You are on page 1of 34

Ambo TVET college

Sector: Information and Communication Technology


Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Part I – Multiple-Choice Questions
1. Which of the following is behavior of good team members?
A. Do not take turns
B. Do not respect the opinions of others in the team
C. Keep individual information about development
D. Share responsibilities
Answer: D
Some of the characteristics of a highly effective team, according to scientific research
 Emotional intelligence of each team member.
 A good mix of introverts and extroverts.
 They share the same stories.
 They make time for humour (the ability to appreciate).
 They communicate proactively.
 Great leadership.

2. You are the network administrator for a small window 2003. One of your users has come to you because he
cannot remember the password he uses to log onto your windows server 2003 domain. Which utility should you
use to change a user’s password?
A. The set pass utility
B. Password Administrator
C. Password Manager
D. The Active Directory Users and Computers Utility
Answer: D
 To set up and manage domain user accounts, you use the Active Directory Users and Computers
utility. Right click the user whose password you want to change and select Reset password.

3. You are a network administrator in your office. You have 255.255.255.224 subnet mask. What is the maximum
number of IP addresses that can be assigned to hosts on a local subnet that uses this subnet?
A. 15
B. 30
C. 16
D. 14
Answer: B
Usable subnet mask is 255.255.255.254 minus the given IP address 255.255.255.224 is
equal to 30 or Convert IP address 224 to binary number is equal to 11100000 see the
table, how to convert. A /27 (255.255.255.224) is 3 bits on and 5 bits off. That means to
know the maximum usable IP address 2n – n. The 5 bits off 25-2= 32-2 =30.This provides
8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C
network address? Not at all. The number of host bits would never change.
4. All of the following are results of Kaizen implementation in workplaces except?
A. High waiting time
B. Efficient space utilization
C. Improvement in product quality
D. Safety in workplaces
Answer: A

5. A type of maintenance that has regular schedule?


A. Breakdown Maintenance
B. Predictive Maintenance
C. Proactive Maintenance
D. Preventive Maintenance
Answer: D

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 1


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
 Maintenance may be classified into four categories: (Some authors prefer three categories- scheduled and
preventive maintenances are merged)
 Corrective or Breakdown maintenance: it implies that repairs are made after the equipment is
failed and cannot perform its normal function anymore
 Scheduled maintenance: it is a stitch-in-time procedure and incorporates, inspection, lubrication,
repair and overhaul of equipments
 Preventive Maintenance (PM): Principle “Prevention is better than cure” Procedure - Stitch-in-time.
It locates weak spots of machinery and equipments; it provides them periodic/scheduled inspections
and minor repairs to reduce the danger of unanticipated breakdowns.
 In predictive maintenance, machinery conditions are periodically monitored and this enables the
maintenance crews to take timely actions, such as machine adjustment, repair or overhaul

6. What does the 10Base T refers?


A. Transmit data at 100 Mbps with a distance limit of 100 meters per segment.
B. Transmit signals at 10 Mbps with a distance limit of 200 meters per segment.
C. Transmit signals at 10 Mbps with a distance limit of 100 meters per segment.
D. Transmit data at 1 Gbps with a distance limitation of 220 meters per segment.
Answer: C
10Base-T is the Ethernet wiring standard for 10 Mbps (megabits per second) for a maximum distance of
approximately 100 meters per segment over unshielded twisted pair cables terminated with RJ-45 connectors.
The 10 refers to the transmission speed of 10 Mbps.

7. A computer cannot communicate with any of the computer on a different network segment. It has no problem
connecting to other computer that is located on its own network segment. The IP address parameter that is
possibly incorrectly on the computer?
A. DNS server
B. Default gateway
C. IP address
D. Subnet Mask
Answer: B
If the IP address of the default gateway is incorrectly configured, the computer will not be able to
communicate with any other computers located on different network segments. If the default gateway is
configured correctly, you will need to check the IP address and the subnet mask. A default gateway allows
computers on a network segment to communicate with computers on another segment. The default gateway
for all computers on a particular segment is the IP address of the router interface that is connected to the local
segment. If a computer is not configured with the IP address of a default gateway, it cannot communicate with
computers on a different network segment.
8. One of the options below is correct steps in conducting ICT Training?
A. Identifying training needs - Planning - Implementation
B. Implementation - Planning - Identifying training needs
C. Planning - Implementation - Identifying training needs
D. Planning - Identifying training needs - Implementation
Answer: D
9. There are one thousand employees in the entire company at present and the company is experiencing growth.
Additionally, some of the information that will be sent over the network is confidential. Which network Types
would be most appropriate in this situation?
A. Peer to Peer
B. Stand alone Computer
C. Workstation
D. Server Based
Answer: D
Server Based: Is designed to support a large number of users usually more than 10 users and it uses
servers. If security is an issue, a server based network might be a better choice.
Set by Ayansa E. E-mail: ayeereso@gmail.com Page 2
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
10. Which of the following statements are associated with a bus LAN network?
A. Uses a single backbone computer to connect all network devices.
B. Uses dedicated server.
C. All devices connect to a central device.
D. Uses a dual ring configuration.
Answer: A
In a bus topology, all computers are connected to a single cable called a backbone using T-connectors. Both
ends of the backbone use terminators in order to prevent reflection of signals. If the terminator is missing or is
deliberately removed, the data transmissions are disrupted.

11. What command would be used to establish network connectivity?


A. IPCONFIG/all
B. IPCONFIG/registerdns
C. IPCONFIG/release
D. IPCONFIG/renew
Answer: D
12. Subnet
Subnet Mask IP Address Network Address Node Address
255.0.0.0 192.168.10.100 192 168.10.100
255.255.0.0 192.168.10.100 192.168 10.100
255.255.255.0 192.168.10.100 192.168.10 100
From the above table computer with subnet mask 255.0.0.0 IP address 192.168.10.100 and Node address
168.10.100. What is the Network address?
A. 192.168.10
B. 0.0.0.0
C. 192.168
D. 192
Answer: D
Network Class Network Host address/ Node Address Example
Class A Octet 1 Octet 2, 3, 4 92.168.1.5 (92 is Network and 168.1.5 Host)
Class B Octet 1, 2 Octet 3, 4 191.168.1.5(191.168 is Network and 1.5 Host)
Class C Octet 1, 2, 3 Octet 4 192.168.1.5(192.168 .1is Network and 5 Host)
13. In the following figure each computer is connected to every other computer by separate cabling. This
configuration provides redundant paths throughout the network so that if one cable fails, another will take over
the traffic. While ease of troubleshooting and increased reliability is definite pluses, these networks are expensive
to install because they use a lot of cabling. Which topology the following figure shows?

A. Hybrid
B. Mesh
C. Star
D. Bus
Answer: B
A mesh topology network offers superior redundancy and reliability. In a mesh topology, each computer
is connected to every other computer by separate cabling. This configuration provides redundant paths
throughout the network so that if one cable fails, another will take over the traffic. While ease of
troubleshooting and increased reliability is definite pluses, these networks are expensive to install because
they use a lot of cabling. Often, a mesh topology will be used in conjunction with other topologies to form
a hybrid topology.
Set by Ayansa E. E-mail: ayeereso@gmail.com Page 3
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
14. You have just created an active directory user on a windows 2003 domain controller. The security requirements for this
user specify that the user should not be able to logon to the computer between 12:01 AM and 4:00 AM because this is
when your company runs automated backups for the computer. You want to specify that the user account can logon
only during specified hours. Which users properties dialog box tab should you use to configure logon hours?
A. The profile tab
B. The general tab
C. You cannot restrict logon hours for an active directory user account
D. The account tab
Answer: D
If you create an Active Directory account, you can limit logon hours by clicking the logon Hours button in the
Account tab of the user properties dialog box.

