Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

IT Essentials Checkpoint Exam Online

Last Updated on May 20, 2021 by Admin

IT Essentials Checkpoint Exam Online

ITE -- Checkpoint Exam

Time limit: 0

Quiz-summary

0 of 45 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45

Information

ITE — Checkpoint Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 45 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  1. Answered
  2. Review
  1. Question 1 of 45
    1. Question
    3 points
    What three voltages are commonly provided by the power supply to the various components inside the computer? (Choose three.)
    Correct

    Incorrect

    Computer power supplies typically deliver three voltages to various components inside the computer. These are 3.3 volts for CPUs, 5 volts for motherboard components, and 12 volts for disk drive motors.

    Hint
    Computer power supplies typically deliver three voltages to various components inside the computer. These are 3.3 volts for CPUs, 5 volts for motherboard components, and 12 volts for disk drive motors.
  2. Question 2 of 45
    2. Question
    1 points
    Hard drives in a grocery warehouse keep failing because of vibrations in the warehouse environment. What would be a possible solution for this high failure rate?
    Correct

    Incorrect

    SSD drives are an outstanding choice in extreme temperatures, in unusual environments, and in an environment where there are vibrations.

    Hint
    SSD drives are an outstanding choice in extreme temperatures, in unusual environments, and in an environment where there are vibrations.
  3. Question 3 of 45
    3. Question
    1 points
    A server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?
    Correct

    Incorrect

    RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well.

    Hint
    RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well.
  4. Question 4 of 45
    4. Question
    1 points
    Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?
    Correct

    Incorrect

    The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.

    Hint
    The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.
  5. Question 5 of 45
    5. Question
    1 points

    Refer to the exhibit. To what input device would the cables attach?

    IT Essentials Checkpoint Exam Answers 2018 Version 6.0 100% 01
    IT Essentials Checkpoint Exam Answers 2018 Version 6.0 100% 01

    Correct

    Incorrect

    A KVM switch is commonly used to connect one mouse, keyboard, and monitor to multiple computers.

    Hint
    A KVM switch is commonly used to connect one mouse, keyboard, and monitor to multiple computers.
  6. Question 6 of 45
    6. Question
    1 points
    A desktop user has requested the ability to easily transfer photos from a camera SD card to a computer. Which device can be installed on the desktop computer to fulfill this request?
    Correct

    Incorrect

    A media reader has the ability to read and write to memory cards commonly contained in digital cameras, smart phones, and MP3 players. The memory card can be placed into the media reader and the data can be transferred. A storage controller is a chip that allows for the expansion of internal and external drives. A graphics card increases the overall performance of a computer for gaming and video editing. A capture card is used to import a video stream into a computer and record it to a hard disk.

    Hint
    A media reader has the ability to read and write to memory cards commonly contained in digital cameras, smart phones, and MP3 players. The memory card can be placed into the media reader and the data can be transferred. A storage controller is a chip that allows for the expansion of internal and external drives. A graphics card increases the overall performance of a computer for gaming and video editing. A capture card is used to import a video stream into a computer and record it to a hard disk.
  7. Question 7 of 45
    7. Question
    1 points
    Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?
    Correct

    Incorrect

    Anyone using a fire extinguisher should remember the basic rules of operation:

    P – Pull the pin.
    A – Aim at the base of the fire, not at the flames.
    S – Squeeze the lever.
    S – Sweep the nozzle from side to side.

    Hint

    Anyone using a fire extinguisher should remember the basic rules of operation:

    P – Pull the pin.
    A – Aim at the base of the fire, not at the flames.
    S – Squeeze the lever.
    S – Sweep the nozzle from side to side.

  8. Question 8 of 45
    8. Question
    1 points
    Which measure can help control RFI effects on wireless networks?
    Correct

    Incorrect

    A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.

    Hint
    A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.
  9. Question 9 of 45
    9. Question
    1 points
    What can be tested with a digital multimeter?
    Correct

    Incorrect

    A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.

    Hint
    A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.
  10. Question 10 of 45
    10. Question
    1 points
    Which disk management tool scans the critical files of an operating system and replaces the corrupt files?
    Correct

    Incorrect

    System File Checker will scan critical files of an operating system and replace corrupt files. Scandisk and Chkdsk check the integrity of files and folders on a hard drive. Optimize Drives optimizes space on a hard drive. Disk Cleanup will clear space on a hard drive by looking for files that can be deleted.

    Hint
    System File Checker will scan critical files of an operating system and replace corrupt files. Scandisk and Chkdsk check the integrity of files and folders on a hard drive. Optimize Drives optimizes space on a hard drive. Disk Cleanup will clear space on a hard drive by looking for files that can be deleted.
  11. Question 11 of 45
    11. Question
    1 points
    Which action can reduce the risk of ESD damage when computer equipment is being worked on?
    Correct

    Incorrect

    To help prevent ESD damage, use grounded mats on work benches and grounded floor mats in work areas. You can also use an antistatic wrist strap to prevent ESD strikes except when working inside power supplies or CRT monitors.

