Cisco IT Essentials Chapter 8 Exam

Cisco IT Essentials Chapter 8 Exam Answers

 

1

Which two factors are used to determine the different categories of UTP cabling? (Choose two.)

The distance a signal can travel through the cable.

The number of twists in the wires inside the cable.

The number of wires inside the cable.

The type of shielding used inside the cable.

The type of connectors required to terminate the cable.

 

2

Which suite of protocols is used to transmit data across the Internet?

Appletalk

ARP

DNS

IPX/SPX

TCP/IP

 

3

Which Windows XP command displays the route taken by packets crossing an IP network?

iproute

netview

nslookup

ping

tracert

 

4

What is the most commonly used DSL technology?

ADSL

HDSL

IDSL

SDSL

VDSL

 

5

Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN?

ADSL

ISDN

VPN

WAN

 

6

The Internet is an example of which type of network?

LAN

SAN

WAN

WLAN

 

7

Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?

default gateway

MAC address

physical address

subnet mask

 

8

What is the maximum range a data signal can travel through a 1000BASE-T network segment?

3280 ft (1000 m)

1640 ft (500 m)

984 ft (300 m)

607 ft (185 m)

328 ft (100 m)

 

9

Why should network cables always be labeled?

to prevent cable wear

to improve appearance

to reduce network clutter

to save troubleshooting time

 

10

Which method is recommended in order to avoid problems with counterfeit network equipment?

Buy extra parts in case one fails.

Only install equipment that comes with a user manual.

Purchase equipment only through manufacturer-authorized partners.

Use items of uncertain authenticity only in non-mission critical applications.

 


11

A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.)

faulty NIC

bad IP address

faulty patch cord

unavailable DHCP server

incorrect protocol configuration

 

12

A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?

the laptop battery level

the IP address that is assigned to the laptop

the power level of the wireless antenna

the available wireless networks within range

the distance from the school-owned wireless device

 

13

Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?

Manually assign an IP address.

Configure the NIC for a MAC address.

Attach a cable that has an RJ-45 connector.

Configure the NIC for a specific network protocol.

 

14

Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)

The network is small with less than eight users.

The company network requires secure access to confidential information.

The users need a central database to store inventory and sales information.

Each user understands how to safely share files across a network.

The data gathered by the employees is critical and should be backed up on a regular basis.

All employees passed a strict background check as part of the corporate hiring practices.

 

15

Which two statements are true of network computing in contrast to non-network computing? (Choose two.)

File duplication is more likely.

Fewer peripherals are needed.

Resource conservation is decreased.

Application licensing costs are higher.

Centralized administration capabilities are enhanced.

 

16

What is true about the TIA/EIA?

It develops and maintains the 802 standards for LANs.

It establishes consensus processes among qualified groups.

It defined the Open Systems Interconnection networking model.

It developed standards to replace proprietary standards after U.S. telephone industry deregulation.

 

17

A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

a bad network cable

interference from surrounding devices

reduced computer power supply output

static IP addressing with incomplete information

 

18

Which two characteristics describe Ethernet technology? (Choose two.)

supported by IEEE 802.3 standards

supported by IEEE 802.5 standards

typically uses an average of 16 Mb/s for data transfer rates

uses a bus logical topology

uses a ring topology

 

19

Which device enables computers to be attached to a network without segmenting the network?

bridge

hub

router

switch

 

20

Which networking protocol translates a network name such as www.cisco.com to a unique IP address?

APIPA

ARP

DHCP

DNS

Proxy ARP


Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Or, Search the web:
Custom Search
Advertisement