Last Updated on October 28, 2019 by Admin
ITN Pretest Exam Online
ITN -- Pretest Exam
Quiz-summary
0 of 40 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
Information
ITN — Pretest Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 40 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- Answered
- Review
-
Question 1 of 40
1. Question
1 pointsConvert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.Correct
Incorrect
-
Question 2 of 40
2. Question
1 pointsConvert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.Correct
Incorrect
-
Question 3 of 40
3. Question
1 pointsThe failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?Correct
Incorrect
-
Question 4 of 40
4. Question
1 pointsA local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?Correct
Incorrect
-
Question 5 of 40
5. Question
2 pointsWhich two devices provide permanent data storage? (Choose two.)Correct
Incorrect
-
Question 6 of 40
6. Question
1 pointsIf a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks?Correct
Incorrect
-
Question 7 of 40
7. Question
1 pointsWhat is a function of the BIOS?Correct
Incorrect
One purpose of the BIOS utility is for displaying information about the components of the computer. A technician can use this information to determine what components are installed and some of the attributes of these components.Hint
One purpose of the BIOS utility is for displaying information about the components of the computer. A technician can use this information to determine what components are installed and some of the attributes of these components. -
Question 8 of 40
8. Question
1 pointsWhich is a characteristic of the Internet?Correct
Incorrect
The Internet is a global system of interconnected computer networks that has no central governance. It is not limited to geographic boundaries and uses static public IP addresses for communication.Hint
The Internet is a global system of interconnected computer networks that has no central governance. It is not limited to geographic boundaries and uses static public IP addresses for communication. -
Question 9 of 40
9. Question
1 pointsWhich command can be used to test connectivity between two computers that are attached to a network?Correct
Incorrect
-
Question 10 of 40
10. Question
1 pointsA person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh?Correct
Incorrect
-
Question 11 of 40
11. Question
4 pointsConsidering the average capacity of storage device media, drag the storage media on the left to the capacity list on the right.
Sort elements
- hard drive
- DVD
- CD
- floppy disk
-
largest capacity
-
2nd largest capacity
-
3rd largest capacity
-
smallest capacity
Correct
Incorrect
-
Question 12 of 40
12. Question
6 pointsRefer to the exhibit. Match the port to the associated letter shown in the exhibit. (Not all options are used.)
Sort elements
- PS/2
- S/PDIF
- USB
- IEEE 1394
- HDMI
- DisplayPort
- DVI
-
A
-
B
-
C
-
D
-
E
-
F
Correct
Incorrect
-
Question 13 of 40
13. Question
5 pointsMatch the icon to its likely associated use. (Not all options are used.)
Sort elements
- File Explorer
- MS Word
- IE
- Adobe Acrobat Reader
- safely remove
- MS PowerPoint
-
search for a file on disk
-
resume work on an open business letter
-
access a site on the World Wide Web
-
resume reading an open .pdf document
-
safely remove a flash drive
Correct
Incorrect
-
Question 14 of 40
14. Question
4 pointsMatch the form of network communication with its description. (Not all options are used.)
Sort elements
- social media
- wiki
- podcast
- instant messaging
- weblog (blog)
-
interactive websites where people create and share user-generated content with friends and family
-
web pages that groups of people can edit and view together
-
an audio-based medium that allows people to deliver their recordings to a wide audience
-
real-time communication between two or more people
Correct
Incorrect
-
Question 15 of 40
15. Question
4 pointsMatch the application with the correct compressed file format. (Not all options are used.)
