First Round COC Written Ass. Area (2013 E.C.) /level III HNS

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 3

First Round COC Written ass. area (2013 E.C.

)/Level III HNS

1. A Point to Point connection provides a dedicated link between the device


2. Data Link layer of Ethernet consists of the LLC sub layer and MAC sub layer
3. In Ethernet addressing, if all the bits are 1s the address is broadcasting address
4. Class of IPV4 address : 4.5.6.7---- class A
5. UDP is an acronym for User Datagram Protocol
6. Hub: One collision domain and one broadcast domain
7 192.168.0.2 subnet mask 255.255.255.240 or 192.168.0.0/27 : Answer 14 valid subnets and 14
valid hosts
8. 10/100 refers to _______________
9. gpupdate/group policy update/ is used to _____________
From the GPMC, right click on an OU that contains computer objects.Click the “Group Policy
Update” option. ---This will run a gpupdate /force on all computers in the OU, and any subOUs.
-----Computer policy will be refreshed for each computer, and user policy will be refreshed for
any and all users currently logged into those computers. -----you can “Save” your results to a .csv
file to review what computers succeeded and did not succeed in receiving the task.

10. Set the password for the forgotten user password.


Start| Administrative tools| Active directory users and computers| right click on user account |
Reset Password
11. client/server functionality
Column “A” Column “B”

1. Loop back O A. NAT


2. Resolve IP address M B. Bad memory
3. Dynamic Configuration L C. ESD
4. Parity error B D. Segmentation
5. Reliable communication Q E. UDP
6. Anti-wrist strap C F. HTTP
7. Hide IP address A G. CSMA/CD
8. Transport layer D H. Protocol
9. Generic of communication with bridge and router I. FTP
10. Absorbing Signal bouncing communication S J. Authentication
11. Threat security Communication J k. Authorization
12. Unreliable communication E L. DHCP
13 . access method G M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
s. Terminator
Second round COC Writen assess (2006 E. C)/ Level III HNS

Column A Column B
1. Ip Address Conflict M A. Kaizen
2. Fiber optics cable connectors F B. Worm
3. telnet P C. Workplace communication
4. class B IP address range U D. Quality control
5. continuous improvement A E. Site
6. A secret word or string of characters used for F. MT-RJ
user authentication T G. 10.xxxxx
7. a logic group of workstation, server and network H. Ping
devices that appear to be on the same LAN I. DNS
despite of their geographical distribution K J. NAT
8. replicates itself B K. VLAN
9. refers that DNS name resolution is working L. Wi-Fi
correctly R M. Assigning the same IP address
10. exchanging of information both verbal and non- N. FTP
verbal within an organization C O. UDP
11. Set of procedures intended to ensure that P. Remote login protocol
manufactured product or performed service are Q. Transport
delivered in advanced set of quality D R. NS Lookup
12. object in active directory represents a S. Authentication
geographical location that holds network E T. Password
U. 128.xxx
First round Written Exam (2006 E. C)/ Level IV HNS

Column A Column B
1. Allows various object types to be moved from A. Active Directory Migration Tool
current location to a new location D Delegation Control Wizard
2. allows administrators to log on with a non- B. Dictionary attack
administrator account to perform C. DS move
administrative tasks without logging off. H D. Run as
3. to migrate objects in Active Directory forests E. Drag and drop
A F. Identification number (PIN)
4. used to build, deploy and operate XML and G. Secondary Logon
web service Q H. Strong Password
5. One part of dictionary attack J I. Password cracking
6. Move the domain name J. Group Policy
7. OU moving F K. Hub
8. Separate collusion domain and same L. Proxy Server
broadcast O M. File Server
9. All ports are in the same collusion and N. Switch
broadcast domain L O. Print Server
10. Used to share public resource N P. Applcation Server
11. Show only one ip address for multiple users Q. Coaxial cable
on the subnet M R. UTP
12. Hacking and cracking password C
13. ATM(Automated Teller Machine) G
14. Requirment feature run as

IPv6 loopback address  is ::1

the most-commonly used IPv4 loopback address is 127.0.0.1

You might also like