Hardware and Network Servicing Level - IV: A. Innovative
Hardware and Network Servicing Level - IV: A. Innovative
1. Small business owners develop and use operating procedures so tasks are performed in a(n)---way
A. Innovative
B. Imprecise
C. Standard
D. Diverse
2. Your company has one main office and four branch offices. The main office contains a standard
primary DNS zone named adatum.com Each branch office contains a copy of the adatuma.com
zone. When records are added to the adatuma.com zone, you discover that it takes up to one hour
before that changes replicate to each zone in the branch office you need to minimize the amount of
time it takes for the records to be in the branch office .what should you do?
A. On the DNS servers in the branch office , configure the zone Aging /scavenging properties
B. On the DNS server in the main office , configure the zone Aging/scavenging properties
C. On the DNS servers in the branch offices ,configure the Notify settings
D. On the DNS server in the main office , configure the Notify settings
3. Which of the following protocol used port 443 and 80 respectively
A. DHTML
B. XHTML
C. HTTP and HTTPS
D. HTTPS and HTTP
4. Network layer firewall has two sub categories as
A. Frame firewall and packets firewall
B. None of the mentioned
C. State full and stateless firewall
D. Bit oriented firewall and byte oriented firewall
5. The most frequently used framework for obtaining continuous improvement is ------
A. The plan—do—check-act cycle
B. The quality circle
C. The cause and effect process
D. Quality function deployment
6. You have a domain controller that runs windows server 2008 R2 and is configured as aDNS
server. you need to record all in bound DNS queries to configure in the DNS manager console?
A. Enable automatic testing for recursive queries.
B. Enable automatic testing for simple queries.
C. Enable debugs logging
D. Configure event logging to log errors and warnings.
7. Which of the following elements is required to do after successfully installation on DNS?
A. WINDOWES 2000 clients configuration
B. Static IP address configuration
C. Dynamic IP address configuration
D. Active directory configuration
8. A new corporation needs data network that must meet certain requirement. The network must
provide a low cost connection to sales people dispersed over large geographical area. Which type
of WAN infrastructure would meets the requirements
A. Private infrastructure
B. Dedicated
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
C. Public infrastructure
D. Satellite
9. What do business employees often need to do before they are able to write proposals ?
A. Contact the customer
B. Evaluate technical skills
C. Analyze personal skills
D. Research the problem
10. The file transfer protocol built on ------------------
A. Service oriented architecture
B. Client server architecture
C. Data centric architecture
D. File centered architecture
11. HTTP client requests by establishing a---------------connection to a particular port on the server
A. File transfer protocol
B. User datagram protocol
C. Transmission control protocol
D. Broader gateway protocol
12. In which layer of the hierarchical enterprise LAN design model would POE(power over Ethernet)
for VOIP phones be considered ?
A. physical
B. core
C. Distribution
D. Access
13. Access point exists in--------------
A. Transport layer
B. Application layer
C. Network layer
D. Data link layer
14. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN
A. CSMA/CA
B. CDMA
C. EVDO
D. ALOHA
15. Which device performs the function of determining the path that messages should take through
internetworks ?
A. A firewall
B. Router
C. A DSL modem
D. A web server
16. Which protocol is used by the traceroute command to send and receive echo-requests and echo-
replies?
A. SNMP
B. Telnet
C. TCP
D. ICMP
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
17. Enabling additional users to handle administrative tasks for a particular objects is referred to as:
A. Assignment
B. Targeting
C. Delegation
D. Redirection
18. A leadership style in which the leader includes one or more employees in the decision making
process is?
A. Authoritarian or autocratic
B. Federalist
C. Participative or democratic
D. Delegate or free reign
19. Local GPO settings are stored in what folder on a computer?
A. %systemroot%/system/Group policy
B. %systemroot%/system32/Drivers/Etc/Group policy
C. %systemroot%/system32/Drivers/Group policy
D. %systemroot%/system32/Group policy
20. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to
fetch the mails?
