Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Know Quest

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

1.

You have been asked to install a network that will provide the network users with the
greatest amount of fault tolerance. The preferred network topology.
A. Star
B. Ring
C. Mesh
D. Bus

2. Firewall function

A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

3. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.

A. Client Security policy


B. Group Security policy
C. Computer System Policy
D. Domain Controller security policy

4. The reason that end users need to be aware of the security policy.

A. Some security decisions are usually in their hands

B. They should understand the probability of every risk

C. They need to be aware of every threat

D. They should avoid responsibility for their actions


5. You are requested to setup a 100Mbps network for a client in an office that already has
10Mbps throughput. Your client wants to keep the costs to a minimum but he needs the
100Mbps throughput. The cabling solution you recommend.

A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable

6. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.

A. DSL Modem, Ethernet cable, Wireless Signal, Wireless Router/Access Point.


B. Wireless Router/Access Point, Ethernet cable, Wireless Signal, DSL Modem
C. Wireless Router/Access Point, Wireless Signal, Ethernet cable, DSL Modem
D. DSL Modem, Wireless Signal, Ethernet cable, Wireless Router/Access Point.

7. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
8. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.

A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down

9. An application that used to remotely and securely access the remote server.

A. Telnet
B. SSH
C. SFTP
D. RSA

10. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization

11. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.
12. While gathering data to determine the organization business requirement you might take
records of the organization like organizational policies and procedures. These kinds of
information resources are considered as

A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources

13. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?

A. Rename Mashos’s account to Desta. Reset the password.


B. Copy Masho’s account and create a new account for Desta. Disable Masho’s
account.
C. Create a new account for Desta. Recreate the group membership of Masho’s
account to Desta’s account.
D. Copy Masho’s account and create a new account for Desta. Delete Masho’s
account.

14. A user can login to his computer but cannot access network resources. The user has all
the appropriate group memberships and permissions, but he still cannot access shared
resources. The cause of this problem

A. User has attempted to access a shared folder without appropriate permissions.


B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.
15. You enable disk quotas on a Windows Server 2008 file server. You configure a quota
limit of 100MB. A user, named Eyob, reports that he can still save large files to the
server, even though he is well above his quota limit. What should you do to correct the
problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the
Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.

16. A hierarchical structure made up of multiple domains that trust each other.

A. Root
B. Site
C. Organizational Unit
D. Tree

17. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?

A. Run the Start /normal csrss.exe command before starting Excel.


B. Run the Start /normal Excel.exe command to start Excel.
C. Use Task Manager to set the Explorer.exe process to high priority.
D. Use Task Manager to set the Excel.exe process to low priority.

18. When you tried to login to the server, your trial may failed, this failure event is recorded
in
A. System log
B. Security log
C. Application log
D. Event log
19. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure programs
at startup.

A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32

20. You have a server that runs Windows Server 2008. You need to identify all the unsigned
drivers that are installed on the server. What should you do?

A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.

21. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?

A. Reset her computer account through the Active Directory Users and Computers
utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-line
utility.
SECTION B – MATCHING TYPE QUESTIONS
Instructions for Section B
1. There are fifteen [_15_] questions in this section grouped in three Types I, II & III.
2. Match column A with column B. Select the letter of the correct answer from column B &
write your answer on the provided space in front of the number in column A
3. If you wish to change your answer place an x mark on your previous answer and write your
preferred answer
4. A correct answer scores 1, an incorrect answer scores 0. No marks will be given for a
question if more than one answer is supplied
Column A -2 Column B
___1. Loop back IP address A. Physical layer
___2. Define hardware connections and turns binary in to B. TRACERT
pulses(electrical or light) and also uses repeaters C. 10.1.10.1
and hubs D. HOSTNAME
___3. Used to diagnose problems reaching a remote E. Data Link layer
system by tracing all routes between two points F. 172.20.0.20
___4.Broadcast IP Address G. Presentation layer
___5. Breaks data down into manageable chunks and H. NETSTAT
uses TCP and UDP I. 127.0.0.1
___6. . Used to diagnose DNS problems P J. Session Layer
___7. Public IP Address K. 255.255.255.255
___8. Identifies devices on the physical layer and uses L. Network layer
MAC addresses M. 192.25.1.256
___9. Used simply to return the name of the local N. Transport layer
computer O. 213.55.96.148
___10. Class A IP Address P. NSLOOKUP
___11.Manages connections between machines and Q. 213.55.96.148
Sockets R. PING
___12. Used to display information on the current state
of all the running IP processes on your computer
___13. Class B IP Address
___14.Moves packets between computers on different
networks and uses
___15. Uses ICMP packets to show if you can simply
reach a remote computer

You might also like