You are on page 1of 8

Level four(4)

1,Which of the following elements is required to do after successfully installation of DNS?

a,Static IP address configuration

b. O WINDOWS 2000 clients configuration

c. O Dynamic IP address configuration

d. O Active Directory configuration

2,You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default gateway, and NS information. Which protocol will you use to accomplish this?.

a. O SNMP

b. SMTP

c. DHCP

d. O ARP

3.A network administrator is verifying the configuration of a newly installation establishing a FTP
connection to a remote server, what is the highest protocol stack that the network administrator is
using for this operation?

a. O Presentation

b. O Session

c.Application

d. O Transport

4.Which connectivity method would be best for a corporate employee who works from home two
days a week, but needs secure access to internal corporate databases?

a. O VPN

b. O Cable

C. O WIMAX

d. O DSL

5.Which one of the following is best describe virtual memory?

a. O An extremely fast type of memory

b. O A memory which used to hold data in permanent bases

c.The use of hard disk space as an extension of RAM when physical memory runs out
d.A segment of memory that has been reserved for use by the CPU

6,Router, access switches, hub and word processing operate and atlayer respectively?

a,3. 2. 1.7

b,3. 3. 2.7

c,3. 3. 1.7

d. O 3.3.3.7

7.You need to configure a folder that allows everyone in your department to view and edit the files
in the folder. You also need to ensure that users outside the department cannot access the files.
What should you do?

a. O Grant access to a single user by using the Share With menu.

b. O Grant read access to specific people by using the Share With menu.

c. Grant read/write access to specific people by using the Share With menu.

d. Place the files in one of the Windows public folders

8.In which of the following protocols does a website (if accessed using the protocol) encrypt the
session with a Digital Certificate?

a. O XHTTPS

b. O TCPS

c. O SHTTPS

d. O HTTPS

9.The scheduled activities designed to extend equipment reliability based on performing activities
prior to equipment failure based on risk levels and organization experience.

a. Predictive maintenance

b. O Reliability-centered maintenance

C. O Routine maintenance

d. O Interval based maintenance

10,Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?

a. O 192.168.168.128-192
b.192.168.168.129-191

c. O 192.168.168.128-190

d.192.168.168.129-190

11,A service that a computer uses to resolve NETBIOS names without any administrative work on
your network?

a.O WINS

b. O FTP

c. O UDP

d. O DHCP

12,A technician is to document the current configurations of all network devices in a college,
including those in off-site buildings. Which protocol would be best to use to securely access the
network devices?

a. OTelnet

b. OHTTP

C. OFTP

d. SSH

13,What is the reason a network administrator would segment a network with a Layer 2 switch?

a. O To isolate ARP request messages from the rest of the network

b. O To eliminate virtual circuits

C.To enhance user bandwidth

d. O To create fewer collision domains

14,Which statements are TRUE regarding ICMP packets?

1. They acknowledge receipt of a TCP segment.

2. They guarantee datagram delivery.

3. They can provide hosts with information about network problems.

4. They are encapsulated within IP datagram

a. O 3 and 4

b. O 2, 3 and 4
c. O 2and1

15,After obtaining the IP address, to prevent the IP conflict the client may use

a. O Internet Relay Chat

b. O Reverse Address Resolution Protocol

C. Broader Gateway Protocol

d.Address Resolution Protocol

d. O 1 only

16,Small-business owners develop and use operating procedures so that everyday tasks are
performed in a(n)

a. O Diverse

b.Standard

c. O Innovative

d. O Imprecise way.

