Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

IT Essentials CH 5

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

IT Essentials (Version 8.

0) Chapter 5 Exam
Answers ITE v8.0
Dec 22, 2022 Last Updated: Feb 15, 2023 IT Essentials 8 3 Comments

How to find: Press “Ctrl + F” in the browser and fill in whatever wording
is in the question to find that question/answer. If the question is not here, find
it in Questions Bank.
NOTE: If you have the new question on this test, please
comment Question and Multiple-Choice list in form below
this article. We will update answers for you in the shortest
time. Thank you! We truly value your contribution to the
website.

IT Essentials (Version 8.0) – IT Essentials 8.0 Chapter 5


Exam Answers
1. A technician is searching through a storage locker and
finds a firewall. What is the purpose of this device?
 It is placed between two or more networks and protects
data and equipment from unauthorized access.
 It is a device that uses existing electrical wiring to connect devices and
sends data using specific frequencies.
 It is a device that can be inserted in the middle of a cable run to add
power.
 It connects a home or business network to a company that provides
internet connectivity as well as television signals.
2. Which type of server would be used to keep a historical
record of messages from monitored network devices?
 print
 DNS
 authentication
 syslog
 DHCP
Explanation: A syslog server is used as a centralized location for logged
messages from monitored network devices.
3. Which two types of signal interference are reduced more
by STP than by UTP? (Choose two.)
 white noise
 dispersion
 EMI
 RFI
 MDF
Explanation: RFI, EMI, and crosstalk cause interference to the electrical
signals that are transmitted through copper cables. Both UTP and STP use
twisted pairs of wires that help protect against crosstalk. However, STP
provides greater protection against RFI and EMI than UTP provides.
4. What is a characteristic of a WAN?
 It connects multiple networks that are geographically
separated.
 It spans across a campus or city to enable sharing of regional resources.
 It is typically owned and managed by a single home or business.
 It requires a wireless access point to connect users to the network.
Explanation: A WAN (wide-area network) is used to connect networks that
are geographically separated and is typically owned by a service provider. The
service provider contracts out WAN services to individuals and organizations.
5. A network specialist has been hired to install a network in
a company that assembles airplane engines. Because of the
nature of the business, the area is highly affected by
electromagnetic interference. Which type of network media
should be recommended so that the data communication will
not be affected by EMI?
 UTP
 STP
 fiber optic
 coaxial
Explanation: Optical fiber uses light to transmit signals. Therefore, fiber-
optic cable is not affected by EMI or RFI.
6. Which device provides wireless connectivity to users as its
primary function?
 router
 modem
 access point
 switch
Explanation: A switch connects multiple devices to a network. A router will
forward traffic between networks. A wireless router will connect multiple
wireless devices to a network. An access point will provides wireless
connectivity to multiple devices and has fewer features than a wireless router.
A modem will connect a home or small office to the Internet.
7. A customer is considering a multipurpose device to create
a home network. Which three devices are usually integrated
into a multipurpose network device? (Choose three.)
 email server
 switch
 wireless access point
 print server
 router
 web server
Explanation: A web server could be software installed on a computer. An
email server is commonly provided by a provider like Google or Yahoo or built
and provided in a corporate environment. Print servers are commonly found in
a business, not home, environment.
8. Which two devices are commonly powered by PoE?
(Choose two.)
 router
 modular switch
 core switch
 IP phone
 access point
Explanation: Compact switches, APs, and IP phones can be powered by a
PoE-enabled switch. Routers and modular switches require a large amount of
energy and cannot be powered through an Ethernet cable.
9. Which pairs of wires change termination order between
the 568A and 568B standards?
 blue and brown
 green and orange
 green and brown
 brown and orange
Explanation: The difference between the 568A and 568B standards is the
order in which the colored wire pairs are sequenced. It is the green and the
orange pairs of wires that are swapped between the two standards.
10. Which smart home wireless technology has an open
standard that allows up to 232 devices to be connected?
 Z-Wave
 Zigbee
 802.11n
 802.11ac
Explanation: Z-Wave is used with smart homes to create a wireless
network that can connect up to 232 devices. Z-Wave uses the 908.42 MHz
frequency band.
11. Which network device allows administrators to remotely
manage many devices through one dashboard interface?
 powerline networking
 Power over Ethernet
 switch that supports VLANs
 cloud-based network controller
Explanation: A cloud-based network controller allows a technician to
control, configure, and monitor network devices such as access points or
switches.
12. What type of connector is used to connect an analog
modem to a telephone line socket?
 BNC
 ST
 RJ-11
 RJ-45
Explanation: For dial-up Internet service, the modem is connected to the
telephone line socket via an RJ-11 connector.
13. Which satellite service can support up to approximately
100 Mbps with much lower latency than standard satellite?
 ADSL
 DSL
 LEO
 Broadband
Explanation: A new type of satellite service called LEO (Low Earth Orbit)
can support up to approximately 100 Mbps. This is a much lower latency than
standard satellites, which provide between 100 and 200 ms.
14. Which technology is most often used to connect devices
to a PAN?
 IEEE 802.11n wireless
 coaxial cabling
 Bluetooth
 fiber optic cabling
Explanation: A personal-area network (PAN) connects wireless devices
that are within close proximity of an individual person. Bluetooth network
technology commonly provides the connectivity.
15. How many devices can a Bluetooth device connect to
simultaneously?
 127
 24
 5
 10
 7
Explanation: Bluetooth is a short range wireless technology that is used for
personal area network (PAN) devices such as cell phones, keyboards,
headsets, and mice. A Bluetooth device can connect to a maximum of seven
other devices using this 2.4 GHz technology.
16. Which IEEE standard operates at wireless frequencies in
both the 5 GHz and 2.4 GHz ranges?
 802.11a
 802.11n
 802.11b
 802.11g
Explanation: The 802.11n standard is backwards compatible with both the
802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4
GHz.
17. Which device acts as a termination point for cable runs
and keeps cables secure and safely out of walkways?
 access point
 KVM switch
 UTM
 patch panel
18. Which internet connection type is an always-on service
that uses radio signals sent from a tower to a receiver in a
home or business?
 hotspot
 satellite
 cellular
 line of sight wireless
Explanation: In addition to providing internet connectivity from a home or
business, line of sight wireless may also be used to connect to other towers or
to connect to some other type of backbone connection.
19. What is the correct order of the layers of the TCP/IP
model from the top layer to the bottom?
 network access, transport, internet, application
 application, internet, network access, transport
 application, transport, internet, network access
 application, session, network, data link, physical
Explanation: The OSI model has 7 layers and the TCP/IP model has 4.
Both models encapsulate data from the sender and prepare it for transport to
a receiver over some type of network
20. What is a feature of a dial-up connection?
 the use of different frequencies to carry voice and data signals on the
copper telephone wire
 the use of multiple channels which can carry different types of services
 the use of an analog modem to transmit data over voice
telephone lines
 the use of different frequencies to send multiple signals over the same
medium
Explanation: Dial-up Internet connections use a modem to send data over
analog telephone lines.
21. A user needs to access the Internet from home. Which
device is needed if a user connects to an ISP through the
telephone network?
 DSL modem
 server
 wireless access point
 switch
Explanation: ISPs offer Internet access connection to homes through the
telephone network with DSL technology. A user can connect to an ISP
through the telephone network using a DSL modem. A wireless access point
connects mobile devices to a local network.
22. A client packet is received by a server. The packet has a
destination port number of 389. What service application is
the client requesting?
 NetBIOS (NetBT)
 HTTP
 LDAP
 POP3
23. A client packet is received by a server. The packet has a
destination port number of 22. What service application is
the client requesting?
 SMB/CIFS
 HTTPS
 SSH
 SLP
24. Which network device makes forwarding decisions based
on the destination MAC address that is contained in the
frame?
 switch
 repeater
 hub
 router
Explanation: Switches are the central connection point for a LAN and they
maintain a MAC address table. The MAC address table has a port number
associated with a MAC address for each particular device. The switch
inspects a frame to look at the destination MAC address. The switch then
looks in its MAC address table and if that MAC address is found, the switch
forwards the data to the port that is associated with that particular MAC
address.
25. Which type of server would support the SMTP, POP, and
IMAP protocols?
 DHCP
 proxy
 email
 syslog
Explanation: The Simple Mail Transfer Protocol (SMTP) is used to send
email. The Post Office Protocol (POP) and Internet Message Access Protocol
(IMAP) are used to retrieve email. All three protocols are application layer
protocols.
26. Which type of connection to the Internet is capable of
the fastest transfer rates?
 ISDN
 POTS
 fiber
 satellite
 cable
Explanation: Refer to the chapter graphics to see the various connectivity
types and speeds.
27. Which well-known port number is used by the DHCP
(client) protocol?
 67
 20
 80
 68
 53
Explanation: DHCP is a very important protocol that is used to provide IP
addressing information to network clients. The DHCP server uses UDP port
67 and the network host uses UDP port 68.
28. A technician is searching through a storage locker and
finds a DSL modem. What is the purpose of this device?
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
 It connects the network of a user to the digital
infrastructure of a phone company, providing always-on
service.
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It connects networks and forwards traffic to remote networks by using IP
addressing information.
29. A technician with a PC is using multiple applications
while connected to the Internet. How is the PC able to keep
track of the data flow between multiple application sessions
and have each application receive the correct packet flows?
 The data flow is being tracked based on the destination MAC address of
the technician PC.
 The data flow is being tracked based on the source IP address that is
used by the PC of the technician.
 The data flow is being tracked based on the destination IP address that is
used by the PC of the technician.
 The data flow is being tracked based on the source port
number that is used by each application.
Explanation: The source port number of an application is randomly
generated and used to individually keep track of each session connecting out
to the Internet. Each application will use a unique source port number to
provide simultaneous communication from multiple applications through the
Internet.
30. Which network device would be the most appropriate to
provide stateful packet filtering, email filtering, and VPN
services?
 UTM
 router
 endpoint management server
 proxy server
 TPM
Explanation: A universal threat management (UTM) device is an all-in-one
security device that can provide firewall, proxy filtering, email filtering, and
network access control services as well as be a point where remote users
connect to the company using a VPN.
31. A client packet is received by a server. The packet has a
destination port number of 21. What service application is
the client requesting?
 LDAP
 SLP
 SNMP
 FTP
32. When would a printer be considered a network host?
 when it is connected to a workstation
 when it is connected to a laptop
 when it is connected to a PC
 when it is connected to a switch
Explanation: When a printer is connected directly to a networking device,
such as a hub, switch, or router, it is considered to be a network host.
33. A technician is searching through a storage locker and
finds a PoE injector. What is the purpose of this device?
 It is a device that can be inserted in the middle of a cable
run to add power.
 It is a device that allows a network administrator to manage many remote
networking devices from a central location.
 It connects the network of a user to the digital infrastructure of a phone
company, providing always-on service.
 It connects a home or business network to a company that provides
internet connectivity as well as television signals.
34. A client packet is received by a server. The packet has a
destination port number of 143. What service application is
the client requesting?
 SMB/CIFS
 IMAP
 HTTPS
 SLP
35. A client packet is received by a server. The packet has a
destination port number of 23. What service application is
the client requesting?
 SMB/CIFS
 HTTPS
 Telnet
 SLP
36. A client packet is received by a server. The packet has a
destination port number of 25. What service application is
the client requesting?
 SMB/CIFS
 HTTPS
 SLP
 SMTP
37. A client packet is received by a server. The packet has a
destination port number of 137. What service application is
the client requesting?
 SMB/CIFS
 HTTPS
 NetBIOS (NetBT)
 SLP
38. A client packet is received by a server. The packet has a
destination port number of 53. What service application is
the client requesting?
 NetBIOS (NetBT)
 DNS
 POP3
 IMAP
39. A technician is searching through a storage locker and
finds a managed switch. What is the purpose of this device?
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It provides a wired or wireless connection between end devices, switches,
and routers and in some cases, can regenerate weak signals.
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
 It connects multiple end devices and can be configured
for VLANs and port security.
40. A technician is searching through a storage locker and
finds a Powerline networking connector. What is the purpose
of this device?
 It is a device that uses existing electrical wiring to
connect devices and sends data using specific
frequencies.
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It connects networks and forwards traffic to remote networks by using IP
addressing information.
41. A technician is searching through a storage locker and
finds a cable modem. What is the purpose of this device?
 It connects a home or business network to a company
that provides internet connectivity as well as television
signals.
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It connects networks and forwards traffic to remote networks by using IP
addressing information.
42. A client packet is received by a server. The packet has a
destination port number of 161. What service application is
the client requesting?
 SMB/CIFS
 HTTPS
 SNMP
 SLP
43. A technician is searching through a storage locker and
finds an unmanaged switch. What is the purpose of this
device?
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It provides a wired or wireless connection between end devices, switches,
and routers and in some cases, can regenerate weak signals.
 It is a device whose sole purpose is to connect end
devices and to microsegment a LAN.
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
44. What is a common function of a proxy server?
 to control who is permitted to access the internal network
 to detect malicious signatures by monitoring traffic that is entering the
internal network
 to store frequently accessed web pages on the internal
network
 to provide access to a shared pool of configurable computing resources
Explanation: A proxy server is often responsible for caching web pages
frequently accessed by internal users. If another internal user requests any of
the stored pages, the proxy server can quickly provide the stored web pages
to the internal user instead of sending the request over the Internet to the
original web server.
45. A technician is searching through a storage locker and
finds an access point. What is the purpose of this device?
 It uses radio waves to provide network access to wireless
devices.
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It provides a wired or wireless connection between end devices, switches,
and routers and in some cases, can regenerate weak signals.
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
46. A technician is searching through a storage locker and
finds a Cisco ASA 5505-X (UTM). What is the purpose of this
device?
 It connects a home or business network to a company that provides
internet connectivity as well as television signals.
 It is a device that uses existing electrical wiring to connect devices and
sends data using specific frequencies.
 It is a device that can be inserted in the middle of a cable run to add
power.
 It is an all-in-one security appliance that includes IDS/IPS
functionality as well as stateful firewall services.
47. A technician is searching through a storage locker and
finds a cloud-based network controller. What is the purpose
of this device?
 It transfers small amounts of DC current over Ethernet cables to power
low voltage devices such as wireless access points and
 It is a device that allows a network administrator to
manage many remote networking devices from a central
location.
 surveillance cameras.
 It provides a wired or wireless connection between end devices, switches,
and routers and in some cases, can regenerate weak signals.
 It is a device that can be inserted in the middle of a cable run to add
power.
48. A technician is searching through a storage locker and
finds an Ethernet NIC. What is the purpose of this device?
 It connects a home or business network to a company that provides
internet connectivity as well as television signals.
 It is needed to connect a computer to a wired local-area
network.
 It is a device that uses existing electrical wiring to connect devices and
sends data using specific frequencies.
 It is a device that can be inserted in the middle of a cable run to add
power.
49. A technician is searching through a storage locker and
finds a router. What is the purpose of this device?
 It is an all-in-one security appliance that includes IDS/IPS functionality as
well as stateful firewall services.
 It provides a wired or wireless connection between end devices, switches,
and routers and in some cases, can regenerate weak signals.
 It connects networks and forwards traffic to remote
networks by using IP addressing information.
 It is placed between two or more networks and protects data and
equipment from unauthorized access.
50. A technician is searching through a storage locker and
finds a patch panel. What is the purpose of this device?
 It provides a wired or wireless connection between end
devices, switches, and routers and in some cases, can
regenerate weak signals.
 It is a device that can be inserted in the middle of a cable run to add
power.
 It is a device that uses existing electrical wiring to connect devices and
sends data using specific frequencies.
 It connects a home or business network to a company that provides
internet connectivity as well as television signals.
51. Which IEEE standard is used for PoE?
 802.3af
 802.11af
 802.1q
 802.15
Explanation: 802.3af is an IEEE standard for PoE. Other PoE standards
are 802.3at and 802.3bt. 802.11af is a wireless LAN standard. 802.1q is a
standard specifying the tagging of VLAN frames across a trunk link. 802.15 is
the IEEE standard for personal area networks that includes Bluetooth.
52. A technician is searching through a storage locker and
finds a wireless NIC. What is the purpose of this device?
 It is needed to connect a computer or smart device to an
802.11 network.
 It connects a home or business network to a company that provides
internet connectivity as well as television signals.
 It is a device that uses existing electrical wiring to connect devices and
sends data using specific frequencies.
 It is a device that can be inserted in the middle of a cable run to add
power.
53. A technician is searching through a storage locker and
finds a repeater. What is the purpose of this device?
 It is used to regenerate weak signals to extend the
distance a signal can travel.
 It is a legacy device used to divide LANs into network segments, filtering
traffic between those LAN segments.
 It is a legacy device that connects end devices and where traffic from one
connected device floods out to every other connected device.
 It connects multiple end devices and can be configured for VLANs and
port security.

You might also like