Sort elements
- QuickTime
- MPEG
- GIF
- JPEG
- HTML
-
compressed video formats
-
compressed video formats
-
compressed image formats
-
compressed image formats
Correct
Incorrect
-
Question 16 of 40
16. Question
1 pointsA user is having problems accessing the Internet. The command ping http://www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem?Correct
Incorrect
-
Question 17 of 40
17. Question
1 pointsWhich option shows the proper notation for an IPv6 address?Correct
Incorrect
-
Question 18 of 40
18. Question
1 pointsWhat is the purpose of the routing process?Correct
Incorrect
-
Question 19 of 40
19. Question
1 pointsWhich device should be used for enabling a host to communicate with another host on a different network?Correct
Incorrect
-
Question 20 of 40
20. Question
1 pointsA home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?Correct
Incorrect
-
Question 21 of 40
21. Question
1 pointsA company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?Correct
Incorrect
-
Question 22 of 40
22. Question
1 pointsWhy would a network administrator use the tracert utility?Correct
Incorrect
The tracert utility is used to identify the path a packet takes from source to destination. Tracert is commonly used when packets are dropped or not reaching a specific destination.Hint
The tracert utility is used to identify the path a packet takes from source to destination. Tracert is commonly used when packets are dropped or not reaching a specific destination. -
Question 23 of 40
23. Question
1 pointsRefer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
Correct
Incorrect
The default gateway is used to route packets destined for remote networks. The default gateway IP address is the address of the first Layer 3 device (the router interface) that connects to the same network.Hint
The default gateway is used to route packets destined for remote networks. The default gateway IP address is the address of the first Layer 3 device (the router interface) that connects to the same network. -
Question 24 of 40
24. Question
1 pointsWhich subnet would include the address 192.168.1.96 as a usable host address?Correct
Incorrect
For the subnet of 192.168.1.64/26, there are 6 bits for host addresses, yielding 64 possible addresses. However, the first and last subnets are the network and broadcast addresses for this subnet. Therefore, the range of host addresses for this subnet is 192.168.1.65 to 192.168.1.126. The other subnets do not contain the address 192.168.1.96 as a valid host address.Hint
For the subnet of 192.168.1.64/26, there are 6 bits for host addresses, yielding 64 possible addresses. However, the first and last subnets are the network and broadcast addresses for this subnet. Therefore, the range of host addresses for this subnet is 192.168.1.65 to 192.168.1.126. The other subnets do not contain the address 192.168.1.96 as a valid host address. -
Question 25 of 40
25. Question
1 pointsA technician uses the ping 127.0.0.1 command. What is the technician testing?Correct
Incorrect
127.0.0.1 is the local loopback address on any TCP/IP network device. By pinging this address, the technician is verifying the TCP/IP protocol stack on that particular device.Hint
127.0.0.1 is the local loopback address on any TCP/IP network device. By pinging this address, the technician is verifying the TCP/IP protocol stack on that particular device. -
Question 26 of 40
26. Question
1 pointsWhat is the purpose of ICMP messages?Correct
Incorrect
The purpose of ICMP messages is to provide feedback about issues that are related to the processing of IP packets.Hint
The purpose of ICMP messages is to provide feedback about issues that are related to the processing of IP packets. -
Question 27 of 40
27. Question
1 pointsWhat is the general term that is used to describe a piece of data at any layer of a networking model?Correct
Incorrect
The term protocol data unit (PDU) is used to describe a piece of data at any layer of a networking model. A packet is the PDU at the network layer. A frame is the data link layer PDU. A segment is the PDU at the transport layer.Hint
The term protocol data unit (PDU) is used to describe a piece of data at any layer of a networking model. A packet is the PDU at the network layer. A frame is the data link layer PDU. A segment is the PDU at the transport layer. -
Question 28 of 40
28. Question
1 pointsHow does a networked server manage requests from multiple clients for different services?Correct
Incorrect
Each service provided by a server, such as email or file transfers, uses a specific port number. The source port number of a service request identifies the client that is requesting services. The destination port number identifies the specific service. Servers do not use address information to provide services. Routers and switches use addressing information to move traffic through the network.Hint
Each service provided by a server, such as email or file transfers, uses a specific port number. The source port number of a service request identifies the client that is requesting services. The destination port number identifies the specific service. Servers do not use address information to provide services. Routers and switches use addressing information to move traffic through the network. -
Question 29 of 40
29. Question
1 pointsWhich protocol translates a website name such as http://www.cisco.com into a network address?Correct
Incorrect
Domain Name Service translates names into numerical addresses, and associates the two. DHCP provides IP addresses dynamically to pools of devices. HTTP delivers web pages to users. FTP manages file transfers.Hint
Domain Name Service translates names into numerical addresses, and associates the two. DHCP provides IP addresses dynamically to pools of devices. HTTP delivers web pages to users. FTP manages file transfers. -
Question 30 of 40
30. Question
1 pointsA network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?Correct
Incorrect
The wrong mode of operation is being used. The CLI prompt indicates that the mode of operation is global configuration. IP addresses must be configured from interface configuration mode, as indicated by the SanJose(config-if)# prompt.Hint
The wrong mode of operation is being used. The CLI prompt indicates that the mode of operation is global configuration. IP addresses must be configured from interface configuration mode, as indicated by the SanJose(config-if)# prompt. -
Question 31 of 40
31. Question
1 pointsWhat protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?Correct
Incorrect
