COC Question

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

U

C – L- III 05
A B
______ 1. Convert Ip address Network Access A) Switch
__G____ 2. Automatically Assign IP address B) Router
__O____ 3. Resolve IP address C) RAM
______ 4. Optical Driver D) Catch Memory
__P____ 5. Secondary Storage Device E) ARP
______ 6. Multi port Bridge F) Defragmentation
______ 7. Non-Volatile Memory of Connector G) DHCP
___J___ 8. Used to modulate and Demodulate H) Monitor
______ 9. Create by Operating system when the I) ROM
Memory full Occupied (Copied)
______10. Speed Memory J) Modem
______11. BIOS Level configuration K) Virtual Memory
__M____ 12.Centrally Administrator Access L) Boot Sequence
______13. Preventative Maintenance M) Server Based Network
____N__ 14. Coaxial Cable Connector N) BNC
____B__ 15. Filtering Packet O) DNS
P) Hard Disk
Q) HUB
R) CD-ROM
C-L –V
“A” “B”
______1. Loop A) NAT
______2. Resolve IP address B) Bad Memory
______3. Dynamic Configuration C) ESD(Electro static Discharge)
______ 4. Parity Error D) Segmentation
______ 5. Reliable Communication E) UDP(User Data-gram Protocol )
______ 6. Anti Wrist Satrap F) HTTP
______ 7. Hid IP Address G) CSMA/CD
______ 8 . Transport Layer H) Protocol
______9. Generic of Communication with bridge I) FTP
And Router
_______10 .Absorbing signal bouncing communication J) Authentication
_______ 11. Threat Security communication K) Authorization
_______ 12. Unreliable communication L) DHCP
M) DNS
N) Securing File
O) 127.0.0.1
P) Packet Switch
Q) Transport Layer
R) Router
S) Terminator
HNS Level –IV COC
“A”
1. Quality: - The Degree of Excellence of Something.
2. Restricted Group: - Specify the Users Permitted to be Members Specific Groups.
3. DHCP Server: - Server Used to allocate IP address to Large Numbers Of the PC’s in a Network
Environment.
4. Rules and Regulation:- An Original Draft or Record of Document.
5. VPN Server: - Server that proved access connectivity for mobile User through the Internet
6. Procedure:-A series of actions conducted in a certain manner.
7. Local Policy :-Configure Audit policy user rites assessment and Security Option Policies.
8. File System, Permission:- Specify assess control Permission for NTFS file and folders
9. RAS Server Servers:- that Provides access connectivity for Mobile user through Telephone Line
10 . Strategy A plan of Action Designed to Achieve a Long term Aim
11. Account Policy :-Specify password Restriction Account Lockout policy And Kerberos policy
12. DNS Server :-Server used to Resolve Names to IP Address And IP Addresses to names
13. Policy :-A principal to guide Decision and Achieve Rational Out comes
14. System Service :-Specify the Start Up Type and Permissions Serves
15. POP Server:- Server Used for Main Receiving
1. Security Policy defines
 What users can and cannot do with their computer.
2. A types of network that supports two/more Organizations and that allows controlled access from out

side for specific purpose Ans .Extranet


3. Assume that you are the Giving a service and you want to measure Quality is the best way, this is ;
Ans. To give Out survey at the end of each Interaction with customers to measure the satisfaction
4. A security Implementation Principle Recommends Decision of the responsibility so as to no allows of a

person to command a detected Fraud. Ans. Separation of power


5. Fire Wall Function
ANS. Rejecting all Packets regardless of the security restriction

6. The first steps in establishing disaster recovery plan


Ans. Agree on the goals and objectives of the plan
7. The reason that end users needs be aware of the security policy.
Ans. some security decisions are usually in their hands
8. While you are configuring new wireless clients, none of the new clients is able to connect
the network. But clients already on the same access do not have any connectivity problem.
Which is not the possible reasons for this problem?
Ans. An in correct same service set identifier (SSID)
9. You are a network Administrator for ABC company. you are the verifying the configuration
of a newly installed host by establishing on FTP connection to the remote service the
highest layer of the protocol stack you are using for this operation
Ans. Application Layer
10.You are a network administrator at xyz company and one of your tasks is designing the
company security policy. The element not to be specified in an enterprise security policy.
Ans. Software versions of the security products.
11. You have a domain controller that runs the window server 2008 and configured as a DNS
server . you need to record all a bound DNS queries to the server. What should you
configure in the DNS manager console?
Ans. Enable Debug Logging
12. The types of the license key allows you to host and activation service locally within your

own network. Ans. Key Management system


13. A technician receives an urgent call that the switch in a counting Department is down which of the
following should the technician co first to trouble shooting this Issue?
Ans. Identify symptoms and problem
14. A new project requires that users in your domain and in the domain of the a partner Organization have
access to shared folder on your file server. When type of should you create to manage the access to the

shared folder? Ans. Domain Local Security group


15. You are giving training about computer and network maintenance for a maintenance team. As a trainer
the first step in the maintenance process you recommend. Ans. Gather Information from the customer.
16. You are going to build internet Infrastructure with 31 subnets and 7 usable host addresses per each

subnet. The class subnet mask for this case. Ans. 255, 255, 255, 254
17. User can login to this computer, but cannot access network resources. The user has all the Appropriate
group member ships and permissions that the has till cannot access shared reason the cause of this
problem?
Ans. Users has logged on to the local computer installed of the domain
“A” “B”
______ 1. Valid host Id of the IP address of A) Resolve Zone
200.100.206.99/27
______ _2. Fire Wall Profile Identified by Network B) 200, 100, 206,97 up to
Administrator 200,100,206,126
_______ 3. Zone that Resolve host Name IP address During
DNS Server Configuration C) File Server Resource
_______ 4. Default Subnet Mask of Class C D) NIC
________5. UTP Connector E) Wire lets Network
________6. Enable Sharing File Using DFS Name Space
And Replicating File b/n DFS Servers F) Questionnaires
________ 7. Install tools for Generating storage Reports Configurations
Quotas and Defining file Screen policy G) RJ -45
________ 8. Indexes File for Faster Searching when client connect to
Shared folders H) Distribute File System
_________9. Acts as Interface b/n the Computer and Physical
Network Connection I) 255, 255, 255, 255, 0
________ 10. A networking Device that Converts One Cabling
Technology to another J) Forward Zone

