0% found this document useful (0 votes)
258 views

Used To Manage and Monitor The Network

This document provides tutorials on TCP/IP protocols, OSI layers, DNS configuration, and common IP/networking commands. It discusses key protocols like IP, TCP, UDP, FTP, HTTP, and SNMP. It describes the 7 layers of the OSI model and their functions. It also covers DNS zone types, standard primary and secondary zones. Finally, it lists common networking commands like ipconfig, ping, tracert, netstat, and arp that can be used for network configuration, troubleshooting, and diagnosis.

Uploaded by

Fikru Tesefaye
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
258 views

Used To Manage and Monitor The Network

This document provides tutorials on TCP/IP protocols, OSI layers, DNS configuration, and common IP/networking commands. It discusses key protocols like IP, TCP, UDP, FTP, HTTP, and SNMP. It describes the 7 layers of the OSI model and their functions. It also covers DNS zone types, standard primary and secondary zones. Finally, it lists common networking commands like ipconfig, ping, tracert, netstat, and arp that can be used for network configuration, troubleshooting, and diagnosis.

Uploaded by

Fikru Tesefaye
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Techno Star College: Hardware and Networking Servicing Level 3-4 Tutorials

I. TCP/IP protocols Summary


1. IP - a connectionless protocol used to move data around a network at Network Layer 3.
2. TCP-Connection oriented protocol that offers flow control, sequencing and retransmission of
dropped packets at Transport Layer 3.
3. UDP-A Connectionless alternative to TCP used for applications that do not require the
functions offered by TCP at Transport Layer 4.
4. FTP- protocol for Uploads and downloads files to and from a remote host. Also
accommodates basic file-management task at Application Layer 7.
5. Trivial FTP(TFTP)- FTP that does not have the security or error-checking capability of FTP;
uses UDP as a transport protocol and is therefore connectionless
6. SFTP (Secure File Transfer Protocol) - Securely uploads and downloads files to and from a
remote host. Based on SSH security at Application Layer 7.
7. SMTP- mechanism for transporting E-mail across networks
8. HTTP-protocol for Retrieves files from a web server at Application layer 7.
9. HTTPS-A secure protocol for retrieving files from a web server at Application Layer 7.
10. POP3/IMAP- used for retrieving email from a server on which the email is stored
11. Telnet- Enables sessions to be open on a remote host at Application Layer 7.
 program that allows you to access and use other computers remotely
12. ICMP- used for error reporting, flow control and route testing
13. ARP-resolves IP address to MAC Address, to enable communication between devices
14. NTP (Network Time Protocol) - Communicates time synchronization information between
devices at Application Layer 7.
15. IGMP -Provides a Mechanism for systems within the same multicast group to register and
communicate with each other at network layer 3.
16. LDAP-Accesses and Queries directory services and Microsoft Active Directory at Application
Layer 7.
17. NNTP (Network News Transport Protocol) - Facilitates the access and downloading of
messages from newsgroup servers at application layer 7.
 TCP Port number: 119
18. RTP (Real Time Transport Protocol)-The internet -standard protocol for transporting real-time
data at Application Layer7.
19. SCP (secure Copy Protocol) -A. Enables files to be copied securely between two systems.
Uses SSH technology to provide encryption services at Application Layer 7.
20. SIP-An Application layer protocol designed to establish and maintain multimedia sessions
such as internet telephony calls at Application Layer 7
21. SNMP(Simple Network Management Protocol)used to manage and monitor the network
22. SSH - Enables secure sessions to be opened on a remote host at Application Layer 7.
23. LCP (Link Control Protocol) for establishment, configuration and testing of the link and
physical connection
 A protocol that provides dynamic addressing, authentication, and multilink

1
24. NCP (Network Control Protocols) to negotiate the different layer 3 protocols such as IP,
IPX and Apple Talk.
II. OSI Layer Summary
1. Application layer-where application reside.it is the end user interface to the operating
system(UNIX, LINUX, …)
 responsible for identifying communications partners
 The application Layer is where the user/applications access the network
2. Presentation layer –converts data from the application into a common interchangeable
format
 translate data from a format used by the application layer into a common format at the
sending station, then translate the common format to a format known to the application layer
at the receiving station
 Data encryption translates the data into another form or code
 The presentation layer provides:
Character code translation: for example, ASCII to EBCDIC.
Data conversion: bit order, integer-floating point, and so on.
Data compression: reduces the number of bits that need to be transmitted on the network.
Data encryption: encrypt data for security purposes. For example, password encryption.
3. Session layer- organizes and synchronizes the exchange of data between application
processes
 Timing and flow control layer
 It establishes, maintains, and terminates communications between applications located on
different devices
 This layer allows a process to add checkpoints which are considered as synchronization
points into the data
 The session layer determines which device will communicate first and the amount of data
that will be sent.
4. Transport layer- provides transfer of data from a source end system to a destination end open system
 ensures that messages are delivered error-free, in sequence, and with no losses or
duplication
 Provides for both reliable and unreliable delivery and error correction before retransmit.
 Provides reliable end-to-end message delivery with acknowledgments.
5. Network layer- provides physical routing of the data, determining the path between the
systems
 Provides logical addressing which device use for path destinations.
  The network layer protocols determine which route is suitable from source to destination
 Routing: routes frames among networks.
 Translates logical addresses, or names, into physical addresses.
 Router operates at this layer
6. Data link layer- Monitors the signal interfrence on the physical transmission media.
 provides the means to control the physical layer
 Establishes and terminates the logical link between two nodes.

2
 transmits/receives frames sequentially
 error detecting and checking frames and adding MAC addresses to its tables
 Combines bits into bytes and bytes into frames, provides access to media using MAC
addresses, and error detection.
 Bridge, switch and NIC operates at this layer
7. Physical layer–represents the media and electrical components required for the transmission of data
 Concerned with the transmission and reception of the unstructured raw bit stream over a
physical medium.
 It describes the electrical/optical, mechanical, and functional interfaces to the physical
medium, and carries the signals for all of the higher layers
 responsible for the actual physical connection between the devices
 The physical layer provides the synchronization of the bits by providing a clock
 Responsible to move bits between devices and specifies voltage, wire speed and pin-out
cables.
 Hub, repeaters, Modem, and Cables operates at this layer
III. DNS console and configuration
 UDP Port number: 53

 Forward lookup zone-resolve host names to IP addresses.

 Reverse lookup zone-allows a DNS server to discover the DNS name of the host.

 When selecting a DNS zone type, you have the following options: Active Directory (AD)
Integrated, Standard Primary, and Standard Secondary. AD Integrated stores the database
information in AD and allows for secure updates to the database file.

 Standard Primary zone-stores the database in a text file. This text file can be shared with
other DNS servers that store their information in a text file.
 Standard Secondary zone- creates a copy of the existing database from another DNS server.
This is primarily used for load balancing.
IV. IP/Networking Commands
1. arp –a It will show the IP address of your computer along with the IP address and MAC
address of your router.
2. Hostname It simply displays the name of your computer.
3. Ipconfigit displays information about the host computer TCP/IP configuration.
4. ipconfig /all it displays detailed configuration information about your TCP/IP connection
including Router, Gateway, DNS, DHCP, and type of Ethernet adapter in your system.
5. Ipconfig /renew  it will renew all your IP addresses that you are currently (leasing) borrowing
from the DHCP server.
6. Ipconifg /release it allows you to drop the IP lease from the DHCP server.
7. nbtstat –a it helps to solve problems with NetBIOS name resolution.
 NBTstat.exe- displays information about the NetBIOS over TCP/IP connections

3
8. NetdiagNetdiag is a network testing utility that performs a variety of network diagnostic tests,
allowing you to pinpoint problems in your network
9. NetstatNetstat displays a variety of statistics about computers active TCP/IP connections.
 Displays the current connectivity information such as port number and any connected
‘foreign’ IP address.
10. NslookupNslookup is used for diagnosing DNS problems.
 is a tool to determine whether DNS has been successfully configured.
11. Pathpingis unique to Window’s, and is basically a combination of thePing and Tracert commands.
 Pathping traces the route to the destination address thenlaunches a 25 second test of each
router along the way, gathering statistics on the rate ofdata loss along each hop.
12. ping: used to test network connectivity
 Tests the connection between two network nodes by sending packets to a host and then
reporting the time it takes to get a response
13. Route The route command displays the computers routing table.
14. Tracertit displays a list of all the routers that a packet has to gothrough to get from
thecomputer where tracert is run to any other computer on theinternet.
 used to trace routes throughout the network
 displays the route taken by the ICMP to a remote host.
 lists the number of hops needed to connect to a target computer
V. Operating system files installation Sequence:
1. NTLDR -Real mode to 32-bit memory model and then loads the drivers to read the file system
 the first file read when booting Windows 2000 or Windows XP?
 It reads the Registry files, chooses a hardware profile, and loads device drivers?
2. Boot.INI-location of other OS files
 contains the Boot Loader Operating System Selection menu and specifies the path to
find the boot partition
3. BOOTSEC.DOS-for multi-Boot systems when another OS id detected
 is used in a dual-boot configuration to keep a copy of the DOS-based operating system’s
boot sector so that the DOS-based operating system environment can be restored and
loaded as needed
4. NTDETECT-Hardware detection
 gets information about installed hardware
5. NTBOOTDD.SYS-is used for SCSI devices during bootup
6. HAL.DLL-provides and handles the interaction between software and hardware via the
Hardware Abstraction Layer and is necessary for the Windows NT-based operating system to
boot and function?
 hardware abstraction Layer for hardware independence
25. If you get the Kernel File Is Missing from the Disk error message, what is the cause of the
problem and how would you correct the problem? NTLDR.COM file is missing. To fix the
problem, copy the NTLDR.COM from a bootable floppy disk.
26. What generates a Non-System Disk or Disk Error? When the computer cannot find a boot
sector with the appropriate operating system files to boot from.

