Chapter 6 Conflict in the Colonies Review Answers

IT Essentials (Version vii.00) – IT Essentials seven.0 Chapter six exam Answers

How to discover: Press "Ctrl + F" in the browser and fill in whatever wording is in the question to find that question/respond. If the question is not here, find it in Questions Bank.

NOTE: If y'all have the new question on this test, delight comment Question and Multiple-Choice list in course below this article. Nosotros will update answers for you in the shortest time. Give thanks you! We truly value your contribution to the website.

IT Essentials v7.0:

1. Users in a recently installed wireless network are lament of deadening data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

  • There is interference from outside sources.
  • The DHCP server is faulty.
  • The wireless signal is too weak.
  • The antenna on the access signal is too powerful.
  • The network passwords need to be reissued to the users.

Explanation: Normally, the closer a wireless NIC is to an access point, the faster the connectivity. This problem does non require the network countersign to be reissued. The combination of the low bandwidth and the intermittent connectivity is pointing towards a weak betoken or interference from outside sources.

2. A wired network is undergoing several changes that could exit it vulnerable to connection past unauthorized devices while the work is in progress. Which ii temporary measures would enable the authorized devices to continue to take network access just prevent unauthorized devices from connecting? (Cull two.)

  • Disable DNS.
  • Disable SSID circulate.
  • Disable DHCP.
  • Subnet the network.
  • Assign static IP addresses to the authorized devices.

Explanation: Disabling DHCP and assigning static IP addresses only to authorized devices will foreclose unauthorized devices from automatically obtaining IP address information. Without the correct IP accost information, the unauthorized devices will non be able to communicate over the network. Disabling DNS volition result in all connected devices no longer automatically existence able to communicate with network resources by proper noun (IP addresses would have to exist used.), but will not foreclose unauthorized devices from connecting and enabling potentially malicious access from occurring. Subnetting the network volition change the range of IP addresses used merely not prevent unauthorized network access. Disabling SSID broadcasts is only applicable to wireless networks, non wired networks.

three. What ii default wireless router settings tin affect network security? (Choose two.)
IT Essentials (ITE v6.0 + v7.0) Chapter 6 Exam Answers 100% 2

  • The SSID is broadcast.
  • MAC address filtering is enabled.
  • WEP encryption is enabled.
  • The wireless channel is automatically selected.
  • A well-known ambassador password is prepare.

Caption: Default settings on wireless routers often include dissemination the SSID and using a well-known administrative password. Both of these pose a security risk to wireless networks. WEP encryption and MAC accost filtering are not set by default. The automatic choice of the wireless channel poses no security risks.

four. A network technician is checking a reckoner to meet if the DHCP customer is working correctly. The technician issues the ipconfig /all control. Which 2 parameters should the technician review? (Choose two.)

  • description
  • default gateway
  • host proper name
  • media state
  • subnet mask

Explanation: A DHCP server can provide several parameters such as IP address, subnet mask, default gateway, and other optional parameters. The host name, media country, and description are present fifty-fifty if a DHCP server is not found.

five. A technician is troubleshooting a problem where the user claims access to the Net is not working, but in that location was access to the Internet the mean solar day before. Upon investigation, the technician determines that the user cannot access the network printer in the part either. The network printer is on the same network as the computer. The figurer has 169.254.100.88 assigned as an IP address. What is the nigh probable trouble?

  • The calculator cannot communicate with a DHCP server.
  • The IP default gateway on the computer is incorrect.
  • The network interface bill of fare driver needs to exist updated.
  • The router that connects this network to other networks is down.

Explanation: In a network employing dynamic IP addressing, if a figurer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255. In this instance, the computer can only communicate with computers connected to the same network inside this IP address range.

6. A user can print to a printer that is on the same network, simply the traffic of the user cannot reach the Internet. What is a possible crusade of the trouble?

  • The PC default gateway address is missing or incorrect.
  • The PC has an wrong IP accost.
  • The network cable connected to the user PC is faulty.
  • The NIC on the PC is faulty.

