Coc PDF
Coc PDF
Coc PDF
5) you are the administrator for your company's domain. You need to subdivide the groups in your
organization within active directory. if you want to separate sales from marketing as an example. what
will use as a system of organization this subdivision
a. crate organization unit
b. crate a site and service subnet grouping
c. use user and group
d. use separate domains
6) the file system that allow for file level security to use for a server that will be an active directory
domain controller for your organization.
a. CDFS
b. FAT
c. FAT32
d. NTFS
7) your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant
in another city. the best device required to enable everyone to share data and resources between the two
LANs
a. Router
b. HUB
c. modem
d. switch
8) The TCP/IP pro for transferring electronic mail messages
a. FTP
b. RPC
c. SMTP
d. SNMP
12) computer cannot communicate with each other directly over telephone line because they use digital
pulse where as telephone lines use analog sound frequency. the device that permits digital to analog
conversation at the start of transmission
A. attenuation
B. interface
C. modem
D. NIC
13) the configuration information for a DHCP client is received dynamically the utility used to read
configuration for everything this setting.
A. tracert
B. ping
C. net stat
D. ipconfig
14) you are in charge of a small network and want to make a secured. the user want to have full control
over their data and still be able to share data with the rest of the office. the best type of network to set up
this.
A. client based network
B. master domain network
C. peer-to-peer network
D. server based network
15) Your customer has a client/ server Ethernet network consisting of a server and 225 computer running
windows Xp . The kind of security you recommend to him for centralized control of access to file and
directions on the network.
a. setup a password for each file and groups for each directory
16) you are requested to setup a 100mbps network for a client in an office that already has 10mbps
throughput. your client wants to keep the costs to a minimum but needs the 100mbps throughput. the
cabling solution you recommend?
a. cat3UTP
b. cat5UTP
c. coaxial cable
d. fiber able
17) the following figure shows a typical small size organize network setup. identify the network
components marked with letters A,B,C AND D consecutively.
a. DSL modem, CAT5 Ethernet cable, wireless signal, wireless router/access point.
b. Wireless router/access point, CAT 5 Ethernet cable, wireless signal DSL modem.
c. wireless router/access point, wireless signal, CAT 5 Ethernet cable, DSL modem
d. DSL modem, wireless signal, CAT5 Ethernet cable, wireless router/access point
18) you are assigned to lead a small team in your company for managing network identify the wrong
statement in leading a team
a. understand the team role
b. possess necessary leadership skill
c. favor some individuals in your team
d. assign responsibilities to team members
19) one of yours calls you with a complaint that they can't reach the site www.yahoo.com. you try and
access the site and discover that you can't access either. but you can PING the site with its IP address. the
most probable cause of the problem.
a. yahoo is down
b. the working switch is down
c. the gateway is down
d. the DNS server is down
20) the hardware and network administrator wants to remotely and securely enter commands to be run at
a remote server. the application that the administrator should use.
a. telnet
b. SSH
c. SFTP
d. RSA
21) you have just implemented a solution for a major network problem in your company and you want to
celebrate the success. The next step you should dc before starting your celebration
TYPE I
Match the OSI model layers function in column A with the name of the correct OSI model layer in
column B
COLUM A COLUMN B
__G__1, breaks data down in to manageable chunks and TCP and UDP A. Application layer
operate at this layer B. Data link layer
__D__2, define hardware connection and turns binary in to pulses(electrical C. Network layer
or light) and also repeaters and hubs operate at this layer D. Physical layer
__B__3, identifies devices on the physical layer and MAC addresses are E. Presentation layer
part of this layer F. Session layer
__F_ 4, manages connections between machines and sockets operate at this G. Transport layer
layer
__C___5, moves packets between computers on different networks and
routers operate at this layer
Type II
Match the name, type or category of IP address in column A with this IP addresses sated in column B
COLUMN A COLUMN B
___C__1, loop back IP address A. 192.168.1.1
__F__2, broadcast IP address B. 10.10.10.10
__G___3, public IP address C. 127.0.0.1
__B__4, class A IP address D. 172.16.0.20
__D__5, class B IP address E. 213.55.96.148
F. 255.255.255.255
G. 297.25.1.6
Type III
Match the uses and functions of operating system built in network troubleshooting tools in column A
with the corresponding tool in column B
Column A Column B
__G__1, used to diagnose problems reaching a A. HOSTNAME
remote system by tracing all router between two points. B. IPCONFIG
___E__2, used to diagnose DNS problem C. NBTSTAT
__A___3, used simply to return the name of the local D. NETSTAT
computer E. NSLOOKUP
__B__4, used to display information on the current F. PING
state of all the running IP processes on your computer G. TRACERT:- diagnostic utility
__D__5, uses ICMP(internet control message protocol) determines the route to a destination by
packets to show you if you can simply reach a remote sending ICMP echo packet to the
computer destination
3. You are the administrator of a Windows 2003 domain. All domain controllers are running Windows
Server 2003 and the domain functional level has been raised to Windows 2003. You are in the
process of building a new domain controller, which you have named OCOC. When asked for a
password, you enter ococ receive an error. What should you do to continue building the server? (uc3)
A. Log on to a different domain controller and modify the default domain policy to allow
passwords of five characters. Disable the Require Complex Passwords option.