4
27. NTFS is the most secure and reliable file system used by Windows 2000 and Windows XP
and supports disk quotas, disk compression, and encryption?

General Hardware and Networking Servicing Tutorials

1. Research Scientific way of investigating problems


2. Simple Mail Transfer Protocol (SMTP)Used for transferring electronic mail messages from one
machine to another?
3. SMTP Server  supports the transfer of E-mail messages between E-mail systems
4. FTP uploading and downloading files to and from remote host
5. password  combination of text used for user authentication
6. post office protocol versionprotocol for receiving e-mail
7. eavesdroppingSecurity threats and secretly listen to a conversation
8. encryptionprocess of encoding a message or information
 plain text to cipher text
 converting readable data to unreadable data
9. TRACERT displays the route taken by the ICMP to a remote host
10. socket address  combination of an IP address and a port number
11. Denial of service attacks  network security threat
 form of attack that prevents users from accessing normal services, such as e-mail and web services
12. Attenuationis the degeneration of a signal over distance on a network cable
13. Nbtstatdiagnostic tool for troubleshoot NetBIOS name resolution problems
14. Router is a networking device that forwards data from one network to another
15. BNC/T- connector  used to connect coaxial cable
16. Search engine  is a software system that is designed to search for information on the World Wide
Web
17. Browse is an application program that provides a way to look at and interact with all the
information on the World Wide Web
18. HTTPprotocol for Retrieves files from a web server
19. RJ-45 connector  used to connect UTP cable
20. Ping Tests the connection between two network nodes by sending packets to a host and then
reporting the time it takes to get a response
 sending a message to remote computer
21. Data link layer  Identifies devices on the physical layer and MAC addresses are part of this layer
22. Network layer  Moves packets between computers on different networks and Routers operate at
this layer
23. transport layer-provide host-to-host(end to end) communication services for applications over a network
24. Presentation layer  reduce the number of bits that need to be transmitted on the network
 data translator for the network.

5
 Data Encryption, decryption, compression
25. Session layer is responsible for establishing, managing, and terminating communications between
two computers
 It organizes and synchronizes the exchange of data between application processes
26. Chkdskverifies the file system integrity of a volume and fixes logical file system errors
 checks for bad sectors on the disk and recovers any readable information
 use to check for disk errors
27. TCP/IP is a suite of communication protocols used to interconnect network devices on the internet.
 The most widely used protocol
28. IGMP establish multicast group memberships
29. UDP-Transport layer protocol which delivers unreliable service
 Connectionless alternative to TCP that is used for applications that do not require the
functions offered by TCP
30. CoachingImmediate improvement of performance and development of skills by a form of tutoring
or instruction
31. Memory-related problemAny number starting with 2.
32. System board problem any number starting with 1.
33. DNS  resolves word-based host name/domain name/internet name into IP Address
34. DNS serverDNS name resolution
 Maps and translates domain names used by clients on your network
 A server that runs DNS resolves computer names to IP addresses and vice versa
35. WINS Server provides a distributed database for registering and querying dynamic mappings of
NetBIOS names for computers and groups used on your network.
36. WINS maps NetBIOS names to IP addresses and solves the problems arising from NetBIOS name
resolution in routed environments
37. Web Server (IIS)supports HTTP, HTTPS, FTP, FTPS, SMTP and NNTP
 provides a reliable, manageable, and scalable web applications infrastructure
 The Web server allows NNTP, HTTP, FTP, WWW, SMTP and IRC services only.
 Provide information to users on the Internet.
 Let users download and upload content with FTP or World Wide Web Distributed
38. E-mail spoofing  the forgery of an email header so that the message appears to have originated
from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing
and spam campaigns because people are more likely to open an email when they think it has been sent
by a legitimate source.
39. Hackera person who uses computers to gain unauthorized access to data.
40. Nonverbal communication  is communication through sending and receiving wordless clues
  E.g: Facial expressions, gestures, eye contact, posture, and tone of voice—that speak the loudest
41. ICMP    is an error-reporting protocol network devices like routers use to generate error messages
to the source IP address when network problems prevent delivery of IP packets.
42. Mediation  a way of resolving disputes between two or more parties with concrete effects
43. ST,SC, FC,MT-RJ Fiber optic cable connector
44. DNS Server  Used to translate word-based addresses of systems to the numeric IP address of the computer

6
45. Snort The most widely deployed intrusion detection and prevention technology
46. Broadcast IP address 255.255.255.255
47. IPCONFIG  shows your computer’s IP address and other information
48. Class B IP Address 172.16.0.20
49. Class C IP Address  213.56.96.148
50. Class A IP address 10.10.10.10
51. Loopback Address  127.0.0.1
52. Bridge - A bridge is a device that connects and passes packets between two network segments that
use the same communications protocol. Bridges operate at the data link layer (layer 2) of the OSI
reference model. A bridge will filter, forward or flood an incoming frame based on the MAC address of that
frame
used to connect two similar network segments but keeps network traffic separate on the two segments
53. ntdetect.com responsible for detecting basic hardware that will be required to start the operating system
 ntdetect.com missingWindows boot files for detecting hardware are missing or damaged
54.  Overheating computers may lead to unexpected shutdowns, lost data, and hardware damage
 Computer is spontaneously rebooting and freezing.
 CPU problem Possible causes
55. Which one of the following not non – functional requirement
A. Quality B. business rule C. physical view D. performance
56. Which one is the first step that you should do, when troubleshooting network problem?

A. Analyze the results C. Systematically eliminate each potential problem


B. identify all potential problems D. Define specific symptoms

57. Which layer organizes and synchronizes the exchange of data between application processes
A. Transport layer B. physical layer C. session layer D. application layer
58. A tool in active directory that installs and removes active directory Domain Services and promotes
domain controllers

A. DCPromo C. Application server


B. Active directory Certificate Services D. Active Directory Domain Services

59. Which one is the function network device amplifies the signal it receives on one port before it
transmits it on other ports
A. Switch/hub B. bridge C. repeater D. router
60. Arrangements of computers in computer network by using one main cable to which all nodes are
directly connected the main cable acts as a backbone for the network and one of the computers in the
network typically acts as the computer server.
A. Hybrid topology B. Mesh topology C. bus topology D. star topology
61. Assume you were working a project on IT training need assessment. The best way of collecting
detailed information?
A. Questioner B. Interview C. Research D. Observation

7
62. When you try to turn the computer on, you notice that the computer won’t activate. The monitor is
blank and the fan on the power supply is not active. Turning the switch off and then back on makes no
difference. What is the most likely cause of this problem?
A. The BIOS on the motherboard needs to be upgraded
B. The computer is unplugged
C. The monitor is malfunctioning
D. Both the fan on the power supply and the video card are bad
63. One of the following contains information that did not make it in to the manual

A. Technical support CD- ROM C. technical support website


B. README files D. Telephone support

64. Let say you are a network administrator in your office. You have an interface on a router with the IP
address of 192.168.192.10/29.what is the broadcast address the hosts will use on this LAN?
A. 192.168.192.15 B. 192.168.192.63 C. 192.168.192.127 D. 192.168.192.31
65. The benefit of a switch over a hub is that
A. A switch rebroadcasts anything it receives on one port to all the others
B. The switch increases performance because it doesn’t suffer from the wasted bandwidth of the extra
transmissions
C. A hub makes a direct link between the transmitting device and receiving device
D. A hub rebroadcasts anything it receives on one port to all the others
66. Which one is not the benefit of DNS?
A. It allows WINS clients to register with the WINS server
B. It allows queries to other servers to resolve host names
C. It allows a distributed database that can be administered by a number of administrators
D. It allows host names that specify where a host is located
67. You have just created an active directory user on a windows 2003 domain controller. The security
requirements for this user specify that the user should not be able to log on to the computer between
12:01 and 4:00 AM because this is when your company runs automated backups for the computer. You
want to specify that the user account can log on only during specified hours. Which users properties
dialog box tab should you use to configure logon hours?
A. You can restrict logon hours for an active Directory user account
B. The profile tab
C. The General tab
D. The account tab
68. Class B IP Address
A. 213.55.96.148 B. 10.10.10.10 C. 127.0.0.1 D. 172.16.0.20 E. 255.255.255.255
69. You are network for a small company. Your company has one windows server 2003 computer
configured as a domain controller and 25 clients running windows XP professional. You want to ensure
that your server stays up to date through windows automatic update. Where should your server to use
windows automatic update?
A. Through the Group policy
B. Start control panel and click the automatic update tab
8
C. Start all programs accessories system tools windows update
D. Through the registry
70. Tests the connection between two network nodes by sending packets to a host and then reporting the
time it takes to get a response
A. Ipconfig B. Tracert C. Snort D. Ping
71. A network cable that works using strands of glass and pulses of light
A. Coaxial cable
B. fiber optic cable
C. Shielded twisted pair cable
D. Unshielded Twisted pair cable
72. ST, SC, FC Fiber optic cable connector
73. Stores information about users, computers, and other devices, on the network in the security boundary
known as domain.

