Check answers here:
IT Essentials (Version 8.0) Chapter 6 Exam Answers
Quiz-summary
0 of 34 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
Information
IT Essentials (ITE v6.0 + v7.0) Chapter 6 Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 34 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- Answered
- Review
-
Question 1 of 34
1. Question
1 pointsUsers in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)Correct
Incorrect
Hint
Normally, the closer a wireless NIC is to an access point, the faster the connectivity. This problem does not require the network password to be reissued. The combination of the low bandwidth and the intermittent connectivity is pointing towards a weak signal or interference from outside sources. -
Question 2 of 34
2. Question
1 pointsA wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)Correct
Incorrect
Hint
Disabling DHCP and assigning static IP addresses only to authorized devices will prevent unauthorized devices from automatically obtaining IP address information. Without the correct IP address information, the unauthorized devices will not be able to communicate over the network. Disabling DNS will result in all connected devices no longer automatically being able to communicate with network resources by name (IP addresses would have to be used.), but will not prevent unauthorized devices from connecting and enabling potentially malicious access from occurring. Subnetting the network will change the range of IP addresses used but not prevent unauthorized network access. Disabling SSID broadcasts is only applicable to wireless networks, not wired networks. -
Question 3 of 34
3. Question
1 pointsWhat two default wireless router settings can affect network security? (Choose two.)Correct
Incorrect
Hint
Default settings on wireless routers often include broadcasting the SSID and using a well-known administrative password. Both of these pose a security risk to wireless networks. WEP encryption and MAC address filtering are not set by default. The automatic selection of the wireless channel poses no security risks. -
Question 4 of 34
4. Question
1 pointsA network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (Choose two.)Correct
Incorrect
Hint
A DHCP server can provide several parameters such as IP address, subnet mask, default gateway, and other optional parameters. The host name, media state, and description are present even if a DHCP server is not found. -
Question 5 of 34
5. Question
1 pointsA technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?Correct
Incorrect
Hint
In a network employing dynamic IP addressing, if a computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255. In this case, the computer can only communicate with computers connected to the same network within this IP address range. -
Question 6 of 34
6. Question
1 pointsA user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?Correct
Incorrect
Hint
The default gateway IP address is used to reach other networks, including the Internet. -
Question 7 of 34
7. Question
1 pointsPort triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?Correct
Incorrect
Hint
Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device. -
Question 8 of 34
8. Question
1 pointsA PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?Correct
Incorrect
Hint
The network card is working if the loopback address can be pinged. The LED on the network card being off points towards a faulty cable or a bad connection. -
Question 9 of 34
9. Question
1 pointsThe current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?Correct
Incorrect
Hint
In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses. -
Question 10 of 34
10. Question
1 pointsA technician troubleshooting a network problem has used CLI commands to determine that a computer has not been allocated a correct IP address from the DHCP server. Which command can the technician use to solve this problem?Correct
Incorrect
Hint
The command ipconfig/renew will cause the computer to request a new IP address from the DHCP server. The command ipconfig/release will remove the current IP address but will not request a new address. The commands ping and tracert are used to test network connectivity. -
Question 11 of 34
11. Question
1 pointsWhich network protocol is used to automatically assign an IP address to a computer on a network?Correct
Incorrect
Hint
A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain addresses even when a DHCP server is not present. -
Question 12 of 34
12. Question
1 pointsWhat security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?Correct
Incorrect
Hint
Port forwarding provides a rule-based method to direct traffic between devices on separate networks. This method provides access to devices across the Internet in a less expensive way than using a DMZ. -
Question 13 of 34
13. Question
1 pointsA group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?Correct
Incorrect
Hint
If the PCs are not able to connect to a DHCP, they will be allocated an IP address within the range 169.254.0.0 – 169.254.255.255. -
Question 14 of 34
14. Question
1 pointsWhat is the correct compressed format of the IPv6 address 2001:0db8:eeff:000a:0000:0000:0000:0001?Correct
Incorrect
Hint
There are two rules for IPv6 address compression. Rule 1: leading zeros in any hextet can be removed. Rule 2: contiguous hextets of all zeros can be compressed to a double colon. Rule two can only be applied once. -
Question 15 of 34
15. Question
1 pointsWhat is the proper CIDR prefix notation for a subnet mask of 255.0.0.0?Correct
Incorrect
Hint
