Sie sind auf Seite 1von 27

A.

Ministry of Education
Sector: Information and communication Technology
Occupation: Hardware and Network servicing Level 3
Candidates Package’s

The Assessment covers the following the following Unite of competences


1. Gather data on Business requirements
2. Determine best fit topology
3. Configure and Administer server
4. Create technical documentation
5. Monitor and Administer stem and Network security
6. Provide first level remote help desk support
7. Identify and resolve network problems
8. Monitor implementation of work plan/Activities
9. Conduct/facilitate user Training
10. Apply Quality control
11. Lead small Teams
12. Lead work place Communication
13. Improve Business practice
14. Maintain Quality System and continuous improvement process (Kaizen)

Candidates Instruction and work sheet


Instruction to candidate
Methods of Assessment
1. Demonstration practical
2. Observation
3. Oral interview Questioning
4. Knowledge/written Test
Project information
Project information title:-Build a server2003 local wide area(LAN)
Task 1 (2:30 HRS)
Instruction
1. Crimp a standard cable that connects two computerand ………… the functionality of the
cable using network cable tester.
2. Install and configure windows server 2003 of your computers.
3. Install all the necessary drivers for the windows server 2003 that you installed
4. Configure Active directory services
5. Configure DNS
6. Create a domain Name by your own Name
7. Add one client PC to your domain
8. Create two users and group
9. Add belay to finance group
10. Add Tigist to sale group
11. Share printer
12. Verify your configuration

Task 3 (50 Minutes)


When you turn on the computer it boots regularly and display’s on the
…………………………… the message
“NTLDR file missing”
1. Recover the system file missed (Assume that the computer should …………..
formatted).
Ministry of Education
Sector: Information Technology
Occupation: Hardware and Network Servicing L_III

The assessment covers the following units of competence:


1. Gather Data on Business Requirements
2. Determine best fit Topology
3. Configure and Administer Server
4. Create Technical Documentation
5. Monitor and Administer Stem and Network Security
6. Provide first level Remote Help Desk support
7. Identify and Resolve Network Problems
8. Monitor Implementation of Work plan / Activities
9. Conduct / Facilitate User Training
10. Apply Quality Control
11. Lead Small Teams
12. Lead Work place Communication

Structure of Test
Section No of questions No of marks Suggested time
A. Multiple choice questions 20 21 40min
B. Matching Type 15 15 30min
Total 36 70min

