001
HNS Level IV
1. The file transfer protocol is built on________.
Client server architecture
Client oriented architecture
Service oriented architecture
Data centric architecture
2. It allows a visited website to store its own information about a user on the user’s
Malware
Spam
Adware
Cookies
3. Which of the following is a way to increase participation?
Ask the leader of the group to run the meeting and talk the most.
Plan the meetings and share meeting agendas with people beforehand
Point out dominating behavior to everyone.
Encourage everyone to talk whenever they have something to say, even if another
person is talking
4. Small-business owners develop and use operating procedures so that everyday tasks are
performed in a(n) __________ way.
Standard
Diverse
Innovative
Imprecise
5. The willingness to exert high levels of effort to reach organizational goals based on the
Effort’s ability to satisfy some individual need is ______________.
1
Need configuration
Motivation
Leadership
Effort management
6. A network administrator is verifying the configuration of a newly installation establishing a
FTP connection to a remote server, what is the highest protocol stack that the network
administrator is using for this operation?
Presentation
Session
Transport
Application
7. Which of the following statement about a wireless LAN controller is true?
They are best suited to smaller wireless networks
They must be configured through a GUI over HTTP or HTTPS
They rely on external firewalls for WLAN security
They can simplify the management and deployment of wireless LANs
8. Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smart phones to school to access
school resources?
Intranet
Wireless LAN
Extranet
9. A protocol which deals with resolving domain names is________.
POP3
2
DNS
DHCP
SMTP
Wired LAN
10. In FTP protocol, client contacts server using ____ as the transport protocol.
stream control transmission protocol
transmission control protocol
datagram congestion control protocol
user datagram protocol
11. Which term refers to a network that provides secure access to the corporate offices by
suppliers, customers and collaborators?
Intranet
Extended net
Internet
Extranet
1.
12. The network design for a college with users at five sites is being developed. Where in the
campus network architecture would servers used by all users be located?
Enterprise edge
Access-distribution
Data center
Services
13. Your network consists of an Active Directory forest that contains one domain named
contoso.com. All domain controllers run Windows Server 2008 and are configured as DNS
3
servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com.
You need to ensure a user is able to modify records in the contoso.com zone. You must
prevent the user from modifying the SOA record in the nwtraders.com zone. What should
you do?
From the Active Directory Users and Computers console, run the Delegation of Control
Wizard.
From the Active Directory Users and Computers console, modify the permissions of the
Domain Controllers organizational unit (OU).
From the DNS Manager console, modify the permissions of the contoso.com zone.
From the DNS Manager console, modify the permissions of the nwtraders.com zone.
14. If the server NO clue about where to find the address for a hostname then?
Server not reply for the request
Request is not processed
Server asks to its adjusting server
Server asks to root server
15. Refer to the exhibit bellow. As an administrator pings the default gateway at 10.10.10.1 and
sees the output as shown. At which OSI layer is the problem?
C:\> ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data:
Request time out.
Request time out.
Request time out.
Request time out.
Ping statistics for 10.10.10.1:
Packets sent -4, Received=0, lost-4 (100%loss)
Data link layer
4
Application layer
Session layer
Network layer
16. You want to implement a mechanism that automates the IP configuration, including IP
address, subnet mask, default gateway, and DNS information. Which protocol will you use to
accomplish this?
SMTP
ARP
SNMP
DHCP
17. Enabling additional users to handle administrative tasks for a particular object is referred to
as:
Targeting
Redirection
Delegation
Assignment
18. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
Static
NAT
Dynamic
PAT
19. Which protocol is used by the traceroute command to send and receive echo-requests and
echo-replies?
SNMP
5
ICMP
Telnet
TCP
20. You plan to implement a solution that meets the certificate requirements of Customer1. You
need to identify which role services must be deployed to the hosting environment. Which
two role services should you identify? Answer presents part of the solution
Online Report
Online Responder
Certificate Enrollment Policy Web Service
Certification Authority Web Enrollment
21. What process involves placing one PDU inside of another PDU?
Segmentation
Flow control
Encoding
Encapsulation
22. The method of communication in which transaction takes place in both directions, but only
in one direction at a time is called?
