Coc PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 40

1|Page

Level III theoretical part exam


1) While gathering data to determine the organization business requirement you might take records of the
organization like, annual reports and organizational polices. These kinds of information resources are
considered as
a. informant sources
b. primary sources
c. secondary sources
d. tertiary sources
2) The main reason for implementing a network for an organization is
a. to reduce security risk
b. to decrease company cost
c. to share resources
d. to exchange information
e. all
3) You are requested to implement an antivirus policy in a company that has large number of user.
identify the incorrect statement on implementing the antivirus policy
a. each computer in the company should be equipped with virus detection and cleaning software
b. each user should install his own antivirus software and know how to use it
c. organization should impose penalties on user who don't follow the antivirus policy
d. the company should have an antivirus team that focus on maintaining the antivirus measures in
place
4) you want to implement a mechanism that automates the ip configuration in your company's network.
the protocol that helps you to accomplish this
a. DHCP
b. DNS
c. SMTP
d. STP

5) you are the administrator for your company's domain. You need to subdivide the groups in your
organization within active directory. if you want to separate sales from marketing as an example. what
will use as a system of organization this subdivision
a. crate organization unit
b. crate a site and service subnet grouping
c. use user and group
d. use separate domains
6) the file system that allow for file level security to use for a server that will be an active directory
domain controller for your organization.
a. CDFS
b. FAT
c. FAT32
d. NTFS
7) your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant
in another city. the best device required to enable everyone to share data and resources between the two
LANs
a. Router
b. HUB
c. modem
d. switch
8) The TCP/IP pro for transferring electronic mail messages
a. FTP

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
2|Page

b. RPC
c. SMTP
d. SNMP

9) the command used to access active directory installation wizard


a. DOMAINISTALL
b. DCPROMO
c. DCONFIG
d. DCINSTALL
10) A system administrator wants to prevent users from starting or stopping specific services on the
domain controller. The tools that can be used to do this.
a. active directory users and computers
b. domain security policy
c. local system policy
d. domain controller security policy
11) the research and development department at your office has be experimenting with different
technologies to help improve the performance of the network; one group has been examining the use of a
broadband network versus a based band network. The correct statements about broadband and baseband.
a. broadband network carry several channels on a single cable, whereas in a baseband network
several cables carry one channel
b. baseband networks carry a single channel on a single cable whereas broadband networks
carry several channels on a single cable
c. baseband operates at a standard bit rate, whereas broadband may operate at different rates as
needed
d. Broadband and baseband refer to the different frequencies at which infrared operates then
transmitting signals in certain conditions.

12) computer cannot communicate with each other directly over telephone line because they use digital
pulse where as telephone lines use analog sound frequency. the device that permits digital to analog
conversation at the start of transmission
A. attenuation
B. interface
C. modem
D. NIC
13) the configuration information for a DHCP client is received dynamically the utility used to read
configuration for everything this setting.
A. tracert
B. ping
C. net stat
D. ipconfig
14) you are in charge of a small network and want to make a secured. the user want to have full control
over their data and still be able to share data with the rest of the office. the best type of network to set up
this.
A. client based network
B. master domain network
C. peer-to-peer network
D. server based network
15) Your customer has a client/ server Ethernet network consisting of a server and 225 computer running
windows Xp . The kind of security you recommend to him for centralized control of access to file and
directions on the network.
a. setup a password for each file and groups for each directory

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
3|Page

b. setup a password for each file and directory shared


c. setup a group of shared resources and user who have access to these group
d. setup a password for each user

16) you are requested to setup a 100mbps network for a client in an office that already has 10mbps
throughput. your client wants to keep the costs to a minimum but needs the 100mbps throughput. the
cabling solution you recommend?
a. cat3UTP
b. cat5UTP
c. coaxial cable
d. fiber able
17) the following figure shows a typical small size organize network setup. identify the network
components marked with letters A,B,C AND D consecutively.

a. DSL modem, CAT5 Ethernet cable, wireless signal, wireless router/access point.
b. Wireless router/access point, CAT 5 Ethernet cable, wireless signal DSL modem.
c. wireless router/access point, wireless signal, CAT 5 Ethernet cable, DSL modem
d. DSL modem, wireless signal, CAT5 Ethernet cable, wireless router/access point
18) you are assigned to lead a small team in your company for managing network identify the wrong
statement in leading a team
a. understand the team role
b. possess necessary leadership skill
c. favor some individuals in your team
d. assign responsibilities to team members
19) one of yours calls you with a complaint that they can't reach the site www.yahoo.com. you try and
access the site and discover that you can't access either. but you can PING the site with its IP address. the
most probable cause of the problem.
a. yahoo is down
b. the working switch is down
c. the gateway is down
d. the DNS server is down
20) the hardware and network administrator wants to remotely and securely enter commands to be run at
a remote server. the application that the administrator should use.
a. telnet
b. SSH
c. SFTP
d. RSA

21) you have just implemented a solution for a major network problem in your company and you want to
celebrate the success. The next step you should dc before starting your celebration

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
4|Page

A. Document the issue and the solution that has implemented


B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization

TYPE I
Match the OSI model layers function in column A with the name of the correct OSI model layer in
column B

COLUM A COLUMN B
__G__1, breaks data down in to manageable chunks and TCP and UDP A. Application layer
operate at this layer B. Data link layer
__D__2, define hardware connection and turns binary in to pulses(electrical C. Network layer
or light) and also repeaters and hubs operate at this layer D. Physical layer
__B__3, identifies devices on the physical layer and MAC addresses are E. Presentation layer
part of this layer F. Session layer
__F_ 4, manages connections between machines and sockets operate at this G. Transport layer
layer
__C___5, moves packets between computers on different networks and
routers operate at this layer

Type II

Match the name, type or category of IP address in column A with this IP addresses sated in column B

COLUMN A COLUMN B
___C__1, loop back IP address A. 192.168.1.1
__F__2, broadcast IP address B. 10.10.10.10
__G___3, public IP address C. 127.0.0.1
__B__4, class A IP address D. 172.16.0.20
__D__5, class B IP address E. 213.55.96.148
F. 255.255.255.255
G. 297.25.1.6

