Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Hardware and Network Servicing Level III Knowledge Test

1. A host computer has been correctly configured with static IP address, but the default gateway is
incorrectly assigned. Which layer of the OSI model will be first affected by this configuration
error?
A. Physical layer C. Network layer
B. Application layer D. Data link layer
2. Among the following one is the first step that you should do, when troubleshooting network
problem?
A. Analyze the results
B. Identify all potential problems
C. Systematically eliminate each potential problem
D. Define the specific symptoms
3. Which of the following command used to query internet domain name server?
A. Ping B. Nslookup C. Tracert D. Ip config
4. Which one of the following is the correct syntax to ping the reachable of network?
A. Ping \192.168.1.1 C. Ping 192.168.1.1
B. Ping: 192.168.1.1 D. 192.168.1.1 ping
5. Provide application and server resources, such as printers and storage, to multiple users as if
those applications and resources were installed on their own computers.
A. Terminal server C. Mail server
B. DHCP server D. Application server
6. Interpersonal Communication occurs only
A. An Individual converses with people they have no interest in knowing
B. An individual Interacts with another person as a unique individual
C. Three or more people communicating with each other at the same time
D. Intimate conversation takes place
7. Monitoring Evaluating and disseminating of information from the external and internal
Environment to keep people within the corporation is
A. Strategy formulation C. Evaluation and control
B. Environmental Scanning D. Strategy Implementation
8. A message is sent to a receiver in words or another symbol this communication process is
A. Thought C. Encoding
B. Decoding D. Idea
9. A user call, to report that cannot access network resource. You investigate and discover that the
IP address of the user’s computer is 169.254.0.6.You also discover that other clients on the same
subject are experiencing the same problem. You must provide network connectivity for the user,
what should you do?
A. Enabling Automatic Privacy IP Addressing
B. Disable automatic Private IP Addressing
C. Ensure the computer is enabled as a DHCP client
D. Ensure a DHCP Server or DHCP relay agent resides on the local subnet
10. The technique that is used to Identify both strength to build on and the deficiencies to overcomes
A. Observation C. Interview
B. Analysis D. Questionnaire
11. The best method of restore that latest copy of the registry in a windows 2003 server is to select
A. Emergency repair desk (ERD) C. Recovery console
B. Last known good configuration D. Ctrl+ alt+ delete keys
12. Involve the authorization of access to data in a network which is controlled by the network
administrator and the organization policies.
A. Group policy C. Domain local groups
B. Security group D. Network security
13. When data is encapsulated which is the correct order?
A. Data frame packet segment bit
B. Segment Data packet frame bit
C. Packet Data segment frame bit
D. Data segment packet frame bit
14. Among the following one is odd from the order?
A. Indexes C. Research reports
B. Patents D. Standards
15. While reviewing the security logs for your server. You notice that a user internet has attempted to
access your internal mail server. Although it appear the user’s attempts were unsuccessful. You
are still very concerned possibility that your system may be compromised. Which of the
solutions are you most likely to implement?
A. A firewall system at the connection point to the internal
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication
16. You are hired to investigate a slow performing network server for a client. Using the performance
monitor you obtain the following reading: cpu usage =25%, Desk time= 25% page faults= 25.
What one change will increase the performance of this network server the most?
A. Buy another CPU C. add another hard drive
B. increase RAM D. decrease RAM
17. XY Company has a large network with 100 user notices that at specific times in the morning and
afternoon network jamming ties up their computers. What is the most likely cause?
A. A terminator is not grounded
B. Power fluctuations
C. Many users are logging on or off
D. The switch connection the network goes down
18. Using the TCP/IP protocol if the destination of the packet is outside the subnet then the packet is
sent to the____?
A. switch C. Default gateway
B. Bridge D. Hub
19. The advantage of a client/server network over a peer to peer network is
A. performance is better on a peer to peer
B. Easier to backup file than a peer to peer network
C. Easy to configure the client /server
D. security is better on a peer to peer
20. You want to install the new window XP operating system on your computer that you need the
drive have two partition. On which step the partitions create?
A. Create the partition after the windows installed
B. Create the partition after the one partitions has been finished
C. Create the partition during the starting installation
D. Create the partition after the installation was completed
21. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to
the switch running 10Mbps half-duplex as well. How much bandwidth does each host to the
server?
A. 100 Kbps C. 1 Mbps
B. 10 Mbps D. 2 Mbps

Column a Column b
1. Allows the user to pick up the message and download it in to his A. Topology
own inbox. B. Session layer
2. A computer designed to process requests and delivery data to other C. Application layer
computer over a local network or the internet. D. Rj-11
3. Allows two applications on different computers to open use and a E. Server
clause connection. F. Netstat
4. Used to connect telephone. G. Rj-45
5. A method of shared problem solving in which all Members of a H. Brainstorming
group spontaneously contribute Idea. I. Active directory
6. The language than the computer system use to J. Protocol
7. Wireless network operate by using light beam to carry the data K. Infrared
between devices. L. Benchmark
8. The process of measuring the performance of the performance of M. Technical documentation
one’s company against the best in the same or another industry. N. Radio
9. Full duplex O. Telephone
10. Describes handing functionally and architecture of a technical P. Bandwidth
product. Q. Nic
11. Prepares data for transmission b/n workstation. R. Authorization
12. Parameter used in a network to determine data transfer rate S. POP3
13. Used are permitted to access and use the server
14. Provides directory services to client in the Network.
15. A command line tool display network connection.

You might also like