0% found this document useful (0 votes)
22 views128 pages

Hns Collection

The document presents a series of multiple-choice questions covering various topics related to networking, IT management, and organizational behavior. Key areas include increasing participation in meetings, troubleshooting printing issues, strategic decision-making levels, and understanding network protocols and configurations. It also addresses quality assurance, communication barriers, and the role of DHCP in network management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views128 pages

Hns Collection

The document presents a series of multiple-choice questions covering various topics related to networking, IT management, and organizational behavior. Key areas include increasing participation in meetings, troubleshooting printing issues, strategic decision-making levels, and understanding network protocols and configurations. It also addresses quality assurance, communication barriers, and the role of DHCP in network management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 128

1. Which of the following is a way to increase participation?

A. Point out dominating behavior to everyone


B. Encourage everyone to talk whenever they have something to say,
even if another person is talking
C. Plan the meetings and share meeting agendas with people
beforehand
D. Ask the leader of the group to run the meeting and talk the most.
2. You are administering a computer running Windows Server 2008 configured as
a print server. Users in the Marketing group report that they cannot print
documents using a printer on the server. You view the permissions in the
printer’s properties. The Marketing group is allowed Manage Documents
permission. Which of the following statements best explains why the users
cannot print to the printer?
A. The Administrators group must be granted the Manage Printers
permission.
B. The Marketing group must be granted the Manage Printers permission.
C. Everyone group must be granted the Manage Documents permission.
D. The Marketing group must be granted the Print permission.
3. Strategic decision making can take place at various levels of an organization,
what are the three most common?
A. Operational, board, and industrially
B. Corporate, Business, and Functional
C. Governmental, locally, and individually
D. Board of Directors, Chief Executive, and Junior Management
4. Control of the users’ access to network resources through charges is the main
responsibility of ________

A. counting Management C. Reactive Fault Management


B. Reconfigured Fault D. Security Management
Management

5. Developing a communication plan can help focus your message and reach your
target audience
A. Plan C. Guide
B. Communication D. Module

6. One of the following is not Causes of poor quality

A. Human C. Management
B. Material D. Nature

7. Physical or Logical arrangement of network is ____________

A. Routing C. PowerShell
B. Networking D. Topology

8. This wireless standard is widely used to connect computers to each other and to
the Internet.

A. Blueband C. Broadband
B. RJ45 D. 802.11

9. Which one of the following will not be considered in improved business


performance planning?
A. Efficient resource utilization
B. Ignoring new ideas
C. Business Profitability
D. Business risk Management
10.When you make a decision to run your business as a sole trader, this means:
A. the business is unincorporated
B. your business assets are legally separate from your personal assets
C. the business is incorporated
D. you are employed by the business
11.using the command prompt. Which command would you use?

A. dsnew C. dscreate
B. dsadd D. dsmodify

12.In mesh topology, relationship between one device and another is.........
A. Primary to secondary C. Peer to primary
B. Peer to Peer D. Primary to peer

13.Which server type used to sending and receiving mail?

A. Proxy server C. FTP server


B. POP server D. Web server

14.One of the header fields in an IP datagram is the Time-to-live (TTL) field.


Which of the following statements best explains the need for this field?
A. It can be used to optimize throughput
B. It can be used to prioritize packets
C. It can be used to reduce delays
D. It can be used to prevent packet looping
15.Find what do domain controllers do?
A. Receive domain commands
B. Control granular settings in a domain environment.
C. Relay domain commands
D. Store the database, maintain the policies and provide the
authentication of domain logons.
16.The name of the protocol which provides virtual terminal in TCP/IP model is

A. SMTP C. Telnet
B. HTTP D. FTP

17.How many usable IP addresses can you get from a conventional Class C
address?

A. 254 C. 192
B. 128 D. 256

18.The plan covers partner roles and responsibilities, activities, budget and
management consideration.

A. Baseline plan C. Implementation plan


B. Personal plan D. Group plan
19.The ability to convey or share ideas and feelings effectively.

A. Unresponsive C. Effective communication


B. Miscommunication D. Disinclination

20.Which utility is used to trace the route to from one host to another in a TCP/IP
network?

A. Ipconfig/Ifconfig C. . Ping
B. Netstat D. Tracert/ Traceroute

21.It has small type of antenna; it helps to make connection on the wireless
network.

A. POE switch C. Weird NIC


B. weird Modem D. Wireless NIC

22.What is SYSVOL folder?


A. Contain information about system information
B. Contain information about Server OS
C. Contain group or user policy information
D. Contain information about all roles
23.In which topology there is central controller?

A. Rack C. Star
B. Ring D. Bus

24.When a manager monitors the work performance of workers in his department


to determine if the quality of their work is 'up to standard', this manager is
engaging in which function?

A. Leading C. Organizing
B. Planning D. Controlling

25.Which of these are four important operation strategies to attract customers?


A. Low Price, Low Dependability, Flexibility, High Quality
B. Low Price, High Quality, Flexibility, Marketing
C. Low Price, High Quality, Low Flexibility, Dependability
D. Low Price, High Quality, Dependability, Flexibility
26.Which of the following is an internal barrier of a communication?

A. poor listening skills C. bad phone connections


B. e-mail not working

27.Which one of the following is the Interaction between the client and server
starts via the message?

A. client_hello C. client_hi
B. server_hi D. server_hello

28.According to kaizen philosophy which of the following, belong to team-


dynamics?

A. Communication skill C. stop improvement


B. increasing waste D. Creating conflict

29.You want to implement a mechanism that automates the IP configuration,


including IP address, subnet mask, default gateway, and DNS information.
Which protocol will you use to accomplish this?

A. DHCP C. ARP
B. SMTP D. SNMP

30.ICMP (internet control message protocol) is a protocol


A. Used to dynamically bind a high level IP address to a low-level
physical hardware address
B. For transferring files from one machine to another
C. Used to monitor computers
D. That handles error and control messages
31.Their business process that has standard element ensures that deliverables of
phases and activities meet with business and technology expectations.
A. Automated tools standards
B. Information technology standards
C. Documentation standards
D. Quality standards
32.Which of these benefits of 5S are of value to your company?
A. Increased employee expense
B. Decreased productivity
C. Decreased safety
D. Increased profitability
33.Which of the following media types is most susceptible to EMI?

A. Fiber Optic C. Co-axial


B. UTP D. STP

34.If you make changes to an existing GPO (Group Policy Organization) that is
already linked in Active Directory, how fast do the policy settings take effect?

A. 30 minutes C. As soon as the client


B. 1 hour downloads them
D. 50 seconds

35.Which of the following elements is required to do after successfully installation


of DNS?

A. Group and User C. Active Directory


configuration configuration
B. Dynamic IP address D. Static IP address
configuration configuration

36.What is quality assurance?


A. A set of activities ensuring quality in the feedback.
B. A set of activities for ensuring quality in products.
C. A set of activities for ensuring quality in processes.
D. A set of activities assuring quality in feedback, products and processes.
37.What is the basic function of the nslookup program?
A. To look up only domain names in the DNS database
B. To look up only IP addresses in the DNS database
C. To probe the DNS database for various types of information
D. To look up only SOA records from a company’s database
38.One of the following is data link layer protocol.

A. DHCP C. ARP
B. IP D. FTP

39.Clean the workplace and equipment on a regular basis, in order to maintain


standards and identify defects.

A. Sustain C. Sort
B. Shine D. Standardize

40.What is the purpose of the DHCP server? (UC03)


A. To translate IPv4 addresses to MAC addresses
B. To provide an IP configuration information to hosts
C. To translate URLs to IP addresses
D. To provide storage for email
41.Because the configuration information for a DHCP client is received
dynamically, you must use which utility to read the current configuration to
verify the settings?

A. TRACERT C. ARP
B. PING D. IPCONFIG

42.The data link layer formats the message into pieces, each called _______

A. Byte C. Relay
B. Frame D. Packets

43.The IT director has asked you to ping a computer continuously; which of the
following is the best command to use?

A. ping –c C. ping –l
B. ping -t D. ping –d

44.When should a technician not wearing an antistatic wrist strap?


A. When installing RAM
B. When replacing VGA cable
C. When opening a computer case
D. When installing a hard drive
45.Which one of the following used to diagnose problems related to the DNS
services.

A. Ping C. Ipconfig
B. Ipconfig D. Nslookup

46.Which of the following TCP/IP parameters is typically deployed as a scope


option in DHCP?

A. DNS Server C. Default Gateway


B. Lease Duration D. Subnet Mask

47.In FTP protocol, client contacts server using ____ as the transport protocol.
A. User datagram protocol
B. Transmission control protocol
C. Datagram congestion control protocol
D. Stream control transmission protocol
48.An organization has a class B network and wishes to form subnets for 64
departments. The subnet mask would be

A. 255.255.252.0 C. 255.255.0.0
B. 255.255.64.0 D. 255.255.128.0

49.Which of the following server used to resolve server name into IP and vice-
versa?

A. WDS C. DNS
B. FTP D. IP SERVER

50.Servers handle requests for other domains _______

A. Indirectly C. It is not possible


B. By contacting remote D. Directly
DNS server
51.You are a system analyst for DAS Company. You are going to choose the best
system, for the company, among the alternative systems. Your best criterion is
how and to what degree the system will fulfill users’ requirements. The
feasibility category is

A. Technical C. Operational
B. Risk D. Economic

52._______is unwanted noise or interference in an electrical path or circuit caused


by an outside source.

A. Extended length of cabling C. EMI


B. Crosstalk D. UPD

53.Which one is best describe communication without words?

A. Non-verbal C. Object communication


communication D. Written communication
B. Oral communication

54.__________ provides an isolated tunnel across a public network for sending


and receiving data privately as if the computing devices were directly connected
to the private network.

A. Visual Private Network D. Virtual Protocol


B. Virtual Protocol Network Networking
C. Virtual Private Network

55.Which of the following is not the aim of Kaizen process?

A. To make processes C. To make processes


effective controllable
B. To make processes D. To make processes
uncontrollable efficient

56.Find which is the container structures in Active Directory?


A. Host name C. E-mail
B. Forests D. Webs

57.Which one of the following is correct about the process of communication?


A. Encoding ----> receiver --->message---->response---->feedback----
>the sender
B. Sender----> response encoding----> message---->decoding----
>receiver----> feedback
C. Sender---->decoding---->message---->encoding----> receiver---->
response----> feedback
D. Sender---->encoding---->message---->decoding---->receiver---->
response----> feedback
58.This is a type of attack that has a program running on your server to bypass the
authorization.

A. Phishing C. DoS
B. Sniffing D. Backdoor

59.You install the Routing and Remote Access service on a Windows 2008 Server
computer in your network. Your network is not directly connected to the
Internet and uses the private IP address range 192.168.0.0. When you try to
ping servers by using their IP addresses, you receive the following message:
"Request timed out." When you run the ipconfig command, it shows that your
dial-up connection has been given the IP address 169.254.75.182. What should
you do to resolve the problem?
A. Ensure that the remote access server is able to connect to a DHCP
server that has a scope for its subnet
B. Configure the remote access server with the address of a DHCP server
C. Authorize the remote access server to receive multiple addresses from
a DHCP server
D. Configure the remote access server to act as a DHCP Relay Agent
60.One of the following is Quality Assurance Functions
A. Procedures not followed
B. Technology transfer
C. Encouraging negative attitude
D. Lack of supervision/monitoring
61.What is the purpose of a vendor contract?
A. Allow all parties involved to understand what is expected in terms of
deliverables, payment, etc
B. Used to increase payments at any time for vendor.
C. To get sensitive data when the partnership expires.
D. Used to Rushing the process by vender.
62.Which utility is useful for troubleshooting NetBIOS name resolution problems?

A. Netstat C. PING
B. Hostname D. NBTSTAT

63.An administrator pings the default gateway at 10.10.10.1 and sees the output as
request time out. At which layer the problem?

A. Data link C. Network layer


B. Application D. Access layer

64.Which of the following tools are used to modify the settings in a security
template?
A. Group Policy Object Editor
B. Group Policy Management console
C. Security Templates snap-in
D. Active Directory Users and Computers
65.What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?

A. Internet C. Network Acces


B. Host-to-Host D. Application

66.You have a Windows Server 2008 computer. You want to disable all incoming
connections to the server. What should you do?
A. Disable the Windows Firewall with Advanced Security.
B. From the Windows Firewall, enable the Block All Connections
option on the Domain Profile
C. From the Services snap-in, disable the Server service.
D. From the Services snap-in, disable the Net Logon service.
67.If a number of devices are four (4) in mesh topology network then the number
of duplex links in the mesh topology ____________

A. Twelve C. Six
B. Two D. Five

68.DHCP ____ _______ occur every 60 minutes

A. Subnet Mask C. Super Scope


B. Multicast Scope D. Automatic Backups

69.Which of the following is not the environmental factor that influences the
learning process
A. Desire for personal growth and development
B. Training strategies, methods and techniques
C. Trainer/training team
D. General learning environment in the programme
70.Which of the following network cables would a technical find on the RJ-45?

A. Fiber C. USP
B. Coaxial cable D. Ethernet cable

71.What type of network traffic requires Quality of service (QoS)?

A. On-line purchasing C. Video conferencing


B. Email D. Wiki

72.The process of assigning permissions to set Group Policy for objects within an
organization unit (OU) is known as ___

A. Filtering C. Delegation
B. Inheritance D. Organization

73.Your home computer network is protected by a firewall. You have configured


your Windows 7 home computer to use Windows Mail. After you configure
your email accounts, you discover that you are unable to send email messages
from Windows Mail. Your email provider uses POP3 and SMTP. What port
should you open on the firewall?

A. 443 C. 110
B. 25 D. 995

74.Which of the Following is not an aspect of Kaizen philosophy?

A. Quality awareness, C. Process driven


quality control D. Standardization
B. Ineffective leadership

75.The name of the protocol which provides virtual terminal in TCP/IP model is

A. SMTP C. FTP
B. HTTP D. Telnet

76.What is the benefit of 5S?

A. Increase down time C. Reduce searching time


B. Increase waiting time D. Reduce profit

77.Each router interface has its own Address Resolution Protocol (ARP) module,
its own LAN address (network card address) and its own Internet Protocol (IP)
address.

A. Router C. Repeaterhh
B. Hub D. Switch

78.How do you use teamwork in your everyday life?


A. Unwillingness to Cooperate
B. Work with students to get and assignment done
C. bad attitudes toward colleagues
D. Walk someone to class
79.Which of the following can be software?

A. Routers B. Modems
C. Gateway D. Firewalls

80.What type of device provides power to a computer and allows it to be safely


working on when a power loss?

A. Standby power supply C. Uninterruptible power


B. Surge suppressor supply
D. Power inverter

81.Which one of the following is the process of judging something or someone


based on a set of standards?

A. Planning C. Monitoring
B. Validating D. Evaluating

82.Device that allows computer information to be transmitted and received over a


telephone line.

A. Network adapter C. Modem


B. Network Router D. Hub

83.What does a monitoring and evaluation framework include?


A. Goal, objectives and indicators
B. Objectives, assumptions, indicators and a summary of activities
C. Objectives and indicators
D. Goal and objectives
84.Which of the following not done by using e-mail?

A. Send an attachment D. Copy file from a remote


B. Forward an e-mail computer
C. Reply to an e-mail

85._____is a tool in Active Directory that installs and removes Active Directory
Domain Services and promotes domain controllers.

A. Ping C. IP Release
B. DCpromo D. Ipconfig.
86.A wireless network interface controller can work in ¬¬¬____
A. WDS mode
B. Infrastructure mode
C. ad-hoc mode
D. Both infrastructure mode and ad-hoc mode
87.Which one is decision made before the occurrence of an external or internal
change ?

A. Proactive C. Intuitive
B. Reactive D. Systematic

88._____________is a software used to manipulate a text document, such as a


resume or a report.

A. Peachtree C. Word Processing


B. Database management D. Spread sheet
System

89.Which one of the following is the frequent workplace communication is

A. Notice board memo C. Printed mail


B. Face to face D. Postal Service

90.Which one of the following techniques used by hackers to trick the user in order
to disclose their username and password through fake websites?

A. Phishing C. Social engineering


B. Hashing D. Cracking

91.How do you clear CMOS password by:


A. Formatting only operating system
B. Formatting the system
C. Removing bios battery
D. changing the jumper setting in the motherboard
92.What process involves placing one PDU inside of another PDU?

A. Flow control B. Encoding


C. Encapsulation D. Segmentation

93.Network layer firewall works as

A. Packet filter C. Frame filter


B. Content filter D. Virus filter

94.Microsoft DNS is the name given to the implementation of domain name


system services provided in ________ operating systems.

A. Internet Information C. Internet Explorer


Services D. Microsoft Windows
B. DirectX

95.__________ enable you to manage your networks with greater efficiency and
less network troubleshooting overhead.

A. Address Management C. Network tools and utilities


tools D. Network Diagnostic tools
B. SNMP Tools

96.If correct time zone information is not used and your servers’ clocks run at
different times, what is most likely to have issues on your network?

A. program performance C. IP address assignment


B. User authentication D. Windows Update

97.You have an interface on a router with the IP address of 192.168.192.10/29.


Including the router interface, how many hosts can have IP addresses on the
LAN attached to the router interface?

A. 30 C. 32
B. 8 D. 6

98.Which of the following is not a stage in the systematic training cycle?


A. Evaluation
B. Planning the training
C. Assessing training needs
D. Job instruction on a one to one basis
99.______is a disturbance caused by the electric or magnetic fields of one
telecommunication signal affecting a signal in an adjacent circuit

A. Distortion C. Crosstalk
B. Attenuation D. EMI

100. Which of the following is NOT a type of broadband Internet connection?

A. Cable C. Dial-up
B. DSL D. Satellite

101. What is the DNS? (

A. Used for virtualization C. Assign IP automatically


B. Convert IP address to domain D. Install software
name automatically

102. The enable to simplify access to the shared folders on a network by setting
up folders to appear as though they are accessed from only one place.

A. Distributed File System C. Dispersed File System


B. Extended File System D. Encrypted File System

103. The flow of information across persons of work units at the same
hierarchical level is called?

A. Upward communication D. Down ward


B. Lateral communication communication
C. Vertical communication

104. The person designated in an organization whose responsibility includes


maintaining computer infrastructures with emphasis on local area networks
(LANs) up to wide area networks (WANs).

