Hns Knowledge Short Notes
Hns Knowledge Short Notes
2. You are the network administrator for a small window 2003. One of your users has come to you because he
cannot remember the password he uses to log onto your windows server 2003 domain. Which utility should you
use to change a user’s password?
A. The set pass utility
B. Password Administrator
C. Password Manager
D. The Active Directory Users and Computers Utility
Answer: D
🖙 To set up and manage domain user accounts, you use the Active Directory Users and Computers
utility. Right click the user whose password you want to change and select Reset password.
3. You are a network administrator in your office. You have 255.255.255.224 subnet mask. What is the maximum
number of IP addresses that can be assigned to hosts on a local subnet that uses this subnet?
A. 15
B. 30
C. 16
D. 14
Answer: B
Usable subnet mask is 255.255.255.254 minus the given IP address 255.255.255.224 is
equal to 30 or Convert IP address 224 to binary number is equal to 11100000 see the
table, how to convert. A /27 (255.255.255.224) is 3 bits on and 5 bits off. That means to
know the maximum usable IP address 2n – n. The 5 bits off 25-2= 32-2 =30.This
provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class
A, B, or C network address? Not at all. The number of host bits would never change.
🖙 Corrective or Breakdown maintenance: it implies that repairs are made after the equipment is failed and
🖙 Scheduled maintenance: it is a stitch-in-time procedure and incorporates, inspection, lubrication, repair and
🖙 Preventive Maintenance (PM): Principle “Prevention is better than cure” Procedure - Stitch-in-time. It loc
🖙 In predictive maintenance, machinery conditions are periodically monitored and this enables the maintena
A. Hybrid
B. Mesh
C. Star
D. Bus
Answer: B
A mesh topology network offers superior redundancy and reliability. In a mesh topology, each
computer is connected to every other computer by separate cabling. This configuration provides
redundant paths throughout the network so that if one cable fails, another will take over the traffic.
While ease of troubleshooting and increased reliability is definite pluses, these networks are expensive
to install because they use a lot of cabling. Often, a mesh topology will be used in conjunction with
other topologies to form a hybrid topology.
68. Sending a file from your personal computer primary memory or disk to another computer is called?
A. Hang on
B. Logging on
C. Uploading
D. Downloading
69. A communication
Answer: C network which is used by large organization over regional, national or global area is called
A. LAN
B. WAN
C. MAN
D. Intranet
Answer: B
70. Which
A WANof thetypically
following network
connects deviceLANs
separate two dissimilar networks
at different can locations.
geographic be connected and are
WANs it operate all that
networks layers of the
OSIcover
model?
very large geographical area such as a country or the whole world.
A. Router
B. Switch
C. Bridge
D. Gateway
Answer: D
71. Which one is the function network device amplifies the signal it receives on one port before it transmits it on
other ports?
A. Switch/hub
B. Router
C. Bridge
D. Repeater
Answer: D
72. You are the network administrator for a small company. Your company has one windows server 2003 computer configured
Repeaters are usually used to strengthen signals going long distances. It amplifies the signal, there by
as a domain controller and 25 clients running windows XP professional. You want to ensure that your server stays up to date
extending the usable length of the bus. A repeater amplifies the signal it receives on one port before it
through windows automatic update. Where should your server to use windows automatic update?
transmits
A. Throughit on
theother ports. Repeaters are usually used to strengthen signals going long distances. It amplifies
registry
the signal, there by extending
B. Start – control panel – system theand
usable
clicklength of the bus.
the Automatic A repeater
updates tab amplifies the signal it receives on one
port before it transmits it on other ports.
C. Start – All programs – Accessories – system tools – windows update
D. Through the group policy
Answer: B
74. Which name must be unique for every system on the network?
A. The workgroup name
B. The computer name
C. The domain name
D. The user name
Answer: B
75. Which of the following network components allow digital signal to be transmitted across an analogue link?
A. Router
B. Modem
C. Fiber optics
D. Firewall
Answer: B
84. You are the network administrator for a small company. Your network consists of one windows server 2003
server, which is configured as a domain controller, with 250 client computers. You want to make license
management as easy as possible. Which of the following utilities should you use to configure licensing?
A. Administrative tools- Licensing
B. Administrative tools- License manager
C. Control panel- License manager
D. Control panel- Licensing
Answer: B
85. You are a network Administrator in your company. You are given with the following IP address. The network
address 192.168.10.0 and subnet mask 255. 255. 255.224. Depending on the above network address and subnet
mask how many subnets you can create?
