Professional Documents
Culture Documents
1. Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smart phones to school to access
school resources?
A. Wired LAN
B. Extranet
C. Wireless LAN
D. Intranet
2. In FTP protocol, client contacts server using ____ as the transport protocol.
A. datagram congestion control protocol
B. stream control transmission protocol
C. user datagram protocol
D. transmission control protocol
3. Network layer firewall has two sub-categories as_______.
A. Frame firewall and packet firewall
B. Bit oriented firewall and byte oriented firewall
C. None of the mentioned
D. State full firewall and stateless firewall
4. Which command can be used from a PC to verify the connectivity between hosts that connect
through a switch in the same LAN?
A. Ping address
B. Traceroute address
C. ARP address
D. Tracert address
5. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN.
A. EVDO
B. CDMA
C. ALOHA
D. CSMA/CA
6. A corporate network includes an Active Directory Domain Services (AD DS) forest that
contains two domains. All servers run Windows Server 2008 R2. All domain controllers are
configured as DNS servers. A standard primary zone for dev.contoso.com is stored on a
member server. You need to ensure that all domain controllers can resolve names from the
dev.contoso.com zone. What should you do?
A. On one domain controller, create a conditional forwarder. Configure the
conditional forwarder to replicate to all DNS servers in the domain.
B. On the member server, create a secondary zone
C. On one domain controller, create a stub zone. Configure the stub zone to replicate
to all DNS servers in the forest
D. On one domain controller, create a stub zone. Configure the stub zone to replicate
to all DNS servers in the domain
7. To perform a System State restore in Windows Server 2008, you will boot the DC into what
mode?
A. Active Directory Maintenance
8. The network design for a college with users at five sites is being developed. Where in the
campus network architecture would servers used by all users be located?
A. Enterprise edge
B. Data center
C. Services
D. Access-distribution
9. One source sending a packet to multiple destinations_________.
A. Domain server
B. Unicasting
C. Multicasting
D. Broadcasting
10. A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the hosts?
A. The subnet masks should be set to 255.255.255.0
B. A crossover cable should be used in place of the straight-through cable.
C. The subnet masks should be set to 255.255.255.192.
D. A default gateway needs to be set on each host
11. You plan to implement a solution that meets the certificate requirements of Customer1. You
need to identify which role services must be deployed to the hosting environment. Which two
role services should you identify? Answer presents part of the solution
A. Certification Authority Web Enrollment
B. Online Report
C. Online Responder
D. Certificate Enrollment Policy Web Service
E. A and D
12. Enabling additional users to handle administrative tasks for a particular object is referred
A. Assignment
B. Targeting
C. Redirection
D. Delegation
13. After obtaining the IP address, to prevent the IP conflict the client may use______.
A. Address Resolution Protocol
B. Internet Relay Chat
C. Reverse Address Resolution Protocol
D. Broader Gateway Protocol
14. Which device performs the function of determining the path that messages should take
through internetworks?
A. A DSL modem
B. Router
C. A web server
Prepared By. Fasil Habtamu Page 2
D. A firewall
15. Your company has one main office and four branch offices. The main office contains a
standard primary DNS zone named adatum.com. Each branch office contains a copy of the
adatum.com zone. When records are added to the adatum.com zone, you discover that it
takes up to one hour before the changes replicate to each zone in the branch offices. You
need to minimize the amount of time it takes for the records to be updated in the branch
offices. What should you do?
A. On the DNS server in the main office, configure the Zone Aging/Scavenging
Properties
B. On the DNS servers in the branch offices, configure the Notify settings
C. On the DNS server in the main office, configure the Notify settings
D. On the DNS servers in the branch offices, configure the Zone Aging/Scavenging
Properties
16. Which one of the following is best describe virtual memory?
A. The use of hard disk space as an extension of RAM when physical memory runs
out
B. A segment of memory that has been reserved for use by the CPU
C. A memory which used to hold data in permanent bases
D. An extremely fast type of memory
17. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
A. PAT
B. Static
C. Dynamic
D. NAT
18. Which of the following protocol used port 443 and port 80 respectively?
A. HTTPS and HTTP
B. DHTML
C. XHTML
D. HTTP and HTTPS
19. A new corporation needs a data network that must meet certain requirements. The network
must provide a low cost connection to sales people dispersed over a large geographical area.
Which type of WAN infrastructure would meet the requirements?
A. Private infrastructure
B. Dedicated
C. Satellite
D. Public infrastructure
20. Which is the network strategy used extensively by the internet?
A. Local Area network system
B. Peer-to-peer network system
Prepared By. Fasil Habtamu Page 3
C. Client /server network system
D. Stand -alone network system
21. How many host addresses are available on the network 172.16.128.0 with a subnet mask of
255.255.252.0?
A. Store-and-forward
B. Cut-through
C. Fast-forward
D. Fragment-free
22. ________________ is the process that helps managers understand the nature of the industry,
the way firms behave competitively within the industry, and how competition is generally
undertaken.
A. Organizational analysis
B. Portfolio analysis
C. Market needs analysis
D. Strategic market analysis
23. The scheduled activities designed to extend equipment reliability based on performing
activities prior to equipment failure based on risk levels and organization experience.