A. Computer Administrator B. System Administrator


C. Database Administrator D. Network Administrator

105. __________is a type of malicious software (malware) that threatens to


publish or blocks access to data or a computer system, usually by encrypting it,
until the victim pays to the attacker.

A. Viruses C. Worms
B. Ransom ware D. Social engineering

106. A leadership style in which the leader includes one or more employees in the
decision making process is?

A. Delegate or Free Reign D. Authoritarian or


B. Federalist autocratic
C. Participative or democratic

107. Find what are Group Policy Objects?


A. A collection of settings that define and find what a system will look
like and how it will behave for a defined group of users.
B. A set of folder rules that determine where Outlook will save email
messages.
C. They determine the hierarchy of a domain, Find which can fit the
operational structure of an organization.
D. Affords the capability for secure extension of network operations to
the Web
108. Which of the Following is not an aspect of Kaizen philosophy?

A. Process driven C. Ineffective leadership


B. Quality awareness, D. Standardization
quality control

109. _______ is used for assigning Class D IP addresses and related network
settings

A. Class C C. Multicast Scope


B. Super Scope D. Normal DHCP Scope
110. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com. You try and access the site and discover that you can’t access
either, but you can PING the site with its IP address. The most probable cause
of the problem.

A. The gateway is down C. The DNS server is down


B. The working switch is D. Yahoo! is down
down

111. Which one is the function network device amplifies the signal it receives on
one port before it transmits it on other ports?

A. Repeater C. Router
B. Bridge D. Switch/hub

112. Networks are monitored by security personnel and supervised by ___Who


set(s) up accounts and passwords for authorized network users.

A. The government C. Password administrators


B. IT managers D. Network administrators

113. _______is Corrective maintenance practice


A. Repairing Broken Laptop screen
B. Running disk software utility
C. Cleaning Computer hardware
D. Deleting unused programs or other files on your computer.
114. A Protocol which Discuses a mechanism that gateways and hosts use to
communication control or error information.

A. POP3 C. RARP
B. ARP D. ICMP

115. Which class Based on 1.1.1.0/24, the IP address ?

A. Class C C. Class A
B. Class D D. Class B
116. Which of following connectors are commonly used with coaxial cabling?
A. BNC C. RJ-11
B. RJ-45 D. SC-LC

117. ____________Open Source Server OS

A. Virtual Box C. Xamp


B. Red Hut D. FileZilla

118. Which is the correct order during data is encapsulated?


A. Data ----> frame-----> packet ---->segment ---->bit
B. Packet ----> Data ---> Segment--->Frame--->bit
C. Segment ---->Data --->packet ---> Frame ---> bit
D. Data ---->segment --->Packet ---->frame ---> bit
119. Which topology requires multipoint?

A. Star C. Bus
B. Mesh D. Ring

120. Organizing and coordinating of the planned activities in order to achieve


their defined objectives.

A. planning C. Observation
B. Management D. Directing

121. Which one is granting an outside organization access to internet web pages
is often implemented?

A. Intranet C. Hacker
B. Internet D. Extranet

122. On which stage of team development Members feel anger or frustration with
the task or with other members or may even resent the presence of formal
leadership?

A. Orientation C. Storming
B. Resolution D. Production
123. A network administrator is implementing a policy that requires strong,
A. Data
complex qualityWhich data protection goal C.
passwords. Datapolicy
does this integrity
support?
B. Data redundancy D. Data confidentiality

124. A user can login to his computer but cannot access network resources. The
user has all the appropriate group memberships and permissions, but he still
cannot access shared resources. What is the cause of this problem?
A. User has logged on to the domain instead of the local computer.
B. User has attempted to access a shared folder without appropriate
permissions.
C. User has logged on to the local computer instead of the domain.
D. User has entered the wrong password.
125. Which one of the following the method an organization uses to approve
anything from documents, invoices, budgets, and purchase orders, to a new
process.

A. Direction C. Work flow


B. Log D. Approval process

126. In the computer networks, the encryption techniques are primarily used for
improving :

A. Security C. Performance
B. Reliability D. Longevity

127. A product which is manufactured by using the degree of the design


specification

A. Quality of conformance C. Feedback


B. Quality Control D. Quality Assurance

128. Which type of memory is startup configuration with network administrator


enters the command “copy-config startup-config”?

A. Flash C. NVRAM
B. ROM D. RAM
129. How many hosts can be located on a network, where the IPv4 netmask is 27
A. 32
bits? C. 27
B. 30 D. 5

130. If correct time zone information is not used and your servers’ clocks run at
different times, what is most likely to have issues on your network?

A. IP address assignment C. User authentication


B. program performance D. Windows Update

131. Which one is the operational techniques and activity that are used to fulfill
requirement for quality.

A. quality assurances C. quality product


B. quality services D. quality control

132. Which of the following elements is required to successfully install and


configure DNS?

A. Windows 2000 clients C. DHCP


B. Active Directory D. Static IP address

133. How Many Broadcasting domain and collision domains are there in the
diagram below?(UC 02)

A. 1Broadcasting domain and 3 collision domains


B. 1 Broadcasting domain and 5 collision domains
C. 2 Broadcasting domain and 5 collision domains
D. 2 Broadcasting domain and 3 collision domains
134. Which one is a collaborative and systematic sharing of ideas and information
among three to eight persons in order to reach a consensus or a common
solution to a problem, or to obtain facts?
A. Large Group C. Dyadic Communication
communication D. Small Group
B. Mass Communication Communication

135. A device that can bridge several network structure is called _____

A. WAN C. Gateway
B. Repeater D. LAN

136. Which one of the following will not be considered in improved business
performance planning?

A. Ignoring new ideas C. Business Profitability


B. Efficient resource D. Business risk
utilization Management

137. Which layer transmits the frames into transmission media?

A. Transport C. Physical
B. Network D. Data link

138. In a star topology message transmission in a hub will be:

A. Broadcast C. Either unicast or


B. Unicast broadcast
D. Multicast

139. One of the following is Principles of Teaching and Learning

A. Discouragement C. Apathy
B. Motivation D. Laziness

140. A type of maintenance that has regular schedule?

A. Proactive Maintenance C. Preventive Maintenance


B. Breakdown Maintenance D. Predictive Maintenance

141. Which one is the first step in a control process?


A. Set standards C. Allocate resources
B. Choose key personnel for D. Select a strategy
the task

142. A device which can be connected to a network without using cable is called

A. Distributed device C. Open-source device


B. Centralized device D. Wireless device

143. Between Sites, you can also choose to use ________ for replication, but only
for changes in the Schema or Configuration.

A. E-mail C. Internet Message Access


B. Simple Mail Transfer Protocol
Protocol D. Post Office Protocol

144. What process involves placing one PDU inside of another PDU?

A. Encoding C. Encapsulation
B. Segmentation D. Flow control

145. Which of the following is NOT a type of broadband Internet connection?

A. DSL C. Dial-up
B. Cable D. Satellite

146. Which of the following refers to exploring the appropriate, ethical behaviors
related to the online environment and digital media platform?

A. Cyber low C. Cyberethics


B. Cybersecurity D. Cybersafety

147. A network connectivity Device which allows mobile user to connect a


central network node without any wires.

A. NIC C. Wireless Access Point


B. Gateways D. Modem
148. ____used on Windows NT and Windows 2000 desktops to repair a system
that fails to start.

A. Directory services restore C. Emergency Repair Disk


mode (ERD)
B. Recovery console D. Last known good
configuration

149. Which of the following can be used to add, delete, or modify objects in
Active Directory, in addition to modifying the schema if necessary?

A. CSVDE C. LDIFDE
B. DCPROMO D. NSLOOKUP

150. Among the following the one that contains one or more domains that are in a
common relationship.

A. Root C. Forest
B. Tree D. Branch

151. ____________Combines the functionality of a switch and a router.

A. Repeater C. Layer 3 switch


B. Server D. VLAN

152. Which is an extension of an enterprise’s private intranet across a public


Network such as the Internet across a public Network such as the Internet,
creating a secure private connection?

A. VSPN C. VSN
B. VNP D. VPN

153. In business, there are several types of business organisation, what are these?

A. Public, Private and C. Private


Voluntary D. Public and Voluntary
B. Voluntary and Private
154. Which of the following could be a weakness?
A. developing market such as the Internet
B. Poor quality of goods and services
C. Competitors with access to better channels of distribution
D. Special marketing expertise
155. Addresses are reserved for multicasting.

A. Class D C. Class E
B. Class C D. Class B

156. A user reported that his computer is slow. When a technician arrives. He
finds many unwanted program running at startup. The application that helps to
configure program at startup.

A. REGEDIT C. IPCONGIG
B. MSCONFIG D. WINLOGON

157. What is an alias record used for?


A. In an unsecured location facing the internet
B. A routable internal address (similar to the 192.168 address space)
C. when you have a large number of single-name clients to support
D. Creating an alternate record or alias for an existing record
158. Which one of the following function of firewall?
A. Forwarding all packets that is forwarded
B. Allowing only packets that pass security restriction to be forwarded
C. Allowing all packets that is forwarded
D. Rejecting all packets regardless of security restriction
159. If a switch has five workstations attached, how many collision domains are
created?

A. 5 C. 1
B. 0 D. 6

160. What is the CIDR equivalent for 255.255.255.224?

A. /26 B. /27
C. /24 D. /25

161. Which of the following terms best describes the component that enables
DHCP clients to communicate with DHCP servers on other subnets?

A. Forwarder C. Scope
B. Relay agent D. Resolver

162. The domain name system is maintained by _______

A. A single computer C. Distributed database


B. A single servers system
D. Unauthorized user

163. This network is purely IP based. You are troubleshooting some IP


connectivity issues. You are using some of the command line utilities on a
connected WinXP PC. Refer to the exhibit. What command can you use to
display such result?

A. ipconfig -p C. tracert local


B. ping local host D. ipconfig /all

164. Which one of the following is a private IP address?

A. 172.20.14.36 C. 168.172.19.39
B. 172.33.194.30 D. 127.0.0.1

165. The _____ tab is used to enable or disable a printer for sharing as well as to
specify the name of the share.

A. Location C. General
B. Sharing D. Advanced

166. Source of Information Generally published or recorded documents of


knowledge.

A. Non-documentary sources C. Documentary sources


B. Formal Sources D. Informal Sources
167. Find what default group has the right to log on locally, start and stop
services, perform backup and restore operations, format disks, create, delete
shares, and even power down domain controllers?

A. Backup Operators C. Enterprise Admins


B. Schema Admins D. Server Operators

168. You are in charge of a small network. The users want to have full control
over their data and still be able to share data with the rest of the office. The best
type of network to set up this.

A. Server based network C. Peer-to-peer network


B. Client based network D. Master Domain network

169. Which one of the following is to translate domain names into IP Addresses?

A. Internet Explorer web C. ping


browser D. DHCP
B. DNS

170. You are an IT expert for EKAS Company. You are responsible for
interpreting system requests and specifications, site preparation and user
training, and contact point for customers. This skill is

A. Conflict management C. Team management


B. Leadership D. Customer relations

171. You install Internet Information Services 5.0 on a computer running


Windows 2008 Server. You create two new department web sites for the
Human Resources and Sales departments. You use host headers to define these
two new sites. You stop the Sales web site while a developer updates the
contents of the site. If a user attempts to access the Sales site while it is stopped,
what response will the user receive?
A. The user will receive a 403.2 -Read Access Forbidden error message
B. The user will be redirected to the Default Web site home page
C. The user will receive a 404 - File Not Found error message
D. The user will be redirected to an alternate default page for the Sales
site's home directory
172. Which of the following is a security threat to theft of information as it is
transmitted over by a computer, Smartphone or another connected device?

A. Penetration C. Security
B. Eavesdropping D. Manipulation

173. Which manual tells you how to use a software program?

A. Documentation C. Programming
B. Technical D. User

174. Which task does not the Dynamic Host Configuration Protocol perform?
A. Configure IP address parameters from DHCP server to a host.
B. Set the IP gateway to be used by the network
C. Assign IP address from the default pool.
D. Renew IP address from the default pool
175. You are the network administrator for ministry of education. Your network
consists of Windows 7/10 computers, and you want to assign static IP addresses
rather than use a DHCP server. You want to configure the computers to reside
on the 192.168.10.0 network. What subnet mask should you use with this
network address?

A. 255.255.0.0 C. 255.255.255.0
B. 255.255.255.255 D. 255.0.0.0

176. The communication is always _______________ in ring topology?

A. Bidirectional D. Neither Unidirectional or


B. Unidirectional Bidirectional
C. Multidirectional

177. The response time and transit time is used to measure the ____________ of
a network.

A. Performance B. Longevity
C. Security D. Reliability

178. While gathering data to determine the organization business requirement you
might take records of the organization like, annual reports and organizational
policies. These kinds of information resources are considered as.

A. Tertiary sources C. Secondary sources


B. Primary sources D. Informal sources

179. Which of the following is not related to ipconfig in Microsoft Windows?


A. Display all current TCP/IP network configuration values
B. Modify DNS settings
C. Trace the routers in the path to destination
D. Modify DHCP settings
180. What command can be used on a Windows PC to see the IP configuration of
that computer?

A. Ping C. Show interfaces


B. Show ip interface brief D. Ipconfig

HNS 4
1. Which multiple access technique is used by IEEE 802.11 standard for
wireless LAN

a) CDMA c) ALOHA
b) CSMA/CA d) EVDO

2. Which protocol is used by the traceroute command to send and receive


echo-requests and echo-replies?

a) TCP c) ICMP
b) Telnet d) SNMP

3. The time required to examine the packet’s header and determine where to
direct the packet is part of _________.

a) Processing delay b) Queuing delay


c) Transmission delay d) Transferring delay

4. You are an enterprise administrator for IIHT. The corporate network of


IIHT consists of a single Active Directory forest called IIHT.com. The IIHT
.com forest contains six domains under it. All DNS servers in the forest run
Windows Server 2008. Which of the following actions would you choose to
ensure that all public DNS queries are channeled through a single-caching-
only DNS server?
a) Enable BIND secondary’s on a DNS Server.
b) Record for the hostname of the caching DNS server.
c) Configure a Global Names host record for the hostname of the
caching DNS
d) Configure the root hints.
5. What should you do to keep unauthorized users from changing your home
wireless router setting?
a) Change the default administrator password and SSID
b) Change the firewall settings on your computer
c) Nothing, only the administrator can change router settings
d) Change the MAC address of the router
6. The file transfer protocol is built on ____________.

a) Client server c) File centered


architecture architecture
b) Service oriented d) Data centric
architecture architecture

7. Which one of the following is best describe virtual memory?


a) A segment of memory that has been reserved for use by the CPU
b) A memory which used to hold data in permanent bases
c) The use of hard disk space as an extension of RAM when physical
memory runs out
d) An extremely fast type of memory
8. A technician is to document the current configurations of all network
devices in a college, including those in off-site buildings. Which protocol
would be best to use to securely access the network devices?
a) Telnet c) FTP
b) SSH d) HTTP

9. In which of the following protocols does a website (if accessed using the
protocol) encrypt the session with a Digital Certificate?

a) HTTPS c) TCPS
b) SHTTPS d) XHTTPS

10.You want to implement a mechanism that automates the IP configuration,


including IP address, subnet mask, default gateway, and DNS information.
Which protocol will you use to accomplish this?

a) DHCP c) SMTP
b) ARP d) SNMP

11.Local GPO settings are stored in what folder on a computer?


a) . %systemroot%/System32/Drivers/Etc/GroupPolicy
b) . %systemroot%/System32/Drivers/GroupPolicy
c) %systemroot%/System32/GroupPolicy
d) . %systemroot%/System/GroupPolicy
12.Which statements are true regarding ICMP packets?
a) ICMP is encapsulated within UDP datagram.
b) ICMP can provide hosts with information about network
problems.
c) ICMP is unencapsulated within IP datagram.
d) ICMP guarantees datagram delivery.
13.What OSI physical layer term describes the amount of time, including
delays, for data to travel from one point to another?

a) Good put c) Latency


b) Bandwidth d) Throughput

14.What is an ISP?
a) a protocol that establishes how computers within a local network
communicate
b) an organization that enables individuals and businesses to
connect to the Internet
c) a networking device that combines the functionality of several
different networking devices
d) a standards body that develops cabling and wiring standards for
networking
15.After obtaining the IP address, to prevent the IP conflict the client may
use______.

a) Broader Gateway c) Address Resolution


Protocol Protocol
b) Internet Relay Chat d) Reverse Address
Resolution Protocol

16.One source sending a packet to multiple destinations_________.

a) Unicasting c) Broadcasting
b) Domain server d) Multicasting

17.You work as a senior Office 365 administrator at ABC.com. The ABC.com


network consists of a single domain named ABC.com.You are running a
training exercise for junior administrators. You are currently discussing
Office365 admin roles. Which of the following roles have extended roles in
Microsoft Exchange Online?

a) The user management c) The service admin role


admin role d) The password admin
b) The billing admin role role

18.A back up types, which includes only those files that have been modified
since the last backup and clears the archive bit of the files it copies to the
backup medium.

a) Copy backup c) Incremental backup


b) Full backup d) Daily backup

19.A switch never learns a broadcasting address because?


a) A broadcast address will never be the source address of the
frame
b) Broadcast only use network layer addressing
c) A. Broadcast frames never sent to switches
d) Broadcast addresses use an incorrect format for the switch table
20.The system partition on a Windows Server must always be installed to a
Dynamic host configuration protocol_________.

a) Simple volume c) NTFS volume


b) FAT32 volume d) Dynamic disk

21.HTTP client requests by establishing a __________ connection to a


particular port on the server.

a) Broader gateway c) User datagram


protocol protocol
b) File transfer protocol d) Transmission control
protocol

22.A network administrator is connecting hosts A and B directly through their


Ethernet interfaces, as shown in the illustration. Ping attempts between the
hosts are unsuccessful. What can be done to provide connectivity between
the hosts?

