0% found this document useful (0 votes)
301 views8 pages

1HNS L-IV COC Based Questions With Answer

Uploaded by

mireko430
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
301 views8 pages

1HNS L-IV COC Based Questions With Answer

Uploaded by

mireko430
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Dandi Boru College Shambu Campus

Department of Hardware and Network Servicing Level IV


Choose the best answer for the given alternatives.
1. Small business owners develop and use operating procedures so tasks are performed in a (n) ___ way
A. Innovative C. Standard
B. Imprecise D. Diverse
2. Your company has one main office and four branch offices. The main office contains a standard
primary DNS zone named adatum.com. Each branch office contains a copy of the adatuma.com zone.
When records are added to the adatuma.com zone, you discover that it takes up to one hour before that
changes replicate to each zone in the branch office you need to minimize the amount of time it takes for
the records to be in the branch office .what should you do?
A. On the DNS servers in the branch office, configure the zone Aging /scavenging properties
B. On the DNS server in the main office, configure the zone Aging/scavenging properties
C. On the DNS servers in the branch offices, configure the Notify settings
D. On the DNS server in the main office, configure the Notify settings
3. Which of the following protocol used port 443 and 80 respectively
A. DHTML C. HTTP and HTTPS
B. XHTML D. HTTPS and HTTP
4. Network layer firewall has two sub categories as
A. Frame firewall and packets firewall
B. None of the mentioned
C. State full and stateless firewall
D. Bit oriented firewall and byte oriented firewall
5. The most frequently used framework for obtaining continuous improvement is ------
A. The plan-do-check-act cycle C. The cause and effect process
B. The quality circle D. Quality function deployment
6. You have a domain controller that runs windows server 2008 R2 and is configured as a DNS server.
You need to record all in bound DNS queries to configure in the DNS manager console?
A. Enable automatic testing for recursive queries.
B. Enable automatic testing for simple queries.
C. Enable debugs logging
D. Configure event logging to log errors and warnings.
7. Which of the following elements is required to do after successfully installation on DNS?
A. WINDOWES 2000 client’s C. Dynamic IP address configuration
configuration D. Active directory configuration
B. Static IP address configuration
8. A new corporation needs data network that must meet certain requirement. The network must
provide a low cost connection to sales people dispersed over large geographical area. Which type of WAN
infrastructure would meets the requirements
A. Private infrastructure C. Public infrastructure
B. Dedicated D. Satellite
9. What do business employees often need to do before they are able to write proposals?
A. Contact the customer C. Analyze personal skills
B. Evaluate technical skills D. Research the problem
10. The file transfer protocol built on ------------------
A. Service oriented architecture C. Data centric architecture
B. Client server architecture D. File centered architecture
11. HTTP client requests by establishing a---------------connection to a particular port on the server
A. File transfer protocol C. Transmission control protocol
B. User datagram protocol D. Broader gateway protocol

Prep by: Bilisa Shobe Page 1


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV

12. In which layer of the hierarchical enterprise LAN design model would POE (power over Ethernet) for
VOIP phones be considered?
A. Physical C. Distribution
B. Core D. Access
13. Access point exists in--------------
A. Transport layer C. Network layer
B. Application layer D. Data link layer
14. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CSMA/CA C. EVDO
B. CDMA D. ALOHA
15. Which device performs the function of determining the path that messages should take through
internetworks?
A. A firewall C. A DSL modem
B. Router D. A web server
16. Which protocol is used by the traceroute command to send and receive echo-requests and echo-
replies?
A. SNMP C. TCP
B. Telnet D. ICMP
17. Enabling additional users to handle administrative tasks for a particular objects is referred to as:
A. Assignment C. Delegation
B. Targeting D. Redirection
18. A leadership style in which the leader includes one or more employees in the decision making
process is?
A. Authoritarian or autocratic C. Participative or democratic
B. Federalist D. Delegate or free reign
19. Local GPO settings are stored in what folder on a computer?
A. %systemroot%/system/Group policy
B. %systemroot%/system32/Drivers/Etc/Group policy
C. %systemroot%/system32/Drivers/Group policy
D. %systemroot%/system32/Group policy
20. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to fetch
the mails?
A. S/MIME C. SMTP
B. POP3 D. HTTP
21. Refer to the exhibit bellow. As an administrator pings the default gateway at 10.10.10.1 and output as
shown. At which OSI layer is the problem?
C:\> Ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data Request time out.
Request time out. Ping statistics for 10.10.10.1:
Request time out. Packets sent-4, received=0, lost-4(100%loss)
Request time out.
A. Session layer C. Data link layer
B. Application layer D. Network layer
22. Which of the following statement about a wireless LAN controller is true?
A. They rely on external firewalls for WLAN security
B. They can simplify the management and deployment of wireless LANS
C. They must be configured through a GUI over HTTP or HTTPS
D. They are best suited to smaller wireless networks

