Level 4 COC Theory
Level 4 COC Theory
2. A type of network that supports two /more organizations and that allows controlled access
from the outside for specific purposes.
A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)
3. You want all network clients to download and install updates automatically during night
hours, and you have configured scheduled installation behavior for Automatic Updates.
However, you discover that some users are turning off their machines at night and updates
are not being applied. The group policy that enables you to correct this situation without
changing the installation schedule?
4. Assume that you are giving a service and you want to measure its quality. The best way to do
this is
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to measure their
satisfaction
D. Wait until you receive a complaint from customers
5. A user can login to his computer but cannot access network resources. The user has all the
appropriate group memberships and permissions, but he still cannot access shared resources.
The cause of this problem
8. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue?
9. A common method used to prevent the unauthorized network devices from sending traffic
across a network is port.
A. Spanning
B. Address translation
C. Mirroring
D. Authentication
10. The type of license key allows you to host an activation service locally within your own
network.
A. Multiple Activation Key
B. Key Management System
C. Key Activation System
D. Multiple Management System
11. A new project requires that users in your domain and in the domain of a partner Organization
have access to a shared folder on your file server. Which type of group should you create to
manage the access to the shared folder?
12. You are giving training about computer and network maintenance for a maintenance team.
As a trainer, the first step in the maintenance process you recommend.
13. You are going to build Internet infrastructure with 31 subnets and 7 usable host addresses per
each subnet. The class C subnet mask for this case.
A. 255.255.255.240
B. 255.255.255.244
C. 255.255.255.250
D. 255.255.255.242
14. The reason that end users need to be aware of the security policy.
A. Separation of duties
B. Collusion
C. Least privilege
D. Delegation of power
19. While you are configuring new wireless clients, none of the new clients is able to connect to
the network, but clients already on the same access point do not have any connectivity
problem. Which is NOT the possible reason for this problem?
20. You a network administer for ABC Company. You are verifying the configuration of a newly
installed host by establishing an FTP connection to the remote server. The highest layer of
the protocol stack you are using for this operation.
A. Application
B. Presentation
C. Session
D. Transport
21. You have a domain controller that runs Windows Server 2008 and is configured as a DNS
Server. You need to record all Inbound DNS queries to the Server. What should you
configure in the DNS Manager console?
Column A Column B