Reading Assignment
Reading Assignment
Reading Assignment
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
12. Which of the following is used for modulation and demodulation?
A. modem
B. protocols
C. gateway
D. multiplexer
E. None of the above
13. Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
14. Layer one of the OSI model is
A. physical layer
B. link layer
C. transport layer
D. network layer
E. None of the above
15. FTP Server Listens For Connection On Port
Number
A. 22 B. 25 C. 21 D. 23
16. A type of cabling used to connect a computer to a computer using.
A. Cross over C. Roll over B. SFP D. Straight through
17. The bit length of IPV6 address
A. 32 bits B. 192 bits C. 128 bits D. 64 bits
18. The schedule activities are based on a preset schedule that is established regardless of
need.
A. Interval based maintenance
B. Reactive maintenance
C. Predictive maintenance
D. Rehabilitation maintenance
19. A protocol which deals with resolving domain names is
A. SMTP B. POP3 C. DNS D. DHCP
20. Enabling additional users to handle administrative tasks for a particular objects is
referred to as:
A. Assignment B. Targeting C. Delegation D. Redirection
21. A network administrator is implementing a policy that requires strong, complex
passwords. Which data protection goal does this policy support?
A. Data integrity B. Data quality C. Data redundancy D. Data confidentiality
22. You want to implement a mechanism that automates the IP configuration,
including IP address, subnet mask, default getaway, and DNS information. Which
protocol will use to accomplish this?
A. SMTP B. DHCP C. ARP D. SNMP
23. Which connectivity method would be best for a corporate employee who works from
home two days a week, but needs secure access to internet corporate databases?
A. WiMAX B. Cable C. DSL D. VPN
24-------------------is the signal sent from a TV station to your TV
A. Full duplex B. Simplex C. Multiplex D. Half duplex
25. What type of network traffic requires QOS?
A. Video conferencing B. Wiki C. On-line purchasing D. Email
26. Which of the following device is used to connect two systems, especially if the systems
use different protocols?
A.hub B. bridge C. gateway D. repeater
27. Which device performs the function of determining the path that messages
should take through internetworks?
A. A DSL modem
B. Router
C. A web server
D. A firewall
28. Where is a hub specified in the OSI Model?
A. Session layer B. Data link Layer C. Physical Layer D. Application layer
29. Used for resolving IP addresses to name and names to IP Address
A. FTP Server B. DHCP Server C. DNS Server D. Proxy Server
30. HTTPS Protocol uses A port number
A. 21 B. 80 C. 443 D. 67
31. In network system if there is a DHCP server than the client will easily get
A. IP Address B. URL Address C. MAC address D. Port Address
32. Which One of the Following Used to Protect Computer from Unauthorized Remote
Access?
A. Router B. Bridge C. Firewall D. ADSL
33. When You Maintain and Troubleshoot a Computer the Final Stage Will Be
A. Documenting B. Assembling C. Formatting D. Testing
34. A Network Tools That Used to Check the STATUS OF The Network is
.
A. Netstat B. Ipconfig C. Tracert D. Ping
35. A Special Computer That Used to Manage Resources in a Networked Environment
A. Sever Computer B. Laptop Computer C. Client Computer D. Handheld Computer
36. A Network Services that Provides through a Fixed Wired Line for Voice
Purpose is
A. Aero Net B. Public Standard Telephone Network (PSTN) C. Infrared D. Satellite
37. A Leadership Style in Which the Leader Includes One or More Employees in The
Decision- Making Process is
A. Federal B. Authoritarian or Autocratic C. Delegate or Free Reign D. Participative or
Democratic
38. A computer cannot communicate with any of the computer on a different network
segment. It has no problem connecting to other computer that is located on its own
network segment. The IP address parameter that is possibly incorrectly on the computer?
A. DNS server
B. Default gateway
C. IP address
D. Subnet Mask
39. There are one thousand employees in the entire company at present and the company is
experiencing growth. Additionally, some of the information that will be sent over the
network is confidential. Which network Types would be most appropriate in this situation?
40. At which layer of the OSI are 1s and 0s converted to a digital signal?
41. is the protocol used for communication between a web server and a web browser. By
default, it uses port 80.
A. HTML B. SMTP C. HTTP D. IMAP
42. A system to join two or more device and computers together to communicate and
share resources.
A. Network
B. Resource
C. NIC
D. Modem
43. Which topology the workstation goes down, it does not affect the entire network?
44. A user can determine the network settings on the client’s network interface cards as well as any
that a DHCP server has leased to your computer by typing the following command at a command
prompt.
45. Which class the IP addressing provides 24 bits of network addressing and 8 bits of host addressing
by default. The most secure and strong password from the following list is: A. Class A B. Class B
C. Class C D. Class D
47. You are troubleshooting a network using UTP twisted pair and suspect that the maximum length
has been exceeded. What is the maximum length of UTP twisted pair? A. 25 meters B. 1000 meters C.
10000 meters D. 100 meters
48. Each computer is connected to every other computer by separate cabling and network
offers superior redundancy and reliability.