A. 16
B. 32
C. 48
D. 8
Answer: D
Convert IP address 224 = 11100000 3 bit on 2n => 23 = 8 subnets and 5 bit off 2n => 25 = 32 hosts
86. Which layer organizes and synchronizes the exchange of data between application processes?
A. Application layer
B. Session layer
C. Physical layer
D. Transport layer
Answer: B
Session layer: The layer that provides the means necessary for cooperating presentation entities to
organize
and synchronize their dialog and to manage their data exchange.
Application layer: The layer that provides means for the application processes to access the OSI
environment.
Presentation layer: The layer that provides for the selection of a common syntax for representing data and
for transformation of application data into and from this common syntax.
Transport layer: The layer that provides a reliable end-to-end data transfer service across networks.
Network layer: The layer that provides for the entities in the transport layer the means for transferring blocks of data,
by routing and switching through the network between the open systems in which those entities reside.
Data link layer: The layer that provides services to transfer data between network layer entities usually
in adjacent nodes.
91. Which of the following connectors are commonly used with fiber cabling?
A. Rj-45
B. Rj-11
C. BNC
D. SC
Answer: D
Fiber cable connectors are SC, ST, LC, MT-RJ
93. You are to back up a Windows Server 2003 file server every evening. You perform a manual, normal backup.
You will then schedule a backup job to run every evening for the next two weeks. Which backup type will
complete the fastest?
A. Normal
B. Differential
C. Incremental
D. Copy
Answer: C
94. As a computer technician which one of the following is the major problem of monitor?
A. Black screen and no power light
B. Slow down operation
C. No beep sound
D. Error code starts with one
Answer: A
Major problem of monitor:
Screen, Icon or Font Size Too Small or Too Big
Blank Screen or No Video
Distorted Image or Video, Flickering, Fuzzy, Blurry, or Color Problems
Brightness, Contrast, Horizontal Lines, Vertical Lines or Geometrical problems
Bright or Dead Pixel
95. What tool is used to enable remote desktop on a server?
A. Terminal services manager
B. Terminal services licensing
C. System properties in control panel
D. Terminal services configuration
Answer: C
96. Sequencing, acknowledgements and flow control are characteristic of which OSI layer?
A. Layer 6
B. Layer 3
C. Layer 4
D. Layer 1
Answer: C
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received
reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow
control, which are characteristics of the Transport layer (layer 4).
97. You would like to test the restore procedures on your server, but would also like to avoid affecting the production
copies of the backed-up data. What is the best restore location to use?
A. Original location
B. Alternate location
C. Single folder
Answer: B
Column A Column B
[A]1. Moves packets between computers on different networks and routers A. Network layer
operate at this layer B. 213.55.96.148
[D]2. Used to display information on the current state of all the running IP C. NETSTAT
processes on your computer D. IPCONFIG
[L]3. Class B IP Address E. PING
[O]4. Memory related error F. Quality Control
[M]5. Broadcast IP address G. TRACERT
[K]6. Identifies devices on the physical layer and MAC addresses are part of this layer H. 10.10.10.10
[E]7. Uses ICMP packets to show you if you can simply reach a remote computer I. 127.0.0.1
J. Work ethics
[G]8. Used to diagnoses problems reaching a remote system by tracing all
K. Data link layer
routers between two points
L. 172.16.0.20
[R] 9. Manages connections between machines and sockets operate at this layer.
M. 255. 255. 255.255
[F] 10. Is the operational techniques and activities that are used to fulfill
N. Ntdetect.com missing
requirements for quality
O. Any number starting by 2
[H ] 11.Class A IP Address
P. NBTSTAT
[N] 12. Common types of software problem
Q. Overheating
[Q] 13. Possible CPU problem causes
R. Session Layer
[E]1. A protocol that provides for the transfer of files between two systems
A. Crosstalk
[J] 2. A device that regenerates and retransmits signals on a network
B. MAC
[D]3. A command that is used on a NetWare server to see details of Network
C. Downtime
interface configurations
D. CONFIG
[C] 4. A period of time during which a computer system or network is unavailable.
