Last Updated on October 26, 2019 by Admin
IT Essentials Checkpoint Exam Online
ITE -- Checkpoint Exam
Quiz-summary
0 of 45 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
Information
ITE — Checkpoint Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 45 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- Answered
- Review
-
Question 1 of 45
1. Question
3 pointsWhat three voltages are commonly provided by the power supply to the various components inside the computer? (Choose three.)Correct
Incorrect
Computer power supplies typically deliver three voltages to various components inside the computer. These are 3.3 volts for CPUs, 5 volts for motherboard components, and 12 volts for disk drive motors.Hint
Computer power supplies typically deliver three voltages to various components inside the computer. These are 3.3 volts for CPUs, 5 volts for motherboard components, and 12 volts for disk drive motors. -
Question 2 of 45
2. Question
1 pointsHard drives in a grocery warehouse keep failing because of vibrations in the warehouse environment. What would be a possible solution for this high failure rate?Correct
Incorrect
SSD drives are an outstanding choice in extreme temperatures, in unusual environments, and in an environment where there are vibrations.Hint
SSD drives are an outstanding choice in extreme temperatures, in unusual environments, and in an environment where there are vibrations. -
Question 3 of 45
3. Question
1 pointsA server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?Correct
Incorrect
RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well.Hint
RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well. -
Question 4 of 45
4. Question
1 pointsWhich type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?Correct
Incorrect
The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.Hint
The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output. -
Question 5 of 45
5. Question
1 pointsRefer to the exhibit. To what input device would the cables attach?
Correct
Incorrect
A KVM switch is commonly used to connect one mouse, keyboard, and monitor to multiple computers.Hint
A KVM switch is commonly used to connect one mouse, keyboard, and monitor to multiple computers. -
Question 6 of 45
6. Question
1 pointsA desktop user has requested the ability to easily transfer photos from a camera SD card to a computer. Which device can be installed on the desktop computer to fulfill this request?Correct
Incorrect
A media reader has the ability to read and write to memory cards commonly contained in digital cameras, smart phones, and MP3 players. The memory card can be placed into the media reader and the data can be transferred. A storage controller is a chip that allows for the expansion of internal and external drives. A graphics card increases the overall performance of a computer for gaming and video editing. A capture card is used to import a video stream into a computer and record it to a hard disk.Hint
A media reader has the ability to read and write to memory cards commonly contained in digital cameras, smart phones, and MP3 players. The memory card can be placed into the media reader and the data can be transferred. A storage controller is a chip that allows for the expansion of internal and external drives. A graphics card increases the overall performance of a computer for gaming and video editing. A capture card is used to import a video stream into a computer and record it to a hard disk. -
Question 7 of 45
7. Question
1 pointsWhich is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?Correct
Incorrect
Anyone using a fire extinguisher should remember the basic rules of operation:
P – Pull the pin.
A – Aim at the base of the fire, not at the flames.
S – Squeeze the lever.
S – Sweep the nozzle from side to side.Hint
Anyone using a fire extinguisher should remember the basic rules of operation:
P – Pull the pin.
A – Aim at the base of the fire, not at the flames.
S – Squeeze the lever.
S – Sweep the nozzle from side to side. -
Question 8 of 45
8. Question
1 pointsWhich measure can help control RFI effects on wireless networks?Correct
Incorrect
A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.Hint
A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones. -
Question 9 of 45
9. Question
1 pointsWhat can be tested with a digital multimeter?Correct
Incorrect
A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.Hint
A digital multimeter can test the integrity of circuits and the quality of electricity in computer components. -
Question 10 of 45
10. Question
1 pointsWhich disk management tool scans the critical files of an operating system and replaces the corrupt files?Correct
Incorrect
System File Checker will scan critical files of an operating system and replace corrupt files. Scandisk and Chkdsk check the integrity of files and folders on a hard drive. Optimize Drives optimizes space on a hard drive. Disk Cleanup will clear space on a hard drive by looking for files that can be deleted.Hint
System File Checker will scan critical files of an operating system and replace corrupt files. Scandisk and Chkdsk check the integrity of files and folders on a hard drive. Optimize Drives optimizes space on a hard drive. Disk Cleanup will clear space on a hard drive by looking for files that can be deleted. -
Question 11 of 45
11. Question
1 pointsWhich action can reduce the risk of ESD damage when computer equipment is being worked on?Correct
Incorrect
To help prevent ESD damage, use grounded mats on work benches and grounded floor mats in work areas. You can also use an antistatic wrist strap to prevent ESD strikes except when working inside power supplies or CRT monitors.Hint
