Unknow
Unknow
00) – IT
Essentials 7.0 Chapter 5 Exam Answers 2020 2021
o web server
o switch
o router
o email server
o wireless access point
o print server
Explanation:
A web server could be software installed on a computer. An email server is commonly provided by a provider like Googl
corporate environment. Print servers are commonly found in a business, not home, environment.
o access point
o core switch
o IP phone
o modular switch
o router
Explanation:
Compact switches, APs, and IP phones can be powered by a PoE-enabled switch. Routers and modular switches require a
be powered through an Ethernet cable.
3. Which two types of signal interference are reduced more by STP than by
UTP? (Choose two.)
o RFI
o white noise
o MDF
o dispersion
o EMI
Explanation:
RFI, EMI, and crosstalk cause interference to the electrical signals that are transmitted through copper cables. Both UTP
that help protect against crosstalk. However, STP provides greater protection against RFI and EMI than UTP provides.
o coaxial cabling
o Bluetooth
o fiber optic cabling
o IEEE 802.11n wireless
Explanation:
A personal-area network (PAN) connects wireless devices that are within close proximity of an individual person. Blueto
provides the connectivity.
o STP
o coaxial
o fiber optic
o UTP
Explanation:
Optical fiber uses light to transmit signals. Therefore, fiber-optic cable is not affected by EMI or RFI.
o 127
o 7
o 10
o 24
o 5
Explanation:
Bluetooth is a short range wireless technology that is used for personal area network (PAN) devices such as cell phones,
Bluetooth device can connect to a maximum of seven other devices using this 2.4 GHz technology.
o repeater
o hub
o switch
o router
Explanation:
Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has
MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch
and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC add
11.What is the correct order of the layers of the TCP/IP model from the top layer
to the bottom?
12.Which IEEE standard operates at wireless frequencies in both the 5 GHz and
2.4 GHz ranges?
o 802.11n
o 802.11g
o 802.11b
o 802.11a
Explanation:
The 802.11n standard is backwards compatible with both the 802.11a and 802.11b standards and therefore operates at bo
13.Which pairs of wires change termination order between the 568A and 568B
standards?
o green and orange
o green and brown
o blue and brown
o brown and orange
Explanation:
The difference between the 568A and 568B standards is the order in which the colored wire pairs are sequenced. It is the
that are swapped between the two standards.
o switch
o router
o access point
o modem
Explanation:
A switch connects multiple devices to a network. A router will forward traffic between networks. A wireless router will c
network. An access point will provides wireless connectivity to multiple devices and has fewer features than a wireless ro
or small office to the Internet.
o ISDN
o POTS
o satellite
o cable
o fiber
Explanation:
Refer to the chapter graphics to see the various connectivity types and speeds.
16.A user needs to access the Internet from home. Which device is needed if a
user connects to an ISP through the telephone network?
o switch
o server
o DSL modem
o wireless access point
Explanation:
ISPs offer Internet access connection to homes through the telephone network with DSL technology. A user can connect
network using a DSL modem. A wireless access point connects mobile devices to a local network.
o 67
o 68
o 20
o 80
o 53
Explanation:
DHCP is a very important protocol that is used to provide IP addressing information to network clients. The DHCP serve
host uses UDP port 68.
o The data flow is being tracked based on the destination MAC address of the technician PC.
o The data flow is being tracked based on the source port number that is used by each application.
o The data flow is being tracked based on the source IP address that is used by the PC of the technician.
o The data flow is being tracked based on the destination IP address that is used by the PC of the
technician.
Explanation:
The source port number of an application is randomly generated and used to individually keep track of each session conn
application will use a unique source port number to provide simultaneous communication from multiple applications thro
o DHCP
o DNS
o print
o authentication
o syslog
Explanation:
A syslog server is used as a centralized location for logged messages from monitored network devices.
o router
o endpoint management server
o proxy server
o UTM
o TPM
Explanation:
A universal threat management (UTM) device is an all-in-one security device that can provide firewall, proxy filtering, e
control services as well as be a point where remote users connect to the company using a VPN.
21.Which smart home wireless technology has an open standard that allows up to
232 devices to be connected?
o 802.11ac
o 802.11n
o Z-Wave
o Zigbee
Explanation:
Z-Wave is used with smart homes to create a wireless network that can connect up to 232 devices. Z-Wave uses the 908.
23.Which internet connection type is an always-on service that uses radio signals
sent from a tower to a receiver in a home or business?
24.Which type of server would support the SMTP, POP, and IMAP protocols?
o DHCP
o email
o proxy
o syslog
Explanation:
The Simple Mail Transfer Protocol (SMTP) is used to send email. The Post Office Protocol (POP) and Internet Message
retrieve email. All three protocols are application layer protocols.