E. FTP
[M] 5. Layer Three device used for routing through different network
F. DHCP
[I] 6. Configured to allow certain types of traffic to pass while blocking others
G. WiFi
[K] 7. Class A IP address used for huge number of clients
H. DNS
[F] 8. A protocol that provides dynamic IP addressing to workstations on the network
I. Firewalls
[N] 9. Spoken or written words to share information
J. Repeater
[B] 10. A physical address of a device on network
K. 10.10.10.10
[H] 11. A system used to translate domain names into IP address
L. IP
[A] 12. Electronic interference that is caused when to wires are too close to each
other. M. Router
[P] 13. Illegal unethical irresponsible Act done against an Employer N. Verbal Communication
[O] 14. A group of people with a high degree of interdependence geared O. Team Work
[G] 15. A voluntary standard that manufacturs can adhere to, which aims Q. 192.168.10.12
S. Router
[N]6. An internet protocol that is used for the transfer of messages and attachments. F. CONFIG
[C]7. A six-octet number that uniquely identifies a host on a network G. FTP
[G]8. A protocol that provides for the transfer of files between two systems H. DHCP
I. WiFi
J. DNS
K. Firewalls
L. Repeater
M. Patch panel
N. SMTP
O. Proxy Server
P. Telnet
Q. Ping
R. HTTPS
🖙 Ping
The ping utility is used to test connectivity between two TCP/IP hosts. Like the tracert utility, it also uses ICMP
echo requests to the destination host. This utility is a part of the TCP/IP protocol suite and is installed by default
on all TCP/IP devices. Ping can quickly determine whether the host is connected or not and how long it takes
for the request to take the roundtrip. Aside from testing connectivity, the ping command can also be used to test
whether the name resolution is working.
🖙 arp
The arp is used to resolve an IP address to the MAC address. The arp is a command-line utility that can be used
to diagnose address resolution problems. Hosts on TCP/IP networks use IP addresses to communicate to each
other. IP addresses are further resolved to their MAC addresses in order to deliver IP packets to the correct host.
These MAC addresses are temporarily stored on the local host in the ARP cache. The ARP cache is a table that
maps recently resolved IP addresses and their corresponding MAC addresses. It is periodically refreshed with
newer entries, and older entries are deleted. Whenever a host needs to send a packet to another host, it first
checks its local ARP cache before sending a broadcast message on the local network.
There are two types of entries in the ARP cache: dynamic and static. The dynamic entries are created
automatically as the local host resolves IP addresses. The static entries are added manually using the arp–s
command. You can check the ARP cache of the local computer anytime by using the arp–a command the arp –g
command.
The nslookup utility is used to diagnose problems related to the DNS services. In other words, it is used to resolve
name resolution problems. This utility can be used to perform name resolution queries against a specified DNS
server or to display information about currently configured DNS servers on a local host. Unlike other commands
discussed in this section, the nslookup command can be executed in either interactive mode or non interactive
mode.
LAN technologies
Ethernet networking and cabling technologies are defined in IEEE 802.3 standards. There are several variations in
this standard, depending on speed, length, topology, and cabling used in implementing networks.
10Mbps Ethernet. The 10 Mbps standards include 10Base2, 10BaseT, and 10BaseFL. All of these standards
define a maximum data transfer speed of 10Mbps. This speed is now considered obsolete for most networks. It is
unlikely that you will encounter any 10Mbps networks in your career. The following are different variations of
10Mbps networks.
10Base2
This standard defines use of RG-58 coaxial cabling with a maximum segment length of 185 meters. The
network can achieve a maximum speed of 10 Mbps. The segments are typically wired in physical bus
topology.
10BaseT
The 10BaseT Ethernet standard defines use of CAT 3, 4, or 5 UTP cables with a maximum of 100 meters for
each cable length. All computers (nodes) are connected to a central device known as the hub or the switch. It
is typically wired in a physical star topology.
10BaseFL
The 10BaseFL Ethernet standard uses fiber optic cables in order to increase the cable segment lengths to 2000
meters.
100 Mbps Ethernet. Most of the modern networks support 100 Mbps speeds, which provide better
bandwidth for demanding applications.
100BaseTX
100BaseTX networks use two pairs or UTP CAT 5 cable. The length of cable segments can be up
to 100 meters.
100BaseT4
100BaseT4 networks use four pairs of CAT 3, 4, or 5 type cables. The length of cable segments can
be up to 100 meters.
100BaseFX
100BaseFX networks use multimode or single-mode fiber optic cables and provide up to 100 Mbps
of data transfer rates. The length of cable segment can be up to 412 meters for multimode and up to
10,000 meters for single mode cable.
