New Level 4 Doc 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

1.

FTP Server Listens For Connection On Port Number

A. 22 C. 21
B. 25 D. 23

2. Dawit is Fetching Mails from a server lying at a remote location. Which Protocol is he using to
fetch the mails?

A. S/MIME C. SMTP
B. HTTP D. POP3

3. Which of the following are layers in the TCP/IP model? Am

1. Application 4. Internet
2. Session 5. Data link
3. Transport 6. Physical

A. 3 , 4 and 5 C. 1, 3 and 4
B. 1 and 2 D. 2, 3, and 5

4. Your Network Contains an Active Directory Domain Named Contoso.com. The Domain contains a
Domain Controller named DC1. You have a Member server named server 1. Both DC1 and Server
1 have the DNS Server role installed. On DC1. You create an Active Directory Integrated zone
named adatum.com you need to ensure that server 1 receives a copy of the zone.
A. Modify the zone transfer settings of adatum.com
B. Modify the zone type of adatum.com
C. Add server 1 to the DNS update proxy group
D. Create a secondary zone on server 1
5. Which of the following statement about a wireless LAN controller is true?
A. They must be configured through a GUI over HTTP or HTTPS
B. They are best suited to smaller wireless Network
C. They can Simplify the management and deployment of wireless LANs
D. They rely on external firewall for WLAN Security
6. UTP Is commonly used in

1. DSL 3. SMTP
2. HTTP 4. FTTP

7. THe Network Design for a Collage With users at five Sites is being developed. Where in the
campus network Architecture would Servers used by all users be located?

A. Data center C. Access- distribution


B. Enterprise edge D. Services
8. Refer to the exhibit bellow. As an Administrator pings the default gateway at 10.10.10.1 and sees
the Output as shown. At which OSI Layer is the problem?
C :\> Ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data
Request time out.
Request time out.
Request time out.
Request time out.
Ping statistics for 10.10.10.1
Packet sent -4 Received=0, host-4(100%loss)

A. Session Layer C. Application Layer


B. Data link Layer D. Network Layer

9. A type of cabling used used to connect a router to a computer using console serial port.

A. Cross over C. Roll over


B. SFP D. Straight through

10. The bit length of IPV6 address

A. 32 bits C. 128 bits


B. 192 bits D. 64 bits

11. ------------- is the process that helps managers understand the nature of industry, the way firms
behave competitively within the industry, and how competition generally under taken.

A. Market needs analysis C. Portfolio analysis


B. Organizational analysis D. Strategic market analysis

12. The willingness to exert high level of effort to reach organizational goals based on the efforts
ability to satisfy some individual need is known as-----?

A. Need configuration D.
B. Leadership E. Motivation
C. Effort management

13. Which of the following protocol used port 443 and port 80 respectively?

A. HTTP and HTTPS C. XHTML


B. HTTPS and HTTP D. DHTML

14. Which OSI Physical Layer term describes the amount of time , including delays , for data to travel
from one point to another?

A. Latency B. Good put


C. Bandwidth D. Throughput

15. Which of the following is valid difference between a virus and a spyware?
A. Spyware damages data, virus steals sensitive private information
B. Virus damages data, and also steals sensitive private information
C. Spyware damages data and also steals sensitive private data
D. Virus damages data, spyware steals sensitive private information
16. DHCP uses UDP Port number _____ for sending data to the server.

A. 69 C. 66
B. 68 D. 67

17. A protocol that uses a text- based connection to a Remote computer______?

A. HTTPS C. FTP
B. Telnet D. SSH

18. Which Attack involves a compromise of data that occurs between two end points?
A. Man-in- the- middle attack
B. Denial-of –service
C. User name enumeration
D. Extraction of security parameters
19. The Correct order of data encryption is?
A. Data---Packet…>Frame...>Segment…>Bit
B. Bit…..>Packet…>frame….>Segment….>Data
C. Data….>Segment…>Packet…>Frame…..>Bit
D. Bit….> segment….>Frame….>packet…>Data
20. You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of disk
space and prevent users from consuming more than 1 GB of disk space. How will configure it?
a. Create a hard quota with a 1 GB limit. Create a warning at 80 percent
b. Create a hard quota with a 800Mb limit and a second soft quota with a limit 1 GB
c. Create a soft quota with a 800Mb limit. create a warning at 80 present
d. Create a soft quota with a 800Mb limit and a second quota with a 1GB limit
e.
21. In which of the following protocols does a website (if accessed using the protocol) encrypt the
session with a digital certificate?

