You are on page 1of 9

1.

As the network administrator you have been asked to implement EtherChannel on the corporate
network. What consists in the configuration?

A. Grouping two devices to share a virtual IP address.

B. Providing redundant links that dynamically block or forward traffic.

C. Grouping multiple physical ports to increase bandwidth between two switches.

D. Providing redundant devices to allow traffic to flow in the event of device failure.

2. How to you create two-tier LAN network design?

A. Access, distribution, and core layers collapsed into one tier, with a separate backbone layer.

B. Access and core layers collapsed into one tier, and the distribution layer on a separate tier.

C. Access and distribution layers collapsed into one tier, and the core layer on a separate tier.

D. Distribution and core layers collapsed into one tier, and the access layer on a separate tier.

3. What is the reason for creating a network baseline?

A. To select a routing protocol.

B. To design a network according to a proper model.

C. To determine what kind of equipment to implement.

D. To determine if the network can deliver the required policies.

4. Which action should be taken when planning for redundancy on a hierarchical network design?
A. Continually purchase backup equipment for the network.
B. Add alternate physical paths for data to traverse the network.
C. Implement STP portfast between the switches on the network.
D. Immediately replace a non-functioning module, service or device on a network.

5. What is a benefit of extending access layer connectivity to users through a wireless medium?

A. Reduced costs.

B. Increased bandwidth availability.

C. Increased network management options.

D. Decreased number of critical points of failure.


6. What is the basic function of the Cisco Borderless Architecture access layer?

A. Provides fault isolation.

B. Provides access to the user.

C. Aggregates Layer 2 broadcast domains.

D. Aggregates Layer 3 routing boundaries.

7. Which one is NOT a network topology?

A. Bush B. Mesh C. Ring D. Star

8. What is the first important thing to consider when starting to design a network?

A. Access security B. Protocols to be used C. Size of the network D. Type of


application

9. What network-based intrusion prevention system (NIPS) relies on other technology and its core?

A. They prevent access to phishing sites.

B. They use TLS-based encryption to access all sites.

C. They enforce appropriate use of company resources.

D. They can control which sites and content employee’s access, lessening the chance of malware
exposure.

10. What technology can check the client’s health before allowing access to the network?

A. DLP B. NIDS/NIPS C.NAC D. Reverse proxy

11. What content does Domain Name System (DNS) database have?
A. Name server records B. Hostname aliases C. Hostname-to-address records D. all
of the above
12. What is the first step in setting up a wireless connection in a router?

A. Attach the router to a cable.

B. Decide where to place the router.

C. Test the connection with a device.


D. Use app or web dashboard to configure wireless router.

13. Why an access-point is connected to a router in wired PC?

A. To secure the good connection.

B. For the connection to not be delayed.

C. Most of the time configuration is done by means of a wired PC.

D. Most of the configuration in customizing is done by means of a wired PC.

14. What command is used to test the ability of the source computer to reach a specified destination
computer?
A. Ipconfig B. Msconfig C. Ping
D. Regedit
15. Which is a wireless network device that repeats wireless signals to extend range without being
connected with cable to either your router modem, or your clients?

A. Access point B. Repeater C. Router D. Switch

16. Which is NOT a role on NIC.

A. Send the data to another computer

B. Prepare data from the computer for the network cable

C. Control the flow of the data between the computer and the cabling system

D. Provides the computer with a dedicated, full-time connection to a network

17. What principles apply when a computer program stored?

A. Flash drive B. Hard drive C. Read only memory D. Random access


memory

18. What is the first procedures in setting Network Interface Card?

A. Point and click start button.

B. Point and click control panel.

C. Point and double clicking local area connection.


D. Point and click change clicking adapter settings.

19. Which is the procedure for establishing a network's controls, flow, and operation to support an
organization's and

the networking owner's network communication?

A. Network configuration B. Network Interface card C. Windows server D. Windows


vista

20. What is a utility in Windows that rearranges the files stored in the Hard Disk?

A. Scandisk B. Virus scan C. Defragmentation D.


Back up

21. What are the physical areas to consider when planning the installation of LAN cabling?

A. Telecommunications room, also known as the distribution facility.

B. Backbone cabling, also known as vertical cabling.

C. Work area.

D. All of the above.

22. Which network cable is a transmission of signal that takes place in the electrical form over the

inner conductor of the cable?

A. Coaxial B. Twisted Pair C. Fiber Optic D. Thicknet

23. What network is ideal for small networks where there is no need for dedicated servers, like home
networks, small

business networks, or retail shops?

A. Network Operating System B. Client Server C. Database Server D. Print Server

24. How do you explain the procedure in configuring the IP address in Windows 7 and Windows 2008
R2?

A. Click OK in the other window. You can now start using your new internet connection. If for some
reason
the internet connection doesn't start working right away, restart the computer and try again.

B. In the window that opens, click the Use the following IP address: radio button. In the IP address:,
Subnet

mask:, and Default gateway: number fields, insert the numbers that were assigned to you by OIT.

