IT Essentials ( Version 7.00) – ITE 7.0 Certification Checkpoint Exam Chapters 5 – 6 Answers

Last Updated on October 10, 2019 by Admin

IT Essentials ( Version 7.0) – ITE 7.0 Certification Checkpoint Exam Chapters 5 – 6 Answers

  1. A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

    • It cannot communicate outside its own network.
    • It can communicate on the local network as well as on the Internet.
    • It can communicate with networks inside a particular company with subnets.
    • It has a public IP address that has been translated to a private IP address.
      Explanation:

      If a computer is configured with DHCP but it cannot communicate with the DHCP server in order to obtain an IP address, the Windows OS automatically assigns a link-local IP, in the range of 169.254.0.0 to 169.254.255.255. The computer can only communicate with other computers connected to the same 169.254.0.0/16 network and cannot communicate with computers in another network.

  2. A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?

    • Add a new 802.11a device.
    • Add a new 802.11b device.
    • Add a new 802.11g device.
    • Add a new 802.11n device.
      Explanation:

      802.11n devices are interoperable with all the other standards, and provide more bandwidth than the other standards. 802.11a is not interoperable with any of the other standards. 802.11b and 802.11g interoperate with each other, but do not provide the bandwidth supplied by 802.11n devices.

  3. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?

    • APIPA
    • DHCP
    • DIPS
    • ICMP
      Explanation:

      In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.

  4. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

    • The cable is not connected properly to the NIC.
    • The computer has an invalid IP address.
    • The computer has an incorrect subnet mask.
    • The computer has an invalid default gateway address.
      Explanation:

      The default gateway is the address of the device a host uses to access the Internet or another network. If the default gateway is missing or incorrect, that host will not be able to communicate outside the local network. Because the host can access other hosts on the local network, the network cable and the other parts of the IP configuration are working.

  5. What physical layer medium is used by DSL to provide high-speed data communications?

    • telephone lines
    • television cable
    • Satellite dish
    • 4G wireless radio
      Explanation:

      DSL uses existing telephone lines to carry voice and data traffic at the same time. DSL uses a filter to separate the traffic.

  6. A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?

    • hub
    • wireless router
    • switch
    • patch panel
      Explanation:

      A wireless router connects multiple wireless devices to the network. It will then aggregate the internet access requests from home devices to the internet.

  7. A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a.com, from a domain registry service. The new web server is accessible through the IP address matching the domain. However, when the technician types company-a.com in the web browser, an error message displays saying that “The connection has timed out”. What is the problem?

    • The DHCP server is down.
    • The domain name resolution failed.
    • The URL needs to be http://company-a.com.
    • A web page named home.html is required to be created first.
      Explanation:

      A web URL is in the form of protocol://domain-name/resource. The web server IP address can be used in place of domain-name. The resource is the file structure and file name under the web service. If the domain name is used in the URL, the IP address matching to the domain name must be found first through the name resolution process. HTTP is the default protocol by all web browsers so that a user is not required to type it when accessing a website. Also, home.html is not required for a web server to function. Even if the technician does not create any web page during the installation and configuration process, major web servers have a built-in mechanism to display a greeting message if the web server runs normally.

  8. A network technician is setting up a web server for a small company. The company has obtained a domain name companyX.com from a domain registry service. The web server must provide secure communication through SSL/TLS technology. When the technician enters companyX.com in the web browser, the unsecured part of the website is displayed. What should the technician do to make the web browser display the secure content of the web server?

    • Use https://companyX.com as the URL.
    • Use http://companyX.com as the URL.
    • Use http://companyX.com::443 as the URL.
    • Ensure that the domain name is successfully resolved.
      Explanation:

      A web URL is in the form protocol://domain-name/resource. HTTP is the default protocol used by all web browsers so that if a user does not specify the protocol in the URL, HTTP is used by default. In order to access the secure content serviced through SSL/TLS, a user must specify HTTPS as the protocol in the URL.

  9. A small company is upgrading its phone system with IP phones. These phones can be used just by plugging into a network port in the offices. Which technology would support the IP phones?

    • wireless power transfer
    • Power over Ethernet
    • NFC
    • UPnP
      Explanation:

      Power over Ethernet (PoE) is implemented through switches. A PoE switch transfers small amounts of DC current over an Ethernet cable, along with the data, to power PoE devices. Low voltage devices that support PoE, such as IP phones, can be powered through the Ethernet cable.

  10. A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disable an option on the access point that would allow devices to dynamically add themselves to the network without configuration. Which technology should the technician disable?

