The document contains a series of questions related to computer networking concepts. Some key points:
- Questions cover topics like the OSI model layers, IP addressing, network topologies, and common network devices/protocols.
- Multiple choice answers are provided for each question to test understanding of networking fundamentals.
- Correct answers are indicated for some questions, useful for self-assessment of networking knowledge.
The document contains a series of questions related to computer networking concepts. Some key points:
- Questions cover topics like the OSI model layers, IP addressing, network topologies, and common network devices/protocols.
- Multiple choice answers are provided for each question to test understanding of networking fundamentals.
- Correct answers are indicated for some questions, useful for self-assessment of networking knowledge.
The document contains a series of questions related to computer networking concepts. Some key points:
- Questions cover topics like the OSI model layers, IP addressing, network topologies, and common network devices/protocols.
- Multiple choice answers are provided for each question to test understanding of networking fundamentals.
- Correct answers are indicated for some questions, useful for self-assessment of networking knowledge.
• 1.which one of the following is connection oriented and reliable
• • (A/) TCP c/udp • B/ HTTP d/FTP • • 2. which layers of Osi model are host to host layers? • • A/transport B/ session • C/presentation d/application E/all • • 3.how many layers are osi reference model has? • • A/ 7. B/ 6 • C/5. D/4 • • 4. What is the size of ipv4 address? • • A 32 bit. B 24 bit • C. 34 bit. D 48 bit • • 5. World wide web (www) was created by :- • A/ Charles Babbage • B/linus torvalds • C/dennis retchie • D/Tim Berbers Lee • • 6. The first computer were programmed by:- • A. Machine language • B. Assembly language • C. Source code • D. Object code • 7. DSL is an example of a(an)________connection? A Broadband. C Network B Wireless. D Slow 8. BIOS is responsible for A. Handling the particular of input or output operations B. Output operations C. Input operations D. All of the above • Column A • • [L]1. Expansion card • • [N]2. Cable • • [D] 3. Readability • • [A]4. Cache memory • • [O]5. Information • • [J]6. Operational procedures • • [C]7. Questionnaires • • [G]8. Knowledge • • [Q]9. Developer • Column B • • A. L1 and L2 • • B. Physical arrangement of network • • C. Survey • • D. Such as formatting and printing • • E. Workgroup • • F. Motherboard • • G. Understanding of doing something • • H. Memory • • I. Peer to peer, client- server • • J. Written instruction • • K. Transport • • L. PCI, ISA, AGP • • M. Clarity • • N. Fiber, unshielded Twisted Pair • • O. Information is entered and store in PC • • P. Power supply • • Q. Writer • • R. . • • S. Router_x0000_ • 9.Which topology the workstation goes down, it does not a ffect the entire network? • • A. Star • • B. Bus • • C. Ring • • D. Straight line_x0000_ • One of your printers is not working properly and you want to pre vent users from sending print jobs to the logical • • printer servicing that device. What should you do? • • A. Remove the printer from active directory • • B. Stop sharing the printer • • C. Rename the share • • D. Change the printer post • • Answer: B • 37. While reviewing the security logs for your server, you notice that a user on the in ternet has attempted to access • • your internal mail server. Although it appears that the user’s attempts were unsucce ssful you are still very • • concerned about the possibility that your systems may be compromised. Which of th e following solutions are you • • most likely to implement? • • A. A firewall system all the connection point to the internet • • B. A more secure password policy • • C. File-level encryption • • D. Kerberos authentication • • Answer: C • • 38. One of the following is not an example of network res ource. • • A. Printer and other peripherals • • B. Files and applications • • C. Disk storage • • D. Hub • • Answer: D • • 39. A user can determine the network settings on the client’s networ k interface cards as well as any that a DHCP • • server has leased to your computer by typing the following comman d at a command prompt. • • A. Ping • • B. IP • • C. Ipconfig/all • • D. Connect • • Answer: C_x0000_ • If you choose to stop sharing the printer, users will no longer be able to use the print device. • • 36. What type of profile will be most useful to maintain a locked-do