0% found this document useful (0 votes)
701 views40 pages

Coc Level III Exam

The document contains a series of questions related to computer networking concepts. Some key points: - Questions cover topics like the OSI model layers, IP addressing, network topologies, and common network devices/protocols. - Multiple choice answers are provided for each question to test understanding of networking fundamentals. - Correct answers are indicated for some questions, useful for self-assessment of networking knowledge.

Uploaded by

fantahun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
701 views40 pages

Coc Level III Exam

The document contains a series of questions related to computer networking concepts. Some key points: - Questions cover topics like the OSI model layers, IP addressing, network topologies, and common network devices/protocols. - Multiple choice answers are provided for each question to test understanding of networking fundamentals. - Correct answers are indicated for some questions, useful for self-assessment of networking knowledge.

Uploaded by

fantahun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

Coc level II

I HNS EXAM
Coc exam preparation question

• 1.which one of the following is connection oriented and reliable



• (A/) TCP c/udp
• B/ HTTP d/FTP

• 2. which layers of Osi model are host to host layers?

• A/transport B/ session
• C/presentation d/application E/all

• 3.how many layers are osi reference model has?

• A/ 7. B/ 6
• C/5. D/4

• 4. What is the size of ipv4 address?

• A 32 bit. B 24 bit
• C. 34 bit. D 48 bit

• 5. World wide web (www) was created by :-
• A/ Charles Babbage
• B/linus torvalds
• C/dennis retchie
• D/Tim Berbers Lee

• 6. The first computer were programmed by:-
• A. Machine language
• B. Assembly language
• C. Source code
• D. Object code

7. DSL is an example of a(an)________connection?
A Broadband. C Network
B Wireless. D Slow
8. BIOS is responsible for
A. Handling the particular of input or output
operations
B. Output operations
C. Input operations
D. All of the above
• Column A

• [L]1. Expansion card

• [N]2. Cable

• [D] 3. Readability

• [A]4. Cache memory

• [O]5. Information

• [J]6. Operational procedures

• [C]7. Questionnaires

• [G]8. Knowledge

• [Q]9. Developer
• Column B

• A. L1 and L2

• B. Physical arrangement of network

• C. Survey

• D. Such as formatting and printing

• E. Workgroup

• F. Motherboard

• G. Understanding of doing something

• H. Memory

• I. Peer to peer, client- server

• J. Written instruction

• K. Transport

• L. PCI, ISA, AGP

• M. Clarity

• N. Fiber, unshielded Twisted Pair

• O. Information is entered and store in PC

• P. Power supply

• Q. Writer

• R. .

• S. Router_x0000_
• 9.Which topology the workstation goes down, it does not a
ffect the entire network?

• A. Star

• B. Bus

• C. Ring

• D. Straight line_x0000_
• One of your printers is not working properly and you want to pre
vent users from sending print jobs to the logical

• printer servicing that device. What should you do?

• A. Remove the printer from active directory

• B. Stop sharing the printer

• C. Rename the share

• D. Change the printer post

• Answer: B
• 37. While reviewing the security logs for your server, you notice that a user on the in
ternet has attempted to access

• your internal mail server. Although it appears that the user’s attempts were unsucce
ssful you are still very

• concerned about the possibility that your systems may be compromised. Which of th
e following solutions are you

• most likely to implement?

• A. A firewall system all the connection point to the internet

• B. A more secure password policy

• C. File-level encryption

• D. Kerberos authentication

• Answer: C

• 38. One of the following is not an example of network res
ource.

• A. Printer and other peripherals

• B. Files and applications

• C. Disk storage

• D. Hub

• Answer: D

• 39. A user can determine the network settings on the client’s networ
k interface cards as well as any that a DHCP

• server has leased to your computer by typing the following comman
d at a command prompt.

• A. Ping

• B. IP

• C. Ipconfig/all

• D. Connect

• Answer: C_x0000_
• If you choose to stop sharing the printer, users will no longer be able
to use the print device.

