Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

Coc level II

I HNS EXAM
Coc exam preparation question

• 1.which one of the following is connection oriented and reliable



• (A/) TCP c/udp
• B/ HTTP d/FTP

• 2. which layers of Osi model are host to host layers?

• A/transport B/ session
• C/presentation d/application E/all

• 3.how many layers are osi reference model has?

• A/ 7. B/ 6
• C/5. D/4

• 4. What is the size of ipv4 address?

• A 32 bit. B 24 bit
• C. 34 bit. D 48 bit

• 5. World wide web (www) was created by :-
• A/ Charles Babbage
• B/linus torvalds
• C/dennis retchie
• D/Tim Berbers Lee

• 6. The first computer were programmed by:-
• A. Machine language
• B. Assembly language
• C. Source code
• D. Object code

7. DSL is an example of a(an)________connection?
A Broadband. C Network
B Wireless. D Slow
8. BIOS is responsible for
A. Handling the particular of input or output
operations
B. Output operations
C. Input operations
D. All of the above
• Column A

• [L]1. Expansion card

• [N]2. Cable

• [D] 3. Readability

• [A]4. Cache memory

• [O]5. Information

• [J]6. Operational procedures

• [C]7. Questionnaires

• [G]8. Knowledge

• [Q]9. Developer
• Column B

• A. L1 and L2

• B. Physical arrangement of network

• C. Survey

• D. Such as formatting and printing

• E. Workgroup

• F. Motherboard

• G. Understanding of doing something

• H. Memory

• I. Peer to peer, client- server

• J. Written instruction

• K. Transport

• L. PCI, ISA, AGP

• M. Clarity

• N. Fiber, unshielded Twisted Pair

• O. Information is entered and store in PC

• P. Power supply

• Q. Writer

• R. .

• S. Router_x0000_
• 9.Which topology the workstation goes down, it does not a
ffect the entire network?

• A. Star

• B. Bus

• C. Ring

• D. Straight line_x0000_
• One of your printers is not working properly and you want to pre
vent users from sending print jobs to the logical

• printer servicing that device. What should you do?

• A. Remove the printer from active directory

• B. Stop sharing the printer

• C. Rename the share

• D. Change the printer post

• Answer: B
• 37. While reviewing the security logs for your server, you notice that a user on the in
ternet has attempted to access

• your internal mail server. Although it appears that the user’s attempts were unsucce
ssful you are still very

• concerned about the possibility that your systems may be compromised. Which of th
e following solutions are you

• most likely to implement?

• A. A firewall system all the connection point to the internet

• B. A more secure password policy

• C. File-level encryption

• D. Kerberos authentication

• Answer: C

• 38. One of the following is not an example of network res
ource.

• A. Printer and other peripherals

• B. Files and applications

• C. Disk storage

• D. Hub

• Answer: D

• 39. A user can determine the network settings on the client’s networ
k interface cards as well as any that a DHCP

• server has leased to your computer by typing the following comman
d at a command prompt.

• A. Ping

• B. IP

• C. Ipconfig/all

• D. Connect

• Answer: C_x0000_
• If you choose to stop sharing the printer, users will no longer be able
to use the print device.

• 36. What type of profile will be most useful to maintain a locked-do
wn desktop common to all sales representatives?

• A. Local profile

• B. The all users profile

• C. Preconfigured roaming group profile

• D. Local mandatory profile

• Answer: C


• You want to ensure the highest level of security for your corporate intranet without the inf
rastructure of certificate

• services. The goal is to provide Authentication that is transparent to users and to allow sec
uring intranet recourses

• with the group accounts existing in active directory. All users are within the corporate fire
wall. What

• Authentication method should you choose?

• A. Basic Authentication

• B. Digest Authentication

• C. Anonymous Access

• D. Integrated windows Authentication

• Answer: D

• 42. Which one of the following is used only with domain contro
llers and enables you to restore directory services?

• A. Directory services restore mode

• B. Last Known good configuration

• C. Debugging mode

• D. Safe mode

• Answer: A

• 41. Which class the IP addressing provides 24 bits of network addr
essing and 8 bits of host addressing by default. The

• most secure and strong password from the following list is:

• A. Class A

• B. Class B

• C. Class C

• D. Class D

• Answer: C
• 43. You have just resolved a very complex network problem. During the process you
made some configuration

• changes on the network. The changes were successful and your client is now very ha
ppy with your performance.

• What should be your next step?

• A. Eliminate possibilities.

• B. Enable Auditing on all networks to prevent problems in the feature.

• C. Gather information.

• D. Document your work.

• Answer: D
• 43. You have just resolved a very complex network problem. During the pro
cess you made some configuration

• changes on the network. The changes were successful and your client is no
w very happy with your performance.

• What should be your next step?

• A. Eliminate possibilities.

• B. Enable Auditing on all networks to prevent problems in the feature.

• C. Gather information.

• D. Document your work.

• Answer: D
• 44. Data for your corporate intranet is currently stored on the D: drive of your IIS ser
ver. It is decided HR department

• will serve information about the company benefit and policies from its server and th
at the URL to access the HR

• information should be http://intranetcontoso.com.hr. what do you need to configure
?

• A. A new ftp site

• B. Virtual directory

• C. A new website

• D. Virtual directory from file

• Answer: D
• 45. What is the default subnet mask for class C network?

• A. 255.0.0.0

• B. 127.0.0.1

• C. 255. 255.0.0

• D. 255. 255. 255.0

• Answer: D

• 46. You are troubleshooting a network using STP twisted pair and suspect that the maximum length has been

• exceeded. What is the maximum length of STP twisted pair?

• A. 25 meters

• B. 1000 meters

• C. 10000 meters

• D. 100 meters

• Answer: D_x0000_
• 45. What is the default subnet mask for class C network?

• A. 255.0.0.0

• B. 127.0.0.1

• C. 255. 255.0.0

• D. 255. 255. 255.0

• Answer: D

• 46. You are troubleshooting a network using STP twisted pair an
d suspect that the maximum length has been

• exceeded. What is the maximum length of STP twisted pair?

• A. 25 meters

• B. 1000 meters

• C. 10000 meters

• D. 100 meters

• Answer: D_x0000_
You would like to test the restore procedures on your server,
but would also like to avoid affecting the production
copies of the backed-up data. What is the best restore
location to use?
A. Original location
B. Alternate location
C. Single folder
Answer: B_x0000_
• As a computer technician which one of the following is the ma
jor problem of monitor?

• A. Black screen and no power light

• B. Slow down operation

• C. No beep sound

• D. Error code starts with one

• Answer: A
• _x0000_
• Major problem of monitor:

•  Screen, Icon or Font Size Too Small or Too Big

•  Blank Screen or No Video

•  Distorted Image or Video, Flickering, Fuzzy, Blurry, or Color Problems

•  Brightness, Contrast, Horizontal Lines, Vertical Lines or Geometrical problems

•  Bright or Dead Pixel

• 95. What tool is used to enable remote desktop on a server?

• A. Terminal services manager

• B. Terminal services licensing

• C. System properties in control panel

• D. Terminal services configuration

• Answer: C


• 96. Sequencing, acknowledgements and flow control
are characteristic of which OSI layer?

• A. Layer 6

• B. Layer 3

• C. Layer 4

• D. Layer 1

• Answer c
•Good luc
k!!!!!!!!

You might also like