You are on page 1of 48

1. Which of the following will not be considered in improved performance planning?

A. Business Profitability
B. Ignoring new ideas
C. Effective resource utilization
D. Business Risk
2. Which of the following is an example of a class C IP address?
A. 192.168.1.100
B. 255.255.255.1
C. 255.255.255.0
D. 127.0.0.1
3. Used for monitoring web activity by users to make sure that sensitive information is not leaving
the building.
A. Web Server
B. FTP Server
C. POP Server
D. Proxy Server
4. Which service should you use so the computers on your network can resolve NETBIOS names
without any administrative work?
A. DNS
B. FTP
C. Telnet
D. WINS
5. Users report that they are unable to access wireless network. The IT technician verifies that the
latest wireless drivers have been installed on their computer. Which of the following
troubleshooting steps should able to taken to resolve this issue?
A. Remove unnecessary Peripherals
B. Check the access point
C. Replace network cable
D. Ensure NIC disabled
6. When you maintain and troubleshoot a computer the final step will be _________.
A. Assembling
B. Formatting
C. Documenting
D. Testing
7. The one is a media access technique that identifies a collision and doing nothing.
A. CSMA/CA
B. Collision avoidance
C. CSMA/CD
D. Collision prevention
8. On-site examination and reviewing technical advice about the organization is ___________?
A. Solution
B. Feedback
C. Investigation
D. Documentation
9. Your company has an Active Directory domain. A user attempts to log on to the domain from a
client computer and receive the following message: “This user account has expired. Ask your
administrator to reactive the account. “You need to ensure that the user is to log on the domain.
What should you do?
A. Modify the properties of the user account to extend the Logon Hours setting.
B. Modify the properties of the user account to set the password to never expire.
C. Modify the default domain policy to decrease the account lockout duration.
D. Modify the properties of the user account to set the account to never expire.
10. You have been asked to create a subnet that supports 24 hosts. What subnet mask should you
use?
A. 255.255.255.224
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.252
11. The simplest and the cheapest information gathering technique is ______.
A. Surveys
B. Observation
C. Interviews
D. Questionnaires
12. A server that uses HTTP to serve the files that form web pages to the users in response to their
requests is _______.
A. Web Server
B. Database Server
C. Email Server
D. Application Server
13. Which IP address you will ping to test the IP stack on your local host?
A. 127.0.0.1
B. 127.0.0.255
C. 127.0.0.0
14. A network services that provides through a fixed wired line for voice purpose is __________.
A. Infrared
B. Satellite
C. Public Standard Telephone Network (PSTN)
D. Aero net
15. The data link layer takes the packets from _____ and encapsulates them into frame for
transmission.
A. Application Layer
B. Network Layer
C. Transport layer
D. Physical Layer
16. A mechanism used to interconnect two devices of the same type
A. Intranet
B. Cross Over
C. Interconnection
D. Straight Through
17. The one is a benefit and a learning opportunities designed help employees
A. Get together
B. Bonus
C. Training
D. Certificate
18. When we solve a network problem the first step?
A. Checking network address is configured properly
B. Look network physical setting
C. Opening an internet using a browser
D. Test the connectivity using command utilities
19. Which one of the following comes at the last stage of training providing?
A. Planning
B. Set Objectives
C. Training delivery
D. Need Assessment
20. What will be included in a work plan activities documentations?
A. Where the activities will be done
B. How the activities will be done
C. By how much budget the activities will be done
D. When the activities will be done
21. Internet Relay chat (IRC) is ________
A. Protocol used by e-mail clients to receive message from remote servers
B. Protocol for e-mail messages on the internet
C. A protocol for e-mail messages on the internet
D. A protocol used for internet chat and other communication

