0% found this document useful (0 votes)
34 views17 pages

Coc 2014LIV

The document consists of a series of multiple-choice questions related to networking concepts, protocols, and configurations. Topics covered include file transfer protocols, network security, DNS management, and network design principles. It serves as a quiz or assessment tool for individuals studying networking or preparing for certification exams.

Uploaded by

debritutakele6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views17 pages

Coc 2014LIV

The document consists of a series of multiple-choice questions related to networking concepts, protocols, and configurations. Topics covered include file transfer protocols, network security, DNS management, and network design principles. It serves as a quiz or assessment tool for individuals studying networking or preparing for certification exams.

Uploaded by

debritutakele6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

001

HNS Level IV
1. The file transfer protocol is built on________.

Client server architecture

Client oriented architecture

Service oriented architecture

Data centric architecture


2. It allows a visited website to store its own information about a user on the user’s

Malware

Spam

Adware

Cookies
3. Which of the following is a way to increase participation?

Ask the leader of the group to run the meeting and talk the most.

Plan the meetings and share meeting agendas with people beforehand

Point out dominating behavior to everyone.

Encourage everyone to talk whenever they have something to say, even if another
person is talking
4. Small-business owners develop and use operating procedures so that everyday tasks are
performed in a(n) __________ way.

Standard

Diverse

Innovative

Imprecise
5. The willingness to exert high levels of effort to reach organizational goals based on the
Effort’s ability to satisfy some individual need is ______________.
1
Need configuration

Motivation

Leadership

Effort management
6. A network administrator is verifying the configuration of a newly installation establishing a
FTP connection to a remote server, what is the highest protocol stack that the network
administrator is using for this operation?

Presentation

Session

Transport

Application
7. Which of the following statement about a wireless LAN controller is true?

They are best suited to smaller wireless networks

They must be configured through a GUI over HTTP or HTTPS

They rely on external firewalls for WLAN security

They can simplify the management and deployment of wireless LANs


8. Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smart phones to school to access
school resources?

Intranet

Wireless LAN

Extranet
9. A protocol which deals with resolving domain names is________.

POP3

2
DNS

DHCP

SMTP

Wired LAN
10. In FTP protocol, client contacts server using ____ as the transport protocol.

stream control transmission protocol

transmission control protocol

datagram congestion control protocol

user datagram protocol


11. Which term refers to a network that provides secure access to the corporate offices by
suppliers, customers and collaborators?

Intranet

Extended net

Internet

Extranet

1.
12. The network design for a college with users at five sites is being developed. Where in the
campus network architecture would servers used by all users be located?

Enterprise edge

Access-distribution

Data center

Services
13. Your network consists of an Active Directory forest that contains one domain named
contoso.com. All domain controllers run Windows Server 2008 and are configured as DNS

3
servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com.
You need to ensure a user is able to modify records in the contoso.com zone. You must
prevent the user from modifying the SOA record in the nwtraders.com zone. What should
you do?

From the Active Directory Users and Computers console, run the Delegation of Control
Wizard.

From the Active Directory Users and Computers console, modify the permissions of the
Domain Controllers organizational unit (OU).

From the DNS Manager console, modify the permissions of the contoso.com zone.

From the DNS Manager console, modify the permissions of the nwtraders.com zone.
14. If the server NO clue about where to find the address for a hostname then?

Server not reply for the request

Request is not processed

Server asks to its adjusting server

Server asks to root server


15. Refer to the exhibit bellow. As an administrator pings the default gateway at 10.10.10.1 and
sees the output as shown. At which OSI layer is the problem?
C:\> ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data:
Request time out.
Request time out.
Request time out.
Request time out.
Ping statistics for 10.10.10.1:
Packets sent -4, Received=0, lost-4 (100%loss)

Data link layer

4
Application layer

Session layer

Network layer
16. You want to implement a mechanism that automates the IP configuration, including IP
address, subnet mask, default gateway, and DNS information. Which protocol will you use to
accomplish this?

SMTP

ARP

SNMP

DHCP
17. Enabling additional users to handle administrative tasks for a particular object is referred to
as:

Targeting

Redirection

Delegation

Assignment
18. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?

Static

NAT

Dynamic

PAT
19. Which protocol is used by the traceroute command to send and receive echo-requests and
echo-replies?