25.A client packet is received by a server. The packet has a destination port
number of 21. What service application is the client requesting?
o FTP
o LDAP
o SLP
o SNMP
26.A client packet is received by a server. The packet has a destination port
number of 137. What service application is the client requesting?
o NetBIOS (NetBT)
o SMB/CIFS
o HTTPS
o SLP
27.A client packet is received by a server. The packet has a destination port
number of 22. What service application is the client requesting?
o SSH
o SMB/CIFS
o HTTPS
o SLP
28.A client packet is received by a server. The packet has a destination port
number of 143. What service application is the client requesting?
o IMAP
o SMB/CIFS
o HTTPS
o SLP
29.A client packet is received by a server. The packet has a destination port
number of 161. What service application is the client requesting?
o SNMP
o SMB/CIFS
o HTTPS
o SLP
30.A client packet is received by a server. The packet has a destination port
number of 23. What service application is the client requesting?
o Telnet
o SMB/CIFS
o HTTPS
o SLP
31.A client packet is received by a server. The packet has a destination port
number of 389. What service application is the client requesting?
o LDAP
o SMB/CIFS
o HTTPS
o SLP
32.A client packet is received by a server. The packet has a destination port
number of 25. What service application is the client requesting?
o SMTP
o SMB/CIFS
o HTTPS
o SLP
33.A client packet is received by a server. The packet has a destination port
number of 389. What service application is the client requesting?
o LDAP
o POP3
o HTTP
o NetBIOS (NetBT)
34.A client packet is received by a server. The packet has a destination port
number of 53. What service application is the client requesting?
o DNS
o NetBIOS (NetBT)
o POP3
o IMAP
35.A technician is searching through a storage locker and finds a PoE injector.
What is the purpose of this device?
o It is a device that can be inserted in the middle of a cable run to add power.
o It is a device that allows a network administrator to manage many remote networking devices from a
central location.
o It connects the network of a user to the digital infrastructure of a phone company, providing always-on
service.
o It connects a home or business network to a company that provides internet connectivity as well as
television signals.
36.A technician is searching through a storage locker and finds a managed
switch. What is the purpose of this device?
o It connects multiple end devices and can be configured for VLANs and port security.
o It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall
services.
o It provides a wired or wireless connection between end devices, switches, and routers and in some
cases, can regenerate weak signals.
o It is placed between two or more networks and protects data and equipment from unauthorized access.
37.A technician is searching through a storage locker and finds a Powerline
networking connector. What is the purpose of this device?
o It is a device that uses existing electrical wiring to connect devices and sends data using specific
frequencies.
o It is placed between two or more networks and protects data and equipment from unauthorized access.
o It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall
services.
o It connects networks and forwards traffic to remote networks by using IP addressing information.
38.A technician is searching through a storage locker and finds a cable modem.
What is the purpose of this device?
o It connects a home or business network to a company that provides internet connectivity as well as
television signals.
o It is placed between two or more networks and protects data and equipment from unauthorized access.
o It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall
services.
o It connects networks and forwards traffic to remote networks by using IP addressing information.
39.A technician is searching through a storage locker and finds an unmanaged
switch. What is the purpose of this device?
o It is a device whose sole purpose is to connect end devices and to microsegment a LAN.
o It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall
services.
o It provides a wired or wireless connection between end devices, switches, and routers and in some
cases, can regenerate weak signals.
o It is placed between two or more networks and protects data and equipment from unauthorized access.
40.A technician is searching through a storage locker and finds a DSL modem.
What is the purpose of this device?
o It connects the network of a user to the digital infrastructure of a phone company, providing always-on
service.
o It is placed between two or more networks and protects data and equipment from unauthorized access.
o It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall
services.
o It connects networks and forwards traffic to remote networks by using IP addressing information.
41.A technician is searching through a storage locker and finds an access point.
What is the purpose of this device?
o It connects networks and forwards traffic to remote networks by using IP addressing information.
o It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall
services.
o It provides a wired or wireless connection between end devices, switches, and routers and in some
cases, can regenerate weak signals.
o It is placed between two or more networks and protects data and equipment from unauthorized access.
43.A technician is searching through a storage locker and finds a cloud-based
network controller. What is the purpose of this device?
o It is a device that allows a network administrator to manage many remote networking devices from a
central location.
o It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as
wireless access points and
o surveillance cameras.
o It provides a wired or wireless connection between end devices, switches, and routers and in some
cases, can regenerate weak signals.
o It is a device that can be inserted in the middle of a cable run to add power.
44.A technician is searching through a storage locker and finds a firewall. What
is the purpose of this device?
o It is placed between two or more networks and protects data and equipment from unauthorized access.
o It is a device that can be inserted in the middle of a cable run to add power.
o It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as
wireless access points and surveillance cameras.
o It is a device that uses existing electrical wiring to connect devices and sends data using specific
frequencies.