OFFICE USE ONLY


Multiple Choice Questions /21
Matching Type /15
Final Mark /36
Instructions
1. Write your name, registration number and Assessment center name in the space provided on
the cover of this question booklet.
2. You have 10 minutes reading time and opportunity to ask questions to the Assessor
3. All written responses must be in English.
4. At the end of the examination return this booklet to the assigned Accredited Assessor.
5. You may use Non-programmable calculators in this test
6. Do not bring the following items into the assessment venue
 Mobile telephones
 Programmable calculators
 Written notes
SECTION A – MULTIPLE-CHOICE QUESTIONS
Instructions for Section A
 There are twenty one [21] questions in this section.
 Encircle the best answer for each question.
 If you wish to change an answer, place an “X” on the letter you have circled and then
encircle your preferred answer.
 No marks will be given for a question if more than one answer is supplied.
1. To provide a computer with a physical and electronic connection to a network, what must be
installed?
A. A hub
B. A router
C. A NIC
D. A Bridge
2. One of the following is an example of a network?
A. A computer attached to a printer and a scanner to input and output information
B. Computer systems sharing a common communication medium for the purpose
of sharing information or devices
C. Several printers connected to a switch box going to a single terminal
D. Several diskettes holding information for one workstation
3. You have successfully implemented a network of about 20 computers. The network is
connected to the Internet, and all users have been granted equal access. You are designated as
the network administrator. Due to a staff shortage, you also have to do some jobs that are
supposed to be done by an ordinary user. Which account should you use for this purpose?
A. Create a new user as non-administrative account for yourself.
B. Use another user's account.
C. Copy the Administrator account and rename it.
D. Do nothing. Keep using the Administrator account.
4. You have made some changes to file and directory permissions on one of the servers on your
network. You want to verify the new settings before informing the users of the changes. How
can you verify that the changes have taken affect and that no security problems arise from
them?
A. Ask a trusted user to perform the tests for you.
B. Use your own Administrator account to perform the tests.
C. Create a test account for the purpose.
D. Do nothing. Changes made with administrative privileges are always correct.
5. A server room is thickly populated, with about 120 servers installed on racks. Various
network and power cables make it very difficult to work on the servers. When a technician
has to work on the servers, usually it takes him or her a long time to trace the cables. On
several occasions, some cables have been accidentally pulled in the process. Which of the
following should you do to avoid further problems?
A. Replace older cables with longer cables.
B. Put identification labels on all cables.
C. Remove redundant network and power cables.
D. Reroute all network and power cables.
6. You are the LAN administrator for your company. You have couple Windows XP
Professional clients that dial in via PPP to the company network’s RAS server. You want the
remote clients to be assigned dynamic IP addresses. Upon connecting, you find that the
Windows XP computers didn’t get any IP address. What should you do?
A. Run ip config with the /release and /renew switch on the client
B. Run ipconfig with the /renew all switch on the client
C. Run winipcfg on the client
D. Run ipconfig/all
7. You are setting up a new Windows XP workstation on your network and your DHCP server
provides all of the normal TCP/IP configuration information. What must you do to configure
the IP address on the workstation after you add the TCP/IP protocol
A. Manually enter an IP address that is not in use on the network..
B. Find out what the subnet mask on your network is, and add this information only.
C. The DHCP option is enabled automatically, and the server will auto-configure
everything
D. Put the address of the router in the default gateway, and put all 0s in the IP field.
8. A Windows XP user complains that she cannot connect to any other computers on her local
subnet even when using the IP address to communicate. However, she can ping 127.0.0.1 and
her IP address and receive replies. Other users on her subnet do not report having any
trouble. What is the most probable cause of the problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured
correctly.
C. The NIC has a problem.
D. The computer is not configured to use DHCP
9. While reviewing the security logs for your server, you notice that a user on the Internet has
attempted to access your internal mail server. Although it appears that the user's attempts
were unsuccessful, you are still very concerned about the possibility that your systems may
be compromised. Which of the following solutions are you most likely to implement?
A. A more secure password policy
B. File-level encryption
C. Kerberos authentication
D. A firewall system at the connection point to the Internet
10. You are hired to investigate a slow performing network server for a client. Using the
performance monitor you obtain the following readings: CPU usage= 25%, Disk time= 25%,
Page faults/sec= 25.What one change will increase the performance of this network server is
the most?
A. buy another CPU
B. add another hard drive
C. increase RAM
D. add a second NIC
11. A large network with 500 users notices that at specific times in the morning and afternoon
network congestion ties up their computers. What is the most likely cause?
A. many users are logging on or off
B. power fluctuations
C. a terminator is not grounded
D. the switch connecting the network goes down
12. The best method to restore the latest copy of the registry in a Win 2003 Server is to select the
A. Emergency Repair Disk (ERD)
B. Recovery Console
C. Last Known Good Configuration
D. Ctrl +Alt + Del keys
13. The most efficient way to control security in a client/ server network is to assign permissions
to
A. each shared resource
B. groups
C. directories
D. user
14. The advantage of a Client/Server network over a Peer-to-Peer network is
A. Performance is better on a Peer-to-Peer
B. Security is better on a Client/Server
C. Easy to configure the Client/Server
D. Security is better on a Peer-to-Peer
15. A remote user calls your help desk and complains that she is unable to access internal
corporate network resource from the remote site. The user states that she can access the local
resource. To solve this problem, what is your primary advice?
A. Check whether she can ping successfully to the default gateway
B. Check whether the NIC is functioning
C. Check subnet mask of her Computer Setting
D. Check TCP/IP status of her computer
16. On a Network, where is a system acting as firewall typically located?
A. Between the client system and the server
B. Between two internal networks
C. Between the internal access point and in the internet
D. Between the internal network and internet access point
17. You are designing a network which needs to support 200 users. You do not plan to extend the
segment beyond the current number of users. Which subnet mask would best meet your
needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.255.255.200
18. You are the administrator for your company’s domain. You need to subdivide groups in your
organization with in active directory. If you want to separate sales from marketing
department, what could you use as a system of organizing this subdivision?
A. Creating Organizational units
B. Use user and Groups
C. Create site and subnet grouping
D. Build a container in a subnet group
19. A system administrator wants to remove a domain controller from a domain. Which of the
following is the easiest way to perform the task?
A. Reinstall server over existing installation and make the machine a member of group
B. Use remove command
C. Use Active directory installation wizard to demote the domain controller
D. Reinstall server over existing installation and make a machine a member of domain

