You are on page 1of 5

MODEL COC EXAM-2 HNS LEVEL 3 REGULAR CALSS

1. Users report that they are unable to access wireless network. The IT technician verifies that the
latest wireless drivers have been installed on their computer. Which of the following
troubleshooting steps should also taken to resolve this issues?
A. Replace network cable.
B. Ensure NIC disabled.
C. Remove unneeded peripherals.
D. Check access point.
2. Geographical placement of network device in a computer system environment.
A. Environmental topology
B. Physical topology
C. Logical topology
D. Administrative topology
3. One of the following is an application layer protocol_____?
A. DNS
B. IPX
C. SPX
D. Ethernet
4. A leadership style in which the includes one or more employees in decision making process is
A. Participative or Democratic
B. Federal
C. Authoritarian or Autocratic
D. Delegation or Free reign
5. On which layer, packet routing is done?
A. Transport
B. Data Link
C. Application
D. Network
6. Data communication with in a building is ________.
A. WAN
B. LAN
C. MAN
D. WLAN
7. ______ is technological factors that affect business practice improvement.
A. Customer need
B. E-Commerce
C. Marketing skill
D. Price of the product
8. The process of arranging people and resources to work together to accomplish a goal is
A. Assigning
B. Meeting
C. Forming
D. Organizing
9. The correct order of data encryption is
MODEL COC EXAM-2 HNS LEVEL 3 REGULAR CALSS
A. BitsegmentFramepacketdata
B. DataSegmentPacketFrameBit
C. BitPacketFrameSegmentData
D. DataPacketFrameSegmentBit

10. A Computer that acts as a gateway between a local network and large scale network.
A. Application server
B. File server
C. SQL server
D. Proxy server
11. At the data link layer error detection is done by
A. Bit suffering
B. Equalizer
C. Cyclical Redundancy Check(CRC)
D. Hamming code
12. Internal strengths and External is analyzed by
A. Business analysis
B. Requirements analysis
C. SWOT analysis
D. System analysis
13. The loss of Signal strength as it travels through a network medium is called
A. Cross talk
B. Interruption
C. Attenuation
D. Scattering
14. In one of the OSI layers signals are transmitted electrically?
A. Application layer
B. Physical layer
C. Transport layer
D. Data link layer
15. In DFS, access to shared folders can be distributed across many servers, resulting in the ability to
perform____, so that one server does not experience more load than others.
A. Load balancing
B. Distribution
C. Redundancy
D. Replication
16. Among the following one is provides authentication and access control for shared resources
A. Confidentiality
B. Computer security
C. Certification
D. Network security
MODEL COC EXAM-2 HNS LEVEL 3 REGULAR CALSS
17. Providing feedback, report and encouragement
A. Coaching and mentoring
B. Customer gift
C. Advice
D. Evaluation
18. Which of the following interfaces that a technician used to launch IPCONFIG utility
A. Task manager
B. Control panel
C. MMC
D. Command prompt
19. Primarily designed for large file transfer and downloads
A. FTP server
B. POP server
C. Proxy server
D. Web server
20. A topology that connects two adjacent computer respectively is
A. Hybrid
B. Ring
C. Tree
D. Bus
21. Resolving domain name is managed by protocols called ____
A. http
B. EIGRP
C. TCP
D. DNS
22. Which one is tertiary source of information?
A. Patient
B. Newspaper
C. Research report
D. Directory
23. A name that represents the end user, internal or external government body such as team leader,
directors, managers is __________.
A. Customers
B. Diplomats
C. Higher officials
D. Ambassadors
24. When we solve a network problem the first step?
A. Lock physical network settings
B. Test the connectivity using command utilities
C. Opening an internet using a browser
D. Checking network address is configured correctly
25. Used to solving IP address to name and name to IP address.
A. DNS server
MODEL COC EXAM-2 HNS LEVEL 3 REGULAR CALSS
B. FTP server
C. Proxy server
D. DHCP server
26. Is combined with an IP address in order to identify two parts extended network address and the
host address.
A. Default gateway
B. Port number
C. Subnet musk
D. Preferred DNS
27. A type of a network that help to communicate an organization with only another authorized
organization is
A. Intranet
B. Extranet
C. WAN
D. Internet
28. A system that used to enhance efficiency and customer service quality is
A. Technical documentation
B. Planed and organized workflow
C. Customer gift
D. Employees attendance
29. In a networking system, if there is a DHCP server then the client will easily get
A. URL address
B. IP address
C. MAC address
D. Port address
30. To build continuous improvement in business organization
A. Discourage workgroup members to routinely monitor key process indicators
B. Reduce the number of employee
C. Emphasis on maximizing benefit
D. Build capacity in the work group to critically review the relevant parts of the value chain
31. A of connecting computers using central devices such as hub or switch
A. Ring-Star topology
B. Tree topology
C. Bus topology
D. Star topology
32. After obtaining IP address, to prevent IP conflict the client may use
A. Address resolution protocol
B. Easy gateway protocol
C. Internet relay chat
D. Broader gateway protocol
33. A tool used to maintain continuous improvement through analyzing weakness and strength in
business practice is ____
A. 5s
MODEL COC EXAM-2 HNS LEVEL 3 REGULAR CALSS
B. SWOT
C. BSC
D. BPR
34. In FTP protocol, client contacts server using _____ as transport protocol.
A. Transmission control protocol
B. User datagram protocol
C. Stream control transmission protocol
D. Data control congestion protocol

35. Of the following, one is used for filtering keyword and blacklists for security purposes
A. Switch
B. HW firewall
C. Server
D. Bridge
36. Users report that they are unable to access wireless network .The IT technician verifies that the
latest wireless drivers have been installed on their computer. Which of the following
troubleshooting steps should also be taken to resolve this issue?
A. Replace network cable
B. Ensure NIC disabled
C. Remove unneeded peripherals
D. Check the access point

You might also like