New Level 4 Doc 2
New Level 4 Doc 2
New Level 4 Doc 2
A. 22 C. 21
B. 25 D. 23
2. Dawit is Fetching Mails from a server lying at a remote location. Which Protocol is he using to
fetch the mails?
A. S/MIME C. SMTP
B. HTTP D. POP3
1. Application 4. Internet
2. Session 5. Data link
3. Transport 6. Physical
A. 3 , 4 and 5 C. 1, 3 and 4
B. 1 and 2 D. 2, 3, and 5
4. Your Network Contains an Active Directory Domain Named Contoso.com. The Domain contains a
Domain Controller named DC1. You have a Member server named server 1. Both DC1 and Server
1 have the DNS Server role installed. On DC1. You create an Active Directory Integrated zone
named adatum.com you need to ensure that server 1 receives a copy of the zone.
A. Modify the zone transfer settings of adatum.com
B. Modify the zone type of adatum.com
C. Add server 1 to the DNS update proxy group
D. Create a secondary zone on server 1
5. Which of the following statement about a wireless LAN controller is true?
A. They must be configured through a GUI over HTTP or HTTPS
B. They are best suited to smaller wireless Network
C. They can Simplify the management and deployment of wireless LANs
D. They rely on external firewall for WLAN Security
6. UTP Is commonly used in
1. DSL 3. SMTP
2. HTTP 4. FTTP
7. THe Network Design for a Collage With users at five Sites is being developed. Where in the
campus network Architecture would Servers used by all users be located?
9. A type of cabling used used to connect a router to a computer using console serial port.
11. ------------- is the process that helps managers understand the nature of industry, the way firms
behave competitively within the industry, and how competition generally under taken.
12. The willingness to exert high level of effort to reach organizational goals based on the efforts
ability to satisfy some individual need is known as-----?
A. Need configuration D.
B. Leadership E. Motivation
C. Effort management
13. Which of the following protocol used port 443 and port 80 respectively?
14. Which OSI Physical Layer term describes the amount of time , including delays , for data to travel
from one point to another?
15. Which of the following is valid difference between a virus and a spyware?
A. Spyware damages data, virus steals sensitive private information
B. Virus damages data, and also steals sensitive private information
C. Spyware damages data and also steals sensitive private data
D. Virus damages data, spyware steals sensitive private information
16. DHCP uses UDP Port number _____ for sending data to the server.
A. 69 C. 66
B. 68 D. 67
A. HTTPS C. FTP
B. Telnet D. SSH
18. Which Attack involves a compromise of data that occurs between two end points?
A. Man-in- the- middle attack
B. Denial-of –service
C. User name enumeration
D. Extraction of security parameters
19. The Correct order of data encryption is?
A. Data---Packet…>Frame...>Segment…>Bit
B. Bit…..>Packet…>frame….>Segment….>Data
C. Data….>Segment…>Packet…>Frame…..>Bit
D. Bit….> segment….>Frame….>packet…>Data
20. You need to use disk quotas to send an e-mail to users when they have consumed 800Mb of disk
space and prevent users from consuming more than 1 GB of disk space. How will configure it?
a. Create a hard quota with a 1 GB limit. Create a warning at 80 percent
b. Create a hard quota with a 800Mb limit and a second soft quota with a limit 1 GB
c. Create a soft quota with a 800Mb limit. create a warning at 80 present
d. Create a soft quota with a 800Mb limit and a second quota with a 1GB limit
e.
21. In which of the following protocols does a website (if accessed using the protocol) encrypt the
session with a digital certificate?
a. HTTPS c. XHTTPS
b. TCPS d. SHT
22. Every time you insert a music CD, you receive a dialog box that asks which action you went
windows to perform. Which should you configure so that your personal computer automatically
identifies an audio CD and starts playing music?
a. The personalization setting c. The auto play settings
b. A desktop gadget d. The ease of access settings
23. Most frequently Used framework for obtaining continuous improvement is_______
24. A network administrator wants to implement a network medium that is not susceptible to
electromagnetic interference, type of cable you would to use?