20. The most secure and strong password from the following list is:
A. PassWOrd1
B. Pass_Word#1
C. PASSWORD1
D. paSS_Word1
21. You have just resolved a very complex network problem. During the process, you made
some configuration changes to a router and two of the Windows 2000 servers. The changes
were successful, and your manager is now very happy with your performance. What should
be your next step?
A. Ask your manager for a raise.
B. Document the changes you made to the router and servers.
C. Replicate the changes you made on two servers to all other servers.
D. Enable auditing on all servers to prevent problems in the future.

SECTION “B” – MATCHING TYPE QUESTIONS

Instructions for Section “B”


1. There are fifteen [_15_] questions in this section.
2. Match column “A” with column “B”. Select the letter of the correct answer from column “B”
and place your answer on the space provided before the number in column “A”.
3. If you wish to change your answer place an “x” mark on your previous answer and write
your preferred answer
4. A correct answer scores 1, an incorrect answer scores 0. No marks will be given for a
question if more than one answer is supplied.
Column A Ans Column B

1. Connector for 10BaseT Ethernet Cable 1. G A. Ipconfig


2. A network topology that have each computer connected
2. K B. Ring Topology
to a central device 3. R C. telnet
3. A topology that is the most fault tolerant and the 4. G D. DNS
highest levels of redundancy 5. E E. RJ-11

4. A Connector that is used with Thick net Cable 6. I F. Exchange Server


5. A Connector used in conjunction with Telephone 7. __ G. RJ-45
6. Display the IP Configuration information 8. __ H. Web Server

7. Display MAC Address of a Machine 9. Q I. ARP- a


10. C J. File Server
8.Used to check the network connectivity
11. D K. Star topology
9.Used to start to Install Active Directory
12. P L. Application Server
10.Used to establish a session with remote device
13. J M. ping
11. Resolve Domain Name in IP Address 14. F N. BNC
12. Dynamically assign IP address 15. L O. Net start
13. Used to share public resource P. DHCP

14.Used to access e-mails 16. Q. Dc promo


17. R. Mesh Topology
15.used to build, deploy and operate XML and Web Services
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
Matching

