0% found this document useful (0 votes)
144 views

Server Configure

The document contains multiple choice questions about computer networking, hardware, operating systems and security. It tests knowledge in areas like TCP/IP configuration, troubleshooting hardware and software issues, file systems, policies and group policy, Active Directory and permissions. The questions have a single best answer format for topics that are important fundamentals for IT professionals.

Uploaded by

Endale Girume
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views

Server Configure

The document contains multiple choice questions about computer networking, hardware, operating systems and security. It tests knowledge in areas like TCP/IP configuration, troubleshooting hardware and software issues, file systems, policies and group policy, Active Directory and permissions. The questions have a single best answer format for topics that are important fundamentals for IT professionals.

Uploaded by

Endale Girume
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Select the letter that best answers the question and the space provided

1. A company with 40 computers needs to reduce repair costs, decrease downtime,


and reliability. Which task will meet these needs?
A. Enact a compressive security policy
B. Upgrade all the operating system
C. Create an automated system recovery CD
D. Develop a preventive maintenance plan
2. You have a TCP/IP network comprising nearly 30 computers. Currently, all
computers have been assigned IP addresses manually. The company is growing
fast , and a new consignment of 15 computers is arriving next week .You have
decided to install Dynamic Host Configuration Protocol ( DHCP) services on one of
the servers .identify which of the following are the advantages of using the DHCP
server in the network.
A. Assignment of IP addresses will be automated.
B. The name resolution process will be automated.
C. Network traffic problems can be resolved.
D. The network can be monitored more efficiently.
3. A user installs a new sound driver in a computer that is working properly. After
installing the driver for the new sound card the computer fails to boot. Which
quick fix can the user implement to return to the previous working state?
A. Boot to start windows normally.
B. Boot to recovery console
C. Boot to last known good configuration
D. Boot to emergency recovery state
4. Which of the following are good practices in resolving complex network
problems?
A. Work on the problem single-handedly because others might add to the
problem.
B. Gather as much information as you think would be helpful in resolving the
problem.
C. If you cannot fix a problem, ask for help from hardware vendors who
might have faced the same problem in the past.
D. Try to read the hardware specification documentation so that you can get
how to solve the problem.
5. From the following options, identify the most critical problem that should be
given highest priority if one of the user in you network has complained that
he/she cannot access a given file server but they can access other files.
A. Check the network interface card’s functionality
B. Check the network response time.
C. Check whether the file is corrupted by malicious codes.
D. Check if the file server is reachable by your workstation
6. A system administrator is trying to determine which file system to use for server
that will become an active directory domain controller. Here the company’s
requirements include the following
 The file system must allow for file security
 The file system must make efficient use of space on larger partitions
 The file system must allow auditing of logs and access to sensitive file
Which of the following file systems meets those requirements?
A. FAT C. FAT32
B. NTFS D. HPFS
7. One of the servers in your NOC crashed twice in one day. You have been
assigned as an administrator and event delegated one junior network practitioner
to find out the cause of the failure. Which of the following should be your advice
for this practitioner to perform for the first time?
A. Tell him to install the latest service pack.
B. Tell to Upgrade the NOS.
C. Tell to check the event logs.
D. Tell to wait for the next time the server crashes.
8. A customer orders a new computer and specify an internal read write ,
nonvolatile storage device that uses low power ,has fast access to data , and is
reliable. What is a suitable storage device that meets these requirements?
A. DVD+/-RW drive
B. SATA hard drive
C. Solid state drive
D. USB flash drive
9. One of the following is not the basic necessities reason that writing policies and
procedures.
A. Operational need
B. Continuous improvement
C. Risk management
D. Maintain good name of the organization
10. One of the following policies is not included in information security policy
documents,
A. Copy right policy
B. Firewall policy
C. Data classification policy
D. Application Certification management policy
11. Which of the following is features of the Microsoft management console (MMC)
A. It displays computer performance information
B. It organizes operating system snap-ins
C. It requires administrative privilege to accesses
D. It enables virtual memories settings to be customized
12. Display data on hardware components such as Memory, CPU, and the hard
drive in a chart or graph which describes how these devices are operating.
A. Network Monitor C. Performance Monitor
B. Task Manager D. Protocol Analyzer
13. You are installing cables for an Ethernet network in an office. The office
manager doesn’t want the media hanging in the crawl spaces and drop ceiling
and wants you to share an existing conduit that already has telephone cables to
hide the network cables you are installing. The cable segments will not be over
100 m. which type of media should you choose?
A. Coaxial C. UTP
B. STP D. Fiber optic
14. Your customer has a client/server Ethernet network consisting of a server and
255 computers running Windows XP. what kind of security would you recommend
to him for centralized control of access to files and directories on the network?
A. Setup a password for each file and groups for each directory
B. Setup a password for each file and directory shared
C. Setup groups of shared resources and users who have access to these
groups
D. Setup a password for each user
15. You are hired to setup a 100Mbps Ethernet network for a client in an office
that already has cat 3 UTP installed. Your client wants to keep the costs to a
minimum but needs the 100Mbps throughput. What should you recommend?
A. Keep the existing cable but purchase 100Mbps hubs
B. Buy new cat 5 UTP and if not already installed 100 Mbps hubs and 100 Mbps
NICs
C. Keep the existing infrastructure