Half Duplex
Full Duplex
Four wire circuit
Simplex
23. You are an enterprise administrator for IIHT. The corporate network of IIHT consists of a
DHCP server that runs Windows Server 2008. Which of the following options would you
choose to reduce the size of the DHCP database?
Run jetpack.exe dhcp.mdb temp.mdb from the folder that contains the DHCP
6
Enable the File is ready for archiving attribute of the dhcp.mdb file, from the properties
of dhcp.mdb file.
Reconcile the database from the DHCP snap-in.
Enable the Compress contents to save disk space attribute of the dhcp.mdb file, from
the properties of dhcp.mdb file.
24. What OSI physical layer term describes the amount of time, including delays, for data to
travel from one point to another?
Bandwidth
Latency
Good put
Throughput
25. A network administrator is implementing a policy that requires strong, complex passwords.
Which data protection goal does this policy support?
Data quality
Data redundancy
Data integrity
Data confidentiality
26. You have a Windows Server 2008 computer. You want to disable all incoming connections to
the server. What should you do?
From the Services snap-in, disable the Server service.
From the Services snap-in, disable the Net Logon service.
From the Windows Firewall, enable the Block All Connections option on the
Domain Profile
Disable the Windows Firewall with Advanced Security
7
27. ABC Industries wants configuration modifications of the Certification Authority role service
to belogged. How would you implement this?
You should consider enabling auditing of object access.
You should consider enabling auditing of system events.
You should consider enabling auditing of process tracking.
You should consider enabling auditing of privilege use.
28. Local GPO settings are stored in what folder on a computer?
%systemroot%/System32/GroupPolicy
. %systemroot%/System/GroupPolicy
. %systemroot%/System32/Drivers/GroupPolicy
. %systemroot%/System32/Drivers/Etc/GroupPolicy
29. FTP server listens for connection on port number________.
23
21
22
25
30. After obtaining the IP address, to prevent the IP conflict the client may use______.
Reverse Address Resolution Protocol
Broader Gateway Protocol
Address Resolution Protocol
Internet Relay Chat
31. What is Wired Equivalent Privacy (WEP)?
security algorithm for usb communication
security algorithm for wireless networks
8
security algorithm for flash drive communication
security algorithm for ethernet
32. A network administrator wants to implement a network medium that is not susceptible to
electromagnetic interference, type of cable you would to use?
Cat 5 UTP cable
Thinnet coax
Thicket coax
Fiber-optic cable
33. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model
is equivalent to the Network layer of the OSI model?
Network Access
Application
Internet
Host-to-Host
34. Which of the following are layers in the TCP/IP model?
1. Application
2. Session
3. Transport
4. Internet
5. Data Link
6. Physical
2, 3 and 5
1 and 2
3, 4 and 5
1,3 and 4
9
35. You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of
disk space and prevent users from consuming more than 1 GB of disk space. How will
configure it?
Create a hard quota with a 800mb limit and a second soft quota with a limit 1GB
Create a hard quota with a 1GB limit. Create a warning at 80 percent
Create a soft quota with a 800MB limit. Create a warning at 80 percent
Create a soft quota with a 800MB limit and a second quota with a 1GB limit.
36. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to
fetch the mails?
POP3
S/MIME
SMTP
HTTP
37. A service that a computer uses to resolve NETBIOS names without any administrative work
on your network?
FTP
DHCP
WINS
UDP
38. What does 'Kaizen' mean?
It is a system of inventory control.
Continuous improvement
A method of stock control involving colored stock cards
It is the Japanese word for total quality management
39. Which one of the following is best describe virtual memory?
10
A segment of memory that has been reserved for use by the CPU
An extremely fast type of memory
A memory which used to hold data in permanent bases
The use of hard disk space as an extension of RAM when physical memory runs out
40. Your network consists of an Active Directory Forest that contains one domain named
contoso.com. All domain controllers run Windows Server 2008 and are configured as DNS
servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com.
You need to ensure a user is able to modify records in the contoso.com zone. You must
prevent the user from modifying the SOA record in the nwtraders.com zone. What should
you do?
From the DNS Manager console, modify the permissions of the contoso.com zone.
From the Active Directory Users and Computers console, run the Delegation of Control
Wizard.
From the DNS Manager console, modify the permissions of the nwtraders.com zone.
From the Active Directory Users and Computers console, modify the permissions of the
Domain Controllers organizational unit (OU).
41. Access point exists in_________.
Transport layer
Network layer
Data link layer
Application layer
42. Your company has one main office and four branch offices. The main office contains a
standard primary DNS zone named adatum.com. Each branch office contains a copy of the
adatum.com zone. When records are added to the adatum.com zone, you discover that it
takes up to one hour before the changes replicate to each zone in the branch offices. You
11
need to minimize the amount of time it takes for the records to be updated in the branch
offices. What should you do?
On the DNS servers in the branch offices, configure the Notify settings.
On the DNS server in the main office, configure the Notify settings.
On the DNS server in the main office, configure the Zone Aging/Scavenging Properties.
On the DNS servers in the branch offices, configure the Zone Aging/Scavenging
Properties.
43. The bit length for IPv6 address__________.
32 bits
128 bits
192 bits
64 bits
44. of the following is a principle of total quality management?
Continuous value enhancement
Continuous process improvement
Continuous productivity improvement
Continuous defect elimination
45. A switch never learns a broadcasting address because?
Broadcast only use network layer addressing
Broadcast addresses use an incorrect format for the switch table
A Broadcast frames never sent to switches
A broadcast address will never be the source address of the frame
46. The most frequently used framework for obtaining continuous improvement is_______.
Quality function deployment
12
The plan-do-check-act cycle
The quality circles
The cause-and-effect process
47. What type of network traffic requires QoS?
Video conferencing
Email
On-line purchasing
Wiki
48. Which class of a network is used for experimental testing?
Class D
Class B
Class A
Class E
49. ________________ is the process that helps managers understand the nature of the
industry, the way firms behave competitively within the industry, and how competition is
generally undertaken.
Organizational analysis
Market needs analysis
Strategic market analysis
Portfolio analysis
50. Which command can be used from a PC to verify the connectivity between hosts that
connect through a switch in the same LAN?
Traceroute address
Ping address
13
Tracert address
ARP address
51. Which OSI Layer performs error detection but not correction?
Network Layer
Application Layer
Data link Layer
Transport layer
52. Network layer firewall has two sub-categories known as______
Frame firewall and packet firewall
Circuit frame and packet frame
Stateful firewall and stateless firewall
Bit oriented firewall and byte-oriented firewall
53. What should you do to keep unauthorized users from changing your home wireless router
setting?
Change the MAC address of the router
Change the firewall settings on your computer
Nothing, only the administrator can change router settings
Change the default administrator password and SSID
54. What is an important first consideration when starting to design a network?
Size of the network
Access security
Type of applications
Protocols to be used
14
55. The system partition on a Windows Server must always be installed to a Dynamic host
configuration protocol_________.
Simple volume
NTFS volume
FAT32 volume
Dynamic disk
56. Which one of the following is the rule of effective communication?
Be unconsciousness for personal benefit
Not recognize that actions speak louder than words
Organize your thoughts
Always translate the message in to benefits for our self than the other party
57. Which connectivity method would be best for a corporate employee who works from home
two days a week, but needs secure access to internal corporate databases?
DSL
VPN
Cable
WiMAX
58. Which of the following elements is required to do after successfully installation of DNS?
WINDOWS 2000 clients configuration
Active Directory configuration
Dynamic IP address configuration
Static IP address configuration
59. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
15
192.168.168.128-192
192.168.168.128-190
192.168.168.129-190
192.168.168.129-191
60. What is the primary purpose of a VLAN?
Demonstrating the proper layout for a network
Simulating a network
Segmenting a network inside a switch or device
To create a virtual private network
16
17