Prep by: Bilisa Shobe Page 2


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV
23. Users are complaining that they are unable to browse certain websites on the internet. An
administrator can successfully ping a web server via its IP address, but cannot browse to the domain
name of the website. Which troubleshooting tool would be most useful in determining where the
problem is?
A. Netstat C. Nslookup
B. Tracert D. Ipconfig
24. Of the following is a principle of the total quality management?
A. Continuous productivity improvement C. Continuous process improvement
B. Continuous value enhancement D. Continuous defect elimination
25. A network administrator is implementing a policy that requires strong, complex passwords. Which
data protection goal does this policy support?
A. Data integrity C. Data redundancy
B. Data quality D. Data confidentiality
26. A network administrator is verifying the configuration of a newly installation establishing a FTP
connection to a remote server, what is the highest protocol stack that the network administrator is using
for this operation?
A. Application C. Transport
B. Session D. Presentation
27. You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default getaway, and DNS information. Which protocol will use to accomplish this?
A. SMTP C. ARP
B. DHCP D. SNMP
28. How many host addresses are available on the network 172.16.128.0 with a subnet mask of
255.255.252.0? (Bonus question)
A. Cut-through C. Fragment-free
B. Fast-forward D. Store-and-forward
29. You are an enterprise administrator for IIHT consists of a single active directory forest called
IIHT.com. The IIHT.com forest contains six domains under it. ALL DNS servers in the forest run
windows server 2008. Which of the following actions would you choose to ensure that all public DNS
queries are channeled through a single –caching – only DNS server?
A. Configure a global names host record for the C. Enable BIND secondary’s on a DNS server.
hostname of the caching DNS. D. Record for the hostname of the caching DNS
B. Configure the root hints. server.
30. Which connectivity method would be best for a corporate employee who works from home two days
a week, but needs secure access to internet corporate databases?
A. WiMAX C. DSL
B. Cable D. VPN
31. Which of the following server’s services use TCP ___________________
1. DHCP 3. HTTP 5. FTP
2. SMTP 4. TFTP
A. 1 and 2 C. 1, 2 and 4
B. 2, 3 and 5 D. 1, 3 and 4
32. What is the access point (AP) in a wireless LAN?
A. All the nodes in the network
B. A wired devices that connect the wired network with a node
C. Wireless devices itself
D. Device that allows wireless devices to connect to a wired network

Prep by: Bilisa Shobe Page 3


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV
33. Which of the following is best describe virtual memory?
A. The use of hard disk space as an extension of RAM when physical memory runs out
B. A memory which used to hold data in permanent bases
C. A segment of memory that has been reserved for use by the CPU
D. An extremely fast of memory
34. The time required to examine the packets header and determine where to direct the packets is part of
A. POP UP delay B. Queuing delay
D. Transmission delay C. Processing delay
35. ---------------------- is the process that helps managers understand the nature of the industry, the way
firms behave competitively within the industry, and how competition is generally undertaken
A. Portfolio analysis C. Strategic market analysis
B. Market needs analysis D. Organizational analysis
36. The scheduled activities are based on a preset schedule that is established regardless of need V2
repetition q3
A. Predictive maintenance C. Rehabilitation maintenance
B. Interval based maintenance D. Reliability-centered maintenance
37. --------------is the signal sent from a TV station to your TV
A. Full duplex C. Multiplex
B. Simplex D. Half duplex
38. A back up types, which includes only those files that have been modified since the last backup and
clears the archive bit of the files it copies to the backup medium
A. Daily backup C. Incremental backup
B. Full backup D. Copy backup
39. What is the advantage of using SSH over Telnet?
A. SSH operates faster than Telnet
B. SSH supports authentication for a connection request
C. SSH is easier to use
D. SSH provides secure communications to access hosts
40. The network design for a college with users at five sites is being developed where in the campus
network architecture servers used by all users would be located
A. Access-distribution C. Data center
B. Enterprise edge D. Services
41. Which class of a network is used for experimental testing?
A. Class D C. Class A
B. Class B D. Class E
42. A protocol which deals with resolving domain names is_____________
A. SMTP C. DHCP
B. POP3 D. DNS
43. One of the following can explain mentoring
A. Daily weekly and monthly transaction and reports
B. Departmental budgets development
C. Sales performance development
D. Professional and personal development
44. Microsoft windows server 2008 uses the windows installer with group policy to install and manage
software that is packaged into what type of file
A. In C. Msi
B. Mse D. Exe