22. In FTP protocol, clients contacts server using ________ as the transport protocol.
A. Stream control transmission protocol
B. User Datagram Protocol
C. Transmission Control Protocol
D. Datagram congestion control protocol
23. Providing feedback, support and encouragement
A. Advice
B. Customer gift
C. Coaching and mentoring
D. Evaluation
24. A name represents end user, internal or external government body such as team leaders,
directors, managers is _____.
A. Diplomats
B. Ambassadors
C. Customers
D. Higher Officials
25. Network utility “ping” can _________.
A. Display all current TCP/IP network configuration values
B. Modify DHCP setting
C. Modify DNS setting
D. Report packet loss
26. A server feature that allows a group of servers function as a single unit, sharing storage resource
and jobs, as well as providing fail-over fault-tolerance is _______
A. Server clustering
B. Microsoft meta-directory services
C. Hot and memory
D. Windows Service Resource Manager (WSRM)
27. A device used to logically separate the network into two segments ________.
A. Bridge
B. Access Point
C. Router
D. Epon
28. A command that enables you to view, and change setting in system registry.
A. MMC
B. Nslookup
C. Regedit
D. Msconfig
29. A family of technologies that are used to transmit digital data over telephone lines.
A. Copper
B. Palmtop
C. DSL
D. Fiber
30. Of the following, one is used for filtering keyword and blacklist for security purposes.
A. HW firewall
B. Server
C. Bridge
D. Switch
31. What is the first 24 bits in a MAC Address?
A. VAI
B. NIC
C. BIA
D. OUI
32. How many digit numbers is a MAC Address has?
A. 32
B. 24
C. 48
D. 12
33. _______ the one is a data link layer protocol
A. DHCP
B. FTP
C. ARP
D. IP
34. Which of the following network cables would a technician find on the RJ-45
A. Ethernet Cable
B. Coaxial Cable
C. USB Cable
D. Fiber
35. A way of connecting using central device such hub or a switch.
A. Star Topology
B. Tree Topology
C. Bus Topology
D. Ring Topology

36. A suitable preventive action on quality is recomanded based on organizatiion


A. Quality Standard
B. Quality approval
C. Qaulity check
D. Quality Assurance
37. A network administrator needs to expand network at ABC corporate office, which is quick
growing. You are insrusted to enlarge the covered by a sigle LAN segment, which one of the
following is layer 1 device that you can use?
A. Switch
B. Hub
C. Router
D. Netwrok Adapter Card
38. The file transfer protocol is built on _____________.
A. File centered architecture
B. Service oriented architecture
C. Client arserver chitecture
D. Data center architecture
39. Given IP address 172.16.28.252 with a subnet mask of 255.255.240.0. What is the correect
network address?
A. 172.16.24.0
B. 172.16.28.0
C. 172.16.0.0
D. 172.16.16.0
40. Unsolicited commercial email is known as ____________?
A. Malware
B. Spam
C. Spyware
D. Virus
41. Which is the network strategy used extensively by the internet?
A. Peer-to-peer network system
B. Local Area network system
C. Stand-alone network system
D. Client /Server network system
42. A protocol that uses a text-based connection to a remote computer ____________.
A. HTTPS
B. Telnet
C. SSH
D. FTP
43. A network administrator is implementing a policy that requires strong, complex passwords.
Which data protection goal does this policy support?
A. Data confidentiality
B. Data quality
C. Data redundancy
D. Data integrity
44. A technician is to document the current configuration of all network devices in a college,
including those in off-site buildings. Which protocol would be best to use to security access the
network devices?
A. SSH
B. HTTP
C. Telnet
D. FTP
45. A protocol which deals with resolving domain names is __________.
A. POP3
B. SMTP
C. DHCP
D. DNS
46. One of the following is a principle of total quality management?
A. Continuous defect elimination
B. Continuous Process improvement
C. Continuous value enhancement
D. Continuous productivity improvement
47. Enabling addition users to handle administrative tasks for a particular objective is referred
A. Targeting