D.Keep the existing cable but use 100Mbps patch cable from the wall outlet
16. A network administrator connects hosts A & B directly though the network
interface cards, however pinging between the hosts are unsuccessful. To provide
connectivity between hosts
A. A cross over cable should be used
B. A rollover cable should be used
C. Straight through cable should be used
D.Default gateway needs to be set on each host.
17. There are three types of Hubs. Which of the following options correctly
describes these types hub?
A. Passive ,dormant, special
B. Active ,dormant, passive
C. Passive ,active ,intelligent
D.Passive ,Active ,Turbo
18. As user attempt to boot the computer, the message “NTLDR is missing “is
observed on the screen. What will result from this situation?
A. The BIOS setup utility will start automatically
B. The computer will reboot continuously
C. The operating system will fail to load.
D.The initial self-test will fail to load.
19. A security policy defines
A. When users cannot log in to their computers
B. What users can and cannot do withier computer
C. How the user should install their down software
D. How complex user password should be
20. The IT manager asks you for a diagram showing every server on the network
the diagram that you should provide to his/her
A. Baseline network diagram
B. Logical network diagram
C. Physical network diagram
D. Wiring network diagram
21. Yonatan has been asked to find and implement an application that will enable
his boss to log in to and control a server remotely and securely. The application
that would work best
A. E- mail C. SSH
B. FTP D. Telnet
22. A place where you could find list of problem that occurred on a system
A. Event viewer C. RAID
B. Network diagram D. Wiring schematic
23. You want all network clients to download and install updates automatically
during night hours, however, you discover that some users are turning off their
machine s at night and updates are not being applied. The group policy that
enables you to correct this situation without changing the installation schedule?
A. Configure automatic updates
B. No auto-restart for updates scheduled installations
C. Reschedule automatic updates scheduled installations
D. Specified intranet Microsoft update service location
24. You are creating a number of user objects for a team of your organization
temporary workers. They will daily 9 a.m. to 5p.m. on contract that is
scheduled to begin in one month and end two months latter. They will bot
work outside of that schedule. The properties that you should bot configure
initially to ensure maximum security for the objects
A. Password never expires
B. Password
C. Logon hours account expires
25. When you open the properties dialog box for a computer objects in the active
directory users and computers console, you discover that no properties are
displayed in the operating system tab. The causes that make these properties
to be absent
A. Password expired
B. Operating system has problems
C. Console is not opened properly
D. Computer has not joined domain
26. The minimum NTFS permissions required to allow users to open documents
and run program stored in a shared folder
A. Full control
B. List folder contents
C. Read & execute
D. Write
27. Assume that you are giving service add you want to measure its quality. The
best way to go about it.
A. Assess the time it takes to deliver the service
B. Implement periodic self-assessment to be completed by staff only
C. To give survey at the end of each interaction with customers to measure
their satisfaction
D. Wait until you receive a complaint from customers
28. Assume you ware working a project on IT training need assessment. The best
way of collecting detailing information?
A. Questioner C. Observation
B. Interview D. Research
29. Which one of the following is TPv6
A. 1:: B. 127.0.0.1 C. 1: D. ::1
30. . You install file and printer sharing for Ms Networks. You share a folder and
leave the password option blank. Who can gain access to the folder?
A. anyone who can gain access to your network and has a Ms redirector such as
the client for Ms network install
B. windows 98 will not allow a blank password in this field
C. anyone with internet explorer installed
D. only users that are members of the same workgroup as you
31. Access to files and folders in win server 2008 is accomplished
using__________?
A. compression c. permission
B. tunneling d. All
32. Your customer has a client/server Ethernet network consisting of a server
and 255 computers running win NT4. What kind of security would you
recommend to him for centralized control of access to files and directories on
the network?
A. use a password for each file and groups for each directory
B. use a password for each file and directory shared
C. setup groups of shared resources and users who have access to these groups
D. All
33. How is resources sharing recognized in peer-to-peer network
A. by the user of the local machine c. by the server configuration
B. by the network administrator d. by the network manage
34. After replacing a new model of modem card, what would you do as an IT
TECHNICIAN?
A. update modem driver c. Both A&B
B. install modem driver d. none
35. Which of the following constitute a valid computer startup sequence?
a. POST, initialization, bootup c. initialization, bootup, POST
b. bootup, POST, initialization d. initialization,POST, bootup
36. Your desktop is displaying a black shade at the edge of screen, so as an IT
expert what do you do first ?
A. install NIC driver c. install VGA driver
B. change the desktop background d. none
37. Which layers of the OSI model are host-to-host layer?
A. transport, session, presentation, application
B. network, transport, session, presentation
C. data link, network, transport, session
D. physical, data link, network, transport
38. As IT technician what you do, if you need to install windows xp over the
entire network(10pcs)
a. Install the xp to all pc separately
b. upgrade the xp to all separately
c. put the xp cd on screen pc and then share the driver to setup
d. A and C
39. How many bits does an IPV4 address consist of
a. 24 bits c. 48 bits
b. 32 bits d. 64 bits
40. Which of the following layer of OSI model also called end-to-end layer?
A. session c. physical
B. presentation d. transport
41. when checking the following TCP/IP protocol you have just finished
installing for connectivity the proper first step it to_________?
a. PING another computer on the at segment
b. PING 127.0.0.1
c. PING the default gateway
42. What is the binary network ID of the loopback IP ADDRESS?
a. 1 c.0
b. 10101010 d. 11111110
43. Which of the following describe the north bridge component holds
a. memory controller c. keyboard and input/output
b. parallel port d. all