A Answer B

1. A graphical file extension A. Bit map

2. Access point B. Pixel

3. System file extension C. RJ-45

4. Password I D. MT-RS

5. A document file extension J E. BNC

6. Expansion slot M F. BMP

7. Virus N G. RAM

8. Pixel H. System

9. Optical device storage L I. A code used to go

10. Smallest picture domain B J. Document

11. Graphical document format K. Smart card

12. UTP Cable C L. CD-ROM & DVD ROM

13. Fiber Cable D M. PCI

14. Coaxial Cable E N. Self-duplicate computer

15. Peer to peer NW P O. Domain

16. Speed modem measurement Q P. Work group

17. Client to sever NW O Q. KB/s

18. CD-ROM driver measurement s R R. Bit/second

S.MB

T. Perman storage device

U. ROM

V. Icon
Matching

A Answ B

1) IP conflict 1. O A. KAIZEN

2) Telnet 2.H B. Work place communication

3) Objective AD geographical host name 3. C. Quality control

4) Two computer communicate internet 4.S D. SIT

5) Logical work group the same LAN 5. E. UDP

6)Geographical distribution 6.G F. FTP

7) Resolve IP address 7.M G. VLAN

8) Used to file transfer 8.F H. Login remote

9) Self-replicate computer 9.N I. MTRS

10) Continuous improvement 10.A J. 10xx

11) Used to communication 11.D K. Transport layer

12) Secret work cable attention 12. Q L. Ping

13) Used to verbal communication 13.B M.DNS

14) Wireless 14. R N. Worm

15) Connector fiber optics 15.I O. To the same IP address

P. Attenuation

Q. Password

R. Wi-Fi

S. NAT
Knowledge question

1. A device that allows you to segment a large network in to more is……..……bridge

2. Layer two(2) device

is………………………………………………………………….…switch

3. The default mask for class “A” in CIDR is…………………………………………/8

4. The risk for electrostatic discharge is greatest in……………………………….……Low

humidity

5. A hierarchical structure made up of multiple domain is……………………….…..tree

6. IP address conflict is……………………………………………..Addressing the same IP

7. Telnet……………………………………………………………….…….…remote log in

8. Class “B”

address…………………………………………………………………………….…..10xxx

9. Wireless

falsity……………………………………………………………….………………….…Wi-Fi

10. Allow to transfer file an

internet……………………………………………………………….…FTP

11. The configuration of cable, computer & other peripherals

is………………………….Topology

12. The best way to protect your hard drive is…………………………….…..regular back up

13. 6xx(message of problem or sign) indicates a problem of……………………….floppy drive

14. The best option for trouble shooting name resolution problem is…………. Ns lookup

15. Continuous

improvement…………………………………………………………….…….KAIZEN

16. Verity the DNS name resolution is working correctly is………………………..….Ns look up

17. Replicate itself to duplicate/spread to other is………………………………………Worm


18. Fiber optic cable connector is………………………………………………………..…MTRJ

19. A utility to determine we the a sper IP address is accessible is…………………ping

20. The full domain name is separated by…………………………………………….…..Dots

21. A sector word or a strong of characteristic used for user authentication is………….password

and user control

22. The first step to establish a LAN is…………………Requirement kangakomsu analysis

23. Loop back

address………………………………………………………………………….127.0.0.1

24. Hide the IP address of a private network from the internet is…………………..NAT

25. A system or a group of system that enforces an access control policy b/n network

is…………………………………………………………………………………..…..firewall

26. Type of network treat is…………………………………………..denial of service

27. Automatically assigns IP address……………………………………….………….DHCP

28. A communication protocol used for the transfer of information over the internet

is……………………………………………………………………………..…HTTP

29. Un reliable communications…………………………………………………….……….UDP

30. Resolve IP address

is………………………………………………………………….………DNS

31. Transport layer

is…………………………………………………………………..……Segmentation

32. A well-defined specification that allow a computers to communicate across a network

is……………………………………………………………….……….….Protocol
Matching

A Answ B

1. Used to share public resource B A. ART/A

2. Used to access email C B. File server

3. Service D C. Mail server

4. Display IP configuration L D. Web server

5. Display the MAC address of the mashing A E.DNS

6. Checking the connection of NW computer M F. RJ 45

7. Resolving IP address E G. RJ 11

8. Dynamic IP configuration I H. Float tolerant

9. 10 base T F I. DHCP

10. Telephone line G J. ring topology

11. Used to established & isolated used remote Devices J K. star topology

12. Connect to center devices K L.IP-configuration

13. Mesh topology H M. Ping

Try all the following questions.

Part I: Match the correct term from column “B” to their meaning under column “A”.