A. S/MIME
D. POP3
B. SMTP
C. HTTP
21. Refer to the exhibit bellow. As an administrator pings the default gateway at 10.10.10.1 and
output as shown. At which OSI layer is the problem?
C:\> Ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data
Request time out.
Request time out.
Request time out.
Request time out.
Ping statistics for 10.10.10.1:
Packets sent-4, received=0,lost-4(100%loss)
A. Session layer
B. Application layer
C. Data link layer
D. Network layer
22. Which of the following statement about a wireless LAN controller is true?
A. They rely on external firewalls for WLAN security
B. They can simplify the management and deployment of wireless LANS
C. They must be configured through a GUI over HTTP or HTTPS
D. They are best suited to smaller wireless networks
23. Users are complaining that they are unable to browse certain websites on the internet. An
administrator can successfully ping a web server via its IP address, but cannot browse to the
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
domain name of the website. which troubleshooting tool would be most useful in determining
where the problem is?
A. Netstat
B. Tracert
C. Nslookup
D. Ipconfig
24. Of the following is a principle of the total quality management?
A. Continuous productivity improvement
B. Continuous value enhancement
C. Continuous process improvement
D. Continuous defect elimination
25. A network administrator is implementing a policy that requires strong, complex passwords.
Which data protection goal does this policy support ?
A. Data integrity
B. Data quality
C. Data redundancy
D. Data confidentiality
26. A network administrator is verifying the configuration of a newly installation establishing a FTP
connection to a remote server, what is the highest protocol stack that the network administrator is
using for this operation?
A. Application
B. Session
C. Transport
D. Presentation
27. You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default getaway, and DNS information. Which protocol will use to accomplish this?
A. SMTP
B. DHCP
C. ARP
D. SNMP
28. How many host addresses are available on the network 172.16.128.0 with a subnet mask of
255.255.252.0?
A. Cut-through
B. Fast-forward
C. Fragment-free
D. Store-and-forward
29. You are an enterprise administrator for IIHT consists of a single active directory forest called
IIHT.com. the IIHT.com forest contains six domains under it. ALL DNS servers in the forest run
windows server 2008. Which of the following actions would you choose to ensure that all public
DNS queries are channeled through a single –caching – only DNS server?
A. Configure a global names host record for the hostname of the caching DNS.
B. Configure the root hints.
C. Enable BIND secondary’s on a DNS server.
D. Record for the hostname of the caching DNS server.
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
30. Which connectivity method would be best for a corporate employee who works from home two
days a week, but needs secure access to internet corporate databases?
A. WiMAX
B. Cable
C. DSL
D. VPN
31. Which of the following servers services use TCP----------------------------------
1. DHCP
2. SMTP
3. HTTP
4. TFTP
5. FTP
A. 1 and 2
B. 2,3 and 5
C. 1,2 and 4
D. 1,3 and 4
32. What is the access point (AP) in a wireless LAN?
A. All the nodes in the network
B. A wired devices that connect the wired network with a node
C. Wireless devices itself
D. Device that allows wireless devices to connect to a wired network
33. Which of the following is best describe virtual memory?
A. The use of hard disk space as an extension of RAM when physical memory runs
out
B. A memory which used to hold data in permanent bases
C. A segment of memory that has been reserved for use by the CPU
D. An extremely fast of memory
34. The time required to examine the packets header and determine where to direct the packets is
part of
A. POP UP delay
B . Transmission delay
B. Queuing delay
C. Processing delay
35. ---------------------- is the process that helps managers understand the nature of the industry, the
way firms behave competitively within the industry , and how competition is generally undertaken
