IT-Essentials

IT Essentials (Version 7.0) Chapter 5 Exam Answers

1. Fill in the blank.
The technology that allows a switch to deliver power to a device like an IP phone or an access point through the data cable is known as?

  • PoE
  • poe
  • power over ethernet
  • Power over Ethernet
  • Power Over Ethernet
  • POE
  • poe pass-through
  • poe passthrough
  • poe pass through
  • 2. Which network device regenerates the data signal without segmenting the network?

    • hub*
    • modem
    • switch
    • router
    Explanation:Hubs are sometimes called repeaters because they regenerate the signal. All devices connected to the hub share the same bandwidth (unlike a switch, which gives each device dedicated bandwidth).

    3. Which technology uses existing electrical wiring to connect devices to a network?

    • Z-Wave
    • IPS
    • 802.11
    • Ethernet over Power*
    Explanation:Ethernet over Power, or powerline networking, uses a device that attaches to a power outlet and a cable to connect a device to a network. IEEE 802.11 is a standard for wireless networks. An intrusion prevention system (IPS) is a security device that monitors all inbound and outbound traffic. Z-Wave is a type of network used in a smart home.

    4. A technician has been asked to assist with some LAN cabling. What are two standards that the technician should research before this project begins? (Choose two.)

    • Z-Wave
    • T568B*
    • T568A*
    • Zigbee
    • 802.11n
    • 802.11c
    Explanation:T568A and T568B are wiring schemes used with Ethernet LAN cabling. IEEE 802.11n and 802.11ac are wireless LAN standards. Zigbee and Z-Wave are smart home standards.

    5. A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this scenario?

    • WLAN
    • WAN*
    • MAN
    • LAN
    Explanation:A WAN connects multiple LANs that are in geographically separated locations. A MAN connects multiple LANs in a large campus or in a city. WLAN is a wireless LAN that covers a rather small geographic area.

    6. A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)

    • web server
    • switch*
    • router*
    • email server
    • wireless access point*
    • print server
    Explanation: A web server could be software installed on a computer. An email server is commonly provided by a provider like Google or Yahoo or built and provided in a corporate environment. Print servers are commonly found in a business, not home, environment.

    7. Which two devices are commonly powered by PoE? (Choose two.)

    • access point*
    • core switch
    • IP phone*
    • modular switch
    • router
    Explanation: Compact switches, APs, and IP phones can be powered by a PoE-enabled switch. Routers and modular switches require a large amount of energy and cannot be powered through an Ethernet cable.

    8. Which two types of signal interference are reduced more by STP than by UTP? (Choose two.)

    • RFI*
    • white noise
    • MDF
    • dispersion
    • EMI*
    Explanation: RFI, EMI, and crosstalk cause interference to the electrical signals that are transmitted through copper cables. Both UTP and STP use twisted pairs of wires that help protect against crosstalk. However, STP provides greater protection against RFI and EMI than UTP provides.

    9. When would a printer be considered a network host?

    • when it is connected to a switch*
    • when it is connected to a workstation
    • when it is connected to a laptop
    • when it is connected to a PC
    Explanation: When a printer is connected directly to a networking device, such as a hub, switch, or router, it is considered to be a network host.

    10. A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?

    • STP
    • coaxial
    • fiber optic*
    • UTP
    Explanation: Optical fiber uses light to transmit signals. Therefore, fiber-optic cable is not affected by EMI or RFI.

    11. How many devices can a Bluetooth device connect to simultaneously?

    • 127
    • 7*
    • 10
    • 24
    • 5
    Explanation: Bluetooth is a short range wireless technology that is used for personal area network (PAN) devices such as cell phones, keyboards, headsets, and mice. A Bluetooth device can connect to a maximum of seven other devices using this 2.4 GHz technology.

    12. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

    • repeater
    • hub
    • switch*
    • router
    Explanation: Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch then looks in its MAC address table and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC address.