a. HTTPS c. XHTTPS
b. TCPS d. SHT

22. Every time you insert a music CD, you receive a dialog box that asks which action you went
windows to perform. Which should you configure so that your personal computer automatically
identifies an audio CD and starts playing music?
a. The personalization setting c. The auto play settings
b. A desktop gadget d. The ease of access settings

23. Most frequently Used framework for obtaining continuous improvement is_______

a. The plan-do-check-act cycle c. The cause and effect process


b. Quality function deployment d. The quality circle

24. A network administrator wants to implement a network medium that is not susceptible to
electromagnetic interference, type of cable you would to use?

a. Cat 5 UTP cable c. Thicket coax


b. Thin net coax d. Fiber-optic cable

25. Local GPO setting are stored in what folder on a computer?


a. %system root%/system/group policy
b. %system root%/system 32/group policy
c. %system root%/system 32/drivers/Etc/group policy
d. %system root%/system32/drivers/group policy
26. Microsoft windows server 2008 users the windows installer with group policy to install and
manage software that is packaged in to what type of file?

a. .mse c. .msi
b. .in d. .exe

27. It allows a visited website to a store its own information about a user’s computer______.

a. Spam c. Malware
b. Adware d. Cookies

28. Which of the following statements about a group is true?


a. The definition of group suggests that a group is more people together for any reason
b. Group should be formal
c. You need five or more people to be considered a work group
d. Formal groups are aimed at specific social agendas
29. When a manager monitors the work performance of workers in his department to determine if
the quality of their work is ‘up to side’, this manager is engaging in which function?

a. Organizing c. Leading
b. Planning d. Controlling

30. The schedule activities are based on a preset schedule that is established regardless of need.
a. Interval based maintenance
b. Reliability-centered maintenance
c. Predictive maintenance
d. Rehabilitation maintenance
31. Network layer fire wall has tow sub-categories known as_____
a. Circuit frame and packet frame
b. Frame firewall and packet firewall
c. Bit oriented firewall and byte oriented firewall
d. State full firewall and stateless firewall
32. A protocol which deals with resolving domain names is________

a. SMTP c. DNS
b. POP3 d. DHCP

33. A corporate network includes an active directory domain service (AD DS) forest that contains two
domains. All servers run windows server 2008 R2. All domain controllers are configured as DNS
servers. A standard primary zone for dev.contoso.com is stored on a member server. You need to
ensure that all domain controllers can resolve names from the dev.contoso.com zone. What
should you do?
a. On one domain controller. Create a conditional forwarding. Configure the conditional
forwarder to replicate to all DNS servers in the domain
b. On the member server, create a secondary zone
c. On one domain controller, create a stub zone. Configure the stub zone To replicate to all
DNS servers in the domain
d. On one domain controller, create a stub zone. Configure the stub zone to replicate to all
DNS servers in the forest
1. A

Common port numbers


Number Assignment
20 File Transfer Protocol (FTP) Data Transfer
21 File Transfer Protocol (FTP) Command Control
22 Secure Shell (SSH) Secure Login
23 Telnet remote login service, unencrypted text messages
25 Simple Mail Transfer Protocol (SMTP) E-mail routing
53 Domain Name System (DNS) service
67, 68 Dynamic Host Configuration Protocol (DHCP)
80 Hypertext Transfer Protocol (HTTP) used in the World Wide Web
110 Post Office Protocol (POP3)
119 Network News Transfer Protocol (NNTP)

123 Network Time Protocol (NTP)


143 Internet Message Access Protocol (IMAP) Management of digital mail

161 Simple Network Management Protocol (SNMP)

194 Internet Relay Chat (IRC)

443 HTTP Secure (HTTPS) HTTP over TLS/SSL


2. What is POP3 and which are the default POP3 ports

Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a
remote server to a local email client. POP3 allows you to download email messages on your
local computer and read them even when you are offline. Note, that when you use POP3 to
connect to your email account, messages are downloaded locally and removed from the email
server. This means that if you access your account from multiple locations, that may not be the
best option for you. On the other hand, if you use POP3, your messages are stored on your local
computer, which reduces the space your email account uses on your web server.

What is IMAP and which are the default IMAP ports


The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a
remote web server from a local client. IMAP and POP3 are the two most commonly used
Internet mail protocols for retrieving emails. Both protocols are supported by all modern email
clients and web servers.

What is SMTP and which are the default SMTP ports


Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the
Internet.

Solution (By Examveda Team)


3. This seems like a hard question at first because it doesn't make sense. The listed answers
are from the OSI model and the question asked about the TCP/IP protocol stack (DoD
model). However, let's just look for what is wrong. First, the Session layer is not in the
TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the
Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the
OSI), and Application layer (Application/Process in the DoD).

4. Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1.
You have a member server named Server1.
Both DC1 and Server1 have the DNS Server server role installed.
On DC1, you create an Active Directory-integrated zone named adatum.com.
You need to ensure that Server1 receives a copy of the zone.
Which two actions should you perform? (Each correct answer presents part of the
solution.
Choose two.)

A.Create a secondary zone on Server1.


B.Modify the zone type of adatum.com.
C.Modify the Zone Transfers settings of adatum.com,
D.Add Server1 to the DNSUpdateProxy group.
E.Create a primary zone on Server1.
Answers are: A & C
https://technet.microsoft.com/en-us/library/cc816885(v=ws.10).aspx
“Typically, adding a secondary DNS server to a zone involves three steps:
On the primary DNS server, add the prospective secondary DNS server to the list of name
servers that are authoritative for the zone.
On the primary DNS server, verify that the transfer settings for the zone permit the zone to be
transferred to the prospective secondary DNS server.
On the prospective secondary DNS server, add the zone as a secondary zone.”
5. Cisco Wireless is designed to provide 802.11 wireless networking solutions for
enterprises and service providers. Cisco Wireless simplifies deploying and managing
large-scale wireless LANs and enables a unique best-in-class security infrastructure. The
operating system manages all data client, communications, and system administration
functions, performs radio resource management (RRM) functions, manages system-wide
mobility policies using the operating system security solution, and coordinates all
security functions using the operating system security framework.
6. Unshielded twisted pair(UTP) is commonly used in home access.
7. A data center is a facility that centralizes an organization's shared IT operations
and equipment for the purposes of storing, processing, and
disseminating data and applications. Because they house an organization's most
critical and proprietary assets, data centers are vital to the continuity of daily
operations.
8. The Network layer is responsible for network addressing and routing
through the internetwork. So a ping fails, you may have an issue with the
Network layer (although lower layers like Data Link & Physical may cause
the problem).

11. Portfolio analysis is an examination of the components included in a mix of


products with the purpose of making decisions that are expected to improve overall
return. The term applies to the process that allows a manager to recognize better
ways to allocate resources with the goal of increasing profits.
A market analysis is a quantitative and qualitative assessment of a market. It looks
into the size of the market both in volume and in value, the various customer segments
and buying patterns, the competition, and the economic environment in terms of barriers
to entry and regulation

Organizational analysis is the process of appraising the growth, personnel,


operations, and work environment of an entity. Undertaking an organizational
analysis is beneficial, as it enables management to identify areas of weakness and
then find approaches for eliminating the problems.

Strategic market analysis isn't a concept that's been extensively discussed, but it's
any market analysis relating to the overall strategy of your organization, or even the
individual decisions you make within that organization.

13. Latency is a measure of delay. In a network, latency measures the time it takes for


some data to get to its destination across the network. It is usually measured as a
round trip delay - the time taken for information to get to its destination and back again.