B. Change the password to Ococserver9.
C. Change the password to ococse9%rver.
D. From a command prompt, type net user ococserver9$.
4. You are the administrator of a standalone Windows Server 2003 server. Mulugeta is your new junior
administrator. You want Mulugeta to be able to back up files and folders, run programs, but not shut
down the system. What should you do?(uc5)
A. Make Mulugeta a member of the Backup Operators group.
B.Make Mulugeta a member of the Backup Operators group. In the local security policy, edit the
User Rights node to deny Daniel the right to shut down the system.
C. Make Mulugeta a member of the Administrators group.
D. Make Mulugeta a member of the Power Users group.
5. You are the administrator of a Windows 2003 network. Chaltu, a help desk technician, leaves the
company. Gemechu, a new hire, will take Chaltus’s place. You want Gemechu to have the same level
of access that Chaltu had. What should you do? (uc6)
A. Rename Chaltus’s account to Gemechu. Reset the password.
B. Copy Chaltu’s account and create a new account for Gemechu. Disable Chaltu’s account.
C. Create a new account for gemechu. Recreate the group membership of Chaltu’s account to
Gemechu’s account.
D.Copy Chaltu’s account and create a new account for Gemechu. Delete Chaltu’s account.
6. You are installing the root domain controller for your forest. You have decided that the fully qualified
domain name for the computer will be ococ.gov.et. The system prompts you with a suggested
NetBIOS name for the computer. Which NetBIOS name is prompted?(uc3)
A. ococ.gov
B. ococ
C. gov
D. ococ.gov.et.
7. 11. You are troubleshooting your DNS server. The server has not been resolving some of the hosts in
the network, but is working fine for others. You check the DNS MMC snap-in and everything looks
okay. What utility should you use to determine the nature of the problem? (uc7)
A. The netstat command
B. Network Monitor
C. The nslookup command
D. The Monitoring tab of the DNS server’s Properties page
8. Which of the following groups offers the most security? (uc5)
A. Users
B. Administrators
C. Power Users
D. Backup Operators
9. What is the utility used to install Active Directory on a Windows Server 2003 computer? (uc3)
A. promotedc.bat
B. dcupgrade.exe
C. adinstall.exe
D.dcpromo.exe
10. As a network administrator you have been requested to move a printer from your company's
Marketing OU to your company's Research OU. After the move you test the printer and find that the local
administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can
you do to change this? (uc5)
A. Remove the permissions for the local administrator from the printer.
B. Remove printer permissions from the local administrator.
C. Remove the Everyone group from the printer.
D. Delete the printer object.
11. What can you use to dynamically assign the same IP address to a printer configured as a network
device?(uc3)