Explanation: The default gateway IP address is used to reach other networks, including the Internet.

vii. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 equally an open port. What effect does this have on network traffic?

  • Any traffic that comes into port 25 allows outgoing port 113 to be used.
  • All traffic that is sent into port 25 to the internal network will also be immune to use port 113.
  • Any traffic that is using port 25 going out of the internal network volition also be allowed to transmit out port 113.
  • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

Explanation: Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes utilise of a specific port on the internal network. An external port on the firewall is and so opened. This allows for temporary passage of traffic through inbound ports to a specific device.

8. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely crusade of this problem?

  • The gateway needs to be stock-still.
  • The network cable is faulty.
  • The network switch is faulty.
  • The PC has an incorrect IP address for the DNS server.

Explanation: The network bill of fare is working if the loopback address tin can be pinged. The LED on the network card beingness off points towards a faulty cable or a bad connectedness.

9. The current IP configuration of a minor company is washed manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration job?

  • APIPA
  • DHCP
  • DIPS
  • ICMP

Explanation: In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.

x. A technician troubleshooting a network problem has used CLI commands to determine that a calculator has not been allocated a correct IP address from the DHCP server. Which command tin can the technician use to solve this problem?

  • ping
  • ipconfig/release
  • tracert
  • ipconfig/renew

Explanation: The command ipconfig/renew will cause the calculator to request a new IP address from the DHCP server. The control ipconfig/release will remove the current IP address but will not request a new accost. The commands ping and tracert are used to test network connectivity.

11. Which network protocol is used to automatically assign an IP accost to a computer on a network?

  • FTP
  • DHCP
  • ICMP
  • SMTP
  • APIPA

Explanation: A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain addresses even when a DHCP server is not present.

12. What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?

  • implement hash encoding for all wireless devices
  • implement MAC address filtering
  • implement port forwarding
  • implement basic security on all wireless access points

Explanation: Port forwarding provides a rule-based method to direct traffic between devices on divide networks. This method provides access to devices beyond the Internet in a less expensive way than using a DMZ.

13. A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this trouble?

  • The Internet connectedness is down.
  • The DHCP server is non operational.
  • The gateway accost is incorrect.
  • The DNS server is not operational.

Explanation: If the PCs are non able to connect to a DHCP, they will be allocated an IP accost within the range 169.254.0.0 – 169.254.255.255.

xiv. What is the correct compressed format of the IPv6 address 2001:0db8:eeff:000a:0000:0000:0000:0001?

  • 2001:db8:eeff:a::ane
  • 2001:db8:eeff:a:1
  • 2001:db8:eeff:a::0001
  • 2001:db8:eeff:a:::ane

Explanation: There are two rules for IPv6 address compression. Rule 1: leading zeros in any hextet tin can be removed. Rule 2: contiguous hextets of all zeros can be compressed to a double colon. Rule two can just be applied once.

xv. What is the proper CIDR prefix annotation for a subnet mask of 255.0.0.0?

  • /8
  • /sixteen
  • /24
  • /32

Explanation: The proper CIDR annotation for a subnet mask of 255.0.0.0 is /8. This is because the /8 indicates that the first eight $.25 of the subnet mask are set to binary 1.

16. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

  • to disable broadcasting of the SSID
  • to enable different 802.11 standards
  • to provide stronger security modes
  • to avoid interference from nearby wireless devices

Explanation: Channels 1, vi, and 11 are selected because they are five channels apart. thus minimizing the interference with side by side channels. A channel frequency tin can interfere with channels on either side of the main frequency. All wireless devices need to be used on nonadjacent channels.

17. Which network server is malfunctioning if a user can ping the IP accost of a web server merely cannot ping the web server host name?

  • the DNS server
  • the DHCP server
  • the FTP server
  • the HTTP server

Caption: If pings are successful to an IP address just not to a host name, then the problem may exist that a DNS server cannot exist accessed.

18. Multiple users report that the workstations are assigned a 169.254.x.x IP address. The users are able to communicate but between each other. What is a possible solution?

  • Restart the DNS server.
  • Statically configure a default gateway on each workstation.
  • Verify the network cable on all user machines.
  • Restart the DHCP server.