a) A rollover cable should be used in place of the straight-through


cable.
b) A default gateway needs to be set on each host
c) The subnet masks should be set to 255.255.255.192.
d) The subnet masks should be set to 255.255.255.0.
23.The scheduled activities are based on a preset schedule that is established
regardless of need.
a) Interval Based c) Rehabilitation
Maintenance Maintenance
b) Reliability-centered d) Predictive
maintenance Maintenance

24.A network administrator needs to expand a network at ABC corporate


office, which is quickly growing. You are instructed to enlarge the area
covered by a single LAN segment, which one of the following is layer 1
devices that you can use?

a) Hub c) Switch
b) Network adapter card d) Router

25.Which OSI Layer performs error detection but not correction?

a) Application Layer c) Data link Layer


b) Network Layer d) Transport layer

26.19. Which of the following is a way to increase participation?


a) Ask the leader of the group to run the meeting and talk the most.
b) Point out dominating behavior to everyone.
c) Plan the meetings and share meeting agendas with people
beforehand
d) Encourage everyone to talk whenever they have something to say,
even if another person is talking
27.Your company has one main office and four branch offices. The main office
contains a standard primary DNS zone named adatum.com. Each branch
office contains a copy of the adatum.com zone. When records are added to
the adatum.com zone, you discover that it takes up to one hour before the
changes replicate to each zone in the branch offices. You need to minimize
the amount of time it takes for the records to be updated in the branch
offices. What should you do?
a) On the DNS server in the main office, configure the Notify
settings.
b) On the DNS servers in the branch offices, configure the Notify
settings.
c) On the DNS server in the main office, configure the Zone
Aging/Scavenging Properties.
d) On the DNS servers in the branch offices, configure the Zone
Aging/Scavenging Properties.
28.Every time you insert a music CD, you receive a dialog box that asks which
action you want Windows to perform. Which should you configure so that
your personal computer automatically identifies an audio CD and starts
playing music?

a) The Ease of Access c) The Personalization


settings settings
b) A desktop gadget d) The Auto play
settings

29.The scheduled activities are based on a preset schedule that is established


regardless of need. V2 repetition q3

a) Predictive Maintenance c) Rehabilitation


b) Interval Based Maintenance
Maintenance d) Reliability-centered
maintenance

30.Which of the following is valid difference between a virus and a spyware?


a) Spyware damages data, Virus steals sensitive private information
b) . Virus damages data and also steals sensitive private information
c) Virus damages data, spyware steals sensitive private information
d) Spyware damages data and also steals sensitive private information
31.Small-business owners develop and use operating procedures so that
everyday tasks are performed in a(n) __________ way.

a) Innovative c) Imprecise
b) Diverse d) Standard

32.A network administrator is verifying the configuration of a newly


installation establishing a FTP connection to a remote server, what is the
highest protocol stack that the network administrator is using for this
a) Transport
operation? c) Presentation
b) Session d) Application

33._________ is the signal sent from a TV station to your TV

a) Half-duplex c) Full duplex


b) Simplex d) Multiplex

34.Which of the following is a principle of total quality management?


a) Continuous productivity improvement
b) Continuous defect elimination
c) Continuous process improvement
d) Continuous value enhancement
35.________________ is the process that helps managers understand the
nature of the industry, the way firms behave competitively within the
industry, and how competition is generally undertaken.

a) Portfolio analysis c) Market needs analysis


b) Organizational d) Strategic market
analysis analysis

36.A protocol which deals with resolving domain names is________.

1. DHCP 3. DNS
2. POP3 4. SMTP

37.Which one of the following are benefits of VLANS?


a) They simplify switch Administration
b) They increase the number of broadcast domains while decreasing
the size of the broadcast domains
c) They increase the number of broadcast domains while increasing
the size of the broadcast domains
d) They increase the size of broadcast domains while decreasing the
number of collision domains
38.What is an important first consideration when starting to design a network?
a) . Type of applications c) Protocols to be used
b) Size of the network d) Access security

39.Which of the following protocol used port 443 and port 80 respectively?

a) HTTP and HTTPS c) .XHTML


b) DHTML d) HTTPS and HTTP

40.A new corporation needs a data network that must meet certain
requirements. The network must provide a low cost connection to sales
people dispersed over a large geographical area. Which type of WAN
infrastructure would meet the requirements?

a) Dedicated d) Satellite
b) Private infrastructure e) Maintenance
c) Public infrastructure

41.What do business employees often need to do before they are able to write
proposals?

a) . Analyze personal c) Research the problem


biases d) . Contact the customer
b) Evaluate technical
skills

42.The DoD model (also called the TCP/IP stack) has four layers. Which layer
of the DoD model is equivalent to the Network layer of the OSI model?

a) Internet c) Host-to-Host
b) Application d) Network Access

43.Which of the following is the valid host range for the subnet on which the
IP address 192.168.168.188 255.255.255.192 resides?

a) 192.168.168.129-190 c) 192.168.168.128-190
b) 192.168.168.128-192 d) 192.168.168.129-191
44.How many host addresses are available on the network 172.16.128.0 with a
subnet mask of 255.255.252.0?

a) Fast-forward c) Cut-through
b) Store-and-forward d) Fragment-free

45.Services that are required to enable another service to run are referred to as
service_____.

a) Roots c) Dependencies
b) Prerequisites d) Parent

46.A service that a computer uses to resolve NETBIOS names without any
administrative work on your network?

a) UDP c) DHCP
b) WINS d) FTP

47.Unsolicited commercial email is known as_______?

a) Malware c) Spam
b) Spyware d) Virus

48.What security violation would cause the most amount of damage to the life
of a home user?
a) Capturing of personal data that leads to identity theft
b) Replication of worms and viruses in your computer
c) Spyware that leads to spam emails
d) Denial of service to your email server
49.Which of the following are layers in the TCP/IP model?am
1. Application
2. Session
3. Transport
4. Internet
5. Data Link
6. Physical
a) 1,3 and 4 c) 1 and 2
b) 2, 3 and 5 d) 3, 4 and 5

50.What is the advantage of using SSH over Telnet?


a) SSH operates faster than Telnet.
b) SSH supports authentication for a connection request
c) SSH provides secure communications to access hosts.
d) SSH is easier to use.
51.What are the characteristics of a scalable network?
a) Grows in size with the impacting of existing users
b) Suitable for modular devices that allow for expansion
c) Offers limited number of applications
d) Easily overloaded with increased traffic
52.Which one of the following is the rule of effective communication?
a) Always translate the message in to benefits for our self than the
other party
b) Be unconsciousness for personal benefit
c) Not recognize that actions speak louder than words
d) Organize your thoughts
53.Which is an important characteristic of communication?
a) It is a 1-way process
b) Communication involves exchange of ideas, feelings,
information, thoughts, and knowledge.
c) Communication does not involve mutuality of understanding
between Sender and Receiver.
d) Communication process does not happen between more than two
parties.
54.When a manager monitors the work performance of workers in his
department to determine if the quality of their work is 'up to standard', this
manager is engaging in which function?

a) Leading c) Controlling
b) Planning d) Organizing
55.Which area of the network would a college IT staff most likely have to
redesign as a direct result of many students bringing their own tablets and
smart phones to school to access school resources?

a) Wireless LAN c) Intranet


b) Extranet d) Wired LAN

56.A network administrator wants to implement a network medium that is not


susceptible to electromagnetic interference, type of cable you would to use?

a) Fiber-optic cable c) Thicket coax


b) Cat 5 UTP cable d) Thinnet coax

57.Which term refers to a network that provides secure access to the corporate
offices by suppliers, customers and collaborators?

a) Internet c) Extranet
b) Extended net d) Intranet

58.A network administrator is upgrading a small business network to give high


priority to real-time applications traffic. What type of network services is
the network administrator trying to accommodate?

a) Instant messaging c) SNMP


b) Voice d) FTP

59.Network layer firewall has two sub-categories known as______


a) Circuit frame and packet frame
b) State full firewall and stateless firewall
c) Bit oriented firewall and byte oriented firewall
d) Frame firewall and packet firewall
60.A corporate network includes an Active Directory Domain Services (AD
DS) forest that contains two domains. All servers run Windows Server 2008
R2. All domain controllers are configured as DNS servers. A standard
primary zone for dev.contoso.com is stored on a member server. You need
to ensure that all domain controllers can resolve names from the
dev.contoso.com zone. What should you do?
a) On one domain controller, create a stub zone. Configure the stub
zone to replicate to all DNS servers in the domain.
b) On one domain controller, create a conditional forwarder.
Configure the conditional forwarder to replicate to all DNS servers in
the domain.
c) . On the member server, create a secondary zone
d) On one domain controller, create a stub zone. Configure the
stub zone to replicate to all DNS servers in the forest.
61.With respect to a network interface card, the term 10/100 refers to

a) A fiber speed c) Megabits per seconds


b) Minimum and d) protocol speed
maximum server speed

62.One of the following is a business in which two or more people have agreed
to set up and run an enterprise together with the intent of making profit.

a) Partnership c) Service enterprises


enterprises d) Trading enterprises
b) Small scale enterprises

63.Enabling additional users to handle administrative tasks for a particular


object is referred

a) Delegation c) Redirection
b) Assignment d) Targeting

64.FTP server listens for connection on port number________.

a) 22 c) 25
b) 23 d) 21

65.What type of network traffic requires QoS?

a) Wiki c) On-line purchasing


b) Video conferencing d) Email
66.During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?

a) Spyware c) Identity theft


b) Zero-day attack d) DoS attack

67.One of the following can explain mentoring


a) Sales performance development
b) Daily, weekly and monthly transactions and reports
c) Professional and personal development
d) Departmental budgets development
68.A web cookie is a small piece of data________.
a) Sent from user to all servers
b) Sent from a website and stored in user’s web browser while a
user is browsing a website
c) Sent from root server to all servers
d) Sent from user and stored in the server while a user is browsing a
website
69.UTP is commonly used in___________.

a) HTTP c) FTTP
b) SMTP d) ADSL

70.Which class of a network is used for experimental testing?

a) Class A c) Class D
b) Class B d) Class E

71.How many host addresses are available on the network 172.16.128.0 with a
subnet mask of 255.255.252.0

a) 512 c) 510
b) 1024 d) 1022

72.Protocols are?
a) Logical communication channels for transferring data
b) Physical communication channels sued for transferring data
c) Agreements on how communication components to
communicate
d) Wireless communication channels sued for transferring data
73.What flavor of Network Address Translation can be used to have one IP
address allow many users to connect to the global Internet?

a) Dynamic c) NAT
b) PAT d) Static

74.You are an enterprise administrator for IIHT. The corporate network of


IIHT consists of a single Active Directory forest called IIHT.com. The IIHT
.com forest contains six domains under it. All DNS servers in the forest run
Windows Server 2008. Which of the following actions would you choose to
ensure that all public DNS queries are channeled through a single-caching-
only DNS server?
a) Record for the hostname of the caching DNS server.
b) Configure the root hints.
c) Enable BIND secondary’s on a DNS Server.
d) Configure a Global Names host record for the hostname of the
caching DNS
75.Access point exists in_________.

a) Data link layer c) Transport layer


b) Application layer d) Network layer

76.Letters, Emails, Video Presentations and Visual Aids Conversation Public


Speaking Etc. are _______.

a) Oral Communications c) Visual


b) Written Communications
Communications d) Channel Mediums
77.The scheduled activities designed to extend equipment reliability based on
a) Routine
performing maintenance
activities prior to equipment failure c)
basedInterval
on risk based
levels and
b) Predictive
organization experience. maintenance
maintenance d) Reliability-centered
maintenance

78.To perform a System State restore in Windows Server 2008, you will boot
the DC into what mode?

a) Active Directory c) Directory Services


Maintenance Maintenance
b) Directory Services d) Active Directory
Restore Restore

79.A type of cabling used to connect a router to a computer using console


serial port ______.

a) Straight through c) Cross over


b) Roll over d) SFP

80.Your network contains an Active Directory domain named contoso.com.


The domain contains a domain controller named DC1. You have a member
server named Server1. Both DC1 and Server1 have the DNS server role
installed. On DC1, you create an active directory-integrated zone named
adatum.com. You need to ensure that Server1 receives a copy of the zone.
a) Modify the Zone Transfers settings of adatum.com,
b) Create a secondary zone on Server1.
c) Modify the zone type of adatum.com.
d) Add Server1 to the DNS Update Proxy group.
81.The bit length for IPv6 address__________.

a) 192 bits c) 128 bits


b) 32 bits d) 64 bits

82.Which one of the following is the rule of effective communication?


a) Organize your thoughts
b) Not recognize that actions speak louder than words
c) Be unconsciousness for personal benefit
d) Always translate the message in to benefits for our self than the
other part
83.Given IP address 172.16.28.252 with a subnet mask of 255.255.240.0 what
is the correct network address?g

a) 172.16.28.0 c) 172.16.0.0
b) 172.16.24.0 d) 172.16.16.0

84.most frequently used framework for obtaining continuous improvement


is______.

a) The quality circle c) The cause and effect


b) The plan-do-check-act process
cycle d) Quality function
deployment

85.The network design for a college with users at five sites is being developed.
Where in the campus network architecture would servers used by all users
be located?

a) Access-distribution c) Enterprise edge


b) Services d) Data center

86.Dawit is fetching mails from a server lying at a remote location. Which


protocol is he using to fetch the mails?

a) SMTP c) S/MIME
b) POP3 d) HTTP

87.What is the access point (AP) in a wireless LAN?


a) All the nodes in the network
b) Device that allows wireless devices to connect to a wired network
c) A wired device that connect the wired network with a node
d) Wireless devices itself
88.Which command can be used from a PC to verify the connectivity between
hosts that connect through a switch in the same LAN?

a) ARP address c) Tracert address


b) Ping address d) Traceroute address

89.What is Wired Equivalent Privacy (WEP)?


a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) security algorithm for flash drive communication
90.Network layer firewall has two sub-categories as_______.
a) State full firewall and stateless firewall
b) None of the mentioned
c) Frame firewall and packet firewall
d) Bit oriented firewall and byte oriented firewall
91.What is the reason a network administrator would segment a network with a
Layer 2 switch?
a) To eliminate virtual circuits
b) To create fewer collision domains
c) To enhance user bandwidth
d) To isolate ARP request messages from the rest of the network
92.You plan to implement a solution that meets the certificate requirements of
Customer1. You need to identify which role services must be deployed to
the hosting environment. Which two role services should you identify?
Answer presents part of the solution
a) Online Report
b) Certificate Enrollment Policy Web Service
c) Certification Authority Web Enrollment
d) Online Responder
93.Router, access switches, hub and word processing operate at ___, ___, ___
and ___ layer respectively?

a) 3. 3. 2. None c) 3. 2. 1. 7
b) 3. 3. 1. 7
94.Which of the following statement about a wireless LAN controller is true?
a) They can simplify the management and deployment of wireless
LANs
b) They must be configured through a GUI over HTTP or HTTPS
c) They are best suited to smaller wireless networks
d) They rely on external firewalls for WLAN security
95.In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) stream control transmission protocol
c) datagram congestion control protocol
d) user datagram protocol
e) customer
96.The time required to examine the packet’s header and determine where to
direct the packet is part of _________.

a) Transmission delay c) Transferring delay


b) Processing delay d) Queuing delay

97.Which statements are TRUE regarding ICMP packets?


1. They acknowledge receipt of a TCP segment.
2. They guarantee datagram delivery.
3. They can provide hosts with information about network problems.
4. They are encapsulated within IP datagram

a) 1 only c) 3 and 4
b) 2, 3 and 4 d) 2and1

98.Microsoft Windows Server 2008 uses the Windows Installer with Group
Policy to install and manage software that is packaged into what type of
file?

a) .exe c) .mse
b) .in d) .msi

99.Access point exists in_________.


a) Network layer c) Application layer
b) Data link layer d) Transport layer

100. Which device performs the function of determining the path that
messages should take through internetworks?

a) A DSL modem c) A firewall


b) router d) A web server

101. You need to configure a folder that allows everyone in your


department to view and edit the files in the folder. You also need to ensure
that users outside the department cannot access the files. What should you
do?
a) Grant read access to specific people by using the Share With menu.
b) Grant read/write access to specific people by using the Share
With menu.
c) Grant access to a single user by using the Share With menu.
d) Place the files in one of the Windows public folders
102. Refer to the exhibit bellow. As an administrator pings the default
gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is
the problem?
C:\> ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data:
Request time out.
Request time out.
Request time out.
Request time out.
Ping statistics for 10.10.10.1:
Packets sent -4, Received=0, lost-4 (100%loss)

a) Data link layer c) Session layer


b) Network layer d) Application layer

103. Network congestion occurs?


a) When there is no internet connection
b) In case of traffic overloading
c) When a system terminates
d) When a connection between two nodes terminates
104. You have a domain controller that runs Windows Server 2008 R2 and
is configured as a DNS server. You need to record all inbound DNS queries
to the server. What should you configure in the DNS Manager console?
a) Enable automatic testing for recursive queries.
b) Enable debugs logging.
c) Configure event logging to log errors and warnings.
d) Enable automatic testing for simple queries.
105. A network administrator is implementing a policy that requires strong,
complex passwords. Which data protection goal does this policy support?

a) Data redundancy c) Data integrity


b) Data confidentiality d) Data quality

106. It allows a visited website to store its own information about a user on
the user’s

a) Adware d) Malware
b) Cookies e) LAN
c) Spam

107. How many host addresses are available on the 192.168.10.128/26


network?

a) 60 c) 32
b) 64 d) 62

108. A network administrator needs to expand a network at ABC corporate


office, which is quickly growing. You are instructed to enlarge the area
covered by a single LAN segment, which one of the following is layer 1
devices that you can use?

a) Switch c) Network adapter card


b) Router d) Hub

109. Which of the following statements about a group is true?


a) The definition of groups suggests that a group is two or more
people together for any reason.
b) Groups should be formal.
c) You need five or more people to be considered a work group.
d) Formal groups are aimed at specific social agendas
110. Which type of quality management system improves quality through
small and in incremental way?

a) Total quality c) Kaizen


management d) Six Sigma
b) Just-in-time

111. What process involves placing one PDU inside of another PDU?

a) Flow control c) Encapsulation


b) Segmentation d) Encoding

112. The correct order of data encryption is?


a) Data--->Packet---> Frame--->Segment--->Bit
b) Data---.Segment---.Packet--->Frame--->Bit
c) Bit---.Segment--->Frame--->Packet--->Data
d) Bit--->Packet--->Frame--->Segment--->Data
113. If the server NO clue about where to find the address for a hostname
then?