a. .mse c. .msi
b. .in d. .exe
27. It allows a visited website to a store its own information about a user’s computer______.
a. Spam c. Malware
b. Adware d. Cookies
a. Organizing c. Leading
b. Planning d. Controlling
30. The schedule activities are based on a preset schedule that is established regardless of need.
a. Interval based maintenance
b. Reliability-centered maintenance
c. Predictive maintenance
d. Rehabilitation maintenance
31. Network layer fire wall has tow sub-categories known as_____
a. Circuit frame and packet frame
b. Frame firewall and packet firewall
c. Bit oriented firewall and byte oriented firewall
d. State full firewall and stateless firewall
32. A protocol which deals with resolving domain names is________
a. SMTP c. DNS
b. POP3 d. DHCP
33. A corporate network includes an active directory domain service (AD DS) forest that contains two
domains. All servers run windows server 2008 R2. All domain controllers are configured as DNS
servers. A standard primary zone for dev.contoso.com is stored on a member server. You need to
ensure that all domain controllers can resolve names from the dev.contoso.com zone. What
should you do?
a. On one domain controller. Create a conditional forwarding. Configure the conditional
forwarder to replicate to all DNS servers in the domain
b. On the member server, create a secondary zone
c. On one domain controller, create a stub zone. Configure the stub zone To replicate to all
DNS servers in the domain
d. On one domain controller, create a stub zone. Configure the stub zone to replicate to all
DNS servers in the forest
1. A
Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a
remote server to a local email client. POP3 allows you to download email messages on your
local computer and read them even when you are offline. Note, that when you use POP3 to
connect to your email account, messages are downloaded locally and removed from the email
server. This means that if you access your account from multiple locations, that may not be the
best option for you. On the other hand, if you use POP3, your messages are stored on your local
computer, which reduces the space your email account uses on your web server.
4. Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1.
You have a member server named Server1.
Both DC1 and Server1 have the DNS Server server role installed.
On DC1, you create an Active Directory-integrated zone named adatum.com.
You need to ensure that Server1 receives a copy of the zone.
Which two actions should you perform? (Each correct answer presents part of the
solution.
Choose two.)
Strategic market analysis isn't a concept that's been extensively discussed, but it's
any market analysis relating to the overall strategy of your organization, or even the
individual decisions you make within that organization.
Throughput tells you how much data was transferred from a source at any given
time and bandwidth tells you how much data could theoretically be transferred
from a source at any given time. Knowing how both throughput and bandwidth are
performing is crucial for administrators hoping to get a clear picture of their network’s
performance. As always, there’s software available to potentially make this process
easier and quicker.
Computer virus is a type of malicious code or program written to alter the way
a computer operates and is designed to spread from one computer to another.
A virus operates by inserting or attaching itself to a legitimate program or document
that supports macros in order to execute its code
15. Explanation: 67 is the UDP port number that is used as the destination port of a
server. Whereas UDP port number 68 is used by the client.
23. Quality Circles can be described as a small group of employees of ... The concept
is based on the premise that the people who do a job everyday ...
27. Spam is any kind of unwanted, unsolicited digital communication that gets sent out
in bulk. And it's more than a nuisance. Spam today is a serious threat.
Malware is the collective name for a number of malicious software variants, including
viruses, ransomware and spyware. Shorthand for malicious software, malware typically
consists of code developed by cyberattackers, designed to cause extensive damage to
data and systems or to gain unauthorized access to a network.
Cookies are text files with small pieces of data — like a username and password —
that are used to identify your computer as you use a computer network. ... Data stored
in a cookie is created by the server upon your connection. This data is labeled with an
ID unique to you and your computer.
31. Firewall Most network layer firewalls can operate as stateful or stateless
firewalls, creating two subcategories of the standard network layer firewall. Stateful
firewalls have the advantage of being able to track packets over a period of time for
greater analysis and accuracy — but they require more memory and operate more
slowly. Stateless firewalls do not analyze past traffic and can be useful for systems
where speed is more important than security, or for systems that have very specific
and limited needs. For example, a computer that only needs to connect to a
particular backup server does not need the extra security of a stateful firewall.