C. In the window that opens, click on the Internet Protocol Version 4 (TCP/IPv4) (you may need to scroll

down to find it). Next, click on the Properties button.

D. All of the above.

25. Which network cable is a signal transmission takes place in an optical form over a glass fiber?

A. Coaxial B. Twisted Pair C. Fiber Optic D. Thicknet

26. Which network cable is the cheapest but has a low bandwidth?

A. Coaxial B. Twisted Pair C. Fiber Optic D. Thicknet

27. You recently created a new network segment for the development department. Because the hosts are
now on a

different network segment, they can no longer contact the DHCP server. Both network segments
are connected via

a Cisco router. Which of the following would be the best action to take in order to fix the
problem?

A. Implement an IP helper address on the router.

B. Configure the router to forward broadcast messages.

C. Move the DHCP server to the new network segment.

D. Install and configure a new DHCP server on the development network segment.

28. You have a workstation connected to a small branch network using a single switch. The network does
not have any

routers and is not connected to the internet. What are the minimum configuration parameters
required on the
workstation to be able to communicate with all hosts on the network?

A. IP address.

B. IP address and subnet mask.

C. IP address and default gateway.

D. IP address, subnet mask, and default gateway.

29. Which of the following is a valid IPv4 address?

A. 256.0.0.1 B. 172.16.1.26 C. 254.7.1.417 D.


10.384.0.3

30. In an IP addressing scheme that uses default subnet masks, which IP addresses is assigned to a host?

A. 132.70.254.15 B. 127.35.88.92 C. 127.0.0.1 D. 199.45.207.0

31. Which one helps you to protect the computers on your network?

A. Event Viewer

B. Task Scheduler

C. Disk management

D. Windows Firewall with Advanced Security

32. What Microsoft Management Console (MMC) snap-in that enables you to browse and manage event
logs?

A. Event Viewer

B. Remote Desktop Services

C. Windows Performance Monitor

D. Windows Server Update Services (WSUS)

33. Which one lets you decide to either to log off, switch user, lock, restart or shutdown your computer
upon selecting on

the dropdown menu?

A. Features Summary B. Power Button C. Server Manager D. The Summary Roles


34. Which can be accessed in the administrative tools or by clicking server manager icon as shown at the
task bar.

A. Features Summary B. Power Button C. Server Manager D. The Summary Roles

35. What process to install and update the drivers for hardware devices, change the hardware settings and

troubleshoot the problems?

A. Storage B. Device Manager C. Configuration D. Windows Initial


Configuration Tasks

36. When to schedule automated task that performs action on specific time or when certain event
occurs?

A. Disk management

B. Event Viewer

C. Task Scheduler

D. Windows Firewall with Advanced Security


37. How to provide central management and hosting of high performance distributed business
applications?

A. Fax Server

B. Web Server (IIS)

C. Application Server

D. Domain Name System (DNS)


38. What is the correct position of the IP properties as shown in the figure below?

A. 189.00.00.1 B. 192.168.+.1 C. 255.255.255.0 D. 192.168.1.1

39. What do firewalls protect?

A. Cables B. ISP C. Muse pad D. Resources

40. What computer network can cover a large geographic area such as city, country or spans even
intercontinental
distances?

A. Local Area Network C. Personal Area Network

B. Wide Area Network D. Metropolitan Area Network

41. Which communication channels interconnect computing devices and enables them to exchange

data electronically?

A. Computer Network B. Encryption C. Firewall D. Security

42. What is the importance of contingency planning in computer workplace?

A. Protects resources..

B. Minimizes customer inconvenience and identifies key staff

C. Assigning specific responsibilities in the context of the recovery.

D. All of the above

43. What is the main cause of No display of a computer?

A. Monitor is not on.

B. Remove the RAM modules.

C. Defective power button of cabinet.

D. Clean or replace the surface of the mouse pad.

44. Which 802.11 standards operate on the 2.4 GHz frequency?


A. 802.11j B. 802.11t C. 802.11g D. 802.11n

45. Why does Windows restart suddenly?

A. Software issue or error B. Computer virus C. Heat related issue D. All of the above

46. Which devices forward traffic based on MAC address?


A. Hub B. Router C. Repeater D. Switch

47. Which type of modem can support multiple data types (voice, internet, security, etc.)?
A. Cable B. Router C. Repeater D. Switch

48. What are the 5s principles?

A. Sort, Set, Shine, Standardize, Sustain.

B. Reset, Clean, Wipe, Erase, Dig.

C. Strip, Saw, Straw, Separate.

D. None of the above.

49. Why do you have to undertake final inspection on the installed device and system?

A. The final step is an important end to testing.

B. You need to check the specification for the installation to make sure that it has been met.
C. For example, if a user requested an upgrade to make their display run at 1920 x 1200, then the
ICT professional should check that the graphics card and screen can do this.

D. All the above.

50. How important to the workers to have clean, safe working environment that is free from all forms of
danger?

A. Workers can do their work peacefully

B. Clean and safe environment is not risking lives.

C. Because one danger situation that you're in can change your life temporarily or permanently.

D. All the above.

You might also like