COC Question
COC Question
COC Question
C – L- III 05
A B
______ 1. Convert Ip address Network Access A) Switch
__G____ 2. Automatically Assign IP address B) Router
__O____ 3. Resolve IP address C) RAM
______ 4. Optical Driver D) Catch Memory
__P____ 5. Secondary Storage Device E) ARP
______ 6. Multi port Bridge F) Defragmentation
______ 7. Non-Volatile Memory of Connector G) DHCP
___J___ 8. Used to modulate and Demodulate H) Monitor
______ 9. Create by Operating system when the I) ROM
Memory full Occupied (Copied)
______10. Speed Memory J) Modem
______11. BIOS Level configuration K) Virtual Memory
__M____ 12.Centrally Administrator Access L) Boot Sequence
______13. Preventative Maintenance M) Server Based Network
____N__ 14. Coaxial Cable Connector N) BNC
____B__ 15. Filtering Packet O) DNS
P) Hard Disk
Q) HUB
R) CD-ROM
C-L –V
“A” “B”
______1. Loop A) NAT
______2. Resolve IP address B) Bad Memory
______3. Dynamic Configuration C) ESD(Electro static Discharge)
______ 4. Parity Error D) Segmentation
______ 5. Reliable Communication E) UDP(User Data-gram Protocol )
______ 6. Anti Wrist Satrap F) HTTP
______ 7. Hid IP Address G) CSMA/CD
______ 8 . Transport Layer H) Protocol
______9. Generic of Communication with bridge I) FTP
And Router
_______10 .Absorbing signal bouncing communication J) Authentication
_______ 11. Threat Security communication K) Authorization
_______ 12. Unreliable communication L) DHCP
M) DNS
N) Securing File
O) 127.0.0.1
P) Packet Switch
Q) Transport Layer
R) Router
S) Terminator
HNS Level –IV COC
“A”
1. Quality: - The Degree of Excellence of Something.
2. Restricted Group: - Specify the Users Permitted to be Members Specific Groups.
3. DHCP Server: - Server Used to allocate IP address to Large Numbers Of the PC’s in a Network
Environment.
4. Rules and Regulation:- An Original Draft or Record of Document.
5. VPN Server: - Server that proved access connectivity for mobile User through the Internet
6. Procedure:-A series of actions conducted in a certain manner.
7. Local Policy :-Configure Audit policy user rites assessment and Security Option Policies.
8. File System, Permission:- Specify assess control Permission for NTFS file and folders
9. RAS Server Servers:- that Provides access connectivity for Mobile user through Telephone Line
10 . Strategy A plan of Action Designed to Achieve a Long term Aim
11. Account Policy :-Specify password Restriction Account Lockout policy And Kerberos policy
12. DNS Server :-Server used to Resolve Names to IP Address And IP Addresses to names
13. Policy :-A principal to guide Decision and Achieve Rational Out comes
14. System Service :-Specify the Start Up Type and Permissions Serves
15. POP Server:- Server Used for Main Receiving
1. Security Policy defines
What users can and cannot do with their computer.
2. A types of network that supports two/more Organizations and that allows controlled access from out
subnet. The class subnet mask for this case. Ans. 255, 255, 255, 254
17. User can login to this computer, but cannot access network resources. The user has all the Appropriate
group member ships and permissions that the has till cannot access shared reason the cause of this
problem?
Ans. Users has logged on to the local computer installed of the domain
“A” “B”
______ 1. Valid host Id of the IP address of A) Resolve Zone
200.100.206.99/27
______ _2. Fire Wall Profile Identified by Network B) 200, 100, 206,97 up to
Administrator 200,100,206,126
_______ 3. Zone that Resolve host Name IP address During
DNS Server Configuration C) File Server Resource
_______ 4. Default Subnet Mask of Class C D) NIC
________5. UTP Connector E) Wire lets Network
________6. Enable Sharing File Using DFS Name Space
And Replicating File b/n DFS Servers F) Questionnaires
________ 7. Install tools for Generating storage Reports Configurations
Quotas and Defining file Screen policy G) RJ -45
________ 8. Indexes File for Faster Searching when client connect to
Shared folders H) Distribute File System
_________9. Acts as Interface b/n the Computer and Physical
Network Connection I) 255, 255, 255, 255, 0
________ 10. A networking Device that Converts One Cabling
Technology to another J) Forward Zone
_______ 11. Uses Infrared Laser or Radio Wave to Eliminate the K) Home or Work/Printer
_______ 12. Place where List Problems that Occurred On a system L) 200,100,206,129,200,100,2006,5
_______ 13. A method of Collecting Information Or Determining Requirements M) Print Server Resource
_______ 14. It keeps Digital Pests and Hackers Out N) Window Search Service
_______ 15. Coaxial Cable Connecters O) Transceivers
P) Event Viewer
Q) Fire Wall
R) BNC