A. DNS
B. DHCP reservation
C. SNMP
D. DHCP exclusion
12. Which of the following is the behavior of good team members?(uc 11)
A. Share responsibilities
B. Keep individual information about development
C. Do not respect the opinions of others in the team
D. Do not take turns
13. Which of the following is categorized as richest channel in conveying information effectively? (uc 12)
A. Telephone
B. Face to face communication
C. Posted notices and bulletins
D. E-mail
14. Which of the following is not market promotional tool?(uc13)
A. networking and referrals
B. supply/demand
C. seminars
D. advertising
1. With respect to the OSI model, which of the following are correct statements about PDUs? (uc 2)
A. A segment contains IP addresses.
B. A packet contains IP addresses.
C. A segment contains MAC addresses.
D. A packet contains MAC addresses
16. The most effective way to mitigate congest ion on a LAN would be to__________________? (uc 7)
A. Upgrade the network cards
B. Change the cabling to CAT 6
C. Replace the hubs with switches
D. Upgrade the CPUs in the routers
17. You need to provide network connectivity to 150 client computers that will reside in
the same sub network, and each client computer must be allocated dedicated bandwidth. Which device
should you use to accomplish the task? (uc 7)
A. Hub
B. Switch
C. Router
D. Bridge
18. Which of the following layers of the OSI model was later subdivided into two layers? (uc 2)
A. Presentation
B. Transport
C. Data Link
D. Physical
19. Which class of IP address provides a maximum of only 254 host addresses per network ID? (uc 2)
A. Class A
B. Class B
C. Class C
D. Class D
20. All of the following are results of Kaizen implementation in work places except;
A. Improvement in product quality
B. Safety in work places
C. Efficient space utilization
D. high waiting time
21. A network administrator is verifying the configuration of a newly installed host by establishing an
FTP connection to a remote server. What is the highest layer of the protocol stack that the network
administrator is using for this operation?
A. application
B. presentation
C. session
D. transport
Column A Column B
P .1. Assigning the same IP address on a network
A. 127.0.0.0
A. 2. Loop back address
B. Print device
D. 3. Sending of information packets to a single network node.
C. Quality control
H .4. A commonly used IP translation and mapping technology
D. unicast
F. 5. Provides IP-address to MAC address resolution for IP packets
E. Multicast
G .6. Provides a solution that automatically assigns IP addresses to
F. ARP
computers on a network
G. DHCP
E. 7. A single source address responding to multiple destination addresses
H. NAT
with information to be sent
I. Switch
K. 8. Addressing scheme utilizes a 128 bit address
J. Router
B. 9. A hardware device used for printing
K. IP V6
Q .10. A set of rules determining how network devices respond when two
L. Work ethics
devices attempt to use a data channel simultaneously
M. IP V4
R. 11. Responsible for electrical and mechanical connection b/n devices
N. Broad cast
I . 12. Device sends and receives information about the network layer
O. Printer
J . 13. Uses hardware address to filter a network
P. IP address conflict
L. 14. Group of moral principles, standards of behavior, or set of values
Q. CSMC/CD
regarding proper conduct in the workplace
R. Physical Layer
C. 15. Is the operational techniques and activities that are used to fulfil
S. HTTPS
requirements for quality.
Column A Column B
Column A Column B
1. Ip Address Conflict M A. Kaizen
2. Fiber optics cable connectors F B. Worm
3. telnet P C. Workplace communication
4. class B IP address range U D. Quality control
5. continuous improvement A E. Site
6. A secret word or string of characters used for F. MT-RJ
user authentication T G. 10.xxxxx
7. a logic group of workstation, server and network H. Ping
devices that appear to be on the same LAN I. DNS
despite of their geographical distribution K J. NAT
8. replicates itself B K. VLAN
9. refers that DNS name resolution is working L. Wi-Fi
correctly R M. Assigning the same IP address
10. exchanging of information both verbal and non- N. FTP
verbal within an organization C O. UDP
11. Set of procedures intended to ensure that P. Remote login protocol
manufactured product or performed service are Q. Transport
delivered in advanced set of quality D R. NS Lookup
12. object in active directory represents a S. Authentication
geographical location that holds network E T. Password
U. 128.xxx
1. Allows various object types to be moved from A. Active Directory Migration Tool
current location to a new location D Delegation Control Wizard
2. allows administrators to log on with a non- B. Dictionary attack
administrator account to perform C. DS move
administrative tasks without logging off. H D. Run as
3. to migrate objects in Active Directory forests E. Drag and drop
A F. Identification number (PIN)
4. used to build, deploy and operate XML and G. Secondary Logon
web service Q H. Strong Password
5. One part of dictionary attack J I. Password cracking
6. Move the domain name J. Group Policy
7. OU moving F K. Hub
8. Separate collusion domain and same L. Proxy Server
broadcast O M. File Server
9. All ports are in the same collusion and N. Switch
broadcast domain L O. Print Server
10. Used to share public resource N P. Applcation Server
