D. A Gateway
D. A Gateway
It works on OSI layers 4 to 7 placed at a network node and interface with another network that uses
different protocols
A. A hub C. A router
B. A bridge D. A Gateway
2. A piece of hardware or software put on the network to prevent some communications forbidden by
the network policy.
3. A device which amplifies or generates digital signal received while sending them from one part of a
network into another?
A. A bridge C. A repeater
B. A switch D. A Router
4. You have made some changes to file and directory permissions on one of the servers on your
network. You want to verify the new setting before informing the users of the changes. How can you
verify that the changes have taken affect and that no security problems arise from them?
A. Ask trusted users to perform the tests for you.
B. Use your own administer account to perform the tests
C. Create attest account for the purpose.
D. Do nothing. Changes made with administrative privileges are always correct.
5. Your network consists of a signal domain with one DNS windows server 2003. The DNS server hosts
a standard primary zone. User report that the response time for the network seems slow. Using
network monitor to examine the network traffic, you find that an abnormal amount of traffic is
passing between the DNS server and DNS clients. Which tool would best help you ascertain the cause
of excess traffic?
6. In OSI network architecture, the dialogue control and management are responsibility of
7. Which of the following communication modes support two-way traffic but in only one direction at a
time?
8. You install file and printer sharing for Microsoft networks. You share a folder and leave the password
option blank. Who can gain access to the folder?
A. Windows 98 will not allow a blank password in this field.
B. Anyone with internet explorer installed.
C. Only users that are member of the same work group as you.
D. Anyone who can gain accesses to your network and has a Microsoft redirector such as
the client for Microsoft networks installed.
9. Which figure below shows a typical home network setup? Which the network components marked
correctly represent A, B, C, and E.
A
A. Switch C. Modem
B. Router D. Wireless signal
D
10. Your are hired to investigate a Slow performing server for a client. Using the performance monitor
you obtain the following readings: CPU usage=25%, Disk time =25%, Page flats/sec=25. What one
change will increase the performance of this network server is the most?
A. Buy another CPU
B. Increase RAM
C. Add another hard drive
D. Add a second NIC
11. A large network with 500 users notices that specific times in the morning and afternoon network
congestion ties up their computers. What is the most likely cause?
A. Many users are logging on or off
B. Power fluctuations
C. A terminator is not grounded
D. The switch connecting the network goes down
12. The best method to restart your personal computer at on state is using
A. Emergency repair Disk
B. Recovery console
C. Last known good configuration
D. Ctrl+Alt+Del keys
13. The most efficient way to control security in a client /server network is to assign permission to
A. 255.255.255.0 C. 255.0.0.0
B. 255.255.0.0 D. 255.255.255.200
18. You are the administrator for your company’s domain. You need subdivide groups in your
organization with in active directory. If you are the administer for your company’s domain. You need
to subdivide groups in your organization with in active directory. If you want5 to separate sales from
marketing department, what could you use as a system of organizing this sub division?
A. Creating Organizational unit
B. Use user and groups
C. Create site subnet group
D. Build a container in a subnet group
19. A system administers wants to remove a domain controller from domain. Which one of the following
is the easiest way to perform the task?
A. Reinstall server over existing installation and make a machine a member of group
B. Use remove command
C. Use active directory installation wizard to demote the domain controller.
D. Reinstall server over existing installation and make a machine a member of domain
20. The best secure and strong password from the following list is?
A. MsWOrd B. Ms_Word#1 C. msword D. mS_Word1
21. Which one of the following is considered a Network Attached Strong devices
A. A 60 GB DAT tape drive attached to the network server.
B. A file server with special soft ware that is at a separate location from the department file
server
C. In a window NT environment , it would be Back up Domain controller
D. A high speed specialized sub-network attached to the enterprise
SECTION “B” –MATCHING TYPE QUESTIONS
1. The type of server used to assign IP address automatically to client computers on the network:
2. A network Administrator connects hosts A and B directly through the network interface card (NIC).
When he ping between the hosts are working successfully. To provide connectivity between the hosts,
which type of cable, is used?
