Bagi  temen-temen yang belom ngerjain IT  Essentials Chapter 8 nih gua  kasih  jawaban IT Essentials Chapter 8 /  answer IT Essentials Chapter 8. NILAI 100% diatas 96,0...
Chapter 8 Exam - IT  Essentials: PC Hardware and  Software (Version 4.1)   
  
1
Refer to the exhibit. Which type of network cable is shown?
    #fiber-optic
2   
Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
    #encapsulation
3   
When purchasing Cisco components for a network installation, what are  three warning signs that the equipment may be counterfeit? (Choose  three.)
    #The price is much less than expected.
    #The equipment appears to be performing at a substandard level.
    #The packaging appears to be substandard compared to the packaging of other Cisco purchases.
4   
Which protocol is used to automatically configure network devices?
    #DHCP
   
5    
Which protocol lacks support for encryption and can be initiated from a computer command prompt?
    #Telnet
6    
Which broadband technology would be recommended for a business that  requires workers to access the Internet while visiting customers at many  different locations?
    #cellular
    
7    
Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
    #The number of twists in the wires inside the cable.
    #The number of wires inside the cable.
    
8    
Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
    #mesh
    
9    
Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
    #VPN client
10    
A college student is confused. To use online banking, the student types  https://www.banking.com, whereas to access the college web page, the  student types http://www.college.edu. Why would the two institutions use  different protocols?
    #The bank encrypts the web page information that is sent and received.
    
11
What is the purpose of the device that uses the 198.133.219.43 address?
    #It is the device that translates domain names to IP addresses.
    
12    
Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
    #Cisco Brand Protection Team
    
13    
Which digital technology provides an upstream speed that is typically less than the downstream speed?
    #ADSL
    
14    
Which utility can be used to determine end-to-end connectivity between source and destination?
    #Ping
15    
Which Windows XP command displays the route taken by packets crossing an IP network?
    #tracert
16    
Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
    #Manually assign an IP address.
    
17    
A student brings a laptop to a school that has wireless access. The  laptop is not connecting to the school network. What is the first thing  that the student should check?
    #the available wireless networks within range
    
18    
Which device enables computers to be attached to a network without segmenting the network?
    #hub
19    
Which topology has only one central point of failure, is easy to  troubleshoot, and is most commonly implemented in newer networks?
    #star
20    
Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
    #Data Link
    
21    
Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
    #802.11g
    
22    
A company is investigating the use of an ISDN service to act as backup  for the ASDL service they use to communicate with branch offices. They  discover that the ISDN BRI service uses two 64 kb/s B channels. Which  function do the B channels perform?
    #carry the data stream
    
23    
What is the maximum range a data signal can travel through a 1000BASE-T network segment?
    #328 ft (100 m)
24    
A technician is configuring a computer to send print jobs to a network  printer. When the technician sends a test print to the printer, the  print job fails. The technician tries to ping the network printer, but  the technician suddenly remembers a change in Windows that is hampering  the troubleshooting process. What change might this be?
    #The Windows firewall stops pings.
    
25    
What is one difference between a network domain and a workgroup?
    #A domain provides centralized control.
    
26    
Which three protocols are associated with e-mail? (Choose three.)
    #IMAP
    #POP3
    #SMTP
27    
A network administrator wants to connect a new building to an existing  network using cable that can provide a secure connection and is not  susceptible to electrical interference. The new building is  approximately 800 meters away from the existing network. Which cable  type should the administrator choose?
    #fiber optic
28    
Which two characteristics describe Ethernet technology? (Choose two.)
    #supported by IEEE 802.3 standards
    #uses a bus logical topology
    
29    
Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
    #The company network requires secure access to confidential information.
    #The users need a central database to store inventory and sales information.
    #The data gathered by the employees is critical and should be backed up on a regular basis.
    