To help prevent ESD damage, use grounded mats on work benches and grounded floor mats in work areas. You can also use an antistatic wrist strap to prevent ESD strikes except when working inside power supplies or CRT monitors. -
Question 12 of 45
12. Question
2 pointsWhen a used CPU is being installed, what two items should be used to clean the top of the CPU and the base of the heat sink before applying thermal compound? (Choose two.)Correct
Incorrect
Isopropyl alcohol and a lint-free cloth can be used to remove the old thermal compound from a CPU and heat sink. Because it could potentially leave residual fibers, a cotton swab should definitely not be used. Water of any type would not be able to help dissolve the thermal compound.Hint
Isopropyl alcohol and a lint-free cloth can be used to remove the old thermal compound from a CPU and heat sink. Because it could potentially leave residual fibers, a cotton swab should definitely not be used. Water of any type would not be able to help dissolve the thermal compound. -
Question 13 of 45
13. Question
1 pointsA technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?Correct
Incorrect
Time and date settings are retained in CMOS when the power is turned off. The CMOS battery allows these settings to be retained. Time and date are set in BIOS, but upgrading it will not aid in keeping the settings. Reinstalling the OS would have no effect on the ability of the computer to retrieve these settings.Hint
Time and date settings are retained in CMOS when the power is turned off. The CMOS battery allows these settings to be retained. Time and date are set in BIOS, but upgrading it will not aid in keeping the settings. Reinstalling the OS would have no effect on the ability of the computer to retrieve these settings. -
Question 14 of 45
14. Question
2 pointsWhich two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.)Correct
Incorrect
A technician would use the BIOS to monitor CPU clock speed and CPU fan speed if overheating was suspected. Monitoring the motherboard voltage, hard drive speed, and Trusted Platform Module settings would not provide information relevant to computer overheating.Hint
A technician would use the BIOS to monitor CPU clock speed and CPU fan speed if overheating was suspected. Monitoring the motherboard voltage, hard drive speed, and Trusted Platform Module settings would not provide information relevant to computer overheating. -
Question 15 of 45
15. Question
1 pointsWhat component can be replaced and upgraded on a PC to increase the data processing speed?Correct
Incorrect
Replacing or upgrading a CPU with a faster clock speed will increase data processing speed. Adding more RAM or replacing a hard disk that is faster (higher RPM) will enhance the performance of the PC by reducing the needs for virtual memory swapping and reducing the time needed to retrieve and store data from/to the hard disk. However, only the CPU is responsible for the task of data processing.Hint
Replacing or upgrading a CPU with a faster clock speed will increase data processing speed. Adding more RAM or replacing a hard disk that is faster (higher RPM) will enhance the performance of the PC by reducing the needs for virtual memory swapping and reducing the time needed to retrieve and store data from/to the hard disk. However, only the CPU is responsible for the task of data processing. -
Question 16 of 45
16. Question
2 pointsWhat are two effects of not having a preventive maintenance plan for users and organizations? (Choose two.)Correct
Incorrect
Having a preventive maintenance plan in place can lead to improved reliability, performance, and efficiency in the IT infrastructure. If a preventive maintenance plan is not in place, it can often lead to issues that will cause infrastructure downtime and significant repair costs. A preventive maintenance plan helps ensure that these costly issues are handled before they become a problem.Hint
Having a preventive maintenance plan in place can lead to improved reliability, performance, and efficiency in the IT infrastructure. If a preventive maintenance plan is not in place, it can often lead to issues that will cause infrastructure downtime and significant repair costs. A preventive maintenance plan helps ensure that these costly issues are handled before they become a problem. -
Question 17 of 45
17. Question
3 pointsWhich three actions should be part of a regular computer preventive maintenance plan? (Choose three.)Correct
Incorrect
Removing dust from fan intakes, the power supply, and peripherals helps maintain hardware. Installing appropriate security updates helps keep operating systems and software programs secure. Removing unwanted programs recovers hard drive space and improves access time. Changing browser settings and deleting old email are user preferences. Installing more RAM would be done to address a problem, not as preventive maintenance.Hint
Removing dust from fan intakes, the power supply, and peripherals helps maintain hardware. Installing appropriate security updates helps keep operating systems and software programs secure. Removing unwanted programs recovers hard drive space and improves access time. Changing browser settings and deleting old email are user preferences. Installing more RAM would be done to address a problem, not as preventive maintenance. -
Question 18 of 45
18. Question
3 pointsIf a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.)Correct
Incorrect
If there is not a current backup of the data and the technician is not able to create one, then a liability release form signed by the customer should contain the following information:
- Permission to work on the computer without a current backup available
- Release from liability if data is lost or corrupted
- Description of the work to be performed
Hint
