You are on page 1of 15

11 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
12 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
13 | P a g e

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
14 | P a g e

Column “A” Column “B”

1. Loop back O A. NAT


2. Resolve IP address M B. Bad memory
3. Dynamic Configuration L C. ESD
4. Parity error B D. Segmentation
5. Reliable communication Q E. UDP
6. Anti-wrist strap C F. HTTP
7. Hide IP address A G. CSMA/CD
8. Transport layer D H. Protocol
9. Generic of communication with bridge and router I. FTP
10. Absorbing Signal bouncing communication S J. Authentication
11. Threat security Communication J k. Authorization
12. Unreliable communication E L. DHCP
13 . access method G M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
s. Terminator

Column A Column B

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
15 | P a g e

Column A Column B
1. Ip Address Conflict M A. Kaizen
2. Fiber optics cable connectors F B. Worm
3. telnet P C. Workplace communication
4. class B IP address range U D. Quality control
5. continuous improvement A E. Site
6. A secret word or string of characters used for F. MT-RJ
user authentication T G. 10.xxxxx
7. a logic group of workstation, server and network H. Ping
devices that appear to be on the same LAN I. DNS
despite of their geographical distribution K J. NAT
8. replicates itself B K. VLAN
9. refers that DNS name resolution is working L. Wi-Fi
correctly R M. Assigning the same IP address
10. exchanging of information both verbal and non- N. FTP
verbal within an organization C O. UDP
11. Set of procedures intended to ensure that P. Remote login protocol
manufactured product or performed service are Q. Transport
delivered in advanced set of quality D R. NS Lookup
12. object in active directory represents a S. Authentication
geographical location that holds network E T. Password
U. 128.xxx

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
16 | P a g e

1. Allows various object types to be moved from A. Active Directory Migration Tool
current location to a new location D Delegation Control Wizard
2. allows administrators to log on with a non- B. Dictionary attack
administrator account to perform C. DS move
administrative tasks without logging off. H D. Run as
3. to migrate objects in Active Directory forests E. Drag and drop
A F. Identification number (PIN)
4. used to build, deploy and operate XML and G. Secondary Logon
web service Q H. Strong Password
5. One part of dictionary attack J I. Password cracking
6. Move the domain name J. Group Policy
7. OU moving F K. Hub
8. Separate collusion domain and same L. Proxy Server
broadcast O M. File Server
9. All ports are in the same collusion and N. Switch
broadcast domain L O. Print Server
10. Used to share public resource N P. Applcation Server
11. Show only one ip address for multiple users Q. Coaxial cable
on the subnet M R. UTP
12. Hacking and cracking password C
13. ATM(Automated Teller Machine) G
14. Requirment feature run as

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
17 | P a g e

Matching A
A B
1. Loop back address 127.0.0.1 A. Bad memory
2. Resolve IP address DNS B. NAT
3. Dynamic configuration DHCP C. ESD
4. Parity Error NAT D. Segmentation
5. Reliable communication Packet switch E. UDP
6. Anti wrist strap ESD F. HTTP
7. Hide IP address Bad Memory G. CSMA/CD
8. Transport Layer Segmentation H. Protocol
9. Generic of communication with bridge and router Protocol I. FTP
10. Absorbing signal bouncing communication Terminator J. Authentication
11. Threat security communication Authentication k. Authorization
12. Unreliable communication UDP
13. Access method CSMA/CD L. DHCP
M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
S. Terminator

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
18 | P a g e

Matching B
A B
1. Hardware Problem (F) Cabling Problem A. Packet
2. NIC driver not installed (C) NIC Failure B. ARP a
3. Typing incorrect user name & password(E) Software Problem C. NIC Failure
4. Coaxial Cable connector(T/L) BNC/ T-connector D. Telnet
5. Incorrect color arrangement of UTP cable(H) Operator errorE. Software Problem
6. Used to start to install Active directory(I) DCPROMO F. Cabling Problem
7. The first troubleshooting step(N) Establish/identify G. RJ-45
8. Used to establish a session with remote device(D) Telnet H. Operator error
9. Display protocol statistics & current TCP/IP I. DCPROMO
Network connection(O) NETSTAT J. Web server
10. Used to access E-Mail(K) Message k. Message
11. Fiber optics connector (M) MT-RJ L. BNC
12. Network layer data format (J) Web server M. MT-RJ
13. Display MAC address of a machine (B) ARP a N. Establish/identify
14. Twisted pair cable connector (G) RJ-45 symptom
15. Application layer data format (R) File Server O. NETSTAT
P. Exchange Server
Q. RJ-11
R. File Server
S. Event log
T. T-connector

