CISCO 11-16 Final Exam Revision !!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Smithsr05
S
Smithsr05
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,633
| Attempts: 2,136 | Questions: 33
Please wait...
Question 1 / 33
0 %
0/100
Score 0/100
1. Which Windows hard drive partition is referred to as the C: drive?

Explanation

The C: drive in Windows typically refers to the first primary partition. A primary partition is a partition on a hard drive that can be used to boot an operating system. In most cases, the C: drive is the default partition where the operating system is installed, and it is assigned the drive letter C. Other partitions, such as extended or logical partitions, may be used for data storage or organization, but they are not typically referred to as the C: drive.

Submit
Please wait...
About This Quiz
CISCO 11-16 Final Exam Revision !! - Quiz

Revision tool to help you pass Cisco IT Essentials ! 

2. The corporate security policy states that all remote connections use only secure tunnels for transport of data. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?

Explanation

A VPN (Virtual Private Network) is the encryption technique that secures data traveling across the public Internet as if it were traveling across the corporate LAN. VPNs create a secure tunnel between the user's device and the corporate network, encrypting the data and ensuring its confidentiality and integrity. This allows remote connections to access the corporate network securely, protecting sensitive information from unauthorized access or interception. MD5 is a cryptographic hash function, while WEP and WPA are encryption protocols used in wireless networks, but they do not provide the same level of security as a VPN.

Submit
3. Which action should be taken first if a card key is lost or stolen?

Explanation

If a card key is lost or stolen, the first action that should be taken is to disable the lost card key. This is important to prevent unauthorized access and ensure the security of the premises. Disabling the card key will render it useless and prevent anyone from using it to gain entry. Once the lost card key is disabled, further steps can be taken such as issuing new card keys to employees who show picture identification or issuing a new card key to the owner after verifying their identity. However, the immediate priority is to disable the lost card key to minimize any potential security risks.

Submit
4. Which authentication technology uses a physical characteristic of the user in conjunction with a password?

Explanation

Biometrics is the correct answer because it refers to the authentication technology that uses a physical characteristic of the user, such as fingerprints, facial recognition, or iris scans, in conjunction with a password. This combination provides an added layer of security by requiring both something the user knows (password) and something the user is (physical characteristic) to verify their identity. Key fobs, smart cards, and key cards do not typically involve the use of physical characteristics for authentication.

Submit
5. The production manager of a small company is experiencing slow performance in a laptop. What should a technician try first in order to correct the problem?

Explanation

The correct answer is to defragment the hard disk. When a hard disk is fragmented, it means that files are scattered across different parts of the disk, causing the laptop to slow down when accessing those files. By defragmenting the hard disk, the technician can rearrange the files in a more organized manner, improving the performance of the laptop. Formatting the secondary partition, installing additional RAM, or upgrading the existing CPU may also improve performance, but they are not the first steps to take in this situation.

Submit
6. What is the highest risk associated with improperly charged or mishandled batteries?

Explanation

Improperly charged or mishandled batteries can lead to a high risk of explosion. When batteries are not charged or handled correctly, they can undergo a process called thermal runaway, where the internal temperature rises rapidly. This can cause the battery to rupture or explode, posing a significant safety hazard. It is crucial to follow proper charging and handling procedures to prevent such incidents and ensure the safe use of batteries.

Submit
7. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

Explanation

A mesh physical topology requires that every node is attached to every other node on the network. This means that there are multiple paths for data to travel from one node to another, providing a high level of redundancy. In a mesh network, if one connection fails, there are still alternative paths available for data transmission. This redundancy ensures that the network remains operational even if there are failures in individual connections or nodes.

Submit
8. Which Startup type must be selected for a service that should run each time the computer is booted?

Explanation

The correct answer is "automatic" because selecting this startup type ensures that the service will run automatically each time the computer is booted. This means that the service will start without any user intervention and will be available as soon as the computer starts up.

Submit
9. Which technology allows a user to securely access a company LAN across a public network?

Explanation

A VPN (Virtual Private Network) allows a user to securely access a company LAN (Local Area Network) across a public network. It creates a private and encrypted connection between the user's device and the company's network, ensuring that the data transmitted is protected from unauthorized access or interception. This technology is commonly used to enable remote access to company resources while maintaining a high level of security.

