Ministry of Education Sector: ICT Sub Sector: Information Technology Occupation: Hardware and Network Servicing-L-IV

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Occupational Code: ICT HNS

Ministry Of Education
Sector: ICT
Sub Sector: Information Technology
Occupation: Hardware and Network Servicing- L-IV:
Knowledge Assessment _v1
The assessment covers the following units of competence:
1. Plan and Organize Work
2. Assist with Policy Development for Client Support
3. Build Internet Infrastructure
4. Migrate to New Technology
5. Determine Maintenance Strategy
6. Establish Quality Standards
7. Utilize Specialized Communication Skills
8. Develop Team and Individuals
9. Manage and Maintain Small/Medium Business Operations
10. Manage Continuous Improvement System

Candidate name
Registration number
Name of training provider
Name of Assessment Center

Structure of Test
Section No of questions No of marks Suggested time
A-Multiple choice questions 21 21 30min
B-Matching Type 15 15 20min
Total 36 50min

OFFICE USE ONLY


Multiple Choice Questions /21
Matching Type /15
Final Mark /36

February 2013

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

Instructions
1. Write your name, Registration number, name of training provider and
Assessment center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the
Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited
Assessor
5. You may use the following references in this test
 Non-programmable calculators
6. Do not bring the following items into the assessment venue
 Mobile telephones
 Programmable calculators
 Written notes

SECTION A – MULTIPLE-CHOICE QUESTIONS


Instructions for Section A
1. There are twenty one [21] questions in this section.
2. Select the best answer and encircle the letter
3. If you wish to change an answer, place an X mark on the letter you have
encircled and then circle the letter of your preferred answer.
4. A correct answer scores 1, an incorrect answer scores 0.No marks will be given
for a question if more than one answer is supplied

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

1. A security policy defines

A. When users cannot log in to their computers

B. What users can and cannot do with their computer

C. How the user should install their own software

D. How complex user password should be

2. The IT manager asks you for a diagram showing every server on the network. The
diagram that you should provide to his/her

A. Baseline Network Diagram

B. Logical Network Diagram

C. Physical Network Diagram

D. Wiring network Diagram

3. Yonatan has been asked to find and implement an application that will enable his
boss to log in to and control a server remotely and securely. The application that
would work best

A. E-mail
B. FTP
C. SSH
D. Telnet

4. A Place where you could find a list of problems that occurred on a system

A. Event Viewer
B. Network Diagram
C. RAID
D. Wiring Schematic

5. You want all network clients to download and install updates automatically during
night hours, and you have configured scheduled installation behavior for Automatic
Updates. However, you discover that some users are turning off their machines at
night and updates are not being applied. The group policy that enables you to
correct this situation without changing the installation schedule?

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

A. Configure Automatic Updates


B. No Auto-Restart For Scheduled Automatic Updates Installations
C. Reschedule Automatic Updates Scheduled Installations
D. Specify Intranet Microsoft Update Service Location

6. You are creating a number of user objects for a team of your organization’s
temporary workers. They will work daily from 9 a.m. to 5 p.m. on a contract that is
scheduled to begin in one month and end two months later. They will not work
outside of that schedule. The properties that you should not configure initially to
ensure maximum security for the objects

A. Password Never Expires


B. Password
C. Logon Hours
D. Account Expires

7. When you open the Properties dialog box for a computer object in the Active
Directory Users and Computers console, you discover that no properties are
displayed in the Operating System tab. The causes that make these properties to be
absent

A. Password Expired
B. Operating System has problems
C. Console is not opened properly
D. Computer has not joined domain

8. The minimum NTFS permissions required to allow users to open documents and run
programs stored in a shared folder

A. Full Control
B. List Folder Contents
C. Read & Execute
D. Write

9. Assume that you are giving a service and you want to measure its quality. The best
way to go about it

A. Asses the time it takes to deliver the service


B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to measure
their satisfaction
D. Wait until you receive a complaint from customers

10. Assume you were working a project on IT training need assessment. The best way
of collecting detailed information?

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

A. Questioner
B. Interview
C. Observation
D. Research
11. Assume you are the network administrator of a particular organization. While you
configure a network you noticed that Twisted Pair cable distance limited to 100m
and you want to increase distance coverage. The action to resolve this problem

A. Using another 100M cable


B. Using Switch on each 100M
C. Using Repeater on each 100 M
D. Using Hub on each 100 M
12. A user informs you that he can log on to his computer but cannot access network
resources such as shared folders. You determine that the user has all the
appropriate group memberships and permissions, but the user still cannot access
shared resources. The cause of this problem

A. User has attempted to access a shared folder without appropriate


permissions.
B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.

13. You are responsible for managing accounts and access to resources for members of
your group. A user in your group leaves the company, and you expect a replacement
for that employee in a few days. The action to do with the previous user's account

A. Delete the old user account, and create an account for the new user.
B. Change the password for the account, and give the new password to the new
user.
C. Disable the old user account, rename the user account by using the
replacement's name, and configure the account to require a new password
the next time the user logs on. Then, enable the account when the
replacement arrives.
D. Lock the old user account, rename the user account by using the
replacement's name, and configure the account to require a new password
the next time the user logs on. Then, enable the account when the
replacement arrives.

14. You organization consists of four physical locations connected by a wide-area


network (WAN). Each site has its own independent Internet connection. If the
primary concern about installing WSUS is the impact on WAN links. The best way to
configure the WSUS servers
A. All clients download updates from a single WSUS server at the head office.
B. Each location has an independent WSUS server that serves local clients.

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

C. Each remote location has replica WSUS servers that copy their
configuration from the head office WSUS server.
D. Each remote location has a disconnected WSUS server and updates are
imported on those servers from DVD.
15. A user calls for support, complaining that when she takes her laptop home, she is
unable to connect to the network. When she uses Ipconfig to view the IP address,
the address begins with 169. The solution to solve this problem

A. Configure the DNS server on the user's home router.


B. Configure the laptop to use an alternate configuration suitable for the user's
home network.
C. Manually configure the laptop with any static IP address
D. Manually release and renew the IP address by using Ipconfig

16. You are directing a team of systems administrators who are responsible for isolating
multiple connectivity issues on a network segment. Before you begin to alter
configuration information on client computers, you are not required to

A. Begin documentation.
B. Create an action plan to perform isolation tasks.
C. Perform an inventory of the system.
D. Provide a means of restoring the initial state of the computer.

17. You have made some changes to file and directory permissions on one of the
servers on your network. You want to verify the new settings before informing the
users of the changes. The best way to verify that the changes have taken affect and
no security problems arise from them

A. Ask a trusted user to perform the tests for you.


B. Create a test account for the purpose.
C. Do nothing. Changes made with administrative privileges are always correct.
D. Use your own Administrator account to perform the tests.

18. One security method is encryption. But encryption does nothing to keep digital pests
and hackers out. To accomplish this goal, we need
A. Bridges
B. Firewalls
C. Hubs
D. Router

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

19. A new client lives in a rural area, outside the connectivity radius of the local cable
company and definitely more than 20,000 feet away from the nearest switching
center for the phone company.  The connectivity option that offers the client the best
performance

A. Cable
B. Dialup
C. DSL
D. Satellite

20. Yohannes walked up to a computer that couldn't connect to the Internet and
immediately opened a command-line window and typed ping 127.0.0.1.  The reason
for doing this

A. He wanted to test the connection to the default gateway


B. He wanted to test the connection to the nearest Tier 2 router
C. He wanted to test the NIC on the default gateway
D. He wanted to test the NIC on the local machine

21. You want to propose new networking project for your organization. The best
approach to implement your new project

A. Apply you project first and report to the management board


B. Hire necessary man power for the project
C. Present your project benefits to the management board
D. Search for a fund to implement your project

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

SECTION B – MATCHING TYPE QUESTIONS


Instructions for Section B
1. There are fifteen [_15_] questions in this section.
2. Match column A with column B. Select the letter of the correct answer from column
B & write your answer on the provided space in front of the number in column A
3. If you wish to change your answer place an x mark on your previous answer and
write your preferred answer
4. A correct answer scores 1, an incorrect answer scores 0. No marks will be given for
a question if more than one answer is supplied

Type I: Match the OSI model layer’s functions in column A with the name of the correct
OSI Model layer in column B
Column A Column B
__________ 1. A layer that manages data encryption and hides A. Transport
the difference between various types of B. Session
computer Systems
C. Presentation
__________ 2. A layer that manages connections between D. Physical
machines
E. Network
__________ 3. A layer that defines hardware connections and F. Logical
turns Binary into physical Pulses
G. Data Linksys
__________ 4. A layer that provides tools for programs to use H. Data Link
to access the network. HTTP, FTP, SMTP and
I. Communication
POP3 operate
J. Application
__________ 5. A layer that moves packets between computers
on different network. IP also works on this layer

__________ 6. A layer that Bridges operate and MAC


addresses are part of it.

__________ 7. A layer that breaks data down into manageable


chunks

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

Type II: Match the description or function of a software/OS product in column A with the
name of the software/OS product in column B

Column A Column B
__________ 1. A mail server, calendaring software and contact A. Android
manager developed by Microsoft. B. AutoCAD
__________ 2. A family of security software by Microsoft , that C. Microsoft Exchange
is designed to help protect computer networks, Server
network servers (such as Microsoft Exchange
D. Microsoft Forefront
Server and Microsoft SharePoint Server) and
individual devices. E. Microsoft Server 2008
F. Microsoft Share Point
__________ 3. A software application for computer-aided
design and drafting. The software supports both G. Microsoft Visio
2D and 3D formats. H. MySQL
__________ 4. A diagramming and vector graphics application I. Network Management
which is part of the Microsoft Office suite System(NMS)
__________ 5. A computer operating system distributed as free J. Ubuntu
and open source software, using its own K. VMware ESXi
desktop environment

__________ 6. A Linux-based operating system designed


primarily for touch screen mobile devices such
as smart phones and tablet computers.

__________ 7. An open source relational database


management system that runs as a server
providing multi-user access to a number of
databases

__________ 8. A combination of hardware and software used


to monitor and administer a computer network or
networks.

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1

You might also like