A. Active directory certificate service C. Active directory lightweight directory


B. Active Directory federation service D. Active directory domain services

74. Which of the following is categorized as richest channel in conveying information effectively?
A. E-mail B. Telephone C. Face to face communication D. posted notice and bulletins
75. Broadcast IP Address
A. 213.55.96.148 B. 10.10.10.10 C. 127.0.0.1 D. 172.16.0.20 E. 255.255.255.255
76. You are the network administrator for a small company. Your network consists of one windows
server 2003 server, which is configured as a domain controller with 255 client computers. You want to
make license management as easy as possible. Which of the following should you use to configure
licensing?
A. Control panel License Manager
B. Administrative tools Licensing
C. Administrative tools License manager
D. Control panel Licensing
77. Which of the following is not limitations of DHCP?
A. As with manually configure TCP/IP, incorrect values configured for a DHCP scope can cause
unexpected
B. DHCP server does not communicate with other DHCP servers and cannot detect IP addresses
leased by other DHCP servers
C. DHCP servers can communicate with clients across routers
D. DHCP does not detect IP addresses already in use on a network by DHCP clients
78. If you want to do research about current status of student in private college. For any research
information is mandatory. For your research you prepare questioner. According to your research, which
one is not the benefit of questioner?
A. To verify information
B. To gain information
C. To check for understanding and level of interest
D. To find research team
9
79. With project planning, all are characteristics of project, except?
A. Information and control systems are not an issue
B. Point in time in which they must be accomplished (schedule)
C. Every project has a specific goal to reach
D. Labor, personnel, equipment, materials, facilities, etc. (resources)
80. Connectionless alternative to TCP that is used for applications that do not require the functions
offered by TCP
A. HTTP B. Telnet C. UDP D. FTP E. SMTP F. IP G. HTTPS
81. Reduce the number of bits that need to be transmitted on the network
A. Physical layer B. Network Layer C. Transport Layer D. Presentation layer
82. In a scenario where the file server is on an AppleTalk network and the device needing to access this
server are on a token ring network, which of these devices will connect the two networks.
A. Switch B. Hub C. Gateway D. Bridge
83. While configuring the windows 2008 server and when selecting a DNS zone type, you have the
following options:
A. Forward Zone (DNS), Standard Primary, and Standard Secondary. DNS Integrated stores the
database information in DNS and allows for secure updates to the database file
B.  Active Directory (AD) Integrated, Standard Primary, and Standard Secondary. AD Integrated
stores the database information in AD and allows for secure updates to the database file
C.  Domain Name Server (DNS) Integrated, Standard Primary, and Standard Secondary. DNS
Integrated stores the database information in DNS and allows for secure updates to the database file
D.  Active Directory (AD), Standard Primary, and Standard Secondary. AD Integrated stores the
database server in AD and allows for non-secure updates to the database file
84. Which class of IP address has the most host addresses available by default?
A. Class C B. class D C. class B D. class A
85. There are a couple of applications you are accessing on the network from your computer regularly.
For a few days now, you have not been able to access only one application from your computer. What
must you do?
A. Reboot the server
B. Reboot the workstation
C. Ask the user to access the problem application from another workstation
D. Check the user’s password
86. Which of the following cable types is most susceptible to cross talk?
A. optical fiber B. STP C. coaxial D. UTP
87. Which of the following are good password practices?
A. Keep password indefinitely
B. Use only alphanumeric symbols in passwords
C. Maintain minimum password length
D. Change password every 90 days
88. Which of the following is valid TCP/IP protocol?
A.SAP B. NTBEUI C. DNS D. DHCP
89. Which router command allows you to view the entire contents of all access lists?

10
Router# show access-lists
90. Which of the following TCP/IP protocols can assign a logical address to a host?
A. IP B. SMTP C. TCP D. UDP
91. Which of the following refers to any device that is logically addressed on an IP network?
A. Peer B. host C. client D. server
92. Which of the OSI model is responsible for establishing, managing, and terminating communication
between two computers?
A. Network layer B. application layer C. data link layer D. session layer
93. Which of the following procedures need to be implemented, before any network implementation?

A. Enable network logins C. Disable network logins


B. Implement network load balancing D. Determine needs and expectations

94. Identify the topology displayed in the exhibit

A. Mesh B. ring C. bus D. star


95. Exhibit Identify the topology displayed in the exhibit.

A. Bus B. Star C. Ring D. Mesh


96. Identify the picture displayed in the exhibit

A. LAN B. WAN C. Mesh Network D. X.25 Network


97. Your company is moving into a new building. All 1OBaseT jacks for the workstations have been
labeled and relevant patch panel to hub connections have been made too. You plug in a workstation to a
jack and, you do not get a link light on the NIC or the hub. You have tried to replace both patch cables
with known, good patch cables. It still does not work. What should you do next?
A. Hook a protocol analyzer to the hub
B. Reinstall the network interface card driver
C. Test the cable from wall jack to patch panel
D. Replace the workstation patch cable with a crossover cable
98. Functional requirements  user/stakeholder request → feature → use case → business rule
99. Backup strategy -is the best defense against data loss.

11
100. Blue Screen of Death - is an error screen displayed on a Windows computer system after a fatal
system error, also known as a system crash: when the operating system reaches a condition where it can
no longer operate safely?
 non-maskable interrupt cause the CPU to produce
 Windows cannot recover.
 Registry File Failure” or “Windows could not start.”
101. HTTPS - is the secure version of HTTP, the protocol over which data is sent between your browser
and the website that you are connected to.
 It means all communications between your browser and the website are encrypted.
102. 10Base2 cable- uses BNC and T-connectors to connect computers to the network
103. Network Time Protocol (NTP) -is a networking protocol for clock synchronization between
computer systems over packet-switched, variable-latency data networks.
104. Proxy Server Show only one IP address for multiple users on the subnet
105. DHCP Server-assigns IP addresses to client computers.
 automatically assign Internet Protocol (IP) addresses to clients on the network
 All IP addresses of all computers are stored in a database that resides on a server machine.
 Permit you to reserve an IP address for a client
106. scope -is a collection of IP addresses for computers on a subnet that use DHCP
107. Workgroup – is a collection of computers that have the same workgroup name
108. Domain – is a collection of computers defined by a network administrator
109. Application server -A server that provides XML Web services, Web applications, and distributed
applications
110. Domain controller -A server that provides directory services for the domain and has a directory
store. Domain controllers also manage the logon process and directory searches. This option installs
DNS and Active Directory.
111. File server -A server that serves and manages access to files. This option enables you to quickly
configure disk quotas and indexing. You can also install the Web-based file administration utility,
which installs IIS and enables Active Server Pages (ASP).
112. Mail server (POP3, SMTP) -A server that provides basic Post Office Protocol 3 (POP3) and Simple
Mail Transfer Protocol (SMTP) mail services so that POP3 mail clients can send and receive mail in
the domain. Once you install this service, you define a default domain for mail exchange and then
create and manage mailboxes. These basic services are best for small offices or remote locations where
e-mail exchange is needed but you don’t need the power and versatility of Microsoft Exchange Server.
113. Print server -A server that provides and manages access to network printers print queues, and
printer drivers. This option enables you to quickly configure printers and print drivers that the server
should provide.
114. Remote access/VPN server -A server that routes network traffic and manages dial-up networking or
virtual private networking (VPN). This option starts the Routing and Remote Access Setup Wizard.
You can configure routing and remote access to allow outgoing connections only, incoming and
outgoing connections, or no outside connections at all.

