You are on page 1of 12

Occupational Code: ICT HNS

Ministry Of Education
Sector: ICT
Sub Sector: Information Technology
Occupation: Hardware and Network Servicing- L-IV:
Knowledge Assessment _v1
The assessment covers the following units of competence:
1. Plan and Organize Work
2. Assist with Policy Development for Client Support
3. Build Internet Infrastructure
4. Migrate to New Technology
5. Determine Maintenance Strategy
6. Establish Quality Standards
7. Utilize Specialized Communication Skills
8. Develop Team and Individuals
9. Manage and Maintain Small/Medium Business Operations
10. Manage Continuous Improvement System

Candidate name
Registration number
Name of training provider
Name of Assessment Center

Structure of Test
Section No of questions No of marks Suggested time
A-Multiple choice questions 21 21 30min
B-Matching Type 15 15 20min
Total 36 50min

OFFICE USE ONLY

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

Multiple Choice Questions /21


Matching Type /15
Final Mark /36

February 2013

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

Instructions
1. Write your name, Registration number, name of training provider and Assessment
center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited Assessor
5. You may use the following references in this test
 Non-programmable calculators
6. Do not bring the following items into the assessment venue
 Mobile telephones
 Programmable calculators
 Written notes

SECTION A – MULTIPLE-CHOICE QUESTIONS


Instructions for Section A
1. There are twenty one [21] questions in this section.
1. Select the best answer and encircle the letter
2. If you wish to change an answer, place an X mark on the letter you have encircled and
then circle the letter of your preferred answer.
3. A correct answer scores 1, an incorrect answer scores 0.No marks will be given for a
question if more than one answer is supplied

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

1. A security policy defines (UC-10)

A. When users cannot log in to their computers

B. What users can and cannot do with their computer

C. How the user should install their own software

D. How complex user password should be

2. A type of network that supports two /more organizations and that allows controlled access
from the outside for specific purposes. (UC-02)

A. Intranet

B. Extranet

C. Internet

D. Wide Area Network (WAN)

3. You want all network clients to download and install updates automatically during night
hours, and you have configured scheduled installation behavior for Automatic Updates.
However, you discover that some users are turning off their machines at night and updates
are not being applied. The group policy that enables you to correct this situation without
changing the installation schedule?(UC-02, UC-10)

A. Configure Automatic Updates


B. No Auto-Restart For Scheduled Automatic Updates Installations
C. Specify Intranet Microsoft Update Service Location
D. Reschedule Automatic Updates Scheduled Installations

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

4. Assume that you are giving a service and you want to measure its quality. The best way to
do this. (UC-06)
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to measure their
satisfaction
D. Wait until you receive a complaint from customers

5. A user can login to his computer but cannot access network resources. The user has all the
appropriate group memberships and permissions, but he still cannot access shared
resources. The cause of this problem (UC-10)

A. User has attempted to access a shared folder without appropriate permissions.


B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.

6. You organization consists of four physical locations connected by a wide-area network


(WAN). Each site has its own independent Internet connection. If the primary concern about
installing Windows Server Update Services (WSUS), the best way to configure the WSUS
servers without affecting WAN link. (UC-03)

A. All clients download updates from a single WSUS server at the head office.

B. Each location has an independent WSUS server that serves local clients.

C. Each remote location has replica WSUS servers that copy their configuration from
the head office WSUS server.

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

D. Each remote location has a disconnected WSUS server and updates are imported
on those servers from DVD.

7. Your company has a main office and a branch office. You deploy a read-only domain
controller (RODC) that runs Microsoft Windows Server 2008 to the branch office. You need
to ensure that users at the branch office are able to log on to the domain by using the
RODC. What should you do? (UC-10)

A. Add another RODC to the branch office.

B. Configure a new bridgehead server in the main office.

C. Configure the Password Replication Policy on the RODC.

D. Decrease the replication interval for all connection objects by using the Active Directory
Sites and Services console.

8. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue? (UC-5)

A. Identity symptoms and problems

B. Document the process and solutions

C. Establish the most probable cause

D. Escalate if necessary

9. A common method used to prevent the unauthorized network devices from sending traffic
across a network is port.

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

A. Spanning

B. Address translation

C. Mirroring

D. Authentication

10. The type of license key allows you to host an activation service locally within your own
network. (UC-10)

A. Multiple Activation Key

B. Key Management System

C. Key Activation System

D. Multiple Management System

11. A new project requires that users in your domain and in the domain of a partner Organization
have access to a shared folder on your file server. Which type of group should you create to
manage the access to the shared folder? (UC-10)
A. Domain local security group

B. Universal security group

C. Global security group

D. Domain local distribution group

12. You are giving training about computer and network maintenance for a maintenance team.
As a trainer, the first step in the maintenance process you recommend. (UC-05)

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

A. Gather data from the computer

B. Verify the obvious issues

C. Evaluate the problem and implement the solution

D. Gather data from the customer

13. You are going to build Internet infrastructure with 31 subnets and 7 usable host addresses per
each subnet. The class C subnet mask for this case. (UC-03)

A. 255.255.255.240

B. 255.255.255.244

C. 255.255.255.250

D. 255.255.255.242

14. The reason that end users need to be aware of the security policy. (UC-10)
A. Some security decisions are usually in their hands

A. They should understand the probability of every risk

B. They need to be aware of every threat

C. They should avoid responsibility for their actions

15. You are a network administrator at XYZ Company, and one of your tasks is designing the
company security policy. The element NOT to be specified in an enterprise security policy.
(UC-10)

A. Risks and how to manage the risks

B. User roles and responsibilities

C. Software versions of the security products

D. Contingency plan in case of compromise

16. The first step in establishing a disaster recovery plan (DRP). (UC-05)

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

A. Demonstrate adherence to a standard disaster recovery process

B. Agree on the goals and objectives of the plan

C. Identify applications to be run during a disaster

D. Identify the causes of the disaster.

17. Firewall function. (UC-10)

A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

18. A security implementation principle that recommends division of responsibilities so as to


NOT allow one person to commit an undetected fraud. (UC-10)
A. Separation of duties

B. Collusion

C. Least privilege

D. Delegation of power

19. While you are configuring new wireless clients, none of the new clients is able to connect to
the network, but clients already on the same access point do not have any connectivity
problem. Which is NOT the possible reason for this problem? (UC-03, UC-05)

A. A poor signal due to interference

B. A bad access point

C. An incorrect IP address

D. An incorrect same service set identifier (SSID)

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

20. You a network administer for ABC Company. You are verifying the configuration of a newly
installed host by establishing an FTP connection to the remote server. The highest layer of
the protocol stack you are using for this operation. (UC-03)

A. Application

B. Presentation

C. Session

D. Transport

21. You have a domain controller that runs Windows Server 2008 and is configured as a DNS
Server. You need to record all Inbound DNS queries to the Server. What should you
configure in the DNS Manager console? (UC-10)

A. Enable automatic testing for simple queries

B. Enable automatic testing for recursive queries

C. Enable debug logging

D. Configure event logging to log errors and warnings

SECTION B – MATCHING TYPE QUESTIONS


Instructions for Section B
1. There are fifteen [_15_] questions in this section.
2. Match column A with column B. Select the letter of the correct answer from column B &
write your answer on the provided space in front of the number in column A
3. If you wish to change your answer place an x mark on your previous answer and write your
preferred answer
4. A correct answer scores 1, an incorrect answer scores 0. No marks will be given for a
question if more than one answer is supplied

Type I: Match the Statement in column A with the correct Term in column B
Column A Column B

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

_______E___ 1. The degree of excellence of something A. Strategy


B. Protocol
_______B___ 2. An original draft or record of documents.
C. Rules and Regulations
_____D_____ 3. A series of actions conducted in a certain manner. D. Procedure
E. Quality
______A____ 4. A plan of action designed to achieve a long term aim.
F. Policy
______F____ 5. A principle to guide decision and achieve rational G. Goal
outcomes.

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1


Occupational Code: ICT HNS

Type II: Match the Statement in column A with the correct Policy and Setting in column B
Column A Column B
_______C___ 1. Specify the users permitted to be members of A. Account Policies
specific groups.
B. Local Policies
______A____ 2. Specify password restrictions, account lockout C. Restricted Group
policies, and Kerberos policies.
D. System Services
_____D_____ 3. Specify the startup types and permissions for E. Registry Permission
system services.
F. File system Permission
______B____ 4. Configure audit policies, user rights assignments, G. Event Log Policies
and security options policies.

_______F___ 5. Specify access control permissions for NTFS files


and folders

Type III: Match the Statement in column A with the correct Server type in column B
Column A Column B
________D__ 1. Server that provides access connectivity for mobile A. DNS Server
user through telephone line.
B. WINS Server
_______F___ 2. Server used for mail receiving purpose in the C. DHCP Server
network.
D. RAS Server
_____A_____ 3. Server used to resolve names to IP address and IP E. VPN Server
addresses to names.
F. POP Server
_____C_____ 4. Server used to allocate IP addresses to large
number of PCs in a network environment.

_______E___ 5. Server that provides access connectivity for mobile


user through the Internet.

Knowledge Assessment Hardware and Network Servicing_ L_IV_V1

You might also like