 of 25
12. Question
1 pointsWhat PDU is associated with the network layer of the OSI model?Correct
Incorrect
Each layer of the OSI model has an associated PDU (protocol data unit). The PDU at the application layer is data, at the transport layer is segment, at the network layer is packet, and at the data link layer is frame.Hint
Each layer of the OSI model has an associated PDU (protocol data unit). The PDU at the application layer is data, at the transport layer is segment, at the network layer is packet, and at the data link layer is frame. -
Question 13 of 25
13. Question
2 pointsWhich two layers of the OSI model correspond to the functions of the TCP/IP model network access layer? (Choose two.)Correct
Incorrect
The OSI model has 7 layers and the TCP/IP model has 4 layers. Both models accomplish the same communication functions but the TCP/IP model combines functions into fewer layers.The functions of both the data link and physical layer of the OSI model are performed at the network access layer of the TCP/IP model.Hint
The OSI model has 7 layers and the TCP/IP model has 4 layers. Both models accomplish the same communication functions but the TCP/IP model combines functions into fewer layers.The functions of both the data link and physical layer of the OSI model are performed at the network access layer of the TCP/IP model. -
Question 14 of 25
14. Question
1 pointsWhat is identified by the 100 in the 100BASE-TX standard?Correct
Incorrect
The 100BASE-TX standard defines a maximum bandwidth of 100 Mb/s. The 100 is the bandwidth, BASE is for baseband, and TX is twisted-pair cabling.Hint
The 100BASE-TX standard defines a maximum bandwidth of 100 Mb/s. The 100 is the bandwidth, BASE is for baseband, and TX is twisted-pair cabling. -
Question 15 of 25
15. Question
2 pointsWhich two characteristics describe Ethernet technology? (Choose two.)Correct
Incorrect
The 802.3 Ethernet standard specifies that a network implement the CSMA/CD access control method.
Hint
The 802.3 Ethernet standard specifies that a network implement the CSMA/CD access control method.
-
Question 16 of 25
16. Question
1 pointsWhich IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?Correct
Incorrect
The 802.11n standard is backwards compatible with both the 802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4 GHz.Hint
The 802.11n standard is backwards compatible with both the 802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4 GHz. -
Question 17 of 25
17. Question
3 pointsA customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)Correct
Incorrect
A web server could be software installed on a computer. An email server is commonly provided by a provider like Google or Yahoo or built and provided in a corporate environment. Print servers are commonly found in a business, not home, environment.Hint
A web server could be software installed on a computer. An email server is commonly provided by a provider like Google or Yahoo or built and provided in a corporate environment. Print servers are commonly found in a business, not home, environment. -
Question 18 of 25
18. Question
1 pointsWhich network device makes forwarding decisions based on the destination MAC address that is contained in the frame?Correct
Incorrect
Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch then looks in its MAC address table and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC address.Hint
Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch then looks in its MAC address table and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC address. -
Question 19 of 25
19. Question
1 pointsA network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?Correct
Incorrect
Optical fiber uses light to transmit signals. Therefore, fiber-optic cable is not affected by EMI or RFI.Hint
Optical fiber uses light to transmit signals. Therefore, fiber-optic cable is not affected by EMI or RFI. -
Question 20 of 25
20. Question
1 pointsWhich term describes a type of coaxial cable?Correct
Incorrect
There are standards that define all of the various types of cables used in networks. RG-6 is a type of coaxial cable.Hint
There are standards that define all of the various types of cables used in networks. RG-6 is a type of coaxial cable. -
Question 21 of 25
21. Question
1 pointsWhich pairs of wires change termination order between the 568A and 568B standards?Correct
Incorrect
The difference between the 568A and 568B standards is the order in which the colored wire pairs are sequenced. It is the green and the orange pairs of wires that are swapped between the two standards.Hint
The difference between the 568A and 568B standards is the order in which the colored wire pairs are sequenced. It is the green and the orange pairs of wires that are swapped between the two standards. -
Question 22 of 25
22. Question
2 pointsWhich two types of signal interference are reduced more by STP than by UTP? (Choose two.)Correct
Incorrect
RFI, EMI, and crosstalk cause interference to the electrical signals that are transmitted through copper cables. Both UTP and STP use twisted pairs of wires that help protect against crosstalk. However, STP provides greater protection against RFI and EMI than UTP provides.Hint
RFI, EMI, and crosstalk cause interference to the electrical signals that are transmitted through copper cables. Both UTP and STP use twisted pairs of wires that help protect against crosstalk. However, STP provides greater protection against RFI and EMI than UTP provides. -
Question 23 of 25
23. Question
1 pointsHow many host addresses are available on a network with a subnet mask of 255.255.0.0?Correct
Incorrect
A subnet mask of 255.255.0.0 represents sixteen bits in the host portion of the address identified by zeros. Sixteen bits allows for 2^16 possible host addresses that can used on a network.Hint
A subnet mask of 255.255.0.0 represents sixteen bits in the host portion of the address identified by zeros. Sixteen bits allows for 2^16 possible host addresses that can used on a network. -
Question 24 of 25
24. Question
1 pointsA technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?Correct
Incorrect
In a network employing dynamic IP addressing, if a computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255. In this case, the computer can only communicate with computers connected to the same network within this IP address range.Hint
In a network employing dynamic IP addressing, if a computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255. In this case, the computer can only communicate with computers connected to the same network within this IP address range. -
Question 25 of 25
25. Question
1 pointsWhat is a characteristic of the UDP protocol?Correct
Incorrect
TCP is a connection oriented protocol that provides for error recovery and guaranteed delivery mechanisms while UDP offers connectionless delivery and has fewer fields in the packet header than TCP.Hint
TCP is a connection oriented protocol that provides for error recovery and guaranteed delivery mechanisms while UDP offers connectionless delivery and has fewer fields in the packet header than TCP.