12
115. Terminal Server -A server that processes tasks for multiple client computers running in terminal
services mode. This option installs Terminal Server. You don’t need to install Terminal Server to
remotely manage this server. Remote Desktop is installed automatically with the OS.
116. In Router configuration:
a. The prompt for user EXEC mode Router>.
b. The privileged EXEC mode prompts  Router#.
c. The router prompt for global configuration mode Router(config)#
d. Interface configuration mode Router (config-if) #
117. place where list of problems that occurred on a system are found  Event viewer
118. indexes files for faster searching when clients connect to shared folders Windows search service
119. You have 10 users plugged into a hub running 10Mbps. There is a server connected to the switch
running 10Mbps half-duplex as well. How much bandwidth does each host have to the server
10Mbps
120. Given data: You work for a company whose regular business hour are from 8a.m to 5p.m. Monday to
Friday. Your manager has instructed you to run backups only after business hours. The performance
capacity of your tape drive is 50 GB with a data transfer rate of 3600 KB/min, allowing transfer of 2.1
GB per hour. Data that needs to be backed up is 40 GB. On which day(s) can you do full backup?
 Given data implies that the duration of the backup process 19.1hours. The backup should start on
Friday night. There are only 15 non- business hours between 5 p.m. and 8 a.m. the 19.1 hour
backup process must not be started Monday to Thursday
121. Logical Link Control (LLC) sub layer provides and maintains the logical links used for
communication between the devices.
122. Media Access Control  (MAC) sub layer controls the transmission of packets from one network
interface card (NIC) to another over a shared media channel. A NIC has a unique MAC address, or
physical address. The MAC sub layer handles media access control which essentially prevents data
collisions. The common media access control methods are:

 Token Passing;  utilized in Token Ring and FDDI networks


 Carrier Sense Multiple Access/Collision Detection (CSMA/CD);  utilized in Ethernet networks.
 Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA); utilized in AppleTalk networks.
123. Router Packet filtering
124. Components of IIS FTP
125. Procedure A method by which a policy can be accomplished
126. Protocol-A protocol is a set of rules that govern all aspects of information communication.
127. Modem used for modulation and demodulation
128. Flow control is a set of procedures used to restrict the amount of data that the sender can send
before waiting for acknowledgment.
129. Error ControlError control is both error detection and error correction.
 Methods of error detection and retransmission.
 Error control in the data link layer is based on automatic repeat request, which is the
retransmission of data.
130. RAIDA method for providing fault tolerance by using multiple hard disk drives.

13
131. Gatewayoperates at the upper levels of the OSI model and translates information between two
completely different network architectures or data formats.
132. What are the important topologies for networks?

BUS topology: In this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
STAR topology: In this all computers are connected using a central hub.
Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
RING topology: In this all computers are connected in loop. Advantages: All computers have equal
access to network media, installation can be simple, and signal does not degrade as much as in other
topologies because each computer regenerates it.
133. You have a TCP/IP network comprising nearly 30 computers. Currently, all computers have been
assigned IP addresses manually. The company is growing fast, and a new consignment of 15 computers
is arriving next week. You have decided to install DHCP services on one of the servers. Identify which
of the following are the advantages of using the DHCP Server in the network.
A. Assignment IP addresses will be automated
B. Network traffic problems can be resolved
C. The network can be monitored more efficiently
D. The name resolution process will be automated
134. A Customer orders a new computer and specifies an internal read write, non-volatile storage device
that uses low power, has fast access to data, and is reliable. What is a suitable storage device that meets
these requirements?

A. SATA hard drive C. Solid state drive


B. DVD+/- RW drive D. USB flash drive

135. From the following options, identify the most critical problem that should be given highest priority if
one of the user in your network has complained that he/she cannot access a given file server but they
can access other files.
A. Check if the file server is reachable by your workstation
B. Check whether the file corrupted by malicious codes
C. Check the network response time
D. Check the network interface card’s functionality
136. Subnet -used to divide large network in to smaller network/ logical subdivision of an IP network
137. Upload transfer data from one computer to internet typically to one that is larger or remote from
the user or functioning as a server.
138.  Browser Computer program (such as Internet Explorer or Mozilla Firefox) that enables internet
users to access, navigate, and search World Wide Web sites.
 a browser is a software application used to locate, retrieve and display content on the World Wide Web
139. User account -is a location on a network server used to store a computer username, password, and
other information. A user account allows or does not allow a user to connect to a network,
another computer, or other share. Any network that has multiple users requires user accounts.
 An Active Directory objects that represents a unique user.

14
140. Authentication is the process of verifying the identity of people who are attempting to access the
network or system.
141. Authorization- is the process determines what the user can do on the network
142. The most common way of administering access permissions is to create groups and put user accounts
into appropriate groups
143. Which command displays the per protocol statistics. (Note: switches of certain commands maybe
case sensitive netstat-s
144. If you were to connect your computer to an analog data service provided by a local telephone
company, which device would you use?  Modem
145. Which of the following are good password practices?
 Change passwords every 90 days & Maintain minimum password length
146. Your entire network is suffering a severe performance pull down. All connections were made as per
documentation and hence there is no place for conflicts. Which of the following can help to isolate the
problem?  Network Monitor
147. Your company is using a 10BaseT network, as a upgrade measure you implement fast Ethernets in all
client computers and start using 100Mbps switches. You do not see improvement in the performance.
What else needs to be changed here? Category 3 patch cables.
148. Which of the following devices can connect network segments and allow them full network
bandwidth for communication?  Switch
149. While gathering data to determine the organization business requirement you might take records of
the organization like, annual reports and organizational policies. These kinds of information resources
are considered as
A. Informal sources B. Primary sources C. Secondary sources D. Tertiary sources
150. The main reason for implementing a network for an organization is

A. To reduce security risk C. To share resources


B. To decrease company cost D. To exchange information
151. You are requested to implement an antivirus policy in a company that has large number of users.
Identify the incorrect statement on implementing the antivirus policy?
A. Each computer in the company should be equipped with virus detection and cleaning software
B. Each user should install his own antivirus software and know how to use it
C. Organization should impose penalties on users who don’t follow the antivirus policy
D. The company should have an antivirus team that focus on maintaining the antivirus measures in place
152. You want to implement a mechanism that automates the IP configuration in yourcompany’s network.
The protocol that helps you to accomplish this
A. DHCP B. SMTP C. STP D. DNS
153. You are the administrator for your company’s domain. You need to subdivide the groups in your
organization within active directory. If you want to separate sales from marketing as an example, what
will you use as a system of organizing this subdivision?
A. Create organization Units C. Use Users and Groups
B. Create a site and Service subnet Grouping D. Use Separate Domains

15
154. `The file system that allow for file-level security to use for a server that will be an active directory
domain controller for your organization
A. CDFS B. FAT C. FAT32 D. NTFS
155. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
plant in another city. The best device required to enable everyone to share data and resources between
the two LANs?
A. Router B. HUB C. Modem D. Switch
156. The TCP/IP protocol used for transferring electronic mail messages
A. FTP B. RPC C. SMTP D. SNMP
157. The command used to access Active Directory Installation wizard
A. DOMAININSTALL B. DCPROMO C. DCONFIG D. DCINSTALL
158. A system administrator wants to prevent users from starting or stopping specific services on the
domain controller. The tools that can be used to do this
A. Active directory users and computersC. Domain Security policy
B. Local System Policy D. Domain Controller security policy
159. The research and development department at your office has been experimenting with different
technologies to help improve the performance of the network. One group has been examining the use of
a broadband network versus a based band network. The correct statement about broadband and
baseband
A. Broadband networks carry several channels on a single cable, whereas in a baseband network
several cables carry one channel
B. Baseband networks carry a single channel on a single cable, whereas broadband networks carry
several channels on a single cable
C. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed
D. Broadband and baseband refer to the different frequencies at which infrared operates then
transmitting signals in certain conditions
160. Computers cannot communicate with each other directly over telephone lines because they use digital
pulses whereas telephone lines use analog sound frequencies. The device that permits digital to analog
conversion at the start of transmission
A. Attenuation B. Interface C. Modem D. Network Interface Card
161. The configuration information for a DHCP client is received dynamically. The utility used to read
configuration for verifying this settings?
A. TRACERT B. PING C. NETSTAT D. IPCONFIG
162. You are in charge of a small network and want to make it secured. The users want to have full
control over their data and still be able to share data with the rest of the office. The best type of network
to set up this
A. Client based network C. Master Domain network
B. Peer-to-peer network D. Server based network
163. Your customer has a client/ server Ethernet network consisting of a server and 225 computers running
Windows XP. The kind of security you recommend to him for centralized control of access to files and
directories on the network
A. setup a password for each file and groups for each directory

16
B. setup a password for each file and directory shared
C. setup groups of shared resources and users who have access to these groups
D. setup a password for each user
164. You are requested to setup a 100Mbps network for a client in an office that already has 10 Mbps
throughput. Your client wants to keep the costs to a minimum but needs the 100Mbps throughput. The
cabling solution you recommend?
A. Cat 3 UTP B. Cat 5 UTP C. Coaxial cable D. Fiber Cable
165. You are assigned to lead a small team in your company for managing networks. Identify the wrong
statement in leading a team
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
166. One of your users calls you with a complaint that they can’t reach the site www.yahoo.com . You try
and access the site and discover that you can’t access either, but you can PING the site with its IP
address. The most probable cause of the problem?
A. Yahoo! is down C. The gateway is down
B. The working switch is down D. The DNS server is down
167. The hardware and network administrator wants to remotely and securely enter commands to be run at
a remote server. The application that the administrator should use
A. Telnet B. SSH C. SFTP D. RSA
168. You have just implemented a solution for a major network problem in your company and you want to
celebrate the success. The next step you should do before starting your celebration
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization
169. Loop back IP address 127.0.0.1
170. Broadcast IP Address 255.255.255.255
171. Public IP Address 213.55.96.148
172. Class A IP Address 10.10.10.10
173. Class B IP Address 172.16.0.20
174. Transport layer Breaks data down into manageable chunks and TCP and UDP operate at this layer
175. Physical layer Define hardware connections and turns binary in to pulses(electrical or light) and
also repeaters and hubs operate at this layer
176. Data Link layer Identifies devices on the physical layer and MAC addresses are part of this layer
177. Session Layer Manages connections between machines and Sockets operate at this layer
178. Network layer Moves packets between computers on different networks and Routers operate at this layer
179. TRACERT Used to diagnose problems reaching a remote system by tracing all routes between two points
180. NSLOOKUP Used to diagnose DNS problems
181. HOSTNAME Used simply to return the name of the local computer

