IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsIn the context of mobile devices, what does the term tethering involve?ITExamAnswers asked 4 years ago • IT Essentials, CCNA, Computer Hardware Basics, Networking BasicsA user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Networking Basics, Networking EssentialsWhich wireless technology can be used to connect wireless headphones to a computer?ITExamAnswers asked 2 years ago • Computer Hardware Basics, IT Essentials, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsA network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Network Addressing and Basic Troubleshooting, Networking EssentialsWhich pairs of wires change termination order between the 568A and 568B standards?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Network Addressing and Basic TroubleshootingWhich two types of signal interference are reduced more by STP than by UTP? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Network Addressing and Basic TroubleshootingA technician is setting up a network in a new room. What is the best device to use to connect the PCs to each other and to the rest of the LAN?ITExamAnswers asked 4 years ago • IT Essentials, Network Addressing and Basic Troubleshooting, Networking EssentialsUsers in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Network Addressing and Basic TroubleshootingWhich two statements describe characteristics of network addresses? (Choose two.)IT Administrator asked 4 years ago • IT Essentials, Networking EssentialsA data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?ITExamAnswers asked 4 years ago • IT Essentials, CCNA, Networking Devices and Initial Configuration, Networking EssentialsA user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?ITExamAnswers asked 3 years ago • CCNA, IT Essentials, Networking Basics, Networking EssentialsWhich two characteristics describe a worm? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA Security, Introduction to CybersecurityMatch the tabs of the Windows 10 Task Manager to their functions. (Not all options are used.)IT Administrator asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, Operating Systems BasicsA technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, IT Essentials 8, Operating Systems BasicsIn the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, Operating Systems Basics