Know Quest
Know Quest
Know Quest
You have been asked to install a network that will provide the network users with the
greatest amount of fault tolerance. The preferred network topology.
A. Star
B. Ring
C. Mesh
D. Bus
2. Firewall function
3. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.
4. The reason that end users need to be aware of the security policy.
A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable
6. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.
7. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
8. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.
A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down
9. An application that used to remotely and securely access the remote server.
A. Telnet
B. SSH
C. SFTP
D. RSA
10. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization
11. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.
12. While gathering data to determine the organization business requirement you might take
records of the organization like organizational policies and procedures. These kinds of
information resources are considered as
A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources
13. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?
14. A user can login to his computer but cannot access network resources. The user has all
the appropriate group memberships and permissions, but he still cannot access shared
resources. The cause of this problem
16. A hierarchical structure made up of multiple domains that trust each other.
A. Root
B. Site
C. Organizational Unit
D. Tree
17. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?
18. When you tried to login to the server, your trial may failed, this failure event is recorded
in
A. System log
B. Security log
C. Application log
D. Event log
19. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure programs
at startup.
A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32
20. You have a server that runs Windows Server 2008. You need to identify all the unsigned
drivers that are installed on the server. What should you do?
A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.
21. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?
A. Reset her computer account through the Active Directory Users and Computers
utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-line
utility.
SECTION B – MATCHING TYPE QUESTIONS
Instructions for Section B
1. There are fifteen [_15_] questions in this section grouped in three Types I, II & III.
2. Match column A with column B. Select the letter of the correct answer from column B &
write your answer on the provided space in front of the number in column A
3. If you wish to change your answer place an x mark on your previous answer and write your
preferred answer
4. A correct answer scores 1, an incorrect answer scores 0. No marks will be given for a
question if more than one answer is supplied
Column A -2 Column B
___1. Loop back IP address A. Physical layer
___2. Define hardware connections and turns binary in to B. TRACERT
pulses(electrical or light) and also uses repeaters C. 10.1.10.1
and hubs D. HOSTNAME
___3. Used to diagnose problems reaching a remote E. Data Link layer
system by tracing all routes between two points F. 172.20.0.20
___4.Broadcast IP Address G. Presentation layer
___5. Breaks data down into manageable chunks and H. NETSTAT
uses TCP and UDP I. 127.0.0.1
___6. . Used to diagnose DNS problems P J. Session Layer
___7. Public IP Address K. 255.255.255.255
___8. Identifies devices on the physical layer and uses L. Network layer
MAC addresses M. 192.25.1.256
___9. Used simply to return the name of the local N. Transport layer
computer O. 213.55.96.148
___10. Class A IP Address P. NSLOOKUP
___11.Manages connections between machines and Q. 213.55.96.148
Sockets R. PING
___12. Used to display information on the current state
of all the running IP processes on your computer
___13. Class B IP Address
___14.Moves packets between computers on different
networks and uses
___15. Uses ICMP packets to show if you can simply
reach a remote computer