17
182. NETSTAT Used to display information on the current state of all the running IP processes on your computer
183. PING Uses ICMP packets to show you if you can simply reach a remote computer
184. Upload  data transfer from a client(or computer) to a server(or to internet)
185. Download data transfer from a server(or internet) to a client(or to computer)
186. Extranets provides selected users from outside of the organization to access data from the internal network
187. Intranet  belongs to an organization, and is designed to be accessible only by the organization’s
members, employees, or others with authorization
188. Internet  the ultimate WAN
189. Logical topologies  how data actually transfers in a network
190. Physical topology  the layout of cables, computers and other peripherals
191. Token passing  the method of transmitting data around the ring
192. Mesh topology each computer is connected to every other computer by separate cable
193. Medium communication across a network is carried on
194. Guided transmission data signals along a specific path
195. Network interface card(NIC)  the interface between cables, and computers
196. Bridges passes data packets between multiple network segments
197. Routers a data packets will travel through a number of network points
198. Modem computers to communicate over telephone line
199. Gateway an entrance to another network
200. Protocol  a language spoken between computers
201. HTTP protocol communication between web browsers and web servers
202. Application layer File transfer, Email, remote login
203. Which of the following is the behavior of good team members?
A. Do not respect the opinions of others in the team
B. Do not take turns
C. Share responsibilities
D. Keep individual information about development
204. The task next to gather requirements and conduct analysis in project development life cycle is?
A. Conduct system maintenance
B. Implement simply and deployed it
C. prepare succinct and appropriate document and present the requirement specification to clients
and again agreement
D. go directly to design as possible
205. Assume you have planned to install LAN in your organization and you have to gather information to
know the requirements of clients. Which one is invalid to satisfy your goal?
A. You may prepare open and close ended questions and provide to clients
B. You may arrange something and conduct interview with clients
C. You may guess and write the clients need and go to installation phase
D. You may observe the clients offices and determine how they use their computers
206. Enables sharing of information on the internet, intranets, or extranets
A. Terminal service C. Windows deployment services
B. Network policy and access service D. Web server

18
207. One of the following is not determinant factor to implement the network design
A. Developers need B. Budget C. user requirement D. Technology
208. When you start up your working computer, an error message ‘NT boot loader missing’. One cannot
be the cause of this error?
A. Ntldr, Ntdetect.com and Boot.ini are never missed or damaged when the error happened
B. No bootable drive containing media is listed in the boot order
C. The computer’s system drive is not properly identified (BIOS/UEFI)
D. Data or power cables from the internal hard disk to the mother board are loose or have failed
209. Which of the following is not part of a Fully Qualified Domain Name?
A. Company B. Host name C. type of organization D. CPU type
210. Unstructured questions in which possible answers are suggested, and the respondent answers it in his
or her own word
A. Close ended questions C. multiple choice questions
B. open end questions D. matching type questions
211. Which one of the following an example of verbal communication?
A. Para language C. sign and time language
B. face to face communication D. body language
212. One of the following is wrong about Technical documentation?
A. Technical documentation informs the customer about the instructions and troubleshooting tips
that are essential for ensuring a great customer experience, which can reduce customer support
costs
B. Technical documentation cannot be modified by other expert by another time once it is prepared
C. Technical documentation can provide a better understanding of the product and prevent customer
errors, making business processes more reliable
D. Technical documentation plays an important role in helping the user learn the futures or functions
of a particular product or application
213. As hardware and network administrator you may review hardware and software compatibility before
try to install server operating system. How do you check the compatibility of hardware and software?
A. The hardware and software compatibility can be determined through practical use
B. By visiting the website and search or browse by manufacturer or product to determine which
hardware or software is compatible
C. Any software product is compatible with any hardware platform
D. No need of checking compatibility of hardware and software while you install software like server
operating system
214. Which of the following network device two dissimilar networks can be connected and it operate all
layers f the OSI model?
A. Gateway B. switch C. router D. bridge
215. As a network administrator you have been requested to move a printer from your company’s
marketing OU to your company’s research OU. After the move you test the printer and find that the
local administrator assigned to the Marketing OU still has access and can remove print jobs from it.
What can you do to change this?
A. Remove the permissions for the local administrator from the printer

19
B. Remove printer permissions from the local administrator
C. Remove the Everyone group from the printer
D. Delete the printer object
216. Which of the following groups offers the most security?
A. Backup operators B. Administrators C. power users D. users
217. Which of the OSI model is responsible for establishing, managing, and terminating communications
between two computers?
A. Network layer B. data link layer C. Application layer D. Session layer
218. Which protocol does DHCP use at the transport layer?
A. UDP B. ARP C. TCP D. IP
219. Which protocol does Ping use?
A. ARP B. ICMP C. BootP D. TCP
220. You are the administrator of a windows 2003 domain. All domain controllers are running windows
2003 server and the functional level has been raised to windows 2003. You are in the process of
building a new domain controller, which you have named OCOC. When asked for a password, you
enter OCOC receive an error. What should you do to continue building the server?
A. Log on to a different domain controller and modify the default domain policy to allow passwords
of five characters. Disable the required complex passwords option
B. Change the password to Ococserver9
C. Change the password to ococ server9%rver
D. From a command prompt, type net user ococserver95
221. Which layer is responsible for process to process delivery?
A. Network layer B. session layer C. data link layer D. transport layer
222. A network administrator is verifying the configuration if a newly installed host by establishing an
FTP connection to a remote server. What is the highest layer of the protocol stack that the network
administrator is using for this operation?
A. Transport B. Presentation C. session D. application
223. Which of the following is not market promotional tool?
A. Supply/ demand B. advertising C. seminars D. networking and referrals
224. The most effective way to mitigate congestion on a LAN would be to _______?
A. Replace the hubs with switches C. Upgrade the CPUs in the routers
B. Changes the cabling to CAT 6 D. Upgrade the network cards
225. .You are troubleshooting your DNS server. The server has not been resolving some of the hosts in the
network, but is working fine for others. You check the DNS MMC snap-in and everything looks okay.
What utility should you use to determine the nature of the problem?
A. Network monitor C. the monitoring tab of the DNS server’s Properties page
B. the nslookup command D. the netstat command
226. You need to provide network connectivity to 150 client computers that will reside in the same sub
network, and each client computer must be allocated dedicated bandwidth. Which device should you
use to accomplish the task?
A. Bridge B. switch C. hub D. router
227. With respect to the OSI model, which of the following are correct statements about PDUs?
A. A packet contains IP addresses B. A segment contains IP addresses

20
C. A segment contains MAC addresses D. A packet contains MAC addresses
228. What is the utility used to install Active directory on a windows server 2003 computer?
A. adinstall.exe B. dcpromo.exe C. dcupgrade.exe D. promoted.bat
229. Which of the following layers of the OSI model was later subdivided into two layers?
A. Physical B. transport C. presentation D. data link
230. All of the following are results of Kaizen implementation in work places except?
A. Safety in workplaces B. efficient space utilization
C. high waiting time D. improvement in product quality
231. A document jointly developed by management and quality experts to express the quality objective of
the organization, the acceptance level of the quality and duties of specific department to ensure the
quality is called?
A. Quality system procedure B. Quality Management plan
C. Quality policy D. Quality control
232. Your network contains a server named Server1 that runs Windows Server pack (SP2). You install a
new network adapter on Server1. You need to view the media access control (MAC) address for the
network adapter. What should you do?
A. From the device manager snap-in, view the properties of the network adapter
B. At the command prompt, run Net view \\server1
C. From the services snap-in, view the properties on the network connections service
D. At the command prompt run ipconfig/all
233. A technician receives an urgent call that the switch in accounting Department is down. Which of the
following should the technician do first to troubleshooting this issue?
A. Document the process and solutions B. establish the most probable cause
C. identify the symptoms and problems D. escalate if necessary
234. It manager of XYZ company want to write ICT police for that company in order Administrative IT
facility effective ways. One of the following is not basic reason that writing ICT policies?
A. Continuous improvement B. risk management
C. maintain good name of the organization D. operational need
235. The exchange or sharing of information between people within a community or units of an
organization with the same level of hierarchical for the purpose of coordinating activities and
fulfilling a common purpose or goal.
A. Upward communication B. downward communication
C. Lateral communication D. Vertical communication
236. The LAN needs are expanding at the company corporate office, which is quickly growing. You are
instructed to enlarge the area covered by a single LAN segment on the company network. Which of the
following are layer 1 devices that you can use?
A. Switch B. A router C. NIC card D. hub
237. Routers operate at layer __. LAN switches operate at layer __. Ethernet hubs operate at layer __.
Word processing operates at layer __.
A. 3, 3, 1, 7 B. 3, 2, 1, none C. 3, 2, 1, 7 D. 2, 3, 1, 7 E. 3, 3, 2, none
238. When data is encapsulated, which is the correct order?
A. Data, frame, packet, segment, bit