Submit
10. A network technician is installing network service in a new office. What is the distance limitation of a single data run for UTP cabling without adding networking devices?

Explanation

The correct answer is 330 ft (100 m). This is the maximum distance that a single data run for UTP cabling can reach without the need for additional networking devices. Beyond this distance, signal degradation may occur, resulting in a loss of data quality and reliability. Therefore, it is important to consider the distance limitations when installing network services in a new office to ensure optimal performance.

Submit
11. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?

Explanation

The correct answer is "Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point." This option provides the correct sequence of steps to create a restore point on a computer. By going to the Start menu, accessing the System Tools folder, and selecting the System Restore option, the technician can then choose to create a new restore point. This option is the most accurate and specific among the given choices.

Submit
12. A network technician has been asked to determine the best Internet connection for a branch office located in a new metropolitan office building. Which connection would provide the highest bandwidth and reliability at the lowest cost?

Explanation

DSL (Digital Subscriber Line) would provide the highest bandwidth and reliability at the lowest cost for the branch office located in a new metropolitan office building. DSL uses existing telephone lines to transmit data and offers faster speeds compared to traditional dial-up connections. It is a cost-effective option that provides a stable and reliable internet connection, making it suitable for business purposes. Additionally, DSL technology is widely available in metropolitan areas, ensuring easy accessibility for the branch office.

Submit
13. A network administrator has been informed about a problem with the network printer. What is the best way to prevent print jobs from being added to the queue while the printer is being repaired?

Explanation

Stopping the print service is the best way to prevent print jobs from being added to the queue while the printer is being repaired. This action will temporarily disable the print service, preventing any new print jobs from being accepted and added to the queue. It allows the network administrator to focus on repairing the printer without the risk of additional print jobs being sent and potentially causing further issues. Once the printer is repaired, the print service can be restarted to resume normal printing operations.

Submit
14. Which recommendation should be observed when replacing existing memory?

Explanation

When replacing existing memory, it is recommended to use new memory that is as fast or faster than the existing memory. This ensures that the performance of the system is not compromised and that there is no bottleneck created by slower memory. By using faster memory, the system can take full advantage of its capabilities and operate efficiently.

Submit
15. A technician has been asked to install a second optical drive in a computer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?

Explanation

The technician can accomplish the desired configuration by using jumpers on the drive to configure it as a slave. Jumpers are small connectors on the drive that can be moved to different positions to set the drive as either a master or a slave. By configuring the drive as a slave, it will work alongside the existing optical drive in the computer.

Submit
16. A new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)

Explanation

To avoid any injury when transporting the heavy printer to the service area, it is important to avoid lifting the equipment using the strength in your back. This is because lifting heavy objects with your back can strain the muscles and potentially cause back injuries. Instead, it is recommended to lift the equipment using the strength in your legs and knees. This helps to distribute the weight evenly and reduce the strain on your back. By bending your knees and using your leg muscles, you can lift the printer safely and avoid any potential injuries.

Submit
17. A technician is trying to explain USB 1.1 and USB 2.0 to a user in terms of speed. The user is having problems comparing the two standards based on the values expressed in Mbps. Which explanation can the technician use that will best describe the relationship?

Explanation

The technician can explain that USB 2.0 is forty times as fast as USB 1.1 by comparing their speeds. USB 1.1 has a speed of 12 Mbps, while USB 2.0 has a speed of 480 Mbps. By dividing the speed of USB 2.0 by the speed of USB 1.1, we get 480/12 = 40. This means that USB 2.0 is forty times faster than USB 1.1.

Submit
18. Which two characteristics describe a software firewall? (Choose two.)

Explanation

A software firewall is typically installed on a specific computer and provides protection for that computer only. It does not extend its protection to other devices on the network. Additionally, a software firewall utilizes the CPU of the host computer to perform its functions, such as inspecting and filtering network traffic. This means that the host computer's processing power is used for firewall operations, which can potentially impact its performance.

Submit
19. Which three ports should be left open to avoid filtering e-mail traffic? (Choose three.)

Explanation

To avoid filtering e-mail traffic, ports 25, 110, and 143 should be left open. Port 25 is used for SMTP (Simple Mail Transfer Protocol) to send e-mails, port 110 is used for POP3 (Post Office Protocol version 3) to receive e-mails, and port 143 is used for IMAP (Internet Message Access Protocol) to access e-mails on a mail server. By leaving these ports open, the necessary protocols for sending, receiving, and accessing e-mails can function properly without being filtered or blocked.

Submit
20. After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additional action should the administrator take to resolve this problem?

Explanation

To resolve the issue of the laptop being unable to connect to the wireless LAN even after manually configuring the correct SSID, the administrator should verify that the MAC address for the laptop is in the MAC address filter table. MAC address filtering is a security feature that allows or denies network access based on the device's MAC address. By ensuring that the laptop's MAC address is added to the filter table, the administrator can allow the laptop to connect to the wireless LAN.

Submit
21. An organization has two buildings, each with a separate network that uses a different IP addressing scheme. Which device can be used to enable the flow of data between the two networks?

Explanation

A router can be used to enable the flow of data between the two networks in the organization. Unlike a bridge or a hub, a router can connect multiple networks with different IP addressing schemes and route data packets between them. A switch, on the other hand, is used to connect devices within a single network and does not provide the capability to connect separate networks. Therefore, a router is the most suitable device for enabling communication between the two networks in this scenario.

Submit
22. Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?

Explanation

The correct answer is 443. HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP, and it uses port 443 for communication. By opening port 443 on the firewall, the network administrator will allow the secure server to be accessed properly, resolving the issue.

Submit
23. A technician wishes to secure the network authentication for all remote users. Which security technology uses radio communication with a computer before accepting a username and password?

Explanation

Key fobs are a security technology that uses radio communication with a computer before accepting a username and password. Key fobs are small devices that generate a unique code that is transmitted wirelessly to the computer, providing an additional layer of security for network authentication. This code is typically time-based and changes every few seconds, making it difficult for unauthorized users to gain access to the network without the physical key fob.

Submit
24. Which type of printer configuration method overrides any other type of configuration?

Explanation

The default printer configuration method overrides any other type of configuration. This means that if a printer is set to use the default configuration, it will ignore any other specific configurations that may have been set for it. This ensures that the printer always uses the default settings, regardless of any other settings that may be in place.

Submit
25. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

Explanation

MD5 and SHA (Secure Hash Algorithm) are both widely used algorithms for hash encoding to ensure data integrity. MD5 (Message Digest Algorithm 5) produces a 128-bit hash value and is commonly used for data integrity checks. SHA, on the other hand, refers to a family of algorithms such as SHA-1, SHA-256, SHA-384, and SHA-512. These algorithms generate hash values of different lengths and are widely used for various security applications, including data integrity verification. Together, MD5 and SHA provide strong guarantees for the integrity of data.

Submit
26. Which feature is characteristic of the ntbackup command?

Explanation

The characteristic feature of the ntbackup command is that it can be executed from a batch file. This means that multiple backup operations can be automated and scheduled by creating a batch file that contains the necessary ntbackup command. This allows for efficient and convenient backup management without the need for manual intervention.

Submit
27. After scanning an image, what is the next step to conclude a scanner test?

Explanation

The next step to conclude a scanner test is to print the scanned image and compare it with the original scanned image. This allows for a visual comparison to detect any discrepancies or deficiencies in the scanning process. By contrasting the printed image with the original, any errors or issues can be identified and addressed. Calibrating the scanner based on the scanned image or visually comparing the image against the image on the screen are not mentioned as steps to conclude the scanner test.

Submit
28. After gathering information from a user regarding failure of a printer, which three actions should be performed? (Choose three.)

Explanation

The three actions that should be performed after gathering information from a user regarding failure of a printer are: ensuring all cables are connected correctly, clearing any type of paper jams, and verifying any type of print job in the printer queue. These actions address the most common issues that can cause a printer to fail. Checking the cables ensures that there is a proper connection between the printer and the computer. Clearing paper jams resolves any physical obstructions that may be preventing the printer from functioning. Verifying the print job in the printer queue ensures that there are no pending or stuck print jobs that could be causing the issue.