A. Rollover cable should be used
B. Crossover cable should be used
C. Straight through cable should be used
D. Default gateway needs to be set on each host
3. If you are asked to establish network for a given organization and you decided to implement bus
topology, which type of cable is best suit for this network?
A. Coaxial C. STP
B. UTP D. Fiber Optic
4. Which of the following cable type is the fastest and covers long distance?
A. 10Base T C. 100Base T
B. 100Base TX D. 10Base F
5. The most common protocol that is applicable for reliable communication network?
A. IP C. UDP
B. TCP D. ICMP
6. File transfers email, Telnet and FTP are all provided in which layer of network?
A. Presentation C. Application
B. Physical D. Network
7. A set of procedures used to restrict the amount of data that the sender can send before waiting for
acknowledgment
8. If the IP address of some network is 132.168.x.x what is its default subnet mask?
A. 255.255.255.0 C. 255.0.0.0
B. 255.255.0.0 D. 255.255.255.255
11. The protocol which discusses a mechanism that gateways and host use to communicate control or error
information?
A. ARP C. RARP
B. ICMP D. POP3
12. Which of the following statement best describes a peer to peer network configuration?
A. Each node contains the security database of users
B. All clients are equal
C. All nodes must act as server
D. Needs specialized server
13. Ato Alemu is a finance head in ABC Company and he use a Laptop given by the organization.
He needs to protect a data from unauthorized users. How can he protect the data?
A. Archive C. Compress
B. Encryption D. Hidden
A. HUB C. Switch
B. NIC D. Router
16. The network connecting device that uses Carrier Sense Multiple Access/Collision Detection(CSMA/CD)
A. HUB C. Switch
B. Bridge D. Repeater
17. One of the following transmission media is most exposed to interference and crosstalk?
18. Which type of network is usually confirmed to a limited or small geographical area?
A. WAN C. MAN
B. LAN D. WLAN
19. Which one of the following UTP cable only used for telephone wire?
A. Cat 1 C. Cat 4
B. Cat 5 D. Cat 6
20. A set of rules that govern all aspects of information communication on a network?
A. Transmission C. TCP
B. Protocol D. UDP
21. One of the following is NOT criteria for an effective and efficient network?
A. Performance C. Security
B. Reliability D. Frequency of failure
Column A Column B
N 1. Fiber Optics
A. ARP
M 2. Packet Filtering B. Repeater
C. DNS
L 3. Coaxial Cable
D. DHCP
H 4. E-mail Protocol
E. Modem
D 5. Automatically configure IP address F. Server based Network
A
K. UDP
9. Convert IP address into hardware address
L. BNC
I 10. Connection oriented protocol
M. Router
S 11. Utility used to test Network connectivity N. MT-RJ
O. Switches
R 12. A command used to configure IP address
P. RJ-45
Q 13. Used to connect telephone line
Q. RJ-11
B 14. Used to regenerate signal R. IPconfig
J
S. Ping
15. Controls all web sites on its URL
Exam III:
Megabit 30/2005 Level iii Practical Exam
Project Information:
Given the necessary materials and supplies the candidate is expected to perform the following project:
Project: - Server Configuration and Administration
Time Allowed: 4:00 hrs
Task1: Installing of Server operating System
1. Connect the necessary peripheral devices of the server computer and make ready for server
Operating System Installation.
2. Make ready other two computers by installing operating system and necessary software on them.
3. Install Windows Server 2003 rating system on the server computer.
4. Install the necessary drivers for the devices.
5. Establish connections among the server and the clients.
6. Configure the server as a DNS and Active directory for the server computer using the TVET.local as
a domain name.
Task 2:- Server Administration and Security Configuration
1. Create Groups of Computer using two group names FINANCE and ADMINISTRATION and make
sure that the client computers joined the groups.
2. Create Users and Passwords for the two Groups as follows:
A. For FINANCE group, users (FINUser1 and FINUser2), password (user1 and user2) respectively.
B. For ADMINISTRATION group, users (ADMIUser3 and ADMIUser4), password (user3 and user4)
respectively.