a) Server asks to root c) Request is not


server processed
b) Server not reply for d) Server asks to its
the request adjusting server

114. The willingness to exert high levels of effort to reach organizational


goals based on the effort’s ability to satisfy some individual need is known
as__________.

a) Motivation c) Leadership
b) Effort management d) Need configuration
115. Which of the following elements is required to do after successfully
installation of DNS?
a) Dynamic IP address configuration
b) Active Directory configuration
c) WINDOWS 2000 clients configuration
d) Static IP address configuration
116. What does 'Kaizen' mean?
a) It is a system of inventory control.
b) It is the Japanese word for total quality management
c) Continuous improvement
d) A method of stock control involving colored stock cards
117. Which of the following services use TCP_________.
1. DHCP
2. SMTP
3. HTTP
4. TFTP
5. FTP

a) 1 and 2 c) 1, 3 and 4
b) 2, 3 and 5 d) 1, 2 and 4

118. Which is the network strategy used extensively by the internet?

a) Local Area network c) Client /server network


system system
b) Stand -alone network d) Peer-to-peer network
system system

119. What is the function of a router?


a) It controls the flow of data via the use of Layer 2 addresses.
b) It manages the VLAN database.
c) It connects multiple IP networks.
d) It increases the size of the broadcast domain
120. In which of the following protocols does a website (if accessed using
the protocol) encrypt the session with a Digital Certificate?
a) HTTPS c) TCPS
b) XHTTPS d) SHTTPS

121. An attempt to make a computer resource unavailable to its intended


user is called?

a) Worms attack c) Botnet process


b) Denial of service attack d) Virus attack

122. The willingness to exert high levels of effort to reach organizational


goals based on the
Effort’s ability to satisfy some individual need is ______________.

a) Leadership c) Need configuration


b) Effort management d) Motivation

123. DHCP uses UDP port number _________ for sending data to the
server

a) 67 c) 66
b) 68 d) 69

124. Users are complaining that they are unable to browse certain websites
on the Internet. An administrator can successfully ping a web server via its
IP address, but cannot browse to the domain name of the website. Which
troubleshooting tool would be most useful in determining where the
problem is?

a) Netstat c) Ipconfig
b) Nslookup d) Tracert

125. In which layer of the hierarchical enterprise LAN design model would
PoE (Power over Ethernet) for VoIP phones be considered?

a) Core c) Access
b) Distribution d) Physical
126. Which one of the following is the quality of employee’s work ethics?

a) Aggressiveness c) Analytical skills


b) unconsciousness d) Maliciousness

127. You need to use disk quotas to send an e-mail to users when they have
consumed 800Mb of disk space and prevent users from consuming more
than 1 GB of disk space. How will configure it?
a) Create a hard quota with a 1GB limit. Create a warning at 80
percent
b) Create a soft quota with a 800MB limit and a second quota with a
1GB limit.
c) Create a soft quota with a 800MB limit. Create a warning at 80
percent
d) Create a hard quota with a 800mb limit and a second soft quota with
a limit 1GB
128. A leadership style in which the leader includes one or more
employees in the decision making process is?

a) Participative or
democratic
b) Authoritarian or
autocratic
c) Federalist
d) Delegate or free reign
1. . What does a yellow exclamation point next to a device in the Device Manager indicate?
A. A driver is not properly installed for this device.
B. The device is disabled.
C. The driver is not digitally signed.
D. The device driver needs to be upgraded.
2. You are planning to share a folder on the network. However, you would like to give
some users full access while limiting others to read-only access. Which of the following
can you do in Windows XP to accomplish this goal?
A. Map a network drive to each user who should have full access.
B. Select each username from the list of users, and apply full or read-only access
to each one.
C. Use the Depends on Password option.
D. You cannot apply more than one access type to a single shared folder.
3. Which of the following could be the cause of a “No operating system found” error?
A. A registry file is missing.
B. The boot loader file cannot be accessed.
C. The kernel file is corrupted.
D. the BOOT.INI file could not be found.
4. You are using an application and it hangs/stuck. Which of the following should you do
first?
A. Exit the application using the close button
B. Restart the computer.
C. Click the Details button.
D. Use task manager to close the application
5. You suspected that your computer had a virus, so you ran an antivirus utility. However,
the utility reported that no viruses were found. What should you do next?
A. Reinstall the affected application(s).
B. Delete the affected file(s).
C. Download an update for your antivirus utility.
D. Assume that there is no virus.
6. A network consists of five computers attached to a hub/switch. There is a break in one
computer’s network cable. How will this break affect the network?
A. The entire network will fail.
B. Only the computer attached to the faulty cable will be unable to access the
network.
C. Only computers that were booted before the computer with the faulty cable
will be able to Access the network.
D. Only computers that were booted after the computer with the faulty cable
will be able to access the network.
7. Which of the following points of failure will affect the connectivity of an entire star
network?
A. A single computer
B. A single cable
C. The backbone
D. The hub/switch
8. The process of rewriting parts of a file to contiguous sectors on a hard disk to increase
the speed of access and retrieval
A. Disk defragmentation
B. Disk formatting
C. Installing operating system
D. None
9. Which of the following can you use to replace an existing device driver in Windows?
A. the Install/Uninstall tab of the Add/Remove Programs utility
B. the Windows components tab of the Add/Remove Programs utility
C. The Device Manager
D. The Hardware Configuration Manager
10. When configuring a computer for network access, the computer name must:
A. Be unique
B. Match the names of the other computers on the network
C. Match the computer’s IP address
D. Be entered only if you are using the NetBEUI protocol
11. Which bus slot provides the highest video performance?
A. PCI
B. SCSI
C. AGP
D. ISA
12. Where is a hub specified in the OSI model?
A. Session layer
B. Physical layer
C. Data Link layer
D. Application layer
13. From what location are the 1st computer instructions available on boot up?
A. ROM BIOS
B. CPU
C. boot.ini
D. CONFIG.SYS
E. None of the above
14. With respect to a network interface card, the term 10/100 refers to
A. protocol speed
B. a fiber speed
C. megabits per seconds
D. minimum and maximum server speed
15. Which Motherboard form factor uses one 20 pin connector?
A. ATX
B. AT
C. BABY AT
D. All of the above
16. Most PCs give a single beep on boot up to indicate they are ok hardware wise. You boot
your PC and don't get a beep. What should you check first?
A. system board
B. RAM
C. c. Microprocessor
D. power supply
E. speaker
17. Which tool should always be used when working on the inside of the computer?
A. Cordless drill
B. Antistatic strap
C. Multimeter
D. Screwdriver
18. Which of the following form factors does a VGA connector comply with?
A. 8P8C
B. 15-pin D shell
C. micro ATX
D. RG-6
19. Which of the following is the most common type of cable used in bus networks?
A. CAT5
B. STP
C. Coaxial
D. Fiber-optic

20. What is the function of the NTLDR file?


A. To initialize and organize the Windows os boot process
B. To allow users to select the OS in a multi boot configuration
C. To boot Windows OS from a SCSI drive
D. None
21. DOS stands for?
A. Dual Operating system
B. Disk Operating system
C. Dual Organized System
D. Disk Organized System
22. A host computer has been correctly configured with static IP address, but the default
gateway is incorrectly assigned. Which layer of the OSI model will be first affected by
this configuration error?
A. Physical layer C. Network layer
B. Application layer D. Data link layer
23. Among the following one is the first step that you should do, when troubleshooting
network problem?
A. Analyze the results
B. Identify all potential problems
C. Systematically eliminate each potential problem
D. Define the specific symptoms
24. Which of the following command used to query internet domain name server?
A. Ping B. Nslook C. Tracer D. Ip
up t config
25. Which one of the following is the correct syntax to ping the reachable of network?
A. Ping \192.168.1.1 C. Ping 192.168.1.1
B. Ping: 192.168.1.1 D. 192.168.1.1 ping
26. Provide application and server resources, such as printers and storage, to multiple
users as if those applications and resources were installed on their own computers.
A. Terminal server C. Mail server
B. DHCP server D. Application server
27. Interpersonal Communication occurs only
A. An Individual converses with people they have no interest in knowing
B. An individual Interacts with another person as a unique individual
C. Three or more people communicating with each other at the same time
D. Intimate conversation takes place
28. Monitoring Evaluating and disseminating of information from the external and internal
Environment to keep people within the corporation is
A. Strategy formulation C. Evaluation and control
B. Environmental Scanning D. Strategy Implementation
29. A message is sent to a receiver in words or another symbol this communication process
is
A. Thought C. Encoding
B. Decoding D. Idea
30. A user call, to report that cannot access network resource. you investigate and discover
that the IP address of the user’s computer is 169.254.0.6.You also discover that other
clients on the same subject are experiencing the same problem. You must provide
network connectivity for the user, what should you do?
A. Enabling Automatic Privacy IP Addressing
B. Disable automatic Private IP Addressing
C. Ensure the computer is enabled as a DHCP client
D. Ensure a DHCP Server or DHCP relay agent resides on the local subnet
31. The technique that is used to Identify both strength to build on and the deficiencies to
overcomes
A. Observation C. Interview
B. Analysis D. Questionnaire
32. The best method of restore that latest copy of the registry in a windows 2003 server is
to select
A. Emergency repair desk (ERD) C. Recovery console
B. Last known good configuration D. Ctrl+ alt+ delete keys
33. Involve the authorization of access to data in a network which is controlled by the
network administrator and the organization policies.
A. Group policy C. Domain local groups
B. Security group D. Network security
34. When data is encapsulated which is the correct order?
A. Data frame packet segment bit
B. Segment Data packet frame bit
C. Packet Data segment frame bit
D. Data segment packet frame bit
35. Among the following one is odd from the order?
A. Indexes C. Research reports
B. Patents D. Standards
36. While reviewing the security logs for your server. You notice that a user internet has
attempted to access your internal mail server. Although it appear the user’s attempts
were unsuccessful. You are still very concerned possibility that your system may be
compromised. Which of the solutions are you most likely to implement?
A. A firewall system at the connection point to the internal
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
37. You are hired to investigate a slow performing network server for a client. Using the
performance monitor you obtain the following reading: cpu usage =25%, Desk time=
25% page faults= 25. What one change will increase the performance of this network
server the most?
A. Buy another CPU C. add another hard drive
B. increase RAM D. decrease RAM
38. XY Company has a large network with 100 user notices that at specific times in the
morning and afternoon network jamming ties up their computers. What is the most
likely cause?
A. A terminator is not grounded
B. Power fluctuations
C. Many users are logging on or off
D. The switch connection the network goes down
39. Using the TCP/IP protocol if the destination of the packet is outside the subnet then the
packet is sent to the____?
A. switch C. Default gateway
B. Bridge D. Hub
40. The advantage of a client/server network over a peer to peer network is
A. performance is better on a peer to peer
B. Easier to backup file than a peer to peer network
C. Easy to configure the client /server
D. security is better on a peer to peer
41. You want to install the new window XP operating system on your computer that you
need the drive have two partition. On which step the partitions create?
A. Create the partition after the windows installed
B. Create the partition after the one partitions has been finished
C. Create the partition during the starting installation
D. Create the partition after the installation was completed
42. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server
connected to the switch running 10Mbps half-duplex as well. How much bandwidth
does each host to the server?
A. 100 Kbps
B. 10 Mbps
C. 1 Mbps
D. 2 Mbps

43. One of the following is an example of network


A. A computer attached to printer and scanner to input and output in formation.
B. Computer system sharing a common communication medium for the purpose of
sharing information or device.
C. Several printers connected to switch box to single terminal.
D. Several dieseling holding information for one workstation.
44. You have successful implemented a network about 20 computer the network is
connected to the internet and all user have been guaranteed equal access you are
designated as the network administrator dud to staff shortage you also have to do some
jobs that are supposed to done by an ordinary user as non-administrative account for
yourself
A. Create a new user as non-administrative account for yourself.
B. Use another user account.
C. Copy the administrator account and rename it.
D. Do nothing keep using the administrator account.
45. You have made same changes to likes and directory permission on one of the servers on
changes your network you want to verity the new setting be for informing the users of
the changes how can you verity that change have taken effect and that no security
problem for them.
A. Ask a tweeted user to perform the tests for you.
B. Use your own administrator account to perform the test.
C. Create attest account for the purpose.
D. Do nothing changes made with administrator pirates are always correct.
46. You are designing a network which needs to support 200 users you do not pain to
extend the segment beyond the current number of user which subnet mask would best
meet your needs.
A. 255.255.0.0 C. 255.0.0.0
B. 255.255.255.0 D. 55.255.255.200
47. The most secure and strong password from the following list is
A. pass word 1 C. pass word 1
B. pass-word #1 D. pass-word 1
48. You are the administrator for your company domain you need to subdivide group in
your organization with in active directory if you want to separate sales from marketing
department what could you use us a system of organization the subdivision.
A. Creating organization units
B. Use user and group
C. Create site and subnet group
D. Build a container in a subnet group
49. A system administrator wants to remove a domain controller from adman which of the
following is the classiest way to perform the task.
A. Reinstall server over existing installation and make the Machine a member of group
B. Use remove comment
C. Use active directory word to dominate the domain controller
D. Reinstall server over existing installation and make a machine a number of domain.
50. The best method to restore the latest copy of the registry in a win 2003 server is to
select the.
A. Emergency retour disk (ERD) C. Last known good configuration
B. Recovery console
D. Ctrl+Alt+Del keys
51. The most efficient way to control sexuality in a client /server network is to assign
permissions to
A. Each shouted resource C. Directories

B. Groups D. User
52. The advantage of a client /server network over a peer to peer network is
A. Performances is better on peer to peer
B. Security is patter on client/server
C. Easy to configuration the client/ server
D. Security is better on peer to peer
53. A remote user calls your help desk and complains that she is unable to access internal
corporate network resource from the remote site. The user states that she can access
the local resource. To solve this problem what is your primary advice
A. Cheek whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her computer setting
D. Check TCP/IP status of her computer
54. A server room is thickly populated with about 120 server installed on racks venous
network and power cable make it very difficult to work on the server when a technician
has work on the server usually it takes him or her along time to trace the cable on
several accessions some cables have been accidently pulled in the process which of the
following should you do avoid further problem.
A. Replace older cables with longer cable.
B. Put identification labels on all cables.
C. Remove redundant network and power cables.
D. Router all network and power cables.
55. You are the LAN administrator for your company you have couple windows XP
professional client that dial in via PPP to the company network RAS server you won’t
the remote client to be assigned dynamic IP address upon connecting you find that the
window XP computers didn’t get any IP address what should you do;
A. Run ipconfig with the/release and/ renew switch on the client.
B. Run ipconfig with the/menu all switch on the client.
C. Run winipctg on the client.
D. Run ipconfig full. You are hired to.
56. Investigate a show per terming network server for a client using the performance
monitor you obtain the following ridings CPU usage 25% Disk time =2% page faults =25
what one changes will increase the performance of the network server is most;
A. By another CPU. C. Increase RAM.
B. Add another hard drive. D. Add second NIC.
57. A large network with 500 users notices that at specific times in the morning and
afternoon network congestion times up their computers what is the most likely coleus.
A. Many users are logging on or off
B. Power functions.
C. Terminator is not grounded
D. The switch connecting the network goes down
58. Is responsible for addressing messages and translating addresses and name into
physical addresses
A. Layer 1 C. C. layer 3
B. B. layer 2 D. D. layer 4
59. Uses several protocols for routing and delivering packets
A. Internet layer C. Data link layer
B. Physical layer D. Application layer
60. Has the standard protocol used for interoperability among many different types of
computers.
A. HTTP C. TCP/TP
B. SMTP D. UDP
61. Add traffic flow information to determine when the packet get sent
A. Transport layer C. Data link layer
B. Network layer D. Session layer
62. Add error handling information
A. Internet layer C. Data link layer
B. Physical layer D. Application layer
63. Simplex transmission
A. TV C. Telephone communication
B. Computer network D. Skype
64. Which of the following is not true
A. In full duplex two device can communicate at the same time
B. In half duplex communication is takes place only in one direction
C. Telephone conversation is a full duplex communication
D. Radio uses a simplex communication
65. Which of the following is true
A. Computer network uses circuit switching
B. Telephone communication uses circuit switching
C. In packet switching, every packet follows the same route
D. All are true
66. Data formatting is takes place in layer of the OSI reference
A. Model D. Session layer
B. Physical Layer E. Application layer
C. Presentation layer
67. Internet explorer is found in layer of the OSI
A. Physical layer C. Application layer

B. Data link layer D. Presentation layer


68. Makes to application to open, use and close a connection
A. Application layer C. Session layer
B. Network layer D. Physical layer
69. The layer which is responsible for addressing computers
A. Presentation layer C. Transport layer
B. Session layer D. Network layer
70. The set of rule and procedures which govern communication between computers
A. OSI C. Protocol
B. Topology D. IP
71. The protocol which enables computer to send and receive e mail
A. FTP C. SMTP
B. SNMP D. HTTP
72. Which of the following is connectionless oriented protocol
A. TCP C. SMTP
B. UDP D. All
73. Which of the following connectivity device is mandatory in network
A. Repeater C. NIC
B. Switch D. Router
74. Which of the following is not the purpose of NIC
A. Receive data and convert to appropriate format that can be transfer in a cable.
B. Determine and accept data sent to a computer
C. It filters layer 3 packet
D. All are true
75. One of the following doesn’t work in layer 2 of the OSI reference model
A. NIC C. Switch
B. Repeater D. Hub
76. One of the following is not true
A. Active hub works in data link layer of the OSI Ref model
B. Passive hub transmit signal without regenerating
C. Hub can have different ports to different cables
D. Hubs can be used in star topology
77. Which of the following is not true
A. Switches are multiport bridge
B. Switches work in layer 2 of the OSI reference model
C. Switches do not regenerate signal
D. Switches uses routing table transmit signal
78. Which of the following work on network layer of the OSI reference mode
A. Switch C. Router
B. Hub D. Bridge
79. Which of the following is true
A. MAC address of a computer can be changed
B. IP address is used in TCP/IP
C. Every computer should have a MAC Address to communicate
D. Once we assign an IP address to a computer it is very difficult to change
80. Which of the following is a class B IP address
A. 192.168.1.1 C. 130.1.12.1
B. 113.10.10.1 D. 234.253.21.3
81. Which of the following is a correct private class C IP Address
A. 192.160.7.8 C. 192.10.1.1
B. 10.10.1.2 D. 192.168.100.200
82. The default subnet mask of class 100.10.2.1 IP
A. 255.0.0.0 C. 255.255.255.0
B. 255.255.0.0 D. 255.255.255.255
83. What are some of the advantages of using a router to segment the network?(choose
two)
A. Filtering can occur based on layer 3 information
B. Broadcasts are eliminated
C. Routers generally cost less than switches
D. Broadcasts are not forwarded across the router
E. Adding a router to the network decreases latency
84. From the following which one is loop back address
A. 127.1.1.0 C. 127.0.1.1
B. 127.0.0.1 D. None
85. On a network where is system acting as fire weld typically located
A. Between the client/ system and the server
B. Between two internal network
C. Between the internal access point and in the internet
D. Between the internal network internal access point
86. You have just resoled a very complex network problem. During the process you made
some configuration changes to a router and two of the window 2000 servers. The
changes were success full and your manager is now very happy with your performance.
What should be your next step;
A. Ask your manager for a raise
B. Ask your manager a annual permission
C. Ask your manager to
87. You have been asked to install a network that will provide the network users with the
greatest amount of fault tolerance. The preferred network topology.
A. Star
B. Ring
C. Mesh
D. Bus

88. Firewall function

A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

89. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.

A. Client Security policy


B. Group Security policy
C. Computer System Policy
D. Domain Controller security policy

90. The reason that end users need to be aware of the security policy.

A. Some security decisions are usually in their hands

B. They should understand the probability of every risk

C. They need to be aware of every threat

D. They should avoid responsibility for their actions

91. You are requested to setup a 100Mbps network for a client in an office that already has
10Mbps throughput. Your client wants to keep the costs to a minimum but he needs the
100Mbps throughput. The cabling solution you recommend.

A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable

92. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.

A. DSL Modem, Ethernet cable, Wireless Signal, Wireless Router/Access Point.


B. Wireless Router/Access Point, Ethernet cable, Wireless Signal, DSL Modem
C. Wireless Router/Access Point, Wireless Signal, Ethernet cable, DSL Modem
D. DSL Modem, Wireless Signal, Ethernet cable, Wireless Router/Access Point.

93. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
94. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.

A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down

95. An application that used to remotely and securely access the remote server.
A. Telnet
B. SSH
C. SFTP
D. RSA

96. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization

97. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.

98. While gathering data to determine the organization business requirement you might
take records of the organization like organizational policies and procedures. These
kinds of information resources are considered as

A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources

99. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?

A. Rename Mashos’s account to Desta. Reset the password.


B. Copy Masho’s account and create a new account for Desta. Disable Masho’s
account.
C. Create a new account for Desta. Recreate the group membership of Masho’s
account to Desta’s account.
D. Copy Masho’s account and create a new account for Desta. Delete Masho’s
account.

100. A user can login to his computer but cannot access network resources. The user has
all the appropriate group memberships and permissions, but he still cannot access
shared resources. The cause of this problem

A. User has attempted to access a shared folder without appropriate


permissions.
B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.

101. You enable disk quotas on a Windows Server 2008 file server. You configure a quota
limit of 100MB. A user, named Eyob, reports that he can still save large files to the
server, even though he is well above his quota limit. What should you do to correct the
problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the
Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.

102. A hierarchical structure made up of multiple domains that trust each other.
A. Root
B. Site
C. Organizational Unit
D. Tree
103. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?

A. Run the Start /normal csrss.exe command before starting Excel.


B. Run the Start /normal Excel.exe command to start Excel.
C. Use Task Manager to set the Explorer.exe process to high priority.
D. Use Task Manager to set the Excel.exe process to low priority.
104. When you tried to login to the server, your trial may failed, this failure event is
recorded in
A. System log
B. Security log
C. Application log
D. Event log

105. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure
programs at startup.

A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32

106. You have a server that runs Windows Server 2008. You need to identify all the
unsigned drivers that are installed on the server. What should you do?

A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.

107. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?

A. Reset her computer account through the Active Directory Users and
Computers utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-
line utility.
108. A company with 40 computers needs to reduce repair costs, decrease downtime, and
reliability. Which task will meet these needs?
A. Enact a compressive security policy
B. Upgrade all the operating system
C. Create an automated system recovery CD
D. Develop a preventive maintenance plan
109. You have a TCP/IP network comprising nearly 30 computers. Currently, all
computers have been assigned IP addresses manually. The company is growing fast , and
a new consignment of 15 computers is arriving next week .You have decided to install
Dynamic Host Configuration Protocol ( DHCP) services on one of the servers .identify
which of the following are the advantages of using the DHCP server in the network.
A. Assignment of IP addresses will be automated.
B. The name resolution process will be automated.
C. Network traffic problems can be resolved.
D. The network can be monitored more efficiently.
110. A user installs a new sound driver in a computer that is working properly. After
installing the driver for the new sound card the computer fails to boot. Which quick fix
can the user implement to return to the previous working state?
A. Boot to start windows normally.
B. Boot to recovery console
C. Boot to last known good configuration
D. Boot to emergency recovery state
111. Which of the following are good practices in resolving complex network problems?
A. Work on the problem single-handedly because others might add to the problem.
B. Gather as much information as you think would be helpful in resolving the
problem.
C. If you cannot fix a problem, ask for help from hardware vendors who might have
faced the same problem in the past.
D. Try to read the hardware specification documentation so that you can get how to
solve the problem.
112. From the following options, identify the most critical problem that should be given
highest priority if one of the user in you network has complained that he/she cannot
access a given file server but they can access other files.
A. Check the network interface card’s functionality
B. Check the network response time.
C. Check whether the file is corrupted by malicious codes.
D. Check if the file server is reachable by your workstation
113. A system administrator is trying to determine which file system to use for server that
will become an active directory domain controller. Here the company’s requirements
include the following
 The file system must allow for file security
 The file system must make efficient use of space on larger partitions
 The file system must allow auditing of logs and access to sensitive file
Which of the following file systems meets those requirements?
A. FAT
B. NTFS
C. FAT32
D. HPFS
114. One of the servers in your NOC crashed twice in one day. You have been assigned as
an administrator and event delegated one junior network practitioner to find out the
cause of the failure. Which of the following should be your advice for this practitioner to
perform for the first time?
A. Tell him to install the latest service pack.
B. Tell to Upgrade the NOS.
C. Tell to check the event logs.
D. Tell to wait for the next time the server crashes.
115. A customer orders a new computer and specify an internal read write , nonvolatile
storage device that uses low power ,has fast access to data , and is reliable. What is a
suitable storage device that meets these requirements?
A. DVD+/-RW drive
B. SATA hard drive
C. Solid state drive
D. USB flash drive
116. One of the following is not the basic necessities reason that writing policies and
procedures.
A. Operational need
B. Continuous improvement
C. Risk management
D. Maintain good name of the organization
117. One of the following policies is not included in information security policy
documents,
A. Copy right policy
B. Firewall policy
C. Data classification policy
D. Application Certification management policy
118. Which of the following is features of the Microsoft management console (MMC)
A. It displays computer performance information
B. It organizes operating system snap-ins
C. It requires administrative privilege to accesses
D. It enables virtual memories settings to be customized
119. Display data on hardware components such as Memory, CPU, and the hard drive in a
chart or graph which describes how these devices are operating.
A. Network Monitor
B. Task Manager
C. Performance Monitor
D. Protocol Analyzer
120. You are installing cables for an Ethernet network in an office. The office manager
doesn’t want the media hanging in the crawl spaces and drop ceiling and wants you to
share an existing conduit that already has telephone cables to hide the network cables
you are installing. The cable segments will not be over 100 m. which type of media
should you choose?
A. Coaxial
B. STP
C. UTP
D. Fiber optic
121. Your customer has a client/server Ethernet network consisting of a server and 255
computers running Windows XP. what kind of security would you recommend to him for
centralized control of access to files and directories on the network?
A. Setup a password for each file and groups for each directory
B. Setup a password for each file and directory shared
C. Setup groups of shared resources and users who have access to these groups
D. Setup a password for each user
122. You are hired to setup a 100Mbps Ethernet network for a client in an office that
already has cat 3 UTP installed. Your client wants to keep the costs to a minimum but
needs the 100Mbps throughput. What should you recommend?
A. Keep the existing cable but purchase 100Mbps hubs
B. Buy new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps NICs
C. Keep the existing infrastructure
D. Keep the existing cable but use 100Mbps patch cable from the wall outlet
123. A network administrator connects hosts A & B directly though the network
interface cards, however pinging between the hosts are unsuccessful. To provide
connectivity between hosts
A. A cross over cable should be used
B. A rollover cable should be used
C. Straight through cable should be used
D. Default gateway needs to be set on each host.
124. There are three types of Hubs. Which of the following options correctly describes
these types hub?
A. Passive ,dormant, special
B. Active ,dormant, passive
C. Passive ,active ,intelligent
D. Passive ,Active ,Turbo
125. As user attempt to boot the computer, the message “NTLDR is missing “is observed
on the screen. What will result from this situation?
A. The BIOS setup utility will start automatically
B. The computer will reboot continuously
C. The operating system will fail to load.
D. The initial self-test will fail to load.
126. A security policy defines
A. When users cannot log in to their computers
B. What users can and cannot do withier computer
C. How the user should install their down software
D. How complex user password should be
127. The IT manager asks you for a diagram showing every server on the network the
diagram that you should provide to his/her
A. Baseline network diagram
B. Logical network diagram
C. Physical network diagram
D. Wiring network diagram
128.Yonatan has been asked to find and implement an application that will enable his boss
to log in to and control a server remotely and securely. The application that would
work best
A. E- mail
B. FTP
C. SSH
D. Telnet
129.A place where you could find list of problem that occurred on a system
A. Event viewer
B. Network diagram
C. RAID
D. Wiring schematic
130.You want all network clients to download and install updates automatically during
night hours, however, you discover that some users are turning off their machine s at
night and updates are not being applied. The group policy that enables you to correct
this situation without changing the installation schedule?
A. Configure automatic updates
B. No auto-restart for updates scheduled installations
C. Reschedule automatic updates scheduled installations
D. Specified intranet Microsoft update service location
131. You are creating a number of user objects for a team of your organization temporary
workers. They will daily 9 a.m. to 5p.m. on contract that is scheduled to begin in one
month and end two months latter. They will bot work outside of that schedule. The
properties that you should bot configure initially to ensure maximum security for the
objects
A. Password never expires
B. Password
C. Logon hours account expires
132. When you open the properties dialog box for a computer objects in the active
directory users and computers console, you discover that no properties are displayed
in the operating system tab. The causes that make these properties to be absent
A. Password expired
B. Operating system has problems
C. Console is not opened properly
D. Computer has not joined domain
133. The minimum NTFS permissions required to allow users to open documents and run
program stored in a shared folder
A. Full control
B. List folder contents
C. Read & execute
D. Write
134. Assume that you are giving service add you want to measure its quality. The best way
to go about it.
A. Assess the time it takes to deliver the service
B. Implement periodic self-assessment to be completed by staff only
C. To give survey at the end of each interaction with customers to measure their
satisfaction
D. Wait until you receive a complaint from customers
135. Assume you ware working a project on IT training need assessment. The best way of
collecting detailing information?
A. Questioner
B. Interview
C. Observation
D. Research
136. Which one of the following is TPv6
A. 1:: B. 127.0.0.1 C. 1: D. ::1

137. The device used to prevent ESD between you & a computer component

a. Anti static pad


b. Anti static pouches
c. Anti static wristband
d. Anti static mat
138. The physical arrangements or lay-out of computer, cable and other components

a. Protocol
b. Peer to Peer
c. Topology
d. Client-Server
139. You want to connect two computers to a network. The two computers are found
130 meter and 300 meter away from the active devices (switch). Which type of cables
would you think to be more cost wise for your design?

a. UTP
b. Multimode
c. Single mode
d. coaxial
140. The best UTP cable to minimize or avoid crosstalk and signal attenuation

a) Cat-6
b) Cat-7
c) Cat-5E
d) Cat-5
141. From the following connective devices, one is not used to expand a ‘LAN’

a) Router
b) Hub
c) Switch
d) Repeater
142. Optical fiber cables transmit data in the form of light. One of the following devices is
used to convert data from the electric signal to light and convert light back to electric
signal at the destination computer

a. Modem
b. Multiplexer
c. Electromagnetic Induction
d. Codec
143. The best reason that ‘UTP’ cables are selected in most LAN:

a. resistance to physical stress


b. Used for a distance of 2km or more than.
c. dependent of EMI (electromagnetic interference)
d. Activate signal attenuation over distance
144. The operating system uses a startup & after start up to provide software control of
hardware device

a. Unix
b. BIOS
c. Linux
d. Firmware
145. A Circuit board inserted in to a slot on the system board to enhance the capability of
the computer is:-

a. Data card
b. IDE card
c. Expansion card
d. Driver card
146. A Set of rules and standards which enable two end devices to communicate

a. Program
b. Protocol
c. DNS
d. Browser
147. A computer that connects different networks in order to help for communication
among themselves

a. Router
b. Server
c. Mobile
d. Ethernet switch
148. From the four layers of the DoD model (also called the TCP/IP stack), one of the
options below is equivalent to the Network layer of the OSI model

a. Application
b. Host-to-Host
c. Internet
d. Network Access
149. To test the IP stack on your local host, choose the right IP address to ping

a. 127.0.0.0
b. 127.0.0.1
c. 255.0.0.127
d. 255.255.255.255
150. When computer is on, the POST program checks the computer working file the next
steps

a) The operating system program will be executed to load BIOS.


b) The BIOS program will be executed to load the operating system
c) The operating system program executed from the master boot to load boot strap
d) The boot strap will executed to load the operating system from the master boot
record
151. One of the computer hardware components listed below is not getting power
supply from the motherboard

a. Hard Disk
b. RAM
c. CPU
d. Expansion Card
152. The Router, Repeater and internet explorer operate at

a. Transport layer, network layer, physical layer


b. Physical layer, data link layer, application layer
c. Session layer, application layer , presentation layer
d. Network layer, physical layer, not include all layers
153. A system administrator is trying to determine which file system to use for server
that will become an active directory domain controller. Here the company’s
requirements include the following
 The file system must allow for file security
 The file system must make efficient use of space on larger partitions
 The file system must allow auditing of logs and access to sensitive file
Which of the following file systems meets those requirements?

E. FAT
F. NTFS
G. FAT32
H. HPFS
154. To provide a computer with a physical and electronic connection to a network ,what
must be installed?
A. A Hub B. A Repeater C. A NIC D. A Bridge
155. Your company has a LAN in its down office and has now set up a LAN in
manufacturing plant in the order . To enable everyone to share data and resource .b/n
the two LANs, What type of device (s0are needed to connect them ? choose the most
correct answer .
A. Modem B. cable C. hub D. Router
156. how many possible hosts are attached to each of the local area networks at yours

A. 128 B. 254 C. 256 D.64

157. of the following network device layer 3 d( network layer)device?

A. Repeater B. Bridge C. Router D. hub


158. of the following statements is not true about DHCP?

A. It reduce burned of network administrator B. It avoids TCP/IP conflict

C. It increases security D. It handle boot client requests

159. the following is/are characteristics of server- based networks?

A. No need of dedicated server b. less secured C. highly secured D. support few


users

160. One Of the following network device is layer 2 (Data link layer) device

A. repeater B. Bridge C. Router D. Hub

161. Which of the following network device is blocks unauthorized users to access
private data access private data?

A. Router B. Bridge C. Switch D. Fire wall

162. the following is a valid subnet mask for class c network?

A. 255.255.255.0 B. 255.255.0.0 C. 255.0.0.0 D. 255.255.255.255

163. on which OSI layer does IP operates

A .physical layer B. data Link layer C. Network layer D. presentation layer

164. when you tried to login to the server, you trail may failed, this failure event is
recorded

A. System log B. security log C. application log D. event Log

165. of the following protocol is a routing protocol ?

A. TCP B. OSPF C. ICMP D. FTP

166. Which of the following TCP/IP protocol allows an application program on one
machine To send a data gram to an application program on another machine?

A. UDP B. SNMP C. FTP D. SMTP

166. what part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

A.192 B. 192.168.10 C. 0.0.0.5 D. 51

167. what can greatly reduce TCP/IP configuration problem ?


A. WINS server B. WINS Proxy C. DHCP server D. DNS server

168. How many bits internet address is assigned to each host on a TCP/IP internet which
is used in all communication with the host?

A. 16- bits B. 32-Bits C. 8-bits D. 2-bits

169. with an IP address of 100, you currently have 80 subnets. What subnet musk should
you use to maximize the number of available hosts?

A. 192 B. 224 C. 252 D. 248

170. here is a hub specified or found in the OSI model?

A. Session layer B. Physical layer C.. Data Link layer D. Application layer

171. The term “Duplex “ refers to the ability of the data receiving stations to echo back a
confirming message to the sender. In full duplex data transmission, both the sender
and the receiver

A. Cannot talk at one B. can receive and send data one at a time

C. can send or receive data one at a time D. can do one way data
transmission only

172. If a network users can’t access the network resources from the server, the most
probable cause of the problem is:

A. NIC failure B. workstation failure C. switch failure D. DLS is unavailable

173. . suppose you are the network administrator for ABC.COM A windows server 2003
computer is configured as print server for print device that has a built in network
interface card .users of the print device report that they cannot print to it . You confirm
that the correct ip address and drivers are being used . You Suspect that there is a
problem with the MAC to Ip address resolution on the print server. You want to find
out w/c MAC address the print jobs are being sent to. w/c command should you run on
the print server?