15. At which layer of the OSI are 1s and 0s converted to a digital signal?
A. Transport
B. Data link
C. Network
D. Physical
Answer: D
Physical Layer of OSI Model
 Deals with all aspects of physically moving data from one computer to the next
 Converts data from the upper layers into 1s and 0s for transmission over media
 Defines how data is encoded onto the media used to transmit the data
 Defined on this layer: Cable standards, wireless standards, and fiber optic standards
 Device example: Hub, Repeater
 Used to transmit data Copper wiring, fiber optic cable, radio frequencies, anything that can be used to
transmit data is defined on the Physical layer of the OSI Model
Data Link Layer of OSI Model
 Is responsible for moving frames from node to node or computer to computer
 Can move frames from one adjacent computer to another, cannot move frames across routers
 Requires MAC address or physical address
 Protocols defined include Ethernet Protocol and Point-to-Point Protocol (PPP)
 Device example: Switch, Bridge
 Two sub layers: Logical Link Control (LLC) and the Media Access Control (MAC)
Network Layer of OSI Model
 Responsible for moving packets (data) from one end of the network to the other, called end-to-end communications
 Requires logical addresses such as IP addresses
 Device example: Router, Routing is the ability of various network devices and their related software to
move data packets from source to destination
Transport Layer of OSI Model
 Takes data from higher levels of OSI Model and breaks it into segments that can be sent to lower-level
layers for data transmission
 Conversely, reassembles data segments into data that higher-level protocols and applications can use
 Puts segments in correct order (called sequencing ), so they can be reassembled in correct order at destination
 Concerned with the reliability of the transport of sent data
 May use a connection-oriented protocol such as TCP to ensure destination received segments
 May use a connectionless protocol such as UDP to send segments without assurance of delivery
 Uses port addressing
Session Layer of OSI Model
 Responsible for managing the dialog between networked devices
 Establishes, manages, and terminates connections
 Provides duplex, half-duplex, or simplex communications between devices
 Provides procedures for establishing checkpoints, adjournment, termination, and restart or recovery procedures

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 4


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
16. Which of the following are firewall-related constraints relating to Remote Assistance?
A. NAT cannot be used.
B. Internet connection sharing is not possible.
C. Port 3389 must be open.
D. You cannot use Remote Assistance across a virtual Network (VPN).
Answer: C
When enabled, Remote Desktop for Administration opens Transmission Control Protocol (TCP) port 3389
and listens for connection requests. This port is a significant target and is often sought during port scans. Most
open ports link to applications that must be attacked in complex ways to permit administrator level access to a
computer but this service is designed to actually provide it, which makes it a prime target for attackers. There
are several best practices that should be followed to maximize the security of this component.

17. The best method which is used to repair your system partition or make minor changes to windows to get the
operating system functional.
A. Directory services restore mode
B. Last known good configuration
C. Recovery console
D. Emergency Repair Disk (ERD)
Answer: C
The Last Known Good Configuration option loads the last used system configuration that allows you to
return the system to the previous working configuration. Windows saves two types of configurations in the
Registry: Default and Last Known Good. The Default configuration is saved to the registry when you shut
down the system. The Last Known Good Configuration is saved when you log on to the system.
The Recovery Console is useful in resolving system startup problems when the Safe Modes and Last
Known Good Configurations do not work. The Recovery Console allows you to repair critical system files
that might have been corrupted copying original files from the Windows XP/2000 Professional setup
CDROM.
• This is useful in resolving system startup problems.
• It allows you to repair critical system files.
• You can also enable or disable services that may be causing startup problems.
• Recovery Console can be started from the Windows setup CD-ROM or it can be installed as one of the
Advanced Boot Options.
Emergency Repair Disk (ERD). The ERD is used on Windows NT and Windows 2000 desktops to repair
a system that fails to start. The most common use of an ERD is to restore critical Windows startup files like
NTLDR, NTDETECT.COM, NTBOOTDD.SYS, and BOOT.INI. In brief, the ERD can be used for the
following purposes:
• To inspect and repair the system startup environment.
• To inspect and repair the boot sector of a disk.
• To verify startup files and replace any missing or corrupt files.
18. Which of the following versions of windows server 2003 require product activation?
A. Windows server 2003, Enterprise Edition, Evaluation version
B. Windows server 2003, standard Edition, volume license version
C. Windows server 2003, standard Edition, normal version
D. Windows server 2003, Enterprise Edition, open license version
Answer: D
1. Enterprise Edition ------ Not require product activation
2. Evaluation version -----
3. Standard Edition-------- Not require product activation
4. Volume license version- require product activation
5. Normal version----------
6. open license version----

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 5


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
19. Which one of the following is a private IP address?
A. 172.33.194.30
B. 168.172.19.39
C. 127.0.0.1
D. 172.20.14.36
Answer: D

Public and private IP addresses


Public IP addresses (or registered IP addresses) are those addresses of those networks that are accessible
from outside the organization. For example, if any host is connected to a network, it is using a public IP
address. If an organization needs to connect its network to the Internet, it will need to obtain a public IP
address from its Internet Service Provider. Typically, web servers, email servers, DNS servers, FTP servers,
and VPN servers are connected directly to the Internet and use public IP addresses.
Private IP addresses (or unregistered IP addresses), on the other hand, are used when an organization’s
computer network is private. In other words, it is not connected to the Internet or if it is, it is located behind
a proxy server or a firewall. Access to private networks is usually restricted to users inside the organization.
The Internet Assigned Numbers Authority (IANA) has set aside a range of IP addresses in each of A, B, and
C addresses classes that can be used by private organizations for their internal IP addressing.
20. To decide what type of network resource model is not needed?
A. The need of the network designer
B. How much will it cost?
C. How much security does the company require?
D. What is the size of the organization?
Answer: A
The type of network you choose to implement will depend on factors such as the:
Size of the organization
Level of security required
Types of business
Level of administrative support available
Amount of network traffic
Needs of the network users
 Network budget/cost
21. Where would you configure workstations to boot from the USB drive first and hard drive only if there is not a
bootable USB device attached?
A. Configured in workstations BIOS
B. NTLDR
C. Boot.ini
D. C:\windows\TEMP\1st.txt
Answer: A
Boot order is configured in the BIOS of the workstation and not in a windows-related file.
22. Which layer 1 device can be used to enlarge the area covered by a single LAN segment?
A. NIC
B. RJ-45 transceiver
C. Repeater
D. Switch
Answer: C
Hub, Repeater, Router and Switch repeat the packet. But only hub and Repeater do
not segment the network. Repeaters and Hubs are contained in layer one of the OSI model
(Physical layer) while a switch lies in layer two and a router is in layer 3.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 6


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
23. A user has forgotten his or her password and attempts to logon several times with an incorrect password.
Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The
message suggests that the user contact an administrator. What must you do?
A. Unlock the user object
B. Rename the user object
C. Delete the user object and recreate it.
D. Enable the user object
Answer: A
Unlock the user object or Reset the password for user object. Although the logon message text on Windows
2000 and other previous operating system versions indicates that the account is disabled, the account is actually
locked. Windows Server 2003 displays an accurate message that the account is, in fact, locked out. However,
you can recognize the problem by examining what caused the message: a user forgot his or her password. You
must unlock the account and reset the password.
24. The flow of information across persons of work units at the same hierarchical level is called?
A. Vertical communication
B. Down ward communication
C. Upward communication
D. Lateral communication
Answer: D
Lateral communication towards or from the side or sides of Horizontal communication

25. ____ is the protocol used for communication between a web server and a web browser. By default, it uses port 80.
A. HTML
B. SMTP
C. HTTP
D. IMAP
Answer: C
Usually, HTTP takes place through TCP/IP sockets. A browser is an HTTP client because it sends requests to
an HTTP server (Web server), which then sends responses back to the client. The standard (and
default) port for HTTP servers to listen on is 80, though they can use any port.

