You are on page 1of 11

Occupational Code: ICT HNS3

Ministry of Education

Sector: Economic Infrastructure

Sub Sector: Information Technology

Occupation: Hardware and Network Servicing

Level III

Knowledge Assessment _V1


The assessment covers the following units of competence:

1. EIS HNS3 01 0811 Gather Data on Business Requirements


2. EIS HNS3 02 0811 Determine Best-Fit Topology
3. EIS HNS3 03 0811 Configure and Administer Server
4. EIS HNS3 04 0811 Create Technical Documentation
5. EIS HNS3 05 0811 Monitor and Administer Stem and Network Security
6. EIS HNS3 06 0811 Provide First Level Remote Help Desk Support
7. EIS HNS3 07 0811 Identify and Resolve Network Problems
8. EIS HNS3 08 0811 Monitor Implementation of Work plan/Activities
9. EIS HNS3 09 0811 Conduct / Facilitate User Training
10. EIS HNS3 10 0811 Apply Quality Control
11. EIS HNS3 11 0811 Lead Small Teams
12. EIS HNS3 12 0811 Lead Workplace Communication
13. EIS HNS3 13 0811 Improve Business Practice
14. EIS HNS3 14 1012 Maintain Quality System and Continuous Improvement Processes
(Kaizen)

Candidate name
Registration number
Name of training provider
Name of Assessment Center

Structure of Test

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

Section No of questions No of marks Suggested time


A-Multiple choice questions 21 21 30min
B-Matching Type 15 15 20min
Total 36 50min
OFFICE USE ONLY
Multiple Choice Questions /21
Matching Type /15
Final Mark /36

December 2014

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

Instructions
1. Write your name, Registration number, name of training provider and Assessment
center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited Assessor
5. You may use the following references in this test
 Non-programmable calculators
6. Do not bring the following items into the assessment venue
 Mobile telephones
 Programmable calculators
 Written notes

SECTION A – MULTIPLE-CHOICE QUESTIONS


Instructions for Section A
1. There are twenty one [21] questions in this section.
2. Select the best answer and encircle the letter
3. If you wish to change an answer, place an X mark on the letter you have encircled and
then circle the letter of your preferred answer.
4. A correct answer scores 1, an incorrect answer scores 0.No marks will be given for a
question if more than one answer is supplied

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

1. You have been asked to install a network that will provide the network users with the
greatest amount of fault tolerance. The preferred network topology.
A. Star
B. Ring
C. Mesh
D. Bus

2. Firewall function

A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

3. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.

A. Client Security policy


B. Group Security policy
C. Computer System Policy
D. Domain Controller security policy

4. The reason that end users need to be aware of the security policy.

A. Some security decisions are usually in their hands

B. They should understand the probability of every risk

C. They need to be aware of every threat

D. They should avoid responsibility for their actions

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

5. You are requested to setup a 100Mbps network for a client in an office that already has
10Mbps throughput. Your client wants to keep the costs to a minimum but he needs the
100Mbps throughput. The cabling solution you recommend.

A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable

6. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.

A. DSL Modem, Ethernet cable, Wireless Signal, Wireless Router/Access Point.


B. Wireless Router/Access Point, Ethernet cable, Wireless Signal, DSL Modem
C. Wireless Router/Access Point, Wireless Signal, Ethernet cable, DSL Modem
D. DSL Modem, Wireless Signal, Ethernet cable, Wireless Router/Access Point.

7. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

8. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.

A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down

9. An application that used to remotely and securely access the remote server.

A. Telnet
B. SSH
C. SFTP
D. RSA

10. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization

11. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

12. While gathering data to determine the organization business requirement you might take
records of the organization like organizational policies and procedures. These kinds of
information resources are considered as

A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources

13. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?

A. Rename Mashos’s account to Desta. Reset the password.


B. Copy Masho’s account and create a new account for Desta. Disable Masho’s
account.
C. Create a new account for Desta. Recreate the group membership of Masho’s
account to Desta’s account.
D. Copy Masho’s account and create a new account for Desta. Delete Masho’s
account.

14. A user can login to his computer but cannot access network resources. The user has all
the appropriate group memberships and permissions, but he still cannot access shared
resources. The cause of this problem

A. User has attempted to access a shared folder without appropriate permissions.


B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

15. You enable disk quotas on a Windows Server 2008 file server. You configure a quota
limit of 100MB. A user, named Eyob, reports that he can still save large files to the
server, even though he is well above his quota limit. What should you do to correct the
problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the
Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.

16. A hierarchical structure made up of multiple domains that trust each other.

A. Root
B. Site
C. Organizational Unit
D. Tree

17. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?

A. Run the Start /normal csrss.exe command before starting Excel.


B. Run the Start /normal Excel.exe command to start Excel.
C. Use Task Manager to set the Explorer.exe process to high priority.
D. Use Task Manager to set the Excel.exe process to low priority.

18. When you tried to login to the server, your trial may failed, this failure event is recorded
in
A. System log
B. Security log
C. Application log
D. Event log

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

19. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure programs
at startup.

A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32

20. You have a server that runs Windows Server 2008. You need to identify all the unsigned
drivers that are installed on the server. What should you do?

A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.

21. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?

A. Reset her computer account through the Active Directory Users and Computers
utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-line
utility.

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

SECTION B – MATCHING TYPE QUESTIONS


Instructions for Section B
1. There are fifteen [_15_] questions in this section grouped in three Types I, II & III.
2. Match column A with column B. Select the letter of the correct answer from column B &
write your answer on the provided space in front of the number in column A
3. If you wish to change your answer place an x mark on your previous answer and write your
preferred answer
4. A correct answer scores 1, an incorrect answer scores 0. No marks will be given for a
question if more than one answer is supplied

Column A -2 Column B
___1. Loop back IP address A. Physical layer
___2. Define hardware connections and turns binary in to B. TRACERT
pulses(electrical or light) and also uses repeaters C. 10.1.10.1
and hubs D. HOSTNAME
___3. Used to diagnose problems reaching a remote E. Data Link layer
system by tracing all routes between two points F. 172.20.0.20
___4.Broadcast IP Address G. Presentation layer
___5. Breaks data down into manageable chunks and H. NETSTAT
uses TCP and UDP I. 127.0.0.1
___6. . Used to diagnose DNS problems J. Session Layer
___7. Public IP Address K. 255.255.255.255
___8. Identifies devices on the physical layer and uses L. Network layer
MAC addresses M. 192.25.1.256
___9. Used simply to return the name of the local N. Transport layer
computer O. 213.55.96.148
___10. Class A IP Address P. NSLOOKUP
___11.Manages connections between machines and Q. 213.55.96.148
Sockets R. PING
___12. Used to display information on the current state
of all the running IP processes on your computer
___13. Class B IP Address

Knowledge Assessment for Hardware and Network Servicing_L_III_V1


Occupational Code: ICT HNS3

___14.Moves packets between computers on different


networks and uses
___15. Uses ICMP packets to show if you can simply
reach a remote computer

Knowledge Assessment for Hardware and Network Servicing_L_III_V1

You might also like