Explanation: When a network device automatically obtains the IP accost 169.254.x.x, it is unable to receive an IP address from a DHCP server. The DHCP server should exist restarted to ensure that information technology is operational.

19. An administrator deploys wireless admission points beyond the office to provide wireless network connectivity to users. Each workstation receives an IP address via DHCP. After a file server with a static IP is connected to the wired network, the administrator receives an IP address conflict message. What is a possible solution?

  • Restart the DHCP server.
  • Alter the IP address of the file server with the ipconfig /release and ipconfig /renew commands.
  • Alter the static IP configured on the file server.
  • Connect the file server to the wireless network.

Explanation: If an IP address conflict message is displayed, then a unmarried IP address is existence used more than in one case on the aforementioned network. To solve this issue, the administrator needs to requite a unlike static IP address to the server on the network.

twenty. A workstation has been moved from the first floor to the fifth floor within an organization. The user is now reporting that the workstation cannot connect to the network. A technician suspects that the workstation could not obtain an IP address from a DHCP server. What is a possible cause of the trouble?

  • An IP address disharmonize occurred.
  • The DHCP server is misconfigured.
  • The workstation has been configured with a static IP address.
  • The default gateway accost is misconfigured on the workstation.

Explanation: In most cases in an organization, when a estimator is moved from one department to some other, information technology needs a new IP address to connect to the network. When a computer is configured with a static IP accost, information technology will not initiate the process of obtaining a new IP address from DHCP servers.

21. A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:g:00d8:0058:00ab/64. Which is the host identifier of the device?

  • 2001:0db8:buffet:4500:1000:00d8:0058:00ab
  • 2001:0db8:buffet:4500
  • 1000:00d8:0058:00ab
  • 00ab

Caption: The address has a prefix length of /64. Thus the kickoff 64 $.25 stand for the network portion, whereas the last 64 $.25 represent the host portion of the IPv6 address.

22. Which IPv6 address represents the virtually compressed form of the IPv6 address 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80?

  • 2001:0db8:buffet:0000:0835::0aa0/80
  • 2001:db8:cafe:0000:0835::aa0/80
  • 2001:0db8:cafe:0000:0835::0aa/fourscore
  • 2001:db8:cafe::0835::aa0/80
  • 2001:db8:cafe:0:835::aa0/lxxx

Caption: At that place are ii rules that be to help in the reduction of the number of digits inside an IPv6 address: Dominion 1 is used to remove any leading 0s. After applying rule 1 to 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80, nosotros calculate the result as 2001:db8:buffet:0:835:0:0:aa0/80. Rule two is used to supercede any group of consecutive zeros once throughout the IPv6 accost. After applying rule 2 to 2001:db8:cafe:0:835:0:0:aa0/80, nosotros calculate the upshot as 2001:db8:cafe:0:835::aa0/eighty.

23. After having talked to the customer, a network technician suspects that an invalid IP address is the virtually likely cause of a network outcome. Which step of the troubleshooting procedure does this represent?

  • Identify the trouble.
  • Test the theory to make up one's mind the cause.
  • Establish a theory of probable cause.
  • Constitute a plan of action to resolve the problem and implement the solution.

Explanation: Before a solution can be proposed or tested, the technician has to first talk to the customer to place the trouble, and establish a theory of likely cause.

24. Which filtering method uses the physical address to specify exactly which device is allowed or blocked from sending information on a network?

  • MAC address filtering
  • port forwarding
  • port triggering
  • whitelisting

Explanation: MAC address filtering specifies exactly which device MAC addresses are allowed to or blocked from sending data on your network.

25. How many bits are used to stand for an IPv6 accost?

  • 128
  • 48
  • 32
  • 12

26. How many $.25 are used to represent the host address of a computer with the IP accost of 192.168.1.25 and a subnet mask of 255.255.255.0?

  • 8
  • 48
  • 32
  • 12

27. How many bits are used to represent the host accost of a computer with the IP address of 192.168.1.25 and a subnet mask of 255.255.255.0?