_______ 11. Uses Infrared Laser or Radio Wave to Eliminate the K) Home or Work/Printer

Need for Physical Cabling

_______ 12. Place where List Problems that Occurred On a system L) 200,100,206,129,200,100,2006,5

_______ 13. A method of Collecting Information Or Determining Requirements M) Print Server Resource
_______ 14. It keeps Digital Pests and Hackers Out N) Window Search Service
_______ 15. Coaxial Cable Connecters O) Transceivers
P) Event Viewer
Q) Fire Wall
R) BNC

COC Question Level IV


1. Which Router Command Allows you to view the centre contacts of all Access list ?
A) Router Show Interface C) Router #Show Access list
B) Router Show IP Interface D) Router >Show all access list
2. You have 10 users Plugged into a hub running 10 mbps half-duplex this is a server connected to the switch
running 10 mbps half –duplex a well how much bandwidth does the each host have to the server ?
A) 100kbps B/1mbps C) 2mbps D) 10mbps
3. Which protocol does DHCP as at the Transport Layer?
A) IP B) TCP C) UDP D) ARP
4. Where is a Hub Specified in the OSI model?
A) Session Layer C) Data Link Layer
B) Physical Layer D) Application Layer
5. Which Class IP Address has the most host address Available by Default?
A) Class C B) Class A C) Class D D) Class B
6. What is the main Reason the OSI model was Created ?
A) To Create a Layered model Large than the DOD model
B) So Application Developers can change Only One Layer Protocol
C) So D/t Network could Communicate
D) So Sis co could Use the model
7. Which Protocol Does Ping Use?
A) TCP B) ARP C) ICMP D) Boot p
8. Which of the following cable type is most susceptible to cross talk?
A) UTP B) STP C) Coaxial cable D) Optical Fiber
9. In Scenario where the file server is on an Apple talk Network and the Devices Needing to access this server
are on a token Ring Network which of the Device will connect the two network?
A) Hub B) Bridges C) Switch D) Gateway
10. Identify the Topology displayed in the exhibit?

A) Ring B) Bus C) Mesh D) Star


11.There are A comble of Application you are Accessing or the Network from your computer regularly for a few
days now you have not been able to access only one Application from our computer what must you do?
A) Reboot a server B) Reboot the work Station c) Check the Users password
D) Ask the user to Access the problem Application from Another work station
12.Which of the following procedure needs to be implemented before any Network Implementation?
A) Disable network logins C) Determine needs and expectation
B) Implement network Load balancing D) Enable network logins
13. Which of the are good password?
A) Keep passwords Identinitely
B) Change password every 90 day
C) Maintain Mini mum password length
D) Usable alpha numeric symbols in password
Level –IV COC
“A” “B”

____ _ 1. Used to Communicate time Synchronization A) HTTP


Information between device
_____ 2. Synchronizes the Data exchange between B) Telnet
Application on separate Device
_____ 3. Connectionless Protocol used for moving data
Around a network C) MAc
_____ 4. Protocol for Uploading and down Loading file and
From remote host also accommodates basic file
Management task. D) UDP
_____ 5. Connectionless alternative to TCP that Internet
is used for application that do not require the E) Research
Function
_____ 6. Resolves IP address to Macc address to enable
Communication between device F) Transport Layer
_____ 7. Protocol for retrieving file from a web-server G) FTP
______ 8. Mechanism for transporting email across network
(UC 4) H) DHCP
______ 9. Allows Session to be Opened on a remote
Host (UC 4) I) Presentation Layer
______ 10. Automatically Assign IP addressing Information J) DNS
______ 11. Resolve host Names to IP Addresses (UC5) K) Session Layer
______ 12. Sharing Information without using words L) Network time Protocol
______ 13. Scientific ways of Investigating Problem M) SMTP
N) Proxy server
O) IP
P) ARP
Q) HTTPS
R) Non Verbal communication
HNS Level –IV COC
“A”
1.Presentation Layer:- Used to Communicate time Synchronization Information between device
2.Session Layer:- Synchronizes the Data exchange between Application on separate Device
3.UDP:- Connectionless Protocol used for moving Around a network
4.HTTP:-Protocol for Uploading and down Loading file and From remote host also accommodates basic file
Management task.
5.Transport Layer :-Connectionless alternative to TCP that Internet is used for application that do not
require the Function
6.FTP:- Protocol for retrieving file from a web-server
7. SMTP:- Mechanism for transporting email across network (UC 5)
8.Telnet:- Allows Session to be Opened on a remote Host (UC 4)
9.Non Verbal communication:- Sharing Information without using words
10.MAC:- Resolves IP address to Macc address to enable Communication between device
11. DHCP Automatically Assign IP addressing Information
12.DNS Resolve host Names to IP Addresses (UC5)
13.Research. Scientific ways of Investigating Problem

You might also like