0% found this document useful (0 votes)
34 views33 pages

COC Quetion L3

Uploaded by

habtamutolasa16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views33 pages

COC Quetion L3

Uploaded by

habtamutolasa16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

1 – The MAC (media access control) address of the network card is used in both Ethernet and token ring-

networks and is essentials for communication .what does MAC provide?

a) Physical address that is randomly assigned each time the computer is started
b) Physical address that is assigned by the manufacture
c) Logical address that identifies the workstation
d) The logical domain address for the workstation

2 – which of the following is the address of the router?

a) The subnet mask


b) The IP address
c) The TCP address
d) The default gateway

3 – A communication network which is used by large organization over regional. National or global area
is called

a) MAN
b) Internet
c) WAN
d) LAN

4 – what OSI layer handles logical address to logical name resolution ?

a) Presentation
b) Physical
c) Data link
d) Transport

5 – which of the following uses network address translation ?

a) Router
b) Hubs
c) Patch panel
d) Network adapter driver

6 – Connects computers on a single circle of cable. Unlike the bus topology there are no terminated
ends. The signal travel around the loop in one direction and pass computer

a) Mesh topology
b) Ring topology
c) Star topology
d) Bus topology

7 – What is the default subnet mask for class C network

a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 127.0.0.1

8 – Frames from one LAN can be transmitted to another LAN via the device

a) Repeater
b) Bridge
c) Router
d) Modem

9 – A commercial organization with permanent connection to the internet that sells temporary
connections to subscribers

a) WAN
b) LAN
c) ISP
d) MAN

10 – Is where the data and program that are currently in operation or being accessed are stored during
use?

a) Memory
b) Permanent storage
c) BIOS
d) Primary storage

11 – Which of the following summation operation is performed on the bites to check an error detecting
code?

a) Code-decoder
b) Codec
c) Attenuation
d) Checksum

12 – ARP (Address Resolution Protocol) is

a) TCP/IP high level protocol for transferring files from one machine to another
b) Protocol used to monitor computer s
c) TCP/IP protocol used by dynamically bind a high level IP address to low-level physical
d) Protocol that handles error and control message

13 - The network which connects computers in Addis Ababa sub city administration office

