1HNS L-IV COC Based Questions With Answer
1HNS L-IV COC Based Questions With Answer
12. In which layer of the hierarchical enterprise LAN design model would POE (power over Ethernet) for
VOIP phones be considered?
A. Physical C. Distribution
B. Core D. Access
13. Access point exists in--------------
A. Transport layer C. Network layer
B. Application layer D. Data link layer
14. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CSMA/CA C. EVDO
B. CDMA D. ALOHA
15. Which device performs the function of determining the path that messages should take through
internetworks?
A. A firewall C. A DSL modem
B. Router D. A web server
16. Which protocol is used by the traceroute command to send and receive echo-requests and echo-
replies?
A. SNMP C. TCP
B. Telnet D. ICMP
17. Enabling additional users to handle administrative tasks for a particular objects is referred to as:
A. Assignment C. Delegation
B. Targeting D. Redirection
18. A leadership style in which the leader includes one or more employees in the decision making
process is?
A. Authoritarian or autocratic C. Participative or democratic
B. Federalist D. Delegate or free reign
19. Local GPO settings are stored in what folder on a computer?
A. %systemroot%/system/Group policy
B. %systemroot%/system32/Drivers/Etc/Group policy
C. %systemroot%/system32/Drivers/Group policy
D. %systemroot%/system32/Group policy
20. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to fetch
the mails?
A. S/MIME C. SMTP
B. POP3 D. HTTP
21. Refer to the exhibit bellow. As an administrator pings the default gateway at 10.10.10.1 and output as
shown. At which OSI layer is the problem?
C:\> Ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data Request time out.
Request time out. Ping statistics for 10.10.10.1:
Request time out. Packets sent-4, received=0, lost-4(100%loss)
Request time out.
A. Session layer C. Data link layer
B. Application layer D. Network layer
22. Which of the following statement about a wireless LAN controller is true?
A. They rely on external firewalls for WLAN security
B. They can simplify the management and deployment of wireless LANS
C. They must be configured through a GUI over HTTP or HTTPS
D. They are best suited to smaller wireless networks