Uploaded by alextesfaye1620

Institutional assessment level 3

advertisement
Institutional assessment level 3
1. At the data link layer error detection is done by
a. Equalizer
b. Cyclic Redundancy Check(CRC)
c. Hamming Code
d. Bit stuffing
2. A port address that a FTP uses to access the system is__________
a. 3389
b. 80
c. 21
d. 443
3. A serve failure that allows a group of servers function as a single unit , sharing storage resources
and jobs , as well as providing fail-over fault tolerance is_______
a. Hot add memory
b. Microsoft meta-directory services
c. Windows System Resource Manager(WSRM)
d. Server clustering
4. The best possible fault tolerance network topology is ___________
a. Ring
b. Star
c. Mesh
d. Bus
5. When you maintain and troubleshoot a computer the final stage will be--------------a. Assembling
b. Testing
c. Formatting
d. Documenting
6. A device use to logically separate the network into two segments______
a. Router
b. Epon
c. Access point
d. Bridge
7. ______ is a device that is used to analog signal to digital
a. Router
b. Repeater
c. Switch
d. Modem
8. A security threat , which is a theft of information as it is transmitted over a network by a
computer , smartphone or other connected device is
a. Impersonation
9.
10.
11.
12.
13.
14.
15.
16.
b. Manipulation
c. Penetration
d. Eavesdropping
When IPV4 addressing is manually configured on a web server, which property of the IPV4
configuration identifies the network and host portion for an IPV4 address?
a. Default gateway
b. DNS server address
c. DHCP server address
d. Subnet mask
Used to connect router to computer using console serial port
a. Cross over cable
b. Rollover cable
c. USB cable
d. Straight through cable
In a networking system, if there is a DHCP server then the client will easily get
a. MAC address
b. URL address
c. Port address
d. IP address
A way of connecting computers using central device such as hub or switch
a. Ring-star topology
b. Tree topology
c. Star topology
d. Bus topology
We don’t want our packet get lost in transit. Which OSI layer is responsible to orderly deliver
packet?
a. Network
b. Transport
c. Data link
d. Physical
Which one of the following will NOT be considered in improved business performance planning?
a. Efficient resource utilization
b. Ignoring new ideas
c. Business risk management
d. Business profitability
Which type of connector is required for coaxial cable?
a. BNC
b. Token ring
c. RJ-45
d. RJ-11
Which of the following correctly describes the function of a subnet mask?
a. It separates the network address from the host address of an IP address
17.
18.
19.
20.
21.
b. It enables hosts to operate in the different operating
c. It blocks undesired network traffic
d. It forwards data to a remote network segment
What is the first 24 bits in a MAC address called?
a. NIC
b. OUI
c. BIA
d. VAI
If you want to find the numbers of routers between a source and destination, the utility to be
used is _________
a. Traceroute
b. Ipconfig
c. Route
d. Ipconfig
Which of the following network cables would a technician find on the RJ-45
a. Fiber
b. Coaxial cable
c. USB
d. Ethernet cable
Information security can be configured to meet the objective_________
a. Confidentiality
b. Recognition
c. Admiration
d. Certification
At which layer does router operates in OSI reference model?
A. Transport
B. Network
C. Data link
D. session
22. The top most layer of OSI reference model is,
A. Presentation
B. Session C. Transport
D. Application
23. In the main system board the network card will be installed into,
A. AGP port
B. VGA port
C. PCI slot
D. PS/2 port
24. Assume you are assigned to install a server network card (NIC) in certain networking system. The
first step that you should do is,
A. Open the case and take anti-static precaution
B. Isolate the system unit by disconnecting power supply and exterior cables
C. Informing users who will be affected
D. Do nothing
25. Which layer is responsible for converting protocols, translating data, encryption and decryption,
compression and decompression of data?
A. Network B. Presentation C. Session D. Application
26. At which layer does user synchronization takes place?
A. data-link B. session
C. presentation D. network
27. From the following which one is true?
A. Switches are used interchangeably with hub and have the same characteristics.
B. Hub has better performance and less expensive than switch.
C. Switch operates at layer 2(data-link layer) of OSI reference model.
D. Switch has low performance and more expensive than hub.
28. The type of computer which provide services to other computers in a network
A.
Client
B. standalone
C. workstation
D. server
29. A weakening of signal as the signal travels a long distance is called
A. Noise B. attenuation
C. Interface D. crosstalk
30. The default gate way of class 100.10.2.1 IP
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
31. Unstructured questions in which possible answers are not suggested and the respondent answers if
in his/her own words are:
a. Closed ended questions
c. matching type questions
b. Multiple choice questions
d. open ended questions
32. the most secure and strong password from the following list is
a. PassWords
c. pass_Word#1
b. PASSWORDS
d. pass_Word1
33. Layout of cabling, locations of nodes/computers and the interconnections between nodes and
cabling is called
a. Client to client network
c. Topology
b. Server to server network
d. Server to client network
34. A connector used in conjunction with telephone is
a. RJ-45 b. RJ-11 C. BNC
d. PS/2
35. __________ is used to start to install active directory
a. regedit b. MMC
c. dcpromo d. ms-config
36. Which one of the following is the correct syntax to ping the reachability of network?
A) PING\\\\192.168.1.1
B) PING: 192.168.1.1
Edit
Edit
C) PING 192.168.1.1
D) 19.168.1.1 PING
Edit
Edit
37.
What is the important thing you should consider as potential candidates for documenting
network installation?
A) logical map of the network
B) physical map of the network
Edit
Edit
C) Default settings for computers and other devices on the network
D) All
Edit
Edit
38. Which network device amplifies the signal it receives on one port before it transmits it on other port?
a. Router
b. repeater
c. switch or hub
d. bridge
39. Which one is a physical layer?
a. NIC b. Hub
c. bridge
d. Router
40. The translation of data into secret code is______
a. MD-5 b. hash
c. encryption d. sh1
41. The most common attack that impacts availability is
a.
b.
c.
d.
Penetration
By pass
Eavesdropping
Denial-of-service
42. The computer system voltage requirements from its power supply unit.
A. 180 – 220 AC
B. 5 – 12 AC
C. 180 – 220 DC
D. 5 - 12 DC
43. The network cable that transmits signals in the form of light is
A. Coaxial cable
B. UTP cable
C. Fiber Optics cable
D. STP cable
44. The tool that can be used to prevent users from starting or stopping specific services on the
domain controller.
A. Client Security policy
B. Group Security policy
C. Computer System Policy
D. Domain Controller security policy
45. While gathering data to determine the organization business requirement you might take
records of the organization like organizational policies and procedures. These kinds of
information resources are considered as
A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources
46. A hierarchical structure made up of multiple domains that trust each other.
A. Root
B. Site
C. Organizational Unit
D. Tree
47. Which one is a loop back address?
a. 10.0.0.0.1
b. 127.0.0.0.1
c. 172.20.0.20
d. 192.168.1.1
48. Select one which is class A IP address
a. 10.1.10.1 192.168.12.10 c. 127.0.0.0.1 d. 230.64.45.1
49. In_______ topology, a break anywhere in the cable will cause the entire network to go down
A) Star
B) ring C) Bus D) mesh
50. The rules or standards for communication between network device is called______________
A) communication B) transition C) protocol D) HTTP
Download