0% found this document useful (0 votes)
50 views3 pages

Exam L3gg

The document is an assessment for the Department of ICT at NEJO APT College, focusing on various networking concepts and protocols. It consists of multiple-choice questions covering topics such as Active Directory, DNS, DHCP, server types, network devices, and security practices. The assessment aims to evaluate students' understanding of network management and infrastructure.

Uploaded by

Debela Hunduma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views3 pages

Exam L3gg

The document is an assessment for the Department of ICT at NEJO APT College, focusing on various networking concepts and protocols. It consists of multiple-choice questions covering topics such as Active Directory, DNS, DHCP, server types, network devices, and security practices. The assessment aims to evaluate students' understanding of network management and infrastructure.

Uploaded by

Debela Hunduma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

NEJO APT COLLEGE

Department of ICT HNS Level III UC:- Institutional Assessment Date 30/10/2016for R
program
Name: _____________________________ IDNo_________ Date: ___________________
I/ Choose the correct answer from the given alternatives and write your own choice (1.25
points each)

____ 1/ AD DS is a service that helps manage and organize a networked environment, such
as a company or an organization.
___ 2/ Domain Name System (DNS) server is a crucial component of computer networks
that translates human-readable domain names into IP addresses.
___ 3/ Dynamic Host Configuration Protocol (DHCP) is a software utility used to
dynamically assign IP addresses to network devices.
____ 4/ A server is a computer that provides services or resources to other computers or
devices on a network
___ 5/ A proxy server is a type of server that acts as an intermediary between clients and other
servers, providing security, caching, or filtering functions.

_____6/ A mail server is a type of server that handles the sending and receiving of emails using
protocols such as SMTP, POP3, or IMAP

____ 7/ What is the name of the technology that allows multiple operating systems to run on a
single physical server? A. Server clustering B. Server virtualization

C. Server consolidation D. Server replication

___ 8/ what is the name of the protocol that allows remote access and management of servers
over a network? A. RDP (Remote Desktop Protocol) B. SSH (Secure Shell) C. SNMP
(Simple Network Management Protocol) D. Telnet

___ 9/ What is the default subnet mask for class C network

A/ 127.0.0.1 B/ 255.0.0.0 C/ 255.255.0.0 D/ 255.255.255.0

__ 10/ Computers that access shared resources for network users

A/ Server B/ Client C/ Server based D/ Peer to peer


11/ ______ Detects devices and points of interference in a Wi-Fi signal.
A. Protocol Analyser B. Wi-Fi Analyser Bandwidth Speed Tester
12/_______ may a result of a cyber breach or an employee error or both.
A. Missing Files B. Network Troubleshooting C. Bandwidth Speed Tester
13/_________ Tests the bandwidth and latency of a user’s internet connection.
A.Protocol Analyser B. Bandwidth Speed Tester C. ipconfig
14/__________ A utility that shows the status of each active network connection.
A. Pathping B. Route C. Netstat D. Ifconfig
15/_________ A TCP/IP utility that transmits a datagram to another host, specified in the

command. A/ Tracert/trace route B/ Nslookup C/ Ifconfig

16/ __________ provides a comprehensive view of a given network. You can use this
application to analyse traffic on the network, figure out which ports are open and identify

network vulnerabilities. A/ Port Scanner B. Packet Sniffer C. Protocol Analyser

17/______ are focus on maintaining network architecture as a whole.


A. Network Admin B. Network Engineer Network Technician
18/The best practices for disposing of old network hardware is :
A. Data security B. Environmental impact C. Legal compliance D. All
19/________ People in this role manage the complete infrastructure of a network, including
maintenance.
A. Network Engineer B. Network Technician C. Network Admin
20/ What is the potential source of a network problem?
A. Hardware failure B. Configuration error C/ Traffic overload D/All
21/Which one is network device?
A. routers B. Router C. Firewall D. All
22/_____Creating segments for devices in the IoT ecosystem. Ensures that IoT devices are
isolated from critical network resources.
A. VoIP (Voice over Internet Protocol) Segments B. IoT (Internet of Things) Segments C.
Wireless Segments.
23/______Define security and access control requirements for different segments.
A. Applications and Services B. Security Requirements C. User Segmentation
24/_________ Define access control policies and requirements for user authentication and
authorization.
A. Data Encryption B. Access Control C. Intrusion Detection/Prevention

25/_________ You should create a team of people who will be responsible for reviewing the
documents.
A. Create a review team B. Identify the documents to be reviewed C. Establish review
criteria
26/ ___________ Once the review is complete, the results should be analyzed.
A. Implement changes B. Federated repository C. Analyze the results D. Create a review team
27/_________ Design and distribute surveys or questionnaires to collect data from a specific
audience.
A. Interviews B. Document Analysis C. Internet Research D. Surveys and Questionnaires

28/___________ directly observe and document behaviors, events, or processes. Use participant
observation by immersing yourself in the environment you’re studying.
A. Document Analysis B. Surveys and Questionnaires C. Interviews D. Observation
29/ __________ Conduct one-on-one or group interviews with relevant individuals. Prepare a set
of open-ended and closed-ended questions.
A. Document Analysis B Surveys and Questionnaires C. Interviews D. Observation
30/____________ Identify the different user groups and their specific requirements.
A. User Needs B. Applications and Services C. Security Requirements

31/_____________ Assess the bandwidth requirements for different types of traffic.


A. Bandwidth Requirements B. Identify Data Flows C. Sensitive Data Segmentation

You might also like