26. Which of the following is categorized as richest channel in conveying information effectively?
A. Face to face communication
B. Posted notices and bulletins
C. Telephone
D. E-mail
Answer: A
Feedback during a face-to-face or telephone conversation will be immediate and direct, whilst feedback to
messages conveyed via TV or radio will be indirect and may be delayed, or even conveyed through other media
such as the Internet.

27. You are the administrator for your company’s domain. You need to subdivide groups in your organization with in
active directory. If you want to separate sales from marketing department what could you use as a system of
organizing this subdivision?
A. Build a container in subnet group
B. Use user and groups
C. Create site and subnet grouping
D. Creating organizational units.
Answer: D
Organizational units(OUs) are Active Directory containers that you use to organize objects within a domain.
OUs can be assigned group policies and can be used to delegate administrative tasks to users or groups.
Administrators implement group policies that can be applied to the entire domain, or they implement smaller
administrative units called organizational units (OUs).
Set by Ayansa E. E-mail: ayeereso@gmail.com Page 7
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
28. Which of the following is not market promotional tool?
A. Seminars
B. Advertising
C. Supply/Demand
D. Networking and referrals
Answer: C
Market promotional tool
Advertising
Sales promotion
o Free gifts
o Free samples
o Discount prices
o Joint promotion
o Vouchers and coupons
Public relations
 Direct Marketing
29. One of following is type of account policies?
A. Password policy
B. User right assignment
C. Security options
D. Audit policy
Answer: B

30. One of the following is not function of firewalls.


A. Differential backup
B. Stetful inspection
C. Packet filter
D. Proxy firewall
Answer: A
Function of firewalls
 Packet Filtering
 Stateful Inspection Filtering
 Application-Layer Filtering
 Proxy Services
 Reverse Proxy Services

31. Let say you are a network administrator in your office. You have an interface on a router with the IP address of
192.168.192.10/29. What is the broadcast address the hosts will use on this LAN?
A. 192.168.192.127
B. 192.168.192.63
C. 192.168.192.15
D. 192.168.192.31
Answer: D
The Conversion of 10 to binary number is10100000 and 2n-1 is broadcast address 25-1=31 =>192.168.192.31

32. A _____ system to join two or more device and computers together to communicate and share resources.
A. Network
B. Resource
C. NIC
D. Modem
Answer: A
Network is a group of two or more electronic devices, such as computers, PDAs, and smart phones that communicates with
each other to share data and resources.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 8


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
33. The most effective way to migrate congestion on a LAN would be to ____________
A. Upgrade the network cards
B. Change the cabling to cat 6
C. Upgrade the CPUs in the routers
D. Replace the HUBs with switches
Answer: D
Replacing the hub with a switch would reduce collisions and retransmissions which would have the most
impact on reducing congestion.
34. Which topology the workstation goes down, it does not affect the entire network?
A. Star
B. Bus
C. Ring
D. Straight line
Answer: A
In star topology, failure of a single node or the connecting cable does not affect the entire network’s operation.

35. One of your printers is not working properly and you want to prevent users from sending print jobs to the logical
printer servicing that device. What should you do?
A. Remove the printer from active directory
B. Stop sharing the printer
C. Rename the share
D. Change the printer post
Answer: B
If you choose to stop sharing the printer, users will no longer be able to use the print device.
36. What type of profile will be most useful to maintain a locked-down desktop common to all sales representatives?
A. Local profile
B. The all users profile
C. Preconfigured roaming group profile
D. Local mandatory profile
Answer: C
37. While reviewing the security logs for your server, you notice that a user on the internet has attempted to access
your internal mail server. Although it appears that the user’s attempts were unsuccessful you are still very
concerned about the possibility that your systems may be compromised. Which of the following solutions are you
most likely to implement?
A. A firewall system all the connection point to the internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
Answer: C

38. One of the following is not an example of network resource.


A. Printer and other peripherals
B. Files and applications
C. Disk storage
D. Hub
Answer: D
39. A user can determine the network settings on the client’s network interface cards as well as any that a DHCP
server has leased to your computer by typing the following command at a command prompt.
A. Ping
B. IP
C. Ipconfig/all
D. Connect
Answer: C

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 9


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
40. You want to ensure the highest level of security for your corporate intranet without the infrastructure of certificate
services. The goal is to provide Authentication that is transparent to users and to allow securing intranet recourses
with the group accounts existing in active directory. All users are within the corporate firewall. What
Authentication method should you choose?
A. Basic Authentication
B. Digest Authentication
C. Anonymous Access
D. Integrated windows Authentication
Answer: D
41. Which class the IP addressing provides 24 bits of network addressing and 8 bits of host addressing by default. The
most secure and strong password from the following list is:
A. Class A
B. Class B
C. Class C
D. Class D
Answer: C
42. Which one of the following is used only with domain controllers and enables you to restore directory services?
A. Directory services restore mode
B. Last Known good configuration
C. Debugging mode
D. Safe mode
Answer: A
43. You have just resolved a very complex network problem. During the process you made some configuration
changes on the network. The changes were successful and your client is now very happy with your performance.
What should be your next step?
A. Eliminate possibilities.
B. Enable Auditing on all networks to prevent problems in the feature.
C. Gather information.
D. Document your work.
Answer: D

44. Data for your corporate intranet is currently stored on the D: drive of your IIS server. It is decided HR department
will serve information about the company benefit and policies from its server and that the URL to access the HR
information should be http://intranetcontoso.com.hr. what do you need to configure?
A. A new ftp site
B. Virtual directory
C. A new website
D. Virtual directory from file
Answer: D
45. What is the default subnet mask for class C network?
A. 255.0.0.0
B. 127.0.0.1
C. 255. 255.0.0
D. 255. 255. 255.0
Answer: D

46. You are troubleshooting a network using STP twisted pair and suspect that the maximum length has been
exceeded. What is the maximum length of STP twisted pair?
A. 25 meters
B. 1000 meters
C. 10000 meters
D. 100 meters
Answer: D

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 10


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
47. Which of the following is the address of the router?
A. The default getaway
B. The subnet mask
C. The IP address
D. The TCP address
Answer: A

48. Each computer is connected to every other computer by separate cabling and network offers superior redundancy
and reliability.
A. Star topology
B. Mesh topology
C. Ring topology
D. Bus topology
Answer: B

49. You have been asked to install a network that will provide the network users with the greatest amount of fault
tolerance. Which of the following network topologies would you choose?
A. Star
B. Ring
C. Bus
D. Mesh
Answer: D

50. Users are complaining that the performance of the network is not satisfactory. It takes a long time to pull files
from the server and under heavy loads; workstations can become disconnected from the server. The network is
heavily used and a new video conferencing application is about to be installed. The network is 100 Base-T
systems crated with Ethernet HUBs. Which of the following devises are you most likely to install to alleviate the
performance problems?
A. Gateway
B. Router
C. Switch
D. Bridge
Answer: C
Replacing Ethernet hubs with switches can yield significant performance improvements. Of the devices listed,
they are also the only one that can be substituted for hubs. Router is incorrect as a router is used to separate
networks, not as a connectivity point for workstations. A bridge could be used to segregate the network and so
improve performance, but a switch is a more obvious choice in this example. A gateway is a device, system, or
application that translates data from one format to another.
51. Computers that access shared resources for network users.
A. Server
B. Client
C. Peer to peer
D. Server based
Answer: B
52. When troubleshooting a network connectivity problem, you are able to ping your local loopback, the IP address of
your system and the IP address of another system on your network. However, you cannot ping the default
gateway. Which of the following is not a valid reason for this problem?
A. The default gateway is not operational
B. There is no default gateway present
C. The IP address of the default gateway is not configured correctly.
D. Routing is disabled on your workstation.
Answer: C