A. Portfolio analysis
B. Market needs analysis
C. Strategic market analysis
D. Organizational analysis
36. The scheduled activities are based on a preset schedule that is established regardless of need V2
repetition q3
A. Predictive maintenance
B. Interval based maintenance
C. Rehabilitation maintenance
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
D. Reliability-centered maintenance
37. ------------------is the signal sent from a TV station to your TV
A. Full duplex
B. Simplex
C. Multiplex
D. Half duplex
38. A back up types , which includes only those files that have been modified since the last backup and
clears the archive bit of the files it copies to the backup medium
A. Daily backup
B. Full backup
C. Incremental backup
D. Copy backup
39. What is the advantage of using SSH over Telnet?
A. SSH operates faster than Telnet
B. SSH supports authentication for a connection request
C. SSH is easier to use
D. SSH provides secure communications to access hosts
40. The network design for a college with users at five sites is being developed where in the campus
network architecture would servers used by all users be located
A. Access-distribution
B. Enterprise edge
C. Data center
D. Services
41. Which class of a network is used for experimental testing?
A. Class D
B. Class B
C. Class A
D. Class E
42. A protocol which deals with resolving domain names is---------------
A. SMTP
B. POP3
C. DHCP
D. DNS
43. One of the following can explain mentoring
A. Daily weekly and monthly transaction and reports
B. Departmental budgets development
C. Sales performance development
D. Professional and personal development
44. Microsoft windows server 2008 uses the windows installer with group policy to install and manage
software that is packaged into what type of file
A. In
B. Mse
C. Msi
D. Exe
45. Which one of the following is the quality of employee’s work ethics?
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
A. Unconsciousness
B. Aggressiveness
C. Analytical skills
D. Maliciousness
46. The DOD model (also called the TCP/IP stack) has four layers which layer of the DOD model is
equivalent to the network layer of the OSI model?
A. Host –to-host
B. Internet
C. Network access
D. Application
47. One source sending a packet to multiple destinations-----------------------------------
A. Domain server
B. Broadcasting
C. Unicasting
D. Multicasting
48. What is wired equivalent privacy (WEP)?
A. Security algorithm for wireless networks
B. Security algorithm for flash drive communication
C. Security algorithm for Ethernet
D. Security algorithm for usb communication
49. Which statements are true regarding ICMP packets?
A. ICMP guarantees , datagram delivery
B. ICMP is encapsulated within UDP datagram
C. ICMP is unencapsulated within IP datagram
D. ICMP can provide hosts with information about network problems
50. When a manager monitors the work performance of workers in his department to determine if
the quality of their work is up to standard this managers is engaging in which function
A. Controlling
B. Planning
C. Leading
D. Organizing
51. Your network consists of an active directory forest that contains one domain named contoso.com
all domain controllers run windows server 2008 and are configured as DNS servers . you have two
active directory integrated zones. Contoso.com and nwtraders.com you need to ensure user is able
to modify records in the contoso.com zone. You must prevent the user from modifying the SOA
record in the nwtraders.com zone. What should you do?
A. From the DNS manager console, modify the permissions of the nwtraders.com zone
B. From active directory users and computers console, modify the permissions of the
domain controllers organizational unit (OU)
C. From the DNS managers console, modify the permissions of the contoso.com
zone
D. From the active directory users and computers console, run the delegation of control
wizard
52. It allows a visited website to store its own information about a user on the user’s computer—
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
A. Cookies
B. Spam
C. Malware
D. Adware
53. A corporate network includes an active directory domain services (AD DS) forest that contains
two domains. All servers run windows server2008 R2. All domains controller are configured as
DNS server. Standard primary zone for.contoso.com its stored on a member server .you need to
ensure that all domains controllers can resolve names from the dev.contoso.com zone what should
You do?
A. On one domain controller, create a stub zone. Configured the stub zone to replicate to
all DNS servers in the forest.
B. On the member server, create a secondary zone.
C. On one domain controller, create a conditional forwarder configure to replicate to all
DNS servers in the domain.
D. On one domain controller, create a stub zone configured the stun zone to replicate to all
DNS servers in the domain.