    13. What is a common function of a proxy server?

    • to store frequently accessed web pages on the internal network*
    • to control who is permitted to access the internal network
    • to detect malicious signatures by monitoring traffic that is entering the internal network
    • to provide access to a shared pool of configurable computing resources
    Explanation: A proxy server is often responsible for caching web pages frequently accessed by internal users. If another internal user requests any of the stored pages, the proxy server can quickly provide the stored web pages to the internal user instead of sending the request over the Internet to the original web server.

    14. What is a characteristic of a WAN?

    • It connects multiple networks that are geographically separated.*
    • It spans across a campus or city to enable sharing of regional resources.
    • It is typically owned and managed by a single home or business.
    • It requires a wireless access point to connect users to the network.
    Explanation: A WAN (wide-area network) is used to connect networks that are geographically separated and is typically owned by a service provider. The service provider contracts out WAN services to individuals and organizations.

    15. What is the correct order of the layers of the TCP/IP model from the top layer to the bottom?

    • application, session, network, data link, physical
    • application, internet, network access, transport
    • network access, transport, internet, application
    • application, transport, internet, network access*
    Explanation: The OSI model has 7 layers and the TCP/IP model has 4. Both models encapsulate data from the sender and prepare it for transport to a receiver over some type of network

    16. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?

    • 802.11n*
    • 802.11g
    • 802.11b
    • 802.11a
    Explanation: The 802.11n standard is backwards compatible with both the 802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4 GHz.

    17. Which pairs of wires change termination order between the 568A and 568B standards?

    • green and orange*
    • green and brown
    • blue and brown
    • brown and orange
    Explanation: The difference between the 568A and 568B standards is the order in which the colored wire pairs are sequenced. It is the green and the orange pairs of wires that are swapped between the two standards.

    18. Which device provides wireless connectivity to users as its primary function?

    • switch
    • router
    • access point*
    • modem
    Explanation: A switch connects multiple devices to a network. A router will forward traffic between networks. A wireless router will connect multiple wireless devices to a network. An access point will provides wireless connectivity to multiple devices and has fewer features than a wireless router. A modem will connect a home or small office to the Internet.

    19. Which type of connection to the Internet is capable of the fastest transfer rates?

    • ISDN
    • POTS
    • satellite
    • cable
    • fiber*
    Explanation: Refer to the chapter graphics to see the various connectivity types and speeds.

    20. A user needs to access the Internet from home. Which device is needed if a user connects to an ISP through the telephone network?

    • switch
    • server
    • DSL modem*
    • wireless access point
    Explanation: ISPs offer Internet access connection to homes through the telephone network with DSL technology. A user can connect to an ISP through the telephone network using a DSL modem. A wireless access point connects mobile devices to a local network.

    21. Which well-known port number is used by the DHCP (client) protocol?

    • 67
    • 68*
    • 20
    • 80
    • 53
    Explanation: DHCP is a very important protocol that is used to provide IP addressing information to network clients. The DHCP server uses UDP port 67 and the network host uses UDP port 68.

    22. A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

    • The data flow is being tracked based on the destination MAC address of the technician PC.
    • The data flow is being tracked based on the source port number that is used by each application.*
    • The data flow is being tracked based on the source IP address that is used by the PC of the technician.
    • The data flow is being tracked based on the destination IP address that is used by the PC of the technician.
    Explanation: The source port number of an application is randomly generated and used to individually keep track of each session connecting out to the Internet. Each application will use a unique source port number to provide simultaneous communication from multiple applications through the Internet.

    23. Which type of server would be used to keep a historical record of messages from monitored network devices?

    • DHCP
    • DNS
    • print
    • authentication
    • syslog*
    Explanation: A syslog server is used as a centralized location for logged messages from monitored network devices.

    24. Which network device would be the most appropriate to provide stateful packet filtering, email filtering, and VPN services?