Submit
29. What are two characteristics of the IEEE 1284 standard? (Choose two.)

Explanation

The IEEE 1284 standard has two available operative modes, which are EPP and ECP. This means that devices using this standard can operate in either of these modes for data transfer. Additionally, the IEEE 1284 standard allows for bi-directional communication, meaning that data can be sent and received between devices using this standard.

Submit
30. Which three laser printer components usually break? (Choose three.)

Explanation

The three laser printer components that usually break are the fuser assembly, pickup rollers, and transfer rollers. The fuser assembly is responsible for bonding the toner to the paper and can wear out over time. Pickup rollers are used to pick up the paper from the paper tray and can become worn or dirty, leading to paper jams. Transfer rollers are responsible for transferring the toner from the drum to the paper and can wear out or become damaged.

Submit
31. A network administrator needs to restrict access to the network. Which type of firewall allows only those packets that are part of a known connection?

Explanation

A stateful firewall is a type of firewall that allows only those packets that are part of a known connection. It keeps track of the state of network connections and filters packets based on their connection state. This means that it can differentiate between legitimate packets that are part of an established connection and unauthorized packets that are not. By doing so, it provides a higher level of security by only allowing packets that are part of a known and trusted connection to pass through the firewall.

Submit
32. The purchasing department at ABC Company has the choice of buying a retail version or an OEM version of a NIC. Which two things must the purchasing department consider when deciding whether to choose the retail or OEM version? (Choose two.)

Explanation

The purchasing department should consider two things when deciding whether to choose the retail or OEM version of a NIC. Firstly, they should consider that the installers may need to find the drivers for the OEM NICs on the Internet. This means that the necessary drivers may not be readily available and may require additional time and effort to locate and install. Secondly, they should consider that OEM NICs may lack proper documentation. This means that there may not be comprehensive instructions or support materials available, which could make installation and troubleshooting more challenging.

Submit
33. When performing a default installation of Windows XP Professional, which two screens are displayed to configure custom settings? (Choose two.)

Explanation

During a default installation of Windows XP Professional, two screens are displayed to configure custom settings. The first screen is for configuring regional settings, such as language, time zone, and keyboard layout. The second screen is for setting up the administrator password and user accounts, allowing the user to create and customize user accounts with different privileges and passwords. These two screens allow the user to personalize the regional and security settings according to their preferences and requirements.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 25, 2011
    Quiz Created by
    Smithsr05
Cancel
  • All
    All (33)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which Windows hard drive partition is referred to as the C: drive?
The corporate security policy states that all remote connections use...
Which action should be taken first if a card key is lost or stolen?
Which authentication technology uses a physical characteristic of the...
The production manager of a small company is experiencing slow...
What is the highest risk associated with improperly charged or...
A technician has been asked to develop a physical topology for a...
Which Startup type must be selected for a service that should run each...
Which technology allows a user to securely access a company LAN across...
A network technician is installing network service in a new office....
A company has a preventive maintenance policy that requires every...
A network technician has been asked to determine the best Internet...
A network administrator has been informed about a problem with the...
Which recommendation should be observed when replacing existing...
A technician has been asked to install a second optical drive in a...
A new technician has joined the IT team and is about to service a...
A technician is trying to explain USB 1.1 and USB 2.0 to a user in...
Which two characteristics describe a software firewall? (Choose two.)
Which three ports should be left open to avoid filtering e-mail...
After the administrator manually configures the correct SSID on a new...
An organization has two buildings, each with a separate network that...
Several messages sent to the network administrator are reporting that...
A technician wishes to secure the network authentication for all...
Which type of printer configuration method overrides any other type of...
Which two algorithms are used for hash encoding to guarantee the...
Which feature is characteristic of the ntbackup command?
After scanning an image, what is the next step to conclude a scanner...
After gathering information from a user regarding failure of a...
What are two characteristics of the IEEE 1284 standard? (Choose two.)
Which three laser printer components usually break? (Choose three.)
A network administrator needs to restrict access to the network. Which...
The purchasing department at ABC Company has the choice of buying a...
When performing a default installation of Windows XP Professional,...
Alert!

Advertisement