This action might not be possible to undo. Are you sure you want to continue?
1. Assessment Selection
2. Assessment Settings
3. Take Assessment
Take Assessment - Chapter 8 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Top of Form
The Internet is an example of which type of network? LAN SAN WAN WLAN
Bottom of Form
2 Top of Form Which suite of protocols is used to transmit data across the Internet? Appletalk ARP DNS IPX/SPX TCP/IP Bottom of Form 3 Top of Form Workers are required to access the company LAN when traveling.) The network is small with less than eight users. .) File duplication is more likely. Fewer peripherals are needed. Application licensing costs are higher. Resource conservation is decreased. Which networking technology can provide secure and encrypted access to the LAN? ADSL ISDN VPN WAN Bottom of Form 4 Top of Form Which two statements are true of network computing in contrast to non-network computing? (Choose two. Centralized administration capabilities are enhanced. Bottom of Form 5 Top of Form Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choo three.
cisco. The users need a central database to store inventory and sales information. All employees passed a strict background check as part of the corporate hiring practices.The company network requires secure access to confidential information. Bottom of Form 6 Top of Form Which Windows XP command displays the route taken by packets crossing an IP network? iproute netview nslookup ping tracert Bottom of Form 7 Top of Form Which networking protocol translates a network name such as www. The data gathered by the employees is critical and should be backed up on a regular basis.com to a unique IP address? APIPA ARP DHCP DNS Proxy ARP Bottom of Form 8 Top of Form What is the maximum range a data signal can travel through a 1000BASE-T network segment? 3280 ft (1000 m) 1640 ft (500 m) . Each user understands how to safely share files across a network.
100.88.984 ft (300 m) 607 ft (185 m) 328 ft (100 m) Bottom of Form 9 Top of Form A student is helping a friend with a home computer that can no longer access the Internet.254. What could cause a computer to get such an IP address? a bad network cable interference from surrounding devices reduced computer power supply output static IP addressing with incomplete information Bottom of Form 10 Top of Form Which dotted decimal number is used to distinguish the network portion of an IP address from the host portio default gateway MAC address physical address subnet mask Bottom of Form 11 Top of Form What is the most commonly used DSL technology? ADSL HDSL IDSL SDSL VDSL . Upon investigation the student discovers that the computer has been assigned the IP address 169.
Bottom of Form 12 Top of Form A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. Attach a cable that has an RJ-45 connector. Configure the NIC for a MAC address. Configure the NIC for a specific network protocol. . What is the first thing that the student should check? the laptop battery level the IP address that is assigned to the laptop the power level of the wireless antenna the available wireless networks within range the distance from the school-owned wireless device Bottom of Form 13 Top of Form Which procedure is normally performed when connecting a computer to an Ethernet network for the first tim Manually assign an IP address. Bottom of Form 14 Top of Form Which device enables computers to be attached to a network without segmenting the network? bridge hub router switch Bottom of Form 15 Top of Form Which two factors are used to determine the different categories of UTP cabling? (Choose two.) The distance a signal can travel through the cable.
The type of shielding used inside the cable. Inc. Assessment Selection 2. The type of connectors required to terminate the cable. The number of wires inside the cable. Privacy Statement and Trademarks.The number of twists in the wires inside the cable. Assessment Settings 3. Bottom of Form Top of Form Showing 1 of 2 <Prev Bottom of Form Page: Next> Close Window All contents copyright 1992-2011 Cisco Systems.IT Essentials: PC Hardware and Software (Version 4. Take Assessment Take Assessment .1) .Chapter 8 Exam . Close Window Assessment System 1.
It developed standards to replace proprietary standards after U.S. Bottom of Form 17 Top of Form A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. It establishes consensus processes among qualified groups. Which two problems could be indicated b this lack of activity? (Choose two.) faulty NIC bad IP address faulty patch cord unavailable DHCP server incorrect protocol configuration Bottom of Form 18 Top of Form Why should network cables always be labeled? to prevent cable wear to improve appearance to reduce network clutter to save troubleshooting time . It defined the Open Systems Interconnection networking model.Time Remaining: 16 Top of Form What is true about the TIA/EIA? It develops and maintains the 802 standards for LANs. telephone industry deregulation. Th technician then notes that the link lights are not active on the NIC.
Only install equipment that comes with a user manual. Bottom of Form 20 Top of Form Which two characteristics describe Ethernet technology? (Choose two. Top of Form Bottom of Form Top of Form Bottom of Form .) supported by IEEE 802.5 standards typically uses an average of 16 Mb/s for data transfer rates uses a bus logical topology uses a ring topology Bottom of Form Top of Form Showing 2 of 2 <Prev Bottom of Form Page: Next> Close Window All contents copyright 1992-2011 Cisco Systems. Use items of uncertain authenticity only in non-mission critical applications.Bottom of Form 19 Top of Form Which method is recommended in order to avoid problems with counterfeit network equipment? Buy extra parts in case one fails. Inc. Privacy Statement and Trademarks.3 standards supported by IEEE 802. Purchase equipment only through manufacturer-authorized partners.