HNS LV With Answer 1
HNS LV With Answer 1
A. Monitor
B. Printer
C. Keyboard
D. Speaker
4. An application software that is/are used to perform calculation functions and charts?
A. Microsoft Office Word
B. Microsoft Office Excel
C. Microsoft Office Publisher
D. Microsoft Office Access
5. To access and manage files of your computer, you have to login with _______account.
A. Standard user account
B. Guest user account
C. Limited user account
D. Administrator user account
6. _____controls the way in which the computer system function and provide a means by
which a user can interact with computer.
A. The platform
B. The operating system
C. Application software
D. Motherboard
10. Identify among the following the network device used to connect two dis-similar types of
networks.
A. Switch
B. Hub
C. Bridge
D. Gateway
19. Client computers need a________to join with server in server-based network.
A. Computer
B. DNS
C. Domain
D. Printer
21. ______is a server that can perform no other task besides network services.
A. Printer server
B. Committed server
C. Service server
D. Dedicated server
22. A computer which links several PCs together in a network is called a________.
A. Minicomputer
B. Client
C. Server
D. Mainframe
23. The_________ layer lies between the session layer and the application layer in7 layers OSI
Model.
A. Network layer
B. Transport layer
C. Data link layer
D. Presentation layer
24. Domain name system can obtain the ___________of host if its domain name is known and
vice versa.
A. Station address
B. IP address
C. Port address
D. Checksum
25. If one link fails, only that link is affected. All other links remain active. This topology refers
to:
A. Mesh Topology
B. Star Topology
C. Ring Topology
D. Bus Topology
26. Which of the following cable is used as a high-speed network backbone media?
A. Thin Coaxial Cable
B. Thick Coaxial Cable
C. Unshielded Twisted Pair Cable
D. Fiber Optic Cable
27. What is the recommended maximum length (approximate) for a segment of UTP cable.
A. 500M
B. 1km
C. 100m
D. 180m
28. Which topology creates a very reliable network but requires a large amount of cable and it is
difficult to administer.
A. Ring Topology
B. Star Topology
C. Mesh Topology
D. Bus Topology
29. It is a network device that are used to amplify/ regenerate the weak signal is called.
A. Firewall
B. Repeater
C. Gateway
D. Modem
30. Which of the following commands will display the MAC (Media Access Control) address of
a given computer?
A. nslookup
B. ipconfig/all
C. nbtstat
D. nbtstat
31. One of your print devices is not working properly, so you want to temporarily prevent users
from sending jobs to the printer serving that device. Which of the following actions should
you take?
A. Disconnect the whole system
B. Stop sharing the printer
C. Allow sharing the printer
D. Install the new printer again
32. ________ is a good, cost-effective choice for smaller networks because the layout is simple,
allowing all devices to be connected via a single coaxial or RJ45 cable.
A. Hybrid topology
B. Ring topology
C. Bus topology
D. Star topology
33. Which of the following qualifies as best Disaster Recovery (DR) site?
A. DR site in the same campus
B. DR site in the same city
C. DR site in different country
D. DR site in country
34. _________is working in a helpdesk environment, including topics such as logging and
prioritizing client requests, communicating with personnel to identify the problem and give
solution for the problem.
36. Which of the communication modes support two-way traffic but in only once direction of a time?
A. Simplex
B. Half-duplex
C. Three - quarter's duplex
D. Full duplex
37. Domain Name System can obtain the__________of host if its domain name is known
and vice versa.
A. Station address
B. IP address
C. Port address
D. Checksum
38. Devices on one network can communicate with devices on another network via a______
A. File Server
B. Utility Server
C. Printer Server
D. Gateway
41. A user can get files from another computer on the internet by using_________
A. HTTP
B. TELNET
C. UTP
D. FTP
42. The first page that you normally view at a website is its__________
A. Home page
B. Master page
C. First page
D. URL
44. Computers on the internet owned and operated by education institution form part of
the______
A. com domain
B. gov domain
C. edu domain
D. mil domain
45. In a ____ topology, if there are n devices in a network, each device has n-1 ports for
cables.
A. Mesh
B. Star
C. Bus
D. Ring
46. The process by which Windows Server verifies that the user matches the user account
employed to gain access.
A. Authentication
B. Active Directory
C. Domain Name System
D. Hypervisor
48. A plug and play storage device that simply plugs in the port of a computer is________
A. Flash disk
B. CD
C. Hard disk
D. Card
49. Which of the following do attackers commonly target for fetching IP address of a target or
victim user?
