Last Updated on October 26, 2019 by Admin
IT Essentials Chapter 8 Quiz Answers Online
ITE -- Chapter 8 Quiz
Quiz-summary
0 of 15 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
Information
ITE — Chapter 8 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 15 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Answered
- Review
-
Question 1 of 15
1. Question
1 pointsWhich cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?Correct
Incorrect
This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.Hint
This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud. -
Question 2 of 15
2. Question
1 pointsWhat is the difference between a data center and cloud computing?Correct
Incorrect
Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff.
Hint
Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff.
-
Question 3 of 15
3. Question
1 pointsA technician wishes to update the NIC driver for a computer. What is the best location for finding new drivers for the NIC?Correct
Incorrect
-
Question 4 of 15
4. Question
1 pointsA technician has just installed a new NIC in a laptop. When the cable is plugged in, the technician notices that the LEDs on the NIC are green and one LED is flashing. What does this usually signify?Correct
Incorrect
If the LEDs are unlit, it could mean that either the NIC, the switch port, or the cable is faulty. it might also indicate an issue with the NIC configuration. Green or amber lights typically mean that the NIC is functioning correctly. A flashing green or amber light often indicates network activity.
Hint
If the LEDs are unlit, it could mean that either the NIC, the switch port, or the cable is faulty. it might also indicate an issue with the NIC configuration. Green or amber lights typically mean that the NIC is functioning correctly. A flashing green or amber light often indicates network activity.
-
Question 5 of 15
5. Question
1 pointsA technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?Correct
Incorrect
Windows Remote Desktop allows a technician to log in to a remote computer through an existing user account. The technician can run programs and view and manipulate files within the system of the remote computer.
Hint
Windows Remote Desktop allows a technician to log in to a remote computer through an existing user account. The technician can run programs and view and manipulate files within the system of the remote computer.
-
Question 6 of 15
6. Question
2 pointsUsers in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)Correct
Incorrect
Normally, the closer a wireless NIC is to an access point, the faster the connectivity. This problem does not require the network password to be reissued. The combination of the low bandwidth and the intermittent connectivity is pointing towards a weak signal or interference from outside sources.
Hint
Normally, the closer a wireless NIC is to an access point, the faster the connectivity. This problem does not require the network password to be reissued. The combination of the low bandwidth and the intermittent connectivity is pointing towards a weak signal or interference from outside sources.
-
Question 7 of 15
7. Question
1 pointsFill in the blank.
……………………….. technology uses different frequencies to transmit multiple signals simultaneously over the same cable.Correct
Incorrect
Broadband technology uses different frequencies, divided into different channels, to allow simultaneous transmission of multiple different signals on the same cable. DSL, cable, and satellite are examples of broadband network connections.
Hint
Broadband technology uses different frequencies, divided into different channels, to allow simultaneous transmission of multiple different signals on the same cable. DSL, cable, and satellite are examples of broadband network connections.
-
Question 8 of 15
8. Question
1 pointsWhich operation should a network technician perform as a part of regular preventive maintenance procedures on the network?Correct
Incorrect
Network preventive maintenance procedures include checking the condition of cables, network devices, servers, and computers to make sure that they are kept clean and are in good working order.
Hint
Network preventive maintenance procedures include checking the condition of cables, network devices, servers, and computers to make sure that they are kept clean and are in good working order.
-
Question 9 of 15
9. Question
1 pointsWhich special character must be included at the end of a folder name to identify a folder as an administrative share?Correct
Incorrect
The dollar sign ($) at the end of a folder name will identify that folder as an administrative share.
Hint
The dollar sign ($) at the end of a folder name will identify that folder as an administrative share.
-
Question 10 of 15
10. Question
1 pointsFill in the blank.
The process that a wireless router uses to translate a private IP address on internal traffic to a routable address for the Internet is called ……………………….. .Correct
Incorrect
Wireless routers use Network Address Translation to translate internal or private addresses into Internet-routable or public addresses.
Hint
Wireless routers use Network Address Translation to translate internal or private addresses into Internet-routable or public addresses.
-
Question 11 of 15
11. Question
2 pointsA technician is troubleshooting a computer that has lost connectivity to the network. After data is gathered from the customer, which two tasks should the technician complete next? (Choose two.)Correct
Incorrect
In troubleshooting, once data is gathered from the user, the technician must identify the problem.
Hint
In troubleshooting, once data is gathered from the user, the technician must identify the problem.
-
Question 12 of 15
12. Question
1 pointsWhich network service automatically assigns IP addresses to devices on the network?Correct
Incorrect
Dynamic Host Configuration Protocol (DHCP) can be used to allow end devices to automatically configure IP information, such as their IP address, subnet mask, DNS server, and default gateway. The DNS service is used to provide domain name resolution, mapping hostnames to IP addresses. Telnet is a method for remotely accessing a CLI session of a switch or router. Traceroute is a command used to determine the path a packet takes as it traverses the network.
Hint
Dynamic Host Configuration Protocol (DHCP) can be used to allow end devices to automatically configure IP information, such as their IP address, subnet mask, DNS server, and default gateway. The DNS service is used to provide domain name resolution, mapping hostnames to IP addresses. Telnet is a method for remotely accessing a CLI session of a switch or router. Traceroute is a command used to determine the path a packet takes as it traverses the network.
-
Question 13 of 15
13. Question
1 pointsWhich technology requires customers to be within a particular range of the service provider facility in order to be provided the maximum bandwidth for Internet access?Correct
Incorrect
Look in the curriculum graphics. The closer to the CO the connection is located, the higher the possible DSL speed.
Hint
Look in the curriculum graphics. The closer to the CO the connection is located, the higher the possible DSL speed.
-
Question 14 of 15
14. Question
1 pointsWhich command is used to manually query a DNS server to resolve a specific host name?Correct
Incorrect
The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.
Hint
The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.
-
Question 15 of 15
15. Question
1 pointsWhich security technology is used to passively monitor network traffic with the objective of detecting a possible attack?Correct
Incorrect
An IDS system is implemented to passively monitor the traffic on a network. Both an IPS and a firewall actively monitor network traffic and take immediate actions when previously defined security criteria match. A proxy server, when it functions as a firewall, also actively monitors the traffic that travels through it and takes immediate actions.
Hint
An IDS system is implemented to passively monitor the traffic on a network. Both an IPS and a firewall actively monitor network traffic and take immediate actions when previously defined security criteria match. A proxy server, when it functions as a firewall, also actively monitors the traffic that travels through it and takes immediate actions.