HNS Level 4 Basic COC Queation
HNS Level 4 Basic COC Queation
HNS Level 4 Basic COC Queation
1. Which area of the network would a college IT staff most likely have to redesign as a direct result of
many students bringing their own tablets and smart phones to school to access school resources?
A. Wired LAN
B. Extranet
C. Wireless LAN
D. Intranet
2. In FTP protocol, client contacts server using ____ as the transport protocol.
A. datagram congestion control protocol
B. stream control transmission protocol
C. user datagram protocol
D. transmission control protocol
3. Network layer firewall has two sub-categories as_______.
A. Frame firewall and packet firewall
B. Bit oriented firewall and byte oriented firewall
C. None of the mentioned
D. State full firewall and stateless firewall
4. Which command can be used from a PC to verify the connectivity between hosts that connect through
a switch in the same LAN?
A. Ping address
B. Traceroute address
C. ARP address
D. Tracert address
5. To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?
A. Active Directory Maintenance
B. Directory Services Restore
C. Directory Services Maintenance
D. Active Directory Restore
6. The network design for a college with users at five sites is being developed. Where in the campus
network architecture would servers used by all users be located?
A. Enterprise edge
B. Data center
C. Services
D. Access-distribution
7. One source sending a packet to multiple destinations_________.
A. Domain server
B. Unicasting
C. Multicasting
D. Broadcasting
8. A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as
shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to
provide connectivity between the hosts?
A. The subnet masks should be set to 255.255.255.0
B. A crossover cable should be used in place of the straight-through cable.
C. The subnet masks should be set to 255.255.255.192.
D. A default gateway needs to be set on each host
32. It allows a visited website to store its own information about a user on the user’s computer______.
A. Adware
B. Spam
C. Cookies
D. Malware
33. one of the following can explain mentoring
A. sales performance development
B. professional and personal development
C. daily, weekly and monthly transaction and reports
D. departmental budgets development
34. how many host addresses are available on the network 172.16.128.0 with a subnet mask of
255.255.252.0?
A. 1022
B. 512
C. 510
D. 1024
35. How many host addresses are available on the 192.168.10.128/26 network?
A. 62
B. 64
C. 32
D. 60
54. A technician is to document the current configurations of all network devices in a college, including
those in off-site buildings. Which protocol would be best to use to securely access the network
devices?
A. Telnet
B. FTP
C. HTTP
D. SSH
55. Which is an important characteristic of communication?
A. Communication involves exchange of ideas, feelings, information, thoughts and
knowledge.
B. Communication process does not happen between more than two parties.
C. Communication does not involve mutuality of understanding between sender and
receiver.
D. It is a 1-way process
56. Access point exists in __________
A. Application Layer
B. Network layer
C. Datalink layer
D. Transport layer
57. Your network consists of an active directory forest that contains one domain named contoso.com. all
domain controllers run windows server 2008 and are configured as DNS servers. You have two
Active directory-integrated zones: contoco.com and nwtraders.com you need to ensure a user is able
to modify records in the contoso.com zone. You must prevent the user from modifying the SOA
record in the nwtraders.com zone. What should you do ?
A. From the DNS manager Console, modify the permissions of the nwtraders.com zone.
B. From the DNS manager Console, modify the permissions of the contoso.com zone.
C. From the active directory users and computer console, modify the permissions of the
domain controllers organizational unit(OU).
D. From the active directory users and computer console, run the delegation of control
wizard.
58. Which of the following are layers in the TCP/IP model?am
1. Application
67. your network contains an active directory domain contoso.com the domain contains a domain
controller named DC1. You have a member server named server1. Both DC1 and server 1 have the
DNS Server role installed. On DC1 , you create an active directory-integrated zone named
adatum.com. you need to ensure that server 1 receives a copy of the zone.
A. Add server1 to the DNS update proxy group.
B. Create a secondary zone on server1.
C. Modify the zone transfers settings of adatum.com
D. Modify the zone type of adatum.com
68. The scheduled activities are based on a preset schedule that is established regardless of need.
A. Interval based maintenance
B. Predictive maintenance
C. Rehabilitation maintenance
D. Reliability-centered maintenance
69. Most frequently used framework for obtaining continuous improvement is ________.
A. Quality function deployment
B. The plan-do-check-act cycle
C. The quality circle
D. The cause and effect process
70. A network administrator is verifying the configuration of a newly installation establishing a FTP
connection to a remote server, what is the highest protocol stack that the network administrator is
using for this operation?
A. Session
B. Transport
C. Application
D. Presentation
71. Services that are required to enable another service to run are referred to as service _____
A. Parent
B. Roots
C. Prerequisites
D. Dependencies
72. A network administrator is implementing a policy that requires strong, complex password. Which
data protection goal does this policy support?
A. Data redundancy
B. Data quality
C. Data confidentiality
D. Data integrity
73. The correct order of data encryption is?
A. Bit--->Packet--->Frame--->Segment--->Data
83. A leadership style in which the leader includes one or more employees in the decision making process
is?
A. Delegate or free reign
B. Authoritarian or automatic
C. Participative or democratic
D. Federalist
84. You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS server.
You need to record all inbound DNS queries to the server. What should you configure in the DNS
manager console?
A. Enable automatic testing for simple queries
B. Enable automatic testing for recursive queries
C. Enable debugs logging
D. Configure event logging to log errors and warnings
85. You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of disk
space and prevent users from consuming more than 1GB of disk space. How will configure it?
A. Create a hard quota with a 800mb limit and a second soft quota with a limit 1GB
B. Create a hard quota with a 1GB limit. Create a warning at 80 percent
C. Create a soft quota with an 800MB limit. Create a warning at 80 percent
D. Create a soft quota with a 800MB limit and a second quota with a 1GB limit
86. A web cookie is a small piece of data _____
A. Sent from root server to all servers
B. Sent from a website and stored in user’s web browser while a user is browsing a website
C. Sent from user and stored in the server while a user is browsing a website
D. Sent from user to all servers
87. What is wired equivalent privacy (WEP)?
A. Security algorithm for usb communication
B. Security algorithm for flash drive communication
C. Security algorithm for Ethernet
D. Security algorithm for wireless networks
88. Which of the following statements about a group is true?
A. Groups should be formal
B. You need five or more people to be considered a work group
C. Formal groups are aimed at specific social agendas
D. The definition of groups suggests that a group is two or more people together for any reason
89. What process involves placing one PDU inside of another PDU?
A. Encoding
B. Encapsulation
C. Segmentation
92. It allows a visited website to store its own information about a user on the user’s
A. Cookies
B. Malware
C. Adware
D. Spam
93. A backup type, which includes only those files that have been modified since the last backup and
clears the archive bit of the files it copies to the backup medium.
A. Full backup
B. Incremental backup
C. Daily backup
D. Copy backup
94. Local GPO setting are stored in what folder on a computer?
A. %systemroot%/System32/Drivers/Etc/GroupPolicy
B. %Systemroot%/System/GroupPolicy
C. %Systemroot%/System32/Drives/GroupPloicy
D. %Systemroot%System32/GroupPolicy
95. Which statements are true regarding ICMP packets?
A. ICMP is encapsulated within UDP datagram
B. ICMP is un-encapsulated within IP datagram
C. ICMP guarantees datagram delivery
D. ICMP can provide hosts with information about network problems
E. All
96. Dawit is fetching mails from a server lying at a remote location. Which protocol is he using to fetch
the mails?
A. SMTP
B. POP3
C. S/MME
D. HTTP
97. An attempt to make a computer resource unavailable to its intended user is called?
A. Virtual attack
B. Denial of service attack
C. Botnet process
D. Worm attack