SNMP

5
ICMP

Telnet

TCP
20. You plan to implement a solution that meets the certificate requirements of Customer1. You
need to identify which role services must be deployed to the hosting environment. Which
two role services should you identify? Answer presents part of the solution

Online Report

Online Responder

Certificate Enrollment Policy Web Service

Certification Authority Web Enrollment


21. What process involves placing one PDU inside of another PDU?

Segmentation

Flow control

Encoding

Encapsulation
22. The method of communication in which transaction takes place in both directions, but only
in one direction at a time is called?

Half Duplex

Full Duplex

Four wire circuit

Simplex
23. You are an enterprise administrator for IIHT. The corporate network of IIHT consists of a
DHCP server that runs Windows Server 2008. Which of the following options would you
choose to reduce the size of the DHCP database?

Run jetpack.exe dhcp.mdb temp.mdb from the folder that contains the DHCP

6
Enable the File is ready for archiving attribute of the dhcp.mdb file, from the properties
of dhcp.mdb file.

Reconcile the database from the DHCP snap-in.

Enable the Compress contents to save disk space attribute of the dhcp.mdb file, from
the properties of dhcp.mdb file.
24. What OSI physical layer term describes the amount of time, including delays, for data to
travel from one point to another?

Bandwidth

Latency

Good put

Throughput
25. A network administrator is implementing a policy that requires strong, complex passwords.
Which data protection goal does this policy support?

Data quality

Data redundancy

Data integrity

Data confidentiality
26. You have a Windows Server 2008 computer. You want to disable all incoming connections to
the server. What should you do?

From the Services snap-in, disable the Server service.

From the Services snap-in, disable the Net Logon service.

From the Windows Firewall, enable the Block All Connections option on the
Domain Profile

Disable the Windows Firewall with Advanced Security

7
27. ABC Industries wants configuration modifications of the Certification Authority role service
to belogged. How would you implement this?

You should consider enabling auditing of object access.

You should consider enabling auditing of system events.

You should consider enabling auditing of process tracking.

You should consider enabling auditing of privilege use.


28. Local GPO settings are stored in what folder on a computer?

%systemroot%/System32/GroupPolicy

. %systemroot%/System/GroupPolicy

. %systemroot%/System32/Drivers/GroupPolicy

. %systemroot%/System32/Drivers/Etc/GroupPolicy
29. FTP server listens for connection on port number________.

23

21

22

25
30. After obtaining the IP address, to prevent the IP conflict the client may use______.

Reverse Address Resolution Protocol

Broader Gateway Protocol

Address Resolution Protocol

Internet Relay Chat


31. What is Wired Equivalent Privacy (WEP)?

security algorithm for usb communication

security algorithm for wireless networks

8
security algorithm for flash drive communication

security algorithm for ethernet


32. A network administrator wants to implement a network medium that is not susceptible to
electromagnetic interference, type of cable you would to use?

Cat 5 UTP cable

Thinnet coax

Thicket coax

Fiber-optic cable
33. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model
is equivalent to the Network layer of the OSI model?

Network Access

Application

Internet

Host-to-Host
34. Which of the following are layers in the TCP/IP model?
1. Application
2. Session
3. Transport
4. Internet
5. Data Link
6. Physical

2, 3 and 5

1 and 2

3, 4 and 5

1,3 and 4

9
35. You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of
disk space and prevent users from consuming more than 1 GB of disk space. How will
configure it?

Create a hard quota with a 800mb limit and a second soft quota with a limit 1GB

Create a hard quota with a 1GB limit. Create a warning at 80 percent

Create a soft quota with a 800MB limit. Create a warning at 80 percent

Create a soft quota with a 800MB limit and a second quota with a 1GB limit.
36. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to
fetch the mails?

POP3

S/MIME

SMTP

HTTP
37. A service that a computer uses to resolve NETBIOS names without any administrative work
on your network?

FTP

DHCP

WINS

UDP
38. What does 'Kaizen' mean?

It is a system of inventory control.