If there is not a current backup of the data and the technician is not able to create one, then a liability release form signed by the customer should contain the following information:
- Permission to work on the computer without a current backup available
- Release from liability if data is lost or corrupted
- Description of the work to be performed
-
Question 19 of 45
19. Question
1 pointsWhat is the first step in the troubleshooting process?Correct
Incorrect
The first step in the troubleshooting process is to gather data and information.The gathering process should begin with the technician asking the user direct questions.Hint
The first step in the troubleshooting process is to gather data and information.The gathering process should begin with the technician asking the user direct questions. -
Question 20 of 45
20. Question
1 pointsAfter performing a preventive maintenance on a PC, the technician attempts to power on the PC only to find that nothing happens. What is the most likely problem?Correct
Incorrect
When maintenance is being performed, the computer should be unplugged for cleaning. The CPU should not be removed from the motherboard during maintenance. The BIOS configuration does not have to be redone and would not cause these symptoms. It is unlikely that the power supply voltage switch would have been accidentally moved.Hint
When maintenance is being performed, the computer should be unplugged for cleaning. The CPU should not be removed from the motherboard during maintenance. The BIOS configuration does not have to be redone and would not cause these symptoms. It is unlikely that the power supply voltage switch would have been accidentally moved. -
Question 21 of 45
21. Question
1 pointsWhich statement describes a characteristic of a network operating system?Correct
Incorrect
Network operating systems support multiple users, run multiuser applications, and are typically used in large corporate network environments.Hint
Network operating systems support multiple users, run multiuser applications, and are typically used in large corporate network environments. -
Question 22 of 45
22. Question
1 pointsWhat technology was created to replace the BIOS program on modern personal computer motherboards?Correct
Incorrect
As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.Hint
As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program. -
Question 23 of 45
23. Question
2 pointsOn which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)Correct
Incorrect
-
Question 24 of 45
24. Question
1 pointsWhich key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?Correct
Incorrect
-
Question 25 of 45
25. Question
1 pointsIn which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?Correct
Incorrect
The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder.Hint
The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder. -
Question 26 of 45
26. Question
1 pointsA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?Correct
Incorrect
Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.Hint
Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding. -
Question 27 of 45
27. Question
1 pointsWhat does virtual memory provide to an operating system?Correct
Incorrect
The OS uses virtual memory when a computer does not have enough RAM available to run a program. Virtual memory moves data from RAM and places it in a paging file on the hard drive. A paging file is a place where data is stored until enough RAM is available to process the data. This process is much slower than accessing the RAM directly.Hint
The OS uses virtual memory when a computer does not have enough RAM available to run a program. Virtual memory moves data from RAM and places it in a paging file on the hard drive. A paging file is a place where data is stored until enough RAM is available to process the data. This process is much slower than accessing the RAM directly. -
Question 28 of 45
28. Question
1 pointsA PC technician is having trouble with a Windows-based system and wants to perform a system restore from the command prompt. What command would start this process?Correct
Incorrect
The functions of the listed commands are as follows:
- tasklist – displays currently running applications
- robocopy – copies a file
- sfc – checks and replaces missing or damaged system files
- gpupdate – refreshes group policy settings
- rstrui – starts the System Restore utility
Hint
The functions of the listed commands are as follows:
- tasklist – displays currently running applications
- robocopy – copies a file
- sfc – checks and replaces missing or damaged system files
- gpupdate – refreshes group policy settings
- rstrui – starts the System Restore utility
-
Question 29 of 45
29. Question
1 pointsA technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?Correct
Incorrect
A hosted hypervisor allows the underlying operating system to control the allocation of physical resources. Windows Virtual PC is an example of a Hosted hypervisor. Disabling hyperthreading or limiting the amount of paged RAM will not allow the virtual machine to control the physical resources.Hint
A hosted hypervisor allows the underlying operating system to control the allocation of physical resources. Windows Virtual PC is an example of a Hosted hypervisor. Disabling hyperthreading or limiting the amount of paged RAM will not allow the virtual machine to control the physical resources. -
Question 30 of 45
30. Question
1 pointsA company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point?Correct
Incorrect
-
Question 31 of 45
31. Question
1 pointsA user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?Correct
Incorrect
UAC is used to change user account settings while converting the file system to FAT16 and updating the driver for the graphics card will not resolve the issue. Compatibility mode in Windows 7 allows for the running of a program created for previous versions of the Windows environment.Hint