A Answ B

01) Loop back address A. Denial service

02) Well-defined network B. 127. 0.0.1

03) System or group dedicate of network C.Bad memory

04) A system of large network separated by bridge or router D. Authorization

05) Resolve IP address E. NAT

06) Assign an automatic IP address F. CSMA/CD

07) Type of network threat G. UDP

08) Unreliable communication H. DNS

09) A degeneration signal of distance network I. DHCP


10) General section of communication over internet J. Firewall

11) A file transfer protocol communication over internet K. HTTP

12) Transport layer L. Attenuation

13) IPV4 M. Transport layer

14) Parity Error N. Protocol

15) A granting or denying system error O. Authentication

P. segmentation

Q. Switch Packet

Part II: Choose and encircle the best answers from given alternatives

1. A__________ connection network between two devices


A. poi nt to point C. switch
B. multi point D. Hub
2. Switch device is used to _________________OSI layer
A. Application C. Session
B. data link layer D. network
3. The network with 1s, 1bit is
A. unrest C. Broadcast
B. multicast D. Domain
4. In network connection of LAN the company uses IP address of 192.168.0.1. How many
subnets can the company uses?
A. 5 B. 4 C. 14 D. 15
5. In small area of LAN connection the IP address 4.5.6.7 represents the
classes of:
A. class A B. class B C. Class C D. class D
6. The computer connection to cables 10\100 refer is
A. fiber optic C. Minimum & maximum
B. Megabyte per second D. Speed

7. The OSI layer in to two sub layer CLL and sub layer MAC layer, which one OSI layer?
A. Network C. Data link
B. Session D. Physical
8. In a client/server network, client:
A. Ask information C. manage file
B. Provide information & file D. ALL.
9. A computer is with no Video media. It may be the problem of:
A. CMOS Battery C. Loose video card
B. Hard Disk D. Power supply
10. The computer does not work. Installing HDD what do you do next?
A. Floppy disk C. Partition
B. Format D. power
Part III: Match the correct term from column “B” to their meaning under column “A”.

Matching

A B

___1. Used to share public recourse A. ART/A

___2. Used to access email B. File Server

___3. Used to build deploy & operation XML web service C. Mail server

___4. Display IP configuration D. web server

___5. Display the MAC address of the mashing E. DNS

___6. Checking the connection of N/W computer F. RJ-45

___7. Resolving IP address G. RJ-11

___8. Dynamic IP configuration H. float tolerant

___9. 10 Base I. DHCP

___10. Telephone Line J. Ring Topology

___11. Used to establish &isolate remote devices K. star topology

___12. Connect to center Devices L. ipconfig

___13. Mesh Topology M. Ping


HOLETA ATVET COLLEGE
INSTITUTIONAL ASSESSMENT
Knowledge Test Booklet

Sector: ICT
Occupation: COMPUTER HARDWARE AND NETWORKING SERVICE
Structure of Test

Section Number of Number of marks Suggested time


questions [minutes]
A – Multiple choice questions 20 20
B – Matching Type 15 15
Total 35

Candidate name EndaloAmsaluKitessa

Candidate ID number

Training Provider Name/ASSESSMENT HOLETA ATVET COLLEGE


CENTER

The assessment covers the following units of competence:


1. Gather Data on Business Requirements
2. Determine Best-Fit Topology
3. Configure and Administer Server
4. Create Technical Documentation
5. Monitor and Administer Stem and Network Security
6. Provide First Level Remote Help Desk Support
7. Identify and Resolve Network Problems
8. Monitor Implementation of Work plan/Activities
9. Conduct / Facilitate User Training
10. Apply Quality Control
11. Lead Small Teams
12. Lead Workplace Communication
13. Improve Business Practice
14. Maintain Quality System and Continuous Improvement Processes (Kaizen)\
I. choose
1. A Circuit board inserted in to a slot on the system board to enhance the capability of the
computer is:-
a. Data card
b. IDE card
c. Expansion card
d. Driver card
2. A computer that connects different networks in order to help for communication among
themselves
a. Router
b. Server
c. Mobile
d. Ethernet switch
3. A Set of rules and standards which enable two end devices to communicate
a. Program
b. Protocol
c. DNS
d. Browser
4. A signal over flow from an adjacent wire
a. NEXT
b. Cross talk
c. Token ring
d. Interference