Set by Ayansa E-mail: Page
Ambo TVET college
Sector: Information and Communication Technology
Occupation: Hardware and Network Servicing Level
III Knowledge assessment
1000 Mbps Ethernet. The 1000 Mbps (equal to 1 Gigabit) Ethernet networks are also known as Gigabit
Ethernet. These networks use either copper-based or fiber optic cabling. These networks are implemented
mainly as a backbone for large networks.
1000BaseX
Gigabit standards include 1000BaseLX, 1000BaseSX, and 1000BaseCX. The 1000BaseLX and
1000BaseSX use multimode or single-mode fiber optic cables. The 1000BaseCX standard specifies
use of shielded twisted pair (STP) cables.
1000BaseT
This standard uses four pairs of CAT 5 UTP cable. Each pair of the CAT 5 cable can achieve
maximum data transfer speeds of up to 25 Mbps, making it an overall 1000 Mbps.
Networking protocols
Networking protocols provide ways for computers to communicate with each other through the networking media.
TCP/IP. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of several protocols. It is the most
widely used protocol suite in private networks as well as on the Internet. Unlike the AppleTalk and IPX/SPX
protocols, TCP/IP is not proprietary to any organization but is a public protocol suite. Needless to say,it is a fully
routable protocol. The routing functionality is provided by a number of routing protocols such as RIP and OSPF.
The TCP/IP protocol suite is supported by all major network and desktop operating systems. Some of the well
known protocols and their functions are discussed later in this section. The following are some of the main
configuration settings on a typical computer:
IP address. An IP address is a unique address used to identify a computer or a host on the network. This address is
made up of 32-bit numbers written in dotted decimal notation in the w.x.y.z format. Each eight bits are known as an
octet or a byte. A part of the IP address is known as the network address or network ID and the rest of it is known as
the host address or host ID. These parts are based on the class of IP addresses used on the network. All computers
on a particular network must have the same number as the network address, while the host address must be unique
on the entire network.
Subnet mask. Every IP address is accompanied by a subnet mask. It is used to help identify the part of the network
where the host is located. Like the IP address, the subnet mask is a 32-bit binary number that distinguishes the
network ID from the host ID.
Default gateway. A default gateway allows computers on a network segment to communicate with computers on
another segment. The default gateway for all computers on a particular segment is the IP address of the router
DNS address. The IP address of a DNS server is configured on TCP/IP hosts so that all name resolution queries are
sent to the designated DNS server. Most network and desktop operating systems allow you to configure multiple
DNS servers.
WINS address. The IP address of a WINS server is configured to resolve NetBIOS name resolution queries. As
with the DNS address, you can configure more than one WINS server address on a TCP/IP host. The servers and
workstations use a 48-bit hexadecimal address that defaults to the MAC address of the network interface card. The
node address is appended to the network address to create a unique node address in the internetwork.
NetBEUI/NetBIOS. NetBEUI stands for NetBIOS Extended User Interface. It is an old Microsoft networking
protocol used in small networks. This protocol provides services at the transport and network layer of the OSI
model. It is not a routable protocol and as such, cannot be used on large routed networks. The computers using the
NetBEUI protocol use Network Basic Input Output System (NetBIOS) naming conventions. NetBIOS computer
names consist of a maximum of 15 characters such as Server1 or Workstation1.
Simple Mail Transfer Protocol (SMTP). SMTP is a connection-oriented application layer protocol that is used to
transport messages between remote email servers. It uses TCP at the transport layer and hence guarantees delivery
of data.
Internet Message Access Protocol 4 (IMAP4). Like POP3, IMAP4 is also used to retrieve email from mail
servers. The advantage of using IMAP4 over POP3 is that it provides a secure authentication mechanism.
Internet Control Message Protocol (ICMP). ICMP works at the network layer to provide error checking and
reporting functions. It is a connection-less protocol and uses IP for providing best-effort delivery. It is used in
network management and maintenance systems. For example, PING is a troubleshooting utility that uses the ICMP
protocol.
Address Resolution Protocol (ARP). ARP works at the network layer. It is used to resolve IP addresses to MAC
addresses. Upper-layer protocols use ARP to correctly deliver data packets to the destination host. ARP maintains a
mapping of IP addresses and MAC addresses in the system memory called the ARP cache. If the ARP cache does
not have an entry for a requested IP address, it broadcasts the IP address on the local network to find out which host
has the specified IP address.
