Professional Documents
Culture Documents
Trainee’s Name:
ID No.
Trainer’s name
Occupation/Department:
Section:
PART ONE Choose the best answer for the following alternative (1.5 pts.
each
1. The Internet is
2. Which of the following items is not used in local area network (LAN)?
A. Cable C. Modem
B. Printer D. Computer
3. A collection of computers and devices connected together via communication devices and
transmission media is called a
A. Network C. Server
B. Mainframe D. Workgroup
4. A domain policy that used to restricted user login hours
A. printer C. Keyboard
B. Files D. A and B
7. Which of the following is strong password?
A. PASSWORD C. P@s5w#0rd
B. password D. Password
8. Organization security policy best implemented and monitored in
A. PING C. DCPROMO
B. DOMAIN INSTALL D. DCONFIG
13. The protocol that automates IP configuration in your network is called-----
A. PING
B. IPCONFIG
C. NSLOOKUP
D. TRACERT
PART Two Choose the best answer for the following alternative (1.5 pts. each
2. A type of network that supports two /more organizations and that allows controlled access
from the outside for specific purposes.
A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)
3. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue?
D. Escalate if necessary
4. You are giving training about computer and network maintenance for a maintenance team.
As a trainer, the first step in the maintenance process you recommend.
A. Gather data from the computer
5. The reason that end users need to be aware of the security policy.
6. You are a network administrator at XYZ Company, and one of your tasks is designing the
company security policy. The element NOT to be specified in an enterprise security policy.
7. Firewall function.
PART THREE Choose the best answer for the following alternative (1pts.
each
1. Which one is the first step that you should do, when troubleshooting network problem?
A. Define the specific symptoms
B. Identify all potential problems
C. Systematically eliminate each potential problem
D. Analyze the results
2. What are the important things you should consider as potential candidates for documenting
network installation?