You are on page 1of 5

GAGE UNIVERSITY COLLEGE

TVET-PROGRAMS DEPARTMENT OF INFORMATION TECHNOLOGY


Hardware and network service (HNS) Level III EXTESION FIRST SEMESTER
SUMMATIVE ASSESSMENT (40%) KNOWLEDGE AND PRACTICAL PACKAGE

Trainee’s Name:

ID No.

Trainer’s name

Occupation/Department:

Section:

Entry & Level

Division. Please put tick mark() Regular Extension weekend

Learning module Unit Title:

Date of Assessment: 02/05/2015

Time Allowed: 1:30 Hrs.

Prepared by: All ICT(HNS ---Level-III) Trainer’s


EIS HNS3 02 0811 Configure and Administer Server

EIS HNS3 03 0811Install and Manage Network Protocols

PART ONE Choose the best answer for the following alternative (1.5 pts.
each

1. The Internet is

A. A communication system for some cities of India


B. a communication system for some states of India
C. a communication system for the Indian government
D. a large network of networks

2. Which of the following items is not used in local area network (LAN)?

A. Cable C. Modem
B. Printer D. Computer
3. A collection of computers and devices connected together via communication devices and
transmission media is called a

A. Network C. Server
B. Mainframe D. Workgroup
4. A domain policy that used to restricted user login hours

A. Login hour C. Password policy


B. Logon to D. Non
5. The type of network configuration that there is no centralized dedicated computer and support
small number of computer ?

A. Peer to peer C. Domain


B. Server/client based D. All are answers
6. One of the following is not a network resource?

A. printer C. Keyboard
B. Files D. A and B
7. Which of the following is strong password?

A. PASSWORD C. P@s5w#0rd
B. password D. Password
8. Organization security policy best implemented and monitored in

A. server based network C. both


B. peer-to- peer network D. none
9. Provides convenient, centralized access to files and directories for individual users,
departments, and entire organizations

A. Printer server B. File server C. Mail server D. all


10. Provide directory service to client in the network and used to mange computer , users and other
network resource
a. Active Directory c. Database Server
b. Email server d. None
11. A method of accessing computer from another computer

A. File sharing B. Remote C. ipaddress D. Non


12. The Command used to access active directory installation wizard is called…….

A. PING C. DCPROMO
B. DOMAIN INSTALL D. DCONFIG
13. The protocol that automates IP configuration in your network is called-----

A. DNS B. DHCP C. SMTP D. FTP


14. The configuration information for a DHCP client is received dynamically. The utility used to
read configuration IP address

A. PING
B. IPCONFIG
C. NSLOOKUP
D. TRACERT
PART Two Choose the best answer for the following alternative (1.5 pts. each

1. A security policy defines

A. When users cannot log in to their computers


B. What users can and cannot do with their computer
C. How the user should install their own software
D. How complex user password should be

2. A type of network that supports two /more organizations and that allows controlled access
from the outside for specific purposes.

A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)

3. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue?

A. Identity symptoms and problems

B. Document the process and solutions

C. Establish the most probable cause

D. Escalate if necessary

4. You are giving training about computer and network maintenance for a maintenance team.
As a trainer, the first step in the maintenance process you recommend.
A. Gather data from the computer

B. Verify the obvious issues

C. Evaluate the problem and implement the solution

D. Gather data from the customer

5. The reason that end users need to be aware of the security policy.

A. Some security decisions are usually in their hands

B. They should understand the probability of every risk

C. They need to be aware of every threat

D. They should avoid responsibility for their actions

6. You are a network administrator at XYZ Company, and one of your tasks is designing the
company security policy. The element NOT to be specified in an enterprise security policy.

A. Risks and how to manage the risks


B. User roles and responsibilities

C. Software versions of the security products

D. Contingency plan in case of compromise

7. Firewall function.

A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

EIS HNS3 05 0811 Identify and Resolve Network Problems

PART THREE Choose the best answer for the following alternative (1pts.
each
1. Which one is the first step that you should do, when troubleshooting network problem?
A. Define the specific symptoms
B. Identify all potential problems
C. Systematically eliminate each potential problem
D. Analyze the results
2. What are the important things you should consider as potential candidates for documenting
network installation?

A. logical map of the network


B. physical map of the network
C. Cabling and patch panel information
D. Default settings for computers and other devices on the network
E. All
3. Which one of the following show the location of each of the computers, the hub or switch to
which they are connected?
A. physical map of the network C. Network Problem reports
B. logical map of the network D. network overview
4. Which command should you use to check the configurations of the default gateway and browser
proxy server setting information?
a. tracert
b. Ping
c. ipconfig/all
d. all
Part three. Answer the following questions to be briefly
1. List and explain Steps of server Installation ? (3 point)
2. What are the common hardware server technologies on ? (1.5 point)

You might also like