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 11


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
53. ARP (Address Resolution Protocol) is
A. TCP/IP protocol used by dynamically bind a high level IP address to a low level physical hardware address
B. TCP/IP high level protocol for transferring files from one machine to another
C. Protocol that handles error and control message
D. Protocol used to monitor computers
Answer: A
54. A commercial organization with permanent connection to the internet that sells temporary connections to
subscribers.
A. MAN
B. ISP
C. LAN
D. WAN
Answer: B
55. Which of the following OSI layers is responsible for establishing connections between two devices?
A. Transport
B. Network
C. Session
D. Data-link
Answer: C
56. A user in the sales department calls you and complains that she is unable to log on to the server and use the
accounting software. All the members of the sales department have access to the application and the user has
worked with the software before. Two other users in the sales department claim they can access. The server with
no difficulty. Which of the following would be your next likely step in the troubleshooting process?
A. Verify the user’s logon information
B. Verify network settings on the workstation
C. Verify that the accounting software is running on the server
D. Check the user’s access permissions
Answer: D
57. Which of the following topologies allow for network expansion with the least Amount of disruption for the
current network users?
A. Ring
B. Hybrid
C. Star
D. Bus
Answer: C
On a star network, each network device uses a separate cable to make a point to point connection to a centralized device
such as a hub. With such a configuration, a new device can be added to the network by attaching the new device to the
hub with its own cable. This process does not disrupt the users who are currently on the network.
58. Which of the following devices forwards data packets to all connected ports?
A. Switch
B. Hub
C. Bridge
A. Router
Answer: B
Hubs are inefficient devices that send data packets to all connected devices. Many of today’s networks are upgrading to
switches that pass data packets to the specific destination device. This method significantly increases network performance.
59. Frames from one LAN can be transmitted to another LAN via the device.
A. Router
B. Repeater
C. modem
D. Bridge
Answer: D
Bridge is used for connecting to LAN segments to form a larger segment and dividing a large network segment into smaller segments. Bridges
can dynamically build lists of MAC addresses by analyzing data frames. These bridges are called learning bridges due to this advanced
functionality.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 12


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
60. Sustainable energy principles and work practices may not include
A. Switching off equipment when not in use.
B. Cleaning filters irregularly
C. Insulating rooms and buildings to reduce energy use
D. Recycling and reusing materials wherever practicable
Answer: B
61. Which of the following summation operation is performed on the bits to check an error detecting code?
A. Checksum
B. Attenuation
C. Codec
D. Code-decoder
Answer: A
Error Checking and Correction RAM automatically detects and corrects errors in memory, without the involvement of the
motherboard circuitry. The Error Checking and Correction mechanism generates checksums before storing data in memory. When the
data is retrieved from the memory, the checksum is calculated again to determine whether any of the data bits have been corrupted.
ECC memory can generally detect 1-bit and 2-bit errors, but can only correct errors that are 1 bit per word.
62. A large network with 500 users notices that at specific times in the morning and afternoon network congestion
ties up their computers. What is the most likely cause?
A. Many users are logging on or off
B. A terminator is not grounded
C. The switch connecting the network goes down
D. Power fluctuations
Answer: A
63. Which of the following is used for modulation and demodulation?
A. Protocols
B. Multiplexer
C. Gateway
D. Modem
Answer: D
The term modem stands for modulator demodulator. It converts the digital signals from the computer into
analog signals that can travel on ordinary telephone lines and vice versa.
64. Which of the following definitions describe the loss of signal strength as a signal Travels through a particular
media?
A. chatter
B. crosstalk
C. attenuation
D. EMI
Answer: C
Loss of signal as it travels to larger distances is known as attenuation.

65. Which one of the following is Functions of physical layer?


A. Handles the discovery of destination systems and addressing
B. Provides the mechanism by which data can be passed from one network to another.
C. Provides error detection and correction
D. Defines the physical structure of the network and the topology.
Answer: D

66. Which of the following is not an example of business abuse?


A. Falsify records
B. Break confidentiality
C. Ignore safety rules
D. Better client satisfaction
Answer: D

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 13


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
67. One of the following is not included in SMART objectives?
A. Objectives should be sustainable
B. Objectives should be measurable
C. Objectives should be Achievable
D. Objectives should be Realistic
Answer: A

68. Sending a file from your personal computer primary memory or disk to another computer is called?
A. Hang on
B. Logging on
C. Uploading
D. Downloading
Answer: C
69. A communication network which is used by large organization over regional, national or global area is called
A. LAN
B. WAN
C. MAN
D. Intranet
Answer: B
A WAN typically connects separate LANs at different geographic locations. WANs are networks that cover
very large geographical area such as a country or the whole world.

70. Which of the following network device two dissimilar networks can be connected and it operate all layers of the
OSI model?
A. Router
B. Switch
C. Bridge
D. Gateway
Answer: D

71. Which one is the function network device amplifies the signal it receives on one port before it transmits it on
other ports?
A. Switch/hub
B. Router
C. Bridge
D. Repeater
Answer: D
Repeaters are usually used to strengthen signals going long distances. It amplifies the signal, there by extending
the usable length of the bus. A repeater amplifies the signal it receives on one port before it transmits it on other
ports. Repeaters are usually used to strengthen signals going long distances. It amplifies the signal, there by
extending the usable length of the bus. A repeater amplifies the signal it receives on one port before it transmits
it on other ports.

72. You are the network administrator for a small company. Your company has one windows server 2003 computer configured
as a domain controller and 25 clients running windows XP professional. You want to ensure that your server stays up to date
through windows automatic update. Where should your server to use windows automatic update?
A. Through the registry
B. Start – control panel – system and click the Automatic updates tab
C. Start – All programs – Accessories – system tools – windows update
D. Through the group policy
Answer: B

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 14


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
73. What subnet mask would correspond to a CIDR notation of /24?
A. 255. 255. 255.0
B. 255. 255. 255. 255
C. 255. 255.0.0
D. 255.0.0.0
Answer: A
Classless inter-domain routing (CIDR) is a set of Internet protocol (IP) standards that is used to create unique
identifiers for networks and individual devices. The IP addresses allow particular information packets to be sent
to specific computers. That system is known as CIDR notation.

74. Which name must be unique for every system on the network?
A. The workgroup name
B. The computer name
C. The domain name
D. The user name
Answer: B

75. Which of the following network components allow digital signal to be transmitted across an analogue link?
A. Router
B. Modem
C. Fiber optics
D. Firewall
Answer: B

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 15


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
76. You are network administrator for a medium-sized network. Your company develops applications that will be
used on windows server 2003 platforms. You run a test lab that has windows 2003 on member servers within
several workgroups. You hire a user named Hachalu to help you run and manage tests. You have just added
Hachalu to the server operators group on your windows 2003 domain. Which of the following tasks will Hachalu
be able to complete based on this group membership?
A. Create user and group
B. Delete users and group
C. Make users member of group
D. Create network printers
Answer: D
The server operator group members can administer domain servers. Administration tasks include creating,
managing and deleting shared resources, starting and stopping services, formatting hard disks, backing up and
restoring file system, and shutting down domain controllers.

