NEJO APT COLLEGE
Department of ICT HNS Level III UC:- Institutional Assessment Date 30/10/2016for R
program
Name: _____________________________ IDNo_________ Date: ___________________
I/ Choose the correct answer from the given alternatives and write your own choice (1.25
points each)
____ 1/ AD DS is a service that helps manage and organize a networked environment, such
as a company or an organization.
___ 2/ Domain Name System (DNS) server is a crucial component of computer networks
that translates human-readable domain names into IP addresses.
___ 3/ Dynamic Host Configuration Protocol (DHCP) is a software utility used to
dynamically assign IP addresses to network devices.
____ 4/ A server is a computer that provides services or resources to other computers or
devices on a network
___ 5/ A proxy server is a type of server that acts as an intermediary between clients and other
servers, providing security, caching, or filtering functions.
_____6/ A mail server is a type of server that handles the sending and receiving of emails using
protocols such as SMTP, POP3, or IMAP
____ 7/ What is the name of the technology that allows multiple operating systems to run on a
single physical server? A. Server clustering B. Server virtualization
C. Server consolidation D. Server replication
___ 8/ what is the name of the protocol that allows remote access and management of servers
over a network? A. RDP (Remote Desktop Protocol) B. SSH (Secure Shell) C. SNMP
(Simple Network Management Protocol) D. Telnet
___ 9/ What is the default subnet mask for class C network
A/ 127.0.0.1 B/ 255.0.0.0 C/ 255.255.0.0 D/ 255.255.255.0
__ 10/ Computers that access shared resources for network users
A/ Server B/ Client C/ Server based D/ Peer to peer
11/ ______ Detects devices and points of interference in a Wi-Fi signal.
A. Protocol Analyser B. Wi-Fi Analyser Bandwidth Speed Tester
12/_______ may a result of a cyber breach or an employee error or both.
A. Missing Files B. Network Troubleshooting C. Bandwidth Speed Tester
13/_________ Tests the bandwidth and latency of a user’s internet connection.
A.Protocol Analyser B. Bandwidth Speed Tester C. ipconfig
14/__________ A utility that shows the status of each active network connection.
A. Pathping B. Route C. Netstat D. Ifconfig
15/_________ A TCP/IP utility that transmits a datagram to another host, specified in the
command. A/ Tracert/trace route B/ Nslookup C/ Ifconfig
16/ __________ provides a comprehensive view of a given network. You can use this
application to analyse traffic on the network, figure out which ports are open and identify
network vulnerabilities. A/ Port Scanner B. Packet Sniffer C. Protocol Analyser
17/______ are focus on maintaining network architecture as a whole.
A. Network Admin B. Network Engineer Network Technician
18/The best practices for disposing of old network hardware is :
A. Data security B. Environmental impact C. Legal compliance D. All
19/________ People in this role manage the complete infrastructure of a network, including
maintenance.
A. Network Engineer B. Network Technician C. Network Admin
20/ What is the potential source of a network problem?
A. Hardware failure B. Configuration error C/ Traffic overload D/All
21/Which one is network device?
A. routers B. Router C. Firewall D. All
22/_____Creating segments for devices in the IoT ecosystem. Ensures that IoT devices are
isolated from critical network resources.
A. VoIP (Voice over Internet Protocol) Segments B. IoT (Internet of Things) Segments C.
Wireless Segments.
23/______Define security and access control requirements for different segments.
A. Applications and Services B. Security Requirements C. User Segmentation
24/_________ Define access control policies and requirements for user authentication and
authorization.
A. Data Encryption B. Access Control C. Intrusion Detection/Prevention
25/_________ You should create a team of people who will be responsible for reviewing the
documents.
A. Create a review team B. Identify the documents to be reviewed C. Establish review
criteria
26/ ___________ Once the review is complete, the results should be analyzed.
A. Implement changes B. Federated repository C. Analyze the results D. Create a review team
27/_________ Design and distribute surveys or questionnaires to collect data from a specific
audience.
A. Interviews B. Document Analysis C. Internet Research D. Surveys and Questionnaires
28/___________ directly observe and document behaviors, events, or processes. Use participant
observation by immersing yourself in the environment you’re studying.
A. Document Analysis B. Surveys and Questionnaires C. Interviews D. Observation
29/ __________ Conduct one-on-one or group interviews with relevant individuals. Prepare a set
of open-ended and closed-ended questions.
A. Document Analysis B Surveys and Questionnaires C. Interviews D. Observation
30/____________ Identify the different user groups and their specific requirements.
A. User Needs B. Applications and Services C. Security Requirements
31/_____________ Assess the bandwidth requirements for different types of traffic.
A. Bandwidth Requirements B. Identify Data Flows C. Sensitive Data Segmentation