Professional Documents
Culture Documents
Column A Column B
Column A Column B
1. Ip Address Conflict M A. Kaizen
2. Fiber optics cable connectors F B. Worm
3. telnet P C. Workplace communication
4. class B IP address range U D. Quality control
5. continuous improvement A E. Site
6. A secret word or string of characters used for F. MT-RJ
user authentication T G. 10.xxxxx
7. a logic group of workstation, server and network H. Ping
devices that appear to be on the same LAN I. DNS
despite of their geographical distribution K J. NAT
8. replicates itself B K. VLAN
9. refers that DNS name resolution is working L. Wi-Fi
correctly R M. Assigning the same IP address
10. exchanging of information both verbal and non- N. FTP
verbal within an organization C O. UDP
11. Set of procedures intended to ensure that P. Remote login protocol
manufactured product or performed service are Q. Transport
delivered in advanced set of quality D R. NS Lookup
12. object in active directory represents a S. Authentication
geographical location that holds network E T. Password
U. 128.xxx
1. Allows various object types to be moved from A. Active Directory Migration Tool
current location to a new location D Delegation Control Wizard
2. allows administrators to log on with a non- B. Dictionary attack
administrator account to perform C. DS move
administrative tasks without logging off. H D. Run as
3. to migrate objects in Active Directory forests E. Drag and drop
A F. Identification number (PIN)