21
B. Segment, data, packet, frame, bit
C. Data, segment, packet, frame, bit
D. Data, segment, frame, packet, bit
239. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 7
240. You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?
A. SMTP B. SNMP C. DHCP D. ARP
241. You have recently applied security options for your Windows Server 2003 computer. When you
attempt to verify the security settings, they appear as if they have not been applied. What command-line
utility can you use to force an update of the new security policies?
A. secupdate B. gpupdate C. secrefresh D. secpol
242. You need to quickly edit the Group Policy for a Windows Server 2003 member server. Which of the
following command-line utilities could you use to access the Local Computer Policy utility?
A. EditGPO.exe B. GPOEdit.exe C. EditGPO.msc D. Gpedit.msc
243. You want to install two network cards on one computer. You definitely want to configure the IP
address of one of the cards manually. How must you configure the other card?
A. Both cards must be configured manually.
B. Both cards must be configured dynamically.
C. One card must be configured manually, and the other must be configured dynamically.
D. Both cards can be configured either manually or dynamically
244. A machine suddenly loses Ethernet network connectivity shortly after you hear a loud crash coming
from the room where the computers are stored. Everything else on the machine appears to be working
normally. You check the TCP/IP properties and find that they are in order. What is most likely the
cause of the problem?
A. The network card is damaged.
B. The DNS properties need to be reset.
C. One of the other machines on the network has been damaged.
D. The machine’s network cable is either broken or dislodged.
245. Your users are complaining of intermittent problems with various websites. You have run tracert to
various sites repeatedly, encountering no problems whatsoever. What would be the best command to
use to determine intermittent router operation?
A. nbtstat –n B. netstat C. ping –a D. pathping
246. Your company uses Voice over IP (VoIP). The system sends UDP datagrams containing the voice
data between communicating hosts. When areas of the network become busy, some of the datagrams
arrive at their destination out of order. What happens when this occurs?
A. UDP will send an ICMP Information request message to the source host.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order in which they arrive.
C. UDP will drop the datagrams that arrive out of order.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data into the order in
which it was transmitted.
247. Which of the following protocols use both TCP and UDP?
A. FTP B. SMTP C. Telnet D. DNS
22
248. Which layer chooses and determines the availability of communicating partners along with the
resources necessary to make the connection, coordinates partnering applications, and forms a consensus
on procedures for controlling data integrity and error recovery?
A. Transport B. Application C. Session D. network E. Session
249. CSMA/CD a set of rules determining how network devices respond when two devices attempt to
use a data channel simultaneously
250. Crosstalk  Unwanted coupling between signal paths
 Occurs due to electric coupling between nearby twisted pairs, multiple signals on a coaxial cable,
or unwanted signals picked up by microwave antennas
251. IP address conflict  assigning the same IP address on a network
252. Switch/bridge  uses hardware address to filter a network
253. Multicast  a single source address responding to multiple destination addresses with information to
be sent
254. Unicast  sending of information packets to a single network node
255. broadcast  sending of information packets to a all network node
256. DHCP  provides a solution that automatically assigns IP addresses to computers on a network
257. Loop back address  127.0.0.1
258. Forward zone zone that resolves host name to IP address during DNS server configuration
259. Print Device  a hardware device used for printing
260. Router  device sends and receives information about the network layer
 device can measure the distance to a remote network.
261. Questionnaire  method of collecting information or determining requirements
262. Home or work/private network Firewall profile identified by the network administrator
263. Which router command allows you to view the entire contents of all access lists?
 Route> show access-lists
264. NAT a commonly used IP translation and mapping technology
265. BNC  coaxial cable connector
266. IPv6  Addressing scheme utilizes a 128 bit address sent
267. IPv4  Addressing scheme utilizes a 32 bit address sent
268. NIC acts as interface between the computer and the physical network connection
269. Transceivers a networking device that converts one cabling technology to another
270. Quality control  is the operational techniques and activities that are used to fulfill requirements for
quality
271. TCP/IPThe Internet Protocol standard dictates how packets of information are sent out over
network
272. Post office protocol version  receive email message
273. Router Informs the route and the number of hops
274. File servicesProvides technologies for storage management
275. DHCP Automatically provides an Internet Protocol (IP) host with its IP address
276. Socket address  IP address and port number
277. POST  the hardware functionality during boot process
278. AD domain services stores information about users, computers, and other devices on domain

23
279. FTP  transfer files in servers and clients computers
280. Hybrid topology a combination of two or more topology and is reliable
281. Router Hardware device designed to receive, analyze, and move incoming packets to another
network
282. Router It forwards packets from one LAN to another LAN and it operate at network layer
283. DNS Resolves hostnames to IP addresses
284. Transport layerProvides connection services between the sending and receiving devices and
ensures reliable data delivery
285. Backup strategy the best defense against data lost
286. Physical layer responsible for electrical and mechanical connection b/n devices
287. Work ethics  group of moral principles ,standards of behavior, or set of values regarding conduct in
the workplace
288. Session layers Synchronizes the data exchange between applications on separate devices.
289. Presentation layer Translates data from the format used by applications into one that can be
transmitted across the network
290. Active Directory Certificate Services Provides the services for creating and managing public key
certificates used in most aspects of security today, including HTTP Security (HTTPS).
291. Active Directory Domain Services stores information about users, computers, and other devices on
the network in a security boundary known as a domain.
292. Active Directory Federation Services Provides Web single-sign-on (SSO) capabilities across
separate organizations, allowing authentication across multiple Web applications in various companies
using a single user account.
293. Active Directory Lightweight Directory Services Active Directory Application Mode (ADAM)
 Provides a directory service that organizations can use to store information specific to an
application that is separate from the organization's main AD.
 Runs as a non-OS service and doesn't require deployment on a DC.
294. Active Directory Rights Management Services Provides very granular protection on supported
documents
 To control the actions that authorized consumers of the information can do.
295. Application Server Comprises a number of components that are responsible for the deployment and
managing of .NET Framework 3.0 applications.
296. Dynamic Host Configuration Protocol (DHCP) Server Allows servers to assign or lease IP
addresses to computers and other devices on the network.
297. DNS Server used to resolve host names to IP addresses, both IPv4 and IPv6.
298. Fax Server Sends and receives faxes, and allows you to manage fax resources
299. File Services Provides technologies for storage management.
300.  mail server  is a computer system that sends and receives email
301. Network Policy and Access Services Delivers a variety of methods to provide users with local and
remote network connectivity, to connect network segments, and to allow network administrators to
centrally manage network access and client health policies.
 Deploy VPN servers, dial-up servers, routers, and 802.11 protected wireless access.

24
 Deploy RADIUS servers and proxies, and use Connection Manager Administration Kit to create
remote access profiles that allow client computers to connect to your network.
302. Print Services Enables the management of print servers and printers. A print server reduces
administrative and management workload by centralizing printer management tasks.
303. Terminal Services Enables users to access Windows-based programs that are installed on a
terminal server or to access the Windows desktop from almost any computing device that supports the
RDP protocol.
304. Universal Description, Discovery, and Integration (UDDI) Services provides description,
discovery, and integration capabilities for sharing information about Web services within an
organization's intranet, between business partners on an extranet, or on the Internet.
305. Web Server (IIS) Enables sharing of information on the Internet, intranets, or extranets.
306. Windows Deployment Services (WDS) Used to install and configure Windows OSs that are stored
in the Windows Imagine format remotely on computers via Pre-boot Execution Environment (PXE)
boot ROMs.
307. A security policy defines
A. When users cannot log in to their computers
B. What users can and cannot do with their computer
C. How the user should install their own software
D. How complex user password should be
308. A type of network that supports two /more organizations and that allows controlled access from the
outside for specific purposes.
A. Intranet B. Extranet C. Internet D. Wide Area Network (WAN)
309. You want all network clients to download and install updates automatically during night hours, and
you have configured scheduled installation behavior for Automatic Updates. However, you discover
that some users are turning off their machines at night and updates are not being applied. The group
policy that enables you to correct this situation without changing the installation schedule?
A. Configure Automatic Updates
B. No Auto-Restart For Scheduled Automatic Updates Installations
C. Specify Intranet Microsoft Update Service Location
D. Reschedule Automatic Updates Scheduled Installations
310. Assume that you are giving a service and you want to measure its quality. The best way to do this is
A. Asses the time it takes to deliver the service
B. Implement periodic self-assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to measure their satisfaction
D. Wait until you receive a complaint from customers
311. A user can login to his computer but cannot access network resources. The user has all the
appropriate group memberships and permissions, but he still cannot access shared resources. The cause
of this problem
A. User has attempted to access a shared folder without appropriate permissions.
B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.

