Coc Best Level 4-1-1
Coc Best Level 4-1-1
Which area of the network would a college IT staff most likely have to redesign as a
direct result of many students bringing their own tablets and smart phones to school to
access school resources?
A. Wired LAN
B. Extranet
C. Wireless LAN
D. Intranet
2. In FTP protocol, client contacts server using ____ as the transport protocol.
A. datagram congestion control protocol
B. stream control transmission protocol
C. user datagram protocol
D. transmission control protocol
3. Network layer firewall has two sub-categories as_______.
A. Frame firewall and packet firewall
B. Bit oriented firewall and byte oriented firewall
C. None of the mentioned
D. State full firewall and stateless firewall
4. Which command can be used from a PC to verify the connectivity between hosts that
connect through a switch in the same LAN?
A. Ping address
B. Traceroute address
C. ARP address
D. Tracert address
5. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN.
A. EVDO
B. CDMA
C. ALOHA
D. CSMA/CA
6. A corporate network includes an Active Directory Domain Services (AD DS) forest that
contains two domains. All servers run Windows Server 2008 R2. All domain controllers
are configured as DNS servers. A standard primary zone for dev.contoso.com is stored on
a member server. You need to ensure that all domain controllers can resolve names from
the dev.contoso.com zone. What should you do?
A. On one domain controller, create a conditional forwarder. Configure the
conditional forwarder to replicate to all DNS servers in the domain.
B. On the member server, create a secondary zone
C. On one domain controller, create a stub zone. Configure the stub zone to replicate
to all DNS servers in the forest
D. On one domain controller, create a stub zone. Configure the stub zone to replicate
to all DNS servers in the domain
7. To perform a System State restore in Windows Server 2008, you will boot the DC into
what mode?
A. Active Directory Maintenance
B. Directory Services Restore
C. Directory Services Maintenance
D. Active Directory Restore
8. The network design for a college with users at five sites is being developed. Where in the
campus network architecture would servers used by all users be located?
A. Enterprise edge
B. Data center
C. Services
D. Access-distribution
9. One source sending a packet to multiple destinations_________.
A. Domain server
B. Unicasting
C. Multicasting
D. Broadcasting
10. A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the hosts?
A. The subnet masks should be set to 255.255.255.0
B. A crossover cable should be used in place of the straight-through cable.
C. The subnet masks should be set to 255.255.255.192.
D. A default gateway needs to be set on each host
11. You plan to implement a solution that meets the certificate requirements of Customer1.
You need to identify which role services must be deployed to the hosting environment.
Which two role services should you identify? Answer presents part of the solution
A. Certification Authority Web Enrollment
B. Online Report
C. Online Responder
D. Certificate Enrollment Policy Web Service
12. Enabling additional users to handle administrative tasks for a particular object is referred
A. Assignment
B. Targeting
C. Redirection
D. Delegation
13. After obtaining the IP address, to prevent the IP conflict the client may use______.
A. Address Resolution Protocol
B. Internet Relay Chat
C. Reverse Address Resolution Protocol
D. Broader Gateway Protocol
14. Which device performs the function of determining the path that messages should take
through internetworks?
A. A DSL modem
B. Router
C. A web server
D. A firewall
15. Your company has one main office and four branch offices. The main office contains a
standard primary DNS zone named adatum.com. Each branch office contains a copy of
the adatum.com zone. When records are added to the adatum.com zone, you discover that
it takes up to one hour before the changes replicate to each zone in the branch offices.
You need to minimize the amount of time it takes for the records to be updated in the
branch offices. What should you do?
A. On the DNS server in the main office, configure the Zone Aging/Scavenging
Properties
B. On the DNS servers in the branch offices, configure the Notify settings
C. On the DNS server in the main office, configure the Notify settings
D. On the DNS servers in the branch offices, configure the Zone Aging/Scavenging
Properties
16. Which one of the following is best describe virtual memory?
A. The use of hard disk space as an extension of RAM when physical memory runs
out
B. A segment of memory that has been reserved for use by the CPU
C. A memory which used to hold data in permanent bases
D. An extremely fast type of memory
17. What flavor of Network Address Translation can be used to have one IP address allow
many users to connect to the global Internet?