    • router
    • endpoint management server
    • proxy server
    • UTM*
    • TPM
    Explanation: A universal threat management (UTM) device is an all-in-one security device that can provide firewall, proxy filtering, email filtering, and network access control services as well as be a point where remote users connect to the company using a VPN.

    25. Which smart home wireless technology has an open standard that allows up to 232 devices to be connected?

    • 802.11ac
    • 802.11n
    • Z-Wave*
    • Zigbee
    Explanation: Z-Wave is used with smart homes to create a wireless network that can connect up to 232 devices. Z-Wave uses the 908.42 MHz frequency band.

    26. Which network device allows administrators to remotely manage many devices through one dashboard interface?

    • cloud-based network controller*
    • Power over Ethernet
    • switch that supports VLANs
    • powerline networking
    Explanation: A cloud-based network controller allows a technician to control, configure, and monitor network devices such as access points or switches.

    27. Which internet connection type is an always-on service that uses radio signals sent from a tower to a receiver in a home or business?

    • line of sight wireless*
    • satellite
    • hotspot
    • cellular
    Explanation: In addition to providing internet connectivity from a home or business, line of sight wireless may also be used to connect to other towers or to connect to some other type of backbone connection.

    28. Which type of server would support the SMTP, POP, and IMAP protocols?

    • DHCP
    • email*
    • proxy
    • syslog
    Explanation: The Simple Mail Transfer Protocol (SMTP) is used to send email. The Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) are used to retrieve email. All three protocols are application layer protocols.

    29. A client packet is received by a server. The packet has a destination port number of 21. What service application is the client requesting?

    • FTP*
    • LDAP
    • SLP
    • SNMP

    30. A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?

    • NetBIOS (NetBT)*
    • SMB/CIFS
    • HTTPS
    • SLP

    31. A client packet is received by a server. The packet has a destination port number of 22. What service application is the client requesting?

    • SSH*
    • SMB/CIFS
    • HTTPS
    • SLP

    32. A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting?

    • IMAP*
    • SMB/CIFS
    • HTTPS
    • SLP

    33. A client packet is received by a server. The packet has a destination port number of 161. What service application is the client requesting?

    • SNMP*
    • SMB/CIFS
    • HTTPS
    • SLP

    34. A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?

    • Telnet*
    • SMB/CIFS
    • HTTPS
    • SLP

    35. A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?

    • LDAP*
    • SMB/CIFS
    • HTTPS
    • SLP

    36. A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?

    • SMTP*
    • SMB/CIFS
    • HTTPS
    • SLP

    37. A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting?

    • LDAP*
    • POP3
    • HTTP
    • NetBIOS (NetBT)

    38. A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting?

    • DNS*
    • NetBIOS (NetBT)
    • POP3
    • IMAP

    39. A technician is searching through a storage locker and finds a PoE injector. What is the purpose of this device?

    • It is a device that can be inserted in the middle of a cable run to add power.*
    • It is a device that allows a network administrator to manage many remote networking devices from a central location.
    • It connects the network of a user to the digital infrastructure of a phone company, providing always-on service.
    • It connects a home or business network to a company that provides internet connectivity as well as television signals.

    40. A technician is searching through a storage locker and finds a managed switch. What is the purpose of this device?

    • It connects multiple end devices and can be configured for VLANs and port security.*
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.
    • It is placed between two or more networks and protects data and equipment from unauthorized access.

    41. A technician is searching through a storage locker and finds a Powerline networking connector. What is the purpose of this device?

    • It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.*
    • It is placed between two or more networks and protects data and equipment from unauthorized access.
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It connects networks and forwards traffic to remote networks by using IP addressing information.

    42. A technician is searching through a storage locker and finds a cable modem. What is the purpose of this device?

    • It connects a home or business network to a company that provides internet connectivity as well as television signals.*
    • It is placed between two or more networks and protects data and equipment from unauthorized access.
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It connects networks and forwards traffic to remote networks by using IP addressing information.