11. Show only one ip address for multiple users Q. Coaxial cable
on the subnet M R. UTP
12. Hacking and cracking password C
13. ATM(Automated Teller Machine) G
14. Requirment feature run as
Matching A
A B
1. Loop back address 127.0.0.1 A. Bad memory
2. Resolve IP address DNS B. NAT
3. Dynamic configuration DHCP C. ESD
4. Parity Error NAT D. Segmentation
5. Reliable communication Packet switch E. UDP
6. Anti wrist strap ESD F. HTTP
7. Hide IP address Bad Memory G. CSMA/CD
8. Transport Layer Segmentation H. Protocol
9. Generic of communication with bridge and router Protocol I. FTP
10. Absorbing signal bouncing communication Terminator J. Authentication
11. Threat security communication Authentication k. Authorization
12. Unreliable communication UDP
13. Access method CSMA/CD L. DHCP
M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
S. Terminator
Matching B
A B
1. Hardware Problem (F) Cabling Problem A. Packet
2. NIC driver not installed (C) NIC Failure B. ARP a
3. Typing incorrect user name & password(E) Software Problem C. NIC Failure
4. Coaxial Cable connector(T/L) BNC/ T-connector D. Telnet
5. Incorrect color arrangement of UTP cable(H) Operator errorE. Software Problem
6. Used to start to install Active directory(I) DCPROMO F. Cabling Problem
7. The first troubleshooting step(N) Establish/identify G. RJ-45
8. Used to establish a session with remote device(D) Telnet H. Operator error
9. Display protocol statistics & current TCP/IP I. DCPROMO
Network connection(O) NETSTAT J. Web server
10. Used to access E-Mail(K) Message k. Message
11. Fiber optics connector (M) MT-RJ L. BNC
12. Network layer data format (J) Web server M. MT-RJ
13. Display MAC address of a machine (B) ARP a N. Establish/identify
14. Twisted pair cable connector (G) RJ-45 symptom
15. Application layer data format (R) File Server O. NETSTAT
P. Exchange Server
Q. RJ-11
R. File Server
S. Event log
T. T-connector
Matching
1) Packet filter………………………………………..………Router
2) Class A IP Address………………………………..……10.0.0.1
3) Fiber optical cable connecter………………….….5C
4) UTP Cable connector………………………………….RJ-45
5) ARP…………………………………………………………...Convert IP address to MAC
6) Line tel phone connector……………………..…….RJ-11
7) Resolve IP address domain name……………….192.168.0.1
8) Temporary storage voltage ……………………….RAM
9) Non Verbal communication………………….….no write paper word
10) Communication work place people………..….work ethic
11) Terminator ……………………………………………….Bus Topology
12) Connection oriented reliable………………….…..TCP/IP
13) Computer manager………………………………..….Server Based Network
14) Firewall …………………………………………………….Unauthorized access to a network
15) Physical layer ………………………………………..….Convert electrical pulse in to light
7. What does a lit status link light on the network adapter's back plate mean?
A. The connection is alive
B. Data is being uploaded
C. Data is being downloaded
D. Data is being encrypted
8. You have been asked to make a recommendation to improve the performance of a client's network.
When you examine the network architecture, you find that it is based on hubs. What should you
suggest to improve the LAN's performance?
A. Install higher-speed hubs to minimize system upgrade costs and maintain compatibility with the
existing network structure.
B. Install high-speed switches to replace the old hubs. This will provide more intelligent switching
of the information around the network.
C. Install routers to replace the hubs. Router performance is so much better than hubs that the
performance increase will be very noticeable.
D. Install a router to better control information movement in the network and replace the
hubs with switches to improve network traffic.
9. What Windows tool can be used to configure most modern routers?
A. The Windows Explorer interface
B. The Device Manager utility
C. The MSCONFIG utility
D. Internet Explorer web browser
10. In Windows, the networking component that provides the rules that the computer uses to govern the
exchange of information across the network.
A. Client
B. Adapter
C. Protocol
D. Service
11. How is the UNC format applied to shared resources?
A. //shared_resource_name
B. //host_name/shared_resource_name
C. \\shared_resource_name
D. \\computer_name\share_name
12. Which of the following causes a mapped drive to disappear from a system when it is shut down and
restarted?
A. The name of the mapped folder has been changed
B. The Reconnect at Logon option is not selected
C. The path to the mapped folder has changed
D. The host computer for the mapped folder is turned off
13. Where can the TCP/IP protocol be manually configured in Windows XP?
A. In the Properties page of the Local Area Connection Icon, which is located in the
Network Connections Window
B. In the Network Component Type screen through the Dial-Up Connections page
C. In the Protocol Installation screen through the Local Area Connection page
D. In the Protocol screen of the Network Configuration page
14 .What effects will running diagnostic applications across the network have on the network's
performance?
A. The unit running the application will not have access to other parts of the network.
15 .You have been sent to troubleshoot an Internet connectivity problem. When you try to PING the site's
fully qualified domain name, the site cannot be located; however, you can PING its IP address. What
network function should be checked?
