Knowledge Level-IV
Knowledge Level-IV
Knowledge Level-IV
Ministry Of Education
Sector: ICT
Sub Sector: Information Technology
Occupation: Hardware and Network Servicing- L-IV:
Knowledge Assessment _v1
The assessment covers the following units of competence:
1. Plan and Organize Work
2. Assist with Policy Development for Client Support
3. Build Internet Infrastructure
4. Migrate to New Technology
5. Determine Maintenance Strategy
6. Establish Quality Standards
7. Utilize Specialized Communication Skills
8. Develop Team and Individuals
9. Manage and Maintain Small/Medium Business Operations
10. Manage Continuous Improvement System
Candidate name
Registration number
Name of training provider
Name of Assessment Center
Structure of Test
Section No of questions No of marks Suggested time
A-Multiple choice questions 21 21 30min
B-Matching Type 15 15 20min
Total 36 50min
February 2013
Instructions
1. Write your name, Registration number, name of training provider and Assessment
center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited Assessor
5. You may use the following references in this test
Non-programmable calculators
6. Do not bring the following items into the assessment venue
Mobile telephones
Programmable calculators
Written notes
2. A type of network that supports two /more organizations and that allows controlled access
from the outside for specific purposes. (UC-02)
A. Intranet
B. Extranet
C. Internet
3. You want all network clients to download and install updates automatically during night
hours, and you have configured scheduled installation behavior for Automatic Updates.
However, you discover that some users are turning off their machines at night and updates
are not being applied. The group policy that enables you to correct this situation without
changing the installation schedule?(UC-02, UC-10)
4. Assume that you are giving a service and you want to measure its quality. The best way to
do this. (UC-06)
A. Asses the time it takes to deliver the service
B. Implement periodic self assessment to be completed by staff only
C. To give out survey at the end of each interaction with customers to measure their
satisfaction
D. Wait until you receive a complaint from customers
5. A user can login to his computer but cannot access network resources. The user has all the
appropriate group memberships and permissions, but he still cannot access shared
resources. The cause of this problem (UC-10)
A. All clients download updates from a single WSUS server at the head office.
B. Each location has an independent WSUS server that serves local clients.
C. Each remote location has replica WSUS servers that copy their configuration from
the head office WSUS server.
D. Each remote location has a disconnected WSUS server and updates are imported
on those servers from DVD.
7. Your company has a main office and a branch office. You deploy a read-only domain
controller (RODC) that runs Microsoft Windows Server 2008 to the branch office. You need
to ensure that users at the branch office are able to log on to the domain by using the
RODC. What should you do? (UC-10)
D. Decrease the replication interval for all connection objects by using the Active Directory
Sites and Services console.
8. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue? (UC-5)
D. Escalate if necessary
9. A common method used to prevent the unauthorized network devices from sending traffic
across a network is port.
A. Spanning
B. Address translation
C. Mirroring
D. Authentication
10. The type of license key allows you to host an activation service locally within your own
network. (UC-10)
11. A new project requires that users in your domain and in the domain of a partner Organization
have access to a shared folder on your file server. Which type of group should you create to
manage the access to the shared folder? (UC-10)
A. Domain local security group
12. You are giving training about computer and network maintenance for a maintenance team.
As a trainer, the first step in the maintenance process you recommend. (UC-05)
13. You are going to build Internet infrastructure with 31 subnets and 7 usable host addresses per
each subnet. The class C subnet mask for this case. (UC-03)
A. 255.255.255.240
B. 255.255.255.244
C. 255.255.255.250
D. 255.255.255.242
14. The reason that end users need to be aware of the security policy. (UC-10)
A. Some security decisions are usually in their hands
15. You are a network administrator at XYZ Company, and one of your tasks is designing the
company security policy. The element NOT to be specified in an enterprise security policy.
(UC-10)
16. The first step in establishing a disaster recovery plan (DRP). (UC-05)
B. Collusion
C. Least privilege
D. Delegation of power
19. While you are configuring new wireless clients, none of the new clients is able to connect to
the network, but clients already on the same access point do not have any connectivity
problem. Which is NOT the possible reason for this problem? (UC-03, UC-05)
C. An incorrect IP address
20. You a network administer for ABC Company. You are verifying the configuration of a newly
installed host by establishing an FTP connection to the remote server. The highest layer of
the protocol stack you are using for this operation. (UC-03)
A. Application
B. Presentation
C. Session
D. Transport
21. You have a domain controller that runs Windows Server 2008 and is configured as a DNS
Server. You need to record all Inbound DNS queries to the Server. What should you
configure in the DNS Manager console? (UC-10)
Type I: Match the Statement in column A with the correct Term in column B
Column A Column B
Type II: Match the Statement in column A with the correct Policy and Setting in column B
Column A Column B
_______C___ 1. Specify the users permitted to be members of A. Account Policies
specific groups.
B. Local Policies
______A____ 2. Specify password restrictions, account lockout C. Restricted Group
policies, and Kerberos policies.
D. System Services
_____D_____ 3. Specify the startup types and permissions for E. Registry Permission
system services.
F. File system Permission
______B____ 4. Configure audit policies, user rights assignments, G. Event Log Policies
and security options policies.
Type III: Match the Statement in column A with the correct Server type in column B
Column A Column B
________D__ 1. Server that provides access connectivity for mobile A. DNS Server
user through telephone line.
B. WINS Server
_______F___ 2. Server used for mail receiving purpose in the C. DHCP Server
network.
D. RAS Server
_____A_____ 3. Server used to resolve names to IP address and IP E. VPN Server
addresses to names.
F. POP Server
_____C_____ 4. Server used to allocate IP addresses to large
number of PCs in a network environment.