Ministry of Education Sector: ICT Sub Sector: Information Technology Occupation: Hardware and Network Servicing-L-IV
Ministry of Education Sector: ICT Sub Sector: Information Technology Occupation: Hardware and Network Servicing-L-IV
Ministry of Education Sector: ICT Sub Sector: Information Technology Occupation: Hardware and Network Servicing-L-IV
Ministry Of Education
Sector: ICT
Sub Sector: Information Technology
Occupation: Hardware and Network Servicing- L-IV:
Knowledge Assessment _v1
The assessment covers the following units of competence:
1. Plan and Organize Work
2. Assist with Policy Development for Client Support
3. Build Internet Infrastructure
4. Migrate to New Technology
5. Determine Maintenance Strategy
6. Establish Quality Standards
7. Utilize Specialized Communication Skills
8. Develop Team and Individuals
9. Manage and Maintain Small/Medium Business Operations
10. Manage Continuous Improvement System
Candidate name
Registration number
Name of training provider
Name of Assessment Center
Structure of Test
Section No of questions No of marks Suggested time
A-Multiple choice questions 21 21 30min
B-Matching Type 15 15 20min
Total 36 50min
February 2013
Instructions
1. Write your name, Registration number, name of training provider and
Assessment center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the
Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited
Assessor
5. You may use the following references in this test
Non-programmable calculators
6. Do not bring the following items into the assessment venue
Mobile telephones
Programmable calculators
Written notes
2. The IT manager asks you for a diagram showing every server on the network. The
diagram that you should provide to his/her
3. Yonatan has been asked to find and implement an application that will enable his
boss to log in to and control a server remotely and securely. The application that
would work best
A. E-mail
B. FTP
C. SSH
D. Telnet
4. A Place where you could find a list of problems that occurred on a system
A. Event Viewer
B. Network Diagram
C. RAID
D. Wiring Schematic
5. You want all network clients to download and install updates automatically during
night hours, and you have configured scheduled installation behavior for Automatic
Updates. However, you discover that some users are turning off their machines at
night and updates are not being applied. The group policy that enables you to
correct this situation without changing the installation schedule?
6. You are creating a number of user objects for a team of your organization’s
temporary workers. They will work daily from 9 a.m. to 5 p.m. on a contract that is
scheduled to begin in one month and end two months later. They will not work
outside of that schedule. The properties that you should not configure initially to
ensure maximum security for the objects
7. When you open the Properties dialog box for a computer object in the Active
Directory Users and Computers console, you discover that no properties are
displayed in the Operating System tab. The causes that make these properties to be
absent
A. Password Expired
B. Operating System has problems
C. Console is not opened properly
D. Computer has not joined domain
8. The minimum NTFS permissions required to allow users to open documents and run
programs stored in a shared folder
A. Full Control
B. List Folder Contents
C. Read & Execute
D. Write
9. Assume that you are giving a service and you want to measure its quality. The best
way to go about it
10. Assume you were working a project on IT training need assessment. The best way
of collecting detailed information?
A. Questioner
B. Interview
C. Observation
D. Research
11. Assume you are the network administrator of a particular organization. While you
configure a network you noticed that Twisted Pair cable distance limited to 100m
and you want to increase distance coverage. The action to resolve this problem
13. You are responsible for managing accounts and access to resources for members of
your group. A user in your group leaves the company, and you expect a replacement
for that employee in a few days. The action to do with the previous user's account
A. Delete the old user account, and create an account for the new user.
B. Change the password for the account, and give the new password to the new
user.
C. Disable the old user account, rename the user account by using the
replacement's name, and configure the account to require a new password
the next time the user logs on. Then, enable the account when the
replacement arrives.
D. Lock the old user account, rename the user account by using the
replacement's name, and configure the account to require a new password
the next time the user logs on. Then, enable the account when the
replacement arrives.
C. Each remote location has replica WSUS servers that copy their
configuration from the head office WSUS server.
D. Each remote location has a disconnected WSUS server and updates are
imported on those servers from DVD.
15. A user calls for support, complaining that when she takes her laptop home, she is
unable to connect to the network. When she uses Ipconfig to view the IP address,
the address begins with 169. The solution to solve this problem
16. You are directing a team of systems administrators who are responsible for isolating
multiple connectivity issues on a network segment. Before you begin to alter
configuration information on client computers, you are not required to
A. Begin documentation.
B. Create an action plan to perform isolation tasks.
C. Perform an inventory of the system.
D. Provide a means of restoring the initial state of the computer.
17. You have made some changes to file and directory permissions on one of the
servers on your network. You want to verify the new settings before informing the
users of the changes. The best way to verify that the changes have taken affect and
no security problems arise from them
18. One security method is encryption. But encryption does nothing to keep digital pests
and hackers out. To accomplish this goal, we need
A. Bridges
B. Firewalls
C. Hubs
D. Router
19. A new client lives in a rural area, outside the connectivity radius of the local cable
company and definitely more than 20,000 feet away from the nearest switching
center for the phone company. The connectivity option that offers the client the best
performance
A. Cable
B. Dialup
C. DSL
D. Satellite
20. Yohannes walked up to a computer that couldn't connect to the Internet and
immediately opened a command-line window and typed ping 127.0.0.1. The reason
for doing this
21. You want to propose new networking project for your organization. The best
approach to implement your new project
Type I: Match the OSI model layer’s functions in column A with the name of the correct
OSI Model layer in column B
Column A Column B
__________ 1. A layer that manages data encryption and hides A. Transport
the difference between various types of B. Session
computer Systems
C. Presentation
__________ 2. A layer that manages connections between D. Physical
machines
E. Network
__________ 3. A layer that defines hardware connections and F. Logical
turns Binary into physical Pulses
G. Data Linksys
__________ 4. A layer that provides tools for programs to use H. Data Link
to access the network. HTTP, FTP, SMTP and
I. Communication
POP3 operate
J. Application
__________ 5. A layer that moves packets between computers
on different network. IP also works on this layer
Type II: Match the description or function of a software/OS product in column A with the
name of the software/OS product in column B
Column A Column B
__________ 1. A mail server, calendaring software and contact A. Android
manager developed by Microsoft. B. AutoCAD
__________ 2. A family of security software by Microsoft , that C. Microsoft Exchange
is designed to help protect computer networks, Server
network servers (such as Microsoft Exchange
D. Microsoft Forefront
Server and Microsoft SharePoint Server) and
individual devices. E. Microsoft Server 2008
F. Microsoft Share Point
__________ 3. A software application for computer-aided
design and drafting. The software supports both G. Microsoft Visio
2D and 3D formats. H. MySQL
__________ 4. A diagramming and vector graphics application I. Network Management
which is part of the Microsoft Office suite System(NMS)
__________ 5. A computer operating system distributed as free J. Ubuntu
and open source software, using its own K. VMware ESXi
desktop environment