Type III
Match the uses and functions of operating system built in network troubleshooting tools in column A
with the corresponding tool in column B
Column A Column B
__G__1, used to diagnose problems reaching a A. HOSTNAME
remote system by tracing all router between two points. B. IPCONFIG
___E__2, used to diagnose DNS problem C. NBTSTAT
__A___3, used simply to return the name of the local D. NETSTAT
computer E. NSLOOKUP
__B__4, used to display information on the current F. PING
state of all the running IP processes on your computer G. TRACERT:- diagnostic utility
__D__5, uses ICMP(internet control message protocol) determines the route to a destination by
packets to show you if you can simply reach a remote sending ICMP echo packet to the
computer destination

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
5|Page

1. Which layer is responsible for process to process delivery?


A. network layer
B. transport layer
C session layer
D. data link layer
2. Chala is attempting to install a new web camera on his Windows Server 2003 to be used to monitor
the server room. Chala informs you that the device is not detected when he plugs it in. Chala says he
also tried to use the Add Hardware Wizard, but the driver was not found. You need to help Chala
install the web cam as soon as possible. What should you do? (uc3)
A. Open Device Manager and click Scan For Hardware Changes. Insert the driver disk when
prompted and install the device.
B. Start the Add Hardware Wizard and manually install the device. Supply the driver
from the manufacturer’s disk.
C. Restart the computer.
D. Open Device Manager and select Sound, Video & Game Controllers. Right-click and select
Update Driver.

3. You are the administrator of a Windows 2003 domain. All domain controllers are running Windows
Server 2003 and the domain functional level has been raised to Windows 2003. You are in the
process of building a new domain controller, which you have named OCOC. When asked for a
password, you enter ococ receive an error. What should you do to continue building the server? (uc3)
A. Log on to a different domain controller and modify the default domain policy to allow
passwords of five characters. Disable the Require Complex Passwords option.
B. Change the password to Ococserver9.
C. Change the password to ococse9%rver.
D. From a command prompt, type net user ococserver9$.
4. You are the administrator of a standalone Windows Server 2003 server. Mulugeta is your new junior
administrator. You want Mulugeta to be able to back up files and folders, run programs, but not shut
down the system. What should you do?(uc5)
A. Make Mulugeta a member of the Backup Operators group.
B.Make Mulugeta a member of the Backup Operators group. In the local security policy, edit the
User Rights node to deny Daniel the right to shut down the system.
C. Make Mulugeta a member of the Administrators group.
D. Make Mulugeta a member of the Power Users group.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
6|Page

5. You are the administrator of a Windows 2003 network. Chaltu, a help desk technician, leaves the
company. Gemechu, a new hire, will take Chaltus’s place. You want Gemechu to have the same level
of access that Chaltu had. What should you do? (uc6)
A. Rename Chaltus’s account to Gemechu. Reset the password.
B. Copy Chaltu’s account and create a new account for Gemechu. Disable Chaltu’s account.
C. Create a new account for gemechu. Recreate the group membership of Chaltu’s account to
Gemechu’s account.
D.Copy Chaltu’s account and create a new account for Gemechu. Delete Chaltu’s account.
6. You are installing the root domain controller for your forest. You have decided that the fully qualified
domain name for the computer will be ococ.gov.et. The system prompts you with a suggested
NetBIOS name for the computer. Which NetBIOS name is prompted?(uc3)
A. ococ.gov
B. ococ
C. gov
D. ococ.gov.et.
7. 11. You are troubleshooting your DNS server. The server has not been resolving some of the hosts in
the network, but is working fine for others. You check the DNS MMC snap-in and everything looks
okay. What utility should you use to determine the nature of the problem? (uc7)
A. The netstat command
B. Network Monitor
C. The nslookup command
D. The Monitoring tab of the DNS server’s Properties page
8. Which of the following groups offers the most security? (uc5)
A. Users
B. Administrators
C. Power Users
D. Backup Operators
9. What is the utility used to install Active Directory on a Windows Server 2003 computer? (uc3)
A. promotedc.bat
B. dcupgrade.exe
C. adinstall.exe
D.dcpromo.exe
10. As a network administrator you have been requested to move a printer from your company's
Marketing OU to your company's Research OU. After the move you test the printer and find that the local
administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can
you do to change this? (uc5)

A. Remove the permissions for the local administrator from the printer.
B. Remove printer permissions from the local administrator.
C. Remove the Everyone group from the printer.
D. Delete the printer object.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
7|Page

11. What can you use to dynamically assign the same IP address to a printer configured as a network
device?(uc3)
A. DNS
B. DHCP reservation
C. SNMP
D. DHCP exclusion
12. Which of the following is the behavior of good team members?(uc 11)
A. Share responsibilities
B. Keep individual information about development
C. Do not respect the opinions of others in the team
D. Do not take turns
13. Which of the following is categorized as richest channel in conveying information effectively? (uc 12)
A. Telephone
B. Face to face communication
C. Posted notices and bulletins
D. E-mail
14. Which of the following is not market promotional tool?(uc13)
A. networking and referrals
B. supply/demand
C. seminars
D. advertising
1. With respect to the OSI model, which of the following are correct statements about PDUs? (uc 2)
A. A segment contains IP addresses.
B. A packet contains IP addresses.
C. A segment contains MAC addresses.
D. A packet contains MAC addresses
16. The most effective way to mitigate congest ion on a LAN would be to__________________? (uc 7)
A. Upgrade the network cards
B. Change the cabling to CAT 6
C. Replace the hubs with switches
D. Upgrade the CPUs in the routers
17. You need to provide network connectivity to 150 client computers that will reside in
the same sub network, and each client computer must be allocated dedicated bandwidth. Which device
should you use to accomplish the task? (uc 7)
A. Hub
B. Switch
C. Router

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
8|Page

D. Bridge
18. Which of the following layers of the OSI model was later subdivided into two layers? (uc 2)
A. Presentation
B. Transport
C. Data Link
D. Physical
19. Which class of IP address provides a maximum of only 254 host addresses per network ID? (uc 2)
A. Class A
B. Class B
C. Class C
D. Class D
20. All of the following are results of Kaizen implementation in work places except;
A. Improvement in product quality
B. Safety in work places
C. Efficient space utilization
D. high waiting time
21. A network administrator is verifying the configuration of a newly installed host by establishing an
FTP connection to a remote server. What is the highest layer of the protocol stack that the network
administrator is using for this operation?
A. application
B. presentation
C. session
D. transport