A. Interval based maintenance
B. Routine maintenance
C. Predictive maintenance
D. Reliability-centered maintenance
24. Network congestion occurs?
A. In case of traffic overloading
B. When a system terminates
C. When there is no internet connection
D. When a connection between two nodes terminates
25. A technician is to document the current configurations of all network devices in a college,
including those in off-site buildings. Which protocol would be best to use to securely access
the network devices?
A. Telnet
B. SSH
C. HTTP
D. FTP
26. You want to implement a mechanism that automates the IP configuration, including IP
address, subnet mask, default gateway, and DNS information. Which protocol will you use to
accomplish this?
A. SNMP
B. SMTP
C. DHCP
D. ARP
27. What is an ISP?
A. a protocol that establishes how computers within a local network communicate
B. a standards body that develops cabling and wiring standards for networking
C. a networking device that combines the functionality of several different
networking devices
D. an organization that enables individuals and businesses to connect to the Internet
28. Users are complaining that they are unable to browse certain websites on the Internet. An
administrator can successfully ping a web server via its IP address, but cannot browse to the
61. A technician is to document the current configurations of all network devices in a college,
including those in off-site buildings. Which protocol would be best to use to securely access
the network devices?
A. Telnet
B. FTP
C. HTTP
D. SSH
62. Which is an important characteristic of communication?
A. Communication involves exchange of ideas, feelings, information, thoughts and
knowledge.
B. Communication process does not happen between more than two parties.
C. Communication does not involve mutuality of understanding between sender and
receiver.
D. It is a 1-way process
63. Access point exists in __________
A. Application Layer
B. Network layer
C. Datalink layer
D. Transport layer
64. Your network consists of an active directory forest that contains one domain named
contoso.com. all domain controllers run windows server 2008 and are configured as DNS
Prepared By. Fasil Habtamu Page 9
servers. You have two Active directory-integrated zones: contoco.com and nwtraders.com
you need to ensure a user is able to modify records in the contoso.com zone. You must
prevent the user from modifying the SOA record in the nwtraders.com zone. What should
you do ?
A. From the DNS manager Console, modify the permissions of the nwtraders.com
zone.
B. From the DNS manager Console, modify the permissions of the contoso.com
zone.
C. From the active directory users and computer console, modify the permissions of
the domain controllers organizational unit(OU).
D. From the active directory users and computer console, run the delegation of
control wizard.
65. Which of the following are layers in the TCP/IP model?am
1. Application
2. Session
3. Transport
4. Internet
5. Datalink
6. Physical
A. 1 and 2
B. 2,3 and 5
C. 1,3 and 4
D. 3,4 and 5
74. your network contains an active directory domain contoso.com the domain contains a domain
controller named DC1. You have a member server named server1. Both DC1 and server 1
have the DNS Server role installed. On DC1 , you create an active directory-integrated zone
named adatum.com. you need to ensure that server 1 receives a copy of the zone.
A. Add server1 to the DNS update proxy group.
B. Create a secondary zone on server1.
C. Modify the zone transfers settings of adatum.com
D. Modify the zone type of adatum.com
75. The scheduled activities are based on a preset schedule that is established regardless of need.
A. Interval based maintenance
B. Predictive maintenance
C. Rehabilitation maintenance
D. Reliability-centered maintenance
76. Most frequently used framework for obtaining continuous improvement is ________.
A. Quality function deployment
B. The plan-do-check-act cycle
90. A leadership style in which the leader includes one or more employees in the decision making process
is?
A. Delegate or free reign
B. Authoritarian or automatic
C. Participative or democratic
D. Federalist
91. You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS server.
You need to record all inbound DNS queries to the server. What should you configure in the DNS
manager console?
A. Enable automatic testing for simple queries
B. Enable automatic testing for recursive queries
C. Enable debugs logging
D. Configure event logging to log errors and warnings
92. You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of disk
space and prevent users from consuming more than 1GB of disk space. How will configure it?
101. It allows a visited website to store its own information about a user on the user’s
A. Cookies
B. Malware
C. Adware
D. Spam
102. A backup type, which includes only those files that have been modified since the last backup and
clears the archive bit of the files it copies to the backup medium.
A. Full backup
B. Incremental backup
C. Daily backup
D. Copy backup
103. Local GPO setting are stored in what folder on a computer?
A. %systemroot%/System32/Drivers/Etc/GroupPolicy
B. %Systemroot%/System/GroupPolicy
C. %Systemroot%/System32/Drives/GroupPloicy
D. %Systemroot%System32/GroupPolicy
104. Which statements are true regarding ICMP packets?
A. ICMP is encapsulated within UDP datagram
B. ICMP is un-encapsulated within IP datagram
C. ICMP guarantees datagram delivery
D. ICMP can provide hosts with information about network problems
E. All
105. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to
fetch the mails?
A. SMTP
B. POP3
C. S/MME
D. HTTP
106. An attempt to make a computer resource unavailable to its intended user is called?
A. Virtual attack
B. Denial of service attack
C. Botnet process
D. Worm attack
107. What do business employees often need to do before they are able to write proposals?
A. Research the problem
B. Analyze personal biases
C. Contact the customer
D. Evaluate technical skills
108. A type of cabling used to connect a router to a computer using console serial port ____
A. SFP
B. Roll over