A. net session B. netstant.exe C. netsh.exe D. netcape.exe


174. To provide a computer with a physical and electronic connection to a network, what
must be installed?
E. A hub
F. A router
G. A NIC
H. A Bridge
175. One of the following is an example of a network?
A. A computer attached to a printer and a scanner to input and output information
B. Computer systems sharing a common communication medium for the purpose
of sharing information or devices
C. Several printers connected to a switch box going to a single terminal
D. Several diskettes holding information for one workstation
176. You have successfully implemented a network of about 20 computers. The network
is connected to the Internet, and all users have been granted equal access. You are
designated as the network administrator. Due to a staff shortage, you also have to do
some jobs that are supposed to be done by an ordinary user. Which account should you
use for this purpose?
A. Create a new user as non administrative account for yourself.
B. Use another user's account.
C. Copy the Administrator account and rename it.
D. Do nothing. Keep using the Administrator account.
177. You have made some changes to file and directory permissions on one of the servers
on your network. You want to verify the new settings before informing the users of the
changes. How can you verify that the changes have taken affect and that no security
problems arise from them?
A. Ask a trusted user to perform the tests for you.
B. Use your own Administrator account to perform the tests.
C. Create a test account for the purpose.
D. Do nothing. Changes made with administrative privileges are always correct.
178. A server room is thickly populated, with about 120 servers installed on racks.
Various network and power cables make it very difficult to work on the servers. When a
technician has to work on the servers, usually it takes him or her a long time to trace
the cables. On several occasions, some cables have been accidentally pulled in the
process. Which of the following should you do to avoid further problems?
A. Replace older cables with longer cables.
B. Put identification labels on all cables.
C. Remove redundant network and power cables.
D. Reroute all network and power cables.

179. You are the LAN administrator for your company. You have couple Windows XP
Professional clients that dial in via PPP to the company network’s RAS server. You want
the remote clients to be assigned dynamic IP addresses. Upon connecting, you find that
the Windows XP computers didn’t get any IP address. What should you do?
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
180. You are setting up a new Windows XP workstation on your network and your DHCP
server provides all of the normal TCP/IP configuration information. What must you do
to configure the IP address on the workstation after you add the TCP/IP protocol
A. Manually enter an IP address that is not in use on the network..
B. Find out what the subnet mask on your network is, and add this information
only.
C. The DHCP option is enabled automatically, and the server will auto-configure
everything
D. Put the address of the router in the default gateway, and put all 0s in the IP
field.
181. A Windows XP user complains that she cannot connect to any other computers on
her local subnet even when using the IP address to communicate. However, she can
ping 127.0.0.1 and her IP address and receive replies. Other users on her subnet do not
report having any trouble. What is the most probable cause of the problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured
correctly.
C. The NIC has a problem.
D. The computer is not configured to use DHCP
182. While reviewing the security logs for your server, you notice that a user on the
Internet has attempted to access your internal mail server. Although it appears that the
user's attempts were unsuccessful, you are still very concerned about the possibility
that your systems may be compromised. Which of the following solutions are you most
likely to implement?
A. A more secure password policy
B. File-level encryption
C. Kerberos authentication
D. A firewall system at the connection point to the Internet
183. You are hired to investigate a slow performing network server for a client. Using the
performance monitor you obtain the following readings: CPU usage= 25%, Disk time=
25%, Page faults/sec= 25.What one change will increase the performance of this
network server is the most?
A. buy another CPU
B. add another hard drive
C. increase RAM
D. add a second NIC
184. A large network with 500 users notices that at specific times in the morning and
afternoon network congestion ties up their computers. What is the most likely cause?
A. many users are logging on or off
B. power fluctuations
C. a terminator is not grounded
D. the switch connecting the network goes down
185. The best method to restore the latest copy of the registry in a Win 2003 Server is to
select the
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
D. Ctrl +Alt + Del keys
186. The most efficient way to control security in a client/ server network is to assign
permissions to
A. each shared resource
B. groups
C. directories
D. user
187. The advantage of a Client/Server network over a Peer-to-Peer network is
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Easy to configure the Client/Server
D. Security is better on a Peer-to-Peer
188. A remote user calls your help desk and complains that she is unable to access
internal corporate network resource from the remote site. The user states that she can
access the local resource. To solve this problem, what is your primary advice?
A. Check whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her Computer Setting
D. Check TCP/IP status of her computer
189. On a Network, where is a system acting as firewall typically located?
A. Between the client system and the server
B. Between two internal networks
C. Between the internal access point and in the internet
D. Between the internal network and internet access point
190. You are designing a network which needs to support 200 users. You do not plan to
extend the segment beyond the current number of users. Which subnet mask would
best meet your needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.255.255.200
191. You are the administrator for your company’s domain. You need to subdivide
groups in your organization with in active directory. If you want to separate sales from
marketing department, what could you use as a system of organizing this subdivision?
A. Creating Organizational units
B. Use user and Groups
C. Create site and subnet grouping
D. Build a container in a subnet group
192. A system administrator wants to remove a domain controller from a domain. Which
of the following is the easiest way to perform the task?
A. Reinstall server over existing installation and make the machine a member of
group
B. Use remove command
C. Use Active directory installation wizard to demote the domain controller
D. Reinstall server over existing installation and make a machine a member of
domain
193. The most secure and strong password from the following list is:
A. PassWOrd1
B. Pass_Word#1
C. PASSWORD1
D. paSS_Word1
194. You have just resolved a very complex network problem. During the process, you
made some configuration changes to a router and two of the Windows 2000 servers.
The changes were successful, and your manager is now very happy with your
performance. What should be your next step?
A. Ask your manager for a raise.
B. Document the changes you made to the router and servers.
C. Replicate the changes you made on two servers to all other servers.
D. Enable auditing on all servers to prevent problems in the future.
195. The lists of tasks required to maintain a network can vary widely, depending on the
goals and characteristics of that network. However, some network maintenance tasks
are common to most networks. Which of the following would be considered a common
task that should be present in any network maintenance model?
A. Performing database synchronization for a network’s Microsoft Active
Directory
B. Making sure digital certificates used for PKI are renewed in advance of their
expiration
C. Using Cisco Works to dynamically discover network device changes
D. Performing scheduled backups
196. Which of the following statements is true regarding scheduled maintenance?
A. Scheduled maintenance helps ensure that important maintenance tasks are
not overlooked.
B. Scheduled maintenance is not recommended for larger networks, because of
the diversity of maintenance needs.
C. Maintenance tasks should only be performed based on a scheduled
maintenance schedule, in order to reduce unexpected workflow
interruptions.
D. Scheduled maintenance is more of a reactive approach to network
maintenance, as opposed to a proactive approach.
197. Which of the following components would NOT expect to find in a set of network
documentation?
A. Logical topology diagram
B. Listing of interconnections
C. License files
D. IP address assignments
198. Which of the following is NOT components that would be most useful when
recovering
from a network equipment outage? (Choose three.)

A. Backup of device configuration information


B. Physical topology
C. Duplicate hardware
D. Operating system and application software (along with any applicable
licensing) for the device
199. Which of the following is the best statement to include in a problem report?
A. The network is broken.
B. User A cannot reach the network.
C. User B recently changed his PC’s operating system to Microsoft Windows 7.
D. User C is unable to attach to an internal share resource of \\10.1.1.1\Budget,
although he can print to all network printers, and he can reach the Internet.
200. A troubleshooter is hypothesizing a cause for an urgent problem, and her hypothesis
involves a network device that she is not authorized to configure. The person who is
authorized to configure the network device is unavailable. What should the
troubleshooter do?
A. Wait for authorized personnel to address the issue.
B. Attempt to find a temporary workaround for the issue.
C. Override corporate policy based on the urgency and configures the network
device independently because authorized personnel are not currently
available.
D. Instruct the user to report the problem to the proper department that is
authorized to resolve the issue.
201. What is the reason why troubleshooters should document their steps as they
attempt to verify their hypothesis?
A. The steps can be submitted to the proper authority prior to their
implementation.
B. The steps serve as a rollback plan if the attempted solution does resolve the
problem.
C. The steps help ensure the troubleshooters do not skip a step in their solution.
D. The steps help reduce duplication of efforts.
202. What step should be taken after a problem has been resolved?
A. For consistency, the same step should be implemented on all equipment of
the same type.
B. To accidentally prevent their reuse, previously archived configurations of the
repaired device should be deleted from the archive server.
C. Confirm that the user who reported the problem agrees that the problem is
resolved.
D. Make sure the implemented solution is not integrated into the network’s
routine maintenance model.
203. Which of the following should you check if you can connect using the IP address but
NOT with the host name?
A. DNS
B. WINS
C. DHCP
D. AD
204. Which of the following is Class C IP address?
A. 10.10.14.118
B. 135.23.112.57
C. 191.200.199.199
D. 204.67.118.54
205. The default subnet mask for Class C network is
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.0.255.0
206. A Bus network topology is best described as which of the following?
A. All computers are attached to a single cable in a chain style
B. All computers are connected to a central point
C. All computers are connected to every other computer or resource in the
network
D. Fault Tolerant
207. Which of the following is a correct MAC address?
A. 190.168.80.1
B. www.certyourself.com
C. 08:34:FE:4C:F2:54
D. G2:G3:23:87:GG
208. Topology that offers the highest level of redundancy, is easy to troubleshoot but is
expensive to install is
A. star
B. ring
C. mesh
D. bus
209. The most efficient way to control security in a client/ server network is to assign
permissions to
A. each shared resource
B. directories
C. groups
D. user
210. Your client has a 10Base2 Ehternet network which is using 160m of RG-58A/U cable
and two 50 ohm terminators that are both grounded. What is wrong with this network?
A. only one terminator should be grounded
B. he should be using RG-59/U cable
C. the terminators should be 93 ohms
D. nothing wrong with this network
211. Running performance monitor your CPU usage averages 45% except when you load an
application and it surges to 100%. Is there a problem?
A. Yes, the CPU needs an upgrade or multiple CPUs may have to be installed
B. yes, but it is not the CPU, it need more RAM
C. no, its normal for the 100% usage to surge when loading an application
D. yes, the hard disk need to be upgraded
212. For Cat 5 UTP, patch cables from the wall outlet to the computer can be a maximum
of
A. 1 m
B. 3 m
C. 5 m
D. 10 m
213. You suspect a faulty NIC is causing a broadcast storm in a network. What
troubleshooting tool would you use to locate which computer has the defective NIC?
A. VOM
B. Protocol analyzer
C. TDR
D. Cable tester
214. Your Application Server has been having trouble booting. Where should you look
first for some answers?
A. performance monitor
B. Services
C. SNMP
D. event viewer
215. What happens when a device is disconnected from the middle of a BUS network?
A. The hub will propagate error messages to the rest of the network
B. All devices on the network will fail
C. The Server will stop responding to that device
D. Data will not be able to get to devices on the other side of this device

216. A security policy defines


A. When users cannot log in to their computers
B. What users can and cannot do with their computer
C. How the user should install their own software
D. How complex user password should be
217. A type of network that supports two /more organizations and that allows controlled
access from the outside for specific purposes.
A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)
218. You want all network clients to download and install updates automatically during
night hours, and you have configured scheduled installation behavior for Automatic
Updates. However, you discover that some users are turning off their machines at night
and updates are not being applied. The group policy that enables you to correct this
situation without changing the installation schedule?

A. Configure Automatic Updates


B. No Auto-Restart For Scheduled Automatic Updates Installations
C. Specify Intranet Microsoft Update Service Location
D. Reschedule Automatic Updates Scheduled Installations

219. Assume that you are giving a service and you want to measure its quality. The best
way to do this is
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to
measure their satisfaction
D. Wait until you receive a complaint from customers

220. A user can login to his computer but cannot access network resources. The user has
all the appropriate group memberships and permissions, but he still cannot access
shared resources. The cause of this problem

E. User has attempted to access a shared folder without appropriate permissions.


F. User has entered the wrong password.
G. User has logged on to the domain instead of the local computer.
H. User has logged on to the local computer instead of the domain.

221. Your organization consists of four physical locations connected by a wide-area


network (WAN). Each site has its own independent Internet connection. If the primary
concern about installing Windows Server Update Services (WSUS), the best way to
configure the WSUS servers without affecting WAN link.

A. All clients download updates from a single WSUS server at the head office.
B. Each location has an independent WSUS server that serves local clients.
C. Each remote location has replica WSUS servers that copy their configuration from the
head office WSUS server.
D. Each remote location has a disconnected WSUS server and updates are imported on
those servers from DVD.
222. Your company has a main office and a branch office. You deploy a read-only domain
controller (RODC) that runs Microsoft Windows Server 2008 to the branch office. You need to
ensure that users at the branch office are able to log on to the domain by using the RODC. What
should you do?

A. Add another RODC to the branch office.


B. Configure a new bridgehead server in the main office.
C. Configure the Password Replication Policy on the RODC.
D. Decrease the replication interval for all connection objects by using the Active
Directory Sites and Services console.

223. A technician receives an urgent call that the switch in Accounting Department is
down. Which of the following should the technician do FIRST to troubleshoot this
issue?

A. Identify symptoms and problems

B. Document the process and solutions

C. Establish the most probable cause

D. Escalate if necessary

224. A common method used to prevent the unauthorized network devices from sending
traffic across a network is port.

A. Spanning
B. Address translation

C. Mirroring

D. Authentication

225. The type of license key allows you to host an activation service locally within your
own network.

A. Multiple Activation Key

B. Key Management System

C. Key Activation System

D. Multiple Management System

226. A new project requires that users in your domain and in the domain of a partner
Organization have access to a shared folder on your file server. Which type of group
should you create to manage the access to the shared folder?

A. Domain local security group


B. Universal security group
C. Global security group
D. Domain local distribution group

227. You are giving training about computer and network maintenance for a
maintenance team. As a trainer, the first step in the maintenance process you
recommend.

A. Gather data from the computer

B. Verify the obvious issues

C. Evaluate the problem and implement the solution

D. Gather data from the customer


228. You are going to build Internet infrastructure with 31 subnets and 7 usable host
addresses per each subnet. The class C subnet mask for this case.

A. 255.255.255.240

B. 255.255.255.244

C. 255.255.255.250

D. 255.255.255.242

229. The reason that end users need to be aware of the security policy.

A. Some security decisions are usually in their hands

B. They should understand the probability of every risk

C. They need to be aware of every threat

D. They should avoid responsibility for their actions

230. You are a network administrator at XYZ Company, and one of your tasks is designing
the company security policy. The element NOT to be specified in an enterprise security
policy.

A. Risks and how to manage the risks

B. User roles and responsibilities

C. Software versions of the security products

D. Contingency plan in case of compromise

231. The first step in establishing a disaster recovery plan (DRP).

A. Demonstrate adherence to a standard disaster recovery process

B. Agree on the goals and objectives of the plan

C. Identify applications to be run during a disaster

D. Identify the causes of the disaster.


232. Firewall function.

A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

233. A security implementation principle that recommends division of responsibilities so


as to NOT allow one person to commit an undetected fraud.

A. Separation of duties

B. Collusion

C. Least privilege

D. Delegation of power

234. While you are configuring new wireless clients, none of the new clients is able to
connect to the network, but clients already on the same access point do not have any
connectivity problem. Which is NOT the possible reason for this problem?

A. A poor signal due to interference

B. A bad access point

C. An incorrect IP address

D. An incorrect same service set identifier (SSID)

235. You a network administer for ABC Company. You are verifying the configuration of a
newly installed host by establishing an FTP connection to the remote server. The
highest layer of the protocol stack you are using for this operation.

A. Application

B. Presentation

C. Session
D. Transport

236. You have a domain controller that runs Windows Server 2008 and is configured as a
DNS Server. You need to record all Inbound DNS queries to the Server. What should you
configure in the DNS Manager console?

