IT Essentials v6.0 Chapter 8 Practice Quiz Answers

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

IT Essentials v6.0 Chapter 8 Practice Quiz Answers
Rate this post

IT-Essentials v6.0 Chapter 8 Practice Quiz Answers

1. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

browser as a service (BaaS)
wireless as a service (WaaS)
infrastructure as a service (IaaS)*
software as a service (SaaS)

Explanation:
This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.

2. What is the difference between a data center and cloud computing?

There is no difference. These terms can be used interchangeably.
Cloud computing provides access to shared computing resources, while a data center is a facility that stores and processes data.*
Of the two, only cloud computing is located off-site.
Data centers require cloud computing but cloud computing does not require data centers.
The data center makes use of more devices to process data.

Explanation:
Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff.

3. A technician wishes to update the NIC driver for a computer. What is the best location for finding new drivers for the NIC?

the installation media for Windows
Windows Update
the website for the manufacturer of the NIC*
the website for Microsoft
the installation media that came with the NIC

4. A technician has just installed a new NIC in a laptop. When the cable is plugged in, the technician notices that the LEDs on the NIC are green and one LED is flashing. What does this usually signify?

The NIC is attempting to establish a VPN connection but the configuration of the NIC is missing security settings.
The NIC is functioning and there is network activity.*
The NIC is doing a POST function to detect possible errors.
The NIC is functioning and the cable is operating at the maximum data rate.
The NIC is connected to the wrong port on the wireless router.

Explanation:
If the LEDs are unlit, it could mean that either the NIC, the switch port, or the cable is faulty. it might also indicate an issue with the NIC configuration. Green or amber lights typically mean that the NIC is functioning correctly. A flashing green or amber light often indicates network activity.

5. A technician needs to check the system settings on a remote computer to make sure it will be compatible with a new software update that will be sent out. The technician will use an administrator account to log in and start a user session on the remote PC. Which Windows tool will the technician use to accomplish this?

Windows Remote Desktop*
Windows VPN remote access client
Windows Update Assistant
Windows file sharing services

Explanation:
Windows Remote Desktop allows a technician to log in to a remote computer through an existing user account. The technician can run programs and view and manipulate files within the system of the remote computer.

6. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

The wireless signal is too weak.*
The network passwords need to be reissued to the users.
The DHCP server is faulty.
The antenna on the access point is too powerful.
There is interference from outside sources.*

Explanation:
Normally, the closer a wireless NIC is to an access point, the faster the connectivity. This problem does not require the network password to be reissued. The combination of the low bandwidth and the intermittent connectivity is pointing towards a weak signal or interference from outside sources.

7. Fill in the blank.

__broadband__                   technology uses different frequencies to transmit multiple signals simultaneously over the same cable.
Noted: You can write one of the following in netacad: “broadband“, or “broad band”

Explanation:
Broadband technology uses different frequencies, divided into different channels, to allow simultaneous transmission of multiple different signals on the same cable. DSL, cable, and satellite are examples of broadband network connections.

8. Which operation should a network technician perform as a part of regular preventive maintenance procedures on the network?

Verify the bandwidth of the WAN connection to the ISP.
Ensure antivirus definitions are updated to the latest version on servers.
Check the network cable connections in the wiring closet.*
Review the access log of the server farm facility.

Explanation:
Network preventive maintenance procedures include checking the condition of cables, network devices, servers, and computers to make sure that they are kept clean and are in good working order.

9. Which special character must be included at the end of a folder name to identify a folder as an administrative share?

*
#
$*
!

Explanation:
The dollar sign ($) at the end of a folder name will identify that folder as an administrative share.

10. Fill in the blank.

The process that a wireless router uses to translate a private IP address on internal traffic to a routable address for the Internet is called       __NAT__         .
Noted: You can write one of the following in netacad: “NAT“, or “network address translation”

Explanation:
Wireless routers use Network Address Translation to translate internal or private addresses into Internet-routable or public addresses.

11. A technician is troubleshooting a computer that has lost connectivity to the network. After data is gathered from the customer, which two tasks should the technician complete next? (Choose two.)

Try to log in as a different user.
Verify that the computer has a valid IP address.*
Verify that the computer has the most up to date version of the OS.
Check that the NIC link light is lit.*
Repair the network cable.

Explanation:
In troubleshooting, once data is gathered from the user, the technician must identify the problem.

12. Which network service automatically assigns IP addresses to devices on the network?

DNS
traceroute
Telnet
DHCP*

Explanation:
Dynamic Host Configuration Protocol (DHCP) can be used to allow end devices to automatically configure IP information, such as their IP address, subnet mask, DNS server, and default gateway. The DNS service is used to provide domain name resolution, mapping hostnames to IP addresses. Telnet is a method for remotely accessing a CLI session of a switch or router. Traceroute is a command used to determine the path a packet takes as it traverses the network.

13. Which technology requires customers to be within a particular range of the service provider facility in order to be provided the maximum bandwidth for Internet access?

ISDN
cable
DSL*
satellite

Explanation:
Look in the curriculum graphics. The closer to the CO the connection is located, the higher the possible DSL speed.

14. Which command is used to manually query a DNS server to resolve a specific host name?

net
ipconfig /displaydns
tracert
nslookup*

Explanation:
The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.

15. Which security technology is used to passively monitor network traffic with the objective of detecting a possible attack?

IDS*
firewall
IPS
proxy server

Explanation:
An IDS system is implemented to passively monitor the traffic on a network. Both an IPS and a firewall actively monitor network traffic and take immediate actions when previously defined security criteria match. A proxy server, when it functions as a firewall, also actively monitors the traffic that travels through it and takes immediate actions.

One Response

  1. Bin

Leave a Reply

Time limit is exhausted. Please reload the CAPTCHA.

This site uses Akismet to reduce spam. Learn how your comment data is processed.