A. IP tracker
B. Emails
C. Websites
D. Web pages
53. What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
A. Unshielded twisted pair
B. Optical fiber
C. Coaxial cable
D. Microwave
54. Which software prevents the external access to a system?
A. Firewall
B. Gateway
C. Router
D. Virus checker
55. When the mail server sends mail to other mail servers it becomes _________ ?
A. Peersevers
B. SMTP client
C. SMTP server
D. File server
57. How can you edit a relationship already established between two tables?
A. Left click the relationship line
B. Double clicks the relationship line
C. Right click and select properties
D. Edit the table by Design view
58. _______is anything that does not have value or does not add value. Waste is something
the customer will not pay for.
A. MUDA
B. MURA
C. Kaizen
D. MURI
59. Which of the following is NOT an advantage of network security?
A. Makes the system slower
B. Minimizes computer freezing and crashes
C. Gives privacy to users
D. Protects system against viruses
61. A ______ is a formal document created by an organization that contains detailed instructions
on how to respond to unplanned incidents such as natural disasters, power outages, cyber-
attacks and any other disruptive events.
A. Risk management
B. Disaster recovery plan
C. Contingency plan
D. Project proposal
64. A second technique to reduce routing table and simplify searching process is called ____.
A. Network-Specific Method
B. Network-Specific Motion
C. Network-Specific Maintaining
D. Network-Specific Membership
65. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates _____
A. Gaps
B. Loops
C. Holes
D. Links
67. Internet access by transmitting digital data over the wires of a local telephone network is
provided by______.
A. Digital leased line
B. Digital signal line
C. Digital subscriber line
D. Digital ISP line
68. The size of an IP in IPv6 is________.
A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits
71. Which one is NOT used as input elements in an organization to maintain and establish client
user liaison?
A. Determine support area
B. Develop support method
C. Assign support personnel
D. Ignorance of earlier condition
74. .________ is the type of software testing where a group of users uses the software in totality
before the final launch or deployment of the software.
A. Coding
B. Programming
C. Pilot testing
D. Planning
75. _______ serves as a link between systems personnel and end users, such as a client or
business unit.
A. User logon
B. User Liaison
C. Stakeholder
D. Organization
76. In router settings you can add and configure your routers which will manage Authentication,
Accounting and Bandwidth management (Network Access Servers). Which are considered in
the process?
A. Title, NAS Type/IP, Vendor/Model/Partners/Location, Physical address,
IP/Host…
B. Username, password, admin, URL, logical address, NAT type, LAN type…
C. Server, Ping, ipconfig, cmd, ADSL, domain, run…
D. Classes of IP address subnet mask, gateway, hub…
77. An initial phase system that is subset of the local/regional system's final configuration.
A. Deploy setup
B. Pilot system
C. Start coding
D. Process system
78. _______is the process of deciding what should be achieved, what should be done to achieve
it, how to do it efficiently and economically and who should do it to contribute?
A. Policy development
B. Research overview
C. Observation report
D. Assist technology
79. A diagram showing the reporting and responsibility relationships between staff of an
organisation.
A. Culture and politics of an organization
B. Organizational Structure
C. Entity Relationship
D. PERT Diagram
80. A contract that binds a service provider to give a certain level of service between service
provider and its client.
A. Service level agreement
B. Sponsor
C. Stakeholder
D. Disaster recovery plan
81. An attempt to decrease the probability (may be even to 0) of the event occurring or causing
damage.
A. Prevention
B. Recovery
C. Contingency plan
D. Threat
82. An international organization responsible for setting out of the quality of standards.
A. ISO
B. OSI
C. ILO
D. IMF
83. The practice of rethinking and redesigning the way work is done to better support an
organization's mission and reduce costs.
A. Identification of Business opportunities
B. Business Process Reengineering (BPR)
C. Arranging Organizational system
D. Value stream
84. A project plan may include a number of variables. Which one of the following is NOT a
variable of project plan?
