You are on page 1of 10

1|Page

Level III theoretical part exam


1) While gathering data to determine the organization business requirement you might take records of the
organization like, annual reports and organizational polices. These kinds of information resources are
considered as
a. informant sources
b. primary sources
c. secondary sources
d. tertiary sources
2) The main reason for implementing a network for an organization is
a. to reduce security risk
b. to decrease company cost
c. to share resources
d. to exchange information
e. all
3) You are requested to implement an antivirus policy in a company that has large number of user.
identify the incorrect statement on implementing the antivirus policy
a. each computer in the company should be equipped with virus detection and cleaning software
b. each user should install his own antivirus software and know how to use it
c. organization should impose penalties on user who don't follow the antivirus policy
d. the company should have an antivirus team that focus on maintaining the antivirus measures in
place
4) you want to implement a mechanism that automates the ip configuration in your company's network.
the protocol that helps you to accomplish this
a. DHCP
b. DNS
c. SMTP
d. STP

5) you are the administrator for your company's domain. You need to subdivide the groups in your
organization within active directory. if you want to separate sales from marketing as an example. what
will use as a system of organization this subdivision
a. crate organization unit
b. crate a site and service subnet grouping
c. use user and group
d. use separate domains
6) the file system that allow for file level security to use for a server that will be an active directory
domain controller for your organization.
a. CDFS
b. FAT
c. FAT32
d. NTFS
7) your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant
in another city. the best device required to enable everyone to share data and resources between the two
LANs
a. Router
b. HUB
c. modem
d. switch
8) The TCP/IP pro for transferring electronic mail messages
a. FTP

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
2|Page

b. RPC
c. SMTP
d. SNMP

9) the command used to access active directory installation wizard


a. DOMAINISTALL
b. DCPROMO
c. DCONFIG
d. DCINSTALL
10) A system administrator wants to prevent users from starting or stopping specific services on the
domain controller. The tools that can be used to do this.
a. active directory users and computers
b. domain security policy
c. local system policy
d. domain controller security policy
11) the research and development department at your office has be experimenting with different
technologies to help improve the performance of the network; one group has been examining the use of a
broadband network versus a based band network. The correct statements about broadband and baseband.
a. broadband network carry several channels on a single cable, whereas in a baseband network
several cables carry one channel
b. baseband networks carry a single channel on a single cable whereas broadband networks
carry several channels on a single cable
c. baseband operates at a standard bit rate, whereas broadband may operate at different rates as
needed
d. Broadband and baseband refer to the different frequencies at which infrared operates then
transmitting signals in certain conditions.

12) computer cannot communicate with each other directly over telephone line because they use digital
pulse where as telephone lines use analog sound frequency. the device that permits digital to analog
conversation at the start of transmission
A. attenuation
B. interface
C. modem
D. NIC
13) the configuration information for a DHCP client is received dynamically the utility used to read
configuration for everything this setting.
A. tracert
B. ping
C. net stat
D. ipconfig
14) you are in charge of a small network and want to make a secured. the user want to have full control
over their data and still be able to share data with the rest of the office. the best type of network to set up
this.
A. client based network
B. master domain network
C. peer-to-peer network
D. server based network
15) Your customer has a client/ server Ethernet network consisting of a server and 225 computer running
windows Xp . The kind of security you recommend to him for centralized control of access to file and
directions on the network.
a. setup a password for each file and groups for each directory

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
3|Page

b. setup a password for each file and directory shared


c. setup a group of shared resources and user who have access to these group
d. setup a password for each user

16) you are requested to setup a 100mbps network for a client in an office that already has 10mbps
throughput. your client wants to keep the costs to a minimum but needs the 100mbps throughput. the
cabling solution you recommend?
a. cat3UTP
b. cat5UTP
c. coaxial cable
d. fiber able
17) the following figure shows a typical small size organize network setup. identify the network
components marked with letters A,B,C AND D consecutively.

a. DSL modem, CAT5 Ethernet cable, wireless signal, wireless router/access point.
b. Wireless router/access point, CAT 5 Ethernet cable, wireless signal DSL modem.
c. wireless router/access point, wireless signal, CAT 5 Ethernet cable, DSL modem
d. DSL modem, wireless signal, CAT5 Ethernet cable, wireless router/access point
18) you are assigned to lead a small team in your company for managing network identify the wrong
statement in leading a team
a. understand the team role
b. possess necessary leadership skill
c. favor some individuals in your team
d. assign responsibilities to team members
19) one of yours calls you with a complaint that they can't reach the site www.yahoo.com. you try and
access the site and discover that you can't access either. but you can PING the site with its IP address. the
most probable cause of the problem.
a. yahoo is down
b. the working switch is down
c. the gateway is down
d. the DNS server is down
20) the hardware and network administrator wants to remotely and securely enter commands to be run at
a remote server. the application that the administrator should use.
a. telnet
b. SSH
c. SFTP
d. RSA

