0% found this document useful (0 votes)
363 views

Answer 2

The document contains questions about networking concepts and technologies. It covers topics like IP addressing, protocols, network devices, layers of the OSI model, and troubleshooting steps. Some key points addressed are: - Checking the access point is the appropriate next troubleshooting step if users cannot access the wireless network. - The Regedit command enables viewing and changing settings in the Windows registry. - MAC addresses are 48-bit numbers. The document tests knowledge of fundamental networking topics through multiple choice questions. Areas assessed include IP configuration, protocols, network hardware, the OSI model, and troubleshooting methodology.

Uploaded by

Yohannes bekele
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
363 views

Answer 2

The document contains questions about networking concepts and technologies. It covers topics like IP addressing, protocols, network devices, layers of the OSI model, and troubleshooting steps. Some key points addressed are: - Checking the access point is the appropriate next troubleshooting step if users cannot access the wireless network. - The Regedit command enables viewing and changing settings in the Windows registry. - MAC addresses are 48-bit numbers. The document tests knowledge of fundamental networking topics through multiple choice questions. Areas assessed include IP configuration, protocols, network hardware, the OSI model, and troubleshooting methodology.

Uploaded by

Yohannes bekele
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1. Users report that they are unable to access wireless network.

The technician verifies that the latest


wireless drivers have been installed on other computer. Which one of the troubleshooting steps should
be taken to solve this issue?
a. Replace network cable
b. Check the access point
c. Remove unneeded peripherals
d. Ensure NIC disabled
2. A command that enables you to view, and change settings in system registry
a. MsConfig
b. Nslookup
c. MMC
d. Regedit
3. Which IP address you will ping to test the IP address stack on your local host?
a. 127.0.0.1
b. 127.0.0.255
c. 127.0.0.0
d. 255.255.255.0
4. A device which is used to boost the signal between two cable segments or wireless access?
a. Modem
b. Router
c. Repeater
d. Switch

Repeater is an electronic device in a communication channel that increases the power of a signal

5. Among the following one is a nonfunctional for a networking


a. Analysis
b. Core system
c. Design
d. Testability
6. Which server type used to send and receiving mail?
a. POP server
b. FTP server
c. Web server
d. Proxy server

Post office protocol 3 is a client /server protocol in which email is recevid and held for you by your internet
server

7. How many digit number is MAC address has?


a. 12
b. 48
c. 24
d. 32
8. A network Administrator is verifying the configuration of a newly installed host by establishing an FTP
connection a remote server. What is the highest layer of the protocol stack that the network
administrator is using for this operation?
a. Transport
b. Session
c. Application
d. Presentation
9. The data link layer takes the packets from ____ and encapsulates them in to for transmission.
a. Physical layer.
b. Application layer
c. Network layer
d. Transport layer
10. ___ the one is the data link layer protocol
a. DHCP
b. IP
c. ARP
d. FTP
11. Resolving domain name is managed by a protocols called_____
a. TCP
b. HTTP
c. EIGRP
d. DNS
12. What is the first step of requirement elicitation?
a. Listing out requirements
b. Requirements gathering
c. Identifying stakeholder
d. Documentation
13. Which PDU format is used when bits are received from the network medium by the NIC of a host?
a. Packet
b. DHCP
c. File
d. Frame
14. Who the beginning point for kaizen process?
a. Finance team
b. Managing director
c. Reporting team
d. Process owner
15. _________a device that is used to connect analog signal to digital
a. Repeater
b. Router
c. Modem
d. Switch
16. A family of technologies that are used to transmit digital data over telephone lines.
a. DSL
b. Fiber
c. Palmtop
d. Copper
17. Among the following one network operating system.
a. Windows Xp
b. Windows 7
c. Windows vista
d. Windows server 2008
18. Generally, whenever auser tells you that the LAN connection is failed, what is the first thing to check?
a. Check for the presence of link lights on back of the network adapter?
b. Run IPCONFIG to see if the local network hardware is functioning
c. Ping a known IP address to see if the network cable and connecting is good
d. Check the network adapter drivers to see that they are configured properly
19. The one is a media access technique that identifies a collision and doing nothing
a. Collision prevention
b. CSMA/CA
c. Collision avoidance
d. CSMA/CD
20. Which transmission media has the highest transmission speed in a network?
a. Twisted pair cable
b. Optical fiber
c. Electrical cable
d. Coaxial cable
21. What is the purpose of documenting the information that is obtained from the customer in the work
order?
a. To keep track of parts that are ordered
b. To use the information to trace customer behavior
c. To create a centralized database of possible problems
d. To the information to aid in solving problems
22. A special computer that used to manage resources in network environment.
a. Laptop computer
b. Client computer
c. Handheld computer
d. Server computer
23. Among the following one provides authentication access control for shared resources.
a. Certification
b. Computer security
c. Network security
d. Confidentiality

24. Which of the following is a marketing function that can be performed by channel intermediaries.
a. Recruiting workers
b. Training employees
c. Promoting products
d. Monitoring union activities
25. You have a single Active Directory Domain. All domain controllers run windows server 2008 and are
configured as DNS servers. The domain contains one Active Directory integrated DNS Zone. You need
to ensure that outdated DNS records are automatically removed from the DNSzone. What should you
do?
a. From the properties of the zone, modify TTL of the SOA record.
b. From the command prompt, runipconfigflushdns
c. From the properties zone, disable dynamic updates
d. From the properties of the zone, enable scavenging
26. A connector used to fiber optic is?
a. RJ-11
b. BNS
c. MT-RJ
d. RJ-45
27. Which one of the following is multicasting IP address?
a. 230.12.150.1
b. 140.30.20.1
c. 10.10.10.1
d. 182.168.10.1
28. In a networking system if there is a DHCP server then the client will easy get?
a. Port address
b. IP address
c. URL address
d. MAC address
29. Mesh topologies are mostly used in_____
a. MAN
b. LAN
c. SAN
d. WAN
30. A very important skill used to lead a small team is __________.
a. Counseling skill
b. Speaking skill
c. Monitoring skill
d. Listening skill
31. One of the following is an example of Class C IP address.
a. 255.255.255.0
b. 127.0.0.1
c. 192.168.1.100
d. 225.225.225.1
32. In one of the OSI layers signals are transmitted electrically.
a. Data link layer
b. Presentation layer
c. Transport layer
d. Physical layer
33. Router operates in which layer of OSI reference model?
a. Layer 1(physical layer)
b. Layer 7(Application layer)
c. Layer 3(Network layer)
d. Layer 4(Transport layer)
34. Internal strength and external opportunity analyzed by ____________.
a. SWOT analysis
b. Business analysis
c. System analysis
d. Requirement analysis
35. A protocols which deals with e-mails?
a. SMTP
b. HTTP
c. ARP
d. FTP
36. On-site examination and reviewing technical advice about the organization is ______?
a. Solution
b. Documentation
c. Investigation
d. Feedback

You might also like