    • NAT
    • UPnP
    • MAC filtering
    • port forwarding
      Explanation:

      Universal Plug and Play (UPnP) is a protocol that enables devices to dynamically add themselves to a network without the need for user intervention or configuration. Although convenient, UPnP is not secure. The UPnP protocol has no method for authenticating devices. In addition, the UPnP protocol has numerous security vulnerabilities. This protocol should be disabled.

  11. A small company connects data acquisition equipment to the serial port of a computer. The equipment user has reported that not all data is being received by the computer. A technician wants to check the serial communication between the equipment and the computer. Which tool can the technician use to troubleshoot the serial communication?

    • multimeter
    • cable tester
    • loopback plug
    • tone generator and probe
      Explanation:

      A loopback plug is a device that connects to a computer to perform a diagnostic procedure called a loopback test. In a loopback test, a signal is transmitted through a circuit and then returned to the sending device to test the integrity of the data transmission.

  12. An administrator is setting up a framework to support access control on a network device. What type of server is able to control those who are permitted to access a network and track what actions they perform while accessing the network?

    • authentication server
    • print server
    • FTP server
    • DNS server
  13. A company is setting up one new laser printer on every floor. What type of server will store the print jobs in a queue and then spool them to the device when it is ready?

    • print server
    • FTP server
    • proxy server
    • web server
  14. What network service controls those who are permitted to access a network, what they can do while they are there, and track what actions they perform while accessing the network?

    • AAA
    • FTP server
    • web server
    • print server
  15. A technician is setting up a server that requires two connections between the client and the server, one for commands and replies, the other for the actual transfer of files. What type of server will accomplish this task?

    • FTP server
    • web server
    • proxy server
    • print server
  16. A technician is setting up an environment where popular and frequently accessed web pages are stored locally on the internal network. What type of server will accomplish this task?

    • proxy server
    • FTP server
    • web server
    • print server
  17. A user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?

    • DNS server
    • web server
    • proxy server
    • FTP server
  18. An administrator is setting up a framework to support access control on a network device. What type of server is able to control those who are permitted to access a network and track what actions they perform while accessing the network?

    • authentication server
    • FTP server
    • web server
    • print server
  19. An administrator is setting up a framework to support access control on a network device. What type of server is able to control those who are permitted to access a network and track what actions they perform while accessing the network?

    • authentication server
    • FTP server
    • web server
    • DHCP
  20. A company is setting up one new laser printer on every floor. What type of server will store the print jobs in a queue and then spool them to the device when it is ready?

    • print server
    • DNS server
    • DHCP
    • FTP server
  21. What network service controls those who are permitted to access a network, what they can do while they are there, and track what actions they perform while accessing the network?

    • AAA
    • DNS server
    • DHCP
    • print server
  22. Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

    • 2002:42:10:c400::909
    • 2002:420:c4:1008:25:190::990
    • 2002:4200::25:1090:0:99
    • 2002:42::25:1090:0:99
  23. Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

    • fe80:9ea:0:2200::fe0:290
    • fe80:9:20::b000:290
    • fe80:9ea0::2020:0:bf:e0:9290
    • fe80::0220:0b3f:f0e0:0029
  24. Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?

    • 2002:420:c4:1008:25:190::990
    • 200:420:110:c4b::910:0:90
    • 2002:42:10:c400::909
    • 2002:42::25:1090:0:99
  25. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?

    • 2001:db8::ab8:1:0:1000
    • 2001:db8:1::ab8:0:1
    • 2001:db8::a0b0:8:1
    • 2001:db8:0:1::8:1
  26. Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?

    • fe80::220:b3f:f0e0:29
    • fe80:9ea:0:2200::fe0:290
    • fe80:9ea0::2020:0:bf:e0:9290
    • fe80:9ea0::2020::bf:e0:9290
  27. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

    • 2001:db8::a0b0:8:1
    • 2001:db80:0:1::80:1
    • 2001:db8::ab8:1:0:1000
    • 2001:db8:0:1::8:
  28. Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

    • fe80:9ea:0:2200::fe0:290
    • fe80:9:20::b000:290
    • fe80:9ea0::2020:0:bf:e0:9290
    • fe80:9ea0::2020::bf:e0:9290
  29. Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

    • 2002:42:10:c400::909
    • 200:420:110:c4b::910:0:90
    • 2002:4200::25:1090:0:99
    • 2002:42::25:1090:0:99
  30. Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?

    • 2002:420:c4:1008:25:190::990
    • 2002:42:10:c400::909
    • 2002:4200::25:1090:0:99
    • 2002:42::25:1090:0:99
  31. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

    • 2001:db8::a0b0:8:1
    • 2001:db8:1::ab8:0:1
    • 2001:db8::ab8:1:0:1000
    • 2001:db8:0:1::8:1