30    
Which technique is used to ensure that data from one computer does not  collide with data from any other computer in a CSMA/CD network?
    #Computers listen to the network for clearance to send data. 
Followers
- Detikzone
 - Berita Hot
 - Live Stream
 - Live Stream Free
 - Free Live Stream
 - Online Free Live Stream
 - Online Live Stream Free
 - Jadwal Piala Dunia 2010
 - Budireve
 -  
Info-Berita CasCus - Elizer
 - Samudro
 - Diarisonline
 - Berita Ekstrim
 - best1of4
 - Mp3 Router - Mp3 Finder - MP3 Search and Free MP3 Downloads - Free mp3 music search and download. Top artists and hit music free for download. completest mp3 database.
 - Pengumuman Bisnis
 - Tips Kesehatan
 - aguscwid.com
 - Jejak Sang Khilafah
 - Blogger Banyumas
 - Sportingbucks
 - Rowing Equipments
 - Kedaiyudi
 - Belajar Hacking
 - SMA Ma'arif NU 1 Kemranjen
 
Entri Populer
- 
Bagi temen-temen yang belom ngerjain IT Essentials Chapter 5 nih gua kasih jawaban IT Essentials Chapter 5 / answer IT Essentials Cha...
 - 
Bagi temen-temen yang belom ngerjain IT Essentials Chapter 7 nih gua kasih jawaban IT Essentials Chapter 7 / answer IT Essentials Chapt...
 - 
Ingin melindungi komputer Anda dari gangguan virus terutama virus lokal? Sebaiknya Anda mempergunakan salah satu antivirus besutan anak ne...
 - 
Bagi temen-temen yang belom ngerjain IT Essentials Chapter 8 nih gua kasih jawaban IT Essentials Chapter 8 / answer IT Essentials Cha...
 - 
Bagi temen-temen yang belom ngerjain IT Essentials Chapter 2 nih gua kasih jawaban IT Essentials Chapter 2 ....
 
Tukeran Link
Trick dan Tips Mempercantik Blog's
- Konfigurasi Samba Server Pada Debian
 - Langkah-langkah instalasi Linux (Debian)
 - Instalasi Mailserver pada Debian
 - Cara Install dan setting phpmyadmin di linux debian
 - Cara Install dan Konfigurasi Squid Linux (Debian)
 - Konfigurasi DHCP Server Debian
 - Konfigurasi DNS Server {Linux Debian}
 - Konfigurasi Mail Server (Debian)
 
Blog Archive
- 
                                          ▼
                                       
2011
                                          (
                                          35
                                          )
                                       
- 
                                          ▼
                                       
Maret
                                          (
                                          23
                                          )
                                       
- Cara memasang jam pada blog
 - Cara ganti cusor mouse pada blogger
 - Cara Mengganti tampilan Cursor Mouse pada Blog
 - Membuat Buku tamu melayang Pada Blogger
 - DOWNLOAD ANTIVIRUS AVG VERSI TERBARU
 - Download Antivirus ANSAV Terbaru 2011
 - Cara buat dan Pasang Banner Flash di Blog
 - Membuat cursor bertaburan bintang - bintang
 - Jawaban IT Essentials Chapter 5 (v 4.1)
 - Jawaban IT Essentials Chapter 3 (v 4.1)
 - Jawaban IT Essentials Chapter 2 (v 4.1)
 - Jawaban IT Essentials Chapter 16 (v 4.1)
 - Jawaban IT Essentials Chapter 15 (v 4.1)
 - Jawaban IT Essentials Chapter 14 (v 4.1)
 - Jawaban IT Essentials Chapter 13 (v 4.1)
 - Jawaban IT Essentials Chapter 12 (v 4.1)
 - Jawaban IT Essentials Chapter 11 (v 4.1)
 - Jawaban IT Essentials Chapter 10 (v 4.1)
 - Jawaban IT Essentials Chapter 9 (v 4.1)
 - Jawaban IT Essentials Chapter 8 (v 4.1)
 - Jawaban IT Essentials Chapter 7 (v 4.1)
 - Jawaban IT Essentials Chapter 6 (v 4.1)
 - Jawaban IT Essentials Chapter 1 (v 4.1)
 
 
 - 
                                          ▼
                                       
Maret
                                          (
                                          23
                                          )
                                       
 


0 komentar :
Posting Komentar