4. used to build, deploy and operate XML and G. Secondary Logon
web service Q H. Strong Password
5. One part of dictionary attack J I. Password cracking
6. Move the domain name J. Group Policy
7. OU moving F K. Hub
8. Separate collusion domain and same L. Proxy Server
broadcast O M. File Server
9. All ports are in the same collusion and N. Switch
broadcast domain L O. Print Server
10. Used to share public resource N P. Applcation Server
11. Show only one ip address for multiple users Q. Coaxial cable
on the subnet M R. UTP
12. Hacking and cracking password C
13. ATM(Automated Teller Machine) G
14. Requirment feature run as
Matching A
A B
1. Loop back address 127.0.0.1 A. Bad memory
2. Resolve IP address DNS B. NAT
3. Dynamic configuration DHCP C. ESD
4. Parity Error NAT D. Segmentation
5. Reliable communication Packet switch E. UDP
6. Anti wrist strap ESD F. HTTP
7. Hide IP address Bad Memory G. CSMA/CD
8. Transport Layer Segmentation H. Protocol
9. Generic of communication with bridge and router Protocol I. FTP
10. Absorbing signal bouncing communication Terminator J. Authentication
11. Threat security communication Authentication k. Authorization
12. Unreliable communication UDP
13. Access method CSMA/CD L. DHCP
M. DNS
N. Securing files
O. 127.0.0.1
P. Packet Switching
Q. Transport Layer
R. Router
S. Terminator
Matching B
A B
1. Hardware Problem (F) Cabling Problem A. Packet
2. NIC driver not installed (C) NIC Failure B. ARP a
3. Typing incorrect user name & password(E) Software Problem C. NIC Failure
4. Coaxial Cable connector(T/L) BNC/ T-connector D. Telnet
5. Incorrect color arrangement of UTP cable(H) Operator errorE. Software Problem
6. Used to start to install Active directory(I) DCPROMO F. Cabling Problem
7. The first troubleshooting step(N) Establish/identify G. RJ-45
8. Used to establish a session with remote device(D) Telnet H. Operator error
9. Display protocol statistics & current TCP/IP I. DCPROMO
Network connection(O) NETSTAT J. Web server
10. Used to access E-Mail(K) Message k. Message
11. Fiber optics connector (M) MT-RJ L. BNC
12. Network layer data format (J) Web server M. MT-RJ
13. Display MAC address of a machine (B) ARP a N. Establish/identify
14. Twisted pair cable connector (G) RJ-45 symptom
15. Application layer data format (R) File Server O. NETSTAT
P. Exchange Server
Q. RJ-11
R. File Server
S. Event log
T. T-connector
Matching
1) Packet filter………………………………………..………Router
2) Class A IP Address………………………………..……10.0.0.1
3) Fiber optical cable connecter………………….….5C
4) UTP Cable connector………………………………….RJ-45
5) ARP…………………………………………………………...Convert IP address to MAC
6) Line tel phone connector……………………..…….RJ-11
7) Resolve IP address domain name……………….192.168.0.1
8) Temporary storage voltage ……………………….RAM
9) Non Verbal communication………………….….no write paper word
10) Communication work place people………..….work ethic
11) Terminator ……………………………………………….Bus Topology
12) Connection oriented reliable………………….…..TCP/IP
13) Computer manager………………………………..….Server Based Network
14) Firewall …………………………………………………….Unauthorized access to a network
15) Physical layer ………………………………………..….Convert electrical pulse in to light
7. What does a lit status link light on the network adapter's back plate mean?
A. The connection is alive
B. Data is being uploaded
C. Data is being downloaded
D. Data is being encrypted
8. You have been asked to make a recommendation to improve the performance of a client's network.
When you examine the network architecture, you find that it is based on hubs. What should you
suggest to improve the LAN's performance?
A. Install higher-speed hubs to minimize system upgrade costs and maintain compatibility with the
existing network structure.
B. Install high-speed switches to replace the old hubs. This will provide more intelligent switching
of the information around the network.
C. Install routers to replace the hubs. Router performance is so much better than hubs that the
performance increase will be very noticeable.
D. Install a router to better control information movement in the network and replace the
hubs with switches to improve network traffic.
9. What Windows tool can be used to configure most modern routers?
A. The Windows Explorer interface
B. The Device Manager utility
C. The MSCONFIG utility
D. Internet Explorer web browser
10. In Windows, the networking component that provides the rules that the computer uses to govern the
exchange of information across the network.
A. Client
B. Adapter
C. Protocol
D. Service
11. How is the UNC format applied to shared resources?
A. //shared_resource_name
B. //host_name/shared_resource_name
C. \\shared_resource_name
D. \\computer_name\share_name
12. Which of the following causes a mapped drive to disappear from a system when it is shut down and
restarted?
A. The name of the mapped folder has been changed
B. The Reconnect at Logon option is not selected
C. The path to the mapped folder has changed
D. The host computer for the mapped folder is turned off
13. Where can the TCP/IP protocol be manually configured in Windows XP?
A. In the Properties page of the Local Area Connection Icon, which is located in the
Network Connections Window
B. In the Network Component Type screen through the Dial-Up Connections page
C. In the Protocol Installation screen through the Local Area Connection page
D. In the Protocol screen of the Network Configuration page
14 .What effects will running diagnostic applications across the network have on the network's
performance?
A. The unit running the application will not have access to other parts of the network.
15 .You have been sent to troubleshoot an Internet connectivity problem. When you try to PING the site's
fully qualified domain name, the site cannot be located; however, you can PING its IP address. What
network function should be checked?
A. DNS
B. DHCP
C. WINS
D. FTP
16 .When you enter IPCONFIG in the Run dialog box, you get a momentary black box on the display
followed by a normal command prompt screen. What is occurring with this command?
A. The TCP/IP utility has not been configured on the local machine.
B. The network adapter is bad. Therefore, there is no information for the IPCONFIG utility to
return.
C. The local host is not communicating with the client computer. Therefore, there is no
information for the IPCONFIG utility to report.
17 .After running the IPCONFIG utility, you try to PING the local adapter's IP address but no reply is
returned. What does this indicate?
A. TCP/IP has not been loaded into the system.
B. The local adapter's IP address has not been initialized.
C. TCP/IP is not working on the gateway device.
D. The default gateway is not functional.
18 .A computer on your network is not able to see any other computers on the network. When you check
the adapter's TCP/IP configuration, you find that the IP address is 169.254.0.0. What does this indicate?
A. The network adapter in the machine is bad or has not been initiated.
B. PING a known IP address to see if the network cable and connectivity is good.
C. Check for the presence of link lights on the back of the network adapter
22. A user can access an associate's computer on the network but can't access the Internet through the
network gateway. What is the most likely cause of this problem?
23. If you try to ping the loopback address and nothing happens, what is most likely the problem?
24. A device that used to connect all nodes in star topology in one place is
C. Stop the signal on bouncing over the back bone & make the main cable free
D. all
28 . Is device that can be used to connect N/Ws that use different technologies (LANs, MANs
& WANs)
31 ._______cable is good for very high speed, high capacity data transmission.
32 . Which net work device can amplify or regenerate the weak signal
33. Which one of the following net work device used to connect different net work that uses
A.In a peer to peer net work configuration two PCs can have the same type of IP
address
B. In a peer to peer net work two PCs must use the same type of work group name.
D. All
38.. Which net work command is used to check the connectivity status of the net work?