25
312. You organization consists of four physical locations connected by a wide-area network (WAN). Each
site has its own independent Internet connection. If the primary concern about installing
Windows Server Update Services (WSUS), the best way to configure the WSUS servers without
affecting WAN link.
A. All clients download updates from a single WSUS server at the head office.
B. Each location has an independent WSUS server that serves local clients.
C. Each remote location has replica WSUS servers that copy their configuration from the head office
WSUS server.
D. Each remote location has a disconnected WSUS server and updates are imported on those servers
from DVD.
313. Your company has a main office and a branch office. You deploy a read-only domain controller
(RODC) that runs Microsoft Windows Server 2008 to the branch office. You need to ensure that users
at the branch office are able to log on to the domain by using the RODC. What should you do?
A. Add another RODC to the branch office.
B. Configure a new bridgehead server in the main office.
C. Configure the Password Replication Policy on the RODC.
D. Decrease the replication interval for all connection objects by using the Active Directory Sites and
Services console.
314. A common method used to prevent the unauthorized network devices from sending traffic across a
network is port.
A. Spanning B. Address translation C. Mirroring D. Authentication
315. The type of license key allows you to host an activation service locally within your own network.
A. Multiple Activation Key C. Key Activation System
B. Key Management System D. Multiple Management System
316. A new project requires that users in your domain and in the domain of a partner Organization have
access to a shared folder on your file server. Which type of group should you create to manage the
access to the shared folder?
A. Domain local security group C. Global security group
B. Universal security group D. Domain local distribution group
317. You are giving training about computer and network maintenance for a maintenance team. As a
trainer, the first step in the maintenance process you recommend.
A. Gather data from the computer
B. Verify the obvious issues
C. Evaluate the problem and implement the solution
D. Gather data from the customer
318. You are going to build Internet infrastructure with 31 subnets and 7 usable host addresses per each
subnet. The class C subnet mask for this case.
A. 255.255.255.240 C. 255.255.255.250
B. 255.255.255.244 D. 255.255.255.242
319. The reason that end users need to be aware of the security policy.
A. Some security decisions are usually in their hands
B. They should understand the probability of every risk

26
C. They need to be aware of every threat
D. They should avoid responsibility for their actions
320. You are a network administrator at XYZ Company, and one of your tasks is designing the company
security policy. The element NOT to be specified in an enterprise security policy.
A. Risks and how to manage the risks
B. User roles and responsibilities
C. Software versions of the security products
D. Contingency plan in case of compromise
321. The first step in establishing a disaster recovery plan (DRP).
A. Demonstrate adherence to a standard disaster recovery process
B. Agree on the goals and objectives of the plan
C. Identify applications to be run during a disaster
D. Identify the causes of the disaster.
322. Firewall function.
A. Allowing only packets that pass security restriction to be forwarded
B. Rejecting all packets regardless of security restriction
C. Forwarding all packets that is forwarded
D. Allowing all packets that is forwarded
323. A security implementation principle that recommends division of responsibilities so as to NOT allow
one person to commit an undetected fraud.
A. Separation of duties C. Least privilege
B. Collusion D. Delegation of power
324. While you are configuring new wireless clients, none of the new clients is able to connect to the
network, but clients already on the same access point do not have any connectivity problem. Which is
NOT the possible reason for this problem?
A. A poor signal due to interference
B. A bad access point
C. An incorrect IP address
D. An incorrect same service set identifier (SSID)
325. You a network administer for ABC Company. You are verifying the configuration of a newly
installed host by establishing an FTP connection to the remote server. The highest layer of the protocol
stack you are using for this operation.
A. Application B. Presentation C. Session D. Transport
326. You have a domain controller that runs Windows Server 2008 and is configured as a DNS Server.
You need to record all Inbound DNS queries to the Server. What should you configure in the DNS
Manager console?
A. Enable automatic testing for simple queries
B. Enable automatic testing for recursive queries
C. Enable debug logging
D. Configure event logging to log errors and warnings
327. You have been asked to install a network that will provide the network users with the greatest amount
of fault tolerance. The preferred network topology.

27
A. Star B. Ring C. Mesh D. Bus
328. The tool that can be used to prevent users from starting or stopping specific services on the domain
controller.

A. Client Security policy C. Computer System Policy


B. Group Security policy D. Domain Controller security policy

329. You are requested to setup a 100Mbps network for a client in an office that already has 10Mbps
throughput. Your client wants to keep the costs to a minimum but he needs the 100Mbps throughput.
The cabling solution you recommend.
A. STP B. Cat 6e UTP C. Coaxial cable D. Fiber Cable
330. You are assigned to lead a small team in your company for managing networks. Identify the wrong
statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
331. One of your users calls you with a complaint that they can’t reach the site www.yahoo.com . You try
and access the site and discover that you can’t access either, but you can PING the site with its IP
address. The most probable cause of the problem.
A. Yahoo! is down C. The gateway is down
B. The working switch is down D. The DNS server is down
332. An application that used to remotely and securely access the remote server.
A. Telnet B. SSH C. SFTP D. RSA
333. The next step you should do after you have just implemented a solution for a major network problem
in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization
334. When troubleshooting a network connectivity problem, you are able to ping your local loopback, the
IP address of your system, and the IP address of another system on your network. However, you cannot
ping the default gateway. The valid reason for this problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.
335. While gathering data to determine the organization business requirement you might take records of
the organization like organizational policies and procedures. These kinds of information resources are
considered as?
A. Informal sources B. Primary sources C. Secondary sources D. Tertiary sources

28
336. You are the administrator of a Windows 2008 network. Masho, a help desk technician, resigns the
company. Desta, a new hire, takes Mashos’s place. You want Desta to have the same level of access
that Masho had. What should you do?
A. Rename Mashos’s account to Desta. Reset the password.
B. Copy Masho’s account and create a new account for Desta. Disable Masho’s account.
C. Create a new account for Desta. Recreate the group membership of Masho’s account to Desta’s account.
D. Copy Masho’s account and create a new account for Desta. Delete Masho’s account.
337. You enable disk quotas on a Windows Server 2008 file server. You configure a quota limit of
100MB. A user, named Eyob, reports that he can still save large files to the server, even though he is
well above his quota limit. What should you do to correct the problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.
338. A hierarchical structure made up of multiple domains that trust each other.
A. Root B. Site C. Organizational Unit D. Tree
339. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to analyze data
collected the night before. Users report that access to files at this time is significantly slower than at
other times. What should you do to resolve the problem?
A. Run the Start /normal csrss.exe command before starting Excel.
B. Run the Start /normal Excel.exe command to start Excel.
C. Use Task Manager to set the Explorer.exe process to high priority.
D. Use Task Manager to set the Excel.exe process to low priority.
340. When you tried to login to the server, your trial may failed, this failure event is recorded in
A. System log B. Security log C. Application log D. Event log
341. A user reported that his computer is slow. When a technician arrives, he finds many unwanted
programs running at startup. The application that helps to configure programs at startup.
A. MSCONFIG B. SYSTRAY C. WINLOGON D. REGSVR32
342. You have a server that runs Windows Server 2008. You need to identify all the unsigned drivers that
are installed on the server. What should you do?
A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.
343. You are the network administrator for a large company. One of your users, Lidya, recently returned
from a three-month maternity leave. While she was on leave, no one used her computer. When Lidya
attempted to log on to her computer, she received an error because the computer’s password had
expired. What should you do?
A. Reset her computer account through the Active Directory Users and Computers utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her computer.
D. Log on to her computer running Safe Mode and run the Setpass command-line utility.

29
344. In the academic year of 2008 you have individual project in your providing company, to do this
project you have to read oldest book at public library, then you can do your project .what type of
resource used for your project?
A. Tertiary documentary sources C. Secondary documentary sources
B. Non documentary sources D. Primary documentary sources

Column A Column B

____ 1. The degree of excellence of something A. Strategy


____ 2. Specify the users permitted to be members of specific groups. B. Local Policies
_____3. Server used to allocate IP addresses to large number of PCs in a C. Restricted Group
network environment. D. System Services
_____4. An original draft or record of documents.
E. Protocol
____ 5. Server that provides access connectivity for mobile user through the
Internet.
F. Rules and
____ 6. A series of actions conducted in a certain manner. Regulations
____ 7. Configure audit policies, user rights assignments, and security G. WINS Server
options policies. H. DHCP Server
____ 8. Specify access control permissions for NTFS files and folders I. File system
____9. Server that provides access connectivity for mobile user through Permission
telephone line. J. Event Log Policies
____10. A plan of action designed to achieve a long term aim. K. Procedure
____11. Specify password restrictions, account lockout policies, and L. DNS Server
Kerberos policies. M. Quality
____12. Server used to resolve names to IP address and IP addresses to
N. Policy
names.
____ 13. A principle to guide decision and achieve rational outcomes.
O. RAS Server
____ 14. Specify the startup types and permissions for system services. P. Account Policies
____15. Server used for mail receiving purpose in the network. Q. VPN Server
R. POP Server