B. Delegating
C. Assignment
D. Redirecting
48. Protocols are?
A. Physical communication channels sued for transferring data
B. Wireless communication channel sued for transferring data
C. Agreements on how communication components to communicate
D. Logical communication channels for transferring data
49. It allows a visited website to store its own information about a user on the user’s computer
________.
A. Adware
B. Spam
C. Cookies
D. Malware
50. UTP is commonly used in ___________.
A. HTTP
B. FTTP
C. SMTP
D. ADSL
51. In wireless distribution system
A. There is no access point
B. Only one wire access point
C. Only one access point exists
D. Multiple access point are inter-connected with each other
52. What OSI physical layer term describes the amount of time, including delays, for data to travel
from one point to another?
A. Throughput
B. Latency
C. Bandwidthy
53. You need to use disk quotas to send an e-mail 800 MB of disk space and prevent users from
consuming more than 1 GB of disk space. How will configure it?
A. Create a soft quota with a 800MB limit, Create a warning at 80 percent
B. Create a hard quota with a 1GB limit. Create warning at 80 percent
C. Create a soft quota with a 800MB limit and a second quota with a 1GB
limit
D. Create a hard quota with a 800MB limit and second soft quota with a limit 1GB
54. Which is an importance characteristic of communication?
A. Communication involves exchange of ideas, feelings, information, thoughts,
and knowledge.
B. It is a 1 way process
C. Communication does not involve mutuality of understanding between sender and receiver.
D. Communication process does not happen between more than two parties.
55. A switch never learns a broadcasting address because?
A. Broadcast addresses use an incorrect format for the switch table
B. Broadcast only use network layer addressing
C. A broadcast frames never sent to switch
D. A broadcast address will never be the source address of the frame
56. The willingness to exert high levels of effort to reach organizational goals based on the effort’s
ability to satisfy some individual need is _________.
A. Leadership
B. Effort management
C. Need Configuration
D. Motivation
57. You want to implement a mechanism that automates the configuration, including IP address,
subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish
this?
A. SMTP
B. DHCP
C. ARP
D. SNTP
58. A new corporation needs a data network that meets certain requirements. The network must
provide a low cost connection to sales people dispersed over large geographical area. Which type
of WAN infrastructure would meet the requirements?
A. Dedicated
B. Private infrastructure
C. Satellite
D. Public infrastructure
59. Which OSI layer performs error detection but not correction?
A. Network Layer
B. Data link Layer
C. Application layer
D. Transport Layer
60. You are an enterprise administrator for IHT. The corporate network of IHT consist server that
runs Windows Server 2008. Which of the following options would you choose to reduce the size
of the DHCP database?
A. Enable the file is read for achieving attribute of the dhcp.mdb file, from the properties of
dhcp.mdb file.
B. Run jetpack.exe dhcp.mdb temp.mdb from the folder that consists the
DHCP
C. Enable the compress contents to save disk space attribute of the dhcp.mdb file from the
properties of dhcp.mdb file.
D. Reconcile the database from the DHCP snap-in.
61. ________ is the process that helps managers understand the nature of the industry, the way firms
behave competitively within the industry, and how competitive is generally undertaken.
A. Portfolio Analysis
B. Organization Analysis
C. Strategic Market Analysis
D. Market Needs Analysis
62. What is an important first consideration when starting to design a network?
A. Size of the network
B. Type of application
C. Protocols to beused
D. Access security
63. Which one of the following is the rule of effective communication?
A. Always translate the message in to benefits for our self than the other party
B. Not recognize that actions speak louder than works
C. Organize your thoughts
D. Be unconsciousness for personal benefits
64. Which attack involves a compromise of data that occurs between two end points?
A. Username enumeration
B. Man-in-the-middle attack
C. Extraction of security parameters
D. Daniel-of-service
65. You need to configure a folder that allows everyone in your department to view and edit the
files in the folder. You also need to ensure that users outside the department cannot access the
files. What should you do?
A. Grant access to a single user by using the share with menu
B. Grant read/write access to specific people by using the share with menu
C. Place the file in one of the windows public folders
D. Grant read access to specific people by using the share with menu
66. The bit length for IPv6 address ______________
A. 128 bits
B. 32 bits
C. 192. Bits
D. 64 bits
67. Network layer firewall has two sub-categories known as ____________
A. Bit oriented firewall and byte oriented firewall
B. Frame firewall and packet firewall
C. State full firewall and stateless firewall
D. Circuit frame and packet frame

68. Your company has one main office and four branch offices. The main office contains a standard
primary DNS zone named adatum.com. Each branch office contains a copy of the adatum.com
zone. What records are added to the adatum.com zone, you discover that it takes up to one hour
before the changes replicate to each zone in the branch offices. You need to minimize the
amount of time it takes for the records to be updated in the branch offices. What should you do?
A. On the DNS servers in the branch office, configure the Zone Aging/Scavenging Properties
B. On the DNS servers in the branch office, configure the notify setting
C. On the DNS server in the main office, configure the Notify settings
D. On the DNS server in the main office, configure the Zone Aging/Scavenging Properties
69. DHCP uses UDP port number ______________ for sending data to the server
A. 69
B. 67
C. 66
D. 68
70. Enabling additional users to handle administrative tasks for a particular object is referred to as:
A. Targeting
B. Redirecting
C. Assignment
D. Delegation
112.A

113.D
114.C

115.A

116.A

117.C
118.B

119.
120

121.

122
123

124

125
126.A

127.

128
129.A

130

131.
132.

133

134

135
136

137.

138

139
140

141

142

143.A
144.B

145.

146.D

147
148

149

150

151.
152.

153.

154.

155.
156.

157.

160

161.
167

168.

169.

170.
171.

172.

173.C

174.A
175.B

176.D

177.A

178.D
179.B

180.C

181.B
182.D

183.C

184.D

185.A

186.D
187.D

188.D

189.D
190.D

191.B

192.A

193.B
194.B

194.B

195.C

196.A

197.B
198.A

199.B

200.C

201.D
202.B

203.B

204.A

205.
206.

207.

208

209
210.

211.

212

213.
214

215.A

216.B
217.D

218.D

219.D

220.D

221.A
222.D

223.C

224.D
225.B

226.C

227.C

228.A

229.D
230.B

231.A

232.B

233.A
234.B

235.C

236.B

237.D
238.B

239.D

240

241.A

You might also like