TCP is a Layer 4 protocol of the OSI model. TCP has several responsibilities in the network communication process. It divides large messages into smaller segments which are more efficient to send across the network. It also controls the size and rate of segments exchanged between clients and servers.Hint
TCP is a Layer 4 protocol of the OSI model. TCP has several responsibilities in the network communication process. It divides large messages into smaller segments which are more efficient to send across the network. It also controls the size and rate of segments exchanged between clients and servers. -
Question 32 of 40
32. Question
1 pointsA network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?Correct
Incorrect
The NIC has responsibilities in both Layer 1 and Layer 2. The NIC encodes the frame as a series of signals that are transmitted onto the local media. This is the responsibility of the physical layer of the OSI model. The signal could be in the form of electrical, optical, or radio waves.Hint
The NIC has responsibilities in both Layer 1 and Layer 2. The NIC encodes the frame as a series of signals that are transmitted onto the local media. This is the responsibility of the physical layer of the OSI model. The signal could be in the form of electrical, optical, or radio waves. -
Question 33 of 40
33. Question
1 pointsWhich statement is true about variable-length subnet masking?Correct
Incorrect
In variable-length subnet masking, bits are borrowed to create subnets. Additional bits may be borrowed to create additional subnets within the original subnets. This may continue until there are no bits available to borrow.Hint
In variable-length subnet masking, bits are borrowed to create subnets. Additional bits may be borrowed to create additional subnets within the original subnets. This may continue until there are no bits available to borrow. -
Question 34 of 40
34. Question
1 pointsA wireless host needs to request an IP address. What protocol would be used to process the request?Correct
Incorrect
The DHCP protocol is used to request, issue, and manage IP addressing information. CSMA/CD is the access method used with wired Ethernet. ICMP is used to test connectivity. SNMP is used with network management and FTP is used for file transfer.Hint
The DHCP protocol is used to request, issue, and manage IP addressing information. CSMA/CD is the access method used with wired Ethernet. ICMP is used to test connectivity. SNMP is used with network management and FTP is used for file transfer. -
Question 35 of 40
35. Question
1 pointsWhat will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?Correct
Incorrect
In an Ethernet network, each NIC in the network checks every arriving frame to see if the destination MAC address in the frame matches its own MAC address. If there is no match, the device discards the frame. If there is a match, the NIC passes the frame up to the next OSI layer.Hint
In an Ethernet network, each NIC in the network checks every arriving frame to see if the destination MAC address in the frame matches its own MAC address. If there is no match, the device discards the frame. If there is a match, the NIC passes the frame up to the next OSI layer. -
Question 36 of 40
36. Question
1 pointsWhich connection provides a secure CLI session with encryption to a Cisco switch?Correct
Incorrect
A CLI session using Secure Shell (SSH) provides enhanced security because SSH supports strong passwords and encryption during the transport of session data. The other methods support authentication but not encryption.Hint
A CLI session using Secure Shell (SSH) provides enhanced security because SSH supports strong passwords and encryption during the transport of session data. The other methods support authentication but not encryption. -
Question 37 of 40
37. Question
3 pointsWhat are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)Correct
Incorrect
The private IP address blocks that are used inside companies are as follows:
- 10.0.0.0 /8 (any address that starts with 10 in the first octet)
- 172.16.0.0 /12 (any address that starts with 172.16 in the first two octets through 172.31.255.255)
- 192.168.0.0 /16 (any address that starts with 192.168 in the first two octets)
Hint
The private IP address blocks that are used inside companies are as follows:
- 10.0.0.0 /8 (any address that starts with 10 in the first octet)
- 172.16.0.0 /12 (any address that starts with 172.16 in the first two octets through 172.31.255.255)
- 192.168.0.0 /16 (any address that starts with 192.168 in the first two octets)
-
Question 38 of 40
38. Question
1 pointsWhat statement describes the function of the Address Resolution Protocol?Correct
Incorrect
When a PC wants to send data on the network, it always knows the IP address of the destination. However, it also needs to discover the MAC address of the destination. ARP is the protocol that is used to discover the MAC address of a host that belongs to the same network.Hint
When a PC wants to send data on the network, it always knows the IP address of the destination. However, it also needs to discover the MAC address of the destination. ARP is the protocol that is used to discover the MAC address of a host that belongs to the same network. -
Question 39 of 40
39. Question
1 pointsWhat is the purpose of having a converged network?Correct
Incorrect
With the development of technology, companies can now consolidate disparate networks onto one platform called a converged network. In a converged network, voice, video, and data travel over the same network, thus eliminating the need to create and maintain separate networks. This also reduces the costs associated with providing and maintaining the communication network infrastructure.Hint
With the development of technology, companies can now consolidate disparate networks onto one platform called a converged network. In a converged network, voice, video, and data travel over the same network, thus eliminating the need to create and maintain separate networks. This also reduces the costs associated with providing and maintaining the communication network infrastructure. -
Question 40 of 40
40. Question
5 pointsRefer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)
Sort elements
- FastEthernet0/0
- FastEthernet0/1
- FastEthernet1/0
- FastEthernet1/1
- Serial0/0/0
- The packet is dropped.
-
packets with destination of 172.17.6.15
-
packets with destination of 172.17.14.8
-
packets with destination of 172.17.12.10
-
packets with destination of 172.17.10.5
-
packets with destination of 172.17.8.20
Correct
Incorrect