  • 8
  • 48
  • 32
  • 4

28. How many bits are used to stand for the host address of a estimator with the IP address of 192.168.i.25 and a subnet mask of 255.255.255.0?

  • viii
  • 128
  • 32
  • 4

29. How many bits are used to represent the network address of a host with an IP accost of 192.168.150.16 and a subnet mask of 255.255.0.0?

  • 16
  • 128
  • 32
  • iv

30. How many bits are used to represent the network address of a host with an IP address of 192.168.150.xvi and a subnet mask of 255.255.0.0?

  • xvi
  • 128
  • 32
  • 42

31. How many bits are used to represent the OUI role of the MAC address of a NIC card?

  • 24
  • eight
  • 128
  • 42

33. How many $.25 are used to stand for a MAC address?

  • 48
  • 8
  • 128
  • 64

34. How many bits are used to represent a MAC address?

  • 48
  • 128
  • 8
  • 132

35. A grouping of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig , the technician notices that all of them accept an IP address in the 169.254.x.x range. What is the almost likely cause of this problem?

  • The DHCP server is non operational.
  • The gateway address is incorrect.
  • The DNS server is not operational.
  • The Internet connection is down.

Caption: If the PCs are not able to connect to a DHCP, they will be allocated an IP address within the range 169.254.0.0 – 169.254.255.255.

IT Essentials v6.0:

1. What would be a reason for a computer user to utilise the Task Manager Performance tab?

  • to increase the functioning of the CPU
  • to view the processes that are running and stop a process if needed
  • to view the services that are currently running on the PC
  • to cheque the CPU usage of the PC

2. Which feature in Windows 7 and 8 allows a user to temporarily view the desktop that is backside open windows past moving the mouse over the right edge of the taskbar?

  • Peek
  • Snap
  • Shake
  • Search
  • bound lists
  • thumbnail previews

3. What is the minimum amount of RAM and hard drive infinite required to install 64-bit Windows 8 on a PC?

  • i GB RAM and 10 GB hard disk drive space
  • ane GB RAM and 16 GB difficult disk space
  • two GB RAM and 16 GB hard disk space
  • 2 GB RAM and 20 GB hard disk infinite
  • four GB RAM and sixteen GB hard disk infinite
  • iv GB RAM and 20 GB hard disk drive space

4. Afterward upgrading a computer to Windows 7, a user notices that the UAC (User Account Control) panel appears more ofttimes. How can the user reduce the frequency with which the UAC appears?

  • Reinstall all user programs in Compatibility Mode.
  • Replace the graphics card with one that meets the minimum hardware requirements for Windows vii.
  • Lower the UAC setting in the Alter User Account Command settings dialog box of the User Accounts control console.
  • In the Performance Options dialog box of the Performance Information and Tools control panel, choose Adjust for Best Performance.

5. Which Windows utility allows Windows 7 and viii users to speedily and easily share files and folders?

  • HomeGroup
  • Action Center
  • Services
  • Device Manager

6. Which Windows administrative tool displays the usage of a number of computer resources simultaneously and tin help a technician decide if an upgrade is needed?

  • Services
  • Effect Viewer
  • Component Services
  • Functioning Monitor

7. Which type of startup must exist selected for a service that should run each fourth dimension the reckoner is booted?

  • automatic
  • boot
  • manual
  • offset
  • startup

8. Which Windows tool allows an administrator to organize reckoner direction tools in ane location for convenient use?

  • Chore Scheduler
  • Services panel
  • Performance Monitor panel
  • Microsoft Direction console

ix. To which category of hypervisor does the Microsoft Virtual PC vest?

  • Type 1
  • Type 2
  • Blazon 3
  • Type four

x. What are two advantages of using PC virtualization? (Cull 2.)

  • It protects the host machine from viruses attacks.
  • It allows multiple operating systems to run on a single PC simultaneously.
  • It boosts the operation of the host machine through virtualization.
  • It can provide cost savings.
  • It allows network threat identification.

11. A college uses virtualization engineering science to deploy information security courses. Some of the lab exercises involve studying the characteristics of calculator viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environs as opposed to using actual PCs?