5. Ato Belay installs two different antiviruses after he restarted the computer he can’t log onto
the computer because of the conflict of the two antiviruses to solve this problem without
formatting he should
a. restart the computer, press F12 , restore
b. restart the computer, press F12, start normally, restore
c. restart the computer, press F8, restore
d. restart the computer, press F8, start normally, restore
6. Cable that carries digital data in the form of modulated pulse of light is
a. STP
b. Light wave
c. Optical fiber
d. Copper Cable
7. Component used for temporary storage to avoid waiting state is:-
a) Hard disk
b) RAM
c) CD - ROM
d) Caches memory
8. Expansion Card that modulates digital data from computer to analog format that can be sent
over telephone lines and then demodulates it back in to digital form is:-
a) Modem
b) ADSL
c) Network interface Card
d) RJ-11

9. IP address pool provides a maximum of only 254 host addresses per network ID.
a. Class A
b. Class D
c. Class E
d. Class C
10. -------- is a protocol used to provide remote terminals access over network
a. TFTP
b. Telnet
c. Ping
d. Tracet
11. One of the computer hardware components listed below is not getting power supply from the
motherboard
a. Hard Disk
b. RAM
c. CPU
d. Expansion Card
12. Optical fiber cables transmit data in the form of light. One of the following devices is used to
convert data from the electric signal to light and convert light back to electric signal at the
destination computer
a. Modem
b. Multiplexer
c. Electromagnetic Induction
d. Codec
13. To connect two switches we use ------ type of RJ45 UTP cable
a. Crossover cable
b. Straight through
c. Rollover cable
d. DB 9 cable on both sides.
14. To test the IP stack on your local host, choose the right IP address to ping
a. 127.0.0.0
b. 127.0.0.1
c. 255.0.0.127
d. 255.255.255.255
15. The address range of a Class B network
a. 01xxxxxx
b. 0xxxxxxx
c. 10xxxxxx
d. 110xxxxx
16. The device used to prevent ESD between you & a computer component
a. Anti-static pad
b. Anti-static pouches
c. Anti-static wristband
d. Anti-static mat
17. The gradual deterioration of the signal strength across the long distance of ‘LAN’
a. Distortion
b. Attenuation
c. Amplification
d. Signal modification
18. The operating system uses a startup & after startup to provide software control of hardware
device
a. Unix
b. BIOS
c. Linux
d. Firmware
19. The physical arrangements or lay-out of computer, cable and other components
a. Protocol
b. Peer to Peer
c. Topology
d. Client-Server
20. You want to connect two computers to a network. The two computers are found 130 meter
and 300 meter away from the active devices (switch). Which type of cables would you think
to be more cost wise for your design?
a. UTP
b. Multimode
c. Single mode
d. Coaxial
Column A Column B

1. A cable in which multiple computer or network nodes A. PoP3


are attached in bus topology. B. RJ-45
2. A classless routing protocol C. telnet
3. A network station that provides service for client D. IEEE
4. A command used for logging onto a remote computer E. Firewall
for network F. CSMA/CA
5. A company that sells internet connection G. ISP
6. A program designed to protect the network from H. Fiber-optics
different viruses and limit traffic into the LAN. I. RIPV2
7. An OSI layer responsible for dividing up block of J. BNC
data into smaller data K. Session layer
8. An OSI layer that sets up, manages and tears down L. CSMA/CD
similar applications communication between presentation M. Router
layer entities N. Coaxial cable
9. Carry digital data signal in the form of modulated pulse O. SNMP
10. Communication that uses a direct and dedicated P. Backbone or Trunk
connection for the duration of the transmission. Q. Transport layer
11. Ethernet access method which controls multiple access R. Circuit Switched
at same time. S. Server
12. Standard connector used for coaxial cable T. Packet Switched
13. Standard connector used for UTP cable
14. Protocol used to receive email from the mail server
15. The professional organization that produce
standard specification for Ethernet network.
LEVEL III
Project Information
Given the necessary materials and supplies the candidate is expected to perform the following
project:
Recommended Assessment place: Well equipped IT lab with server environment

