Ministry of Education Sector: Economic Infrastructure Sub Sector: Information Technology Occupation: Hardware and Network Servicing Level III
Ministry of Education Sector: Economic Infrastructure Sub Sector: Information Technology Occupation: Hardware and Network Servicing Level III
Ministry of Education Sector: Economic Infrastructure Sub Sector: Information Technology Occupation: Hardware and Network Servicing Level III
Ministry of Education
Level III
Candidate name
Registration number
Name of training provider
Name of Assessment Center
Structure of Test
December 2014
Instructions
1. Write your name, Registration number, name of training provider and Assessment
center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited Assessor
5. You may use the following references in this test
Non-programmable calculators
6. Do not bring the following items into the assessment venue
Mobile telephones
Programmable calculators
Written notes
1. You have been asked to install a network that will provide the network users with the
greatest amount of fault tolerance. The preferred network topology.
A. Star
B. Ring
C. Mesh
D. Bus
2. Firewall function
3. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.
4. The reason that end users need to be aware of the security policy.
5. You are requested to setup a 100Mbps network for a client in an office that already has
10Mbps throughput. Your client wants to keep the costs to a minimum but he needs the
100Mbps throughput. The cabling solution you recommend.
A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable
6. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.
7. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
C. Favor some individuals in your team
D. Assign responsibilities to team members
8. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.
A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down
9. An application that used to remotely and securely access the remote server.
A. Telnet
B. SSH
C. SFTP
D. RSA
10. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization
11. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
C. Routing is enabled on your workstation.
D. The firewall is enabled.
12. While gathering data to determine the organization business requirement you might take
records of the organization like organizational policies and procedures. These kinds of
information resources are considered as
A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources
13. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?
14. A user can login to his computer but cannot access network resources. The user has all
the appropriate group memberships and permissions, but he still cannot access shared
resources. The cause of this problem
15. You enable disk quotas on a Windows Server 2008 file server. You configure a quota
limit of 100MB. A user, named Eyob, reports that he can still save large files to the
server, even though he is well above his quota limit. What should you do to correct the
problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the
Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.
16. A hierarchical structure made up of multiple domains that trust each other.
A. Root
B. Site
C. Organizational Unit
D. Tree
17. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?
18. When you tried to login to the server, your trial may failed, this failure event is recorded
in
A. System log
B. Security log
C. Application log
D. Event log
19. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure programs
at startup.
A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32
20. You have a server that runs Windows Server 2008. You need to identify all the unsigned
drivers that are installed on the server. What should you do?
A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.
21. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?
A. Reset her computer account through the Active Directory Users and Computers
utility.
B. Reset her computer account through Computer Management.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-line
utility.
Column A -2 Column B
___1. Loop back IP address A. Physical layer
___2. Define hardware connections and turns binary in to B. TRACERT
pulses(electrical or light) and also uses repeaters C. 10.1.10.1
and hubs D. HOSTNAME
___3. Used to diagnose problems reaching a remote E. Data Link layer
system by tracing all routes between two points F. 172.20.0.20
___4.Broadcast IP Address G. Presentation layer
___5. Breaks data down into manageable chunks and H. NETSTAT
uses TCP and UDP I. 127.0.0.1
___6. . Used to diagnose DNS problems J. Session Layer
___7. Public IP Address K. 255.255.255.255
___8. Identifies devices on the physical layer and uses L. Network layer
MAC addresses M. 192.25.1.256
___9. Used simply to return the name of the local N. Transport layer
computer O. 213.55.96.148
___10. Class A IP Address P. NSLOOKUP
___11.Manages connections between machines and Q. 213.55.96.148
Sockets R. PING
___12. Used to display information on the current state
of all the running IP processes on your computer
___13. Class B IP Address