Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Hardware and Networking Level III COC Muching and Practicum Exam A B

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Hardware and networking level III COC muching and practicum exam

A B
1. Ping H A. connect for to 10 base cable
2. DHCP server L B. Each computer to connect central devices
3. Mesh topologyCC. A topology that is the most tolerance high level or redundancy
4. DNS server K D. connect thiknet cable
-a
5. Arp E. connect telephone
6. Telnet I F. Display ipconfig
7. Net start G. Display MAC address
8. Star topologyB H. check the network connectivity
9. DC promo P I. use to establish session with remote device
10. RJ-45D J. used to start instructive directory
11. RJ-11E K. resolve domain name IP address
12. Application server L. Dynamic assign IP address
13. Web serverS M. share public resources
14. File server M N. use to access Email
15. Ipconfig F O. used to based /display porter XML web server
16. BNC P. active directory (Domain controller )
17. UPSQQ. Power protection Device
18. Ring topology R. wireless internet connection
19. Exchange server S. Allows worldwide search information
20. Browser T. the area of image provide additional information
21. Search engine U. dividing large network into smaller segment
22. Bus topology V. section in large network dividing by using router and bridge
23. AUI W. The physical interface of router
24. Hotspot Y. the degradation of signals to traveling through the cable
25. SubnetU Z. the private network that access information an enterprise
26. Attenuation Y
27. IntranetZ

Choose

1. What is the physical and electrical usage in the net work

A. NIC B. HUB C. SWICH D. router

2. In one organization to built 200 computers in a network what is the best subnet mask?

A. 255.255.255.0 C. 255.0.0.0
B. 255.255.0.0. D. 255.255.255.200
3. in one organization to built the network successfully the monitor is happy
What do you do first?
A. Document every thing
B. Tanks for you manager etc

FinoteSelam collage BY Berhanu Marie July 2006


4. Which one of the following is the strong password?

A. password # C. password *-# etc

B. password #

COC first Round 2006 FOR LEVEL III


1. A user calls to report that cannot access network resources. You investigate and discover that the IP
address of the user’s computer is 169.254.0.6. You also discover that other clients on the same subnet
are experiencing the same problem. You must provide network connectivity for the user. What should
you do?
A. Enabling Automatic Private IP addressing
B. B. Disable Automatic private IP addressing
C. Ensure the computer is enabled as a DHCP client
D. Ensure a DHCP server or DHCP relay agent resides on the local subnet
2. A piece of hardware or software on the network to prevent some communications forbidden by the
network policy.
A. Procysercer B. Network address translator C. Firewall D. Network interface controller
3. A device which amplifies or regenerates digital signal s recieved while sending them from one part of a
network into an onther?
A. Bridge B. Repeater C. Switch D. Router
4. You have made changes to file and directory permissions on a server on a netwok .you want to verify
the new settings before informing the users of the changes . How can verify that the changes have
taken affect and that no security poblems arise from them?
A. Ask a trusted user to perform the tests for you
B. Use your own administrator account to perform the tests
C. Create a test account for the purpose
D. Do nothing , changes made with administrative privileges are always correct
5. You find that an abnormal amount of traffic is passing between the DNS and the DNS clients. Which
tool would best help you ascertain the cause of excess traffic?
A. Tracer B. Event Viewer C. System Monitor D. Security Monitor
6. In OSI network architecture , the dialogue control and token management are responsibility of
A. Datalink layer B. Session layer C. Network layer D. Transport layer
7. Communication modes support two – way traffic but in only one direction at a time?
A. Simplex B. Three quarters duplex C. Half duplex D. Full duplex

8. You install file and printer sharing for microsoft networks. You share a folder and leave the password
option blank. Who can gain acess to the folder?
A. Windows 98 will not allow a blank password in this field
B. Anyone with internet Explorer installed
C. Only users that are members of the same workgroup as you
D. Anyone who can gain acess to your network and has a microsoft redirector such as the client for
microsoft networks installed
9. What is a firewall in computer network?
A. The physical boundary of a network
B. An operating system of computer network
C. A system designed to prevent unauthorized access
D. A web browsing software
FinoteSelam collage BY Berhanu Marie July 2006
10. You are the LAN administrator for your company. You have couple windows XP professional clients
that dial in via PPP to the company network’s RAS server. You want the remote clients to be assigned
dynamic IP addresses. Upon connecting, you find that the windows XP computers did not get any IP
address. What should you do?
A. Run ipconfig with the/release all and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
11. A large network with 500 users notices that at specific times in the morning and afternoon network
congestion ties up their computers. What is the most likely cause?
A. Many users are logging on or off
B. Power fluctuations
C. A terminator is not grounded
D. The switch connection the network goes down
12. The best method to restore the latest copy of the registery in a win 2003 server is to select the
A. Emergency repair desk (ERD)
B. Recovery console
C. Last known good configuration
D. Ctr l+ Alt + Delete keys
13. The most efficient way to control security in a client/server network is to assign permission to
A. Each shared resource B. Groups C. Directories D. User