A. Project scope
B. Project Objectives
C. Project Budget
D. Project Upgrade
85. One of the following step-by-step paths is correct about plan and monitor the system pilot.
A. Install Pilot system Monitor implementation of Pilot system prepare for Pilot
System Evaluate pilot System
B. Monitor implementation of Pilot system Install Pilot system prepare for Pilot
System Evaluate pilot System
C. Prepare for Pilot System Install Pilot system Monitor implementation of
Pilot system Evaluate pilot System
D. Evaluate pilot System prepare for Pilot System Monitor implementation of
Pilot system Install Pilot system
86. In providing excellent customer service which one of the following is inappropriate?
A. Know Your Product/Service
B. Say Thank You
C. Be sluggish
D. Show Respect
87. The correct path for system development life cycle (SDLC).
A. Planning Analysis Design ImplementationMaintenance
B. Planning Design Implementation AnalysisMaintenance
C. Planning Design Analysis ImplementationMaintenance
D. Planning Analysis Design Maintenance Implementation
88. Suppose your organization is planning to expand in all dimensions. Regarding using of ICT
the organization assigned you to conduct a research regarding the newlyavailable
technologies in the market. Which one of the following hardware and software combination
is most likely be the best to be chosen?
A. A high speed and larger storage capacity Server computer running an operating
system like windows server 2000, Linux, and Ubuntu.
B. A high speed and larger storage capacity Server computer running an
operating system like windows server 2012, Linux 2014 version.
C. An average speed and medium storage capacity Server computer running an
operating system like windows server 2000, Linux , and Ubuntu
D. A medium storage capacity server running an operating system like windows
server 2003
90. What is the business continuity plan (BCP) that focuses on the recovery of a damaged facility
or components back to normal day-to-day operations?
A. Cyber Incident Response Plan
B. Disaster Recovery Plan
C. Crisis Communications Plan
D. Occupant Emergency Plan
91. Which of the following includes the definition of procedures for emergency response?
A. Operations Planning
B. Disaster Recovery Planning
C. Business Continuity Procedure
D. Backup Planning
92. Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic
assignment of IPv6 addresses to a host?
A. ARPv6
B. DHCPv6
C. ICMPv6
D. UDP
93. What is the purpose of ICMP (Internet Control Messaging Protocol) messages?
A. To inform routers about network topology changes
B. To ensure the delivery of an IP packet
C. To provide feedback of IP packet transmissions
D. To monitor the process of a domain name to IP address resolution
95. Message is sent to all hosts on a remote network. Which type of message is it?
A. Limited broadcast
B. Multicast
C. Directed broadcast
D. Unicast
98. In which of the following project phases is the project schedule developed?
al
2. B. Planning
3. C. Implementation
4. D. Design
5. Conceptual
6. B. Planning
7. C. Implementation
8. D. Design
9. Conceptual
10. B. Planning
11. C. Implementation
12. D. Desig
A, Conceptual planning Implementation Design
13.
A. Conceptual
B. Planning
C. Implementation
D. Design
99. The time necessary to complete a project is referred to as:
A. Implementation
B. Life cycle
C. Operation cycle
D. Production cycle
100. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
Question Answer Mark
Multiple Choice
1 C-Keyboard 1
2 B-Video Graphic Adapter cable 1
3 D-Projector 1
4 B-Microsoft Office Excel 1
5 D-Administrator user account 1
6 B-The operating system 1
7 C-Worksheets 1
8 C-Expansion board 1
9 D-DOS 1
10 D-Gateway 1
11 C-TCP/IP 1
12 A-Authentication 1
13 C-Network 1
14 C-Class C 1
15 B-Dynamic Host Configuration Protocol 1
16 A-For a limited period 1
17 B-Command prompt 1
18 C-Presentation 1
19 C-Domain 1
20 A-Restarting computer 1
21 D-Dedicated server 1
22 C-Server 1
23 D-Presentation layer 1
24 B-IP address 1
25 B-Star Topology 1
26 D-Fiber Optic Cable 1
27 C-100m 1
28 C-Mesh Topology 1
29 B-Repeater 1
30 B-ipconfig/all 1
31 B-Stop sharing the printer 1
32 C-Bus topology 1
33 C-DR site in different country 1
34 B-Record Client Support Requirements 1
35 D-Preventive maintenance 1
36 B-Half-duplex 1
37 B-IP address 1
38 D-Gateway 1
39 B-Allows you to easily communicate with other people 1
40 A-Modem 1
41 D-FTP 1
42 A-Home page 1
43 D-Host 1
44 C-edu domain 1
45 A-Mesh 1
46 A-Authentication 1
14. The time necessary to
complete a project is
referred to as:
15. A. Implementation time
16. B. Life cycle
17. C. Operations cycle
18. D. Production cycl