49. A commercial organization with permanent connection to the internet that sells
temporary connections to subscribers.
50. Which of the following OSI layers is responsible for establishing connections between two devices?
51. Which of the following devices forwards data packets to all connected ports?
52. Which of the following definitions describe the loss of signal strength as a signal Travels
through a particular media?
A. chatter
B. crosstalk
C. attenuation
D. EMI
53. A communication network which is used by large organization over regional, national or global
area is called
54. Which of the following network device two dissimilar networks can be connected and it operate
all layers of the OSI model?
55. Which one is the function network device amplifies the signal it receives on one port before
it transmits it on other ports?
56. Which of the following is not part of a Fully Qualified Domain Name?
57. Which one of the following is the correct syntax to ping the reach ability of
B. 192.168.1.1 PING
C. PING 192.168.1.1
D. PING\192.168.1.1
A. Breakdown Maintenance
B. Predictive Maintenance
C. Proactive Maintenance
D. Preventive Maintenance
59. One of your printers is not working properly and you want to prevent users from sending print
jobs to the logical printer servicing that device. What should you do?
67. Which of the following device is used to connect two systems, especially if the systems use different
protocols?
A. hub B. bridge C. gateway D. repeater E. None of the above
Limited user account: - user accounts that prevented from accessing several features . and
administrator account is a user account that has the highest level of access and control over
a computer system or network.
The maximum distance for Unshielded Twisted Pair cable is 100 meters
Repeaters are defined as a networking device that is used to amplify and generate the
incoming signal.
1byte is equivalents to 8bit.
Education domain name is edu.gov
A proxy server acts as an intermediary between a client and a server, facilitating requests
and responses between them. Here are some key points about proxy servers: Privacy and
Security:
(3)Firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules.
Virtual Private Network (VPN) is a service that creates a secure, encrypted connection
over a less secure network, such as the internet. Here are some key points about VPNs
Operating system (OS) is the software that manages computer hardware and software
resources and provides common services for computer programs.
DNS (Domain Name System) is the process of converting a domain name (like
www.example.com) into an IP address (like 192.0.2.1) that computers use to identify each
other on the network.
A server on the internet is often referred to as a "host."
Hub is a basic networking device that broadcasts data to all devices connected to it.
SMTP (Simple Mail Transfer Protocol) is primarily used for sending Receiving Emails.
USB (Universal Serial Bus) is a standard for connecting peripherals to a computer. It's
known for its "plug and play" capability, which means devices can be connected and used
without needing to restart the computer or install additional drivers.
Which one is not network serive technology A. Ethiotelecom B. Dsl C. Router D. Satalite
Which of the following is not Advantages of Kaizen?
Internet is a global network of interconnected computers and servers that communicate using
standardized protocols.
Caching is a technique used to store frequently accessed data in a temporary storage location, or
cache, to improve performance and reduce latency.
RJ45: This connector is used for UTP (Unshielded Twisted Pair) cables, which are commonly used
in Ethernet networks. RJ11: This connector is used for telephone lines. It typically has 4 or 6 pins
and is used to connect telephones.
Information help desk provides support, information, and solutions to customers, employees, or
both.
TCP/IP (Transmission Control Protocol/Internet Protocol) is known for providing reliable
connections, ensuring data is delivered accurately and in the correct order.
UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee delivery,
order, or error-checking, making it faster but less reliable than TCP.
How to find the MAC address of your device? ipconfig /all
Ping command is a network utility used to test the reachability of a host on an IP network and
measure the round-trip time for messages sent from the originating host to a destination computer.
Ping command is run on the command prompt (or terminal) of your operating system.
CMOS battery stores important system information, including the date and time.
For small organizations, Class C IP addresses are commonly used.
Authentication:-Logging into a website with a username and password. And Authorization: - After
logging in, determining whether the user can access certain files or perform specific actions.
WAN (Wide Area Network) is a telecommunications network that extends over a large
geographical area, often a country or continent.
LAN (Local Area Network) is a network that connects devices within a limited area, such as a
home, office, or building.
FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a
client and a server on a computer network.
If a shared printer is not working and a user has sent a print job? Stopping the shared printer can
be a temporary solution to prevent further issues.
Information related to users and groups is stored in the domain controller.
In-Country Disaster Recovery and Out-of-Country Disaster Recovery (reading assignment )
A virus is a harmful program designed corrupt or delete data, steal personal information.
Electrostatic Discharge (ESD) can indeed cause significant damage to electronic components,
including expansion boards.
HTTPS (Hypertext Transfer Protocol Secure) operates at the application layer of the TCP/IP
model.
Presentation layer is the sixth layer of the OSI model, is responsible for data translation,
encryption, and decryption.
Muda refers to waste or uselessness in a process. In lean manufacturing, it is minimized or
eliminated to improve efficiency and productivity.
DHCP stands for Dynamic Host Configuration Protocol.
IP address is essential for two devices to communicate over a network.
Peer-to-peer (P2P) network is a decentralized network where each device, or "peer," has equal
status and can act as both a client and a server.
Network is a collection of interconnected devices that communicate with each other to share