54. Which statements are true regarding ICMP packets?
1. They acknowledge receipt of a TCP segment
2. They guarantee datagram delivery
3. They can provide hosts with information about network problems
4. They can encapsulated within IP datagram
A. 2 and 1
B. 3 and 4
C. 1 only
D. 2,3 and 4
55. A new corporation needs a data network that must meet certain requirements. The network must
provide a low cost connection to sales people dispersed over a large geographical area. Which type
of WAN infrastructure would meet the requirements?
A. Public infrastructure
B. Private infrastructure
C. Dedicated
D. Satellite
56. Which of the following statement about a group is true?
A. You need five or more people to be considered a work group
B. The definition of groups suggest that a group is two or more people together for any
reason
C. Formal groups are aimed at specific social agendas
D. Groups should be formal
57. DHCP uses UDP port number -------------------- for sending data to the server
A. 67
B. 68
C. 66
D. 69
58. What process involves placing one PDU inside of another PDU?
A. Encapsulation
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
B. Encoding
C. Segmentation
D. Flow control
59. You work as a senor office 365 administrator a ABC.com. the ABC.com network consists of a
single domain named ABC.com you are running a training exercise for junior administrator you
are currently discussing office 365 admin role. Which of the following roles have extended roles in
Microsoft exchange online?
A. The bailing admin role
B. The user management admin role
C. The service admin role
D. The password admin role
60. Which area of the network would a college IT staff most likely have to redesign as a direct result
of many students bringing their own tablets and smart phones to school to access school
resources?
A. Extranet
B. Intranet
C. Wireless LAN
D. Wired LAN
61. Router access switches, hub and word processing operate at -------, ---------, --------- and --------
layer respectively?
A. 3,3,1,7
B. 3,2,1,7
C. 3,3,2 none
62. The willingness to exert high levels of effort to reach organizational goals based on the efforts
ability to satisfy some individual need is ----------------------
A. Motivation
B. Leadership
C. Need configuration
D. Effort management
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
C. Parent
D. Prerequisites
66. What are the characteristics of a scalable network?
A. Suitable for modular devices that allow for expansion
B. Grows in size with the impacting of existing users
C. Easily overloaded with increased traffic
D. Offers limited number of application
67. To back up active directory you must install what feature from the server manager console?
A. Windows server backup
B. Active directory backup client
C. Windows backup utility
D. Backup exec 1
68. What is the function of a router?
A. It manages the VLAN database
B. It connects multiple IP networks
C. It controls the flow of data via the use of layer 2 addresses
D. It increases the size of the broadcast domain
69. In wireless distribution system
A. Multiple access point are inter-connected with each other
B. There is no access point
C. Only one access point exists
D. Only one wired access point
70. The bit length for IPV6 address ----------------
A. 32 bits
B. 128 bites
C. 192 bites
D. 64 bites
71. You are an enterprise administrator for IIHT the corporate network of IIHT consists of a DHCP
server that runs windows server 2008 which of the following options choose to reduce the size of
the DHCP database?
A. Enable the compress contents to save disk space attribute of the dhcp.mdb file, from the
properties of dhcp.mdb file.
B. Reconcile the database from the DHCP snap-in.
C. Run jetpack exe dhcp.mdb temp.mdb from the folder that contains the DHCP.
D. Enable the file is ready for archiving attribute of the dhcp.mdb file, from the properties of
dhcp.mdb file.
72. Your network contains an active directory domain named contoso.com. the domain contains a
domain controller named DC1. You have a member server named server 1. Both DC1 and server
1 have the DNS server role installed on DC1, you create an active directory integrated zone named
adatum.com. you need to ensure that server 1 receives a copy of the zone.
A. Create secondary one on server 1
B. Modify the zone type of adatum.com
C. Modify the zone transfers settings of adatum.com
D. Add server 1 to the DNS update proxy group
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)
Hardware and Network Servicing Level - IV
Instructor: Olifen Bokona Teferi Phone: +251921242218 Email: [email protected]
I Can Say! Please Try! Up to Success Day!!! Monday, June 14, 2021 Pr. Olifen Bokona Teferi (Habte)