A. PAT
B. Static
C. Dynamic
D. NAT
18. Which of the following protocol used port 443 and port 80 respectively?
A. HTTPS and HTTP
B. DHTML
C. XHTML
D. HTTP and HTTPS
19. A new corporation needs a data network that must meet certain requirements. The
network must provide a low cost connection to sales people dispersed over a large
geographical area. Which type of WAN infrastructure would meet the requirements?
A. Private infrastructure
B. Dedicated
C. Satellite
D. Public infrastructure
20. Which is the network strategy used extensively by the internet?
A. Local Area network system
B. Peer-to-peer network system
C. Client /server network system
D. Stand -alone network system
21. How many host addresses are available on the network 172.16.128.0 with a subnet mask
of 255.255.252.0?
A. Store-and-forward
B. Cut-through
C. Fast-forward
D. Fragment-free
22. ________________ is the process that helps managers understand the nature of the
industry, the way firms behave competitively within the industry, and how competition is
generally undertaken.
A. Organizational analysis
B. Portfolio analysis
C. Market needs analysis
D. Strategic market analysis
23. The scheduled activities designed to extend equipment reliability based on performing
activities prior to equipment failure based on risk levels and organization experience.
A. Interval based maintenance
B. Routine maintenance
C. Predictive maintenance
D. Reliability-centered maintenance read…………..
24. Network congestion occurs?
A. In case of traffic overloading
B. When a system terminates
C. When there is no internet connection
D. When a connection between two nodes terminates
25. A technician is to document the current configurations of all network devices in a
college, including those in off-site buildings. Which protocol would be best to use to
securely access the network devices?
A. Telnet
B. SSH
C. HTTP
D. FTP
26. You want to implement a mechanism that automates the IP configuration, including IP
address, subnet mask, default gateway, and DNS information. Which protocol will you
use to accomplish this?
A. SNMP
B. SMTP
C. DHCP
D. ARP
27. What is an ISP?
A. a protocol that establishes how computers within a local network communicate
B. a standards body that develops cabling and wiring standards for networking
C. a networking device that combines the functionality of several different
networking devices
D. an organization that enables individuals and businesses to connect to the Internet
28. Users are complaining that they are unable to browse certain websites on the Internet. An
administrator can successfully ping a web server via its IP address, but cannot browse to
the domain name of the website. Which troubleshooting tool would be most useful in
determining where the problem is?
A. Tracert
B. Netstat
C. Ipconfig
D. Nslookup
29. The bit length for IPv6 address__________.
A. 128 bits
B. 32 bits
C. 192 bits
D. 64 bits
30. Which of the following statement about a wireless LAN controller is true?
A. They can simplify the management and deployment of wireless LANs
B. They rely on external firewalls for WLAN security
C. They are best suited to smaller wireless networks
D. They must be configured through a GUI over HTTP or HTTPS
31. The time required to examine the packet’s header and determine where to direct the
packet is part of _________.
A. Queuing delay
B. Processing delay
C. Transferring delay
D. Transmission delay
32. HTTP client requests by establishing a __________ connection to a particular port on the
server.
A. File transfer protocol
B. User datagram protocol
C. Broader gateway protocol
D. Transmission control protocol
33. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD
model is equivalent to the Network layer of the OSI model?
A. Network Access
B. Application
C. Internet
D. Host-to-Host
34. Which OSI Layer performs error detection but not correction?
A. Transport layer
B. Application Layer
C. Network Layer
D. Data link Layer
35. If the server NO clue about where to find the address for a hostname then?
A. Request is not processed
B. Server asks to root server
C. Server asks to its adjusting server
D. Server not reply for the request
36. It allows a visited website to store its own information about a user on the user’s
computer______.
A. Adware
B. Spam
C. Cookies
D. Malware
37. one of the following can explain mentoring
A. sales performance development
B. professional and personal development
C. daily, weekly and monthly transaction and reports
D. departmental budgets development
38. how many host addresses are available on the network 172.16.128.0 with a subnet mask
of 255.255.252.0?
A. 1022
B. 512
C. 510
D. 1024
39. How many host addresses are available on the 192.168.10.128/26 network?
A. 62
B. 64
C. 32
D. 60
40. Which of the following is valid different between a virus and a spyware?
A. Spyware damages data and also steals sensitive private information
B. Virus damages data and also steals sensitive private information
C. Virus damages data Spyware steals sensitive private information
D. Spyware damages data Virus steals sensitive private information
41. Refer to the exhibit bellow.as an administrator pings the default gateway at 10.10.10.1
and sees the output as shown. At which OSI layer is the problem?
C:\> ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of date:
Request time out
Request time out
Request time out
Request time out
Ping statistics for 10.10.10.1
Packets sent -4, received=0, lose -4(100% loss)
A. Network layer
B. Application layer
C. Session Layer
D. Datalink Layer
42. A network administrator needs to expand a network at ABC corporate office, which is
quickly growing. You are instructed to enlarge the area covered by a single LAN
segment, which one of the following is layer 1 device that you can use?
A. Network adapter card
B. Hub
C. Router
D. Switch
43. Given IP address 172.16.28.252 with subnet mask of 255.255.240.0 what is the correct
network address
A. 172.16.0.0
B. 172.16.28.0
C. 172.16.24.0
D. 172.16.16.0
44. One of the following is business in which two or more people have agreed to set up and
run an enterprise together with the intent of making profit
A. Trading enterprises
B. Service enterprises
C. Partnership enterprises
D. Small scale enterprises
45. Which one of the following is the rule of effective communication?
A. Be unconsciousness for personal benefit
B. Not recognize that actions speak louder than words
C. Organize your thoughts
D. Always translate the message in to benefits for our self than the other party
46. Router, Access switches, hub and word processing operate at _______,_________and
_______ layer respectively?
A. 3,3,1,7
B. 3,2,1,7
C. 3,3,2
D. 3.2.1.None
47. To back up Active directory, you must install what feature from the server manager
console?
A. Backup exec f
B. Windows server backup
C. Active Directory backup client
D. Windows backup utility
48. A service that a computer uses to resolve NETBIOS names without any administrative
work on your network?
A. DHCP
B. FTP
C. UDP
D. WINS
49. DHCP uses UDP port number___________for Sending data to the server
A. 66
B. 69
C. 67
D. 68
50. A leadership style in which the leader includes one and more employees in the decision-
making process is
A. Authoritarian or autocratic
B. Delegate or free reign
C. Participative or democratic
D. Federalist
51. Which one of the following are benefits of VLANS?
A. They simplify switch administration
B. They increase the number of broadcast domains while increasing the size of the
broadcast domains
C. They increase the size of broadcast domains while decreasing the number of
collision domains
D. They increase the number of broadcast domains while decreasing the size of the
broadcast domains
52. Which of the following is a principle of total quality management?
A. Continuous defect elimination
B. Continuous value enhancement
C. Continuous process improvement
D. Continuous productivity improvement read……..
53. The system partition on a windows server must always be installed to a dynamic host
configuration protocol___________.
A. NTFS Volume
B. Simple volume
C. FAT32 volume
D. Dynamic disk
54. The method of communication in which transaction takes place in both direction, but
only in one direction at a time is called?
A. Simplex
B. Half Duplex
C. Full Duplex
D. Four wire circuit
55. What is the reason a network administrator would segment a network with a layer 2
switch?
A. To create fewer collision domains
B. To eliminate virtual circuits
C. To enhance user bandwidth
D. To isolate ARP request messages from the rest of the network
56. What security violation would cause the most amount of damage to the life of home user
A. Denial of service to your email server
B. Capturing of personal data that leads to identity theft
C. Replication of worms and viruses in your computer
D. Spyware that leads to spam emails
57. Which of the following services use TCP____________.
1.DHCP
2. SMTP
3.HTTP
4. TFTP
5. FTP
A. 2,3 and 5
B. 1,3 and 4
C. 1 and 2
D. 1,2 and 4
58. Which class of a network is used for experimental testing
A. Class D
B. Class A
C. Class E
D. Class B
59. What is an important first consideration when starting to design a network?
A. Protocols to be used
B. Size of the network
C. Type of application
D. Access security
60. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
A. 192.168.168.128-190
B. 192.168.168.129-191
C. 192.168.168.128-192
D. 192.168.168.129-190
61. A technician is to document the current configurations of all network devices in a
college, including those in off-site buildings. Which protocol would be best to use to
securely access the network devices?
A. Telnet
B. FTP
C. HTTP
D. SSH
62. Which is an important characteristic of communication?
A. Communication involves exchange of ideas, feelings, information, thoughts and
knowledge.
B. Communication process does not happen between more than two parties.
C. Communication does not involve mutuality of understanding between sender and
receiver.
D. It is a 1-way process
63. Access point exists in __________
A. Application Layer
B. Network layer
C. Datalink layer
D. Transport layer
64. Your network consists of an active directory forest that contains one domain named
contoso.com. all domain controllers run windows server 2008 and are configured as DNS
servers. You have two Active directory-integrated zones: contoco.com and
nwtraders.com you need to ensure a user is able to modify records in the contoso.com
zone. You must prevent the user from modifying the SOA record in the nwtraders.com
zone. What should you do ?
A. From the DNS manager Console, modify the permissions of the nwtraders.com
zone.
B. From the DNS manager Console, modify the permissions of the contoso.com
zone.
C. From the active directory users and computer console, modify the permissions of
the domain controllers organizational unit(OU).
D. From the active directory users and computer console, run the delegation of
control wizard.
65. Which of the following are layers in the TCP/IP model? am
1. Application
2. Session
3. Transport
4. Internet
5. Datalink
6. Physical
A. 1 and 2
B. 2,3 and 5
C. 1,3 and 4
D. 3,4 and 5
66. ____________is the signal sent from a TV station to your TV
A. Full duplex
B. Multiplex
C. Simplex
D. Half-duplex
67. what is the advantage of using SSH over Telnet?
A. SSH operates faster than telnet
B. SSH provides secure communication to access hosts
C. SSH supports authentication for a connection request
D. SSH is easier to use
68. which attack involve a compromise of data that occurs between two end points?
A. Extraction of security parameters
B. Denial of service
C. Man-in-middle attack
D. Username enumeration
69. in wireless distribution system
A. multiple access point are inter-connected with each other
B. only one access point exists
C. only one wired access point
D. there is no access point
Given the necessary materials and supplies the candidate is expected to perform the following
project:
ABC Company is one of the known companies producing consumable products in your country.
It is also a company that can be categorized in organizations using network infrastructure.
Currently the organization’s network is using Windows Server 2003 as a server operating
system. It is known that the latest network operating system - Windows Server 2008 is released
by Microsoft Company. At current time, most of the organizations are migrated to this new
technology and getting all securities and other advantages of this technology.
Therefore, you need to plan to migrate your organization’s network server to this new
technology.
Tasks:
1. Compare Windows Server 2008 and Windows Server 2003 Operating Systems and list
the advantage of Server 2008 over server 2003.
2. Prepare a proposal on the importance and advantages of migration
3. Prepare a proposal and identify if the current structure of the network needs modification
both in physical and logical design of the network
4. Prepare presentation on the proposal to convince the higher officials for the migration.
Observation Checklist
Candidate’s Name:
Assessor’s Name:
Occupation: Hardware and Network Servicing LV_IV
Date of Assessment:
Time of Assessment:
Instructions for the Assessor
Observe the candidate.
Describe the assessment activity and the date on which it was undertaken
Place a tick in the box to show that the candidate completed each aspects of the activity
to the standard expected in the enterprise.
Ask the candidate a selection of the questions from the attached list to confirm his/ her
underpinning knowledge.
Place a tick in the box to show that the candidate answered the questions correctly.
Complete the feedback sections of the form.
OBSERVATION
During the demonstration of skills, did the candidate: Yes No
Project 1:- Design Network Infrastructure
Tasks:- Given the following scenario, do according to the following
Design the physical and logical network diagram as much similar as the
given diagram (See the Diagram)
8/21/2010
Service Provider
e
C abl
ial
Se r
UTP_Straight through
Router
UTP_CrossOver UTP_CrossOver
UTP_CrossOver
UTP_CrossOver Distribute Switch
Building1
Access Switch
Access Switch
UTP_CrossOver
Access Switch
UTP_CrossOver Access Switch
Building_2
Access Switch Building_3
Access Switch