IT Essentials – ITE Chapter 7 Exam Answers v6.0 2018 2019

Last Updated on by

IT Essentials – ITE Chapter 7 Exam Answers v6.0 2018 2019

Cisco ITE v6.0 latest or IT Essentials v6.0 Chapter 7 Exam Answers PC hardware and software (ITE Version 6.00) collection year 2017, 2018 and 2019 Full 100%. IT Essentials has been know as ITE v6. The following are the questions exam answers. Guarantee Passed. ITE v6.0 Chapter 7 exam answers has some new update from the old version 5. You can review all Chapter 7 Exam Answers. You will get passed scored 100% with this version 6.0. Good Luck for ITE v6.0 Exam!

CCNA7.COM is helping you to collect Cisco IT Essentials Chapter 7 Exam Answers v6 2018 & 2019 or ITE Chapter 7 Exam to show you on this page. ITE Chapter 7 Exam are almost 26 questions. While you take exam online with Cisco, you will meet 26 questions with duration 1 hours to 2 hours depend on your instructor activate. To pass ITE v6 Chapter 7 Exam, you should review all these question. We provide you accurate answer 100%.

Click here go to ITE Chapter 7 Exam – Online Test

  1. How many devices can a Bluetooth device connect to simultaneously?

    • 127
    • 7
    • 10
    • 24
    • 5
      Explanation:

      Bluetooth is a short range wireless technology that is used for personal area network (PAN) devices such as cell phones, keyboards, headsets, and mice. A Bluetooth device can connect to a maximum of seven other devices using this 2.4 GHz technology.
  2. A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?

    • 2001:0DB8:75a3
    • 0607:1234:aa10:ba01
    • 2001:0DB8
    • ba01
      Explanation:

      An IPv6 address is made up of 128 bits that are represented as eight blocks of four hexadecimal digits that are called hextets. Because each hexadecimal digit represents four bits, each hextet represents 16 bits. The /64 network prefix indicates that the first 64 bits, or first four hextets, represent the network portion of the address. Because there are 128 bits in an IPv6 address, this leaves the last 64 bits, or last four hextets, to represent the host identifier. The value for the last four hextets is 0607:1234:aa10:ba01.
  3. Which layer of the OSI model is responsible for logical addressing and routing?

    • application
    • data link
    • network
    • transport
      Explanation:

      The network layer of the OSI model is responsible for routing and logical addressing. The application layer is responsible for network services to support applications. The data link layer is responsible for physical addressing and access to the network media. The transport layer is responsible for reliable transport and flow control of data across the network.​
  4. When would a printer be considered a network host?

    • when it is connected to a switch
    • when it is connected to a workstation
    • when it is connected to a laptop
    • when it is connected to a PC
      Explanation:

      When a printer is connected directly to a networking device, such as a hub, switch, or router, it is considered to be a network host.
  5. Which device provides wireless connectivity to users as its primary function?

    • switch
    • router
    • access point
    • modem
      Explanation:

      A switch connects multiple devices to a network. A router will forward traffic between networks. A wireless router will connect multiple wireless devices to a network. An access point will provides wireless connectivity to multiple devices and has fewer features than a wireless router. A modem will connect a home or small office to the Internet.
  6. Which technology is most often used to connect devices to a PAN?

    • coaxial cabling
    • Bluetooth
    • fiber optic cabling
    • IEEE 802.11n wireless
      Explanation:

      A personal-area network (PAN) connects wireless devices that are within close proximity of an individual person. Bluetooth network technology commonly provides the connectivity.
  7. Which three factors are reasons for a company to choose a client/server model for a network instead of peer-to-peer? (Choose three.)

    • The network is small with fewer than eight users.
    • The company network requires secure access to confidential information.
    • The users need a central database to store inventory and sales information.
    • Each user understands how to safely share files across a network.
    • The data gathered by the employees is critical and should be backed up on a regular basis.
    • All employees passed a strict background check as part of the corporate hiring practices.
      Explanation:

      Client/server networks are the best choice when designing networks that require centralized security and user account control, or where data needs to be in one location for easy backups. Peer-to-peer networks do not support centralized security and the data must be located and secured on each individual PC.
  8. What is a characteristic of a WAN?

    • It connects multiple networks that are geographically separated.
    • It spans across a campus or city to enable sharing of regional resources.
    • It is typically owned and managed by a single home or business.
    • It requires a wireless access point to connect users to the network.
      Explanation:

      A WAN (wide-area network) is used to connect networks that are geographically separated and is typically owned by a service provider. The service provider contracts out WAN services to individuals and organizations.
  9. Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

    • application
    • presentation
    • session
    • transport
    • network
    • data link
    • physical
      Explanation:

      The TCP/IP model and OSI model perform similar functions. However, the TCP/IP model uses four layers and the OSI model uses seven layers. The layers in each model can be mapped to each other as follows:

      OSI application -> TCP/IP application
      OSI presentation -> TCP/IP application
      OSI session -> TCP/IP application
      OSI transport -> TCP/IP transport
      OSI network -> TCP/IP internet
      OSI data link -> TCP/IP network access
      OSI physical -> TCP/IP network access

  10. What is the correct order of the layers of the TCP/IP model from the top layer to the bottom?

    • application, session, network, data link, physical
    • application, internet, network access, transport
    • network access, transport, internet, application
    • application, transport, internet, network access
      Explanation:

      The OSI model has 7 layers and the TCP/IP model has 4. Both models encapsulate data from the sender and prepare it for transport to a receiver over some type of network
  11. What TCP/IP model layer is responsible for MAC addressing?