A. DNS
B. DHCP
C. WINS
D. FTP
16 .When you enter IPCONFIG in the Run dialog box, you get a momentary black box on the display
followed by a normal command prompt screen. What is occurring with this command?
A. The TCP/IP utility has not been configured on the local machine.
B. The network adapter is bad. Therefore, there is no information for the IPCONFIG utility to
return.
C. The local host is not communicating with the client computer. Therefore, there is no
information for the IPCONFIG utility to report.
17 .After running the IPCONFIG utility, you try to PING the local adapter's IP address but no reply is
returned. What does this indicate?
A. TCP/IP has not been loaded into the system.
B. The local adapter's IP address has not been initialized.
C. TCP/IP is not working on the gateway device.
D. The default gateway is not functional.
18 .A computer on your network is not able to see any other computers on the network. When you check
the adapter's TCP/IP configuration, you find that the IP address is 169.254.0.0. What does this indicate?
A. The network adapter in the machine is bad or has not been initiated.
B. PING a known IP address to see if the network cable and connectivity is good.
C. Check for the presence of link lights on the back of the network adapter
22. A user can access an associate's computer on the network but can't access the Internet through the
network gateway. What is the most likely cause of this problem?
23. If you try to ping the loopback address and nothing happens, what is most likely the problem?
24. A device that used to connect all nodes in star topology in one place is
C. Stop the signal on bouncing over the back bone & make the main cable free
D. all
28 . Is device that can be used to connect N/Ws that use different technologies (LANs, MANs
& WANs)
31 ._______cable is good for very high speed, high capacity data transmission.
32 . Which net work device can amplify or regenerate the weak signal
33. Which one of the following net work device used to connect different net work that uses
A.In a peer to peer net work configuration two PCs can have the same type of IP
address
B. In a peer to peer net work two PCs must use the same type of work group name.
D. All
38.. Which net work command is used to check the connectivity status of the net work?
Instruction II Matching
A B
1. To provide a computer with a physical and electronic connection to a network, what must
be installed?
4. You have made some changes to file and directory permissions on one of the servers on
your network. You want to verify the new settings before informing the users of the
changes have taken affect and that no security problems arise from them?
5. A server room is thickly populated, with about 120 servers installed various network and
power cables make if very difficult to work on the servers when a technician has to work
on the servers usually it takes him or her a long time to trace the cables. On several
occasions, some cables have been accidentally pulled in the process. Which of the
following should you to avoid further problems?
6. You are the LAN administrator for your company professional clients that dial in via PPP
to the company wants the remote clients to be assigned dynamically IP address .You find
that the windows xp computers did not get any address. What you have to do?
B. Directories D. User
8. The best method to restore the latest copy of registry in windows 2003 server is:
B. Recovery Console
9. A large network with 500 users notices that at specific times in the morning and in the
afternoon network congestion ties up their computers. What is the most likely cause?
B. Power fluctuations
10. The advantage of a client/server network over peer to peer network is:
12. The least secure and weak password from the following list is:
A. Ms Word C. ms_Word1
B. msword D. mS_Word1
13. A system administrator wants to remove a domain controller from a domain. Which of the
following is the easiest way to perform the task?
A. Reinstall server over existing installation and make the machine a member of group.
D. Reinstall server over existing installation and make a machine a member of domain.
14. You are the administrator for your company’s domain. You need to subdivide groups in
your organization with in active directory. If you wants to separate sales from marketing
departments. What could you use as a system of organizing this subdivision?
15. A remote user calls your helpdesk and complains that he is unable to access internal
corporate network resources from the remote site. The user states that he access the local
resources. To solve this problem primary advice is?
A C
16. Using the above diagram, which one of the following is correct?
1. A user calls to report that cannot access network resources. You investigate and discover that the IP
address of the user’s computer is 169.254.0.6. You also discover that other clients on the same subnet
are experiencing the same problem. You must provide network connectivity for the user. What should
you do?
A. Enabling Automatic Private IP addressing
B. Disable Automatic Private IP addressing
C. Ensure the computer is enabled as a DHCP client
D. Ensure a DHCP server or DHCP relay agent resides on the local subnet
2. You install file and print sharing for Microsoft networks. You share a folder and leave the password
option blank. Who can gain access to the folder?
A. Windows 98 will not allow a blank password in this field
B. Anyone with internet explorer installed
C. Only users that are members of the same workgroup as you
D. Anyone who can gain access to your network and has a Microsoft redirector such
as the client for Microsoft network installed.
3. A piece of hardware or software on the network to prevent some communication forbidden by the
Network policy.
4. A device which amplifies or regerates signals received while sending them from one point of network
layer in to another.
5. In OSI network Architecture, the dialogue central and token management are responsibility of
Layer
6. The most Efficient way to control security in a current server Network is to assign permission to:
A. Network Layer bit-14, best bit 16 B. Network Layer bit-16, best bit 14
C. Network Layer bit 18 best bit 16 D. Network Layer bit-12, best bit 14
9. You find that an abnormal amount of traffic is passing between the DNS server and DNS client,
which tool would be the best help you ascertain the cause of excess traffic?
10. Communication mode support two way traffic but in only one direction at a time?
network
13. Which of the following layer of OSI model also called end-to-end layer?
Layer
A. The Client System and the Server B. Two internal network layers
C. The internal access point and in the internet D. The internal network layer and internet
point
15. A large network layer with 500 users notices things at specific times in the morning and afternoon
network layer congestion ties up their computers. What is the most likely cause?
down
16. You have made changes to file and directory permissions on a server on the network. You want to
verify the new settings before informing the users of the changes. How can verify that the changes
have taken affect and that no security problems arise from them?
A. Ask a trusted user to perform the tests for you
B. Use your own administrator account to perform the tests
C. Create a test account for purpose
D. Do nothing, changes made with administrative privileges’ are always correct
choose the best answer for the following questions
______1) A company with 40 computer needs to reduce repair costs decrease downtime and reliability which task
will meet these needs?
A. enact a compressive security policy
B. upgrade all the operating system
C. develop a preventive maintenance plan
D. create an automated system recovery CD
______2) you have a TCP/IP network comprising nearly 30 computers currently all computers have been assigned
IP address as manually the company is growing fast and a new 15 computers is arriving next week. You have
decided to install Dynamic host configuration protocol (DHCP) services on one of the service identify which of the
following is the advantage of using the DHCP service in the network
A. the name resolution process will be automated
B. the network can be monitored more efficiently
C. Assignment of IP addresses will be automated
D. Network traffic problems can be resolved
_______3) A user install a new sound drives in a computer that is working properly after install the drive for the
new sound card the computer fails to boot which quick fix can the user implement to return to the previous working
state?
E. Boot to emergency recovery state
F. Boot to fast known good configuration
G. Boot to recovery consoles
H. Boot to start windows normally
______4) which of the following are good practices in resolving complex network problems?
A. Work on the problem single-handedly because other might add to the problems
B. Try to read the hardware specification documentation so that you can get how to solve the problems.
C. If you cannot fix a problem ask for help from hardware vendor who might have faced the same problem in
the past
D. Gathering may think would be helpful in resolving the problems
_____5) from the following options, identify the most critical problem that should be given highest priority if one of
the user in you network has complained that he/she cannot access a given file from file server but they can access
other files.
E. Check whether the file is corrupted by malicious codes
F. Check the network interface card’s functionally
C. FAT32 D. NTFS
______7) one of the servers in your NOC crashed twice in one day. You have been assigned as an administrator and
event delegated one junior network practitioner to find out the cause of the failure. Which of the following should be
your advice for this practitioner to perform for the first time ?
A. Coaxial C. STP
______14) your customer has client/server Ethernet network consisting of a server and 225 computers running
window XP. What kind of security would you recommend to him for centralized control of access to files and
directories on the network?
A. Setup groups of shared resource and users who have access to these groups
C. A-Cable/DSL modem, B-Cat 5 Ethernet cable, C-wireless signal, E-wireless router/Access point
D. A-wireless signal/Access point, B-Cat 5 Ethernet cable, C-wireless signal, E-Cable/DSL modem
E. A-wireless signal/Access point, B-wireless signal, C-Cat 5 Ethernet cable, E-Cable/DSL modem
F. A-Cable/DSL modem, B-wireless signal, C-Cat 5 Ethernet cable, E-wireless router/Access point
______20) you are assigned as a team leader in your working team, and you have informed that one of the team
members disturbs the team as a whole on a work you delegated. What will be your measure on this situation?
The software must be able to bypass files system security in order to work properly
the software must be able to read and write sensitive files stored on the local server
Users of the software must be able to view sensitive data that is stored within the file server
You decide to create a new user account for the software and then assign the account to built in local group. To
which of the following group should you assign the account?
Column “A”
Column “B”
1. Connector for Coaxial cable S
P. AUI
Q. RJ-11
R. RJ-45
S. bnc