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
19 | P a g e

Matching
1) Packet filter………………………………………..………Router
2) Class A IP Address………………………………..……10.0.0.1
3) Fiber optical cable connecter………………….….5C
4) UTP Cable connector………………………………….RJ-45
5) ARP…………………………………………………………...Convert IP address to MAC
6) Line tel phone connector……………………..…….RJ-11
7) Resolve IP address domain name……………….192.168.0.1
8) Temporary storage voltage ……………………….RAM
9) Non Verbal communication………………….….no write paper word
10) Communication work place people………..….work ethic
11) Terminator ……………………………………………….Bus Topology
12) Connection oriented reliable………………….…..TCP/IP
13) Computer manager………………………………..….Server Based Network
14) Firewall …………………………………………………….Unauthorized access to a network
15) Physical layer ………………………………………..….Convert electrical pulse in to light

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
20 | P a g e

ASSESSMENT PACKAGE ON HNS

Instruction I choose the best answer from the given alternatives


1. Net window application is installed and run it works fine, however when operating word which has
privesly, installed a general protection fault is generated and word terminates, after installing word if still
refers to run the problem is called____________be
A. The new open our works do file related to file
B. Run RECEDIT to the restore word in the registorey
C. The word installation files have become corrupted and you created new installation media
D. The new open used to much RAM and not enough to run
2. During the printing an error message is displayed the PC are printed recently and no change have been
made to PC soft ware or hard ware you check to see that the printer is turned on then you look next
A. if the correct printer driver printer is installed
B. if the printer selected is are defaulted
C. if the printer is on line
D. if the printer will print attached to different pc
3. A floppy driver light comes on and stray on the most possible cause of the problem is
A. No floppy diskette in it
B. No power
C. The sound cable is missed
D. The cable is in proprley
4. CD ROM drivers connected to pc using?
A. fiber cable
B. floppy cable
C. ICSI connector
D. IDE inter face cable
5. Allow video card is installed and configure when the pc rebooted window change on log on screen
The step to the resolve program is
A. Boot step by step confirmation and do not sound anything that doesn’t necessary for the system boot
B. Port the computer in safe mode change video driver to VGA
C. The install window
D. boot command promote only
6. The network cable that transmission single in the form of light is
A. Coaxial cable C. STP cable
B .UTP cable D. Fiber optic cable

7. What does a lit status link light on the network adapter's back plate mean?
A. The connection is alive
B. Data is being uploaded
C. Data is being downloaded
D. Data is being encrypted

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
21 | P a g e

8. You have been asked to make a recommendation to improve the performance of a client's network.
When you examine the network architecture, you find that it is based on hubs. What should you
suggest to improve the LAN's performance?
A. Install higher-speed hubs to minimize system upgrade costs and maintain compatibility with the
existing network structure.
B. Install high-speed switches to replace the old hubs. This will provide more intelligent switching
of the information around the network.
C. Install routers to replace the hubs. Router performance is so much better than hubs that the
performance increase will be very noticeable.
D. Install a router to better control information movement in the network and replace the
hubs with switches to improve network traffic.
9. What Windows tool can be used to configure most modern routers?
A. The Windows Explorer interface
B. The Device Manager utility
C. The MSCONFIG utility
D. Internet Explorer web browser
10. In Windows, the networking component that provides the rules that the computer uses to govern the
exchange of information across the network.
A. Client
B. Adapter
C. Protocol
D. Service
11. How is the UNC format applied to shared resources?
A. //shared_resource_name
B. //host_name/shared_resource_name
C. \\shared_resource_name
D. \\computer_name\share_name
12. Which of the following causes a mapped drive to disappear from a system when it is shut down and
restarted?
A. The name of the mapped folder has been changed
B. The Reconnect at Logon option is not selected
C. The path to the mapped folder has changed
D. The host computer for the mapped folder is turned off
13. Where can the TCP/IP protocol be manually configured in Windows XP?

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
22 | P a g e

A. In the Properties page of the Local Area Connection Icon, which is located in the
Network Connections Window
B. In the Network Component Type screen through the Dial-Up Connections page
C. In the Protocol Installation screen through the Local Area Connection page
D. In the Protocol screen of the Network Configuration page
14 .What effects will running diagnostic applications across the network have on the network's
performance?
A. The unit running the application will not have access to other parts of the network.