Prep by: Bilisa Shobe Page 4


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV
45. Which one of the following is the quality of employee’s work ethics?
A. Unconsciousness C. Analytical skills
B. Aggressiveness D. Maliciousness
46. The DOD model (also called the TCP/IP stack) has four layers which layer of the DOD model is
equivalent to the network layer of the OSI model?
A. Host –to-host C. Network access
B. Internet D. Application
47. One source sending a packet to multiple destinations________________
A. Domain server C. Unicasting
B. Broadcasting D. Multicasting
48. What is wired equivalent privacy (WEP)?
A. Security algorithm for wireless networks
B. Security algorithm for flash drive communication
C. Security algorithm for Ethernet
D. Security algorithm for usb communication
49. Which statements are true regarding ICMP packets?
A. ICMP guarantees, datagram delivery
B. ICMP is encapsulated within UDP datagram
C. ICMP is unencapsulated within IP datagram
D. ICMP can provide hosts with information about network problems
50. When a manager monitors the work performance of workers in his department to determine if the
quality of their work is up to standard this managers is engaging in which function
A. Controlling C. Leading
B. Planning D. Organizing
51. Your network consists of an active directory forest that contains one domain named contoso.com all
domain controllers run windows server 2008 and are configured as DNS servers. You have two active
directory integrated zones. Contoso.com and nwtraders.com you need to ensure user is able to modify
records in the contoso.com zone. You must prevent the user from modifying the SOA record in the
nwtraders.com zone. What should you do?
A. From the DNS manager console, modify the permissions of the nwtraders.com zone
B. From active directory users and computers console, modify the permissions of the domain
controller’s organizational unit (OU)
C. From the DNS manager’s console, modify the permissions of the contoso.com zone
D. From the active directory users and computers console, run the delegation of control wizard
52. It allows a visited website to store its own information about a user on the user’s computer—
A. Cookies C. Malware
B. Spam D. Adware
53. A corporate network includes an active directory domain services (AD DS) forest that contains two
domains. All servers run windows server2008 R2. All domains controller are configured as DNS server.
Standard primary zone for.contoso.com it’s stored on a member server .you need to ensure that all
domains controllers can resolve names from the dev.contoso.com zone what should you do?
A. On one domain controller, create a stub zone. Configured the stub zone to replicate to all DNS
servers in the forest.
B. On the member server, create a secondary zone.
C. On one domain controller, create a conditional forwarder configure to replicate to all DNS
servers in the domain.
D. On one domain controller, create a stub zone configured the stun zone to replicate to all DNS
servers in the domain.

Prep by: Bilisa Shobe Page 5


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV
54. Which statements are true regarding ICMP packets?
1. They acknowledge receipt of a TCP segment
2. They guarantee datagram delivery
3. They can provide hosts with information about network problems
4. They can encapsulated within IP datagram
A. 2 and 1
B. 3 and 4
C. 1 only
D. 2, 3 and 4
55. A new corporation needs a data network that must meet certain requirements. The network must
provide a low cost connection to sales people dispersed over a large geographical area. Which type of
WAN infrastructure would meet the requirements?
A. Public infrastructure C. Dedicated
B. Private infrastructure D. Satellite
56. Which of the following statement about a group is true?
A. You need five or more people to be considered a work group
B. The definition of groups suggest that a group is two or more people together for any reason
C. Formal groups are aimed at specific social agendas
D. Groups should be formal
57. DHCP uses UDP port number -------------------- for sending data to the server
A. 67 C. 66
B. 68 D. 69
58. What process involves placing one PDU inside of another PDU?
A. Encapsulation C. Segmentation
B. Encoding D. Flow control
59. You work as a senior office 365 administrator an ABC.com. The ABC.com network consists of a
single domain named ABC.com you are running a training exercise for junior administrator you are
currently discussing office 365 admin role. Which of the following roles have extended roles in Microsoft
exchange online?
A. The bailing admin role C. The service admin role
B. The user management admin role D. The password admin role
60. Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smart phones to school to access school resources?
A. Extranet C. Wireless LAN
B. Intranet D. Wired LAN
61. Router access switches, hub and word processing operate at ____, _____, and ______ and
____ layer respectively?
A. 3,3,1,7 C. 3, 3, 2
B. 3,2,1,7 D. None
62. The willingness to exert high levels of effort to reach organizational goals based on the efforts ability
to satisfy some individual need is ___________
A. Motivation C. Need configuration
B. Leadership D. Effort management
63. What is an ISP?
A. A standard body that develops cabling and wiring standard for networking
B. A networking device that combines the functionality of several different networking devices
C. An organization that enables individuals and businesses to connect to the internet
D. A protocol that establishes how computers within a local network communicate