A. LAN
B. MAN
C. WAN

14 - The Internet is
a) LAN
b) MAN
c) WAN
15 - The network found in Entoto TVET college
a) LAN
b) MAN
c) WAN
16 - The type of computer which provide services to other computers in a network
a) Client
b) Standalone
c) Workstation
d) Server
17 - Which of the following is not a convenient environment to use peer to peer network
a) In environment in which security is a big issue
b) Fewer number of computers
c) Budget constraints
d) Limited growth of network
18 - We use switch in
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
19 - Which of the following is not true
a) In star topology if the central device fail the entire network will be down
b) Mesh topology have the maximum back up capability
c) In ring topology two computers can send data at the same time
d) In bus topology only one computer’s signal will transmit in the bus
20 - Transmit signal in the form of light signal
a) Coaxial cable
b) Fiber optic cable
c) UTP
d) STP
21 - Interference of signal from one cable to other
a) Attenuation
b) Cross talk
c) Band width
d) EMI
22 - Which of the following is not true
a) There can be collision in CSMA/CA
b) Ethernet uses CSMA/CD
c) In token passing a computer can send data only if it has a free token
23 - The amount of data that can be transmitted in a fixed amount of time
a) Broadband
b) Internet
c) Bandwidth
d) Noise
24 - A weakening of signal as the signal travels a long distance is called
a) Noise
b) Attenuation
c) Interference
d) Crosstalk
25 - Which of the following is true
a) UTP transmits signal for 100 meter
b) STP is more resistance to interference than UTP
c) UTP is more flexible than STP
d) Both UTP and STP uses the same connector
26 - A network environment in which no computer have the power to control the other computers
a) Hybrid network
b) Peer-to-peer network
c) Server based network
d) Workgroup
27 - In which environment peer-to – peer network is a right choice
a) Centralized security is required
b) Where there is budget constraints
c) Where we need a security policy
d) All of the above
28 - The education office of every region in Ethiopia is networked. The network type is referred as
a) WAN
b) MAN
c) LAN
d) CAN
29 - Simplex transmission
a) TV
b) Computer network
c) Telephone communication
30 - Which of the following is not true
a) In full duplex two device can communicate at the same time
b) In half duplex communication is takes place only in one direction
c) Telephone conversation is a full duplex communication
d) Radio uses a simplex communication
31 - Which of the following is true
a) Computer network uses circuit switching
b) In packet switching, every packet follows the same route
c) Telephone communication uses circuit switching
d) All are true
32 - Data formatting is takes place in ____________layer of the OSI reference model
a) Physical layer
b) Presentation layer
c) Session layer
d) Application layer
33 - Internet explorer is found in ________________ layer of the OSI
a) Physical layer
b) Application layer
c) Data link layer
d) Presentation layer
34 - Makes to application to open, use and close a connection
a) Application layer
b) Network layer
c) Session layer
d) Data link layer
35 - The layer which is responsible for addressing computers
a) Presentation layer
b) Session layer
c) Transport layer
d) Network layer
36 - The set of rule and procedures which govern communication between computers
a) OSI
b) Topology
c) Protocol
d) IP
37 - The protocol which enables computer to send and receive e mail
a) FTP
b) SNMP
c) SMTP
d) HTTP
38 - Which of the following is connection oriented protocol
a) TCP
b) UDP
c) SMTP
d) All
39 - Which of the following connectivity device is mandatory in network
a) Repeater
b) Switch
c) NIC
d) Router
40 - Which of the following is not the purpose of NIC
a) Receive data and convert to appropriate format that can be transfer in a cable
b) Determine and accept data sent to a computer
c) It filters layer 3 packet
d) All are true
41 - One of the following doesn’t work in layer 2 of the OSI reference model
a) NIC
b) Repeater
c) Switch
d) Hub
42 - One of the following is not true
a) Active Hub works in data link layer of the OSI ref model
b) Passive hub retransmit signal without regenerating
c) Hub can have different ports to different cables
d) Hubs can be used in star topology
43 - Which of the following is not true
a) Switches are multiport bridge
b) Switches work in layer 2 of the OSI reference model
c) Switches do not regenerate signal
d) Switches uses routing table to transmit signal
44 - Which of the following work on network layer of the OSI reference model
a) Switch
b) Hub
c) Router
d) Bridge
45 - Which of the following is true
a) MAC address of a computer can be changed
b) IP address is used in TCP/IP network
c) Every computer should have a unique MAC address to communicate
d) Once we assign an IP address to a computer it is very difficult to change
46 - Which of the following is a class B IP address
a) 192.168.1.1
b) 113.10.10.1
c) 130.1.12.1
d) 240.2.1.5
47 - Which of the following is a different IP address than the other
a) 192.168.0.1
b) 192.168.0.168
c) 192.168.1.0
d) 192.168.0.2
48 - Which of the following is a correct private class C IP address
a) 192.160.7.8
b) 10.10.1.2
c) 192.10.1.1
d) 192.168.100.200
49 - The default gate way of class 100.10.2.1 IP
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
50 - What are some of the advantages of using a router to segment the network? (Choose two)
a) Filtering can occur based on Layer 3 information.
b) Broadcasts are eliminated.
c) Routers generally cost less than switches.
d) Broadcasts are not forwarded across the router.
e) Adding a router to the network decreases latency.
51 - Which of the following statements describe the network shown in the graphic? (Choose two)

a) There are two broadcast domains in the network.


b) There are four broadcast domains in the network.
c) There are six broadcast domains in the network.
d) There are four collision domains in the network.
e) There are five collision domains in the network.
f) There are seven collision domains in the network.
52 - Refer to the exhibit. A network engineer is troubleshooting an internet connectivity problem
on the computer. What causing the problem?

a) wrong DNS server


b) wrong default gateway
c) incorrect IP address
d) incorrect subnet mask
column A Column B