wn desktop common to all sales representatives? • • A. Local profile • • B. The all users profile • • C. Preconfigured roaming group profile • • D. Local mandatory profile • • Answer: C • • • You want to ensure the highest level of security for your corporate intranet without the inf rastructure of certificate • • services. The goal is to provide Authentication that is transparent to users and to allow sec uring intranet recourses • • with the group accounts existing in active directory. All users are within the corporate fire wall. What • • Authentication method should you choose? • • A. Basic Authentication • • B. Digest Authentication • • C. Anonymous Access • • D. Integrated windows Authentication • • Answer: D • • 42. Which one of the following is used only with domain contro llers and enables you to restore directory services? • • A. Directory services restore mode • • B. Last Known good configuration • • C. Debugging mode • • D. Safe mode • • Answer: A • • 41. Which class the IP addressing provides 24 bits of network addr essing and 8 bits of host addressing by default. The • • most secure and strong password from the following list is: • • A. Class A • • B. Class B • • C. Class C • • D. Class D • • Answer: C • 43. You have just resolved a very complex network problem. During the process you made some configuration • • changes on the network. The changes were successful and your client is now very ha ppy with your performance. • • What should be your next step? • • A. Eliminate possibilities. • • B. Enable Auditing on all networks to prevent problems in the feature. • • C. Gather information. • • D. Document your work. • • Answer: D • 43. You have just resolved a very complex network problem. During the pro cess you made some configuration • • changes on the network. The changes were successful and your client is no w very happy with your performance. • • What should be your next step? • • A. Eliminate possibilities. • • B. Enable Auditing on all networks to prevent problems in the feature. • • C. Gather information. • • D. Document your work. • • Answer: D • 44. Data for your corporate intranet is currently stored on the D: drive of your IIS ser ver. It is decided HR department • • will serve information about the company benefit and policies from its server and th at the URL to access the HR • • information should be http://intranetcontoso.com.hr. what do you need to configure ? • • A. A new ftp site • • B. Virtual directory • • C. A new website • • D. Virtual directory from file • • Answer: D • 45. What is the default subnet mask for class C network? • • A. 255.0.0.0 • • B. 127.0.0.1 • • C. 255. 255.0.0 • • D. 255. 255. 255.0 • • Answer: D • • 46. You are troubleshooting a network using STP twisted pair and suspect that the maximum length has been • • exceeded. What is the maximum length of STP twisted pair? • • A. 25 meters • • B. 1000 meters • • C. 10000 meters • • D. 100 meters • • Answer: D_x0000_ • 45. What is the default subnet mask for class C network? • • A. 255.0.0.0 • • B. 127.0.0.1 • • C. 255. 255.0.0 • • D. 255. 255. 255.0 • • Answer: D • • 46. You are troubleshooting a network using STP twisted pair an d suspect that the maximum length has been • • exceeded. What is the maximum length of STP twisted pair? • • A. 25 meters • • B. 1000 meters • • C. 10000 meters • • D. 100 meters • • Answer: D_x0000_ You would like to test the restore procedures on your server, but would also like to avoid affecting the production copies of the backed-up data. What is the best restore location to use? A. Original location B. Alternate location C. Single folder Answer: B_x0000_ • As a computer technician which one of the following is the ma jor problem of monitor? • • A. Black screen and no power light • • B. Slow down operation • • C. No beep sound • • D. Error code starts with one • • Answer: A • _x0000_ • Major problem of monitor: • • Screen, Icon or Font Size Too Small or Too Big • • Blank Screen or No Video • • Distorted Image or Video, Flickering, Fuzzy, Blurry, or Color Problems • • Brightness, Contrast, Horizontal Lines, Vertical Lines or Geometrical problems • • Bright or Dead Pixel • • 95. What tool is used to enable remote desktop on a server? • • A. Terminal services manager • • B. Terminal services licensing • • C. System properties in control panel • • D. Terminal services configuration • • Answer: C • • • 96. Sequencing, acknowledgements and flow control are characteristic of which OSI layer? • • A. Layer 6 • • B. Layer 3 • • C. Layer 4 • • D. Layer 1