B. Coaxial Cable

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

1.

A user receives an email stating that their account was compromised and there is a need to
verify account credentials by submitting the correct information on a website .which of the
following threats is occurring?
a. Phishing
b. smurf Attack
c. Denial of service
d. Man in the
2. A technical word like to separate the HR department’s workstations from the at the company.
Which of the following be used?
a. Peer to peer
b. Subnettting
c. VLAN
d. VPN
3. Which of the following describes what the number two represents in 100Bases2 cabling?
a. Fiber
b. Coaxial cable
c. UTP
d. Twisted pair
4. Which of the following documents should always be kept up-to-data after any major changes
are made to a network backbone?
a. Network Diagram
b. Performance baseline
c. Network security procedure
d. Company policy
5. Which of the following devices is used to connect multiple devices to a network and does not
stop broadcast traffic?
a. Switch
b. Hub
c. Modem
d. Repeater
6. Which of the following regulates the amount of network traffic a single node receives in a server
cluster?
a. Load Balancer
b. proxy server
c. Content Filter
d. Quality of Service(QoS)
7. Which of the following connector type is used for coax?
a. BNC
b. ST
c. LC
d. SC
8. Which of the following are valid MAC addresses?
a. OO-1C-1F-2C-13-43-or FF –FF-FF-FF-FF-FF-FF
b. OO-1B-26-3F-B1-16-16-34
c. OO-o1-1E-2E –B3-16-01
d. OO1C.1G2F.1234
9. Which of the following are common VPN transports?
a.
b. VNC
c. SSL
d. PPTP
e. RAS
10. Which of the following layer dose the ICMP (ping) Protocol operate?
a. Layer 1
b. Layer 3
c. Layer 4
d. Layer 5
11. Which class of IP address provides a maximum of only 254 host addresses network ID ?
a. Class A
b. Class B
c. Class C
d. Class D
12. If you use either Telnet or FTP, which is the highest layer you are using to atransmit data?
a. Application
b. Network
c. data link
d. Transport
13. Which of the following protocols uses both TCP and UDP?
a. FTP
b. DNS
c. Telnet
d. SMTP
14. Which one of the following is used only domain controllers and enables you to restore directory
service?
a. Debugging mode
b. Directory services restore mode
c. Safe mode
d. Last known good configuration
15. When you start up your working compute, an error message display “NT boot Loader
missing”.one cannot be the cause of the problem?
a. Computer system drive is not identified(BIOS/UEFI)
b. Data or power cables from internal hard disk to mother board are loose or have filled.
c. Ntldr,ntdetect.com and Boot.ini are missed or damaged when error happened
d. No bootable drive containing media is listed in boot order
16. While reviewing security logs for your server. Users on internet have attempted to access your
internal mail server. Although it appears that the user’s trial was unsuccessful. System may be
concerned which of the following solutions are you most likely to implement?
a. Firewall system at connection point to internet
b. Kerberos authentication
c. File level encryption
d. More secured password policy
17. Which layer of OSI model Manage connection between machines and sockets operate at this
layer?
a. Transport
b. Data link
c. Network
d. Application
18. Which of the following is not the reason for link lights of NIC to be deactivated? Even if the
operating system of the NIC drive is loaded
a. If RJ-45 not firmly crimped
b. If NIC is improperly configured
c. Wire arrangement is improper
d. IP address configuration
19. Which of the following is private IP address?
a. 12/0/0/1
b. 172.33.194.30
c. 172.20.14.36
d. 192.158.10.2
20. Which of the following is not market promotion tool?
a. Networking and referrals
b. Advertising
c. Seminars
d. Supply and demands
21. Used to translate word based address of a system to a numeric IP address of a system to a
numeric IP address of the computer?
a. DHCP server
b. DNS server
c. Router
d. Mail server
22. A user can determine the network setting on client network interface card as well as any that
DHCP server has leased to you computer by typing the following command on cmd?
a. IP
b. Ping
c. Connect
d. IPconfing/all
23. Which of the following is example of commutation?
a. Para language
b. Face-to face communication
c. Body language
d. Sign and time language
24. In which layer translate logical address and names into physical address,the data is organized
intio packets?
a. Physical layer
b. Network Layer
c. Data link layer
d. Transport Layer
25. The task next to gather requirements and conduct analysis in project dev’t life cycle is ?
a. Prepare succinct appropriate documents and present the requirement specification to
the client and again agreement
b. Conduct system maintenance
c. Simply implement and deploy it
d. Go directly to design as soon ad possible
26. One of the following is type of account policy?
a. Password policy
b. User’s right assignment
c. Security option
d. Audit policy
27. Which of the following is connector is commonly used for fiber cable?
a. BNC
b. RJ- 45
c. SC
d. RJ-11
28. A network administrator is verifying configuration a new installed host by establishing FTP
connection to a remote server. What is the highest layer of proton stack that network
administrator is for this operation?
a. Application
b. Session
c. Presentation
d. Transport
29. Which of the following is behaving of good team member?
a. Share responsibility
b. Do not respect the opinions of others in other in team
c. Keep individual information about development
d. Do not take turns
30. Hachalu is a network administrator for small company. He is managing a server called /sales and
is assigned NTFS permissions to D:\data folder to managers group. He wants to the manager
group able to list the contents of folder and reader change or delete any of the data. Which
NTFS permission should he apply?
a. Full control
b. Modify
c. Read
d. Write
31. Network cable that work using stands of glass and pulses of light?
a. Shielded twisted pair cable
b. Fiber optics cable
c. Coaxial cable
d. Unshielded twisted pair cable
32. What dose 10Base T refers”
a. Transmit at 1 Gbps with a distance limitation of 220m per segment
b. Transmit at 100 Gbps with a distance limitation of 100m per segment
c. Transmit at 10 Mbps with a distance limitation of 100m per segment
d. Transmit at 10 Mbps with a distance limitation of 2000m per segment
33. You are a network administrator in your company. You are given the following I{P address. The
network address 192.168.10.0 and subnet mask 255.255.255.25.depending on of the above
network address and sub net mask, how many subnets you can create?
a. 32
b. 8
c. 48
d. 16
34. To store information about user, computers ,and other devices on the network in security
boundary know as?
a. Active directory federation service
b. Active directory lightweight directory
c. Active directory domain service
d. Active certification certificate service
35. Arrangement of computers in computer network by using one main cable to which all nodes are
directly connected. The main cable act as backbone for the network and one of the computer in
the network typically act as computer server>
a. Mash topology
b. Start topology
c. Hybrid topology
d. Bus topology
e. Bus topology
36. Which network topology show below figure?
a. Mesh topology
b. Star topology
c. Hybrid topology
d. Bus topology
37. Your company’s manager computer says’”NTLDR missing “ .As a technical,which of the
following is possible command promt of recover console to fix problem?
a. Copy d:\ntldr c:\x
b. Copy d:\i383\ntdetect.com c:\
c. Copy d:\i386\ntldr c:\i386\
d. Copy D:\i383\ntldr c:\
38. Enable sharing information on internet intranet,or exteranet?
a. Network policy and access services
b. Terminal services
c. Windows deployment services
d. Web server

You might also like