  • The lab exercises are performed faster inside of the virtualized environment.
  • The virtualization environment has better tools to develop mitigation solutions.
  • Virus and worm attacks are more easily controlled in a virtualized environs, thus helping to protect the college network and its devices from assault.
  • The viruses and worms volition have express functionality inside the virtualized environment.

12. A software engineer is involved in the evolution of an application. For usability tests, the engineer needs to make sure that the application volition work in both Windows vii and Windows 8 environments. The features and functions must exist verified in the actual Bone environment. The engineer is using a Windows vii workstation. What ii technologies can help the engineer achieve the usability tests? (Choose 2.)

  • dual boot
  • two split CPUs
  • storage redundancy
  • client-side virtualization
  • two separate difficult disks

13. A technician needs to utilize an application that is non supported by Windows operating systems on the PC. How tin can the technician make this awarding run on the PC?

  • Utilise the Windows Compatibility mode.
  • Install the application with elevated permissions as administrator.
  • Create a virtual machine with an operating organisation that supports the application.
  • Install the application in safe way.

14. What preventive maintenance action should exist taken to help better system security?

  • Automate any antivirus scanners.
  • Defragment the hard drive.
  • Perform backups regularly.
  • Mistake check the hard drive.

xv. Which Windows 7 feature would an ambassador utilise to configure a computer to delete temporary files from the hard drive at 3:00 AM each day?

  • Deejay Cleanup
  • Task Scheduler
  • Device Director
  • Computer Management

16. Which command is used from the Windows command prompt to schedule a programme to run at a specific time?

  • AT
  • CMD
  • TASKLIST
  • TASKKILL

17. When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?

  • Curl back the commuter.
  • Restart both the calculator and the printer.
  • Scan the downloaded driver file with a virus scanner.
  • Upload the correct driver to the printer.

18. Which two Windows utilities can exist used to help maintain hard disks on computers that accept had long periods of normal use? (Choose two.)

  • Disk Cleanup
  • Disk Maintenance
  • Disk Defragmenter
  • Disk Sectionalisation
  • Disk Format

19. What is a mutual step that a technician can accept to make up one's mind the cause of an operating system problem?

  • Boot into Condom Mode to determine if the problem is driver related.
  • Test the ability supply.
  • Document the time spent to resolve the trouble.
  • Check the fan connections and ensure the fan is working properly.

20. Which question is an open ended question that could be used when helping a client troubleshoot a Windows problem?

  • Can you kicking the operating organization?
  • Take you changed your password recently?
  • Exercise you get a login prompt when the computer boots?
  • What programs take you installed recently?

21. A user reports that logging into the workstation fails after a display driver has been updated. The user insists that the password is typed in correctly. What is the most probable cause of the problem?

  • The password has inverse.
  • The Caps Lock fundamental is set to on.
  • A display commuter update failed.
  • The display setting has changed after a driver update.

22. A user reports that a video editing program does not work properly after a audio mixing program is installed. The technician suspects that a compatibility issue might be the crusade of the trouble. What should the technician exercise to verify this theory?"

  • Update Windows Bone.
  • Update the video editing software.
  • Uninstall the sound mixing software.
  • Check if an update of the sound mixing software is available.

23. A user reports to a technician that his computer freezes without whatever error messages. What are two probable causes? (Choose 2.)

  • An update has corrupted the operating organisation.
  • A process is not using enough organisation resource.
  • The ability supply is failing.
  • The MBR is corrupted.
  • The kicking guild is not set correctly in BIOS.

24. A technician is trying to set a Windows vii computer that displays an "Invalid Boot Disk" error after Mail. What is a possible crusade of the mistake?

  • The boot.ini file is corrupt.
  • The ntldr.exe file is corrupt.
  • The ntdetect.com file is corrupt.
  • The boot society is not set correctly in the BIOS.

rotzhelfinch1951.blogspot.com

Source: https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-6-exam-answers-100.html

0 Response to "Chapter 6 Conflict in the Colonies Review Answers"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel