Institutional assessment level 3 1. At the data link layer error detection is done by a. Equalizer b. Cyclic Redundancy Check(CRC) c. Hamming Code d. Bit stuffing 2. A port address that a FTP uses to access the system is__________ a. 3389 b. 80 c. 21 d. 443 3. A serve failure that allows a group of servers function as a single unit , sharing storage resources and jobs , as well as providing fail-over fault tolerance is_______ a. Hot add memory b. Microsoft meta-directory services c. Windows System Resource Manager(WSRM) d. Server clustering 4. The best possible fault tolerance network topology is ___________ a. Ring b. Star c. Mesh d. Bus 5. When you maintain and troubleshoot a computer the final stage will be--------------a. Assembling b. Testing c. Formatting d. Documenting 6. A device use to logically separate the network into two segments______ a. Router b. Epon c. Access point d. Bridge 7. ______ is a device that is used to analog signal to digital a. Router b. Repeater c. Switch d. Modem 8. A security threat , which is a theft of information as it is transmitted over a network by a computer , smartphone or other connected device is a. Impersonation 9. 10. 11. 12. 13. 14. 15. 16. b. Manipulation c. Penetration d. Eavesdropping When IPV4 addressing is manually configured on a web server, which property of the IPV4 configuration identifies the network and host portion for an IPV4 address? a. Default gateway b. DNS server address c. DHCP server address d. Subnet mask Used to connect router to computer using console serial port a. Cross over cable b. Rollover cable c. USB cable d. Straight through cable In a networking system, if there is a DHCP server then the client will easily get a. MAC address b. URL address c. Port address d. IP address A way of connecting computers using central device such as hub or switch a. Ring-star topology b. Tree topology c. Star topology d. Bus topology We don’t want our packet get lost in transit. Which OSI layer is responsible to orderly deliver packet? a. Network b. Transport c. Data link d. Physical Which one of the following will NOT be considered in improved business performance planning? a. Efficient resource utilization b. Ignoring new ideas c. Business risk management d. Business profitability Which type of connector is required for coaxial cable? a. BNC b. Token ring c. RJ-45 d. RJ-11 Which of the following correctly describes the function of a subnet mask? a. It separates the network address from the host address of an IP address 17. 18. 19. 20. 21. b. It enables hosts to operate in the different operating c. It blocks undesired network traffic d. It forwards data to a remote network segment What is the first 24 bits in a MAC address called? a. NIC b. OUI c. BIA d. VAI If you want to find the numbers of routers between a source and destination, the utility to be used is _________ a. Traceroute b. Ipconfig c. Route d. Ipconfig Which of the following network cables would a technician find on the RJ-45 a. Fiber b. Coaxial cable c. USB d. Ethernet cable Information security can be configured to meet the objective_________ a. Confidentiality b. Recognition c. Admiration d. Certification At which layer does router operates in OSI reference model? A. Transport B. Network C. Data link D. session 22. The top most layer of OSI reference model is, A. Presentation B. Session C. Transport D. Application 23. In the main system board the network card will be installed into, A. AGP port B. VGA port C. PCI slot D. PS/2 port 24. Assume you are assigned to install a server network card (NIC) in certain networking system. The first step that you should do is, A. Open the case and take anti-static precaution B. Isolate the system unit by disconnecting power supply and exterior cables C. Informing users who will be affected D. Do nothing 25. Which layer is responsible for converting protocols, translating data, encryption and decryption, compression and decompression of data? A. Network B. Presentation C. Session D. Application 26. At which layer does user synchronization takes place? A. data-link B. session C. presentation D. network 27. From the following which one is true? A. Switches are used interchangeably with hub and have the same characteristics. B. Hub has better performance and less expensive than switch. C. Switch operates at layer 2(data-link layer) of OSI reference model. D. Switch has low performance and more expensive than hub. 28. The type of computer which provide services to other computers in a network A. Client B. standalone C. workstation D. server 29. A weakening of signal as the signal travels a long distance is called A. Noise B. attenuation C. Interface D. crosstalk 30. The default gate way of class 100.10.2.1 IP A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 31. Unstructured questions in which possible answers are not suggested and the respondent answers if in his/her own words are: a. Closed ended questions c. matching type questions b. Multiple choice questions d. open ended questions 32. the most secure and strong password from the following list is a. PassWords c. pass_Word#1 b. PASSWORDS d. pass_Word1 33. Layout of cabling, locations of nodes/computers and the interconnections between nodes and cabling is called a. Client to client network c. Topology b. Server to server network d. Server to client network 34. A connector used in conjunction with telephone is a. RJ-45 b. RJ-11 C. BNC d. PS/2 35. __________ is used to start to install active directory a. regedit b. MMC c. dcpromo d. ms-config 36. Which one of the following is the correct syntax to ping the reachability of network? A) PING\\\\192.168.1.1 B) PING: 192.168.1.1 Edit Edit C) PING 192.168.1.1 D) 19.168.1.1 PING Edit Edit 37. What is the important thing you should consider as potential candidates for documenting network installation? A) logical map of the network B) physical map of the network Edit Edit C) Default settings for computers and other devices on the network D) All Edit Edit 38. Which network device amplifies the signal it receives on one port before it transmits it on other port? a. Router b. repeater c. switch or hub d. bridge 39. Which one is a physical layer? a. NIC b. Hub c. bridge d. Router 40. The translation of data into secret code is______ a. MD-5 b. hash c. encryption d. sh1 41. The most common attack that impacts availability is a. b. c. d. Penetration By pass Eavesdropping Denial-of-service 42. The computer system voltage requirements from its power supply unit. A. 180 – 220 AC B. 5 – 12 AC C. 180 – 220 DC D. 5 - 12 DC 43. The network cable that transmits signals in the form of light is A. Coaxial cable B. UTP cable C. Fiber Optics cable D. STP cable 44. The tool that can be used to prevent users from starting or stopping specific services on the domain controller. A. Client Security policy B. Group Security policy C. Computer System Policy D. Domain Controller security policy 45. While gathering data to determine the organization business requirement you might take records of the organization like organizational policies and procedures. These kinds of information resources are considered as A. Informal sources B. Primary sources C. Secondary sources D. Tertiary sources 46. A hierarchical structure made up of multiple domains that trust each other. A. Root B. Site C. Organizational Unit D. Tree 47. Which one is a loop back address? a. 10.0.0.0.1 b. 127.0.0.0.1 c. 172.20.0.20 d. 192.168.1.1 48. Select one which is class A IP address a. 10.1.10.1 192.168.12.10 c. 127.0.0.0.1 d. 230.64.45.1 49. In_______ topology, a break anywhere in the cable will cause the entire network to go down A) Star B) ring C) Bus D) mesh 50. The rules or standards for communication between network device is called______________ A) communication B) transition C) protocol D) HTTP