0% found this document useful (0 votes)
5 views

coc exam

The document contains a series of questions related to computer networking, covering topics such as network security, remote access, internet definitions, network characteristics, and OSI model layers. It includes multiple-choice questions that test knowledge on various networking concepts and devices. The questions address practical scenarios, theoretical knowledge, and troubleshooting techniques relevant to networking professionals.

Uploaded by

kurib38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

coc exam

The document contains a series of questions related to computer networking, covering topics such as network security, remote access, internet definitions, network characteristics, and OSI model layers. It includes multiple-choice questions that test knowledge on various networking concepts and devices. The questions address practical scenarios, theoretical knowledge, and troubleshooting techniques relevant to networking professionals.

Uploaded by

kurib38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Coc exam reference

1. During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the computer.
Which types of threat is affecting this computer?
A. DoS attack
B. Identity theft
C. Spyware
D. Zero day attack
2. An employee wants to access the network of the organization remotely, in the safest possible
way. What network features would allow an employee to gain secure remote access to a company
network?
A. ACL
B. IPS
C. VPN
D. BYOD
3. What is internet?
A. It is a network based on Ethernet technology.
B. It provides network access for mobile devices.
C. It provides connections through interconnected global networks.
D. It is a private network for an organization with LAN and WAN connections.
4. What characteristic of a network enables it to quickly grow to support new users and applications
without impacting the performance of the service being delivered to existing users?
A. Reliability
B. Scalability
C. Quality of service
D. Accessibility
5. A college is building a new dormitory on its campus. Workers are digging in the ground to install
a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that
connects two of the existing dormitories to campus date center. Although the cable has been cut,
students in the dormitories only experience a very short interruption of network services. What
characteristic of the network is shown here?
A. Quality of service
B. Scalability
C. Security
D. Fault tolerance
E. Integrity
6. What are two characteristics of a scalable network? (choose two)
A. Easily overloaded with increased traffic
B. Grows in size without impacting existing users
C. Is not as reliable as a small network
D. Suitable for modular devices that allow for expansion
E. offers limited number of applications
7. Which device performs the function of determining the path that messages should take through
internetworks?
A. Router
B. A firewall
C. A web server
D. A DSL modem
Coc exam reference
8. Which two internet connection options do not require that physical cables be run to the building?
(choose two)
A. DSL
B. Cellular
C. Satellite
D. Dialup
E. Dedicated leased line
9. What types of network must a home user access in order to do online shopping?
A. An intranet
B. The internet
C. An extranet
D. A local area network
10. Which term refers to a network that provides secure access to the corporate offices by suppliers,
customers and collaborators?
A. Internet
B. Intranet
C. Extranet
D. Extended net
11. A large corporation has modified its network to allow users to access network resources from
their personal laptops and smart phones. Which networking trend does this describe?
A. Cloud computing
B. Online collaboration
C. Bring your own device
D. Video conferencing
12. What are two functions of end devices on a network?(choose two)
A. They originate the data that flows through the network.
B. They direct data over alternate paths in the event of link failures.
C. They filter the flow of data to enhance security.
D. They are the interface between humans and the communication network.
E. They provide the channel over which the network message travels.
13. What is an ISP?
A. It is a standards body that develops cabling and wiring standards for networking.
B. It is a protocol that establishes how computers within a local network communicate.
C. It is an organization that enables individuals and businesses to connect to the internet.
D. It is a networking device that combines the functionality of several difference networking
devices in one.
14. What process involves placing one PDU inside of another PDU?
A. Encapsulation
B. Encoding
C. Segmentation
D. Flow control
15. At which layer of the OSI model would a logical address be added during encapsulation?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
Coc exam reference
16. What method can be used by two computers to ensure that packets are not dropped because too
much data is being sent too quickly?
A. Encapsulation
B. Flow control
C. Access method
D. Response timeout
17. a network administrator enters the service password encryption command into the configuration
mode of a router. What does this command accomplish?
A. This command encrypts passwords as they are transmitted across serial WAN links.