The proper CIDR notation for a subnet mask of 255.0.0.0 is /8. This is because the /8 indicates that the first eight bits of the subnet mask are set to binary 1. -
Question 16 of 34
16. Question
1 pointsA technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?Correct
Incorrect
Hint
Channels 1, 6, and 11 are selected because they are 5 channels apart. thus minimizing the interference with adjacent channels. A channel frequency can interfere with channels on either side of the main frequency. All wireless devices need to be used on nonadjacent channels. -
Question 17 of 34
17. Question
1 pointsWhich network server is malfunctioning if a user can ping the IP address of a web server but cannot ping the web server host name?Correct
Incorrect
Hint
If pings are successful to an IP address but not to a host name, then the problem may be that a DNS server cannot be accessed. -
Question 18 of 34
18. Question
1 pointsMultiple users report that the workstations are assigned a 169.254.x.x IP address. The users are able to communicate only between each other. What is a possible solution?Correct
Incorrect
Hint
When a network device automatically obtains the IP address 169.254.x.x, it is unable to receive an IP address from a DHCP server. The DHCP server should be restarted to ensure that it is operational. -
Question 19 of 34
19. Question
1 pointsAn administrator deploys wireless access points across the office to provide wireless network connectivity to users. Each workstation receives an IP address via DHCP. After a file server with a static IP is connected to the wired network, the administrator receives an IP address conflict message. What is a possible solution?Correct
Incorrect
Hint
If an IP address conflict message is displayed, then a single IP address is being used more than once on the same network. To solve this issue, the administrator needs to give a different static IP address to the server on the network. -
Question 20 of 34
20. Question
1 pointsA workstation has been moved from the first floor to the fifth floor within an organization. The user is now reporting that the workstation cannot connect to the network. A technician suspects that the workstation could not obtain an IP address from a DHCP server. What is a possible cause of the problem?Correct
Incorrect
Hint
In most cases in an organization, when a computer is moved from one department to another, it needs a new IP address to connect to the network. When a computer is configured with a static IP address, it will not initiate the process of obtaining a new IP address from DHCP servers. -
Question 21 of 34
21. Question
1 pointsA device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?Correct
Incorrect
Hint
The address has a prefix length of /64. Thus the first 64 bits represent the network portion, whereas the last 64 bits represent the host portion of the IPv6 address. -
Question 22 of 34
22. Question
1 pointsWhich IPv6 address represents the most compressed form of the IPv6 address 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80?Correct
Incorrect
Hint
There are two rules that exist to help in the reduction of the number of digits within an IPv6 address: Rule 1 is used to remove any leading 0s. After applying rule 1 to 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80, we calculate the outcome as 2001:db8:cafe:0:835:0:0:aa0/80. Rule 2 is used to replace any group of consecutive zeros once throughout the IPv6 address. After applying rule 2 to 2001:db8:cafe:0:835:0:0:aa0/80, we calculate the outcome as 2001:db8:cafe:0:835::aa0/80. -
Question 23 of 34
23. Question
1 pointsAfter having talked to the customer, a network technician suspects that an invalid IP address is the most likely cause of a network issue. Which step of the troubleshooting process does this represent?Correct
Incorrect
Hint
Before a solution can be proposed or tested, the technician has to first talk to the customer to identify the problem, and establish a theory of probable cause. -
Question 24 of 34
24. Question
1 pointsWhich filtering method uses the physical address to specify exactly which device is allowed or blocked from sending data on a network?Correct
Incorrect
Hint
MAC address filtering specifies exactly which device MAC addresses are allowed to or blocked from sending data on your network. -
Question 25 of 34
25. Question
1 pointsHow many bits are used to represent an IPv6 address?Correct
Incorrect
-
Question 26 of 34
26. Question
1 pointsHow many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?Correct
Incorrect
-
Question 27 of 34
27. Question
1 pointsHow many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?Correct
Incorrect
-
Question 28 of 34
28. Question
1 pointsHow many bits are used to represent the host address of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?Correct
Incorrect
-
Question 29 of 34
29. Question
1 pointsHow many bits are used to represent the network address of a host with an IP address of 192.168.150.16 and a subnet mask of 255.255.0.0?Correct
Incorrect
-
Question 30 of 34
30. Question
1 pointsHow many bits are used to represent the network address of a host with an IP address of 192.168.150.16 and a subnet mask of 255.255.0.0?Correct
Incorrect
-
Question 31 of 34
31. Question
1 pointsHow many bits are used to represent the OUI part of the MAC address of a NIC card?Correct
Incorrect
-
Question 32 of 34
32. Question
1 pointsHow many bits are used to represent the OUI part of the MAC address of a NIC card?Correct
Incorrect
-
Question 33 of 34
33. Question
1 pointsHow many bits are used to represent a MAC address?Correct
Incorrect
-
Question 34 of 34
34. Question
1 pointsHow many bits are used to represent a MAC address?Correct
Incorrect