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
9|Page

SECTION B – MATCHING TYPE QUESTIONS

Column A Column B
P .1. Assigning the same IP address on a network
A. 127.0.0.0
A. 2. Loop back address
B. Print device
D. 3. Sending of information packets to a single network node.
C. Quality control
H .4. A commonly used IP translation and mapping technology
D. unicast
F. 5. Provides IP-address to MAC address resolution for IP packets
E. Multicast
G .6. Provides a solution that automatically assigns IP addresses to
F. ARP
computers on a network
G. DHCP
E. 7. A single source address responding to multiple destination addresses
H. NAT
with information to be sent
I. Switch
K. 8. Addressing scheme utilizes a 128 bit address
J. Router
B. 9. A hardware device used for printing
K. IP V6
Q .10. A set of rules determining how network devices respond when two
L. Work ethics
devices attempt to use a data channel simultaneously
M. IP V4
R. 11. Responsible for electrical and mechanical connection b/n devices
N. Broad cast
I . 12. Device sends and receives information about the network layer
O. Printer
J . 13. Uses hardware address to filter a network
P. IP address conflict
L. 14. Group of moral principles, standards of behavior, or set of values
Q. CSMC/CD
regarding proper conduct in the workplace
R. Physical Layer
C. 15. Is the operational techniques and activities that are used to fulfil
S. HTTPS
requirements for quality.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
10 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
11 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
12 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
13 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
14 | P a g e

Column “A” Column “B”

1. Loop back O A. NAT


2. Resolve IP address M B. Bad memory
3. Dynamic Configuration L C. ESD
4. Parity error B D. Segmentation
5. Reliable communication Q E. UDP
6. Anti-wrist strap C F. HTTP
7. Hide IP address A G. CSMA/CD
8. Transport layer D H. Protocol
9. Generic of communication with bridge and router I. FTP
10. Absorbing Signal bouncing communication S J. Authentication
11. Threat security Communication J k. Authorization
12. Unreliable communication E L. DHCP
13 . access method G M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
s. Terminator

Column A Column B

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
15 | P a g e

Column A Column B
1. Ip Address Conflict M A. Kaizen
2. Fiber optics cable connectors F B. Worm
3. telnet P C. Workplace communication
4. class B IP address range U D. Quality control
5. continuous improvement A E. Site
6. A secret word or string of characters used for F. MT-RJ
user authentication T G. 10.xxxxx
7. a logic group of workstation, server and network H. Ping
devices that appear to be on the same LAN I. DNS
despite of their geographical distribution K J. NAT
8. replicates itself B K. VLAN
9. refers that DNS name resolution is working L. Wi-Fi
correctly R M. Assigning the same IP address
10. exchanging of information both verbal and non- N. FTP
verbal within an organization C O. UDP
11. Set of procedures intended to ensure that P. Remote login protocol
manufactured product or performed service are Q. Transport
delivered in advanced set of quality D R. NS Lookup
12. object in active directory represents a S. Authentication
geographical location that holds network E T. Password
U. 128.xxx

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
16 | P a g e

1. Allows various object types to be moved from A. Active Directory Migration Tool
current location to a new location D Delegation Control Wizard
2. allows administrators to log on with a non- B. Dictionary attack
administrator account to perform C. DS move
administrative tasks without logging off. H D. Run as
3. to migrate objects in Active Directory forests E. Drag and drop
A F. Identification number (PIN)
4. used to build, deploy and operate XML and G. Secondary Logon
web service Q H. Strong Password
5. One part of dictionary attack J I. Password cracking
6. Move the domain name J. Group Policy
7. OU moving F K. Hub
8. Separate collusion domain and same L. Proxy Server
broadcast O M. File Server
9. All ports are in the same collusion and N. Switch
broadcast domain L O. Print Server
10. Used to share public resource N P. Applcation Server
11. Show only one ip address for multiple users Q. Coaxial cable
on the subnet M R. UTP
12. Hacking and cracking password C
13. ATM(Automated Teller Machine) G
14. Requirment feature run as

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
17 | P a g e

Matching A
A B
1. Loop back address 127.0.0.1 A. Bad memory
2. Resolve IP address DNS B. NAT
3. Dynamic configuration DHCP C. ESD
4. Parity Error NAT D. Segmentation
5. Reliable communication Packet switch E. UDP
6. Anti wrist strap ESD F. HTTP
7. Hide IP address Bad Memory G. CSMA/CD
8. Transport Layer Segmentation H. Protocol
9. Generic of communication with bridge and router Protocol I. FTP
10. Absorbing signal bouncing communication Terminator J. Authentication
11. Threat security communication Authentication k. Authorization
12. Unreliable communication UDP
13. Access method CSMA/CD L. DHCP
M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
S. Terminator

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
18 | P a g e

Matching B
A B
1. Hardware Problem (F) Cabling Problem A. Packet
2. NIC driver not installed (C) NIC Failure B. ARP a
3. Typing incorrect user name & password(E) Software Problem C. NIC Failure
4. Coaxial Cable connector(T/L) BNC/ T-connector D. Telnet
5. Incorrect color arrangement of UTP cable(H) Operator errorE. Software Problem
6. Used to start to install Active directory(I) DCPROMO F. Cabling Problem
7. The first troubleshooting step(N) Establish/identify G. RJ-45
8. Used to establish a session with remote device(D) Telnet H. Operator error
9. Display protocol statistics & current TCP/IP I. DCPROMO
Network connection(O) NETSTAT J. Web server
10. Used to access E-Mail(K) Message k. Message
11. Fiber optics connector (M) MT-RJ L. BNC
12. Network layer data format (J) Web server M. MT-RJ
13. Display MAC address of a machine (B) ARP a N. Establish/identify
14. Twisted pair cable connector (G) RJ-45 symptom
15. Application layer data format (R) File Server O. NETSTAT
P. Exchange Server
Q. RJ-11
R. File Server
S. Event log
T. T-connector