77. Which of the following is not a benefit of an upgrade to a server-based network will provide?
A. Data will not secure
B. The network will be able to handle more users
C. Data backups will be easier to schedule and perform
D. Handle complex tasks
Answer: A
Benefit of a server-based network
 Have high Security
 Sharing resources
 Backup can be scheduled automatically
 Redundancy of data
 Hardware considerations (hardware sharing)
 It supports high Number of users
78. Which of the following is not part of a Fully Qualified Domain Name?
A. Host name
B. CPU type
C. Company name
D. Type of organization
Answer: B
79. When you try to turn computer on, you notice that the computer won’t activate. The monitor is blank and the fan
on the power supply is not active. Turning the switch off and then back on makes no difference. What is the most
likely cause of this problem?
A. Both the fan on the power supply and the video card are bad.
B. The computer is unplugged.
C. The BIOS on the motherboard needs to be upgraded.
D. The monitor is malfunctioning.
Answer:
80. Which one the following an example of verbal communication?
A. Body language
B. Sign and time language
C. Para language
D. Face to face communication
Answer: D
81. If a network user can’t access server because he/she forgets his/her username, what type of error is it?
A. Operator error
B. Power switch
C. Login procedure
D. Link error
Answer: A

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 16


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
82. Which one of the following is the correct syntax to ping the reach ability of network?
A. PING: 192.168.1.1
B. 192.168.1.1 PING
C. PING 192.168.1.1
D. PING\192.168.1.1
Answer: C

83. What is the output from the first stage of analysis?


A. A list of technical requirements
B. A list of key stakeholders
C. A list of business requirements
D. An opportunity or problem statement
Answer: D

84. You are the network administrator for a small company. Your network consists of one windows server 2003
server, which is configured as a domain controller, with 250 client computers. You want to make license
management as easy as possible. Which of the following utilities should you use to configure licensing?
A. Administrative tools- Licensing
B. Administrative tools- License manager
C. Control panel- License manager
D. Control panel- Licensing
Answer: B

85. You are a network Administrator in your company. You are given with the following IP address. The network
address 192.168.10.0 and subnet mask 255. 255. 255.224. Depending on the above network address and subnet
mask how many subnets you can create?
A. 16
B. 32
C. 48
D. 8
Answer: D
Convert IP address 224 = 11100000 3 bit on 2n => 23 = 8 subnets and 5 bit off 2n => 25 = 32 hosts

86. Which layer organizes and synchronizes the exchange of data between application processes?
A. Application layer
B. Session layer
C. Physical layer
D. Transport layer
Answer: B
Session layer: The layer that provides the means necessary for cooperating presentation entities to organize
and synchronize their dialog and to manage their data exchange.
Application layer: The layer that provides means for the application processes to access the OSI environment.
Presentation layer: The layer that provides for the selection of a common syntax for representing data and for
transformation of application data into and from this common syntax.
Transport layer: The layer that provides a reliable end-to-end data transfer service across networks.
 Network layer: The layer that provides for the entities in the transport layer the means for transferring blocks of data, by
routing and switching through the network between the open systems in which those entities reside.
Data link layer: The layer that provides services to transfer data between network layer entities usually in
adjacent nodes.
Physical layer: The layer that provides the mechanical, electrical, functional, and procedural means to
establish, maintain and release physical connections for transfer of bits over a transmission medium.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 17


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
87. Hachalu is a network administrator for a small company. He is managing a server called\sales and is assigning
NTFS permissions to the D:\Data folder for the managers group. He wants the managers group to be able to list
the content of the folder and read the data in the folder’s files. He does not want anyone from the group to change
or delete any of the data. Which NTFS permission should he apply?
A. Read
B. Modify
C. Write
D. Full Control
Answer: A
The Managers group should be assigned the most restrictive permission that will still allow the members to read
the data in the D:\Data folder, which is the NTFS Read permission.
88. Which of the following is the not limitations of DHCP?
A. DHCP does not detect IP addresses already in use on a network by non-DHCP clients.
B. DHCP server can communicate with clients across routers.
C. DHCP server does not communicate with other DHCP servers and cannot detect IP addresses leased by other
DHCP servers.
D. As with manually configured TCP/IP, incorrect values configured for a DHCP scope can cause unexpected.
Answer:
89. You are network administrator for a medium-sized network. Your company develops applications that will be
used on windows server 2003 platforms. You run a test lab that has windows 2003 on member servers within
several workgroups. You hire a user named leta to help you run and manage tests. You have just added leta to the
server operators group on your windows 2003 domain. Which of the following tasks will leta be able to complete
based on this group membership?
A. Create user and group
B. Delete users and group
C. Make users member of group
D. Create network printers
Answer: D
The server operator group members can administer domain servers. Administration tasks include creating,
managing and deleting shared resources, starting and stopping services, formatting hard disks, backing up and
restoring file system, and shutting down domain controllers.
90. Which of the following are types of flow control?
A. VLANS
B. Cut-through
C. Data
D. Buffering
Answer: D
Three types of flow control are buffering, windowing & congestion avoidance:
 Buffering: If a device receives packets too quickly for it to handle then it can store them in a memory section
called a buffer and proceed them later.
 Windowing: a window is the quantity of data segments that the transmitting device is allowed to send without
receiving an acknowledgment for them. For example:With the window size of 1, the sending device sends 1
segment and the receiving device must reply with 1 ACK before the sending device can send the next
segment. This waiting takes some time.By increasing the window size to 3, the sending device will send up to
3 segments before waiting an ACK -> helps reduce the waiting time.
 Congestion avoidance: lower-priority traffic can be discarded when the network is overloaded -> minimize delays.
91. Which of the following connectors are commonly used with fiber cabling?
A. Rj-45
B. Rj-11
C. BNC
D. SC
Answer: D
Fiber cable connectors are SC, ST, LC, MT-RJ

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 18


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
92. You are to backup a windows server 2003 file server evening. You perform a manual, normal backup. You will
then schedule a backup job to run every evening for the next two weeks. Which backup type will provide the
simplest recovery of lost data?
A. Incremental
B. Differential
C. Normal
D. Daily
Answer: C

93. You are to back up a Windows Server 2003 file server every evening. You perform a manual, normal backup.
You will then schedule a backup job to run every evening for the next two weeks. Which backup type will
complete the fastest?
A. Normal
B. Differential
C. Incremental
D. Copy
Answer: C
94. As a computer technician which one of the following is the major problem of monitor?
A. Black screen and no power light
B. Slow down operation
C. No beep sound
D. Error code starts with one
Answer: A
Major problem of monitor:
 Screen, Icon or Font Size Too Small or Too Big
 Blank Screen or No Video
 Distorted Image or Video, Flickering, Fuzzy, Blurry, or Color Problems
 Brightness, Contrast, Horizontal Lines, Vertical Lines or Geometrical problems
 Bright or Dead Pixel
95. What tool is used to enable remote desktop on a server?
A. Terminal services manager
B. Terminal services licensing
C. System properties in control panel
D. Terminal services configuration
Answer: C

96. Sequencing, acknowledgements and flow control are characteristic of which OSI layer?
A. Layer 6
B. Layer 3
C. Layer 4
D. Layer 1
Answer: C
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received
reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow
control, which are characteristics of the Transport layer (layer 4).

97. You would like to test the restore procedures on your server, but would also like to avoid affecting the production
copies of the backed-up data. What is the best restore location to use?
A. Original location
B. Alternate location
C. Single folder
Answer: B

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 19


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Column A Column B
[M]1. Writes a new boot sector on the system partition. A. Protocol
[L]2. Uses a thin coax cable and runs Ethernet media access up to 185 meters. B. Data link layer
[E]3. Most telephones connect C. UDP
[I]4. A protocol finds the hardware address of a host from a known IP address D. Fiber-Optic cabling
[K]5. MAC address E. RJ-11
[R]6. The physical laying out of the network. F. FAT
[O]7. Diagnostic program built into its BIOS G. SMTP
[D]8. It uses pulses of light instead of electric voltage to transmit data H. Rj-45
[A]9. A set of rules that govern communications over a network. I. ARP
[C] 10. Performs similar function to TCP with less overhead and more speed, but J. NTFS
with lower reliability K. Logical Address
[P] 11. Used to resolve host names to IP addresses L. Thinnet
[S] 12. Responsibilities for establishing and maintaining a communications M. FIXBOOT
[J] 13. File system more secured N. SC
O. POST
P. Domain Name System
Q. BNC
R. Topology
S. Session Layer
T. Physical address

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 20


Ambo TVET college Sector:
Information and Communication Technology Occupation: Hardware
and Network Servicing Level III Knowledge assessment