    • network access
    • internet
    • transport
    • application
      Explanation:

      The TCP/IP model divides network communication functions into four layers. MAC addressing and physical network components are the responsibility of the network access layer.
  12. What PDU is associated with the network layer of the OSI model?

    • data
    • frame
    • packet
    • segment
      Explanation:

      Each layer of the OSI model has an associated PDU (protocol data unit). The PDU at the application layer is data, at the transport layer is segment, at the network layer is packet, and at the data link layer is frame.
  13. Which two layers of the OSI model correspond to the functions of the TCP/IP model network access layer? (Choose two.)

    • physical
    • data link
    • network
    • transport
    • session
      Explanation:

      The OSI model has 7 layers and the TCP/IP model has 4 layers. Both models accomplish the same communication functions but the TCP/IP model combines functions into fewer layers.The functions of both the data link and physical layer of the OSI model are performed at the network access layer of the TCP/IP model.
  14. What is identified by the 100 in the 100BASE-TX standard?

    • the maximum bandwidth in Mb/s
    • the maximum cable distance in meters
    • the maximum number of network nodes
    • the series number of the standard
      Explanation:

      The 100BASE-TX standard defines a maximum bandwidth of 100 Mb/s. The 100 is the bandwidth, BASE is for baseband, and TX is twisted-pair cabling.
  15. Which two characteristics describe Ethernet technology? (Choose two.)

    • It is supported by IEEE 802.3 standards.
    • It is supported by IEEE 802.5 standards.
    • It typically uses an average of 16 Mb/s for data transfer rates.
    • It uses the CSMA/CD access control method.
    • It uses a ring topology.
      Explanation:

      The 802.3 Ethernet standard specifies that a network implement the CSMA/CD access control method.

  16. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?

    • 802.11n
    • 802.11g
    • 802.11b
    • 802.11a
      Explanation:

      The 802.11n standard is backwards compatible with both the 802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4 GHz.
  17. A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)

    • web server
    • switch
    • router
    • email server
    • wireless access point
    • print server
      Explanation:

      A web server could be software installed on a computer. An email server is commonly provided by a provider like Google or Yahoo or built and provided in a corporate environment. Print servers are commonly found in a business, not home, environment.
  18. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

    • repeater
    • hub
    • switch
    • router
      Explanation:

      Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch then looks in its MAC address table and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC address.
  19. A   router   uses IP addresses to forward traffic from one network to other networks.

  20. A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?

    • STP
    • coaxial
    • fiber optic
    • UTP
      Explanation:

      Optical fiber uses light to transmit signals. Therefore, fiber-optic cable is not affected by EMI or RFI.
  21. Which term describes a type of coaxial cable?

    • RG-6
    • 568A
    • UTP
    • Cat 5e
      Explanation:

      There are standards that define all of the various types of cables used in networks. RG-6 is a type of coaxial cable.
  22. Which pairs of wires change termination order between the 568A and 568B standards?

    • green and orange
    • green and brown
    • blue and brown
    • brown and orange
      Explanation:

      The difference between the 568A and 568B standards is the order in which the colored wire pairs are sequenced. It is the green and the orange pairs of wires that are swapped between the two standards.
  23. Which two types of signal interference are reduced more by STP than by UTP? (Choose two.)

    • RFI
    • white noise
    • MDF
    • dispersion
    • EMI
      Explanation:

      RFI, EMI, and crosstalk cause interference to the electrical signals that are transmitted through copper cables. Both UTP and STP use twisted pairs of wires that help protect against crosstalk. However, STP provides greater protection against RFI and EMI than UTP provides.
  24. How many host addresses are available on a network with a subnet mask of 255.255.0.0?

    • 65,534
    • 254
    • 16,777,214
    • 1024
      Explanation:

      A subnet mask of 255.255.0.0 represents sixteen bits in the host portion of the address identified by zeros. Sixteen bits allows for 2^16 possible host addresses that can used on a network.
  25. A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?

    • The computer cannot communicate with a DHCP server.
    • The IP default gateway on the computer is incorrect.
    • The network interface card driver needs to be updated.
    • The router that connects this network to other networks is down.
      Explanation:

      In a network employing dynamic IP addressing, if a computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a link-local IP, which is in the range of 169.254.0.0 to 169.254.255.255. In this case, the computer can only communicate with computers connected to the same network within this IP address range.
  26. What is a characteristic of the UDP protocol?

    • low overhead
    • guaranteed delivery
    • error correction
    • end-to-end establishment before delivery
      Explanation:

      TCP is a connection oriented protocol that provides for error recovery and guaranteed delivery mechanisms while UDP offers connectionless delivery and has fewer fields in the packet header than TCP.

Click here go to https://www.ccna7.com/ccna1-v5-1/ccna1-chapter-4-exam-v5-1/