HyperText Transfer Protocol (HTTP). HTTP is an application layer protocol that allows text, images, and
multimedia to be downloaded from web sites. It is also a connection-oriented protocol that uses TCP at the transport
layer. HTTP works with a uniform resource locator (URL) to connect to the desired web site. An example of a URL
is http://www.oreilly.com.
HTTP Secure (HTTPS). HTTPS is the secure version of the HTTP protocol that allows servers and clients to be
authenticated before the communication session starts. This protocol is also an application layer protocol and uses
TCP at the transport layer. It is commonly used for online banking and other e-commerce functions. It uses a secure
socket layer (SSL) to encrypt the network traffic between the web server and the web client. A web site using SSL
has a URL starting with https://.
Secure Socket Layer (SSL). SSL is an encryption protocol popularly used for Internet based transactions such as
online banking. This protocol is based on public key encryption mechanisms. Transport Layer Security (TLS) is the
successor of SSL but can be scaled down to SSL 3.0 mode for backward-compatibility. SSL provides end-to-end
security for Internet communications by using encryption. In typical implementations, only the server component is
Telnet. Telnet is an application layer protocol that allows connections to remote hosts. Administrators use this
protocol to connect remotely to network devices and run commands in order to configure or maintain them. Telnet
is also a connection-oriented protocol and uses TCP at the transport layer.
File Transfer Protocol (FTP). FTP works at the application layer to provide file transfers between remote
computers. FTP uses TCP as its transport protocol. FTP is a client/server application that authenticates users before
allowing access to servers that host the FTP service. Most FTP servers allow anonymous logons that enable
multiple users to connect to the server and download files. FTP is commonly used on the Internet for file
downloads. One of the major limitations of the FTP protocol is security. The authentication method uses clear text
usernames and passwords, which is a serious security concern.
DNS. DNS stands for Domain Name System. The DNS service is used to translate fully qualified domain names
(FQDN) to their respective IP addresses. Large corporate networks and all hosts on the Internet use FQDN notation
to identify computers on the network. A fully qualified domain name can consist of a maximum of 63 characters
including the dots. An example of a fully qualified domain name is www.us.books.oreilly.com. DNS servers on a
network run the DNS service and are responsible for resolving DNS queries for their clients. They can do it either
by themselves or by having the queries resolved though referring to another DNS server. DNS clients are
configured to use one or more DNS servers when configuring their TCP/IP properties.
Windows Internet Naming System (WINS). A WINS server is used to translate NetBIOS computer names to IP
addresses. NetBIOS names consist of a maximum of 15 characters. These servers are used only on Windows
networks. The WINS server maintains a mapping of NetBIOS names to IP addresses. When a Windows client needs
to resolve a computer name to its IP address, it sends a name resolution query to the WINS server. This helps limit
the amount of broadcast traffic generated by a broadcast method of name resolution. Windows clients can be
configured to use one or more WINS servers.
Protocol Function
File Transfer Protocol (FTP) FTP is a client/server application used for file transfers between remote computers.
Trivial File Transfer Protocol (TFTP) TFTP is also used to transfer files between two remote computers. It is faster
but less reliable than FTP
Simple Mail Transfer Protocol (SMTP) SMTP is used to transport messages between remote email servers.
HyperText Transfer Protocol (HTTP) HTTP allows text, images, and multimedia to be downloaded from web sites.
HTTP Secure (HTTPS) HTTPS is the secure version of the HTTP protocol that authenticates web
servers and clients before the communication session starts.
Post Office Protocol 3 (POP3) POP3 is used to download or retrieve email messages from mail servers
running the SMTP protocol.
Internet Message Access Protocol 4 (IMAP4) IMAP4 is also used to securely retrieve email from mail servers.
Telnet Telnet allows connections to remote hosts such as network devices for
administrative and maintenance purposes.
Internet Control Message Protocol (ICMP) ICMP provides error checking and reporting functions.
Address Resolution Protocol (ARP) ARP is used to resolve IP addresses to MAC addresses.
Network News Transfer Protocol (NNTP) NNTP provides newsgroup services such as posting and retrieving messages
on discussion forums.
Line Printer Remote (LPR) LPR provides client connectivity to printers in network operating systems
such as Unix, Linux, and Windows.