21) you have just implemented a solution for a major network problem in your company and you want to
celebrate the success. The next step you should dc before starting your celebration

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
4|Page

A. Document the issue and the solution that has implemented


B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization

TYPE I
Match the OSI model layers function in column A with the name of the correct OSI model layer in
column B

COLUM A COLUMN B
__G__1, breaks data down in to manageable chunks and TCP and UDP A. Application layer
operate at this layer B. Data link layer
__D__2, define hardware connection and turns binary in to pulses(electrical C. Network layer
or light) and also repeaters and hubs operate at this layer D. Physical layer
__B__3, identifies devices on the physical layer and MAC addresses are E. Presentation layer
part of this layer F. Session layer
__F_ 4, manages connections between machines and sockets operate at this G. Transport layer
layer
__C___5, moves packets between computers on different networks and
routers operate at this layer

Type II

Match the name, type or category of IP address in column A with this IP addresses sated in column B

COLUMN A COLUMN B
___C__1, loop back IP address A. 192.168.1.1
__F__2, broadcast IP address B. 10.10.10.10
__G___3, public IP address C. 127.0.0.1
__B__4, class A IP address D. 172.16.0.20
__D__5, class B IP address E. 213.55.96.148
F. 255.255.255.255
G. 297.25.1.6

Type III
Match the uses and functions of operating system built in network troubleshooting tools in column A
with the corresponding tool in column B
Column A Column B
__G__1, used to diagnose problems reaching a A. HOSTNAME
remote system by tracing all router between two points. B. IPCONFIG
___E__2, used to diagnose DNS problem C. NBTSTAT
__A___3, used simply to return the name of the local D. NETSTAT
computer E. NSLOOKUP
__B__4, used to display information on the current F. PING
state of all the running IP processes on your computer G. TRACERT:- diagnostic utility
__D__5, uses ICMP(internet control message protocol) determines the route to a destination by
packets to show you if you can simply reach a remote sending ICMP echo packet to the
computer destination

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
5|Page

1. Which layer is responsible for process to process delivery?


A. network layer
B. transport layer
C session layer
D. data link layer
2. Chala is attempting to install a new web camera on his Windows Server 2003 to be used to monitor
the server room. Chala informs you that the device is not detected when he plugs it in. Chala says he
also tried to use the Add Hardware Wizard, but the driver was not found. You need to help Chala
install the web cam as soon as possible. What should you do? (uc3)
A. Open Device Manager and click Scan For Hardware Changes. Insert the driver disk when
prompted and install the device.
B. Start the Add Hardware Wizard and manually install the device. Supply the driver
from the manufacturer’s disk.
C. Restart the computer.
D. Open Device Manager and select Sound, Video & Game Controllers. Right-click and select
Update Driver.

3. You are the administrator of a Windows 2003 domain. All domain controllers are running Windows
Server 2003 and the domain functional level has been raised to Windows 2003. You are in the
process of building a new domain controller, which you have named OCOC. When asked for a
password, you enter ococ receive an error. What should you do to continue building the server? (uc3)
A. Log on to a different domain controller and modify the default domain policy to allow
passwords of five characters. Disable the Require Complex Passwords option.
B. Change the password to Ococserver9.
C. Change the password to ococse9%rver.
D. From a command prompt, type net user ococserver9$.
4. You are the administrator of a standalone Windows Server 2003 server. Mulugeta is your new junior
administrator. You want Mulugeta to be able to back up files and folders, run programs, but not shut
down the system. What should you do?(uc5)
A. Make Mulugeta a member of the Backup Operators group.
B.Make Mulugeta a member of the Backup Operators group. In the local security policy, edit the
User Rights node to deny Daniel the right to shut down the system.
C. Make Mulugeta a member of the Administrators group.
D. Make Mulugeta a member of the Power Users group.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
6|Page