53 – Connector for 10BaseT Ethernet Cable G A - IPconfig


54 – A Network topology that have each computer B – Ring topology

Connected to a central device K


55 – A Topology that is the most fault tolerant and C – telnet

the highest levels of redundancy R

56– A connector that is used with thicnet cable N D – DNS

57 – A connector used in conj action with Telephone E E – RJ-11

58 – Display the IP configuration information A F – Exchange server

59 – Display MAC address of a machine S G – RJ-45

60 – used to check a Network connectivity M H – Web server


61 – used to start to install Active directory Q I – arp – a

62 – used to establish a session with remote device C J – File server

63 – Resolve Domain Name in IP Address D K – Star topology

64 – Dynamically assign IP address P L – Application server

65 – Used to share public resource J M – ping

66 – used to access email F N – BNC

67 – used to build deploy and cooperate XML and web services H O – Net start
P – DHCP
Q – Dcpromo
R – Mesh topology
S – ipconfig/all
68 – Memory is made up of
a) Set of wires
b) Set of circuits
c) Large number of cells
d) All of these
69 – which of the following storage devices can store maximum amount of data?
a) Floppy disk
b) Hard disk
c) Compact disk
d) Magneto optic disk
70 – which of the following devices have a limitation that we can only information to it but cannot erase
or modify it
a) Floppy disk
b) Hard disk
c) Tape drive
d) CDROM
71 – when a key is pressed on the keyboard which standard is used for converting the keystroke in to
the corresponding bits?
a) ANSI
b) ASCLL
c) EBCDIC
d) ISO
72 – A compiler is
a) A combination of computer hardware
b) A program which translates from one high level language to another
c) A program which translates from one high level to a machine level
d) None of these
73 – how many logical drives is it possible to fit on to a physical disk?
a) Maximum of 4 logical drives
b) Maximum of 8 logical drives
c) Maximum of 16 logical drive
d) Maximum of 24 logical drive
74 – How do you clear CMOS password ?
a) By changing the jumper setting in the motherboard
b) By formatting the system
c) By removing Bios Battery
d) BY formatting only OS
75 – what is BIOS battery
a) This battery is used to change date/Time of system
b) This battery used to change BIOS configuration
c) A&B
d) None of these
76 – which is related to the harddisk?
a) SAS and SCSI
b) SATA Serial ATA or Serial Advanced technology attachment
c) IDE
d) All of the Above
77 – what is cache memory ?
a) Temporary memory
b) Random access memory
c) Disk memory
d) Non of these
78 – What is the address given to a computer connected to a network called?
a) System address
b) SYSID
c) Process ID
d) IP Address
79 – What is the name of the software that allows us to browse through web pages called?
a) Mail client
b) FTP client
c) Messenger
d) Browser
80 – which is a volatile memory
a) Random access memory (RAM)
b) Read only memory(ROM)
c) Programmable Read only memory
d) Read only memory programmable
81 – Full form of HTML
a) Hyper text mark LAN
b) Hyper text markup language
c) Hyper tile markup language
d) High text markup language
82 – Total keys keyboard is most popular
a) 123
b) 111
c) 101
d) 134
83 – Brian of a computer system
a) Control unit
b) Arithmetic logic unit
c) Central processing unit
d) Memory
84 – unit of a computer system is the unit where place where place where the actual executions of
instructions takes place during processing operation?
a) Control unit
b) Arithmetic logic unit
c) Central processing unit
d) Memory
85 – HTML is used to
a) Plot complicated graphs
b) Solve equations
c) Translate one language into another
d) Author WebPages
86 – ISP stands for
a) internet service provider
b) Internet security protocol
c) Integrated service provider
d) Integrated security provider
87 – “WWW” stands for
a) World wide web
b) World wide wares
c) World wide war
d) World wide wait
88 – what is the complete name of UPS?
a) Unplugged power supply
b) Uninterruptible power supply
c) Unplugged program supply
d) Uninterruptible plug supply
89 – what is the full form of CD_ROM?
a) Compact disk read only memory
b) Compact disk run only memory
c) Closed disk read only memory
d) Closed disk run only memory
90 – which device allows your computer to talk to other computers over a telephone line as well as
access the internet?
a) CD-ROM drive
b) Hard disk
c) RAM
d) Modem
91 – modem stands for
a) Monetary Demarcation
b) Monetary devaluation exchange mechanism
c) Modulator Demodulator
d) Memory Demagnetization
92 – How much information can a CD (compact disk) usually store?
a) 10MB
b) 150MB
c) 650MB
d) 1.4MB
93 – Approximately how many bytes make one megabyte
a) One million
b) Ten Thousand
c) One Hundred
d) One Thousand
94 – which of the following is not an output device?
a) Printer
b) Keyboard
c) Monitor
d) Speaker
95 – A computer which links several PCs together in a network is called is
a) Minicomputer
b) Server
c) Client
d) Main frame
96 – PAN stands for
a) Public area Network
b) Private area Network
c) Personal area Network
d) None
97 – How many layers are present in TCP/IP model
a) 4
b) 5
c) 6
d) 7
98 – IP Address has bytes
a) 2
b) 4
c) 8
d) 16
99 – IP Address means
a) Internet protocol
b) Internal power
c) Intranet protocol
d) Internal protocol
100 – According to ISO, HDLC Means
a) High level data link control
b) High level data language control
c) Hardware data link control
d) None of the above
101 – what does SDLC mean in Networking protocol ?
a) Software data link control
b) Synchronous data link control
c) Software development life cycle
d) Synchronous data development cycle
102 – SPOOL stands for
a) Serial printer object oriented language
b) Simultaneous peripheral output on- line
c) System protocol optimization outliner
d) Single program operating system operation link
103 LPT stands for
a) Laser printer
b) Link port
c) Line printer
d) Line port
104 – SCSI port (pronounced skuzzy) stands for
a) System computer scanning interface
b) Small computer system interface
c) Small computer system internet
d) System computer, system interfaced
105 – Older networks often use another type of cable, called
a) Twisted pair cable
b) Unshielded twisted-pair cable
c) Coaxial cable
d) Optical fiber
106 – NIC stands for
a) Network interface card
b) Network internal card
c) Network internet client
d) Network input card
107 – A server that can perform no other task besides network services is called
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
108 – A computer that is on the Network is a
a) Node
b) Terminal
c) Client
d) Online
109 – ISO stands for
a) International standard organization
b) International student organization
c) Integrated services organization
d) None
110 – Primary memory stores
A. Data alone
B. Programs alone
C. Results alone
D. All of these
111 – which of the following is not an input device ?
A. Mouse
B. Light pen
C. Keyboard
D. VDU
E. None of these
112 – All the keys on the IBM PC keyboard repeat as long as we hold them down such types of keys are
known as keys
A. Typematic
B. Automatic
C. Functional
D. Alphabetic
E. None of these
113 – A light sensitive device that converts drawing, printed text or other images in to digital form is
A. Keyboard
B. Plotter
C. Scanner
D. OMR
E. None of these
114 – which device is used to control the cursor movement
A. Light pen
B. Joystick
C. Trackball
D. Plotter
E. None of these
115 – Using output devices one can
A. Input data
B. Scan data
C. Store data
D. View or print data
E. None of these
116 - is an electronic device that processes data converting it into information
A. Processer
B. Case
C. Computer
D. Stylus
E. None of these
117 – Which device is used to reproduce drawings using pens that are attached to movable arms?
A. Plotter
B. Scanner
C. Light pen
D. Printer
E. None of these
118 – A device that generates the periodic signals used to control the timing of all CPU operations
A. COM
B. Collate
C. Chip
D. Clock
119 - are devices used to transmit data over telecommunications lines
A. Drive
B. Drive bays
C. Modems
D. Platforms
120 – which cabling standard can send data at up to 10.000Mbps?
A. 10Base-T
B. 100Base-TX
C. 1000Base-TX
D. 10GBase-SR
121 – Which of the following are not small form factor fiber connectors?(choose all that apply.)
A. MT-RJ
B. LC
C. FC
D. SC
122 - Which LED on your NIC might save you the most frustration if you start your troubleshooting
efforts by monitoring its illumination?
A. Links
B. Activity
C. Collision
D. 10/100
123 - Which of the following is a characteristic of a mesh network?
A. It controls cable costs
B. It offers improved reliability
C. It is required by fire code
D. It needs a token to operate
124 – which layer of the OSI model ensures reliable end-to-end communications ?
A. Network
B. Transport
C. Session
D. Presentation
125 – Which layer of the OSL model provides routing functionality ?
A. Physical
B. Transport
C. Data Link
D. Network
126 – Which layer the OSL model translates the data from upper –layer protocols in to electrical signals
and places them on the network media ?
A. Physical
B. Transport
C. Data Link
D. Network
127 – You are a consultant designing a network for a company with more than 1000 users . which 802
standard would you implement to ensure that bandwidth would be sufficient and equal with out
bridging or additional segments ?
A. 802.1
B. 802.2
C. 802.3
D. 802.5
128 – Which one of the following device will not propagate broadcasts from one of its interfaces to
another?
A. Hub
B. Switch
C. Repeater
D. Router
129 – you are installing a windows XP –based TCP/IP network . you accidentally set workstation B to the
same IP address as workstation A. which workstation (s) will receive an error message ?
A. Workstation A
B. Workstation B
C. Neither
D. Both
130 - you are installing a windows XP –based TCP/IP network . you accidentally set workstation B to the
same IP address as workstation A. which workstation (s) will have a valid IP address?
A. Workstation A
B. Workstation B
C. Neither
D. Both
131 – which device increases the number of collisions domains while decreasing the average number of
nodes per collisions domain ?
A. Hub
B. Transceiver
C. Switch
D. NIC
132 – which of the following protocol use a connectionless transport ? (choose all that apply.)
A. HTTP
B. TCP
C. TFTP
D. IP
E. NetBIOS
133 – Which protocols use a connection-oriented transport ?
A. UDP
B. NetBIOS
C. HTTP
D. TFTP
134 – which Name resolution system is implemented with TCP/IP by default?
A. DNS
B. NDS
C. SND
D. WINS
135 – Which OSI model layer has both a MAC sub layer and an LLC sublayer?
A. Physical
B. Transport
C. Network
D. Data link
136 – Which OSI model layer responsible for establishing , maintaining and breaking down dialog?
A. Application
B. Gateway
C. Session
D. Network
137 – Which OSI layer responsible for formatting data based on a standard syntax and for character –set
conversion?
A. Transport
B. Network
C. Presentation
D. Session
138 – Which OSI layer is responsible for building and tearing dawn packets ?
A. Network
B. Transport
C. Data Link
D. Physical
139 – The two halves of a MAC address are referred to as the
A. TCP and IP
B. OUI and device IP
C. OUI and IP
D. Device ID and IP
140 – which of the following directory services are hierarch in design?(choose all that apply)
A. Novell NetWare Bindery
B. Microsoft windows AD
C. Linux password shadow file
D. NT domain
141 – you are the administrator of a 100-node Ethernet network .your users are completing of slow
network speeds . what could you replace your hub with to increase your network throughput ?
A. Router
B. Bridge
C. Switch
D. NIC
142-At which OSI model layer do routers primarily operate ?
A. Physical
B. Data Link
C. Transport
D. Network
143-which of the following is a MAC address?
A. 199.165.217.45
B. 00076A:01A5BBA7FF60
C. 01:A5:BB:A7:FF:60
D. 311 S. Park St.
144 – At which layer of the OSI are 1s and 0s converted to a digital signal?
A. Transport
B. Data link
C. Network
D. Physical
145 – The best method which is used to repair your system partition or make minor change to windows
to get the operating system functional.
A. Directory services restore mode
B. Last known good configuration
C. Recovery console
D. Emergency Repair Disk(ERD)
146 – which one of the following is a private IP address ?
A. 172.33.194.30
B. 168.172.19.39
C. 127.0.0.1
D. 172.20.14.36.
147 –which layer 1 device can be used to enlarge the area covered by a single LAN segment ?
A. NIC
B. RJ- 45 transceiver
C. Repeater
D. Switch
148 - _______ is the protocol used for communication between a web server and a web browser. BY
default, it uses port 80.
A. HTML
B. SMTP
C. HTTP
D. IMAP
149 – Which class the IP addressing provides 24 bits of network addressing and 8 bits of host addressing
by default. The most secure and strong password from the following list is:
A. Class A
B. Class B
C. Class C
D. Class D
150 – what is the default subnet mask for class C network
A. 255.0.0.0
B. 127.0.0.1
C. 255.255.0.0
D. 255.255.255.0
151 – Each computer is connected to every other computer by separate cabling and network offers
superior redundancy and reliability.
A. Star topology
B. Mesh topology
C. Ring topology
D. Bus topology
152 – Which of the following OSI layers is responsible for establishing connections between two
devices?
A. Transport
B. Network
C. Session
D. Data-link
153 – which of the following is used for modulation and demodulation?
A. Protocols
B. Multiplexer
C. Gateway
D. Modem
154 – Which of the following Network device two dissimilar networks can be connected and it operate
all layers of the OSI model?
A. Router
B. Switch
C. Bridge
D. Gateway
155 – Which one the following an example of verbal communication?
A. Body language
B. Sign and time language
C. Para language
D. Face to Face communication
156 – which layer organizes and synchronizes the exchange of data between application processes?
A. Application layer
B. Session layer
C. Physical layer
D. Transport layer
156 – Which of the following connectors are commonly used with fiber cabling?
A. Rj-45
B. Rj-11
C. BNC
D. SC
157 – You are troubleshooting a network using STP twisted pair and suspect that the maximum length
has been exceeded. What is the maximum length of STP twisted pair?
A. 25 meters
B. 1000 meters
C. 10000 meters
D. 100 meters
158 – Moves packets between computers on different networks and routers operate at this layer
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
159 – Used to display information on the current state of all the running IP processes on your computer
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
160 – Class B IP address
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
161 – Memory related error
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
162 – Broadcast IP address
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
163 – Identifies devices on the physical layer and MAC addresses are part of this layer
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
164 – Uses ICMP packets to show you if you can simply reach a remote computer
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
165 – Used to diagnoses problems reaching a remote system by tracing all routers between two points
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
166 – Manages connections between machines and sockets operate at this layer
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
167 – Is the operational techniques and activities that are used to fulfill requirements for quality
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
168 – Class A IP Address
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
169 – Common types of software problem
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
170 - possible CPU problem causes
A. Network layer
B. 213.55.96.148
C. NETSTAT
D. IPCONFIG
E. PING
F. Quality control
G. TRACERT
H. 10.10.10.10
I. 127.0.0.1
J. Work ethics
K. Data link layer
L. 172.16.0.20
M. 255.255.255.255
N. Ntdetect.com missing
O. Any number starting by 2
P. NBTSTAT
Q. Overheating
R. Session layer
172 – The physical laying out of the network
A. Protocol
B. Data-link layer
C. UDP
D. Fiber optic cabling
E. Rj-11
F. FAT
G. SMTP
H. Rj-45
I. ARP
J. NTFS
K. Logical address
L. Thin net
M. FIXBOOT
N. SC
O. POST
P. Domain Name system
Q. BNC
R. Topology
S. Session layer
T. Physical address
173 – Media type transmit data in the form of light
A. Protocol
B. Data-link layer
C. UDP
D. Fiber optic cabling
E. Rj-11
F. FAT
G. SMTP
H. Rj-45
I. ARP
J. NTFS
K. Logical address
L. Thin net
M. FIXBOOT
N. SC
O. POST
P. Domain Name system
Q. BNC
R. Topology
S. Session layer
T. Physical address
174 – Electronic interference that is caused when two wires are too close to each other
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
175 – A physical address of a device on network
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
175 – A protocol that provides dynamic IP addressing to workstations on the network
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
176 – Spoken or written words to share information
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
177 - Which of the following is not market promotional to?
A. Seminars
B. Advertising
C. Supply/demand
D. Networking and referrals
178 – layer three device used for routing through different network
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
179 – Where would you configure a workstation too boot from the USB drive firs and hard drive only if
there is not a bootable USB device attached?
A. Configured in workstation BIOS
B. C:/windows/TEMP/1st text
C. Boot.ini
D. NTLDR
180 – A voluntary standard that manufactures can adhere to which aims to create compatibility
between wireless devices
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
181 – A period of time during which a computer system or network is unavailable
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
182 – A protocol that provides for the transfer of files between two systems
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
183 – What tool is used to enable remote desktop on a server?
A. Terminal services manager
B. Terminal services licensing
C. System properties in control panel
D. Terminal services configuration
184 – All of the following are results of kaizen implementation in work places except
A. Improvement in product quality
B. High waiting time
C. Safety in work places
D. Efficient space utilization
185 – The flow information across persons of work units at the some hierarchical level is called?
A. Vertical communication
B. Lateral communication
C. Upward communication
D. Down ward communication
186 – A system used to translate domain name into IP address
A. Crosstalk
B. MAC
C. Downtime
D. CONFIG
E. FTP
F. DHCP
G. Wi-Fi
H. DNS
I. Firewalls
J. Repeater
K. 10.10.10.10
L. IP
M. Router
N. Verbal communication
O. Team work
P. Work Abuse
187 – A user has forgotten his or her password and attempts to log on server time with an incorrect
password. Eventually, the user receives a logon massage indicating that the account is either disabled or
locked out. The massage suggests that the user contact an administrator. What must you do?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
188 – The most effective way to mitigate congestion on a LAN would be to ?
A. Replace the hubs with switches
B. Upgrade the CPUs in the router
C. Change the cabling to cat 6
D. Upgrade the network cards
189 – The main reason for implementing a network for an organization is
A. To reduce security risk
B. To decrease company cost
C. To share resources
D. To exchange information
190 – you are the administrator for your company’s domain. You need to subdivide the groups in your
organization within active directory. If you want to separate sales from marketing as an example, what
will you use as a system of organizing this subdivision?
A. Create organization unit
B. Create a site and service subnet grouping
C. Use user and groups
D. Use separate domains
191 - The file system that allow for file-level security to use for a server that will be an active directory
domain controller for your organization
A. CDFS
B. FAT
C. FAT32
D. NTFS
192 - Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
plant in another city. The best device required to enable everyone to share data and resources between
the two LANs,
A. Router
B. HUB
C. Modem
D. Switch
193 – The TCP/IP protocol used for transferring electronic mail messages
A. FTP
B. RPC
C. SMTP
D. SNMP
194 - The command used to access Active directory installation wizard
A. DCPROMO
B. DCCONFIG
C. DCINSTALL
D. ALL
195 – A system administrator wants to prevent users from starting or stopping specific services on the
domain controller. The tools that can be used to do this
A. Active directory users and computers
B. Domain security policy
C. Local system policy
D. Domain controller security policy
196 - The configuration information for a DHCP client is received dynamically. The utility used to read
configuration for verifying this settings
A. TRACERT
B. PING
C. NETSTAT
D. IPCONFIG
197 - You are in charge of a small network and want to make it secured. The users want to have full
control over their data and still be able to share data with the rest of the office. The best type of
network to set up this
A. Client based network
B. Master domain network
C. Peer-to-peer network
D. Server based network
198 – The hardware and network administrator wants to remotely and securely enter commands to be
run at a remote server. The application that the administrator should use
A. Telnet
B. SSH
C. SFTP
D. RSA

v Type I IP Address Much

199 – Loop back IP address C A. 192.168.1.1


B. 10.10.10.10
200 – Broadcast IP address F
C. 127.0.0.1
201 – Public IP address E D. 172.16.0.20

202 – Class A IP address B E. 213.55.96.148


F. 255.255.255.255
203 – Class B IP address D G. 297.25.1.6
v Type II OSI model layer
204 – Breaks data down into manageable
chunks and TCP and UDP operate at this layer G
205 – Define hardware connections and turns A. Application layer
binary in to pulses(electrical or light) and also
repeaters and hubs operate at this layer D
B. Data link layer
206 – Identifies devices on the physical layer C. Network layer
and MAC address are part of this layer B
D. Physical layer
207 – Manages connections between machines
and sockets operate at this layer F E. Presentation layer
208 – Moves packets between computers on F. Session layer
different networks and routers operate at this
layer C G.Transport layer
v Match

209 – Used to diagnose problems reaching G A - HOSTNAME


A remote system by tracing all routes between two pointes E B - IPCONFIG
210 – Used to diagnose DNS problems C - NBTSTAT
211 – Used simply to return the name of the local computer A D - NETSTAT
212 - Used to display information on the current state of all the B E - NSLOOKUP
Running IP processes on your computer
213 – Uses ICMP packets to show you if you can simply reach a F F - PING
remote computer G – TRACERT

You might also like