Project Title: -Server Configuration and Administration


Time allotted: 4:00 hrs
Task1:- Installation of Server Operating System
a. Connect the necessary peripheral devices of the Server Computer and make ready
for Server Operating System installation.
b. Make ready other two Computers by installing Operating System and necessary
software on them.
c. Install Windows Server 2003 Operating System on the Server Computer
d. Install the necessary drivers for the devices
e. Establish connections among the Server and the Clients
f. Configure the Server as a DNS and Active Directory for the Server Computer
using the COC.local as a domain name.

Task2:- Server Administration and Security Configuration


1. Create Groups of Computer using two group names FINANCE and ADMINISTRATION
and make sure that the Client Computers joined the groups.
2. Create Users and Passwords for the two Groups as follows:
A For FINANCE group, Users (COCUser1 and COCUser2), Password (user1 and
user2) respectively.
B For ADMINISTRATION group, Users (COCUser3 and COCUser4), Password
(user3 and user4) respectively.
3. Create user privileges to change their passwords at first login for Users COCUser3 and
COCUser4.
4. Set the Access limitation time for the FINANCE group users to access the network from
Monday to Friday from 8:00AM to 5:00PM only.
5. Add (join) the Client Computers to the Domain COC.local.
6. Turn on Windows Firewall for the Server Computer
Matching

A B

1. Hard ware problem C A. Packet

2. NIC driver not install E B. arp-a

3. Type of correct user name pass word S C. Nicfailer

4. Coaxial Cable connector L D. Telnet

5. In correct color arrangement UTP install F E. Software problem

6. Used to install active directory I F. Cable problem

7. The 1stTrouble shouting N G. RJ-45

8. Used to Established segment withed device T H. Operator problem

9. Display protocol static & N.W connector TCP/IP I. Dc-promo


connector

10. Used to access connector J. Web server

11. N.W layer data link format B K. Message

12. Fiber option cable connector M L. BNC

13. Display address of machine p M. MT R/J

14. UTP cable connector N. Establish /Identify system

15. Application Layer data format O. Net static

P. Exchange server

Q. RJ-11

R. Fail- server

S. event log

T. T- connector
Coc simulation

A Answ B

1. Connector for to base Ethernet cable G A. Ipconfig

2. A network topology that have each computer Connect to central J B. Ring topology
device

3. A topology that is the most fault tolerant and Highest level of R C. Telnet
redundancy

4. A computer that is used with thick net cable N D. DNS

5. A computer used in un junction with telephone E E. RJ-11

6. Display the ip configuration information A F. Exchange server

7. Display MAC address of a machine I G. RJ-45

8. Used to check the network connectivity M H. Web server

9. Used to establish a session with remote device C I. ARP-A

10. Used to start install active directory Q J. Star topology

11. Resolve domain name in ip address D K. File server

12. Dynamically assign ip address P L. Application server

13. Used to access e-mail L M. Ping

14. Used to share public resources K N. BNS

15. Used to build employ and operate XML are Web service H O. Net-static

P.DHCP

Q. Dc-promo

R. Mesh topology
A ANS B

1. Modem B. Ip conflict

2. The most wide server of the feature on the nw server C. DNS

3. The compliments of hard driver D. Synchronous

4. TCP protocol access of the network E. Write documents

5. Topology provide of access network F. Ring

6. Resolution G. Windows file system

7. Ntss H. Slang

8. Pixils I. Work plan

9. The standard cable types use to apply J. FTP

10. Cross over cable used to connect K. Meshin

11. Display the configure on windows L. Raid

12. Security M. DHCP

13. Preafal N. Computer to computer

14. Reports O. Display image on the screen

15. There of the VRGAI P. Authorization

Q. Switch

Das könnte Ihnen auch gefallen