Column A Column B

[A]1. Moves packets between computers on different networks and routers A. Network layer
operate at this layer B. 213.55.96.148
[D]2. Used to display information on the current state of all the running IP C. NETSTAT

processes on your computer D. IPCONFIG

[L]3. Class B IP Address E. PING


F. Quality Control
[O]4. Memory related error
G. TRACERT
[M]5. Broadcast IP address
H. 10.10.10.10
[K]6. Identifies devices on the physical layer and MAC addresses are part of this layer
I. 127.0.0.1
[E]7. Uses ICMP packets to show you if you can simply reach a remote computer
J. Work ethics
[G]8. Used to diagnoses problems reaching a remote system by tracing all K. Data link layer
routers between two points L. 172.16.0.20
[R] 9. Manages connections between machines and sockets operate at this layer. M. 255. 255. 255.255
[F] 10. Is the operational techniques and activities that are used to fulfill N. Ntdetect.com missing
requirements for quality O. Any number starting by 2
[H ] 11.Class A IP Address P. NBTSTAT
[N] 12. Common types of software problem Q. Overheating
[Q] 13. Possible CPU problem causes R. Session Layer

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 21


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Column A Column B
[A]1. UTP cables connectors A. Rj-45
[N]2. Copper wiring used in small-to-large networks to connect host B. Telnet
devices to hubs and switches. C. Switch
[I]3. Extract the personal information or details from the commuters D. Sc
[E]4. Device responsible for forwarding logically address packets from E. Router
their local sub network toward their ultimate destination F. Work ethics
[P]5. A network security system designed to prevent unauthorized G. Hall.dll files missing
access to or from private network H. None- verbal communication
[C] 6. Device responsible for filtering, flooding, and sending frames I. Spyware
[D] 7. Fiber cables J. Rj-11
[H] 8. Sharing information without using words K. RAM
[L] 9. Finds the hardware address of a host from a known IP address L. ARP
[F] 10. Group of moral principles, standards of behavior, or set of M. 10.105.1.100
values regarding proper conduct in the workplace N. UTP cables
[ ] 11.The standard terminal emulation protocol within the TCP/IP O. 192.168.1.00
protocol stack P. Firewall
[ ] 12. Converts IP address to Domain Name Q. None volatile storage systems
[M] 13.Class A IP address
[J] 14. Telephone wire connector

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 22


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Column A Column B

[E]1. A protocol that provides for the transfer of files between two systems A. Crosstalk
[J] 2. A device that regenerates and retransmits signals on a network B. MAC
[D]3. A command that is used on a NetWare server to see details of Network C. Downtime
interface configurations D. CONFIG
[C] 4. A period of time during which a computer system or network is unavailable. E. FTP
[M] 5. Layer Three device used for routing through different network F. DHCP
[I] 6. Configured to allow certain types of traffic to pass while blocking others G. WiFi
[K] 7. Class A IP address used for huge number of clients H. DNS
[F] 8. A protocol that provides dynamic IP addressing to workstations on the network I. Firewalls
[N] 9. Spoken or written words to share information J. Repeater
[B] 10. A physical address of a device on network K. 10.10.10.10
[H] 11. A system used to translate domain names into IP address L. IP
[A] 12. Electronic interference that is caused when to wires are too close to each other. M. Router
[P] 13. Illegal unethical irresponsible Act done against an Employer N. Verbal Communication
[O] 14. A group of people with a high degree of interdependence geared O. Team Work
towards the achievement of a goal P. Work Abuse
[G] 15. A voluntary standard that manufacturs can adhere to, which aims to Q. 192.168.10.12
create compatibility between wireless devices. R. UDP

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 23


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Column A Column B
[L]1. Expansion card A. L1 and L2
[N]2. Cable B. Physical arrangement of network
[D] 3. Readability C. Survey
[A]4. Cache memory D. Such as formatting and printing
[O]5. Information E. Workgroup
[J]6. Operational procedures F. Motherboard
[C]7. Questionnaires G. Understanding of doing something
[G]8. Knowledge H. Memory
[Q]9. Developer I. Peer to peer, client- server
J. Written instruction
K. Transport
L. PCI, ISA, AGP
M. Clarity
N. Fiber, unshielded Twisted Pair
O. Information is entered and store in PC
P. Power supply
Q. Writer
R. .
S. Router

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 24


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Column A Column B

[D]1. A period of time during which a computer system or network is Unavailable. A. NIC
[B]2. Electronic interface that is caused when two wires are too close to each other. B. Crosstalk
[K]3. Configured to allow certain types of traffic to pass while blocking others. C. MAC
[H]4. A protocol that provides dynamic IP addressing to workstations on the network.
D. Downtime
[F]5. A command that is used on a NetWare server to see details of Network
E. Administrator
interface configurations
F. CONFIG
[N]6. An internet protocol that is used for the transfer of messages and attachments.
G. FTP
[C]7. A six-octet number that uniquely identifies a host on a network
[G]8. A protocol that provides for the transfer of files between two systems
H. DHCP
I. WiFi
J. DNS
K. Firewalls
L. Repeater
M. Patch panel
N. SMTP
O. Proxy Server
P. Telnet
Q. Ping
R. HTTPS

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 25


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Column A Column B
[O] 1. Coaxial cable A. FTP
[ ] 2. Sending a message to remote computer B. Password
[K] 3. The degeneration of a signal over distance on a network cable C. Post Office Protocol Version
[ ] 4. Display protocol statistics and current TCP/IP connection= (netstat) D. Eavesdropping
[ ] 5. Act of secretly listening/intercepting someone else’s private E. Encryption
communication/information F. Simple Mail Transfer Protocol
[ ] 6. Prevent the legal user of the system from accessing or the resource, G. Tracert
information/capabilities of the system H. Socket Address
[ ] 7. IP address and Port number I. Transport Layer
[F] 8. Transfer files in servers and clients computers J. Denial of Service Attack
[M] 9. It forwards packets from one LAN to another LAN and it operate at K. Attenuation
network layer L. Nbtstat
M. Router
N. Search engine
O. BNC connector
P. HTTP
Q. RJ-45 connector
R. PING
S. Bridge
T. Presentation layer

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 26


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Network Support
• Given a troubleshooting scenario, select the appropriate network utility from the following:
 Tracert/ Traceroute  Nbtstat
 Ping  Ipconfig/Ifconfig
 Arp  Winipcfg
 Netstat  Nslookup/Dig
 Tracert/ Traceroute
The tracert or traceroute utility is used to trace the route to from one host to another in a TCP/IP network. All
major operating systems include this utility in one form or another. The name of the utility might differ, but the
purpose is the same: to find out the path between two TCP/IP hosts. The output format of this utility differs
from one operating system to another. It uses the Internet Control Message Protocol (ICMP) echo packets to
trace the route to a specific destination host and reports back the results at every hop on the path. The traceroute
utility offers very useful information when diagnosing connectivity problems. It provides the IP address of
every router (hop) that it passes through and reports the time it takes from one hop to another. This is helpful in
diagnosing the exact location of the network bottleneck or congestion.