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
19 | P a g e

Matching
1) Packet filter………………………………………..………Router
2) Class A IP Address………………………………..……10.0.0.1
3) Fiber optical cable connecter………………….….5C
4) UTP Cable connector………………………………….RJ-45
5) ARP…………………………………………………………...Convert IP address to MAC
6) Line tel phone connector……………………..…….RJ-11
7) Resolve IP address domain name……………….192.168.0.1
8) Temporary storage voltage ……………………….RAM
9) Non Verbal communication………………….….no write paper word
10) Communication work place people………..….work ethic
11) Terminator ……………………………………………….Bus Topology
12) Connection oriented reliable………………….…..TCP/IP
13) Computer manager………………………………..….Server Based Network
14) Firewall …………………………………………………….Unauthorized access to a network
15) Physical layer ………………………………………..….Convert electrical pulse in to light

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
20 | P a g e

ASSESSMENT PACKAGE ON HNS

Instruction I choose the best answer from the given alternatives


1. Net window application is installed and run it works fine, however when operating word which has
privesly, installed a general protection fault is generated and word terminates, after installing word if still
refers to run the problem is called____________be
A. The new open our works do file related to file
B. Run RECEDIT to the restore word in the registorey
C. The word installation files have become corrupted and you created new installation media
D. The new open used to much RAM and not enough to run
2. During the printing an error message is displayed the PC are printed recently and no change have been
made to PC soft ware or hard ware you check to see that the printer is turned on then you look next
A. if the correct printer driver printer is installed
B. if the printer selected is are defaulted
C. if the printer is on line
D. if the printer will print attached to different pc
3. A floppy driver light comes on and stray on the most possible cause of the problem is
A. No floppy diskette in it
B. No power
C. The sound cable is missed
D. The cable is in proprley
4. CD ROM drivers connected to pc using?
A. fiber cable
B. floppy cable
C. ICSI connector
D. IDE inter face cable
5. Allow video card is installed and configure when the pc rebooted window change on log on screen
The step to the resolve program is
A. Boot step by step confirmation and do not sound anything that doesn’t necessary for the system boot
B. Port the computer in safe mode change video driver to VGA
C. The install window
D. boot command promote only
6. The network cable that transmission single in the form of light is
A. Coaxial cable C. STP cable
B .UTP cable D. Fiber optic cable

7. What does a lit status link light on the network adapter's back plate mean?
A. The connection is alive
B. Data is being uploaded
C. Data is being downloaded
D. Data is being encrypted

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
21 | P a g e

8. You have been asked to make a recommendation to improve the performance of a client's network.
When you examine the network architecture, you find that it is based on hubs. What should you
suggest to improve the LAN's performance?
A. Install higher-speed hubs to minimize system upgrade costs and maintain compatibility with the
existing network structure.
B. Install high-speed switches to replace the old hubs. This will provide more intelligent switching
of the information around the network.
C. Install routers to replace the hubs. Router performance is so much better than hubs that the
performance increase will be very noticeable.
D. Install a router to better control information movement in the network and replace the
hubs with switches to improve network traffic.
9. What Windows tool can be used to configure most modern routers?
A. The Windows Explorer interface
B. The Device Manager utility
C. The MSCONFIG utility
D. Internet Explorer web browser
10. In Windows, the networking component that provides the rules that the computer uses to govern the
exchange of information across the network.
A. Client
B. Adapter
C. Protocol
D. Service
11. How is the UNC format applied to shared resources?
A. //shared_resource_name
B. //host_name/shared_resource_name
C. \\shared_resource_name
D. \\computer_name\share_name
12. Which of the following causes a mapped drive to disappear from a system when it is shut down and
restarted?
A. The name of the mapped folder has been changed
B. The Reconnect at Logon option is not selected
C. The path to the mapped folder has changed
D. The host computer for the mapped folder is turned off
13. Where can the TCP/IP protocol be manually configured in Windows XP?

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
22 | P a g e

A. In the Properties page of the Local Area Connection Icon, which is located in the
Network Connections Window
B. In the Network Component Type screen through the Dial-Up Connections page
C. In the Protocol Installation screen through the Local Area Connection page
D. In the Protocol screen of the Network Configuration page
14 .What effects will running diagnostic applications across the network have on the network's
performance?
A. The unit running the application will not have access to other parts of the network.

B. The units on the network may slow down


C. The units on the network will communicate faster

D. The units on the network may crash.

15 .You have been sent to troubleshoot an Internet connectivity problem. When you try to PING the site's
fully qualified domain name, the site cannot be located; however, you can PING its IP address. What
network function should be checked?
A. DNS
B. DHCP
C. WINS
D. FTP
16 .When you enter IPCONFIG in the Run dialog box, you get a momentary black box on the display
followed by a normal command prompt screen. What is occurring with this command?
A. The TCP/IP utility has not been configured on the local machine.
B. The network adapter is bad. Therefore, there is no information for the IPCONFIG utility to
return.
C. The local host is not communicating with the client computer. Therefore, there is no
information for the IPCONFIG utility to report.
17 .After running the IPCONFIG utility, you try to PING the local adapter's IP address but no reply is
returned. What does this indicate?
A. TCP/IP has not been loaded into the system.
B. The local adapter's IP address has not been initialized.
C. TCP/IP is not working on the gateway device.
D. The default gateway is not functional.
18 .A computer on your network is not able to see any other computers on the network. When you check
the adapter's TCP/IP configuration, you find that the IP address is 169.254.0.0. What does this indicate?
A. The network adapter in the machine is bad or has not been initiated.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
23 | P a g e

B. The cable connecting the PC to the local switch is bad.


C. The DNS function for the network is not working and Automatic Private IP Addressing has
been performed by the local PC.
D. The DHCP function for the network is not working and Automatic Private IP
Addressing has been performed by the local PC.
19 .What command would be used to establish network connectivity?
A. IPCONFIG /all
B. IPCONFIG /release
C. IPCONFIG /renew
D. IPCONFIG /registerdns

20. Which IP address will invoke the TCP/IP loopback function?


A. 127.0.0.1
B. 10.0.0.1
C. 169.192.0.1
D. 172.254.0.1
21. Generally, whenever a user tells you that the LAN connection is not working, what is the first thing
to check?
A. Check the network adapter drivers to see that they are configured properly

B. PING a known IP address to see if the network cable and connectivity is good.

C. Check for the presence of link lights on the back of the network adapter

D. Run IPCONFIG to see if the local network hardware is functioning.

22. A user can access an associate's computer on the network but can't access the Internet through the
network gateway. What is the most likely cause of this problem?