B. The units on the network may slow down


C. The units on the network will communicate faster

D. The units on the network may crash.

15 .You have been sent to troubleshoot an Internet connectivity problem. When you try to PING the site's
fully qualified domain name, the site cannot be located; however, you can PING its IP address. What
network function should be checked?
A. DNS
B. DHCP
C. WINS
D. FTP
16 .When you enter IPCONFIG in the Run dialog box, you get a momentary black box on the display
followed by a normal command prompt screen. What is occurring with this command?
A. The TCP/IP utility has not been configured on the local machine.
B. The network adapter is bad. Therefore, there is no information for the IPCONFIG utility to
return.
C. The local host is not communicating with the client computer. Therefore, there is no
information for the IPCONFIG utility to report.
17 .After running the IPCONFIG utility, you try to PING the local adapter's IP address but no reply is
returned. What does this indicate?
A. TCP/IP has not been loaded into the system.
B. The local adapter's IP address has not been initialized.
C. TCP/IP is not working on the gateway device.
D. The default gateway is not functional.
18 .A computer on your network is not able to see any other computers on the network. When you check
the adapter's TCP/IP configuration, you find that the IP address is 169.254.0.0. What does this indicate?
A. The network adapter in the machine is bad or has not been initiated.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
23 | P a g e

B. The cable connecting the PC to the local switch is bad.


C. The DNS function for the network is not working and Automatic Private IP Addressing has
been performed by the local PC.
D. The DHCP function for the network is not working and Automatic Private IP
Addressing has been performed by the local PC.
19 .What command would be used to establish network connectivity?
A. IPCONFIG /all
B. IPCONFIG /release
C. IPCONFIG /renew
D. IPCONFIG /registerdns

20. Which IP address will invoke the TCP/IP loopback function?


A. 127.0.0.1
B. 10.0.0.1
C. 169.192.0.1
D. 172.254.0.1
21. Generally, whenever a user tells you that the LAN connection is not working, what is the first thing
to check?
A. Check the network adapter drivers to see that they are configured properly

B. PING a known IP address to see if the network cable and connectivity is good.

C. Check for the presence of link lights on the back of the network adapter

D. Run IPCONFIG to see if the local network hardware is functioning.

22. A user can access an associate's computer on the network but can't access the Internet through the
network gateway. What is the most likely cause of this problem?

A. The Subnet Mask configuration is incorrect.

B. The DNS service is not working.

C. The DHCP service is not working.

D. The gateway address is configured incorrectly.

23. If you try to ping the loopback address and nothing happens, what is most likely the problem?

A. TCP/IP is not working on the local machine.

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
24 | P a g e

B. The network cable is bad.

C. The local connectivity device is turned off

D. The network adapter in the local machine is defective.

24. A device that used to connect all nodes in star topology in one place is

A. Repeater B. Hub C. Switch D. B&C

25. The type of network cable that commonly used in TV system

A. UTP B. Coaxial C. fiber optics D. all

26. Terminator in a bus topology is used for

A. to transmit the signal on networks B. Connect all nodes to each other

C. Stop the signal on bouncing over the back bone & make the main cable free

D. all

27. _________ Is a network adopter that is used to connect PC to N/W.

A. NIC B. Bridges C. Repeaters D. none

28 . Is device that can be used to connect N/Ws that use different technologies (LANs, MANs

& WANs)

A. Bridges B. Repeaters C. Routers D. Switches

29 . Which one of the following is the function of NIC?

A. Prepare data from the computer for the network cable


B.Send the data to another computer
C.Control the flow of data b/n computer & cabling system
D.all of the above

30 . The maximum cable length segments of UTP cable is

A.100 meter B.185 meter C.500 meter D. none

31 ._______cable is good for very high speed, high capacity data transmission.

A. Coaxial cable B. Twisted Pair cable C. Fiber optic cable D.all

32 . Which net work device can amplify or regenerate the weak signal

A. Bridge B. Switch C. Repeater D. all

33. Which one of the following net work device used to connect different net work that uses

the same net work protocol?

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III
25 | P a g e

A. Switch B. Bridge C.HUB D.repeater

34 . Which type of cable arrangement is used to connect similar devices?

A. Cross over B. Rollover C. Straight trough D. All

35 . A device that are used to connect RJ45 with UTP cable

A. Cable Cutter B. Crimper C.cable taster D. all

36 . How many wires are there in cat- 5e UTP Cable?

A.2 Pairs B.4 Pairs C. 8 wires D.B &C

37 .Which one of the following is false?

A.In a peer to peer net work configuration two PCs can have the same type of IP

address

B. In a peer to peer net work two PCs must use the same type of work group name.

C. Both PCs have equal right to access a net work

D. All

38.. Which net work command is used to check the connectivity status of the net work?

A. PING B. IPCONFIG C. Regedit D. none

SHENO TVET COLLAGE


ICT Department 2009 E.C HNS L-III

You might also like