A. Enable automatic testing for simple queries

B. Enable automatic testing for recursive queries

C. Enable debug logging

D. Configure event logging to log errors and warnings

237. You are the network administrator for your company. The network consists of single
Active Directory domain . All domains controllers run windows server 2003.All client
computers run window xp professional with default settings some users have Laptop
computers and the rest have desktop computers you need to ensure that as users are
authenticated by a domain controller when they log on How should you modify the local
security policy?
A. Request authentication by a domain controller to unlock the client computer
B. Cache zero interactive logons
C. Cache 50 interactive logons
D. Grant the log on locally users right to the user group
238. Your network contains a server named server1 that runs windows server 2008sercice
pack 2(sp2).You install a new network adapter on server1.you need to view the media
access controller (MAC)address for the new network adapter. What should you do?
A. At the command prompt, run IP config /all.
B. At the command prompt, run Net view\\serve1
C. From the device manager snap-in, view the properties of the network adapter
D. From the services snap-in, view the properties on the network connection
service.
239. Which Layer the OSI reference model is responsible for determining the available of the
receiving program and checking and to see if enough resources exist for communication?
A. Transport
B. Network
C. Presentation
D. Application
240. As network administrator you are called in to troubleshoot a problem on a token ring
network the network uses two MSAUs connected using the ring in ports on both devices . a
network card are sent at the same speed what is the likely cause of the problem?
A. Bad network card
B. Break on the network
C. MSAU configuration
D. Network card configuration
241. Which of the following definition describes the loss of signal strength as a signal travels
through a particular media?
A. Attenuation
B. Cross talk
C. EMI
D. Chatte
242. You are troubleshooting a problem in which a user is experiencing periodic problems
connecting to the network .Upon investigation you find that the cable connecting the user’s
pc to the switch is close to a fluorescent light fitting. What condition is most likely causing
the problem?
A. Cross talk
B. EMI
C. Attenuation
D. Faulty cable
243. Which one of the following is behavior of good team members?
A. Share responsibilities
B. Keep individual information about development
C. Do not respect the opinions of others in the team
D. Do not take turns
244. Which of the following devices forwards data packets to all connected ports?
A. Router
B. Switch
C. Bridge
D. Hub
245. Which of the following OSI layers is responsible for establishing connections between
two devices?
A. Network
B. Transport
C. Session
D. Data link
246. Which of the following addresses is a class B address?
A. 129.16.12.200
B. 126.15.16.122
C. 211.244.212.125
D. 193.17.101.27
247. You are the network administrator for a large company. You have recently been tasked
with supplying internet access to all network users. which of the following could you do to
accomplish this?
A. Implement a firewall
B. Implement a proxy server
C. Enable port 80 on all workstations
D. Disable port 80 on all workstations
248. Which of the following is categorized richest channel in conveying information
effectively?
A. Telephone
B. Posted notices and bulleting
C. Face to face communication
D. Email
249. Assume that you are giving a service and you want to measure its quality. The best way
to get about it?
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction which customers to measure
their satisfaction
D. Wait until you receive a complaint from customer
250. Assume you were working a project on IT training need assessment. The best way of
collecting detailed information?
A. Questioner
B. Interview
C. Observation
D. Research
251. The flow of information across persons of work units at the same hierarchical level is
called?
A. Lateral communication
B. Vertical communication
C. Down ward communication
D. Upward communication
252. The IT Manager asks you for a diagram showing every server on the network. The
diagram that should provide to his/her
A. Baseline Network diagram
B. Logical network Diagram
C. Physical network diagram
D. Writing network diagram
253. A type of network that supports two more organizations and that allows controlled
access from the outside for specific purposes
A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)
254. What does safe mode allow you to do?
A. Runs windows without processing AUTOEXEC>BAT and CONFIG.SYS
B. Boot the system without scanning drivers
C. Start windows using only basic files and drivers
D. Skip loading the registry
255. A document jointly developed by management and quality experts to express the
quality objective of the organization, the acceptable level of the quality and duties of
specific department to ensure the quality is called?
A. Quality policy
B. Quality control
C. Quality management plan
D. Quality system procedure
256. Where would you configure a workstations too boot from the USB drive firs and hard
drive only if there is not a bootable USB device attached?
A. NTLDR
B. C:\Windows\TEMP\1st.txt
C. Boot.ini
D. Configure in workstations BIOS
257. Routers operate at layer-----. Repeaters operate at layer-----and internet explore operate at
layer----.
e. Transport layer, network layer, physical layer
f. Network layer, physical layer, not include all layers
g. Physical layer, data link layer, application layer
h. Session layer, application layer , presentation layer
258. OSI layer data is encapsulated in -------- order.
a. Data , frame, packet, segment, bit
b. Segment ,data ,packet, frame, bit
c. Data , segment, packet, frame, bit
d. Data, segment, frame, packet, bit
259. To connect two switches we use ------ type of RJ45 UTP cable
a. Straight through
b. Crossover cable
c. Rollover cable
d. DB 9 cable on both sides.
260. ----- IP address pool provides a maximum of only 254 host addresses per network ID.
a. Class A
b. Class D
c. Class E
d. Class C
261. The DoD model (also called the TCP/IP stack) has four layers. From these four layers ------------ is
equivalent to the Network layer of the OSI model.
e. Application
f. Host-to-Host
g. Internet
h. Network Access
262. To test the IP stack on your local host, you ping----- IP address.
e. 127.0.0.0
f. 255.0.0.127
g. 255.255.255.255
h. 127.0.0.1
263. the frequency range of the IEEE 802.11b ,802.11a ,802.11g are
a. 2.4Gbps , 5Gbps, 2.4Gbps
b. 5Gbps , 2.4GHz, 2.4Gbps
c. 2.4GHz , 5GHz, 2.4GHz
d. 5GHz, 5GHz , 5GHz

264. ------ is layer 1 device and can be used to enlarge the area covered by single LAN segment.
a. Hub
b. Ethernet Switch
c. ADSL
d. Desktop computer

265. ------- Application layer protocol.


a. HTTP
b. TCP
c. UDP
d. IP
266. The address range of a Class B network
a. 01xxxxxx
b. 0xxxxxxx
c. 10xxxxxx
d. 110xxxxx
267. Each layer has its own protocol. From the chooses below----- routing protocol
a. FTP
b. TFTP
c. DNS
d. RIPV1
268. One of the following is an application layer protocol used to assign IP to hosts
a. DNS
b. Telnet
c. BootP
d. SMTP
269. ------ type of connection can use full duplex.
a. hub to hub
b. switch to switch
c. switch to hub
d. repeater to repeater
270. we can assign ------ number of IP address to hosts with subnet mask 255.255.255.224
a. 14
b. 30
c. 62
d. 31
271. From chooses below choose an address that belongs to class C network
a. 170.1.0.0
b. 126.0.0.0
c. 254.1.24.0
d. 192.168.67.0
272. Failure that causes damage on a computer component immediately is called:

a. Catastrophic failure
b. Upset failure
c. Degradation failure
d. Latent failure
273. The device used to prevent ESD between you & a computer component is:-

e. Anti static pad


f. Anti static pouches
g. Anti static wristband
h. Anti static mat
274. To determine the number of slots to form memory bank is:-

a. The RAM capacity divided by the CPU speed


b. Bus width of RAM divided by bus width of CPU
c. The CPU speed divided by a RAM capacity
d. Bus width of CPU divided by bus width of RAM.
275. The arrangement or physical layout of computer, cable and other components is referred as:-

e. Protocol
f. Peer to Peer
g. Topology
h. Client-Server
276. The two types of coaxial cables are:-
e. UTP & STP
f. Multimode & Single mode
g. 10BaseT & 100BaseT
h. Thinnet & Thicknet

277. The gradual deterioration of the signal strength across the long distance of ‘LAN’ is:-

a. Distortion
b. Attenuation
c. Amplification
d. Signal modification
278. More resistant ‘UTP’cable to crosstalk and signal attenuation is

e) Cat-6
f) Cat-7
g) Cat-5E
h) Cat-5
279. From the following connective devices, one is not used to expand a single ‘LAN’

e) Router
f) Hub
g) Switch
h) Repeater
280. Optical fiber cables transmit data in the form of light. One of the following devices is used to
convert data from the electric signal to light and convert light back to electric signal at the
destination computer

e. Modem
f. Multiplexer
g. Electromagnetic Induction
h. Codec

281. The reason that ‘UTP’ cables are selective in most ‘LAN’ is because they:

e. Are resistance to physical stress


f. Are used for 2km.
g. Are dependent of EMI (electromagnetic interference)
h. Activate signal attenuation over distance.
282. The frequency range of the IEEE 802.11b, 802.11a, 802.11g are

e. 2.4Gbps , 5Gbps, 2.4Gbps


f. 5Gbps , 2.4GHz, 2.4Gbps
g. 2.4GHz , 5GHz, 2.4GHz
h. 5GHz, 5GHz , 5GHz

283. -------- used at startup & after startup by the operating system to provide software control of
hardware device

a) ROM
b) BIOS
c) CPU
d) RAM
284. A Circuit board inserted in to a slot on the system board to enhance the capability of the
computer is:-

a) Data card
b) IDE CARD
c) Expansion card
d) Driver card

285. A Set of rules and standards that two end devices used for communication

e. Program
f. Protocol
g. Process
h. Booting
286. A computer that stores program and data to be used remotely by other computer

a) Client
b) Server
c) Mobile
d) Ethernet switch
287. Division of hard drive that can be used to hold logical drive:-

e) Defragment
f) Folders
g) Disk management
h) Partition
288. The DoD model (also called the TCP/IP stack) has four layers. From these four layers ------------ is
equivalent to the Network layer of the OSI model.
i. Application
j. Host-to-Host
k. Internet
l. Network Access

289. To test the IP stack on your local host, you ping----- IP address.

i. 127.0.0.0
j. 255.0.0.127
k. 255.255.255.255
l. 127.0.0.1

290. All computer components get power from mother board except--------

a) Ram
b) CPU
c) Expansion Card
d) Hard Disk
291. Routers operate at layer-----. Repeaters operate at layer-----and internet explore operate at
layer----.

i. Transport layer, network layer, physical layer


j. Network layer, physical layer, not include all layers
k. Physical layer, data link layer, application layer
l. Session layer, application layer , presentation layer
292. To provide a computer with a physical and electronic connection to a
network ,what must be installed?
B. A Hub B. A Repeater C. A NIC D. A Bridge
293. Your company has a LAN in its down office and has now set up a LAN
in manufacturing plant in the order . To enable everyone to share data
and resource .b/n the two LANs, What type of device (s0are needed to
connect them ? choose the most correct answer .
A. Modem B. cable C. hub D. Router
294. how many possible hosts are attached to each of the local area
networks at yours

A. 128 B. 254 C. 256 D.64

295. of the following network device layer 3 d( network layer)device?

A. Repeater B. Bridge C. Router D. hub

296. of the following statements is not true about DHCP?


A. It reduce burned of network administrator B. It avoids TCP/IP
conflict

C. It increases security D. It handle boot client requests

297. the following is/are characteristics of server- based networks?

A. No need of dedicated server b. less secured C. highly secured


D. support few users

298. One Of the following network device is layer 2 (Data link layer) device

A. repeater B. Bridge C. Router D. Hub

299. w/c of the following network device is blocks unauthorized users to


access private data access private data?

A. Router B. Bridge C. Switch D. Fire wall

300. the following is a valid subnet mask for class c network?

A. 255.255.255.0 B. 255.255.0.0 C. 255.0.0.0 D.


255.255.255.255

301. on which OSI layer does IP operates

A .physical layer B. data Link layer C. Network layer D. presentation


layer

302. when you tried to login to the server, you trail may failed, this failure
event is recorded

A. System log B. security log C. application log D. event Log

303. of the following protocol is a routing protocol ?

A. TCP B. OSPF C. ICMP D. FTP

304. Which of the following TCP/IP protocol allows an application program


on one machine To send a data gram to an application program on
another machine?

A. UDP B. SNMP C. FTP D. SMTP

305. what part of 192.168.10.51 is the Network ID, assuming a default


subnet mask?
A.192 B. 192.168.10 C. 0.0.0.5 D. 51

306. what can greatly reduce TCP/IP configuration problem ?

A. WINS server B. WINS Proxy C. DHCP server D. DNS server

307. How many bits internet address is assigned to each host on a TCP/IP
internet which is used in all communication with the host?

A. 16- bits B. 32-Bits C. 8-bits D. 2-bits

308. with an IP address of 100, you currently have 80 subnets. What subnet
musk should you use to maximize the number of available hosts?

A. 192 B. 224 C. 252 D. 248

309. where is a hub specified or found in the OSI model?

A. Session layer B. Physical layer C.. Data Link layer D.


Application layer

310. The term “Duplex “ refers to the ability of the data receiving stations
to echo back a confirming message to the sender. In full duplex data
transmission, both the sender and the receiver

A. Cannot talk at one B. can receive and send data one at a time

C. can send or receive data one at a time D. can do one way


data transmission only

311. If a network users can’t access the network resources from the
server, the most probable cause of the problem is:

A. NIC failure B. workstation failure C. switch failure D. DLS is


unavailable

312. suppose you are the network administrator for ABC.COM A windows
server 2003 computer is configured as print server for print device that
has a built in network interface card .users of the print device report that
they cannot print to it . You confirm that the correct ip address and
drivers are being used . You Suspect that there is a problem with the MAC
to Ip address resolution on the print server. You want to find out w/c MAC
address the print jobs are being sent to. w/c command should you run on
the print server?
A. net session B. netstant.exe C. netsh.exe D. netcape.exe

313. To provide a computer with a physical and electronic connection to a network, what must be
installed?
A. A hub
B. A router
C. A NIC
D. A Bridge
314. One of the following is an example of a network?
A. A computer attached to a printer and a scanner to input and output information
B. Computer systems sharing a common communication medium for the purpose of sharing
information or devices
C. Several printers connected to a switch box going to a single terminal
D. Several diskettes holding information for one workstation
315. You have successfully implemented a network of about 20 computers. The network is connected
to the Internet, and all users have been granted equal access. You are designated as the network
administrator. Due to a staff shortage, you also have to do some jobs that are supposed to be done
by an ordinary user. Which account should you use for this purpose?
A. Create a new user as non administrative account for yourself.
B. Use another user's account.
C. Copy the Administrator account and rename it.
D. Do nothing. Keep using the Administrator account.
316. You have made some changes to file and directory permissions on one of the servers on your
network. You want to verify the new settings before informing the users of the changes. How can
you verify that the changes have taken affect and that no security problems arise from them?
A. Ask a trusted user to perform the tests for you.
B. Use your own Administrator account to perform the tests.
C. Create a test account for the purpose.
D. Do nothing. Changes made with administrative privileges are always correct.
317. A server room is thickly populated, with about 120 servers installed on racks. Various network
and power cables make it very difficult to work on the servers. When a technician has to work on
the servers, usually it takes him or her a long time to trace the cables. On several occasions, some
cables have been accidentally pulled in the process. Which of the following should you do to avoid
further problems?
A. Replace older cables with longer cables.
B. Put identification labels on all cables.
C. Remove redundant network and power cables.
D. Reroute all network and power cables.

318. You are the LAN administrator for your company. You have couple Windows XP Professional
clients that dial in via PPP to the company network’s RAS server. You want the remote clients to be
assigned dynamic IP addresses. Upon connecting, you find that the Windows XP computers didn’t
get any IP address. What should you do?
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all

319. You are setting up a new Windows XP workstation on your network and your DHCP server
provides all of the normal TCP/IP configuration information. What must you do to configure the IP
address on the workstation after you add the TCP/IP protocol
A. Manually enter an IP address that is not in use on the network..
B. Find out what the subnet mask on your network is, and add this information only.
C. The DHCP option is enabled automatically, and the server will auto-configure everything
D. Put the address of the router in the default gateway, and put all 0s in the IP field.
320. A Windows XP user complains that she cannot connect to any other computers on her local
subnet even when using the IP address to communicate. However, she can ping 127.0.0.1 and her IP
address and receive replies. Other users on her subnet do not report having any trouble. What is the
most probable cause of the problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured correctly.
C. The NIC has a problem.
D. The computer is not configured to use DHCP
321. While reviewing the security logs for your server, you notice that a user on the Internet has
attempted to access your internal mail server. Although it appears that the user's attempts were
unsuccessful, you are still very concerned about the possibility that your systems may be
compromised. Which of the following solutions are you most likely to implement?
A. A more secure password policy
B. File-level encryption
C. Kerberos authentication
D. A firewall system at the connection point to the Internet
322. You are hired to investigate a slow performing network server for a client. Using the
performance monitor you obtain the following readings: CPU usage= 25%, Disk time= 25%, Page
faults/sec= 25.What one change will increase the performance of this network server is the most?
E. buy another CPU
F. add another hard drive
G. increase RAM
H. add a second NIC
323. A large network with 500 users notices that at specific times in the morning and afternoon
network congestion ties up their computers. What is the most likely cause?
A. many users are logging on or off
B. power fluctuations
C. a terminator is not grounded
D. the switch connecting the network goes down
324. The best method to restore the latest copy of the registry in a Win 2003 Server is to select the
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
D. Ctrl +Alt + Del keys
325. The most efficient way to control security in a client/ server network is to assign permissions to
A. each shared resource
B. groups
C. directories
D. user
326. The advantage of a Client/Server network over a Peer-to-Peer network is
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Easy to configure the Client/Server
D. Security is better on a Peer-to-Peer
327. A remote user calls your help desk and complains that she is unable to access internal corporate
network resource from the remote site. The user states that she can access the local resource. To
solve this problem, what is your primary advice?
A. Check whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her Computer Setting
D. Check TCP/IP status of her computer
328. On a Network, where is a system acting as firewall typically located?
A. Between the client system and the server
B. Between two internal networks
C. Between the internal access point and in the internet
D. Between the internal network and internet access point
329. You are designing a network which needs to support 200 users. You do not plan to extend the
segment beyond the current number of users. Which subnet mask would best meet your needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.255.255.200
330. You are the administrator for your company’s domain. You need to subdivide groups in your
organization with in active directory. If you want to separate sales from marketing department,
what could you use as a system of organizing this subdivision?
A. Creating Organizational units
B. Use user and Groups
C. Create site and subnet grouping
D. Build a container in a subnet group
331. A system administrator wants to remove a domain controller from a domain. Which of the
following is the easiest way to perform the task?
A. Reinstall server over existing installation and make the machine a member of group
B. Use remove command
C. Use Active directory installation wizard to demote the domain controller
D. Reinstall server over existing installation and make a machine a member of domain
332. The most secure and strong password from the following list is:
A. PassWOrd1
B. Pass_Word#1
C. PASSWORD1
D. paSS_Word1
333. You have just resolved a very complex network problem. During the process, you made some
configuration changes to a router and two of the Windows 2000 servers. The changes were
successful, and your manager is now very happy with your performance. What should be your next
step?
A. Ask your manager for a raise.
B. Document the changes you made to the router and servers.
C.Replicate the changes you made on two servers to all other servers.
D. Enable auditing on all servers to prevent problems in the future
334. The lists of tasks required to maintain a network can vary widely, depending on the goals and
characteristics of that network. However, some network maintenance tasks are common to most
networks. Which of the following would be considered a common task that should be present in any
network maintenance model?
E. Performing database synchronization for a network’s Microsoft Active Directory
F. Making sure digital certificates used for PKI are renewed in advance of their expiration
G. Using Cisco Works to dynamically discover network device changes
H. Performing scheduled backups
335. Which of the following statements is true regarding scheduled maintenance?
E. Scheduled maintenance helps ensure that important maintenance tasks are not
overlooked.
F. Scheduled maintenance is not recommended for larger networks, because of the
diversity of maintenance needs.
G. Maintenance tasks should only be performed based on a scheduled maintenance
schedule, in order to reduce unexpected workflow interruptions.
H. Scheduled maintenance is more of a reactive approach to network maintenance, as
opposed to a proactive approach.
336. Which of the following components would NOT expect to find in a set of network
documentation?
E. Logical topology diagram
F. Listing of interconnections
G. License files
H. IP address assignments
337. Which of the following is NOT components that would be most useful when recovering
from a network equipment outage? (Choose three.)

E. Backup of device configuration information


F. Physical topology
G. Duplicate hardware
H. Operating system and application software (along with any applicable licensing) for the
device
338. Which of the following is the best statement to include in a problem report?
E. The network is broken.
F. User A cannot reach the network.
G. User B recently changed his PC’s operating system to Microsoft Windows 7.
H. User C is unable to attach to an internal share resource of \\10.1.1.1\Budget, although
he can print to all network printers, and he can reach the Internet.
339. A troubleshooter is hypothesizing a cause for an urgent problem, and her hypothesis involves a
network device that she is not authorized to configure. The person who is authorized to configure the
network device is unavailable. What should the troubleshooter do?
E. Wait for authorized personnel to address the issue.
F. Attempt to find a temporary workaround for the issue.
G. Override corporate policy based on the urgency and configures the network device
independently because authorized personnel are not currently available.
H. Instruct the user to report the problem to the proper department that is authorized to
resolve the issue.
340. What is the reason why troubleshooters should document their steps as they attempt to verify
their hypothesis?
E. The steps can be submitted to the proper authority prior to their implementation.
F. The steps serve as a rollback plan if the attempted solution does resolve the problem.
G. The steps help ensure the troubleshooters do not skip a step in their solution.
H. The steps help reduce duplication of efforts.
341. What step should be taken after a problem has been resolved?
E. For consistency, the same step should be implemented on all equipment of the same
type.
F. To accidentally prevent their reuse, previously archived configurations of the repaired
device should be deleted from the archive server.
G. Confirm that the user who reported the problem agrees that the problem is resolved.
H. Make sure the implemented solution is not integrated into the network’s routine
maintenance model.
342. Which of the following should you check if you can connect using the IP address but NOT with
the host name?
E. DNS
F. WINS
G. DHCP
H. AD
343. Which of the following is Class C IP address?
E. 10.10.14.118
F. 135.23.112.57
G. 191.200.199.199
H. 204.67.118.54
344. The default subnet mask for Class C network is
E. 255.0.0.0
F. 255.255.0.0
G. 255.255.255.0
H. 255.0.255.0
345. A Bus network topology is best described as which of the following?
E. All computers are attached to a single cable in a chain style
F. All computers are connected to a central point
G. All computers are connected to every other computer or resource in the network
H. Fault Tolerant
346. Which of the following is a correct MAC address?
E. 190.168.80.1
F. www.certyourself.com
G. 08:34:FE:4C:F2:54
H. G2:G3:23:87:GG
347. Topology that offers the highest level of redundancy, is easy to troubleshoot but is expensive to
install is
E. star
F. ring
G. mesh
H. bus
348. The most efficient way to control security in a client/ server network is to assign permissions to
E. each shared resource
F. directories
G. groups
H. user
349. Your client has a 10Base2 Ehternet network which is using 160m of RG-58A/U cable and two 50 ohm
terminators that are both grounded. What is wrong with this network?
E. only one terminator should be grounded
F. he should be using RG-59/U cable
G. the terminators should be 93 ohms
H. nothing wrong with this network
350. Running performance monitor your CPU usage averages 45% except when you load an application
and it surges to 100%. Is there a problem?
E. Yes, the CPU needs an upgrade or multiple CPUs may have to be installed
F. yes, but it is not the CPU, it need more RAM
G. no, its normal for the 100% usage to surge when loading an application
H. yes, the hard disk need to be upgraded
351. For Cat 5 UTP, patch cables from the wall outlet to the computer can be a maximum of
E. 1 m
F. 3 m
G. 5 m
H. 10 m
352. You suspect a faulty NIC is causing a broadcast storm in a network. What troubleshooting tool would
you use to locate which computer has the defective NIC?
E. VOM
F. Protocol analyzer
G. TDR
H. Cable tester
353. Your Application Server has been having trouble booting. Where should you look first for some
answers?
E. performance monitor
F. Services
G. SNMP
H. event viewer
354. What happens when a device is disconnected from the middle of a BUS network?
E. The hub will propagate error messages to the rest of the network
F. All devices on the network will fail
G. The Server will stop responding to that device
H. Data will not be able to get to devices on the other side of this device

355. A user calls to report that cannot access network resources. You investigate
and discover that the IP address of the user’s computer is 169.254.0.6. You also
discover that other clients on the same subnet are experiencing the same
problem. You must provide network connectivity for the user. What should you
do?
A. Enabling Automatic Private IP addressing
B. Disable Automatic private IP addressing
C. Ensure the computer is enabled as a DHCP client
D. Ensure a DHCP server or DHCP relay agent resides on the local
subnet
356. A piece of hardware or software on the network to prevent some
communications forbidden by the network policy.
A. Proxy server B. Networks address translator C. Firewall D. Network
interface controller
357. A device which amplifies or regenerates digital signals received while sending
them from one part of a network into another?
A. Bridge B. Repeater C. Switch D. Router
358. You have made changes to file and directory permissions on a server on a
netwok .you want to verify the new settings before informing the users of the
changes . How can verify that the changes have taken affect and that no
security problems arise from them?
A. Ask a trusted user to perform the tests for you
B. Use your own administrator account to perform the tests
C. Create a test account for the purpose
D. Do nothing , changes made with administrative privileges are always
correct
359. You find that an abnormal amount of traffic is passing between the DNS and
the DNS clients. Which tool would best help you ascertain the cause of excess
traffic?
A. Tracer B. Event Viewer C. System Monitor D. Security Monitor
360. In OSI network architecture , the dialogue control and token management are
responsibility of
A. Datalink layer B. Session layer C. Network layer D. Transport layer
361. Communication modes support two – way traffic but in only one direction at a
time?
A. Simplex B. Three quarters duplex C. Half duplex D. Full duplex
362. You install file and printer sharing for Microsoft networks. You share a folder
and leave the password option blank. Who can gain access to the folder?
A. Windows 98 will not allow a blank password in this field
B. Anyone with internet Explorer installed
C. Only users that are members of the same workgroup as you
D. Anyone who can gain access to your network and has a Microsoft
redirector such as the client for Microsoft networks installed
363. What is a firewall in computer network?
A. The physical boundary of a network
B. An operating system of computer network
C. A system designed to prevent unauthorized access
D. A web browsing software
364. You are the LAN administrator for your company. You have couple windows
XP professional clients that dial in via PPP to the company network’s RAS server.
You want the remote clients to be assigned dynamic IP addresses. Upon
connecting, you find that the windows XP computers did not get any IP address.
What should you do?
A. Run ipconfig with the/release all and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
365. A large network with 500 users notices that at specific times in the morning
and afternoon network congestion ties up their computers. What is the most
likely cause?
A. Many users are logging on or off
B. Power fluctuations
C. A terminator is not grounded
D. The switch connection the network goes down
366. The best method to restore the latest copy of the registery in a win 2003
server is to select the
A. Emergency repair desk (ERD) C. Recovery console
B. Last known good configuration D. Ctr l+ Alt + Delete keys
367. The most efficient way to control security in a client/server network is to
assign permission to
A. Each shared resource B. Groups C. Directories D. User
368. The advantage of a client/server network over a peer- to – peer network is
A. Performance is better on a peer- to – peer
B. Security is better on a client/server
C. Easy to configure the client /server
D. Security is better on a peer- to – peer
369. A remote user complains that he is unable to access internal corporate
network resource from the remote site. The user states that he can access the
local resource. What is your primary advice to solve this problem?
A. Check whether he can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of his computer setting
D. Check TCP/IP status of his computer
370. A system acting as firewall on the network typically located between?
A. The client system and the server
B. Two internal networks
C. The internal access point and in the internet
D. The internal network and internal access point
371. Which of the following is correct regarding class B address or IP address?
A. Network bit--14, Host bit—16
B. Network bit--16, Host bit—14
C. Network bit--18, Host bit—16
D. Network bit--12, Host bit—14
372. The administrators for a company’s domain need to subdivide groups in
organization with in active directory. If he wants to separate sales from
marketing department, what could he use as a system of organizing this
subdivision?
A. Creating organizational units
B. Use user and Groups
C. Create site & subnet grouping
D. Build a container in a subnet group
373. A system administrator wants to remote a domain controller from a domain.
Which is the easiest way to perform the task?
A. Re- install server over existing installation and make the machine a
member of group
B. Use remove command
C. Use active directory installation wizard to remove the domain
controller
D. Re- install server over existing installation and make a machine a member
of domain
374. ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
375. Which of the following laye of OSI model also called end- to – end layer?
A. Presentation layer B. Network Layer C. Session Layer D. Transport
Layer
376. The company that have 240 computers .it also increase the numbers of computers for the
other office there are 15 computers added. the company wants to keep the computers
efficiency ,decrease down failure and slow down speed .what activities taken
A. install the new operating system B. create PM plan
A. Install malicious software D. use replacement by the frailer one
377. You are install the new driver software for your computer ,after you install the compute
become reboot and cannot finish the boot process .then what do you do
A. Boot the computer last known good configuration C. un install the installed driver
B. Boot the computer normally D. boot the computer by safe
mode
378. Your are working in a team with in one operation ,one of the member of the team
disturbs the team .what do you take to resolve this situation
A. Remove him the team C. discarded from the team
B. Advice for him the good approach D. out of the member your self
379. Which step is correct to inter the safe mode
A. Click Start control penal safe mode
B. Press F5 key on the keyboard until the system running
C. Press F2 set up key for dell computer
D. Press the F8 key when the system start up
380. Which one of the following is the correct order of the Hub
A. Active , Passive and dormer C. passive ,active and hybrid
B. Active ,passive and good D. none of the above
381. Which one of the following media is more sensitive for magnetically interference

A.STP B. coaxial cable C. Fiber optic D.UTP


382. Accompany wants to buy the computers that have a good operation with minimum costs
to store data with non-volatile media that can write and read information from the
system .which drive is best to sufficient the companies required or need
A. DVD RW +/DVD R – C. use USB flesh
B. CD RW D. use hard disk drive
383. You want to install the new windows XP operating system on your computer that you
need the drive have tow partitions .on which step the partition create
A. Create the partition after the windows installed
B. Create the partition after the one partitions has been finished
C. Create the partition after the installation was completed
D. Create the partition during the starting installation
384. A network company uses the cat 3 cable and have the internet 1oombps ,but the
company wants to increase the efficiency of the network .as a technician how you
recommended for the company with the minimum costs
A. Use the existing cable and add the Hub that have 100mbps
B. Use the cat 5 UTP cable
C. Use the existing cable that in the manufacturer 100mbps

385. Which of the following is considered a Network Attached Storage device?

A. A 60 GB DAT tape drive attached to the Network Server


B. A file server with special software that is at a separate location from the departmental file
server
C. In a Windows NT environment, it would be the Backup Domain Controller
D. A high speed specialized sub-network attached to the enterprise

386. What is a router?


A. A hardware device that connects dissimilar networks, such as Cat 5 cabling and FDDI
B. A network host that reads the source and destination addresses in the packet header and
makes decisions about where to forward the packet
D. A network host that can forward LAN-based email messages onto the Internet, after
repackaging
them into the SMTP format
D. A software system that can translate between dissimilar networks such as Ethernet and
Token Ring

387. Some protocols are considered to be technically non-routable. Which of the following
statements best describes the most common reason why a protocol would be considered non-
routable?

A. It does not contain the appropriate Data Link layer information required by routers.
B. It uses advanced Transport layer services to move across the Internet and avoids the
routing overhead required by the more primitive networking protocols.
C. It defines Physical layer network addresses for internal routing.
D. It does not specify the Network layer addresses required by routers.

388. What is the binary network ID of the loopback IP address?

A. 1 C. 0
B. 10101010
D. 1111111
389. Used to connect different media types but cannot filter or segment traffic?
A. Bridge
B. Hub
C. Router
390. You are configuring a router. According to the manual, you will need a transceiver to
connect to the LAN ports of the router. What kind of physical interface does the router have?
A. MSAU C. AUI
B. RJ-11 D. BNC
391. Which of the following are connectionless protocols? (Choose the three best answers.)
A. IP C. IPX
B. TCP D. UDP

392. Characteristic of the TCP protocol?


A. fast but unreliable delivery
B. best effort delivery
C. assurance of packet delivery

393. The OSI layer packages bits into frames?


A. Physical
B. Data-link
C. Network

394. You install File and Printer Sharing for Microsoft Networks. You share a folder and leave the
password option blank. Who can gain access to the folder

A. Anyone who can gain access to your network and has a Microsoft redirector such as
the Client for Microsoft Networks installed.
B. Windows 98 will not allow a blank password in this field.
C. Anyone with Internet Explorer installed.
D. Only users that are members of the same workgroup as you

395. A Router operates in which layer of the OSI model?


A. The Physical Layer C. The Transport Layer
B. The Data Link Layer D. The Network Layer
396. A Network Interface Card operates at the Network Layer of the OSI model.
A. True
B. False
397. Which of the following is the correct order of the OSI model from bottom to top?
A. Application, Presentation, Session, Transport, Network, Data Link, Physical
B. Physical, Network, Data Link, Session, Transport, Application, Presentation
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Session, Presentation, Transport, Network, Data Link, Physical

398. What is the maximum speed of 10Base5 Ethernet cable?


A. 100 Mbps C. 50 Mbps
B. 500 Mbps D. 10 Mbps

399. Port ___ is assigned to the SMTP?


A. 21
B. 25
C. 80
400. Which of the following TCP/IP protocols is used to communicate between a Web Browser
and a
Web Server?
A. SMTP C. UDP
B. HTTP D. POP3
401. Which of the following layers of the OSI model does a Bridge operate in?
A. The Data Link Layer
B. The Network Layer
C. The Transport Layer
D. The Session Layer
402. While reviewing the security logs for your server, you notice that a user on the Internet has
attempted to access your internal mail server. Although it appears that the user's attempts were
unsuccessful; you are still very concerned about the possibility that your systems may be
compromised. Which of the following solutions are you most likely to implement?

A. A firewall system at the connection point to the Internet


B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
403. Utility used to check SMTP connectivity?
A. SNMP
B. LMHOSTS
C. Telnet

404. A bridge filters traffic using which type of address?

A. IP address C. TCP address

B. MAC address

405. OSI layer responsible for error checking frames and adding MAC addresses to its tables?
A. presentation
B. transport
C. data-link
406. A user calls to report that cannot access network resources. You investigate and discover that the
IP address of the user’s computer is 169.254.0.6. You also discover that other clients on the same subnet
are experiencing the same problem. You must provide network connectivity for the user. What should
you do?
E. Enabling Automatic Private IP addressing
F. Disable Automatic private IP addressing
G. Ensure the computer is enabled as a DHCP client
H. Ensure a DHCP server or DHCP relay agent resides on the local subnet
407. A piece of hardware or software on the network to prevent some communications forbidden by
the network policy.
B. Proxy server B. Networks address translator C. Firewall D. Network interface controller
408. A device which amplifies or regenerates digital signals received while sending them from one
part of a network into another?
B. Bridge B. Repeater C. Switch D. Router
409. You have made changes to file and directory permissions on a server on a netwok .you want to
verify the new settings before informing the users of the changes . How can verify that the changes
have taken affect and that no security problems arise from them?
E. Ask a trusted user to perform the tests for you
F. Use your own administrator account to perform the tests
G. Create a test account for the purpose
H. Do nothing , changes made with administrative privileges are always correct
410. You find that an abnormal amount of traffic is passing between the DNS and the DNS clients.
Which tool would best help you ascertain the cause of excess traffic?
B. Tracer B. Event Viewer C. System Monitor D. Security Monitor
411. In OSI network architecture , the dialogue control and token management are responsibility of
B. Data link layer B. Session layer C. Network layer D. Transport layer
412. Communication modes support two – way traffic but in only one direction at a time?
C. Simplex B. Three quarters duplex C. Half duplex D. Full duplex
413. You install file and printer sharing for Microsoft networks. You share a folder and leave the
password option blank. Who can gain access to the folder?
E. Windows 98 will not allow a blank password in this field
F. Anyone with internet Explorer installed
G. Only users that are members of the same workgroup as you
H. Anyone who can gain access to your network and has a Microsoft redirector such as the
client for Microsoft networks installed
414. What is a firewall in computer network?
E. The physical boundary of a network
F. An operating system of computer network
G. A system designed to prevent unauthorized access
H. A web browsing software
415. You are the LAN administrator for your company. You have couple windows XP professional
clients that dial in via PPP to the company network’s RAS server. You want the remote clients to be
assigned dynamic IP addresses. Upon connecting, you find that the windows XP computers did not
get any IP address. What should you do?
E. Run ipconfig with the/release all and /renew switch on the client
F. Run ipconfig with the /renew all switch on the client
G. Run winipcfg on the client
H. Run ipconfig/all
416. A large network with 500 users notices that at specific times in the morning and afternoon
network congestion ties up their computers. What is the most likely cause?
E. Many users are logging on or off
F. Power fluctuations
G. A terminator is not grounded
H. The switch connection the network goes down
417. The best method to restore the latest copy of the registery in a win 2003 server is to select the
B. Emergency repair desk (ERD) C. Recovery console
D. Last known good configuration D. Ctr l+ Alt + Delete keys
418. The most efficient way to control security in a client/server network is to assign permission to
B. Each shared resource B. Groups C. Directories D. User
419. The advantage of a client/server network over a peer- to – peer network is
E. Performance is better on a peer- to – peer
F. Security is better on a client/server
G. Easy to configure the client /server
H. Security is better on a peer- to – peer
420. A remote user complains that he is unable to access internal corporate network resource from the
remote site. The user states that he can access the local resource. What is your primary advice to solve
this problem?
E. Check whether he can ping successfully to the default gateway
F. Check whether the NIC is functioning
G. Check subnet mask of his computer setting
H. Check TCP/IP status of his computer
421. A system acting as firewall on the network typically located between?
E. The client system and the server
F. Two internal networks
G. The internal access point and in the internet
H. The internal network and internal access point
422. Which of the following is correct regarding class B address or IP address?
E. Network bit--14, Host bit—16
F. Network bit--16, Host bit—14
G. Network bit--18, Host bit—16
H. Network bit--12, Host bit—14
423. The administrators for a company’s domain need to subdivide groups in organization with in
active directory. If he wants to separate sales from marketing department, what could he use as a
system of organizing this subdivision?
E. Creating organizational units
F. Use user and Groups
G. Create site & subnet grouping
H. Build a container in a subnet group
424. A system administrator wants to remote a domain controller from a domain. Which is the easiest
way to perform the task?
E. Re- install server over existing installation and make the machine a member of group
F. Use remove command
G. Use active directory installation wizard to remove the domain controller
H. Re- install server over existing installation and make a machine a member of domain
425. ADSL is the abbreviation of
E. Asymmetric Dual Subscriber Line
F. Asymmetric Digital System Line
G. Asymmetric Dual System Line
H. Asymmetric Digital Subscriber Line
426. Which of the following laye of OSI model also called end- to – end layer?
B. Presentation layer B. Network Layer C. Session Layer D. Transport Layer

You might also like