 Ping
The ping utility is used to test connectivity between two TCP/IP hosts. Like the tracert utility, it also uses ICMP
echo requests to the destination host. This utility is a part of the TCP/IP protocol suite and is installed by default
on all TCP/IP devices. Ping can quickly determine whether the host is connected or not and how long it takes
for the request to take the roundtrip. Aside from testing connectivity, the ping command can also be used to test
whether the name resolution is working.

 arp
The arp is used to resolve an IP address to the MAC address. The arp is a command-line utility that can be used
to diagnose address resolution problems. Hosts on TCP/IP networks use IP addresses to communicate to each
other. IP addresses are further resolved to their MAC addresses in order to deliver IP packets to the correct host.
These MAC addresses are temporarily stored on the local host in the ARP cache. The ARP cache is a table that
maps recently resolved IP addresses and their corresponding MAC addresses. It is periodically refreshed with
newer entries, and older entries are deleted. Whenever a host needs to send a packet to another host, it first
checks its local ARP cache before sending a broadcast message on the local network.
There are two types of entries in the ARP cache: dynamic and static. The dynamic entries are created
automatically as the local host resolves IP addresses. The static entries are added manually using the arp–s
command. You can check the ARP cache of the local computer anytime by using the arp–a command the arp –g
command.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 27


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
 Netstat:
o The netstat utility is used to display the protocol statistics and current active TCP/IP connections
on the local host. When used without using any parameters, this utility displays all inbound and
outbound TCP/IP connections
 Nbtstat:
o The nbtstat utility is used in a Windows network to resolve connectivity problems. nbtstat
displays the current NetBIOS over TCP/IP statistics and the currently active connections.
o The nbtstat utility is exclusive to Windows operating systems. It is used to display the NetBIOS
over TCP/IP connection statistics. In case there is a problem with NetBIOS name resolution, the
nbtstat utility comes in handy to diagnose it.
 ipconfig
o The ipconfig utility is used in Windows operating systems to display the TCP/IP configuration of
the local host. It is commonly used with the /all parameter to display the configuration of all
network adapters installed on the system.
 ifconfig
o The ifconfig command is the Unix/Linux and MAC OS X equivalent of the Windows ipconfig
command. Unlike the limited features of ipconfig, this command has much more advanced
diagnostic features. Typing ifconfig help at a Unix host command prompt gets you all the
parameters and other information about how this command could be used.
 winipcfg
o The winipcfg command was used on Windows 95, Windows 98, and Windows Me computers to
display the current TCP/IP configuration settings. Unlike other TCP/IP utilities, this is a graphical
utility that displays all information in a window.
The output of the winipcfg command includes the following information:
 The MAC address of the network adapter.
 The IP address and the subnet mask assigned to the computer.
 The IP address of the default gateway.
 The IP address of the configured DHCP server.
 The IP addresses of the primary and secondary WINS servers.
 Information about when the current lease was obtained and when it is due to expire.
The output of the winipcfg command can be analyzed to correctly diagnose a connectivity problem on Windows
95/98/Me computers. For example, if the computer is not able to connect to any other computer on a remote
network, the IP address of the default gateway might be incorrect, or it may not be online. Similarly, if the computer
is not able to connect to any other computer on the local Network segment, the local computer might have an
incorrect IP address or subnet mask. If the computer is not able to browse the network, the WINS IP addresses may
be incorrect.
Set by Ayansa E. E-mail: ayeereso@gmail.com Page 28
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
 nslookup

The nslookup utility is used to diagnose problems related to the DNS services. In other words, it is used to resolve
name resolution problems. This utility can be used to perform name resolution queries against a specified DNS
server or to display information about currently configured DNS servers on a local host. Unlike other commands
discussed in this section, the nslookup command can be executed in either interactive mode or non interactive mode.

LAN technologies

Ethernet networking and cabling technologies are defined in IEEE 802.3 standards. There are several variations in
this standard, depending on speed, length, topology, and cabling used in implementing networks.

10Mbps Ethernet. The 10 Mbps standards include 10Base2, 10BaseT, and 10BaseFL. All of these standards
define a maximum data transfer speed of 10Mbps. This speed is now considered obsolete for most networks. It is
unlikely that you will encounter any 10Mbps networks in your career. The following are different variations of
10Mbps networks.

10Base2
This standard defines use of RG-58 coaxial cabling with a maximum segment length of 185 meters. The
network can achieve a maximum speed of 10 Mbps. The segments are typically wired in physical bus
topology.
10BaseT
The 10BaseT Ethernet standard defines use of CAT 3, 4, or 5 UTP cables with a maximum of 100 meters for
each cable length. All computers (nodes) are connected to a central device known as the hub or the switch. It
is typically wired in a physical star topology.
10BaseFL
The 10BaseFL Ethernet standard uses fiber optic cables in order to increase the cable segment lengths to 2000
meters.

100 Mbps Ethernet. Most of the modern networks support 100 Mbps speeds, which provide better
bandwidth for demanding applications.

100BaseTX
100BaseTX networks use two pairs or UTP CAT 5 cable. The length of cable segments can be up
to 100 meters.
100BaseT4
100BaseT4 networks use four pairs of CAT 3, 4, or 5 type cables. The length of cable segments can
be up to 100 meters.
100BaseFX
100BaseFX networks use multimode or single-mode fiber optic cables and provide up to 100 Mbps
of data transfer rates. The length of cable segment can be up to 412 meters for multimode and up to
10,000 meters for single mode cable.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 29


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment

1000 Mbps Ethernet. The 1000 Mbps (equal to 1 Gigabit) Ethernet networks are also known as Gigabit
Ethernet. These networks use either copper-based or fiber optic cabling. These networks are implemented
mainly as a backbone for large networks.

1000BaseX
Gigabit standards include 1000BaseLX, 1000BaseSX, and 1000BaseCX. The 1000BaseLX and
1000BaseSX use multimode or single-mode fiber optic cables. The 1000BaseCX standard specifies
use of shielded twisted pair (STP) cables.
1000BaseT
This standard uses four pairs of CAT 5 UTP cable. Each pair of the CAT 5 cable can achieve
maximum data transfer speeds of up to 25 Mbps, making it an overall 1000 Mbps.

Networking protocols

Networking protocols provide ways for computers to communicate with each other through the networking media.
TCP/IP. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of several protocols. It is the most
widely used protocol suite in private networks as well as on the Internet. Unlike the AppleTalk and IPX/SPX
protocols, TCP/IP is not proprietary to any organization but is a public protocol suite. Needless to say,it is a fully
routable protocol. The routing functionality is provided by a number of routing protocols such as RIP and OSPF.
The TCP/IP protocol suite is supported by all major network and desktop operating systems. Some of the well
known protocols and their functions are discussed later in this section. The following are some of the main
configuration settings on a typical computer:

IP address. An IP address is a unique address used to identify a computer or a host on the network. This address is
made up of 32-bit numbers written in dotted decimal notation in the w.x.y.z format. Each eight bits are known as an
octet or a byte. A part of the IP address is known as the network address or network ID and the rest of it is known as
the host address or host ID. These parts are based on the class of IP addresses used on the network. All computers
on a particular network must have the same number as the network address, while the host address must be unique
on the entire network.

Subnet mask. Every IP address is accompanied by a subnet mask. It is used to help identify the part of the network
where the host is located. Like the IP address, the subnet mask is a 32-bit binary number that distinguishes the
network ID from the host ID.

Default gateway. A default gateway allows computers on a network segment to communicate with computers on
another segment. The default gateway for all computers on a particular segment is the IP address of the router

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 30


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
interface that is connected to the local segment. If a computer is not configured with the IP address of a default
gateway, it cannot communicate with computers on a different network segment.

DNS address. The IP address of a DNS server is configured on TCP/IP hosts so that all name resolution queries are
sent to the designated DNS server. Most network and desktop operating systems allow you to configure multiple
DNS servers.

WINS address. The IP address of a WINS server is configured to resolve NetBIOS name resolution queries. As
with the DNS address, you can configure more than one WINS server address on a TCP/IP host. The servers and
workstations use a 48-bit hexadecimal address that defaults to the MAC address of the network interface card. The
node address is appended to the network address to create a unique node address in the internetwork.

NetBEUI/NetBIOS. NetBEUI stands for NetBIOS Extended User Interface. It is an old Microsoft networking
protocol used in small networks. This protocol provides services at the transport and network layer of the OSI
model. It is not a routable protocol and as such, cannot be used on large routed networks. The computers using the
NetBEUI protocol use Network Basic Input Output System (NetBIOS) naming conventions. NetBIOS computer
names consist of a maximum of 15 characters such as Server1 or Workstation1.

Simple Mail Transfer Protocol (SMTP). SMTP is a connection-oriented application layer protocol that is used to
transport messages between remote email servers. It uses TCP at the transport layer and hence guarantees delivery
of data.