UAC is used to change user account settings while converting the file system to FAT16 and updating the driver for the graphics card will not resolve the issue. Compatibility mode in Windows 7 allows for the running of a program created for previous versions of the Windows environment. -
Question 32 of 45
32. Question
2 pointsA network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)Correct
Incorrect
Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.Hint
Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced. -
Question 33 of 45
33. Question
1 pointsAt which TCP/IP model layer would a MAC address be found?Correct
Incorrect
-
Question 34 of 45
34. Question
1 pointsA technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?Correct
Incorrect
802.11n devices are interoperable with all the other standards, and provide more bandwidth than the other standards. 802.11a is not interoperable with any of the other standards. 802.11b and 802.11g interoperate with each other, but do not provide the bandwidth supplied by 802.11n devices.Hint
802.11n devices are interoperable with all the other standards, and provide more bandwidth than the other standards. 802.11a is not interoperable with any of the other standards. 802.11b and 802.11g interoperate with each other, but do not provide the bandwidth supplied by 802.11n devices. -
Question 35 of 45
35. Question
1 pointsA customer who wants to enhance home network security is shopping for devices. The sales representative recommends a device that has a hardware firewall. Which device can provide this service?Correct
Incorrect
An integrated router usually includes a hardware firewall. A home wireless router is a type of integrated router.Hint
An integrated router usually includes a hardware firewall. A home wireless router is a type of integrated router. -
Question 36 of 45
36. Question
1 pointsCopper network cables consist of pairs of wires that are twisted together. Which type of signal interference is reduced or prevented by this?Correct
Incorrect
Crosstalk occurs when a signal from one wire interferes with a signal from another wire in the same cable. The twisting of wire pairs helps to protect against crosstalk.Hint
Crosstalk occurs when a signal from one wire interferes with a signal from another wire in the same cable. The twisting of wire pairs helps to protect against crosstalk. -
Question 37 of 45
37. Question
1 pointsA computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?Correct
Incorrect
If a computer is configured with DHCP but it cannot communicate with the DHCP server in order to obtain an IP address, the Windows OS automatically assigns a link-local IP, in the range of 169.254.0.0 to 169.254.255.255. The computer can only communicate with other computers connected to the same 169.254.0.0/16 network and cannot communicate with computers in another network.Hint
If a computer is configured with DHCP but it cannot communicate with the DHCP server in order to obtain an IP address, the Windows OS automatically assigns a link-local IP, in the range of 169.254.0.0 to 169.254.255.255. The computer can only communicate with other computers connected to the same 169.254.0.0/16 network and cannot communicate with computers in another network. -
Question 38 of 45
38. Question
1 pointsA user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?Correct
Incorrect
Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced.Hint
Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced. -
Question 39 of 45
39. Question
1 pointsA home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?Correct
Incorrect
-
Question 40 of 45
40. Question
1 pointsWhy would an administrator use Windows Remote Desktop and Windows Remote Assistant?Correct
Incorrect
Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing.Hint
Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing. -
Question 41 of 45
41. Question
1 pointsA corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?Correct
Incorrect
A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network.Hint
A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network. -
Question 42 of 45
42. Question
1 pointsWhat physical layer medium is used by DSL to provide high-speed data communications?Correct
Incorrect
DSL uses existing telephone lines to carry voice and data traffic at the same time. DSL uses a filter to separate the traffic.Hint
DSL uses existing telephone lines to carry voice and data traffic at the same time. DSL uses a filter to separate the traffic. -
Question 43 of 45
43. Question
1 pointsThe current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?Correct
Incorrect
In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.Hint
In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses. -
Question 44 of 45
44. Question
1 pointsWhat is the function of the DNS server?Correct
Incorrect
-
Question 45 of 45
45. Question
1 pointsA computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?Correct
Incorrect
The default gateway is the address of the device a host uses to access the Internet or another network. If the default gateway is missing or incorrect, that host will not be able to communicate outside the local network. Because the host can access other hosts on the local network, the network cable and the other parts of the IP configuration are working.Hint
The default gateway is the address of the device a host uses to access the Internet or another network. If the default gateway is missing or incorrect, that host will not be able to communicate outside the local network. Because the host can access other hosts on the local network, the network cable and the other parts of the IP configuration are working.