Bandwidth describes the maximum data transfer rate of a network or Internet


connection. It measures how much data can be sent over a specific connection in a
given amount of time. For example, a gigabit Ethernet connection has a bandwidth of
1,000 Mbps (125 megabytes per second)

Throughput tells you how much data was transferred from a source at any given
time and bandwidth tells you how much data could theoretically be transferred
from a source at any given time. Knowing how both throughput and bandwidth are
performing is crucial for administrators hoping to get a clear picture of their network’s
performance. As always, there’s software available to potentially make this process
easier and quicker.

good put (a portmanteau of good and throughput) is the application-level throughput of


a communication; i.e. the number of useful information bits delivered by the network to
a certain destination per unit of time.

14. Spyware is loosely defined as malicious software designed to enter


your computer device, gather data about you, and forward it to a third-party without
your consent. Spyware can also refer to legitimate software that monitors your data for
commercial purposes like advertising.

Computer virus is a type of malicious code or program written to alter the way
a computer operates and is designed to spread from one computer to another.
A virus operates by inserting or attaching itself to a legitimate program or document
that supports macros in order to execute its code
15. Explanation: 67 is the UDP port number that is used as the destination port of a
server. Whereas UDP port number 68 is used by the client.

17. Telnet is an application protocol used on the Internet or local area network to


provide a bidirectional interactive text-oriented communication facility using a virtual
terminal connection.

18. A man-in-the-middle (MitM) attack is when an attacker intercepts


communications between two parties either to secretly eavesdrop or modify traffic
traveling between the two. Attackers might use MitM attacks to steal login credentials
or personal information, spy on the victim, or sabotage communications or corrupt
data.

A Denial of Service (DoS) is a type of attack on a service that disrupts its normal


function and prevents other users from accessing it. The most common target for a DoS
attack is an online service such as a website, though attacks can also be launched
against networks, machines or even a single program.

The username enumeration is an activity in which an attacker tries to retrieve


valid usernames from a web application. The web applications are mostly vulnerable to
this type of attack on login pages, registration form pages or password reset pages.
19. The encapsulation method is data, segment, packet, frame, and bit.

23. Quality Circles can be described as a small group of employees of ... The concept
is based on the premise that the people who do a job everyday ...

A Cause-and-Effect Diagram is a tool that helps identify, sort, and display


possible causes of a specific problem or quality characteristic

The PDCA/PDSA cycle is a continuous loop of planning, doing, checking (or


studying), and acting. It provides a simple and effective approach for solving problems
and managing change. The model is useful for testing improvement measures on a
small scale before updating procedures and working practices.

Definition: Quality Function Deployment, or QFD, is a model for product


development and production popularized in Japan in the 1960's. The model aids in
translating customer needs and expectations into technical requirements by listening to
the voice of customer.

27. Spam is any kind of unwanted, unsolicited digital communication that gets sent out
in bulk. And it's more than a nuisance. Spam today is a serious threat.

Malware is the collective name for a number of malicious software variants, including
viruses, ransomware and spyware. Shorthand for malicious software, malware typically
consists of code developed by cyberattackers, designed to cause extensive damage to
data and systems or to gain unauthorized access to a network.

Cookies are text files with small pieces of data — like a username and password —
that are used to identify your computer as you use a computer network. ... Data stored
in a cookie is created by the server upon your connection. This data is labeled with an
ID unique to you and your computer.

Adware is also known as advertisement-supported software. Creators


of adware include advertisements or help distribute other software to earn money. In
many cases, ads may be within the software itself

30. Maintenance carried out at predetermined intervals or according


to prescribed criteria, aimed at reducing the failure risk or
performance degradation of the equipment.
The maintenance cycles are planned according to the need to take the
device out of service. The incidence of operating faults is reduced.

Predictive maintenance (PdM) is maintenance that monitors the performance and


condition of equipment during normal operation to reduce the likelihood of failures. Also
known as condition-based maintenance, predictive maintenance has been utilized in
the industrial world since the 1990s.

31. Firewall Most network layer firewalls can operate as stateful or stateless
firewalls, creating two subcategories of the standard network layer firewall. Stateful
firewalls have the advantage of being able to track packets over a period of time for
greater analysis and accuracy — but they require more memory and operate more
slowly. Stateless firewalls do not analyze past traffic and can be useful for systems
where speed is more important than security, or for systems that have very specific
and limited needs. For example, a computer that only needs to connect to a
particular backup server does not need the extra security of a stateful firewall.

You might also like