3. Create user privileges to change their passwords at first login for users FINUser1 and FINUser2.
4. Set the Access limitation time for the ADMINISTRATION group users to access the network from
Monday to Friday from 8:00AM to 5:00PM only.
5. Add (join) the client computers to the Domain TVET.local.
6. Turn on Windows Firewall for the Server Computer.
1. Identify which of the following are the advantages of using the Dynamic Host Configuration Protocol
(DHCP) server in the network.
A. The main resolution process will be automated
B. The network can be monitored more efficiently
C. Assignment of IP address will be automated
D. Network traffic problems can be resolved
2. Which of the following protocol delivers/stores mail to receiver server?
A. Simple Mail Transfer Protocol
B. Post Office Protocol
C. Internet Mail Access Protocol
D. HyperText Transfer Protocol
3. Which one of the following is an internet standard protocol for managing devices on IP network?
A. Dynamic Host Configuration protocol
B. Simple Network Management Protocol
C. Internet Message Access Protocol
D. Media Gateway Protocol
4. From the following options, identify the most critical problem that should be given highest priority if
one of the users in your network complained that he/she cannot access a given file from server but
they can access other files.
A. Check whether the file is corrupted by malicious code
B. Check the network interfaces card functionality
C. Check the network response time
D. Check the file server is reachable by your workstation
5. Is a server has no clue about where to find the addresses for a host name then:
A. Server asks to the root server
B. Server asks to its adjacent server
C. Request is not processed
D. Server asks to the client
6. One of the following is not the basic necessities reason that writing policies and procedures?
A. Operational needs
B. Risk Management
C. Maintain good of the organization
D. Continuous improvements
7. The right to use a domain name is delegated by domain name registers which are accredited by:
A. Internet architecture board
B. Internet society
C. Internet research task force
D. Internet Corporation for assigned names and numbers
8. Which of the following are good practices in resolving complex network problem?
A. Work on the problem single handedly because others might add to the problem
B. Try to read the hardware specification documentation so that get how to solve the problem
C. If you cannot fix a problem ask help from hardware vender who might have faced the same
problem in the past
D. Gather as much information as you think would be helpful in solving in the problem
9. Which of the following is not true?
A. Multiple hostnames may correspond to a single IP address
B. A single hostname may correspond to many IP addresses
C. A single hostname may correspond to a single IP address
D. Multiple hostnames may correspond to a multiple IP address
10. Which of the following is the correct syntax to ping the reachability of network?
A. PING\172.17.1.1
B. PING:172.17.1.1
C. PING 172.17.1.1
D. 172.17.1.1 PING
11. Which of the following PING response show correct response of network destination?
A. Ping request could not find host…
B. Reply from…
C. Request timed out…
D. Reply from host & Request timed out
12. Which one of the following allows client to update their DNS entry as their IP address change?
A. Dynamic DNS
B. Mail transfer agent
C. Authoritative name server
D. Static DNS
13. You recommended to him for centralized control of access to files and directories on the network?
A. setup groups of shared resources and users who have access to this group
B. setup a password for each file and groups for each directories
C. setup a password for each file and directories shared
D. setup a password for each user
14. A hardware or software used to capture and analysis signals and data traffic over a communication
channel:
A. Task Manager
B. Performances monitor
C. Network Monitor
D. Protocol Analyzer
15. A user in a large manufacturing company uses a PC that is connected to the company network. Where
should the user look to find a server attached to the network?
A. My Network Place
B. Control panel
C. Connect to
D. My Computer
16. Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?
A. Session initiation protocol
B. Session modeling protocol
C. Session maintenance protocol
D. Session management protocol
17. Red Cross sign(X) on your network notification icon show you---------?
A. Network Address Problem
B. physical network cable connection problem to NIC
C. DNS resolving problem
D.IP address conflict
18. One of the following policies is not included in information security policy documents.
A. Firewall Policy
B. Data classification managements policy
C. Application Certification management policy
D. Copy right policy
19. A network administrator connects hosts A and B through the hub, however pinging between the hosts
are unsuccessful. To provide connectivity between hosts:
20. You are assigned as a team leader in your working team, and you have informed that one of the team
members disturbs the team as well as a work delegated, what will be your measure on this situation?