    43. A technician is searching through a storage locker and finds an unmanaged switch. What is the purpose of this device?

    • It is a device whose sole purpose is to connect end devices and to microsegment a LAN.*
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.
    • It is placed between two or more networks and protects data and equipment from unauthorized access.

    44. A technician is searching through a storage locker and finds a DSL modem. What is the purpose of this device?

    • It connects the network of a user to the digital infrastructure of a phone company, providing always-on service.*
    • It is placed between two or more networks and protects data and equipment from unauthorized access.
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It connects networks and forwards traffic to remote networks by using IP addressing information.

    45. A technician is searching through a storage locker and finds an access point. What is the purpose of this device?

    • It uses radio waves to provide network access to wireless devices.*
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.
    • It is placed between two or more networks and protects data and equipment from unauthorized access.

    46. A technician is searching through a storage locker and finds a router. What is the purpose of this device?

    • It connects networks and forwards traffic to remote networks by using IP addressing information.*
    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.
    • It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.
    • It is placed between two or more networks and protects data and equipment from unauthorized access.

    47. A technician is searching through a storage locker and finds a cloud-based network controller. What is the purpose of this device?

    • It is a device that allows a network administrator to manage many remote networking devices from a central location.*
    • It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as wireless access points and
    • surveillance cameras.
    • It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.
    • It is a device that can be inserted in the middle of a cable run to add power.

    48. Which technology is most often used to connect devices to a PAN?

    • coaxial cabling
    • Bluetooth*
    • fiber optic cabling
    • IEEE 802.11n wireless
    Explanation: A personal-area network (PAN) connects wireless devices that are within close proximity of an individual person. Bluetooth network technology commonly provides the connectivity.

    49. A technician is searching through a storage locker and finds a firewall. What is the purpose of this device?

    • It is placed between two or more networks and protects data and equipment from unauthorized access.*
    • It is a device that can be inserted in the middle of a cable run to add power.
    • It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as wireless access points and surveillance cameras.
    • It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.

    50. Which device acts as a termination point for cable runs and keeps cables secure and safely out of walkways?

    • Patch Panel *
    • UTM
    • KVM Switch
    • Access Point

    51. What is a feature of a dial-up connection?

    • the use of multiple channels which can carry different types of services
    • the use of different frequencies to carry voice and data signals on the copper telephone wire
    • the use of an analog modem to transmit data over voice telephone lines *
    • the use of different frequencies to send multiple signals over the same medium
    Explanation: Dial-up Internet connections use a modem to send data over analog telephone lines.

    52. A technician is searching through a storage locker and finds an Ethernet NIC. What is the purpose of this device?

    • It connects a home or business network to a company that provides internet connectivity as well as television signals.
    • It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.
    • It is a device that can be inserted in the middle of a cable run to add power.
    • It is needed to connect a computer to a wired local-area network. *

    53. What type of connector is used to connect an analog modem to a telephone line socket?

    • ST
    • RJ-11
    • RJ-45
    • BNC

    54. A technician is searching through a storage locker and finds a Cisco ASA 5505-X (UTM). What is the purpose of this device?

    • It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. *
    • It connects a home or business network to a company that provides internet connectivity as well as television signals.
    • It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.
    • It is a device that can be inserted in the middle of a cable run to add power.

    55. A technician is searching through a storage locker and finds a patch panel. What is the purpose of this device?

    • It is a device that can be inserted in the middle of a cable run to add power.
    • It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.
    • It connects a home or business network to a company that provides internet connectivity as well as television signals.
    • It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.
    0 0 vote
    Article Rating

    Related Articles

    Subscribe
    Notify of
    guest

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    0 Comments
    Inline Feedbacks
    View all comments
    Back to top button
    0
    Would love your thoughts, please comment.x
    ()
    x
    Close
    Close