A. The Subnet Mask configuration is incorrect.

B. The DNS service is not working.

C. The DHCP service is not working.

D. The gateway address is configured incorrectly.

23. If you try to ping the loopback address and nothing happens, what is most likely the problem?

A. TCP/IP is not working on the local machine.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
24 | P a g e

B. The network cable is bad.

C. The local connectivity device is turned off

D. The network adapter in the local machine is defective.

24. A device that used to connect all nodes in star topology in one place is

A. Repeater B. Hub C. Switch D. B&C

25. The type of network cable that commonly used in TV system

A. UTP B. Coaxial C. fiber optics D. all

26. Terminator in a bus topology is used for

A. to transmit the signal on networks B. Connect all nodes to each other

C. Stop the signal on bouncing over the back bone & make the main cable free

D. all

27. _________ Is a network adopter that is used to connect PC to N/W.

A. NIC B. Bridges C. Repeaters D. none

28 . Is device that can be used to connect N/Ws that use different technologies (LANs, MANs

& WANs)

A. Bridges B. Repeaters C. Routers D. Switches

29 . Which one of the following is the function of NIC?

A. Prepare data from the computer for the network cable


B.Send the data to another computer
C.Control the flow of data b/n computer & cabling system
D.all of the above

30 . The maximum cable length segments of UTP cable is

A.100 meter B.185 meter C.500 meter D. none

31 ._______cable is good for very high speed, high capacity data transmission.

A. Coaxial cable B. Twisted Pair cable C. Fiber optic cable D.all

32 . Which net work device can amplify or regenerate the weak signal

A. Bridge B. Switch C. Repeater D. all

33. Which one of the following net work device used to connect different net work that uses

the same net work protocol?

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
25 | P a g e

A. Switch B. Bridge C.HUB D.repeater

34 . Which type of cable arrangement is used to connect similar devices?

A. Cross over B. Rollover C. Straight trough D. All

35 . A device that are used to connect RJ45 with UTP cable

A. Cable Cutter B. Crimper C.cable taster D. all

36 . How many wires are there in cat- 5e UTP Cable?

A.2 Pairs B.4 Pairs C. 8 wires D.B &C

37 .Which one of the following is false?

A.In a peer to peer net work configuration two PCs can have the same type of IP

address

B. In a peer to peer net work two PCs must use the same type of work group name.

C. Both PCs have equal right to access a net work

D. All

38.. Which net work command is used to check the connectivity status of the net work?

A. PING B. IPCONFIG C. Regedit D. none

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
26 | P a g e

Instruction II Matching

A B

1. ROM K A. Speed of memory

2. DNS E B. Is used to connect optical drive

3. Modem M C. Automatically configure IP address

4. Router L D. Preventive maintenance

5. Virtual memory N E. Resolve IP address

6. Sarver based network O F. Secondary storage device

7. ARP I G. BIOS level configuration

8. BNC H H. Connect to coaxial cable

9. DHCP B I. Convert IP address into hard address

10. Boot sequence G J. Multi port bridges

11. CD –ROM B K. non volatile memory of computer

12. Defragmentation D l. Packet filter

13. Hard disk F M. Modulate and demodulate analog to digital signal

14. Switch J N. Created by OS when memory of RAM is occupied

15. Cache memory A O. Centrally administer

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
27 | P a g e

Level 3 Theory Examination

Match Column A with B


A. B.
1. Connect for 10 base T A. RJ-45
2. Each computer is connected B. Star Topology
to a central device
3. A topology that is the most C. Mesh topology
Feature tolerant and highest level
of redundancy
4. Connector for thicknet cable D. BNC
5. Connect to telephone E. RJ-11
6. Display IP configuration F. IPConfig
7. Display MAC address to machine G. ARPA
8. Check network connectivity H. Ping
9. Used to establish session remote device I. Telenet
10. Used to start install Active directory J. dcpromo
11. Resolve domain name K. DNS
12. Dynamically assign IP Address L. DHCP
13. Share public resources M. Application Server
14. Used to Access E-mail N. Web server
15. ISP O. A company that interconnect internet
16. Fire wall P. is a setup protect virus unauthorized access
17. Transport layer Q. The OSI module IP address
18. Fiber optic R. Data transfer to modulate pulse
19. NIC S. Physical Layer
20. Web server T. Safari
21. Coaxial cable connector U. BNC
22. Router V. Class less
23. Centralized network Administrator W. Server
24. Bios setup X. Boot Sequence
25. Automatically Assign IP address Y. DHCP
26. Packet filtering Z. Router
27. Preventive Maintenance AA. Defragmentation
28. Resolve IP addressBB. DNS
29. Modulate and demodulate signals CC. Modem
30. Possible IP address convert to H/W DD. ARP
31. Packet Filtering EE. Router
32. Multi port Bridge FF. Switch
33. Non volatile Memory GG. ROM
34. Speedy Memory HH. Cache Memory

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
28 | P a g e

35. Centralized Network Administrator II. Server


36. BIOS Setup JJ. Boot Sequence
37. Optical Drive KK. CD ROM
38. Automatically Assign IP address LL. DHCP
39. Preventive Maintenance MM. Defragmentation
40. Storage Device NN. Hard Disk
41. OS stand fully Memory OO. Virtual Memory

Choose the best answer for the following questions

1. To provide a computer with a physical and electronic connection to a network, what must
be installed?

A. A hub B. A router C. A NIC D. A bridge

2. One of the following is not an example of a network?

A. A computer attached to a printer and a scanner to a hub connected to other computers.

B. Computer systems sharing a common communication medium for the purpose of


sharing information or devices.

C. Several printer connected to a switch box going to a single terminal.

D. CD-ROM drive commonly used for more than one computer.

3. You have successfully implemented a network of about 20 computers. The network is


connected to the internet and all users have been granted equal access. You are designated
as the network administrator due to staff shortage. You have to do some jobs that are
supposed to be done by an ordinary should you use for this purpose?