44. Which of the following is home for internet infrastructure
a. network connectivity c. computer equipment
b. data center d. none
45. for increase security of win 2000 enable encryption of files/folders on
_____volumes
a. FAT32 c. Either FAT32 or NTFS
b. NTFS d. none
46. which of the following bases fir exchange over the WWW pages
a. SMPT c. FTP
b. HTTP d. TCP
47. Which of the following software we use for design network infrastructure
diagram
a. Auto CAD c. Ubuntu
b. MS-Visio d. server 2008
48. Which of the following is used to automate the IP configuration of network
client
a. DNS c. WINS
b. DHCP d. ARP
49. A text formatting language used to create web page
a. HTML c. Internet Explorer
b. PPT d. All
50. A security policy defines
a. When users cannot log into theirs computers
B. what users can and cannot do with their computers
C. how the users should install their own software
D. how complex user password should
51. The IT managers ask you for a diagram showing every server on the
network. The diagram that should provide to him/her
a. Baseline network diagram b. logical network diagram
c. physical network diagram d. wining network diagram
52. Yonatan has been asked to find for implement an application that will enable
his boss to login into and control a server remotely and security. The application
that would works best
a. E-mail b. FTP c. SSH d. telnet
53. a place where you could find a list of problem that occurred on system
a. event viewer b. network diagram
c. RAID d. wiring schemteratic
54. You want all network alerts to download and install updates automatically
during night hours and you have configured installation behavior for automatic
updates .However. You discover that some users turning off their machines at
night and update are not installing application. The group policy that enables
you to correct this situation without changing the installation schedule?
A. configure automatic updates
B. not-auto restart for schedule automatic updates installations
C. reschedules automatic updates schedule installation
D. specify internet Microsoft update service location
55. You are creating a member of user objective for a team of your organizations
temporary workers. They will work daily from 9 am to 5 pm on contract that
schedule to helping in one month and end two months later. They will network
override of that schedule. The properties that you should not configure initially
to ensure security for objectives
A. password never expires b. password
C. logon hours d. Account expires
56. When you open the properties dialog box for computer object in the
directory users and computers console. You discover that no properties are
displayed in the operating system tab. The cause that these properties to be
absent.
A. password expires b. operating system has problem
C. console is not opened property d. computer has not joined to domain
57. The minimum NTFS permission required to allow users to open documents
and runs programs needed in shared folders
A. full control b. list folder contents
C. read and executes d. writes
58. Assume that you are giving services and you want to measure this quality.
The best way to go about it
A. asses the time it takes to delivers the services
B. implements periodic self-assessment to be completed by staff only
C. to give out survey at the end of each interaction with customers to
measures their satisfaction
d. wait until you receive compliant from customers
59. Assume you were working a project on IT training needed assessment. The
best way of collecting detailed information?
a. questioner b. interview c. observation d. Research
60. A user calls for support, complaining that when she takes her laptop home.
She is unable to connect to the network. When she uses ipconfig to view IP
address, the address being with the solution to solve this problem.
A. configure the DNS server on the user’s home router
B. configure the laptop to use an alternative configuration suitable for the
user’s home network
C. manually configure the laptop with any static IP address
D. manually receives and renews the address by using ipconfig
61. You are directing a team of system administers who are for isolating multiple
connectivity issues on a network segment. Before you begin to alter
configuration information on client computer, you are not required to
a. Begin documentation
b. create an action plan to perform isolation tasks
c. perform an inventory of the system
d. provide a mean of restoring the initial state of the computer
62. You are made some changes to file and directory permission on one of the
servers on your network. You want to verify the settings before information the
users of the changes. The best to verify that changes have taken affect and no
security problem arise from them.
a. Ask a trust user to perform the tests for you
B. create a test account for the purpose
C. does nothing, changes made with administrative privileges are always
correct
63. One security methods is encryption does nothing to keep digital postal and
hacker out. To accomplish this goal, we need
a. bridges b. firewalls c. Hubs d. routers
64. A new client lives in, outside the connectivity radius of the local cable
company and definitely more than 20,000 feet way from the nearest switching
center the phone company. The connectivity option that offer the client the best
performance
a. cable b. dialup c. DSL d. satellite
65. Johannes walked up to a computer that couldn’t connect to the internet and
immediately opened a command line windows and typed 27.0.0.1 the reason for
doing this
a. he wanted to test the connection to the default gateway
b. he wanted to test the connection to the neatest tier to router
c. he wanted to test the NIC to the default gateway
d. he wanted to test the NIC on the local machine
66. You want to purpose new networking project for your organization the best
approach to implement your new project
a. apply your project first and report the project
b. hire necessary man power for the project
c. present your project benefit, to management board
d. search for a fund to implement your project
67. Server manager is a great tool for managing most of your server settings and configuration
all in one central place. Which one of the following Server manager Features is used for
Storage management, replication and searching?
a. Dynamic Host Configuration c, Domain Name Service
Server d. File Services
b. Terminal Services
68. Server manager is a great tool for managing most of your server settings and configuration
all in one central place. Which one of the following Server manager Features is used for
management of Public Key Infrastructure?
a. Dynamic Host Configuration Server c. Domain Name Service
b. WINS Server d. Active Directory Certificate Services