Column A Column B
1. Server used for Mail receiving purpose in the network
A. Copying from PC to internet
2. Peer to Peer B. Internet explorer
15. Specify the start up type and permission for system type computer
S. POP server
Column A Column B
3. Which of the following is not the reason for link lights of NIC to be deactivated? Even if operating
system of the NIC driver is loaded.
A. IP address configuration
B. Wire arrangement is improper
C. If NIC is improperly configured
D. If RJ-45 not firmly crimped
4. One of the following is type of account policies?
5. In which layer translates logical address and names into physical address, the data is organization in
to packets.
A. Data Link Layer C. Transport Layer
B. Network Layer D. Physical Layer
6. A user can determine the network setting at DHCP server
A. IPCONFIG/ALL C. Ping
B. Connect D. IP
7. A ------------------ System to join two or more device and computer together to communicate and
share resources.
A. Modem C. Resource
B. NIC D. Network
8. A large network with 500 users notices that at specific times in the morning and in the afternoon
network congestion ties up those computers. What is the most likely cable?
A. Many users are logging on or off C. A terminator is not grounded
B. Power fluctuation D. The switch goes down
9. The best method which is used only domain controllers and enables you to restore directory services.
A. Last Known good configuration C. Emergency Repair Disk(ERD)
B. Recovery console D. Directory Services Restore Mode
10. Which one of the following is used only with only domain controllers and enables you to restore
directory services.
A. Directory service restore mode
B. Debugging mode
C. Safe mode
D. Last known good configuration
11. To decide what type of network resources resource model is not needed?
A. What is the size of the organization
B. How much security does the company required
C. The need of the network designer
D. How much will it cost
12. Which topology the workstation goes down it does not affect the entire network.
A. Bus C. Ring
B. Star D. Straight line
13. One of the following is not function of firewalls?
A. Packet filter C. Differential backup
B. Proxy firewall D. State full inspection
14. Which one of the following is a private IP address?
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
15. You are the administrator for your company’s domain you need to subdivide groups in your
organization with in active directory. If you want to separate sales from marketing department what
could you use as a system of organizing this subdivision?
A. Create organizational units
B. Use user and groups
C. Create sites and subnet grouping
D. Build a container in subnet group
16. Which one is used to install active directory?
A. Netstart C. NTLDR
B. DCPROMO D. DHCP
Column A Column B
1. What can you use to dynamically assign the same IP address to a printer configured as a network
device
A. DNS C. SNMP
B. DHCP reservation D. DHCP exclusion
5. With respect to the OSI model, which of the following are correct statements about PDUs?
8. Which of the IP address provides a maximum of only 254 host network ID?
A. Class A C. Class C
B. Class B D. Class D
11. Which of the following is used to install active directory and DNS?
A. Upgrade.exe C. DNS.exe
B. Update.exe D. DCPROMO.exe
12. Chala is attempting to install a new web camera on the windows server 2003 to be used to monitor
the server room. Chala informs you that the device is not detected when he plugs in it. Chala says he
also tried to use the add hardware wizard, but the driver was not found. You need to help chala
install the web cam as soon as possible. What should you do?
A. Open device manager and click scan for hardware changes insert the driver disk when prompted
and install the device.
B. Start the add hardware wizard and manually install the device supply the driver from the
manufacturer disk
C. Restart the computer
D. Open device manager and select sound, video and game controller right click and select updates
driver.
13. You need to provide network connectivity to 150 computers that are connected in the same sub
network and each client computer should be subneted the same bandwidth. Which device should you
use to accomplish the task?
A. Hub C. Router
B. Switch D. Bridge
14. You are the administrator of a windows server 2003 domain. All domain controllers are running windows
server 2003 and domain functional level has been raised to windows 2003. You are in the process of building
a new domain controller, which you have named OCOC. When asked for a password, you enter OCOC
receives an error. What should you do to continue building the server?
A. Log onto a different domain controller and modify the default to allow password of five characters.
Disable the requires complex password option.
B. Change the password to Ococserver9
C. Change the password to Ococserver9%
D. From the command prompt,type netuser Ococserver9%