B. This command prevents someone from viewing the running configuration passwords.
C. This command enables a strong encryption algorithm for the enable secret password
command.
D. This command automatically encrypts passwords in configuration files that are currently
stored in NVRAM.
E. This command provides an exclusive encrypted password for eternal service personal who
are required to do router maintenance.
18. A networking technician is working on the wireless network at a medical clinic. The technician
accidentally sets up the wireless network so that patients can see the medical records data of other
patients. Which of the four network characteristics has been violated in this situation?
A. Fault tolerance
B. Scalability
C. Security
D. Quality of service (QoS)
E. Reliability
19. Which of the following is the name for all computers connected to a network that participate
directly in network communication.
A. Servers
B. Intermediary device
C. Host
D. Media
20. At which OSI layer is a destination IP address added to a PDU during the encapsulation process?
A. Network layer
B. Application layer
C. Transport layer
D. Presentation layer
21. At which OSI layer is a destination port number added to a PUD during the encapsulation
process?
A. Transport layer
B. Data link layer
C. Network layer
D. Application layer
22. At which OSI layer is a source IP address added to a PDU during the encapsulation process?
A. Network layer
B. Application layer
C. Data link layer
D. Presentation layer
23. What term describes a network where one computer can be both client and server?
Coc exam reference
A. Peer-to-peer
B. Cloud
C. Quality of service
D. BYOD
24. What term describes a types of network used by people who work from home or from a small
remote office?
A. SOHO network
B. BYOD
C. Quality of service
D. Converged network
25. What term describes to a computing model where server software runs on dedicated computers?
A. Client /server
B. Intranet
C. Extranet
D. BYOD
26. A web client is receiving a response for a web page from a web server. From the perspective of
the client, what is the correct order of the protocol stack that is used to decode the received
transmission?
A. Ethernet , IP , TCP, HTTP
B. HTTP, TCP, IP, Ethernet
C. Ethernet , TCP, IP, HTTP
D. HTTP, Ethernet , IP, TCP
27. It allows a visited website to store its own information about a user on the user’s
computer………………..
A. Adware
B. Spam
C. Cookies
D. Malware
28. Users are complaining that they are unable to browse certain websites on the internet. An
administrator can successfully ping a web server via its IP address, but cannot browse to the
domain name of the website. Which troubleshooting tool would be most useful in determining
where the problem is?
A. Tracert
B. Netstat
C. Ipconfig
D. Nslookup
29. How many host addresses are available on the 192.168.10.128/26 network?
A. 64
B. 62
C. 162
D. 72
30. The correct order of data encryption is?
A. Bit---- packet –frame – segment --- data
B. Data – packet – frame –segment – bit
C. Data – segment – packet – frame – bit
D. Bit – segment – frame – packet – data
31. Most frequently used framework for obtaining continuous improvement is ………………….?
Coc exam reference
A. Quality function deployment
B. The plan-do-check-act cycle
C. The quality circle
D. The cause and effect process
32. What process involves placing one PDU inside of another PDU?
A. Encoding
B. Encapsulation
C. Segmentation
D. Flow control
33. The bit length of IPV6 address is …………………..?
A. 64
B. 32
C. 128
D. 192
34. A network administrator is implementing a policy that requires strong, complex password. Which
data protection goal does this policy support?
A. Data redundancy
B. Data quality
C. Data confidentiality
D. Data integrity
35. ……………………… is unsolicited emails sent out in massive blasts.
A. Spyware
B. Malware
C. Spam
D. Adware
36. What should you do to keep unauthorized users from changing your home wireless router setting?
A. Changing the firewall setting on your computer
B. Nothing only the administrator can change router setting
C. Change the default administrator password and SSID
D. Change the MAC address of the router
37. HTTP client requests by establishing a ……………….. Connection to a particular port on the
server.
A. User datagram protocol
B. Transmission control protocol
C. Broader gateway protocol
D. None
38. Refer to the exhibit bellow as an administrator pings the default gateway at 10.10.10.1 and sees
the output as shown. At which OSI layer is the problem?
C:\>ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data:
Request time out
Request time out
Request time out
Request time out
Ping statistics for 10.10.10.1
Packet sent -4, received=0, lose -4(100% loss)
A. Network layer
Coc exam reference
B. Application layer
C. Data link layer
D. Presentation layer
39. Which class of a network is used for experimental testing
A. Class A
B. Class B
C. Class D
D. Class E
40. A network administrator needs to expand a network at ABC corporate office, which is quickly
growing. You are instructed to enlarge the area covered by a single LAN segment. Which one of
the following is layer 1 device that you can use?
A. Network adapter card
B. Hub
C. Router
D. Switch

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy