IT ESSENTIAL PC HARDWARE AND SOFTWARE CHAPTER 15 ANSWERS
01.A technician is troubleshooting a networked computer. The
technician has gathered as much information as possible from the user
and now needs to verify obvious issues. Which two action should the
technician perform? ( )Choose two)
• Clear the network log files;
• Change the default gateway;
• Verify the computer IP information;
• Change the router configuration;
• Check activity on the routers.
02.Which statement is true about network maintenance?
• Cable supports are used to identify the devices to which the cables are connected;
• If a network device is making an unusual sound the device should be turned off immediately;
• Educating users on IT policies and procedures is an example of proactive network maintenance;
• Preventive maintenance should not be performed regularly because it interrupts network activity.
03.A technician is concerned that a wireless router is missing
current security features. What action could be taken to address this
issue?
• Disable the SSID broadcast;
• Check for an updated firmware version;
• Configure mixed mode wireless operation;
• Assign static IP addresses to the wireless devices.
04.A company purchases several wireless NICs at a great price. After
installing the NICs, they find that the user cannot connect to the 2,4
GHz wireless network. What is a likely cause of the problem?
• The NICs are designed for the 802.11a standard;
• The NICs are designed for the 802.11b standard;
• The NICs are designed for the 802.11g standard;
• The NICs are designed for the 802.11n standard via USB;
05.In Internet Explorer, after choosing Tools and then Internet
Options, which tab would a user select to set the browser to prompt
before downloading potentially unsafe content?
• Advanced;
• Content,
• Privacy;
•
security
06.A technician is working on a workstation that has an IP address of
169.254.25.34. The technician found that the computer cannot connect to
the Internet and the network cable to the computer had been
disconnected. Which command can a technician use to get a new IP address
once the cable is reconnected?
• nslookup;
• net continue;
• ipconfig /renew;
• nbtstat /new.
07.Which three ports are used by SMTP, POP and IMAP ? (Choose three)
• 21
• 25
• 69
• 110
• 127
• 143
08.A technician has been asked to install a second optical drive in a
computer. The technician will need to configure the drive as slave. How
can the technician accomplish this desired configuration?
• Use jumpers on the motherboard to configure the drive as slave;
• List the drive as slave in the CMOS;
• Connect the drive after the twist in the PATA cable;
• Use jumpers on the drive to configure the drive as slave.
09.Which protocol provides secure transport of data from the company web server to remote users?
• HTTP
• HTTPS
• NetBEUI
• DNS
10.The network technician is researching the best way connect the
branch offices to the main office. What are three main considerations
that the technician should remember when choosing an Internet
connection? (choose three)
• availability;
• distance;
• operating system;
• protocols;
• reliability;
• speed.
11.Which action should a user take to ensure that personal
information that is entered into a website form is not retained on the
computer?
• Clear the browser history;
• Change the default browser;
• Reset the file sharing permissions;
• Delete the temporary Internet files.
12.ABC Computer Company is in the process of planning a network for a
new client. A network technician has been asked to perform a physical
inspection of the facilities to determine the flow of data and protocols
required by the client. What is this inspection called?
• data inspection;
• logical survey;
• plant inspection;
• site survey.
13.A user is reporting intermittent loss of connectivity to the
network. No other users have reported similar issues. What preventive
maintenance task would likely identify the problem?
• Listen for unusual sounds from the core network devices;
• Ensure that all switches have the latest firmware installed;
• Check for a damaged network cable at the user workstation;
• Verify the attachment points between network devices in the core of the network.
14.A user is receiving e-mail on a regular basis from a particular
person. A problem occurs when the e-mail from this same person contains
an attachment. What is one solution?
• Ask the IT department to permit port 25 through the firewall;
• Request that the person sending the e-mail attach only one picture per e-mail message;
• Check DNS settings on the computer used to receive the e-mail;
• Request that the person sending the photographs archive all e-mail messages before sending e-mail.
15.When planning the network in a new bulding, the technician notes
that the company requires cabling that can extend up to 295ft (90m) with
enchanged banwith support at an affordable price. Which cable type will
the technician pick if he chooses the most common type of cabling used
on network?
• Cat3
• Cat5
• Cat5e
• Cat6A
16.Which two protocols are used to receive e-mail? (choose two)
• DHCP
• SNMP
• IMAP
• POP3
• SSH
17.Which two hazard exist when working with fiber optic cabling (choose two)
• Chemicals;
• Copper strands;
• Electricity;
• Glass splinters;
• Connectors.
18.Students on the college network need to be able to view folder
names and data in files stored on the Windows based file server, but
should never be allowed to add or save information on the server.
Occasionally, the students also need to run media programs to watch
videos stored on the server. Which permission should the network
technician assign to the students accesing the file server?
• Change;
• Execute;
• Read;
• Write.
19.A new employee needs to transfer files to the corporate FTP
server. However, the employee is unable to log in to the FTP server.
What is the most likely cause of the problem?
• The employee is using the wrong protocol;
• The employee is using an incorrect username or password;
• An incorrect IP address is configured in the FTP client;
• An incorrect port number is configured in the FTP client.
20.What are two ways to assign an IP address to wirekess NIC? (choose two)
• Assign a static address;
• Use ARP;
• Use the net command with the static option;
• Use WEP;
• Use the net command with the automatic option;
• Use DHCP.