Internet Message Access Protocol 4 (IMAP4). Like POP3, IMAP4 is also used to retrieve email from mail
servers. The advantage of using IMAP4 over POP3 is that it provides a secure authentication mechanism.

Internet Control Message Protocol (ICMP). ICMP works at the network layer to provide error checking and
reporting functions. It is a connection-less protocol and uses IP for providing best-effort delivery. It is used in
network management and maintenance systems. For example, PING is a troubleshooting utility that uses the ICMP
protocol.

Address Resolution Protocol (ARP). ARP works at the network layer. It is used to resolve IP addresses to MAC
addresses. Upper-layer protocols use ARP to correctly deliver data packets to the destination host. ARP maintains a
mapping of IP addresses and MAC addresses in the system memory called the ARP cache. If the ARP cache does
not have an entry for a requested IP address, it broadcasts the IP address on the local network to find out which host
has the specified IP address.

HyperText Transfer Protocol (HTTP). HTTP is an application layer protocol that allows text, images, and
multimedia to be downloaded from web sites. It is also a connection-oriented protocol that uses TCP at the transport
layer. HTTP works with a uniform resource locator (URL) to connect to the desired web site. An example of a URL
is http://www.oreilly.com.

HTTP Secure (HTTPS). HTTPS is the secure version of the HTTP protocol that allows servers and clients to be
authenticated before the communication session starts. This protocol is also an application layer protocol and uses
TCP at the transport layer. It is commonly used for online banking and other e-commerce functions. It uses a secure
socket layer (SSL) to encrypt the network traffic between the web server and the web client. A web site using SSL
has a URL starting with https://.

Secure Socket Layer (SSL). SSL is an encryption protocol popularly used for Internet based transactions such as
online banking. This protocol is based on public key encryption mechanisms. Transport Layer Security (TLS) is the
successor of SSL but can be scaled down to SSL 3.0 mode for backward-compatibility. SSL provides end-to-end
security for Internet communications by using encryption. In typical implementations, only the server component is
Set by Ayansa E. E-mail: ayeereso@gmail.com Page 31
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
required to use public keys for authentication. For end-to-end security, a Public Key Infrastructure (PKI) is required.
Both the server and the client must be SSL-enabled to communicate over a secure channel.

Telnet. Telnet is an application layer protocol that allows connections to remote hosts. Administrators use this
protocol to connect remotely to network devices and run commands in order to configure or maintain them. Telnet
is also a connection-oriented protocol and uses TCP at the transport layer.

File Transfer Protocol (FTP). FTP works at the application layer to provide file transfers between remote
computers. FTP uses TCP as its transport protocol. FTP is a client/server application that authenticates users before
allowing access to servers that host the FTP service. Most FTP servers allow anonymous logons that enable
multiple users to connect to the server and download files. FTP is commonly used on the Internet for file
downloads. One of the major limitations of the FTP protocol is security. The authentication method uses clear text
usernames and passwords, which is a serious security concern.

DNS. DNS stands for Domain Name System. The DNS service is used to translate fully qualified domain names
(FQDN) to their respective IP addresses. Large corporate networks and all hosts on the Internet use FQDN notation
to identify computers on the network. A fully qualified domain name can consist of a maximum of 63 characters
including the dots. An example of a fully qualified domain name is www.us.books.oreilly.com. DNS servers on a
network run the DNS service and are responsible for resolving DNS queries for their clients. They can do it either
by themselves or by having the queries resolved though referring to another DNS server. DNS clients are
configured to use one or more DNS servers when configuring their TCP/IP properties.

Windows Internet Naming System (WINS). A WINS server is used to translate NetBIOS computer names to IP
addresses. NetBIOS names consist of a maximum of 15 characters. These servers are used only on Windows
networks. The WINS server maintains a mapping of NetBIOS names to IP addresses. When a Windows client needs
to resolve a computer name to its IP address, it sends a name resolution query to the WINS server. This helps limit
the amount of broadcast traffic generated by a broadcast method of name resolution. Windows clients can be
configured to use one or more WINS servers.
Protocol Function
File Transfer Protocol (FTP) FTP is a client/server application used for file transfers between remote computers.
Trivial File Transfer Protocol (TFTP) TFTP is also used to transfer files between two remote computers. It is faster
but less reliable than FTP
Simple Mail Transfer Protocol (SMTP) SMTP is used to transport messages between remote email servers.
HyperText Transfer Protocol (HTTP) HTTP allows text, images, and multimedia to be downloaded from web sites.
HTTP Secure (HTTPS) HTTPS is the secure version of the HTTP protocol that authenticates web
servers and clients before the communication session starts.
Post Office Protocol 3 (POP3) POP3 is used to download or retrieve email messages from mail servers
running the SMTP protocol.
Internet Message Access Protocol 4 (IMAP4) IMAP4 is also used to securely retrieve email from mail servers.
Telnet Telnet allows connections to remote hosts such as network devices for
administrative and maintenance purposes.
Internet Control Message Protocol (ICMP) ICMP provides error checking and reporting functions.
Address Resolution Protocol (ARP) ARP is used to resolve IP addresses to MAC addresses.
Network News Transfer Protocol (NNTP) NNTP provides newsgroup services such as posting and retrieving messages
on discussion forums.
Line Printer Remote (LPR) LPR provides client connectivity to printers in network operating systems
such as Unix, Linux, and Windows.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 32


Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
Network Support
tracert/traceroute
 This utility is used to trace the route from one host to another.
 It uses ICMP echo packets.
 If the network is congested, the output shows Request Timed Out.
 Windows operating systems use the commands: tracert <Hostname> or tracert <IPAddress>.
 Unix/Linux and MAC OS use the commands: traceroute <Hostname> or traceroute <IPAddress>.
 NetWare uses the command: iptrace
ping
 This utility is used to test connectivity between two TCP/IP hosts.
 It can also test whether name resolution is working or not.
 A Request Timed Out error means that the echo request did not get a response.
 A Destination Host Unreachable error appears when the host is not found.
 An Unknown Host error means that the hostname could not be resolved.
 A TTL Expired error means that no response was received before the TTL value reduced to zero.
arp
 The arp utility is used to resolve an IP address to the MAC address.
 Recently resolved MAC addresses are stored locally in the ARP cache.
 Dynamic entries are created automatically in the ARP cache.
 Static entries are added manually using the arp–s command.
netstat
 This utility displays the protocol statistics and current active TCP/IP connections.
 The output columns include protocol, local address and port number, foreign address and its port number,
and the state of the connection.
nbtstat
 This utility is used only in Windows operating systems.
 It is used to display the NetBIOS over TCP/IP connection statistics.
 It is useful for diagnosing problems in Windows networks.
ipconfig
 This utility is used in Windows to display the TCP/IP configuration of the local host.
 When used with the /all parameter, it displays configuration of all network adapters.
 The ipconfig utility can also be used to release and renew IP configuration of a network adapter.
ifconfig
 This command is the Unix/Linux and MAC OS X equivalent of Windows ipconfig.
 It is used to display the TCP/IP configuration.
Set by Ayansa E. E-mail: ayeereso@gmail.com Page 33
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level III
Knowledge assessment
winipcfg
 his utility is used in Windows 95, Windows 98, and Windows ME.
 It displays current TCP/IP configuration settings.
nslookup
 This utility is used to diagnose name resolution problems.
 It can be executed in the interactive mode or in the non interactive mode.
 In the non interactive mode, it is run with one or two pieces of information.
dig
 This command is used on Unix/Linux/MAC OS systems to perform DNS queries.
 Standard command parameters include the DNS server name, the name to be resolved, and the type of query.
 The query section displays the type and class of the DNS query.
 The answer section displays the name of the host and its IP address for which the query is being performed.
 The authority section displays information about authoritative DNS servers.

Set by Ayansa E. E-mail: ayeereso@gmail.com Page 34

You might also like