30
What is the event log?
Windows event log is a record of a computer's alerts and notifications. Microsoft defines an event as
"any significant occurrence in the system or in a program that requires users to be notified or an entry
added to a log."
E. You are asked to implement security into your Active Directory deployment. You need to ensure that
you have auditing set up properly. If you wanted to check and see if you had unauthorized access to
your server, what would you consider checking?
A. Event viewer logs application log
B. Event viewer logs FRS log
C. Event viewer logs system log
D. Event viewer logs security log
F. Security log  records events such as valid and invalid logon attempts, as well as events related to
resource use, such as the creating, opening, or deleting of files. For example, when logon auditing is
enabled, an event is recorded in the security log each time a user attempts to log on to the computer.
You must logged on as Administrator or as a member of the Administrators group in order to turn on,
use, and specify which events are recorded in the security log
G. After monitoring The event viewrer logs on a window server 2003 system, you see an entry in the log
that claims that a database program recorded a file error. In what log would you most likely find this
record
A. Event log B. security log C. application log D. system log
H. After monitoring The event viewrer logs on a window server 2003 system, you find that a driver fails
to load during startup. If the event is recorded, what log would you examine to find the entry
A. Event log B. security log C. application log D. system log
I. As the network administrator for your company, you need to implement security on your
Administrator account. Recently you have detected four attempts to access your server very late at
night during business off hours. Which of the following is the best solution to this problem?
A. Delete the Administrator account
B. Rename the Administrator account
C. Activate the second Administrator account, the Guest account
D. Activate the second Administrator account, the Backup operator account
J. What are a domain and a domain controller?
DC, domain controller is a server on a Microsoft Windows or Windows NT network that is
responsible for allowing host access to Windows domain resources. The domain controllers in your
network are the center piece of your Active Directory service.
K. What is domain security policy?
A domain security policy is a security policy that is specifically applied to a given domain or set of
computers or drives in a given system. System administrators use a domain security policy to
set security protocols for part of a network, including password protocols, access levels and much
more. On Microsoft Servers, a domain controller (DC) is a server computer that responds to security
authentication requests (logging in, checking permissions, etc.) within a Windows domain.
L. What is the security policy?

31
Security policy is a definition of what it means to be secure for a system, organization or other entity.
For an organization, it addresses the constraints on behavior of its members as well as constraints
imposed on adversaries by mechanisms such as doors, locks, keys and walls.
A computer security policy defines the goals and elements of an organization's computer systems.
The definition can be highly formal or informal. Security policies are enforced by
organizational policies or security mechanisms. A technical implementation defines whether
a computer system is secure or insecure.
M. What is the use of group policy?
Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls the
working environment of user accounts and computer accounts. Group Policy provides centralized
management and configuration of operating systems, applications, and users' settings in an Active
Directory environment.
N. The Account lockout threshold policy setting determines the number of failed sign-in attempts that
will cause a user account to be locked. A locked account cannot be used until it is reset by an
administrator or until the number of minutes specified by the Account lockout duration policy setting
expires. Account lockout is a useful method for slowing down online password-guessing attacks as
well as to compensate for weak password policies. These three policies work together to limit the
number of consecutive, within a period of time, logon attempts that fail due to a bad password.
O. Kerberos policy -is defined at the domain level and is implemented by the domain's KDC. Kerberos
policy is stored in Active Directory as a subset of the attributes of domain security policy. By
default, policy options can be set only by members of the Domain Admins group.
P.  Local Policies -which is part of the Local Security Settings console, determine the security options
for a user or service account. ... Local policies define the privileges and rights for BizTalk Server 2002
users. Local Policies can be used to configure: Audit Policy.
Q. What is a local group policy?
Group Policy provides centralized management and configuration of operating systems, applications,
and users' settings in an Active Directory environment. A version of Group Policy called Local
Group Policy ("LGPO" or "LocalGPO") also allows Group Policy Object management on
standalone and non-domain computers.

R. Which of the following is not a feature of Active Directory?


A. The use of LDAP for transferring information
B. Reliance on DNS for name resolution

32
C. A flat domain namespace
D. The ability to extend the schema
S. Domains provide which of the following functions?
A. Creating security boundaries to protect resources and ease of administration
B. Easing the administration of users, groups, computers, and other objects
C. Providing a central database of network objects
D. All of the above
T. You are the administrator for a large organization with multiple remote sites. Your supervisorwould
like to have remote sites log in locally to their own site but he is nervous about security.What type of
server can you implement to ease their concerns?
A. Domain controller
B. Global Catalog
C. Read-only domain controller
D. Universal Group Membership Caching Server
U. Which of the following objects is used to create the logical structure within Active
Directorydomains?
A. Users B. Sites C. Organizational units (OUs) D. Trees
V. Which of the following is false regarding the naming of Active Directory objects?
A. Active Directory relies on DNS for name resolution.
B. Two objects can have the same relative distinguished name.
C. Two objects can have the same distinguished name.
D. All objects within a domain are based on the name of the domain.
W. Which of the following are true regarding Active Directory trust relationships?
A. Trusts are transitive.
B. By default, trusts are two-way relationships.
C. Trusts are used to allow the authentication of users between domains.
D. All of the above.
X. Which of the following protocols is used to query Active Directory information?
A. LDAP
B. NetBEUI
C. NetBIOS
D. IPX/SPX
Y. You are the administrator for a large organization. Your organization currently has a Windows Server
2003 domain. Your company has set up a domain-based password policy but the organization is
unhappy with the requirement to have a single policy for all users. Your company is considering
upgrading to Windows Server 2008. What feature will solve the problem of only one policy for all
domain users?
A. Microsoft Windows Server 2008 multi-password policy
B. Fine-grained password policy
C. Certificate server policy
D. None of the above
Z. What Windows Server 2008 server role allows a user to have a single sign-on (SSO) to access
multiple applications?

33
A. Active Directory Domain Services
B. Active Directory Federation Services
C. Active Directory Lightweight Directory Services
D. Active Directory Rights Management Services
AA. What are some of the advantages of using Windows Server 2008 Active Directory Certificate
Services?
A. Web enrollment
B. Network Device Enrollment Service
C. Online Responder
D. All of the above

11. What Windows Server 2008 server role allows a user to secure an email while using
MicrosoftOffice 2007 Outlook?
A. Active Directory Domain Services
B. Active Directory Federation Services
C. Active Directory Rights Management Services
D. Active Directory Lightweight Directory Services

12. Identity and access (IDA) has five distinct categories. What are they?
A. Directory services, strong authentication, Federated Identities, information protection, and
Identity Lifecycle Management
B. Directory services, strong certificates, Federated Identities, data protection, and LDAP
C. LDAP, strong authentication, Federated Identities, information protection, and Identity
Lifecycle Management
D. Directory services, basic authentication, Federated Identities, data protection, and Identity
Lifecycle Management

13. You are the administrator for your company. Another administrator has changed a user’sgroup
settings.What is the easiest way to get the original setting back for the user?
A. Restore tapes.
B. Perform auditing.
C. Use a recovery disk.
D. Enter safe mode and then restore from tape.

14. Which of the following features of Active Directory allows information between domain
controllersto remain synchronized?
A. Replication
B. The Global Catalog
C. The schema
D. None of the above

15. Jane is a system administrator for a large, multidomain, geographically distributed network
environment. The network consists of a large, central office and many smaller remote offices
located throughout the world. Recently, Jane has received complaints about the performance
of Active Directory–related operations from remote offices. Users complain that it takes a long
time to perform searches for network resources (such as shared folders and printers). Jane
wants to improve the performance of these operations. Which of the following components of
Active Directory should she implement at remote sites to improve the performance of searches

34
conducted for objects in all domains?
A. Data store
B. Global Catalog
C. Schema
D. None of the above

16. What is the name of the server that is a repository of Active Directory topology and
schemainformation for Active Directory?
A. Domain Partition
B. Schema Master
C. Global Catalog
D. None of the above

17. You need to install the Active Directory Federation Services. What application do you use todo
the install?
A. Server Set-Up
B. Role Manager
C. Server Manager
D. Add/Remove Programs—Services

18. What term is used to refer to the actual structure that contains the information stored withinActive
Directory?
A. Schema
B. Data store
C. Global Catalog
D. NTDS Storage group

19. You are the administrator for your company’s domain. You need to subdivide groups
inyourorganization within Active Directory. If you wanted to separate Sales from Marketing,
for
example, what could you do to create a system of organizing this subdivision and any othersthat
you need to divide?
A. Create OUs.
B. Use Users and Groups.
C. Create a Sites and Services subnet grouping.
D. Build a container in LM Manager.

20. You are the network administrator for a 200-node network. You are currently looking at creating
software packages to roll out to your network users. When the users log in, they willautomatically
install needed updates. You need to roll out a specific set of updates to 30 ofthose nodes. What could
you create so that you can separate those 30 from the 200 and rollout updates only to that group?
A. A policy that deploys only to those 30 members
B. A group assignment through Administrative Tools
C. An organizational unit (OU) for those 30 users
D. None of the above

35

You might also like