A. Create a new user as non administrative account for your own.

B. Use another user’s account.

C. Copy the administrator account and rename it.

D. Do nothing, keep using the Administrator account.

4. You have made some changes to file and directory permissions on one of the servers on
your network. You want to verify the new settings before informing the users of the
changes have taken affect and that no security problems arise from them?

A. Ask a trusted user to perform the test account for you.

B. Use your own Administrator account to perform the tasks.


SHENO TVET COLLAGE
ICT Department 2009 E.C HNS L-III
29 | P a g e

C. Create a test account for the purpose.

D. Do nothing changes made with administrative privileges are always correct.

5. A server room is thickly populated, with about 120 servers installed various network and
power cables make if very difficult to work on the servers when a technician has to work
on the servers usually it takes him or her a long time to trace the cables. On several
occasions, some cables have been accidentally pulled in the process. Which of the
following should you to avoid further problems?

A. Replace older cables with longer cables

B. Put identification labels on all cables.

C. Remove redundant network and power cables.

D. Reroute all network and power cables.

6. You are the LAN administrator for your company professional clients that dial in via PPP
to the company wants the remote clients to be assigned dynamically IP address .You find
that the windows xp computers did not get any address. What you have to do?

A. Run IPConfig with the /release and /renew

B. Run IPConfig with the /renew all switch on the client.

C. Run winconfig on the client.

D. Run IPConfig /all

7. The most efficient way to control security permissions to:

A. Each shared resources C. Groups

B. Directories D. User

8. The best method to restore the latest copy of registry in windows 2003 server is:

A. Emergency Repair Disk/ERD/

B. Recovery Console

C. Last Known Good Configuration

D. Ctrl + Alt + Del keys

9. A large network with 500 users notices that at specific times in the morning and in the
afternoon network congestion ties up their computers. What is the most likely cause?

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
30 | P a g e

A. Many users are logging on or off.

B. Power fluctuations

C. A terminator is not grounded.

D. The switch connecting the network goes down.

10. The advantage of a client/server network over peer to peer network is:

A. Performance is better on a peer -to -peer .

B. Security is better on client/server network.

C. Easy to configure the client/server network.

D. Security is better on a peer-to-peer network

11. On a network, a system acting as firewall typically located between ?

A. The client system and the server.

B. Two internal networks.

C. The internal access point and in the internet.

D. The internal network and internet access point.

12. The least secure and weak password from the following list is:

A. Ms Word C. ms_Word1

B. msword D. mS_Word1

13. A system administrator wants to remove a domain controller from a domain. Which of the
following is the easiest way to perform the task?

A. Reinstall server over existing installation and make the machine a member of group.

B. Use remove command.

C. Use Active directory installation wizard to demote the domain controller.

D. Reinstall server over existing installation and make a machine a member of domain.

14. You are the administrator for your company’s domain. You need to subdivide groups in
your organization with in active directory. If you wants to separate sales from marketing
departments. What could you use as a system of organizing this subdivision?

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
31 | P a g e

A. Creating organizational units.

B. Use user and groups.

C. Create site and subnet grouping.

D. Build a container in a subnet group.

15. A remote user calls your helpdesk and complains that he is unable to access internal
corporate network resources from the remote site. The user states that he access the local
resources. To solve this problem primary advice is?

A. Check whether he can ping successfully.

B. Check whether the NIC is functioning.

C. Check subnet mask of his computer setting.

D. Check TCP/IP status of his computer.

A C

16. Using the above diagram, which one of the following is correct?

A. E is Cat5 UTP cable. C. A is Switch

B. C is STP network cable D. C is wireless signal

Choose the best answer for the following questions

1. A user calls to report that cannot access network resources. You investigate and discover that the IP
address of the user’s computer is 169.254.0.6. You also discover that other clients on the same subnet
are experiencing the same problem. You must provide network connectivity for the user. What should
you do?
A. Enabling Automatic Private IP addressing
B. Disable Automatic Private IP addressing
C. Ensure the computer is enabled as a DHCP client

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
32 | P a g e

D. Ensure a DHCP server or DHCP relay agent resides on the local subnet
2. You install file and print sharing for Microsoft networks. You share a folder and leave the password
option blank. Who can gain access to the folder?
A. Windows 98 will not allow a blank password in this field
B. Anyone with internet explorer installed
C. Only users that are members of the same workgroup as you
D. Anyone who can gain access to your network and has a Microsoft redirector such
as the client for Microsoft network installed.
3. A piece of hardware or software on the network to prevent some communication forbidden by the

Network policy.

A. Proxy server B. Network Address translator C. Firewall D. NTK Interface Controller

4. A device which amplifies or regerates signals received while sending them from one point of network

layer in to another.

A. Bridge B. Repeater C. Switch D. Router

5. In OSI network Architecture, the dialogue central and token management are responsibility of

A. Data Link Layer B. Session Layer C. Network Layer D. Transport

Layer

6. The most Efficient way to control security in a current server Network is to assign permission to:

A. Each shared resource B. Groups C. Directories D. User

7. Which of the following is correct regardless of Class B address of IP address?

A. Network Layer bit-14, best bit 16 B. Network Layer bit-16, best bit 14

C. Network Layer bit 18 best bit 16 D. Network Layer bit-12, best bit 14

8. The advantage of a client server Network over a peer to peer Network is

A. Performance is better on peer to peer B. Security is better on a client/server

C. Easy to configure the server/client D. Security is better on a peer to peer

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
33 | P a g e

9. You find that an abnormal amount of traffic is passing between the DNS server and DNS client,

which tool would be the best help you ascertain the cause of excess traffic?

A. Tracer B. Event Viewer C. System monitor D. Security Monitor

10. Communication mode support two way traffic but in only one direction at a time?

A. Simplex B. Three Quarter Duplex C. Half Duplex D. Full Duplex

11. What is a firewall in computer Network Layer?

A. The physical boundary of network layer B. An Operating system of computer

network

C. A system designed to prevent on authorized access D. A web browsing software

12. ADSL is the abbreviation of:

A. Asymmetric Dual Subscriber Line B. Asymmetric Digital System Line

C. Asymmetric Dual System Line D. Asymmetric Digital Subscriber Line

13. Which of the following layer of OSI model also called end-to-end layer?

A. Presentation Layer B. Network Layer C. session Layer D. Transport

Layer

14. A system acting as firewall on the network typically located between?

A. The Client System and the Server B. Two internal network layers

C. The internal access point and in the internet D. The internal network layer and internet

point

15. A large network layer with 500 users notices things at specific times in the morning and afternoon

network layer congestion ties up their computers. What is the most likely cause?

