Bagi temen-temen yang belom ngerjain IT Essentials Chapter 15 nih gua kasih jawaban IT Essentials Chapter 15 / answer IT Essentials Chapter 15.
Chapter 15 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Which two hazards exist when working with fiber optic cabling? (Choose two.)
Which safety precaution should be used when working with any type of cable?
#Wear safety glasses when working any type of cable.
ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
Which protocol provides secure transport of data from the company web server to remote users?
When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
While using nslookup, a student sees the following message: "Can’t find server name for address 127.0.0.0: timed out." What is one possible problem?
#The computer does not have at least one entry for a DNS server configured.
The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
#Configure the device drivers.
#Configure the NICs with addressing information.
After booting a computer running Windows 2000, the following message displays: "The IP address already exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
#run ipconfig /release
#run ipconfig /renew
Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
What is the purpose of an analog telephone adapter in the application of VoIP services?
#to connect a standard analog telephone to the IP network
Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
#default gateway for the local computer
What are two ways to assign an IP address to a wireless NIC? (Choose two.)
#Assign a static address.
In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
#Older, legacy wireless devices may be unable to connect to the wireless network.
Which two methods can be used to connect IP phones to a network? (Choose two.)
#Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
#Establish an Internet connection then use an Analog Telephone Adapter.
A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
#Check if the network interface cards in the computers are limited to 10 Mb/s.
A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
#The chapter document must be compressed before transmitting to an FTP server.
The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
#Start > Control Panel > Printers and Faxes > File > Add Printer
While troubleshooting a computer, the technician releases and renews the IP address. A message appears: "No operation can be performed on the adapter while its media is disconnected." What is a probable cause of the message?
#The network cable is unplugged.
A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
#The employee is using an incorrect username or password.
A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?
A computer user cannot access a bank using HTTPS. What is one recommended solution?
#Enable SSL through the web browser application.
Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
#Delete the temporary Internet files.
A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?
A technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
#Check the DNS server to ensure that it is operating correctly.
#Check that the DCHP server is operational.
#Check the PC firewall settings to make sure that DHCP is allowed.
A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
#Ask the IT department to permit port 25 through the firewall.
What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
#The firewall could be blocking port 21, with the result that attachments cannot get through.
#The e-mail server could not be receiving e-mail messages that are using POP.