14. The advantage of a client/server network over a peer- to – peer network is


A. Performance is better on a peer- to – peer
B. Security is better on a client/server
C. Easy to configure the client /server
D. Security is better on a a peer- to – peer
15. A remote user complains that he is unable to access internal corporate network resource from the
remote site. The user states that he can access the local resource. What is your primary advice to solve
this problem?
A. Check whether he can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of hios computer setting
D. Check TCP/IP status of his computer
16. A system acting as firewall on the network typically located between?
A. The client system and the server
B. Two internal networks
C. The internal access point and in the internet
D. The internal network and internal access point
17. Which of the following is correct regarding class B adressog IP address?
A. Network bit--14, Host bit—16
B. Network bit--16, Host bit—14
C. Network bit--18, Host bit—16
D. Network bit--12, Host bit—14
18. The administrators for a company’s domain needs to subdivide groups in organization with in active
directory. If he wants to separate sales from marketing department , what could he use as a system of
organizing this subdivision?
A. Creating organizational units
B. Use user and Groups

FinoteSelam collage BY Berhanu Marie July 2006


C. Create site & subnet grouping
D. Build a container in a subnet group
19. A system adminiostrator wants to remote a domain controller from a domain. Which is the easiest way
to perform the task?
A. Re- install server over existing installation and make the machine a member of group
B. Use remove command
C. Use active directory installation wizard to remove the domain controller
D. Re- install server over existing installation and make a machine a member of domain
20. ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
21. Which of the following laye of OSI model also called end- to – end layer?
A. Presentation layer B. Network Layer C. Session Layer D. Transport Layer

Column Acolumn B

__C__1. Used to connect two different networks A. Active directory

__E__2. Regenerate signals on a single network B. Network interface card

__F__3. Layer 2 device that is used to expand existing network C. Gateway

__B_4. Prepares data for transmission between workstation D. CMOS

__A_5. Stores information about objects in a network E. Repeater

__G_6. Parameter used in a network to determine data transfer rate F. Bridge

__I_7. An OSI layer that makes sure reliable transmission of data G. Bandwidth

__O_8. Provides high speed data transmission H. Baseband

__Q_9. An OSI layer used to convert data delivered by the sending I. Transport layer

application layer into universally accepted format J. DMA channel

__P_10. Transport protocol used for unreliable data delivery K. Data link layer

__T_11. The principle of executing more than one application at a time L. Circuit switched

__L_12. A method of switching technology that opens communication M. Serial transmission

Lines for as long as transmission time like telephone system N. Registry

__D_13. Used to hold setting of BIOS O. Parallel transmission

__N_14. Local storage area within the process that used to hold data p. Session layer

that is being worked on by the processor Q. Presentation layer

__J_15. System path ways used by devices to transfer information R. UDP

Directly to and from memory S. TCP

T. multitasking

U. leased line

FinoteSelam collage BY Berhanu Marie July 2006


V. wireless channel

INFORMATION TECHNOLOGY LEVEL III PRACTICAL TEST

TASK I

1. Connect the necessary devices in the server computer and make ready it
2. Make ready other computer by installing operating system and necessary soft ware on them
3. Install with server 2003 operating system
4. Established connection among the server and the client
5. Install device driver
6. Configure the server operating system as DNS and active directory for the server computer
using the TVET local as domain name

TASK II

1. Create group of computer using to group name finance and administration and make sure
that the client computer go in the group
2. Create user and password for the two groups as follow
A. Fiancé group /finuser1/fin user/ and finuser2/finuser2
B. Administration group /admiuser3/user3 and admiuser4/user4 respectively
3. Create user privilege change the password of first log on in for user finuser2 and finuser2
4. Set access time limitation for finance group of finuser1 to access finuser2 and finuser2
5. Add or join the client computer to the domain TVET local
6. Turn on window fire wall on the server computer

TASK III

1. When you turn on the computer it boots regularly and displays on the monitor screen the
message “NTLDR” file is missing .solve the problem (assume that the computer should not be
formatted)

FinoteSelam collage BY Berhanu Marie July 2006

You might also like