    Hint
    To help prevent ESD damage, use grounded mats on work benches and grounded floor mats in work areas. You can also use an antistatic wrist strap to prevent ESD strikes except when working inside power supplies or CRT monitors.
  12. Question 12 of 45
    12. Question
    2 points
    When a used CPU is being installed, what two items should be used to clean the top of the CPU and the base of the heat sink before applying thermal compound? (Choose two.)
    Correct

    Incorrect

    Isopropyl alcohol and a lint-free cloth can be used to remove the old thermal compound from a CPU and heat sink. Because it could potentially leave residual fibers, a cotton swab should definitely not be used. Water of any type would not be able to help dissolve the thermal compound.

    Hint
    Isopropyl alcohol and a lint-free cloth can be used to remove the old thermal compound from a CPU and heat sink. Because it could potentially leave residual fibers, a cotton swab should definitely not be used. Water of any type would not be able to help dissolve the thermal compound.
  13. Question 13 of 45
    13. Question
    1 points
    A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?
    Correct

    Incorrect

    Time and date settings are retained in CMOS when the power is turned off. The CMOS battery allows these settings to be retained. Time and date are set in BIOS, but upgrading it will not aid in keeping the settings. Reinstalling the OS would have no effect on the ability of the computer to retrieve these settings.

    Hint
    Time and date settings are retained in CMOS when the power is turned off. The CMOS battery allows these settings to be retained. Time and date are set in BIOS, but upgrading it will not aid in keeping the settings. Reinstalling the OS would have no effect on the ability of the computer to retrieve these settings.
  14. Question 14 of 45
    14. Question
    2 points
    Which two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.)
    Correct

    Incorrect

    A technician would use the BIOS to monitor CPU clock speed and CPU fan speed if overheating was suspected. Monitoring the motherboard voltage, hard drive speed, and Trusted Platform Module settings would not provide information relevant to computer overheating.

    Hint
    A technician would use the BIOS to monitor CPU clock speed and CPU fan speed if overheating was suspected. Monitoring the motherboard voltage, hard drive speed, and Trusted Platform Module settings would not provide information relevant to computer overheating.
  15. Question 15 of 45
    15. Question
    1 points
    What component can be replaced and upgraded on a PC to increase the data processing speed?
    Correct

    Incorrect

    Replacing or upgrading a CPU with a faster clock speed will increase data processing speed. Adding more RAM or replacing a hard disk that is faster (higher RPM) will enhance the performance of the PC by reducing the needs for virtual memory swapping and reducing the time needed to retrieve and store data from/to the hard disk. However, only the CPU is responsible for the task of data processing.

    Hint
    Replacing or upgrading a CPU with a faster clock speed will increase data processing speed. Adding more RAM or replacing a hard disk that is faster (higher RPM) will enhance the performance of the PC by reducing the needs for virtual memory swapping and reducing the time needed to retrieve and store data from/to the hard disk. However, only the CPU is responsible for the task of data processing.
  16. Question 16 of 45
    16. Question
    2 points
    What are two effects of not having a preventive maintenance plan for users and organizations? (Choose two.)
    Correct

    Incorrect

    Having a preventive maintenance plan in place can lead to improved reliability, performance, and efficiency in the IT infrastructure. If a preventive maintenance plan is not in place, it can often lead to issues that will cause infrastructure downtime and significant repair costs. A preventive maintenance plan helps ensure that these costly issues are handled before they become a problem.

    Hint
    Having a preventive maintenance plan in place can lead to improved reliability, performance, and efficiency in the IT infrastructure. If a preventive maintenance plan is not in place, it can often lead to issues that will cause infrastructure downtime and significant repair costs. A preventive maintenance plan helps ensure that these costly issues are handled before they become a problem.
  17. Question 17 of 45
    17. Question
    3 points
    Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.)
    Correct

    Incorrect

    Removing dust from fan intakes, the power supply, and peripherals helps maintain hardware. Installing appropriate security updates helps keep operating systems and software programs secure. Removing unwanted programs recovers hard drive space and improves access time. Changing browser settings and deleting old email are user preferences. Installing more RAM would be done to address a problem, not as preventive maintenance.

    Hint
    Removing dust from fan intakes, the power supply, and peripherals helps maintain hardware. Installing appropriate security updates helps keep operating systems and software programs secure. Removing unwanted programs recovers hard drive space and improves access time. Changing browser settings and deleting old email are user preferences. Installing more RAM would be done to address a problem, not as preventive maintenance.
  18. Question 18 of 45
    18. Question
    3 points
    If a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.)
    Correct

    Incorrect

    If there is not a current backup of the data and the technician is not able to create one, then a liability release form signed by the customer should contain the following information:

    • Permission to work on the computer without a current backup available
    • Release from liability if data is lost or corrupted
    • Description of the work to be performed
    Hint

    If there is not a current backup of the data and the technician is not able to create one, then a liability release form signed by the customer should contain the following information:

    • Permission to work on the computer without a current backup available
    • Release from liability if data is lost or corrupted
    • Description of the work to be performed
  19. Question 19 of 45
    19. Question
    1 points
    What is the first step in the troubleshooting process?
    Correct

    Incorrect

    The first step in the troubleshooting process is to gather data and information.The gathering process should begin with the technician asking the user direct questions.

    Hint
    The first step in the troubleshooting process is to gather data and information.The gathering process should begin with the technician asking the user direct questions.
  20. Question 20 of 45
    20. Question
    1 points
    After performing a preventive maintenance on a PC, the technician attempts to power on the PC only to find that nothing happens. What is the most likely problem?
    Correct

    Incorrect

    When maintenance is being performed, the computer should be unplugged for cleaning. The CPU should not be removed from the motherboard during maintenance. The BIOS configuration does not have to be redone and would not cause these symptoms. It is unlikely that the power supply voltage switch would have been accidentally moved.

    Hint
    When maintenance is being performed, the computer should be unplugged for cleaning. The CPU should not be removed from the motherboard during maintenance. The BIOS configuration does not have to be redone and would not cause these symptoms. It is unlikely that the power supply voltage switch would have been accidentally moved.
  21. Question 21 of 45
    21. Question
    1 points
    Which statement describes a characteristic of a network operating system?
    Correct

    Incorrect

    Network operating systems support multiple users, run multiuser applications, and are typically used in large corporate network environments.

    Hint
    Network operating systems support multiple users, run multiuser applications, and are typically used in large corporate network environments.
  22. Question 22 of 45
    22. Question
    1 points
    What technology was created to replace the BIOS program on modern personal computer motherboards?
    Correct

    Incorrect

    As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.

    Hint
    As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.
  23. Question 23 of 45
    23. Question
    2 points
    On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)
    Correct

    Incorrect

  24. Question 24 of 45
    24. Question
    1 points
    Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?
    Correct

    Incorrect

  25. Question 25 of 45
    25. Question
    1 points
    In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?
    Correct

    Incorrect

    The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder.

    Hint
    The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder.
  26. Question 26 of 45
    26. Question
    1 points
    A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?
    Correct

    Incorrect

    Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.

    Hint
    Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.
  27. Question 27 of 45
    27. Question
    1 points
    What does virtual memory provide to an operating system?
    Correct

    Incorrect

    The OS uses virtual memory when a computer does not have enough RAM available to run a program. Virtual memory moves data from RAM and places it in a paging file on the hard drive. A paging file is a place where data is stored until enough RAM is available to process the data. This process is much slower than accessing the RAM directly.

    Hint
    The OS uses virtual memory when a computer does not have enough RAM available to run a program. Virtual memory moves data from RAM and places it in a paging file on the hard drive. A paging file is a place where data is stored until enough RAM is available to process the data. This process is much slower than accessing the RAM directly.
  28. Question 28 of 45
    28. Question
    1 points
    A PC technician is having trouble with a Windows-based system and wants to perform a system restore from the command prompt. What command would start this process?
    Correct

    Incorrect

    The functions of the listed commands are as follows:

    • tasklist – displays currently running applications
    • robocopy – copies a file
    • sfc – checks and replaces missing or damaged system files
    • gpupdate – refreshes group policy settings
    • rstrui – starts the System Restore utility
    Hint

    The functions of the listed commands are as follows:

    • tasklist – displays currently running applications
    • robocopy – copies a file
    • sfc – checks and replaces missing or damaged system files
    • gpupdate – refreshes group policy settings
    • rstrui – starts the System Restore utility
  29. Question 29 of 45
    29. Question
    1 points
    A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?
    Correct

    Incorrect

    A hosted hypervisor allows the underlying operating system to control the allocation of physical resources. Windows Virtual PC is an example of a Hosted hypervisor. Disabling hyperthreading or limiting the amount of paged RAM will not allow the virtual machine to control the physical resources.

    Hint
    A hosted hypervisor allows the underlying operating system to control the allocation of physical resources. Windows Virtual PC is an example of a Hosted hypervisor. Disabling hyperthreading or limiting the amount of paged RAM will not allow the virtual machine to control the physical resources.
  30. Question 30 of 45
    30. Question
    1 points
    A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point?
    Correct

    Incorrect

  31. Question 31 of 45
    31. Question
    1 points
    A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?
    Correct

    Incorrect

    UAC is used to change user account settings while converting the file system to FAT16 and updating the driver for the graphics card will not resolve the issue. Compatibility mode in Windows 7 allows for the running of a program created for previous versions of the Windows environment.

    Hint
    UAC is used to change user account settings while converting the file system to FAT16 and updating the driver for the graphics card will not resolve the issue. Compatibility mode in Windows 7 allows for the running of a program created for previous versions of the Windows environment.
  32. Question 32 of 45
    32. Question
    2 points
    A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
    Correct

    Incorrect

    Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.

    Hint
    Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.
  33. Question 33 of 45
    33. Question
    1 points
    At which TCP/IP model layer would a MAC address be found?
    Correct

    Incorrect

  34. Question 34 of 45
    34. Question
    1 points
    A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?
    Correct

    Incorrect

    802.11n devices are interoperable with all the other standards, and provide more bandwidth than the other standards. 802.11a is not interoperable with any of the other standards. 802.11b and 802.11g interoperate with each other, but do not provide the bandwidth supplied by 802.11n devices.

    Hint
    802.11n devices are interoperable with all the other standards, and provide more bandwidth than the other standards. 802.11a is not interoperable with any of the other standards. 802.11b and 802.11g interoperate with each other, but do not provide the bandwidth supplied by 802.11n devices.
  35. Question 35 of 45
    35. Question
    1 points
    A customer who wants to enhance home network security is shopping for devices. The sales representative recommends a device that has a hardware firewall. Which device can provide this service?
    Correct

    Incorrect

    An integrated router usually includes a hardware firewall. A home wireless router is a type of integrated router.

    Hint
    An integrated router usually includes a hardware firewall. A home wireless router is a type of integrated router.
  36. Question 36 of 45
    36. Question
    1 points
    Copper network cables consist of pairs of wires that are twisted together. Which type of signal interference is reduced or prevented by this?
    Correct

    Incorrect

    Crosstalk occurs when a signal from one wire interferes with a signal from another wire in the same cable. The twisting of wire pairs helps to protect against crosstalk.

    Hint
    Crosstalk occurs when a signal from one wire interferes with a signal from another wire in the same cable. The twisting of wire pairs helps to protect against crosstalk.
  37. Question 37 of 45
    37. Question
    1 points
    A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    Correct

    Incorrect

    If a computer is configured with DHCP but it cannot communicate with the DHCP server in order to obtain an IP address, the Windows OS automatically assigns a link-local IP, in the range of 169.254.0.0 to 169.254.255.255. The computer can only communicate with other computers connected to the same 169.254.0.0/16 network and cannot communicate with computers in another network.

    Hint
    If a computer is configured with DHCP but it cannot communicate with the DHCP server in order to obtain an IP address, the Windows OS automatically assigns a link-local IP, in the range of 169.254.0.0 to 169.254.255.255. The computer can only communicate with other computers connected to the same 169.254.0.0/16 network and cannot communicate with computers in another network.
  38. Question 38 of 45
    38. Question
    1 points
    A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?
    Correct

    Incorrect

    Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced.

    Hint
    Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced.
  39. Question 39 of 45
    39. Question
    1 points
    A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
    Correct

    Incorrect

  40. Question 40 of 45
    40. Question
    1 points
    Why would an administrator use Windows Remote Desktop and Windows Remote Assistant?
    Correct

    Incorrect

    Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing.

    Hint
    Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing.
  41. Question 41 of 45
    41. Question
    1 points
    A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?
    Correct

    Incorrect

    A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network.

    Hint
    A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network.
  42. Question 42 of 45
    42. Question
    1 points
    What physical layer medium is used by DSL to provide high-speed data communications?
    Correct

    Incorrect

    DSL uses existing telephone lines to carry voice and data traffic at the same time. DSL uses a filter to separate the traffic.

    Hint
    DSL uses existing telephone lines to carry voice and data traffic at the same time. DSL uses a filter to separate the traffic.
  43. Question 43 of 45
    43. Question
    1 points
    The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
    Correct

    Incorrect

    In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.

    Hint
    In networks with more than a few hosts, DHCP simplifies the addressing process. A DHCP server automatically assigns host IP addresses.
  44. Question 44 of 45
    44. Question
    1 points
    What is the function of the DNS server?
    Correct

    Incorrect

  45. Question 45 of 45
    45. Question
    1 points
    A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
    Correct

    Incorrect

    The default gateway is the address of the device a host uses to access the Internet or another network. If the default gateway is missing or incorrect, that host will not be able to communicate outside the local network. Because the host can access other hosts on the local network, the network cable and the other parts of the IP configuration are working.

    Hint
    The default gateway is the address of the device a host uses to access the Internet or another network. If the default gateway is missing or incorrect, that host will not be able to communicate outside the local network. Because the host can access other hosts on the local network, the network cable and the other parts of the IP configuration are working.
  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.