Continuous improvement

A method of stock control involving colored stock cards

It is the Japanese word for total quality management


39. Which one of the following is best describe virtual memory?

10
A segment of memory that has been reserved for use by the CPU

An extremely fast type of memory

A memory which used to hold data in permanent bases

The use of hard disk space as an extension of RAM when physical memory runs out
40. Your network consists of an Active Directory Forest that contains one domain named
contoso.com. All domain controllers run Windows Server 2008 and are configured as DNS
servers. You have two Active Directory-integrated zones: contoso.com and nwtraders.com.
You need to ensure a user is able to modify records in the contoso.com zone. You must
prevent the user from modifying the SOA record in the nwtraders.com zone. What should
you do?

From the DNS Manager console, modify the permissions of the contoso.com zone.

From the Active Directory Users and Computers console, run the Delegation of Control
Wizard.

From the DNS Manager console, modify the permissions of the nwtraders.com zone.

From the Active Directory Users and Computers console, modify the permissions of the
Domain Controllers organizational unit (OU).
41. Access point exists in_________.

Transport layer

Network layer

Data link layer

Application layer
42. Your company has one main office and four branch offices. The main office contains a
standard primary DNS zone named adatum.com. Each branch office contains a copy of the
adatum.com zone. When records are added to the adatum.com zone, you discover that it
takes up to one hour before the changes replicate to each zone in the branch offices. You

11
need to minimize the amount of time it takes for the records to be updated in the branch
offices. What should you do?

On the DNS servers in the branch offices, configure the Notify settings.

On the DNS server in the main office, configure the Notify settings.

On the DNS server in the main office, configure the Zone Aging/Scavenging Properties.

On the DNS servers in the branch offices, configure the Zone Aging/Scavenging
Properties.
43. The bit length for IPv6 address__________.

32 bits

128 bits

192 bits

64 bits
44. of the following is a principle of total quality management?

Continuous value enhancement

Continuous process improvement

Continuous productivity improvement

Continuous defect elimination


45. A switch never learns a broadcasting address because?

Broadcast only use network layer addressing

Broadcast addresses use an incorrect format for the switch table

A Broadcast frames never sent to switches

A broadcast address will never be the source address of the frame


46. The most frequently used framework for obtaining continuous improvement is_______.

Quality function deployment

12
The plan-do-check-act cycle

The quality circles

The cause-and-effect process


47. What type of network traffic requires QoS?

Video conferencing

Email

On-line purchasing

Wiki
48. Which class of a network is used for experimental testing?

Class D

Class B

Class A

Class E
49. ________________ is the process that helps managers understand the nature of the
industry, the way firms behave competitively within the industry, and how competition is
generally undertaken.

Organizational analysis

Market needs analysis

Strategic market analysis

Portfolio analysis
50. Which command can be used from a PC to verify the connectivity between hosts that
connect through a switch in the same LAN?

Traceroute address

Ping address

13
Tracert address

ARP address
51. Which OSI Layer performs error detection but not correction?

Network Layer

Application Layer

Data link Layer

Transport layer
52. Network layer firewall has two sub-categories known as______

Frame firewall and packet firewall

Circuit frame and packet frame

Stateful firewall and stateless firewall

Bit oriented firewall and byte-oriented firewall


53. What should you do to keep unauthorized users from changing your home wireless router
setting?

Change the MAC address of the router

Change the firewall settings on your computer

Nothing, only the administrator can change router settings

Change the default administrator password and SSID


54. What is an important first consideration when starting to design a network?

Size of the network

Access security

Type of applications

Protocols to be used

14
55. The system partition on a Windows Server must always be installed to a Dynamic host
configuration protocol_________.

Simple volume

NTFS volume

FAT32 volume

Dynamic disk
56. Which one of the following is the rule of effective communication?

Be unconsciousness for personal benefit

Not recognize that actions speak louder than words

Organize your thoughts

Always translate the message in to benefits for our self than the other party
57. Which connectivity method would be best for a corporate employee who works from home
two days a week, but needs secure access to internal corporate databases?

DSL

VPN

Cable

WiMAX
58. Which of the following elements is required to do after successfully installation of DNS?

WINDOWS 2000 clients configuration

Active Directory configuration

Dynamic IP address configuration

Static IP address configuration


59. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?

15
192.168.168.128-192

192.168.168.128-190

192.168.168.129-190

192.168.168.129-191
60. What is the primary purpose of a VLAN?

Demonstrating the proper layout for a network

Simulating a network

Segmenting a network inside a switch or device

To create a virtual private network

16
17

You might also like