5. You are the administrator of a Windows 2003 network. Chaltu, a help desk technician, leaves the
company. Gemechu, a new hire, will take Chaltus’s place. You want Gemechu to have the same level
of access that Chaltu had. What should you do? (uc6)
A. Rename Chaltus’s account to Gemechu. Reset the password.
B. Copy Chaltu’s account and create a new account for Gemechu. Disable Chaltu’s account.
C. Create a new account for gemechu. Recreate the group membership of Chaltu’s account to
Gemechu’s account.
D.Copy Chaltu’s account and create a new account for Gemechu. Delete Chaltu’s account.
6. You are installing the root domain controller for your forest. You have decided that the fully qualified
domain name for the computer will be ococ.gov.et. The system prompts you with a suggested
NetBIOS name for the computer. Which NetBIOS name is prompted?(uc3)
A. ococ.gov
B. ococ
C. gov
D. ococ.gov.et.
7. 11. You are troubleshooting your DNS server. The server has not been resolving some of the hosts in
the network, but is working fine for others. You check the DNS MMC snap-in and everything looks
okay. What utility should you use to determine the nature of the problem? (uc7)
A. The netstat command
B. Network Monitor
C. The nslookup command
D. The Monitoring tab of the DNS server’s Properties page
8. Which of the following groups offers the most security? (uc5)
A. Users
B. Administrators
C. Power Users
D. Backup Operators
9. What is the utility used to install Active Directory on a Windows Server 2003 computer? (uc3)
A. promotedc.bat
B. dcupgrade.exe
C. adinstall.exe
D.dcpromo.exe
10. As a network administrator you have been requested to move a printer from your company's
Marketing OU to your company's Research OU. After the move you test the printer and find that the local
administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can
you do to change this? (uc5)

A. Remove the permissions for the local administrator from the printer.
B. Remove printer permissions from the local administrator.
C. Remove the Everyone group from the printer.
D. Delete the printer object.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
7|Page

11. What can you use to dynamically assign the same IP address to a printer configured as a network
device?(uc3)
A. DNS
B. DHCP reservation
C. SNMP
D. DHCP exclusion
12. Which of the following is the behavior of good team members?(uc 11)
A. Share responsibilities
B. Keep individual information about development
C. Do not respect the opinions of others in the team
D. Do not take turns
13. Which of the following is categorized as richest channel in conveying information effectively? (uc 12)
A. Telephone
B. Face to face communication
C. Posted notices and bulletins
D. E-mail
14. Which of the following is not market promotional tool?(uc13)
A. networking and referrals
B. supply/demand
C. seminars
D. advertising
1. With respect to the OSI model, which of the following are correct statements about PDUs? (uc 2)
A. A segment contains IP addresses.
B. A packet contains IP addresses.
C. A segment contains MAC addresses.
D. A packet contains MAC addresses
16. The most effective way to mitigate congest ion on a LAN would be to__________________? (uc 7)
A. Upgrade the network cards
B. Change the cabling to CAT 6
C. Replace the hubs with switches
D. Upgrade the CPUs in the routers
17. You need to provide network connectivity to 150 client computers that will reside in
the same sub network, and each client computer must be allocated dedicated bandwidth. Which device
should you use to accomplish the task? (uc 7)
A. Hub
B. Switch
C. Router

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
8|Page

D. Bridge
18. Which of the following layers of the OSI model was later subdivided into two layers? (uc 2)
A. Presentation
B. Transport
C. Data Link
D. Physical
19. Which class of IP address provides a maximum of only 254 host addresses per network ID? (uc 2)
A. Class A
B. Class B
C. Class C
D. Class D
20. All of the following are results of Kaizen implementation in work places except;
A. Improvement in product quality
B. Safety in work places
C. Efficient space utilization
D. high waiting time
21. A network administrator is verifying the configuration of a newly installed host by establishing an
FTP connection to a remote server. What is the highest layer of the protocol stack that the network
administrator is using for this operation?
A. application
B. presentation
C. session
D. transport

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
9|Page

SECTION B – MATCHING TYPE QUESTIONS

Column A Column B
P .1. Assigning the same IP address on a network
A. 127.0.0.0
A. 2. Loop back address
B. Print device
D. 3. Sending of information packets to a single network node.
C. Quality control
H .4. A commonly used IP translation and mapping technology
D. unicast
F. 5. Provides IP-address to MAC address resolution for IP packets
E. Multicast
G .6. Provides a solution that automatically assigns IP addresses to
F. ARP
computers on a network
G. DHCP
E. 7. A single source address responding to multiple destination addresses
H. NAT
with information to be sent
I. Switch
K. 8. Addressing scheme utilizes a 128 bit address
J. Router
B. 9. A hardware device used for printing
K. IP V6
Q .10. A set of rules determining how network devices respond when two
L. Work ethics
devices attempt to use a data channel simultaneously
M. IP V4
R. 11. Responsible for electrical and mechanical connection b/n devices
N. Broad cast
I . 12. Device sends and receives information about the network layer
O. Printer
J . 13. Uses hardware address to filter a network
P. IP address conflict
L. 14. Group of moral principles, standards of behavior, or set of values
Q. CSMC/CD
regarding proper conduct in the workplace
R. Physical Layer
C. 15. Is the operational techniques and activities that are used to fulfil
S. HTTPS
requirements for quality.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
10 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III

You might also like