17,Access point exists in

a. O Transport layer

b. O Application layer

c,Data link layer

d. O Network layer

18,A switch never learns a broadcasting address because?

a. A broadcast address will never be the source address of the frame

b. O Broadcast addresses use an incorrect format for the switch table

c. O A. Broadcast frames never sent to switches

d. O Broadcast only use network layer addressing

19,A network administrator wants to implement a network medium that is not susceptible to
electromagnetic interference, type of cable you would to use?

a. O Thicket coax

b. Fiber-optic cable

c. Cat 5 UTP cable


d. O Thinnet coax

20,Which device performs the function of determining the path that messages should take through
internetworks?

a. O router

b. O ADSL modem

c.A web server

d.A firewall

21,Given IP address 172.16.28.252 with a subnet mask of 255.255.240.0 what is the correct network
address?g

a. O 172.16.28.0

b. 172.16.16.0

c. 172.16.24.0

d. 172.16.0.0

22,Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and
manage software that is packaged into what type of file?

a. O.in

b. Omse

C. Omsil

d. O.exe

23,Letters, Emails, Video Presentations and Visual Aids Conversation Public Speaking Etc. are

a. O Written Communications

b. O Visual Communications

C .OChannel Mediums

d. O Oral Communications

24,What process involves placing one PDU inside of another PDU?

a. O Encoding

b. O Encapsulation

c. O Segmentation

d. O Flow control
25,Your company has one main office and four branch offices. The main office contains a standard
primary DNS zone named adatum.com. Each branch office contains a copy of the adatum.com zone.
When

records are added to the adatum.com zone, you discover that it takes up to one hour before the
changes replicate to each zone in the branch offices. You need to minimize the amount of time it
takes for the

records to be updated in the branch offices. What should you do?

a.On the DNS server in the main office, configure the Notify settings.

b.On the DNS servers in the branch offices, configure the Zone Aging/Scavenging Properties.

c. O On the DNS server in the main office, configure the Zone Aging/Scavenging Properties.

d. O On the DNS servers in the branch offices, configure the Notify settings.

26,A new corporation needs a data network that must meet certain requirements. The network
must provide a low cost connection to sales people dispersed over a large geographical area. Which
type of WAN

infrastructure would meet the requirements?

a. Public infrastructure

b. O Private infrastructure

c. O Satellite

d. O Dedicated

27,Unsolicited commercial email is known as?

a.Virus

b. O Spam

c.Malware

d. O Spyware

28,Which command can be used from a PC to verify the connectivity between hosts that connect
through a switch in the same LAN?

a. O ARP address

b. O Tracert address

c,Ping address

d. O Traceroute address
29,What OSI physical layer term describes the amount of time, including delays, for data to travel
from one point to another?

a. O Latency

b. O Good put

c. Bandwidth

d. Throughput

30,Which of the following services use TCP_

1. DHCP

2. SMTP

3. HTTP

4. TFTP

5. FTP

a.2, 3 and 5

b. O 1, 3 and 4

c.1, 2 and 4

d. O 1 and 2

31,Network congestion occurs?

a.In case of traffic overloading

b.When a connection between two nodes terminates

c.When there is no internet connection

d. O When a system terminates

32,You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of disk
space and prevent users from consuming more than 1 GB of disk space. How will configure it?

a. O Create a soft quota with a 800MB limit and a second quota with a 1GB limit.

b.Create a hard quota with a 1GB limit. Create a warning at 80 percent

c. O Create a hard quota with a 800mb limit and a second soft quota with a limit 1GB

d. O Create a soft quota with a 800MB limit. Create a warning at 80 percent

33,Which of the following is a principle of total quality management?


a. O Continuous process improvement

b. O Continuous productivity improvement

c.Continuous defect elimination

d. O Continuous value enhancement

34,Which OSI Layer performs error detection but not correction?

a.Application Layer

b. O Transport layer

c. O Network Layer

d.Data link Layer

35,Network layer firewall has two sub-categories known as

a.Bit oriented firewall and byte oriented firewall

b. O Frame firewall and packet firewall

c. O Circuit frame and packet frame

d. Stateful firewall and stateless firewall

36,The scpreset schedule that is established regardless of need. V2 repetition q3

a. O Predictive Maintenance

b. O Reliability-centered maintenance

c. O Interval Based Maintenance

d. O Rehabilitation Maintenanceheduled activities are based on a

You might also like