A. Many users are logging on or off B. Power fluctuation

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
34 | P a g e

C. A terminator is not grounded D. The switch connecting the network goes

down

16. You have made changes to file and directory permissions on a server on the network. You want to
verify the new settings before informing the users of the changes. How can verify that the changes
have taken affect and that no security problems arise from them?
A. Ask a trusted user to perform the tests for you
B. Use your own administrator account to perform the tests
C. Create a test account for purpose
D. Do nothing, changes made with administrative privileges’ are always correct
choose the best answer for the following questions

______1) A company with 40 computer needs to reduce repair costs decrease downtime and reliability which task
will meet these needs?
A. enact a compressive security policy
B. upgrade all the operating system
C. develop a preventive maintenance plan
D. create an automated system recovery CD
______2) you have a TCP/IP network comprising nearly 30 computers currently all computers have been assigned
IP address as manually the company is growing fast and a new 15 computers is arriving next week. You have
decided to install Dynamic host configuration protocol (DHCP) services on one of the service identify which of the
following is the advantage of using the DHCP service in the network
A. the name resolution process will be automated
B. the network can be monitored more efficiently
C. Assignment of IP addresses will be automated
D. Network traffic problems can be resolved
_______3) A user install a new sound drives in a computer that is working properly after install the drive for the
new sound card the computer fails to boot which quick fix can the user implement to return to the previous working
state?
E. Boot to emergency recovery state
F. Boot to fast known good configuration
G. Boot to recovery consoles
H. Boot to start windows normally
______4) which of the following are good practices in resolving complex network problems?
A. Work on the problem single-handedly because other might add to the problems
B. Try to read the hardware specification documentation so that you can get how to solve the problems.
C. If you cannot fix a problem ask for help from hardware vendor who might have faced the same problem in
the past
D. Gathering may think would be helpful in resolving the problems
_____5) from the following options, identify the most critical problem that should be given highest priority if one of
the user in you network has complained that he/she cannot access a given file from file server but they can access
other files.
E. Check whether the file is corrupted by malicious codes
F. Check the network interface card’s functionally

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
35 | P a g e

G. Check the network response time


H. Check if the file server is reachable by your workstation
______6) A system administrator is trying to determine which file system to use for server that will become an
active directory domain controller here the company requirements include the following:
17. The file system must allow for file security
18. The file system must make efficient use of space on larger partitions
19. The file system must allow auditing of logs and access to sensitive files
Which of the following file system meets those requirements?
B. FAT C. HPFS

C. FAT32 D. NTFS

______7) one of the servers in your NOC crashed twice in one day. You have been assigned as an administrator and
event delegated one junior network practitioner to find out the cause of the failure. Which of the following should be
your advice for this practitioner to perform for the first time ?

E. Tell him to install the latest service pack


F. Tell to check the event logs
G. Tell to upgrade the NOS
H. Tell to want for the next time the server crashes
______8) You have 10 users plugged in to a hub running 10mbps half duplex.there is a server connected to the
switch running 10mbps half duplex as well.
How much bandwidth does each host have to the server?
a. 100kpbs b. 1mbps c. 2mbps d. 10mbps
_____9)Which of the following host range for the subnet on which ip address 192.168.168.188
255.255.255.192 resides?
E. 192.168.168.229-190
F. 192.168.168.129-191
G. 192.168.168.128-190
H. 192.168.168.128-192
_____10) Which protocol does DHCP use at the transport layer?
a. IP b. TCP C. UDP d. ARP
______11) Which one is specified in physical layer?
a. Hub b. application layer c. section layer d. transport layer
______12) Which protocol is used to send a distinctions network unknown message back to originating host?
E. TCP b. ARP C. ICMP d. bootP
______13) you are installing cables for an Ethernet network in an office. The office manager doesn’t want the media
hanging in the craw! Spaces and drop ceiling and wants you to share an existing conduit that already has telephone
cable to hide the network cables you are installing. The cable segments will not be over 100m. Which type of media
should you choose?

A. Coaxial C. STP

B. Fiber optic D. UTP

______14) your customer has client/server Ethernet network consisting of a server and 225 computers running
window XP. What kind of security would you recommend to him for centralized control of access to files and
directories on the network?

A. Setup groups of shared resource and users who have access to these groups

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
36 | P a g e

B. Setup a password for each file groups for each directory


C. Setup password for each file and directory shared
D. Setup a password for each user
______15) you are hired to setup a 100Mbps Ethernet network for client in an office that already has cat 3 UTP
installed. Your client wants to keep the costs to a minimum but needs the 100Mbps throughput. What should you
recommend?
A. Keep the existing cable but purchase 100Mbps hubs.
B. Keep the existing cable but use 100Mbps patch cable from the wall outlet
C. Buy new cat 5 UTP and if not already installed 100Mbps hubs and 100 Mbps NICs
D. Keep the existing infrastructure
______16) A network administrator connects hosts A & B directly through the network interface cards however
pinging between the hosts are unsuccessful. To provide connectivity between hosts.
E. Straight through cable should be used
F. A cross over cable should be used
G. A rollover cable should be used
H. Default gateway needs to be set on each host
______17) there are 3 types of Hubs which of the following options correctly describes these types of hub?
C. Passive, dormant, special
D. Active, dormant, passive
E. Passive, active, turbo
F. Passive, active, intelligent
_______18) As user attempt to boot the computer, the message “NTLDR is missing” is observed on the screen.
What will result from this situation?
A. The operating system will fail to load.
B. The BIOS setup utility will start automatically.
C. The computer will reboot continuously.
D. The initial self test will fail to load.
________19) the following figure shows a typically small size organize network setup. Identify the network
components marked with letters.

C. A-Cable/DSL modem, B-Cat 5 Ethernet cable, C-wireless signal, E-wireless router/Access point

D. A-wireless signal/Access point, B-Cat 5 Ethernet cable, C-wireless signal, E-Cable/DSL modem

E. A-wireless signal/Access point, B-wireless signal, C-Cat 5 Ethernet cable, E-Cable/DSL modem

F. A-Cable/DSL modem, B-wireless signal, C-Cat 5 Ethernet cable, E-wireless router/Access point

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
37 | P a g e

______20) you are assigned as a team leader in your working team, and you have informed that one of the team
members disturbs the team as a whole on a work you delegated. What will be your measure on this situation?

E. Remove from the team


F. Give him a last warning latter
G. Advice him and show good approach
H. Just ignore him doing so
_______21) you are installing a new software application on a window server 2003 domain controller after reading
the manual and consulting with a security administrator, you find that you have the following requirements:
 The software must run under an account that has permission to all files on the server on which it is installed

 The software must be able to bypass files system security in order to work properly

 the software must be able to read and write sensitive files stored on the local server

 Users of the software must be able to view sensitive data that is stored within the file server

You decide to create a new user account for the software and then assign the account to built in local group. To
which of the following group should you assign the account?

A. Account operator C. Guests


B. Back up operator D. Domain Administrator
_____22) while reviewing the security logs for your server, you notice that a user on the internet has attempted to
access your internal mail server. Although it appears that the user’s attempts were unsuccessful, you are still very
concerned about the possibility that your systems may be compromised. Which of the following solutions are you
most likely to implement?
A. A firewall system at the connection point to the internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
______23) you are hired to investigate a slow performing network server for a client. Using the performance
monitor you obtain the following readings: CPU usage=25%, disk time=25%,page faults/sec=25. Which one change
will increase the performance of this network server the most ?

A. Buy another CPU


B. Add another hard drive
C. Increase RAM
D. Increase Hard disk
_____24) which of the following should you check if you can connect using the IP address but not with the host
name?
E. DNS C. DHCP
F. WINS D.FTP
_____25) using the TCP/IP protocol if the destination of the packet is outside the subnet then the packet is sent to
the_____?
E. Switch C. Default gateway
F. Bridge D. Subnet
_____26) which Topology is the most expensive to install?
A. Ring C.Bus
B. Star D. Mesh
_______27. Can be used to show only one IP address for multiple users on the subnet ?
A. Proxy server C. DNS

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
38 | P a g e

B. DHCP server D. FTP server


_______28) the researcher and development department at your office has been experimenting with different
technologies to help improve the performance of the network. One group has been examining the user of a
broadband network versus a based band network. Select the correct statement about broadband and baseband.
A. Broadband network carry several channels on a single cable, whereas in a baseband network several cables
carry one channel
B. Baseband network carry a single channel on a single cable, whereas broadband network carry
several channel on a single cable.
C. Baseband refers to local area network , and broadband refers to wide area network
D. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed
______29) you install file and printer sharing for Microsoft network. You share a folder and leave the password
option blank. Who can gain access to the folder.
A. Anyone who can gain access to your network and has a Microsoft redirector such as the client for
Microsoft networks installed.
B. Window 98 will not allow a blank password in this field
C. Anyone with internet explorer installed.
D. Only users that are members of the same workgroup as your.
_____30) some protocols are considered to be technically non-routable. Which of the following statements best
describes the most common reason why a protocol would be considered non-routable
A. It does not contain the appropriate data link layer information required by router
B. It uses advanced transport layer services to move across the internet and avoid the routing overhead
required by more primitive networking protocols.
C. It defines physical layer network addresses for internet routing
D. It does not specify the network layer addresses required by routers
_____31) you are LAN administrator for your company. You have couple windows 2000 professional clients that
dial in via PPP to the company network’s RAS server. You want the remote clients to be assigned dynamic IP
addresses. You reserve a pool of class B addresses for these clients. Upon connecting, you find that the window
2000 computers are using a subnet mask of all 255s. what should you do?
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew_all switch on the client
C. Run winipcfg on the client
D. Do nothing this is normal

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
39 | P a g e

Column “A” Column “B”


__B___1) valid host of the IP address of A. Reserve zoone
200.100.206.99/27
_____2) Firewall profile identified by network B. 200.100.206.97 up to 200.100.206.126
administrator
C. FSRM (file server resource management)
__J___3) Zone that resolves host name to IP address
during DNS server configuration D. NIC
___i__4) Default subnet mask of class
___G__5) UTP connector E. Wireless network
___H__6) Enables file sharing using DFS name space
F. Questionnaires
and replicating files b/n DFS servers
___C__7) Install tools for generating storage reports G. RJ 45
configuring quotas and defines file screen policies
__N___8) Indexes files for faster searching when A. DFS (distributed file system)
client connected to share folders A. 255.255.255.0
__D___9) Acts as interface b/n the computer and the A. Forward zoone
physical network connection B. Home or work private network
___E__10) A network device that converts one C. 200.100.206.129.up to 200.100.206.158
cabling technology to another D. Print server management
___O__11)Uses infrared leaser or radio waves to E. Window search service
eliminate the need for physical cabling F. Transceivers
___P__12) Place where list of problem that accord on G. Event viewer
a system are found H. Fire walls
__F__13) A method of collecting information or I. BNS
determining requirement
__Q___14) It keeps digital pests and hackers out
___R__15) Coaxial cable connector

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
40 | P a g e

Column “A”
Column “B”
1. Connector for Coaxial cable S

2. Element of large network that separate by bridge or


A. Ping
router H
B. Attenuation
3. Router physical interface P
C. Telenet
4. Divide large network in to segments O
D. Star topology
5. Provide additional information M
E. DNS
6. World Wide Web to search images N
F. DHCP
7. Private network in an enterprise
G. DCPromo
8. Degeneration before it reaches destination. B
H. Intranet
9. Connect to telephone Q
I. Netstart
10. Used to establish session remote device C
J. Subnet
11. Used to start install Active directory G
K. IPconfig
12. Resolve domain name E
L. Hotspot
13. Dynamically assign IP Address F
M. Search engine
14. Connect for 10 base T R
N. Web server

15. Each computer is connected to a central device D O. Bridge

P. AUI

Q. RJ-11

R. RJ-45

S. bnc

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III

You might also like