69. Your IT manager is concerned that someone is trying to gain access to your
company's computers by logging on with valid domain user names and various
password attempts. Which audit policy should you monitor for these activities?

a. Policy Change c. Privilege Use


b. Account Logon d. Directory Service Access
70. An IPv4 address consists of _______ bits.
a.       4 c.       32
b.      8 d.      64
71. Which file system provides you quota and security?
a.      NTFS c.       FAT
b.      FST d.      FAT32
72. DHCP (dynamic host configuration protocol) provides _____ to the client.

a) IP address c) url
b) MAC address d) none of the mentioned
73. DHCP is used for

a) IPv6 c) both (a) and (b)


b) IPv4 d) none of the mentioned
74. Which of the following server is require to resolve server name into ip and vice-versa?
a.       WDS c.       FTP
b.      DNS d.      IP SERVER
75. Mukesh works in a company that has an AD DS forest that consists of a forest root domain
plus five domains. He should create a group that contains 70 users who require access to
resources in all six domains. All the user accounts are located in the forest root domain.
Which of the following group scope he should use?
A. Universal C. Local
B. Domain local D. Global
76. IIS stands for?
a.       Internet Information Services c.       Inter information service
b.      International internet service d.      Information internet server
77. Which of the following terms describes the process of granting users access to file server
shares by reading their permissions?
A. Authentication C. Enumeration
B. Authorization D. Assignment
78.
79.
80. cbxvdn

PART TWO (matching)


Match column A to column B and write the letter on the space provided
Column A Column B
1. Mail server calendaring software and contact manager developed by A. Active Directory Migration
Microsoft. Tool
2. Family security software by Microsoft that is designed in help protects B. Delegation Control Wizard
computer networks, network server such as Microsoft exchange server and C. Dictionary attack
share point server and individual and devices. D. DS move
3. Software application for computer aided designed and drafting the E. Drag and drop
software supports both 2& 3d format. F. Identification number (PIN)
4. Diagramming & vector graphic application which is a part of the Microsoft G. Secondary Logon
suite. H. Strong Password
5. A computer operating system distributed as free and open source software I. Hub
using its own desktop environment. J. Proxy Server
6. Unix- based OS designed primarily for touch screen mobile devices such as K. File Server
smart phones & tablet computers. L. Switch
7. An open source relational data base management system that run as a M. Application Server
server providing multi-user access to a number of data bases. N. Android
8. A combination of hardware & software used to monitor and administer O. AutoCAD
computer network. P. Microsoft exchange
9. Allows various object types to be moved from current location to a new Q. Microsoft server 2008
location R. Microsoft share point
10. Allows administrators to log on with a non-administrator account to S. Microsoft Visio
perform administrative tasks without logging off. T. MYSQL
11. to migrate objects in Active Directory forests U. Network management
12. used to build, deploy and operate XML and web service system(NMS)
13. One part of dictionary V. Ubuntu
14. The service of domain name
15. OU moving
16. Separate collusion domain and same broadcast
17. All ports are in the same collusion and broadcast domain
18. Used to share public resource
19. Show only one ip address for multiple users on the subnet
20. Not Hacking and cracking password
21. ATM(Automated Teller Machine)

You might also like