Prep by: Bilisa Shobe Page 6


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV
64. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188. 255.255.255.192 resides?
A. 192.168.168.128-190 C. 195.168.168.128-192
B. 192.168.168.129-191 D. 192.168.168.129-190
65. Service that are required to enable another service to run are referred to as service_______
A. Dependencies C. Parent
B. Roots D. Prerequisites
66. What are the characteristics of a scalable network?
A. Suitable for modular devices that allow for expansion
B. Grows in size with the impacting of existing users
C. Easily overloaded with increased traffic
D. Offers limited number of application
67. To back up active directory you must install what feature from the server manager console?
A. Windows’s server backup C. Windows’s backup utility
B. Active directory backup client D. Backup exec 1
68. What is the function of a router?
A. It manages the VLAN database
B. It connects multiple IP networks
C. It controls the flow of data via the use of layer 2 addresses
D. It increases the size of the broadcast domain
69. In wireless distribution system
A. Multiple access point are inter-connected with each other
B. There is no access point
C. Only one access point exists
D. Only one wired access point
70. The bit length for IPV6 address ___________
A. 32 bits C. 192 bites
B. 128 bites D. 64 bites
71. You are an enterprise administrator for IIHT the corporate network of IIHT consists of a DHCP
server that runs windows server 2008 which of the following options choose to reduce the size of the
DHCP database?
A. Enable the compress contents to save disk space attribute of the dhcp.mdb file, from the
properties of dhcp.mdb file.
B. Reconcile the database from the DHCP snap-in.
C. Run jetpack exe dhcp.mdb temp.mdb from the folder that contains the DHCP.
D. Enable the file is ready for archiving attribute of the dhcp.mdb file, from the properties of
dhcp.mdb file.
72. Your network contains an active directory domain named contoso.com. The domain contains a
domain controller named DC1. You have a member server named server 1. Both DC1 and server 1 have
the DNS server role installed on DC1, you create an active directory integrated zone named adatum.com.
You need to ensure that server 1 receives a copy of the zone.
A. Create secondary one on server 1
B. Modify the zone type of adatum.com
C. Modify the zone transfers settings of adatum.com
D. Add server 1 to the DNS update proxy group

Prep by: Bilisa Shobe Page 7


Dandi Boru College Shambu Campus
Department of Hardware and Network Servicing Level IV
73. Which of the following is true of effective communication?
A. Always translate the message in to benefits for our self than the other party
B. Not recognize that actions speak louder than words
C. Be unconsciousness for personal benefit
D. Organize your thoughts
74. What security violation would cause the most amount of damage to the life of a home user?
A. Capturing of personal data that leads to identify theft
B. Spyware that leads to spam emails
C. Replication of worms and viruses in your computer
D. Denial of service to your email server
75. A web cookie is a small piece of data?
A. Sent from user to all servers
B. Sent from root server to all servers
C. Sent from user and stored in the server while a user is browsing a website
D. Sent from a website and stored in user’s web browser while a user is browsing a website
76. A type of cabling used to connect a router to a computer using console serial port
A. SFP C. Roll over
B. Straight through D. Cross over
77. What type of network traffic requires QOS?
A. Video conferencing C. On-line purchasing
B. Wiki D. Email
78. If the server NO clue about where to find the address for hostnames then?
A. Request is not processed C. Server asks to its adjusting server
B. Server asks to root server D. Server not reply for the request
79. During a routine inspection a technician discovered that software that was installed on a computer
was security collecting data about websites that were visited by users of the computer. Which type of
threat is affecting this computer?
A. Zero-day attack C. Spyware
B. Identify theft D. Dos attack
80. A network administrator needs to expand a network at ABC corporate office, which is quickly
growing you are instructed to enlarge the area which one of the following is layer 1 devices that you can
use?
A. Router C. Switch
B. Hub D. Network adapter card

Answer for all Questions


1. C 9. D 17. C 25. D 33. A 41. D 49. D 57. A 65. A 73. A
2. C 10. B 18. C 26. A 34. C 42. D 50. A 58. A 66. A & B 74. A
3. D 11. C 19. D 27. B 35. C 43. D 51. C 59. D 67. A 75. D
4. C 12. D 20. B 28. A 36. A 44. C 52. A 60. C 68. B 76. C
5. A 13. C 21. D 29. B 37. B 45. C 53. B 61. B 69. A 77. A
6. C 14. A 22. B 30. D 38. C 46. B 54. B 62. A 70. B 78. B
7. B 15. B 23. C 31. B 39. D 47. D 55. A 63. C 71. C 79. C
8. C 16. D 24. C 32. D 40. C 48. A 56. B 64. D 72. B & C 80. B

Prep by: Bilisa Shobe Page 8

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy