Hns Collection
Hns Collection
5. Developing a communication plan can help focus your message and reach your
target audience
A. Plan C. Guide
B. Communication D. Module
A. Human C. Management
B. Material D. Nature
A. Routing C. PowerShell
B. Networking D. Topology
8. This wireless standard is widely used to connect computers to each other and to
the Internet.
A. Blueband C. Broadband
B. RJ45 D. 802.11
A. dsnew C. dscreate
B. dsadd D. dsmodify
12.In mesh topology, relationship between one device and another is.........
A. Primary to secondary C. Peer to primary
B. Peer to Peer D. Primary to peer
A. SMTP C. Telnet
B. HTTP D. FTP
17.How many usable IP addresses can you get from a conventional Class C
address?
A. 254 C. 192
B. 128 D. 256
18.The plan covers partner roles and responsibilities, activities, budget and
management consideration.
20.Which utility is used to trace the route to from one host to another in a TCP/IP
network?
A. Ipconfig/Ifconfig C. . Ping
B. Netstat D. Tracert/ Traceroute
21.It has small type of antenna; it helps to make connection on the wireless
network.
A. Rack C. Star
B. Ring D. Bus
A. Leading C. Organizing
B. Planning D. Controlling
27.Which one of the following is the Interaction between the client and server
starts via the message?
A. client_hello C. client_hi
B. server_hi D. server_hello
A. DHCP C. ARP
B. SMTP D. SNMP
34.If you make changes to an existing GPO (Group Policy Organization) that is
already linked in Active Directory, how fast do the policy settings take effect?
A. DHCP C. ARP
B. IP D. FTP
A. Sustain C. Sort
B. Shine D. Standardize
A. TRACERT C. ARP
B. PING D. IPCONFIG
42.The data link layer formats the message into pieces, each called _______
A. Byte C. Relay
B. Frame D. Packets
43.The IT director has asked you to ping a computer continuously; which of the
following is the best command to use?
A. ping –c C. ping –l
B. ping -t D. ping –d
A. Ping C. Ipconfig
B. Ipconfig D. Nslookup
47.In FTP protocol, client contacts server using ____ as the transport protocol.
A. User datagram protocol
B. Transmission control protocol
C. Datagram congestion control protocol
D. Stream control transmission protocol
48.An organization has a class B network and wishes to form subnets for 64
departments. The subnet mask would be
A. 255.255.252.0 C. 255.255.0.0
B. 255.255.64.0 D. 255.255.128.0
49.Which of the following server used to resolve server name into IP and vice-
versa?
A. WDS C. DNS
B. FTP D. IP SERVER
A. Technical C. Operational
B. Risk D. Economic
A. Phishing C. DoS
B. Sniffing D. Backdoor
59.You install the Routing and Remote Access service on a Windows 2008 Server
computer in your network. Your network is not directly connected to the
Internet and uses the private IP address range 192.168.0.0. When you try to
ping servers by using their IP addresses, you receive the following message:
"Request timed out." When you run the ipconfig command, it shows that your
dial-up connection has been given the IP address 169.254.75.182. What should
you do to resolve the problem?
A. Ensure that the remote access server is able to connect to a DHCP
server that has a scope for its subnet
B. Configure the remote access server with the address of a DHCP server
C. Authorize the remote access server to receive multiple addresses from
a DHCP server
D. Configure the remote access server to act as a DHCP Relay Agent
60.One of the following is Quality Assurance Functions
A. Procedures not followed
B. Technology transfer
C. Encouraging negative attitude
D. Lack of supervision/monitoring
61.What is the purpose of a vendor contract?
A. Allow all parties involved to understand what is expected in terms of
deliverables, payment, etc
B. Used to increase payments at any time for vendor.
C. To get sensitive data when the partnership expires.
D. Used to Rushing the process by vender.
62.Which utility is useful for troubleshooting NetBIOS name resolution problems?
A. Netstat C. PING
B. Hostname D. NBTSTAT
63.An administrator pings the default gateway at 10.10.10.1 and sees the output as
request time out. At which layer the problem?
64.Which of the following tools are used to modify the settings in a security
template?
A. Group Policy Object Editor
B. Group Policy Management console
C. Security Templates snap-in
D. Active Directory Users and Computers
65.What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?
66.You have a Windows Server 2008 computer. You want to disable all incoming
connections to the server. What should you do?
A. Disable the Windows Firewall with Advanced Security.
B. From the Windows Firewall, enable the Block All Connections
option on the Domain Profile
C. From the Services snap-in, disable the Server service.
D. From the Services snap-in, disable the Net Logon service.
67.If a number of devices are four (4) in mesh topology network then the number
of duplex links in the mesh topology ____________
A. Twelve C. Six
B. Two D. Five
69.Which of the following is not the environmental factor that influences the
learning process
A. Desire for personal growth and development
B. Training strategies, methods and techniques
C. Trainer/training team
D. General learning environment in the programme
70.Which of the following network cables would a technical find on the RJ-45?
A. Fiber C. USP
B. Coaxial cable D. Ethernet cable
72.The process of assigning permissions to set Group Policy for objects within an
organization unit (OU) is known as ___
A. Filtering C. Delegation
B. Inheritance D. Organization
A. 443 C. 110
B. 25 D. 995
75.The name of the protocol which provides virtual terminal in TCP/IP model is
A. SMTP C. FTP
B. HTTP D. Telnet
77.Each router interface has its own Address Resolution Protocol (ARP) module,
its own LAN address (network card address) and its own Internet Protocol (IP)
address.
A. Router C. Repeaterhh
B. Hub D. Switch
A. Routers B. Modems
C. Gateway D. Firewalls
A. Planning C. Monitoring
B. Validating D. Evaluating
85._____is a tool in Active Directory that installs and removes Active Directory
Domain Services and promotes domain controllers.
A. Ping C. IP Release
B. DCpromo D. Ipconfig.
86.A wireless network interface controller can work in ¬¬¬____
A. WDS mode
B. Infrastructure mode
C. ad-hoc mode
D. Both infrastructure mode and ad-hoc mode
87.Which one is decision made before the occurrence of an external or internal
change ?
A. Proactive C. Intuitive
B. Reactive D. Systematic
90.Which one of the following techniques used by hackers to trick the user in order
to disclose their username and password through fake websites?
95.__________ enable you to manage your networks with greater efficiency and
less network troubleshooting overhead.
96.If correct time zone information is not used and your servers’ clocks run at
different times, what is most likely to have issues on your network?
A. 30 C. 32
B. 8 D. 6
A. Distortion C. Crosstalk
B. Attenuation D. EMI
A. Cable C. Dial-up
B. DSL D. Satellite
102. The enable to simplify access to the shared folders on a network by setting
up folders to appear as though they are accessed from only one place.
103. The flow of information across persons of work units at the same
hierarchical level is called?
A. Viruses C. Worms
B. Ransom ware D. Social engineering
106. A leadership style in which the leader includes one or more employees in the
decision making process is?
109. _______ is used for assigning Class D IP addresses and related network
settings
111. Which one is the function network device amplifies the signal it receives on
one port before it transmits it on other ports?
A. Repeater C. Router
B. Bridge D. Switch/hub
A. POP3 C. RARP
B. ARP D. ICMP
A. Class C C. Class A
B. Class D D. Class B
116. Which of following connectors are commonly used with coaxial cabling?
A. BNC C. RJ-11
B. RJ-45 D. SC-LC
A. Star C. Bus
B. Mesh D. Ring
A. planning C. Observation
B. Management D. Directing
121. Which one is granting an outside organization access to internet web pages
is often implemented?
A. Intranet C. Hacker
B. Internet D. Extranet
122. On which stage of team development Members feel anger or frustration with
the task or with other members or may even resent the presence of formal
leadership?
A. Orientation C. Storming
B. Resolution D. Production
123. A network administrator is implementing a policy that requires strong,
A. Data
complex qualityWhich data protection goal C.
passwords. Datapolicy
does this integrity
support?
B. Data redundancy D. Data confidentiality
124. A user can login to his computer but cannot access network resources. The
user has all the appropriate group memberships and permissions, but he still
cannot access shared resources. What is the cause of this problem?
A. User has logged on to the domain instead of the local computer.
B. User has attempted to access a shared folder without appropriate
permissions.
C. User has logged on to the local computer instead of the domain.
D. User has entered the wrong password.
125. Which one of the following the method an organization uses to approve
anything from documents, invoices, budgets, and purchase orders, to a new
process.
126. In the computer networks, the encryption techniques are primarily used for
improving :
A. Security C. Performance
B. Reliability D. Longevity
A. Flash C. NVRAM
B. ROM D. RAM
129. How many hosts can be located on a network, where the IPv4 netmask is 27
A. 32
bits? C. 27
B. 30 D. 5
130. If correct time zone information is not used and your servers’ clocks run at
different times, what is most likely to have issues on your network?
131. Which one is the operational techniques and activity that are used to fulfill
requirement for quality.
133. How Many Broadcasting domain and collision domains are there in the
diagram below?(UC 02)
135. A device that can bridge several network structure is called _____
A. WAN C. Gateway
B. Repeater D. LAN
136. Which one of the following will not be considered in improved business
performance planning?
A. Transport C. Physical
B. Network D. Data link
A. Discouragement C. Apathy
B. Motivation D. Laziness
142. A device which can be connected to a network without using cable is called
143. Between Sites, you can also choose to use ________ for replication, but only
for changes in the Schema or Configuration.
144. What process involves placing one PDU inside of another PDU?
A. Encoding C. Encapsulation
B. Segmentation D. Flow control
A. DSL C. Dial-up
B. Cable D. Satellite
146. Which of the following refers to exploring the appropriate, ethical behaviors
related to the online environment and digital media platform?
149. Which of the following can be used to add, delete, or modify objects in
Active Directory, in addition to modifying the schema if necessary?
A. CSVDE C. LDIFDE
B. DCPROMO D. NSLOOKUP
150. Among the following the one that contains one or more domains that are in a
common relationship.
A. Root C. Forest
B. Tree D. Branch
A. VSPN C. VSN
B. VNP D. VPN
153. In business, there are several types of business organisation, what are these?
A. Class D C. Class E
B. Class C D. Class B
156. A user reported that his computer is slow. When a technician arrives. He
finds many unwanted program running at startup. The application that helps to
configure program at startup.
A. REGEDIT C. IPCONGIG
B. MSCONFIG D. WINLOGON
A. 5 C. 1
B. 0 D. 6
A. /26 B. /27
C. /24 D. /25
161. Which of the following terms best describes the component that enables
DHCP clients to communicate with DHCP servers on other subnets?
A. Forwarder C. Scope
B. Relay agent D. Resolver
A. 172.20.14.36 C. 168.172.19.39
B. 172.33.194.30 D. 127.0.0.1
165. The _____ tab is used to enable or disable a printer for sharing as well as to
specify the name of the share.
A. Location C. General
B. Sharing D. Advanced
168. You are in charge of a small network. The users want to have full control
over their data and still be able to share data with the rest of the office. The best
type of network to set up this.
169. Which one of the following is to translate domain names into IP Addresses?
170. You are an IT expert for EKAS Company. You are responsible for
interpreting system requests and specifications, site preparation and user
training, and contact point for customers. This skill is
A. Penetration C. Security
B. Eavesdropping D. Manipulation
A. Documentation C. Programming
B. Technical D. User
174. Which task does not the Dynamic Host Configuration Protocol perform?
A. Configure IP address parameters from DHCP server to a host.
B. Set the IP gateway to be used by the network
C. Assign IP address from the default pool.
D. Renew IP address from the default pool
175. You are the network administrator for ministry of education. Your network
consists of Windows 7/10 computers, and you want to assign static IP addresses
rather than use a DHCP server. You want to configure the computers to reside
on the 192.168.10.0 network. What subnet mask should you use with this
network address?
A. 255.255.0.0 C. 255.255.255.0
B. 255.255.255.255 D. 255.0.0.0
177. The response time and transit time is used to measure the ____________ of
a network.
A. Performance B. Longevity
C. Security D. Reliability
178. While gathering data to determine the organization business requirement you
might take records of the organization like, annual reports and organizational
policies. These kinds of information resources are considered as.
HNS 4
1. Which multiple access technique is used by IEEE 802.11 standard for
wireless LAN
a) CDMA c) ALOHA
b) CSMA/CA d) EVDO
a) TCP c) ICMP
b) Telnet d) SNMP
3. The time required to examine the packet’s header and determine where to
direct the packet is part of _________.
9. In which of the following protocols does a website (if accessed using the
protocol) encrypt the session with a Digital Certificate?
a) HTTPS c) TCPS
b) SHTTPS d) XHTTPS
a) DHCP c) SMTP
b) ARP d) SNMP
14.What is an ISP?
a) a protocol that establishes how computers within a local network
communicate
b) an organization that enables individuals and businesses to
connect to the Internet
c) a networking device that combines the functionality of several
different networking devices
d) a standards body that develops cabling and wiring standards for
networking
15.After obtaining the IP address, to prevent the IP conflict the client may
use______.
a) Unicasting c) Broadcasting
b) Domain server d) Multicasting
18.A back up types, which includes only those files that have been modified
since the last backup and clears the archive bit of the files it copies to the
backup medium.
a) Hub c) Switch
b) Network adapter card d) Router
a) Innovative c) Imprecise
b) Diverse d) Standard
1. DHCP 3. DNS
2. POP3 4. SMTP
39.Which of the following protocol used port 443 and port 80 respectively?
40.A new corporation needs a data network that must meet certain
requirements. The network must provide a low cost connection to sales
people dispersed over a large geographical area. Which type of WAN
infrastructure would meet the requirements?
a) Dedicated d) Satellite
b) Private infrastructure e) Maintenance
c) Public infrastructure
41.What do business employees often need to do before they are able to write
proposals?
42.The DoD model (also called the TCP/IP stack) has four layers. Which layer
of the DoD model is equivalent to the Network layer of the OSI model?
a) Internet c) Host-to-Host
b) Application d) Network Access
43.Which of the following is the valid host range for the subnet on which the
IP address 192.168.168.188 255.255.255.192 resides?
a) 192.168.168.129-190 c) 192.168.168.128-190
b) 192.168.168.128-192 d) 192.168.168.129-191
44.How many host addresses are available on the network 172.16.128.0 with a
subnet mask of 255.255.252.0?
a) Fast-forward c) Cut-through
b) Store-and-forward d) Fragment-free
45.Services that are required to enable another service to run are referred to as
service_____.
a) Roots c) Dependencies
b) Prerequisites d) Parent
46.A service that a computer uses to resolve NETBIOS names without any
administrative work on your network?
a) UDP c) DHCP
b) WINS d) FTP
a) Malware c) Spam
b) Spyware d) Virus
48.What security violation would cause the most amount of damage to the life
of a home user?
a) Capturing of personal data that leads to identity theft
b) Replication of worms and viruses in your computer
c) Spyware that leads to spam emails
d) Denial of service to your email server
49.Which of the following are layers in the TCP/IP model?am
1. Application
2. Session
3. Transport
4. Internet
5. Data Link
6. Physical
a) 1,3 and 4 c) 1 and 2
b) 2, 3 and 5 d) 3, 4 and 5
a) Leading c) Controlling
b) Planning d) Organizing
55.Which area of the network would a college IT staff most likely have to
redesign as a direct result of many students bringing their own tablets and
smart phones to school to access school resources?
57.Which term refers to a network that provides secure access to the corporate
offices by suppliers, customers and collaborators?
a) Internet c) Extranet
b) Extended net d) Intranet
62.One of the following is a business in which two or more people have agreed
to set up and run an enterprise together with the intent of making profit.
a) Delegation c) Redirection
b) Assignment d) Targeting
a) 22 c) 25
b) 23 d) 21
a) HTTP c) FTTP
b) SMTP d) ADSL
a) Class A c) Class D
b) Class B d) Class E
71.How many host addresses are available on the network 172.16.128.0 with a
subnet mask of 255.255.252.0
a) 512 c) 510
b) 1024 d) 1022
72.Protocols are?
a) Logical communication channels for transferring data
b) Physical communication channels sued for transferring data
c) Agreements on how communication components to
communicate
d) Wireless communication channels sued for transferring data
73.What flavor of Network Address Translation can be used to have one IP
address allow many users to connect to the global Internet?
a) Dynamic c) NAT
b) PAT d) Static
78.To perform a System State restore in Windows Server 2008, you will boot
the DC into what mode?
a) 172.16.28.0 c) 172.16.0.0
b) 172.16.24.0 d) 172.16.16.0
85.The network design for a college with users at five sites is being developed.
Where in the campus network architecture would servers used by all users
be located?
a) SMTP c) S/MIME
b) POP3 d) HTTP
a) 3. 3. 2. None c) 3. 2. 1. 7
b) 3. 3. 1. 7
94.Which of the following statement about a wireless LAN controller is true?
a) They can simplify the management and deployment of wireless
LANs
b) They must be configured through a GUI over HTTP or HTTPS
c) They are best suited to smaller wireless networks
d) They rely on external firewalls for WLAN security
95.In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) stream control transmission protocol
c) datagram congestion control protocol
d) user datagram protocol
e) customer
96.The time required to examine the packet’s header and determine where to
direct the packet is part of _________.
a) 1 only c) 3 and 4
b) 2, 3 and 4 d) 2and1
98.Microsoft Windows Server 2008 uses the Windows Installer with Group
Policy to install and manage software that is packaged into what type of
file?
a) .exe c) .mse
b) .in d) .msi
100. Which device performs the function of determining the path that
messages should take through internetworks?
106. It allows a visited website to store its own information about a user on
the user’s
a) Adware d) Malware
b) Cookies e) LAN
c) Spam
a) 60 c) 32
b) 64 d) 62
111. What process involves placing one PDU inside of another PDU?
a) Motivation c) Leadership
b) Effort management d) Need configuration
115. Which of the following elements is required to do after successfully
installation of DNS?
a) Dynamic IP address configuration
b) Active Directory configuration
c) WINDOWS 2000 clients configuration
d) Static IP address configuration
116. What does 'Kaizen' mean?
a) It is a system of inventory control.
b) It is the Japanese word for total quality management
c) Continuous improvement
d) A method of stock control involving colored stock cards
117. Which of the following services use TCP_________.
1. DHCP
2. SMTP
3. HTTP
4. TFTP
5. FTP
a) 1 and 2 c) 1, 3 and 4
b) 2, 3 and 5 d) 1, 2 and 4
123. DHCP uses UDP port number _________ for sending data to the
server
a) 67 c) 66
b) 68 d) 69
124. Users are complaining that they are unable to browse certain websites
on the Internet. An administrator can successfully ping a web server via its
IP address, but cannot browse to the domain name of the website. Which
troubleshooting tool would be most useful in determining where the
problem is?
a) Netstat c) Ipconfig
b) Nslookup d) Tracert
125. In which layer of the hierarchical enterprise LAN design model would
PoE (Power over Ethernet) for VoIP phones be considered?
a) Core c) Access
b) Distribution d) Physical
126. Which one of the following is the quality of employee’s work ethics?
127. You need to use disk quotas to send an e-mail to users when they have
consumed 800Mb of disk space and prevent users from consuming more
than 1 GB of disk space. How will configure it?
a) Create a hard quota with a 1GB limit. Create a warning at 80
percent
b) Create a soft quota with a 800MB limit and a second quota with a
1GB limit.
c) Create a soft quota with a 800MB limit. Create a warning at 80
percent
d) Create a hard quota with a 800mb limit and a second soft quota with
a limit 1GB
128. A leadership style in which the leader includes one or more
employees in the decision making process is?
a) Participative or
democratic
b) Authoritarian or
autocratic
c) Federalist
d) Delegate or free reign
1. . What does a yellow exclamation point next to a device in the Device Manager indicate?
A. A driver is not properly installed for this device.
B. The device is disabled.
C. The driver is not digitally signed.
D. The device driver needs to be upgraded.
2. You are planning to share a folder on the network. However, you would like to give
some users full access while limiting others to read-only access. Which of the following
can you do in Windows XP to accomplish this goal?
A. Map a network drive to each user who should have full access.
B. Select each username from the list of users, and apply full or read-only access
to each one.
C. Use the Depends on Password option.
D. You cannot apply more than one access type to a single shared folder.
3. Which of the following could be the cause of a “No operating system found” error?
A. A registry file is missing.
B. The boot loader file cannot be accessed.
C. The kernel file is corrupted.
D. the BOOT.INI file could not be found.
4. You are using an application and it hangs/stuck. Which of the following should you do
first?
A. Exit the application using the close button
B. Restart the computer.
C. Click the Details button.
D. Use task manager to close the application
5. You suspected that your computer had a virus, so you ran an antivirus utility. However,
the utility reported that no viruses were found. What should you do next?
A. Reinstall the affected application(s).
B. Delete the affected file(s).
C. Download an update for your antivirus utility.
D. Assume that there is no virus.
6. A network consists of five computers attached to a hub/switch. There is a break in one
computer’s network cable. How will this break affect the network?
A. The entire network will fail.
B. Only the computer attached to the faulty cable will be unable to access the
network.
C. Only computers that were booted before the computer with the faulty cable
will be able to Access the network.
D. Only computers that were booted after the computer with the faulty cable
will be able to access the network.
7. Which of the following points of failure will affect the connectivity of an entire star
network?
A. A single computer
B. A single cable
C. The backbone
D. The hub/switch
8. The process of rewriting parts of a file to contiguous sectors on a hard disk to increase
the speed of access and retrieval
A. Disk defragmentation
B. Disk formatting
C. Installing operating system
D. None
9. Which of the following can you use to replace an existing device driver in Windows?
A. the Install/Uninstall tab of the Add/Remove Programs utility
B. the Windows components tab of the Add/Remove Programs utility
C. The Device Manager
D. The Hardware Configuration Manager
10. When configuring a computer for network access, the computer name must:
A. Be unique
B. Match the names of the other computers on the network
C. Match the computer’s IP address
D. Be entered only if you are using the NetBEUI protocol
11. Which bus slot provides the highest video performance?
A. PCI
B. SCSI
C. AGP
D. ISA
12. Where is a hub specified in the OSI model?
A. Session layer
B. Physical layer
C. Data Link layer
D. Application layer
13. From what location are the 1st computer instructions available on boot up?
A. ROM BIOS
B. CPU
C. boot.ini
D. CONFIG.SYS
E. None of the above
14. With respect to a network interface card, the term 10/100 refers to
A. protocol speed
B. a fiber speed
C. megabits per seconds
D. minimum and maximum server speed
15. Which Motherboard form factor uses one 20 pin connector?
A. ATX
B. AT
C. BABY AT
D. All of the above
16. Most PCs give a single beep on boot up to indicate they are ok hardware wise. You boot
your PC and don't get a beep. What should you check first?
A. system board
B. RAM
C. c. Microprocessor
D. power supply
E. speaker
17. Which tool should always be used when working on the inside of the computer?
A. Cordless drill
B. Antistatic strap
C. Multimeter
D. Screwdriver
18. Which of the following form factors does a VGA connector comply with?
A. 8P8C
B. 15-pin D shell
C. micro ATX
D. RG-6
19. Which of the following is the most common type of cable used in bus networks?
A. CAT5
B. STP
C. Coaxial
D. Fiber-optic
B. Groups D. User
52. The advantage of a client /server network over a peer to peer network is
A. Performances is better on peer to peer
B. Security is patter on client/server
C. Easy to configuration the client/ server
D. Security is better on peer to peer
53. A remote user calls your help desk and complains that she is unable to access internal
corporate network resource from the remote site. The user states that she can access
the local resource. To solve this problem what is your primary advice
A. Cheek whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her computer setting
D. Check TCP/IP status of her computer
54. A server room is thickly populated with about 120 server installed on racks venous
network and power cable make it very difficult to work on the server when a technician
has work on the server usually it takes him or her along time to trace the cable on
several accessions some cables have been accidently pulled in the process which of the
following should you do avoid further problem.
A. Replace older cables with longer cable.
B. Put identification labels on all cables.
C. Remove redundant network and power cables.
D. Router all network and power cables.
55. You are the LAN administrator for your company you have couple windows XP
professional client that dial in via PPP to the company network RAS server you won’t
the remote client to be assigned dynamic IP address upon connecting you find that the
window XP computers didn’t get any IP address what should you do;
A. Run ipconfig with the/release and/ renew switch on the client.
B. Run ipconfig with the/menu all switch on the client.
C. Run winipctg on the client.
D. Run ipconfig full. You are hired to.
56. Investigate a show per terming network server for a client using the performance
monitor you obtain the following ridings CPU usage 25% Disk time =2% page faults =25
what one changes will increase the performance of the network server is most;
A. By another CPU. C. Increase RAM.
B. Add another hard drive. D. Add second NIC.
57. A large network with 500 users notices that at specific times in the morning and
afternoon network congestion times up their computers what is the most likely coleus.
A. Many users are logging on or off
B. Power functions.
C. Terminator is not grounded
D. The switch connecting the network goes down
58. Is responsible for addressing messages and translating addresses and name into
physical addresses
A. Layer 1 C. C. layer 3
B. B. layer 2 D. D. layer 4
59. Uses several protocols for routing and delivering packets
A. Internet layer C. Data link layer
B. Physical layer D. Application layer
60. Has the standard protocol used for interoperability among many different types of
computers.
A. HTTP C. TCP/TP
B. SMTP D. UDP
61. Add traffic flow information to determine when the packet get sent
A. Transport layer C. Data link layer
B. Network layer D. Session layer
62. Add error handling information
A. Internet layer C. Data link layer
B. Physical layer D. Application layer
63. Simplex transmission
A. TV C. Telephone communication
B. Computer network D. Skype
64. Which of the following is not true
A. In full duplex two device can communicate at the same time
B. In half duplex communication is takes place only in one direction
C. Telephone conversation is a full duplex communication
D. Radio uses a simplex communication
65. Which of the following is true
A. Computer network uses circuit switching
B. Telephone communication uses circuit switching
C. In packet switching, every packet follows the same route
D. All are true
66. Data formatting is takes place in layer of the OSI reference
A. Model D. Session layer
B. Physical Layer E. Application layer
C. Presentation layer
67. Internet explorer is found in layer of the OSI
A. Physical layer C. Application layer
89. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.
90. The reason that end users need to be aware of the security policy.
91. You are requested to setup a 100Mbps network for a client in an office that already has
10Mbps throughput. Your client wants to keep the costs to a minimum but he needs the
100Mbps throughput. The cabling solution you recommend.
A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable
92. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.
93. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
94. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.
A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down
95. An application that used to remotely and securely access the remote server.
A. Telnet
B. SSH
C. SFTP
D. RSA
96. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization
97. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.
98. While gathering data to determine the organization business requirement you might
take records of the organization like organizational policies and procedures. These
kinds of information resources are considered as
A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources
99. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?
100. A user can login to his computer but cannot access network resources. The user has
all the appropriate group memberships and permissions, but he still cannot access
shared resources. The cause of this problem
101. You enable disk quotas on a Windows Server 2008 file server. You configure a quota
limit of 100MB. A user, named Eyob, reports that he can still save large files to the
server, even though he is well above his quota limit. What should you do to correct the
problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the
Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.
102. A hierarchical structure made up of multiple domains that trust each other.
A. Root
B. Site
C. Organizational Unit
D. Tree
103. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?
105. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure
programs at startup.
A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32
106. You have a server that runs Windows Server 2008. You need to identify all the
unsigned drivers that are installed on the server. What should you do?
A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.
107. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?
A. Reset her computer account through the Active Directory Users and
Computers utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-
line utility.
108. A company with 40 computers needs to reduce repair costs, decrease downtime, and
reliability. Which task will meet these needs?
A. Enact a compressive security policy
B. Upgrade all the operating system
C. Create an automated system recovery CD
D. Develop a preventive maintenance plan
109. You have a TCP/IP network comprising nearly 30 computers. Currently, all
computers have been assigned IP addresses manually. The company is growing fast , and
a new consignment of 15 computers is arriving next week .You have decided to install
Dynamic Host Configuration Protocol ( DHCP) services on one of the servers .identify
which of the following are the advantages of using the DHCP server in the network.
A. Assignment of IP addresses will be automated.
B. The name resolution process will be automated.
C. Network traffic problems can be resolved.
D. The network can be monitored more efficiently.
110. A user installs a new sound driver in a computer that is working properly. After
installing the driver for the new sound card the computer fails to boot. Which quick fix
can the user implement to return to the previous working state?
A. Boot to start windows normally.
B. Boot to recovery console
C. Boot to last known good configuration
D. Boot to emergency recovery state
111. Which of the following are good practices in resolving complex network problems?
A. Work on the problem single-handedly because others might add to the problem.
B. Gather as much information as you think would be helpful in resolving the
problem.
C. If you cannot fix a problem, ask for help from hardware vendors who might have
faced the same problem in the past.
D. Try to read the hardware specification documentation so that you can get how to
solve the problem.
112. From the following options, identify the most critical problem that should be given
highest priority if one of the user in you network has complained that he/she cannot
access a given file server but they can access other files.
A. Check the network interface card’s functionality
B. Check the network response time.
C. Check whether the file is corrupted by malicious codes.
D. Check if the file server is reachable by your workstation
113. A system administrator is trying to determine which file system to use for server that
will become an active directory domain controller. Here the company’s requirements
include the following
The file system must allow for file security
The file system must make efficient use of space on larger partitions
The file system must allow auditing of logs and access to sensitive file
Which of the following file systems meets those requirements?
A. FAT
B. NTFS
C. FAT32
D. HPFS
114. One of the servers in your NOC crashed twice in one day. You have been assigned as
an administrator and event delegated one junior network practitioner to find out the
cause of the failure. Which of the following should be your advice for this practitioner to
perform for the first time?
A. Tell him to install the latest service pack.
B. Tell to Upgrade the NOS.
C. Tell to check the event logs.
D. Tell to wait for the next time the server crashes.
115. A customer orders a new computer and specify an internal read write , nonvolatile
storage device that uses low power ,has fast access to data , and is reliable. What is a
suitable storage device that meets these requirements?
A. DVD+/-RW drive
B. SATA hard drive
C. Solid state drive
D. USB flash drive
116. One of the following is not the basic necessities reason that writing policies and
procedures.
A. Operational need
B. Continuous improvement
C. Risk management
D. Maintain good name of the organization
117. One of the following policies is not included in information security policy
documents,
A. Copy right policy
B. Firewall policy
C. Data classification policy
D. Application Certification management policy
118. Which of the following is features of the Microsoft management console (MMC)
A. It displays computer performance information
B. It organizes operating system snap-ins
C. It requires administrative privilege to accesses
D. It enables virtual memories settings to be customized
119. Display data on hardware components such as Memory, CPU, and the hard drive in a
chart or graph which describes how these devices are operating.
A. Network Monitor
B. Task Manager
C. Performance Monitor
D. Protocol Analyzer
120. You are installing cables for an Ethernet network in an office. The office manager
doesn’t want the media hanging in the crawl spaces and drop ceiling and wants you to
share an existing conduit that already has telephone cables to hide the network cables
you are installing. The cable segments will not be over 100 m. which type of media
should you choose?
A. Coaxial
B. STP
C. UTP
D. Fiber optic
121. Your customer has a client/server Ethernet network consisting of a server and 255
computers running Windows XP. what kind of security would you recommend to him for
centralized control of access to files and directories on the network?
A. Setup a password for each file and groups for each directory
B. Setup a password for each file and directory shared
C. Setup groups of shared resources and users who have access to these groups
D. Setup a password for each user
122. You are hired to setup a 100Mbps Ethernet network for a client in an office that
already has cat 3 UTP installed. Your client wants to keep the costs to a minimum but
needs the 100Mbps throughput. What should you recommend?
A. Keep the existing cable but purchase 100Mbps hubs
B. Buy new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps NICs
C. Keep the existing infrastructure
D. Keep the existing cable but use 100Mbps patch cable from the wall outlet
123. A network administrator connects hosts A & B directly though the network
interface cards, however pinging between the hosts are unsuccessful. To provide
connectivity between hosts
A. A cross over cable should be used
B. A rollover cable should be used
C. Straight through cable should be used
D. Default gateway needs to be set on each host.
124. There are three types of Hubs. Which of the following options correctly describes
these types hub?
A. Passive ,dormant, special
B. Active ,dormant, passive
C. Passive ,active ,intelligent
D. Passive ,Active ,Turbo
125. As user attempt to boot the computer, the message “NTLDR is missing “is observed
on the screen. What will result from this situation?
A. The BIOS setup utility will start automatically
B. The computer will reboot continuously
C. The operating system will fail to load.
D. The initial self-test will fail to load.
126. A security policy defines
A. When users cannot log in to their computers
B. What users can and cannot do withier computer
C. How the user should install their down software
D. How complex user password should be
127. The IT manager asks you for a diagram showing every server on the network the
diagram that you should provide to his/her
A. Baseline network diagram
B. Logical network diagram
C. Physical network diagram
D. Wiring network diagram
128.Yonatan has been asked to find and implement an application that will enable his boss
to log in to and control a server remotely and securely. The application that would
work best
A. E- mail
B. FTP
C. SSH
D. Telnet
129.A place where you could find list of problem that occurred on a system
A. Event viewer
B. Network diagram
C. RAID
D. Wiring schematic
130.You want all network clients to download and install updates automatically during
night hours, however, you discover that some users are turning off their machine s at
night and updates are not being applied. The group policy that enables you to correct
this situation without changing the installation schedule?
A. Configure automatic updates
B. No auto-restart for updates scheduled installations
C. Reschedule automatic updates scheduled installations
D. Specified intranet Microsoft update service location
131. You are creating a number of user objects for a team of your organization temporary
workers. They will daily 9 a.m. to 5p.m. on contract that is scheduled to begin in one
month and end two months latter. They will bot work outside of that schedule. The
properties that you should bot configure initially to ensure maximum security for the
objects
A. Password never expires
B. Password
C. Logon hours account expires
132. When you open the properties dialog box for a computer objects in the active
directory users and computers console, you discover that no properties are displayed
in the operating system tab. The causes that make these properties to be absent
A. Password expired
B. Operating system has problems
C. Console is not opened properly
D. Computer has not joined domain
133. The minimum NTFS permissions required to allow users to open documents and run
program stored in a shared folder
A. Full control
B. List folder contents
C. Read & execute
D. Write
134. Assume that you are giving service add you want to measure its quality. The best way
to go about it.
A. Assess the time it takes to deliver the service
B. Implement periodic self-assessment to be completed by staff only
C. To give survey at the end of each interaction with customers to measure their
satisfaction
D. Wait until you receive a complaint from customers
135. Assume you ware working a project on IT training need assessment. The best way of
collecting detailing information?
A. Questioner
B. Interview
C. Observation
D. Research
136. Which one of the following is TPv6
A. 1:: B. 127.0.0.1 C. 1: D. ::1
137. The device used to prevent ESD between you & a computer component
a. Protocol
b. Peer to Peer
c. Topology
d. Client-Server
139. You want to connect two computers to a network. The two computers are found
130 meter and 300 meter away from the active devices (switch). Which type of cables
would you think to be more cost wise for your design?
a. UTP
b. Multimode
c. Single mode
d. coaxial
140. The best UTP cable to minimize or avoid crosstalk and signal attenuation
a) Cat-6
b) Cat-7
c) Cat-5E
d) Cat-5
141. From the following connective devices, one is not used to expand a ‘LAN’
a) Router
b) Hub
c) Switch
d) Repeater
142. Optical fiber cables transmit data in the form of light. One of the following devices is
used to convert data from the electric signal to light and convert light back to electric
signal at the destination computer
a. Modem
b. Multiplexer
c. Electromagnetic Induction
d. Codec
143. The best reason that ‘UTP’ cables are selected in most LAN:
a. Unix
b. BIOS
c. Linux
d. Firmware
145. A Circuit board inserted in to a slot on the system board to enhance the capability of
the computer is:-
a. Data card
b. IDE card
c. Expansion card
d. Driver card
146. A Set of rules and standards which enable two end devices to communicate
a. Program
b. Protocol
c. DNS
d. Browser
147. A computer that connects different networks in order to help for communication
among themselves
a. Router
b. Server
c. Mobile
d. Ethernet switch
148. From the four layers of the DoD model (also called the TCP/IP stack), one of the
options below is equivalent to the Network layer of the OSI model
a. Application
b. Host-to-Host
c. Internet
d. Network Access
149. To test the IP stack on your local host, choose the right IP address to ping
a. 127.0.0.0
b. 127.0.0.1
c. 255.0.0.127
d. 255.255.255.255
150. When computer is on, the POST program checks the computer working file the next
steps
a. Hard Disk
b. RAM
c. CPU
d. Expansion Card
152. The Router, Repeater and internet explorer operate at
E. FAT
F. NTFS
G. FAT32
H. HPFS
154. To provide a computer with a physical and electronic connection to a network ,what
must be installed?
A. A Hub B. A Repeater C. A NIC D. A Bridge
155. Your company has a LAN in its down office and has now set up a LAN in
manufacturing plant in the order . To enable everyone to share data and resource .b/n
the two LANs, What type of device (s0are needed to connect them ? choose the most
correct answer .
A. Modem B. cable C. hub D. Router
156. how many possible hosts are attached to each of the local area networks at yours
160. One Of the following network device is layer 2 (Data link layer) device
161. Which of the following network device is blocks unauthorized users to access
private data access private data?
164. when you tried to login to the server, you trail may failed, this failure event is
recorded
166. Which of the following TCP/IP protocol allows an application program on one
machine To send a data gram to an application program on another machine?
166. what part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
168. How many bits internet address is assigned to each host on a TCP/IP internet which
is used in all communication with the host?
169. with an IP address of 100, you currently have 80 subnets. What subnet musk should
you use to maximize the number of available hosts?
A. Session layer B. Physical layer C.. Data Link layer D. Application layer
171. The term “Duplex “ refers to the ability of the data receiving stations to echo back a
confirming message to the sender. In full duplex data transmission, both the sender
and the receiver
A. Cannot talk at one B. can receive and send data one at a time
C. can send or receive data one at a time D. can do one way data
transmission only
172. If a network users can’t access the network resources from the server, the most
probable cause of the problem is:
173. . suppose you are the network administrator for ABC.COM A windows server 2003
computer is configured as print server for print device that has a built in network
interface card .users of the print device report that they cannot print to it . You confirm
that the correct ip address and drivers are being used . You Suspect that there is a
problem with the MAC to Ip address resolution on the print server. You want to find
out w/c MAC address the print jobs are being sent to. w/c command should you run on
the print server?
179. You are the LAN administrator for your company. You have couple Windows XP
Professional clients that dial in via PPP to the company network’s RAS server. You want
the remote clients to be assigned dynamic IP addresses. Upon connecting, you find that
the Windows XP computers didn’t get any IP address. What should you do?
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
180. You are setting up a new Windows XP workstation on your network and your DHCP
server provides all of the normal TCP/IP configuration information. What must you do
to configure the IP address on the workstation after you add the TCP/IP protocol
A. Manually enter an IP address that is not in use on the network..
B. Find out what the subnet mask on your network is, and add this information
only.
C. The DHCP option is enabled automatically, and the server will auto-configure
everything
D. Put the address of the router in the default gateway, and put all 0s in the IP
field.
181. A Windows XP user complains that she cannot connect to any other computers on
her local subnet even when using the IP address to communicate. However, she can
ping 127.0.0.1 and her IP address and receive replies. Other users on her subnet do not
report having any trouble. What is the most probable cause of the problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured
correctly.
C. The NIC has a problem.
D. The computer is not configured to use DHCP
182. While reviewing the security logs for your server, you notice that a user on the
Internet has attempted to access your internal mail server. Although it appears that the
user's attempts were unsuccessful, you are still very concerned about the possibility
that your systems may be compromised. Which of the following solutions are you most
likely to implement?
A. A more secure password policy
B. File-level encryption
C. Kerberos authentication
D. A firewall system at the connection point to the Internet
183. You are hired to investigate a slow performing network server for a client. Using the
performance monitor you obtain the following readings: CPU usage= 25%, Disk time=
25%, Page faults/sec= 25.What one change will increase the performance of this
network server is the most?
A. buy another CPU
B. add another hard drive
C. increase RAM
D. add a second NIC
184. A large network with 500 users notices that at specific times in the morning and
afternoon network congestion ties up their computers. What is the most likely cause?
A. many users are logging on or off
B. power fluctuations
C. a terminator is not grounded
D. the switch connecting the network goes down
185. The best method to restore the latest copy of the registry in a Win 2003 Server is to
select the
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
D. Ctrl +Alt + Del keys
186. The most efficient way to control security in a client/ server network is to assign
permissions to
A. each shared resource
B. groups
C. directories
D. user
187. The advantage of a Client/Server network over a Peer-to-Peer network is
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Easy to configure the Client/Server
D. Security is better on a Peer-to-Peer
188. A remote user calls your help desk and complains that she is unable to access
internal corporate network resource from the remote site. The user states that she can
access the local resource. To solve this problem, what is your primary advice?
A. Check whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her Computer Setting
D. Check TCP/IP status of her computer
189. On a Network, where is a system acting as firewall typically located?
A. Between the client system and the server
B. Between two internal networks
C. Between the internal access point and in the internet
D. Between the internal network and internet access point
190. You are designing a network which needs to support 200 users. You do not plan to
extend the segment beyond the current number of users. Which subnet mask would
best meet your needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.255.255.200
191. You are the administrator for your company’s domain. You need to subdivide
groups in your organization with in active directory. If you want to separate sales from
marketing department, what could you use as a system of organizing this subdivision?
A. Creating Organizational units
B. Use user and Groups
C. Create site and subnet grouping
D. Build a container in a subnet group
192. A system administrator wants to remove a domain controller from a domain. Which
of the following is the easiest way to perform the task?
A. Reinstall server over existing installation and make the machine a member of
group
B. Use remove command
C. Use Active directory installation wizard to demote the domain controller
D. Reinstall server over existing installation and make a machine a member of
domain
193. The most secure and strong password from the following list is:
A. PassWOrd1
B. Pass_Word#1
C. PASSWORD1
D. paSS_Word1
194. You have just resolved a very complex network problem. During the process, you
made some configuration changes to a router and two of the Windows 2000 servers.
The changes were successful, and your manager is now very happy with your
performance. What should be your next step?
A. Ask your manager for a raise.
B. Document the changes you made to the router and servers.
C. Replicate the changes you made on two servers to all other servers.
D. Enable auditing on all servers to prevent problems in the future.
195. The lists of tasks required to maintain a network can vary widely, depending on the
goals and characteristics of that network. However, some network maintenance tasks
are common to most networks. Which of the following would be considered a common
task that should be present in any network maintenance model?
A. Performing database synchronization for a network’s Microsoft Active
Directory
B. Making sure digital certificates used for PKI are renewed in advance of their
expiration
C. Using Cisco Works to dynamically discover network device changes
D. Performing scheduled backups
196. Which of the following statements is true regarding scheduled maintenance?
A. Scheduled maintenance helps ensure that important maintenance tasks are
not overlooked.
B. Scheduled maintenance is not recommended for larger networks, because of
the diversity of maintenance needs.
C. Maintenance tasks should only be performed based on a scheduled
maintenance schedule, in order to reduce unexpected workflow
interruptions.
D. Scheduled maintenance is more of a reactive approach to network
maintenance, as opposed to a proactive approach.
197. Which of the following components would NOT expect to find in a set of network
documentation?
A. Logical topology diagram
B. Listing of interconnections
C. License files
D. IP address assignments
198. Which of the following is NOT components that would be most useful when
recovering
from a network equipment outage? (Choose three.)
219. Assume that you are giving a service and you want to measure its quality. The best
way to do this is
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to
measure their satisfaction
D. Wait until you receive a complaint from customers
220. A user can login to his computer but cannot access network resources. The user has
all the appropriate group memberships and permissions, but he still cannot access
shared resources. The cause of this problem
A. All clients download updates from a single WSUS server at the head office.
B. Each location has an independent WSUS server that serves local clients.
C. Each remote location has replica WSUS servers that copy their configuration from the
head office WSUS server.
D. Each remote location has a disconnected WSUS server and updates are imported on
those servers from DVD.
222. Your company has a main office and a branch office. You deploy a read-only domain
controller (RODC) that runs Microsoft Windows Server 2008 to the branch office. You need to
ensure that users at the branch office are able to log on to the domain by using the RODC. What
should you do?
223. A technician receives an urgent call that the switch in Accounting Department is
down. Which of the following should the technician do FIRST to troubleshoot this
issue?
D. Escalate if necessary
224. A common method used to prevent the unauthorized network devices from sending
traffic across a network is port.
A. Spanning
B. Address translation
C. Mirroring
D. Authentication
225. The type of license key allows you to host an activation service locally within your
own network.
226. A new project requires that users in your domain and in the domain of a partner
Organization have access to a shared folder on your file server. Which type of group
should you create to manage the access to the shared folder?
227. You are giving training about computer and network maintenance for a
maintenance team. As a trainer, the first step in the maintenance process you
recommend.
A. 255.255.255.240
B. 255.255.255.244
C. 255.255.255.250
D. 255.255.255.242
229. The reason that end users need to be aware of the security policy.
230. You are a network administrator at XYZ Company, and one of your tasks is designing
the company security policy. The element NOT to be specified in an enterprise security
policy.
A. Separation of duties
B. Collusion
C. Least privilege
D. Delegation of power
234. While you are configuring new wireless clients, none of the new clients is able to
connect to the network, but clients already on the same access point do not have any
connectivity problem. Which is NOT the possible reason for this problem?
C. An incorrect IP address
235. You a network administer for ABC Company. You are verifying the configuration of a
newly installed host by establishing an FTP connection to the remote server. The
highest layer of the protocol stack you are using for this operation.
A. Application
B. Presentation
C. Session
D. Transport
236. You have a domain controller that runs Windows Server 2008 and is configured as a
DNS Server. You need to record all Inbound DNS queries to the Server. What should you
configure in the DNS Manager console?
237. You are the network administrator for your company. The network consists of single
Active Directory domain . All domains controllers run windows server 2003.All client
computers run window xp professional with default settings some users have Laptop
computers and the rest have desktop computers you need to ensure that as users are
authenticated by a domain controller when they log on How should you modify the local
security policy?
A. Request authentication by a domain controller to unlock the client computer
B. Cache zero interactive logons
C. Cache 50 interactive logons
D. Grant the log on locally users right to the user group
238. Your network contains a server named server1 that runs windows server 2008sercice
pack 2(sp2).You install a new network adapter on server1.you need to view the media
access controller (MAC)address for the new network adapter. What should you do?
A. At the command prompt, run IP config /all.
B. At the command prompt, run Net view\\serve1
C. From the device manager snap-in, view the properties of the network adapter
D. From the services snap-in, view the properties on the network connection
service.
239. Which Layer the OSI reference model is responsible for determining the available of the
receiving program and checking and to see if enough resources exist for communication?
A. Transport
B. Network
C. Presentation
D. Application
240. As network administrator you are called in to troubleshoot a problem on a token ring
network the network uses two MSAUs connected using the ring in ports on both devices . a
network card are sent at the same speed what is the likely cause of the problem?
A. Bad network card
B. Break on the network
C. MSAU configuration
D. Network card configuration
241. Which of the following definition describes the loss of signal strength as a signal travels
through a particular media?
A. Attenuation
B. Cross talk
C. EMI
D. Chatte
242. You are troubleshooting a problem in which a user is experiencing periodic problems
connecting to the network .Upon investigation you find that the cable connecting the user’s
pc to the switch is close to a fluorescent light fitting. What condition is most likely causing
the problem?
A. Cross talk
B. EMI
C. Attenuation
D. Faulty cable
243. Which one of the following is behavior of good team members?
A. Share responsibilities
B. Keep individual information about development
C. Do not respect the opinions of others in the team
D. Do not take turns
244. Which of the following devices forwards data packets to all connected ports?
A. Router
B. Switch
C. Bridge
D. Hub
245. Which of the following OSI layers is responsible for establishing connections between
two devices?
A. Network
B. Transport
C. Session
D. Data link
246. Which of the following addresses is a class B address?
A. 129.16.12.200
B. 126.15.16.122
C. 211.244.212.125
D. 193.17.101.27
247. You are the network administrator for a large company. You have recently been tasked
with supplying internet access to all network users. which of the following could you do to
accomplish this?
A. Implement a firewall
B. Implement a proxy server
C. Enable port 80 on all workstations
D. Disable port 80 on all workstations
248. Which of the following is categorized richest channel in conveying information
effectively?
A. Telephone
B. Posted notices and bulleting
C. Face to face communication
D. Email
249. Assume that you are giving a service and you want to measure its quality. The best way
to get about it?
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction which customers to measure
their satisfaction
D. Wait until you receive a complaint from customer
250. Assume you were working a project on IT training need assessment. The best way of
collecting detailed information?
A. Questioner
B. Interview
C. Observation
D. Research
251. The flow of information across persons of work units at the same hierarchical level is
called?
A. Lateral communication
B. Vertical communication
C. Down ward communication
D. Upward communication
252. The IT Manager asks you for a diagram showing every server on the network. The
diagram that should provide to his/her
A. Baseline Network diagram
B. Logical network Diagram
C. Physical network diagram
D. Writing network diagram
253. A type of network that supports two more organizations and that allows controlled
access from the outside for specific purposes
A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)
254. What does safe mode allow you to do?
A. Runs windows without processing AUTOEXEC>BAT and CONFIG.SYS
B. Boot the system without scanning drivers
C. Start windows using only basic files and drivers
D. Skip loading the registry
255. A document jointly developed by management and quality experts to express the
quality objective of the organization, the acceptable level of the quality and duties of
specific department to ensure the quality is called?
A. Quality policy
B. Quality control
C. Quality management plan
D. Quality system procedure
256. Where would you configure a workstations too boot from the USB drive firs and hard
drive only if there is not a bootable USB device attached?
A. NTLDR
B. C:\Windows\TEMP\1st.txt
C. Boot.ini
D. Configure in workstations BIOS
257. Routers operate at layer-----. Repeaters operate at layer-----and internet explore operate at
layer----.
e. Transport layer, network layer, physical layer
f. Network layer, physical layer, not include all layers
g. Physical layer, data link layer, application layer
h. Session layer, application layer , presentation layer
258. OSI layer data is encapsulated in -------- order.
a. Data , frame, packet, segment, bit
b. Segment ,data ,packet, frame, bit
c. Data , segment, packet, frame, bit
d. Data, segment, frame, packet, bit
259. To connect two switches we use ------ type of RJ45 UTP cable
a. Straight through
b. Crossover cable
c. Rollover cable
d. DB 9 cable on both sides.
260. ----- IP address pool provides a maximum of only 254 host addresses per network ID.
a. Class A
b. Class D
c. Class E
d. Class C
261. The DoD model (also called the TCP/IP stack) has four layers. From these four layers ------------ is
equivalent to the Network layer of the OSI model.
e. Application
f. Host-to-Host
g. Internet
h. Network Access
262. To test the IP stack on your local host, you ping----- IP address.
e. 127.0.0.0
f. 255.0.0.127
g. 255.255.255.255
h. 127.0.0.1
263. the frequency range of the IEEE 802.11b ,802.11a ,802.11g are
a. 2.4Gbps , 5Gbps, 2.4Gbps
b. 5Gbps , 2.4GHz, 2.4Gbps
c. 2.4GHz , 5GHz, 2.4GHz
d. 5GHz, 5GHz , 5GHz
264. ------ is layer 1 device and can be used to enlarge the area covered by single LAN segment.
a. Hub
b. Ethernet Switch
c. ADSL
d. Desktop computer
a. Catastrophic failure
b. Upset failure
c. Degradation failure
d. Latent failure
273. The device used to prevent ESD between you & a computer component is:-
e. Protocol
f. Peer to Peer
g. Topology
h. Client-Server
276. The two types of coaxial cables are:-
e. UTP & STP
f. Multimode & Single mode
g. 10BaseT & 100BaseT
h. Thinnet & Thicknet
277. The gradual deterioration of the signal strength across the long distance of ‘LAN’ is:-
a. Distortion
b. Attenuation
c. Amplification
d. Signal modification
278. More resistant ‘UTP’cable to crosstalk and signal attenuation is
e) Cat-6
f) Cat-7
g) Cat-5E
h) Cat-5
279. From the following connective devices, one is not used to expand a single ‘LAN’
e) Router
f) Hub
g) Switch
h) Repeater
280. Optical fiber cables transmit data in the form of light. One of the following devices is used to
convert data from the electric signal to light and convert light back to electric signal at the
destination computer
e. Modem
f. Multiplexer
g. Electromagnetic Induction
h. Codec
281. The reason that ‘UTP’ cables are selective in most ‘LAN’ is because they:
283. -------- used at startup & after startup by the operating system to provide software control of
hardware device
a) ROM
b) BIOS
c) CPU
d) RAM
284. A Circuit board inserted in to a slot on the system board to enhance the capability of the
computer is:-
a) Data card
b) IDE CARD
c) Expansion card
d) Driver card
285. A Set of rules and standards that two end devices used for communication
e. Program
f. Protocol
g. Process
h. Booting
286. A computer that stores program and data to be used remotely by other computer
a) Client
b) Server
c) Mobile
d) Ethernet switch
287. Division of hard drive that can be used to hold logical drive:-
e) Defragment
f) Folders
g) Disk management
h) Partition
288. The DoD model (also called the TCP/IP stack) has four layers. From these four layers ------------ is
equivalent to the Network layer of the OSI model.
i. Application
j. Host-to-Host
k. Internet
l. Network Access
289. To test the IP stack on your local host, you ping----- IP address.
i. 127.0.0.0
j. 255.0.0.127
k. 255.255.255.255
l. 127.0.0.1
290. All computer components get power from mother board except--------
a) Ram
b) CPU
c) Expansion Card
d) Hard Disk
291. Routers operate at layer-----. Repeaters operate at layer-----and internet explore operate at
layer----.
298. One Of the following network device is layer 2 (Data link layer) device
302. when you tried to login to the server, you trail may failed, this failure
event is recorded
307. How many bits internet address is assigned to each host on a TCP/IP
internet which is used in all communication with the host?
308. with an IP address of 100, you currently have 80 subnets. What subnet
musk should you use to maximize the number of available hosts?
310. The term “Duplex “ refers to the ability of the data receiving stations
to echo back a confirming message to the sender. In full duplex data
transmission, both the sender and the receiver
A. Cannot talk at one B. can receive and send data one at a time
311. If a network users can’t access the network resources from the
server, the most probable cause of the problem is:
312. suppose you are the network administrator for ABC.COM A windows
server 2003 computer is configured as print server for print device that
has a built in network interface card .users of the print device report that
they cannot print to it . You confirm that the correct ip address and
drivers are being used . You Suspect that there is a problem with the MAC
to Ip address resolution on the print server. You want to find out w/c MAC
address the print jobs are being sent to. w/c command should you run on
the print server?
A. net session B. netstant.exe C. netsh.exe D. netcape.exe
313. To provide a computer with a physical and electronic connection to a network, what must be
installed?
A. A hub
B. A router
C. A NIC
D. A Bridge
314. One of the following is an example of a network?
A. A computer attached to a printer and a scanner to input and output information
B. Computer systems sharing a common communication medium for the purpose of sharing
information or devices
C. Several printers connected to a switch box going to a single terminal
D. Several diskettes holding information for one workstation
315. You have successfully implemented a network of about 20 computers. The network is connected
to the Internet, and all users have been granted equal access. You are designated as the network
administrator. Due to a staff shortage, you also have to do some jobs that are supposed to be done
by an ordinary user. Which account should you use for this purpose?
A. Create a new user as non administrative account for yourself.
B. Use another user's account.
C. Copy the Administrator account and rename it.
D. Do nothing. Keep using the Administrator account.
316. You have made some changes to file and directory permissions on one of the servers on your
network. You want to verify the new settings before informing the users of the changes. How can
you verify that the changes have taken affect and that no security problems arise from them?
A. Ask a trusted user to perform the tests for you.
B. Use your own Administrator account to perform the tests.
C. Create a test account for the purpose.
D. Do nothing. Changes made with administrative privileges are always correct.
317. A server room is thickly populated, with about 120 servers installed on racks. Various network
and power cables make it very difficult to work on the servers. When a technician has to work on
the servers, usually it takes him or her a long time to trace the cables. On several occasions, some
cables have been accidentally pulled in the process. Which of the following should you do to avoid
further problems?
A. Replace older cables with longer cables.
B. Put identification labels on all cables.
C. Remove redundant network and power cables.
D. Reroute all network and power cables.
318. You are the LAN administrator for your company. You have couple Windows XP Professional
clients that dial in via PPP to the company network’s RAS server. You want the remote clients to be
assigned dynamic IP addresses. Upon connecting, you find that the Windows XP computers didn’t
get any IP address. What should you do?
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
319. You are setting up a new Windows XP workstation on your network and your DHCP server
provides all of the normal TCP/IP configuration information. What must you do to configure the IP
address on the workstation after you add the TCP/IP protocol
A. Manually enter an IP address that is not in use on the network..
B. Find out what the subnet mask on your network is, and add this information only.
C. The DHCP option is enabled automatically, and the server will auto-configure everything
D. Put the address of the router in the default gateway, and put all 0s in the IP field.
320. A Windows XP user complains that she cannot connect to any other computers on her local
subnet even when using the IP address to communicate. However, she can ping 127.0.0.1 and her IP
address and receive replies. Other users on her subnet do not report having any trouble. What is the
most probable cause of the problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured correctly.
C. The NIC has a problem.
D. The computer is not configured to use DHCP
321. While reviewing the security logs for your server, you notice that a user on the Internet has
attempted to access your internal mail server. Although it appears that the user's attempts were
unsuccessful, you are still very concerned about the possibility that your systems may be
compromised. Which of the following solutions are you most likely to implement?
A. A more secure password policy
B. File-level encryption
C. Kerberos authentication
D. A firewall system at the connection point to the Internet
322. You are hired to investigate a slow performing network server for a client. Using the
performance monitor you obtain the following readings: CPU usage= 25%, Disk time= 25%, Page
faults/sec= 25.What one change will increase the performance of this network server is the most?
E. buy another CPU
F. add another hard drive
G. increase RAM
H. add a second NIC
323. A large network with 500 users notices that at specific times in the morning and afternoon
network congestion ties up their computers. What is the most likely cause?
A. many users are logging on or off
B. power fluctuations
C. a terminator is not grounded
D. the switch connecting the network goes down
324. The best method to restore the latest copy of the registry in a Win 2003 Server is to select the
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
D. Ctrl +Alt + Del keys
325. The most efficient way to control security in a client/ server network is to assign permissions to
A. each shared resource
B. groups
C. directories
D. user
326. The advantage of a Client/Server network over a Peer-to-Peer network is
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Easy to configure the Client/Server
D. Security is better on a Peer-to-Peer
327. A remote user calls your help desk and complains that she is unable to access internal corporate
network resource from the remote site. The user states that she can access the local resource. To
solve this problem, what is your primary advice?
A. Check whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her Computer Setting
D. Check TCP/IP status of her computer
328. On a Network, where is a system acting as firewall typically located?
A. Between the client system and the server
B. Between two internal networks
C. Between the internal access point and in the internet
D. Between the internal network and internet access point
329. You are designing a network which needs to support 200 users. You do not plan to extend the
segment beyond the current number of users. Which subnet mask would best meet your needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.255.255.200
330. You are the administrator for your company’s domain. You need to subdivide groups in your
organization with in active directory. If you want to separate sales from marketing department,
what could you use as a system of organizing this subdivision?
A. Creating Organizational units
B. Use user and Groups
C. Create site and subnet grouping
D. Build a container in a subnet group
331. A system administrator wants to remove a domain controller from a domain. Which of the
following is the easiest way to perform the task?
A. Reinstall server over existing installation and make the machine a member of group
B. Use remove command
C. Use Active directory installation wizard to demote the domain controller
D. Reinstall server over existing installation and make a machine a member of domain
332. The most secure and strong password from the following list is:
A. PassWOrd1
B. Pass_Word#1
C. PASSWORD1
D. paSS_Word1
333. You have just resolved a very complex network problem. During the process, you made some
configuration changes to a router and two of the Windows 2000 servers. The changes were
successful, and your manager is now very happy with your performance. What should be your next
step?
A. Ask your manager for a raise.
B. Document the changes you made to the router and servers.
C.Replicate the changes you made on two servers to all other servers.
D. Enable auditing on all servers to prevent problems in the future
334. The lists of tasks required to maintain a network can vary widely, depending on the goals and
characteristics of that network. However, some network maintenance tasks are common to most
networks. Which of the following would be considered a common task that should be present in any
network maintenance model?
E. Performing database synchronization for a network’s Microsoft Active Directory
F. Making sure digital certificates used for PKI are renewed in advance of their expiration
G. Using Cisco Works to dynamically discover network device changes
H. Performing scheduled backups
335. Which of the following statements is true regarding scheduled maintenance?
E. Scheduled maintenance helps ensure that important maintenance tasks are not
overlooked.
F. Scheduled maintenance is not recommended for larger networks, because of the
diversity of maintenance needs.
G. Maintenance tasks should only be performed based on a scheduled maintenance
schedule, in order to reduce unexpected workflow interruptions.
H. Scheduled maintenance is more of a reactive approach to network maintenance, as
opposed to a proactive approach.
336. Which of the following components would NOT expect to find in a set of network
documentation?
E. Logical topology diagram
F. Listing of interconnections
G. License files
H. IP address assignments
337. Which of the following is NOT components that would be most useful when recovering
from a network equipment outage? (Choose three.)
355. A user calls to report that cannot access network resources. You investigate
and discover that the IP address of the user’s computer is 169.254.0.6. You also
discover that other clients on the same subnet are experiencing the same
problem. You must provide network connectivity for the user. What should you
do?
A. Enabling Automatic Private IP addressing
B. Disable Automatic private IP addressing
C. Ensure the computer is enabled as a DHCP client
D. Ensure a DHCP server or DHCP relay agent resides on the local
subnet
356. A piece of hardware or software on the network to prevent some
communications forbidden by the network policy.
A. Proxy server B. Networks address translator C. Firewall D. Network
interface controller
357. A device which amplifies or regenerates digital signals received while sending
them from one part of a network into another?
A. Bridge B. Repeater C. Switch D. Router
358. You have made changes to file and directory permissions on a server on a
netwok .you want to verify the new settings before informing the users of the
changes . How can verify that the changes have taken affect and that no
security problems arise from them?
A. Ask a trusted user to perform the tests for you
B. Use your own administrator account to perform the tests
C. Create a test account for the purpose
D. Do nothing , changes made with administrative privileges are always
correct
359. You find that an abnormal amount of traffic is passing between the DNS and
the DNS clients. Which tool would best help you ascertain the cause of excess
traffic?
A. Tracer B. Event Viewer C. System Monitor D. Security Monitor
360. In OSI network architecture , the dialogue control and token management are
responsibility of
A. Datalink layer B. Session layer C. Network layer D. Transport layer
361. Communication modes support two – way traffic but in only one direction at a
time?
A. Simplex B. Three quarters duplex C. Half duplex D. Full duplex
362. You install file and printer sharing for Microsoft networks. You share a folder
and leave the password option blank. Who can gain access to the folder?
A. Windows 98 will not allow a blank password in this field
B. Anyone with internet Explorer installed
C. Only users that are members of the same workgroup as you
D. Anyone who can gain access to your network and has a Microsoft
redirector such as the client for Microsoft networks installed
363. What is a firewall in computer network?
A. The physical boundary of a network
B. An operating system of computer network
C. A system designed to prevent unauthorized access
D. A web browsing software
364. You are the LAN administrator for your company. You have couple windows
XP professional clients that dial in via PPP to the company network’s RAS server.
You want the remote clients to be assigned dynamic IP addresses. Upon
connecting, you find that the windows XP computers did not get any IP address.
What should you do?
A. Run ipconfig with the/release all and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
365. A large network with 500 users notices that at specific times in the morning
and afternoon network congestion ties up their computers. What is the most
likely cause?
A. Many users are logging on or off
B. Power fluctuations
C. A terminator is not grounded
D. The switch connection the network goes down
366. The best method to restore the latest copy of the registery in a win 2003
server is to select the
A. Emergency repair desk (ERD) C. Recovery console
B. Last known good configuration D. Ctr l+ Alt + Delete keys
367. The most efficient way to control security in a client/server network is to
assign permission to
A. Each shared resource B. Groups C. Directories D. User
368. The advantage of a client/server network over a peer- to – peer network is
A. Performance is better on a peer- to – peer
B. Security is better on a client/server
C. Easy to configure the client /server
D. Security is better on a peer- to – peer
369. A remote user complains that he is unable to access internal corporate
network resource from the remote site. The user states that he can access the
local resource. What is your primary advice to solve this problem?
A. Check whether he can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of his computer setting
D. Check TCP/IP status of his computer
370. A system acting as firewall on the network typically located between?
A. The client system and the server
B. Two internal networks
C. The internal access point and in the internet
D. The internal network and internal access point
371. Which of the following is correct regarding class B address or IP address?
A. Network bit--14, Host bit—16
B. Network bit--16, Host bit—14
C. Network bit--18, Host bit—16
D. Network bit--12, Host bit—14
372. The administrators for a company’s domain need to subdivide groups in
organization with in active directory. If he wants to separate sales from
marketing department, what could he use as a system of organizing this
subdivision?
A. Creating organizational units
B. Use user and Groups
C. Create site & subnet grouping
D. Build a container in a subnet group
373. A system administrator wants to remote a domain controller from a domain.
Which is the easiest way to perform the task?
A. Re- install server over existing installation and make the machine a
member of group
B. Use remove command
C. Use active directory installation wizard to remove the domain
controller
D. Re- install server over existing installation and make a machine a member
of domain
374. ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
375. Which of the following laye of OSI model also called end- to – end layer?
A. Presentation layer B. Network Layer C. Session Layer D. Transport
Layer
376. The company that have 240 computers .it also increase the numbers of computers for the
other office there are 15 computers added. the company wants to keep the computers
efficiency ,decrease down failure and slow down speed .what activities taken
A. install the new operating system B. create PM plan
A. Install malicious software D. use replacement by the frailer one
377. You are install the new driver software for your computer ,after you install the compute
become reboot and cannot finish the boot process .then what do you do
A. Boot the computer last known good configuration C. un install the installed driver
B. Boot the computer normally D. boot the computer by safe
mode
378. Your are working in a team with in one operation ,one of the member of the team
disturbs the team .what do you take to resolve this situation
A. Remove him the team C. discarded from the team
B. Advice for him the good approach D. out of the member your self
379. Which step is correct to inter the safe mode
A. Click Start control penal safe mode
B. Press F5 key on the keyboard until the system running
C. Press F2 set up key for dell computer
D. Press the F8 key when the system start up
380. Which one of the following is the correct order of the Hub
A. Active , Passive and dormer C. passive ,active and hybrid
B. Active ,passive and good D. none of the above
381. Which one of the following media is more sensitive for magnetically interference
387. Some protocols are considered to be technically non-routable. Which of the following
statements best describes the most common reason why a protocol would be considered non-
routable?
A. It does not contain the appropriate Data Link layer information required by routers.
B. It uses advanced Transport layer services to move across the Internet and avoids the
routing overhead required by the more primitive networking protocols.
C. It defines Physical layer network addresses for internal routing.
D. It does not specify the Network layer addresses required by routers.
A. 1 C. 0
B. 10101010
D. 1111111
389. Used to connect different media types but cannot filter or segment traffic?
A. Bridge
B. Hub
C. Router
390. You are configuring a router. According to the manual, you will need a transceiver to
connect to the LAN ports of the router. What kind of physical interface does the router have?
A. MSAU C. AUI
B. RJ-11 D. BNC
391. Which of the following are connectionless protocols? (Choose the three best answers.)
A. IP C. IPX
B. TCP D. UDP
394. You install File and Printer Sharing for Microsoft Networks. You share a folder and leave the
password option blank. Who can gain access to the folder
A. Anyone who can gain access to your network and has a Microsoft redirector such as
the Client for Microsoft Networks installed.
B. Windows 98 will not allow a blank password in this field.
C. Anyone with Internet Explorer installed.
D. Only users that are members of the same workgroup as you
B. MAC address
405. OSI layer responsible for error checking frames and adding MAC addresses to its tables?
A. presentation
B. transport
C. data-link
406. A user calls to report that cannot access network resources. You investigate and discover that the
IP address of the user’s computer is 169.254.0.6. You also discover that other clients on the same subnet
are experiencing the same problem. You must provide network connectivity for the user. What should
you do?
E. Enabling Automatic Private IP addressing
F. Disable Automatic private IP addressing
G. Ensure the computer is enabled as a DHCP client
H. Ensure a DHCP server or DHCP relay agent resides on the local subnet
407. A piece of hardware or software on the network to prevent some communications forbidden by
the network policy.
B. Proxy server B. Networks address translator C. Firewall D. Network interface controller
408. A device which amplifies or regenerates digital signals received while sending them from one
part of a network into another?
B. Bridge B. Repeater C. Switch D. Router
409. You have made changes to file and directory permissions on a server on a netwok .you want to
verify the new settings before informing the users of the changes . How can verify that the changes
have taken affect and that no security problems arise from them?
E. Ask a trusted user to perform the tests for you
F. Use your own administrator account to perform the tests
G. Create a test account for the purpose
H. Do nothing , changes made with administrative privileges are always correct
410. You find that an abnormal amount of traffic is passing between the DNS and the DNS clients.
Which tool would best help you ascertain the cause of excess traffic?
B. Tracer B. Event Viewer C. System Monitor D. Security Monitor
411. In OSI network architecture , the dialogue control and token management are responsibility of
B. Data link layer B. Session layer C. Network layer D. Transport layer
412. Communication modes support two – way traffic but in only one direction at a time?
C. Simplex B. Three quarters duplex C. Half duplex D. Full duplex
413. You install file and printer sharing for Microsoft networks. You share a folder and leave the
password option blank. Who can gain access to the folder?
E. Windows 98 will not allow a blank password in this field
F. Anyone with internet Explorer installed
G. Only users that are members of the same workgroup as you
H. Anyone who can gain access to your network and has a Microsoft redirector such as the
client for Microsoft networks installed
414. What is a firewall in computer network?
E. The physical boundary of a network
F. An operating system of computer network
G. A system designed to prevent unauthorized access
H. A web browsing software
415. You are the LAN administrator for your company. You have couple windows XP professional
clients that dial in via PPP to the company network’s RAS server. You want the remote clients to be
assigned dynamic IP addresses. Upon connecting, you find that the windows XP computers did not
get any IP address. What should you do?
E. Run ipconfig with the/release all and /renew switch on the client
F. Run ipconfig with the /renew all switch on the client
G. Run winipcfg on the client
H. Run ipconfig/all
416. A large network with 500 users notices that at specific times in the morning and afternoon
network congestion ties up their computers. What is the most likely cause?
E. Many users are logging on or off
F. Power fluctuations
G. A terminator is not grounded
H. The switch connection the network goes down
417. The best method to restore the latest copy of the registery in a win 2003 server is to select the
B. Emergency repair desk (ERD) C. Recovery console
D. Last known good configuration D. Ctr l+ Alt + Delete keys
418. The most efficient way to control security in a client/server network is to assign permission to
B. Each shared resource B. Groups C. Directories D. User
419. The advantage of a client/server network over a peer- to – peer network is
E. Performance is better on a peer- to – peer
F. Security is better on a client/server
G. Easy to configure the client /server
H. Security is better on a peer- to – peer
420. A remote user complains that he is unable to access internal corporate network resource from the
remote site. The user states that he can access the local resource. What is your primary advice to solve
this problem?
E. Check whether he can ping successfully to the default gateway
F. Check whether the NIC is functioning
G. Check subnet mask of his computer setting
H. Check TCP/IP status of his computer
421. A system acting as firewall on the network typically located between?
E. The client system and the server
F. Two internal networks
G. The internal access point and in the internet
H. The internal network and internal access point
422. Which of the following is correct regarding class B address or IP address?
E. Network bit--14, Host bit—16
F. Network bit--16, Host bit—14
G. Network bit--18, Host bit—16
H. Network bit--12, Host bit—14
423. The administrators for a company’s domain need to subdivide groups in organization with in
active directory. If he wants to separate sales from marketing department, what could he use as a
system of organizing this subdivision?
E. Creating organizational units
F. Use user and Groups
G. Create site & subnet grouping
H. Build a container in a subnet group
424. A system administrator wants to remote a domain controller from a domain. Which is the easiest
way to perform the task?
E. Re- install server over existing installation and make the machine a member of group
F. Use remove command
G. Use active directory installation wizard to remove the domain controller
H. Re- install server over existing installation and make a machine a member of domain
425. ADSL is the abbreviation of
E. Asymmetric Dual Subscriber Line
F. Asymmetric Digital System Line
G. Asymmetric Dual System Line
H. Asymmetric Digital Subscriber Line
426. Which of the following laye of OSI model also called end- to – end layer?
B. Presentation layer B. Network Layer C. Session Layer D. Transport Layer