• 36. What type of profile will be most useful to maintain a locked-do
wn desktop common to all sales representatives?

• A. Local profile

• B. The all users profile

• C. Preconfigured roaming group profile

• D. Local mandatory profile

• Answer: C


• You want to ensure the highest level of security for your corporate intranet without the inf
rastructure of certificate

• services. The goal is to provide Authentication that is transparent to users and to allow sec
uring intranet recourses

• with the group accounts existing in active directory. All users are within the corporate fire
wall. What

• Authentication method should you choose?

• A. Basic Authentication

• B. Digest Authentication

• C. Anonymous Access

• D. Integrated windows Authentication

• Answer: D

• 42. Which one of the following is used only with domain contro
llers and enables you to restore directory services?

• A. Directory services restore mode

• B. Last Known good configuration

• C. Debugging mode

• D. Safe mode

• Answer: A

• 41. Which class the IP addressing provides 24 bits of network addr
essing and 8 bits of host addressing by default. The

• most secure and strong password from the following list is:

• A. Class A

• B. Class B

• C. Class C

• D. Class D

• Answer: C
• 43. You have just resolved a very complex network problem. During the process you
made some configuration

• changes on the network. The changes were successful and your client is now very ha
ppy with your performance.

• What should be your next step?

• A. Eliminate possibilities.

• B. Enable Auditing on all networks to prevent problems in the feature.

• C. Gather information.

• D. Document your work.

• Answer: D
• 43. You have just resolved a very complex network problem. During the pro
cess you made some configuration

• changes on the network. The changes were successful and your client is no
w very happy with your performance.

• What should be your next step?

• A. Eliminate possibilities.

• B. Enable Auditing on all networks to prevent problems in the feature.

• C. Gather information.

• D. Document your work.

• Answer: D
• 44. Data for your corporate intranet is currently stored on the D: drive of your IIS ser
ver. It is decided HR department

• will serve information about the company benefit and policies from its server and th
at the URL to access the HR

• information should be http://intranetcontoso.com.hr. what do you need to configure
?

• A. A new ftp site

• B. Virtual directory

• C. A new website

• D. Virtual directory from file

• Answer: D
• 45. What is the default subnet mask for class C network?

• A. 255.0.0.0

• B. 127.0.0.1

• C. 255. 255.0.0

• D. 255. 255. 255.0

• Answer: D

• 46. You are troubleshooting a network using STP twisted pair and suspect that the maximum length has been

• exceeded. What is the maximum length of STP twisted pair?

• A. 25 meters

• B. 1000 meters

• C. 10000 meters

• D. 100 meters

• Answer: D_x0000_
• 45. What is the default subnet mask for class C network?

• A. 255.0.0.0

• B. 127.0.0.1

• C. 255. 255.0.0

• D. 255. 255. 255.0

• Answer: D

• 46. You are troubleshooting a network using STP twisted pair an
d suspect that the maximum length has been

• exceeded. What is the maximum length of STP twisted pair?

• A. 25 meters

• B. 1000 meters

• C. 10000 meters

• D. 100 meters

• Answer: D_x0000_
You would like to test the restore procedures on your server,
but would also like to avoid affecting the production
copies of the backed-up data. What is the best restore
location to use?
A. Original location
B. Alternate location
C. Single folder
Answer: B_x0000_
• As a computer technician which one of the following is the ma
jor problem of monitor?

• A. Black screen and no power light

• B. Slow down operation

• C. No beep sound

• D. Error code starts with one

• Answer: A
• _x0000_
• Major problem of monitor:

•  Screen, Icon or Font Size Too Small or Too Big

•  Blank Screen or No Video

•  Distorted Image or Video, Flickering, Fuzzy, Blurry, or Color Problems

•  Brightness, Contrast, Horizontal Lines, Vertical Lines or Geometrical problems

•  Bright or Dead Pixel

• 95. What tool is used to enable remote desktop on a server?

• A. Terminal services manager

• B. Terminal services licensing

• C. System properties in control panel

• D. Terminal services configuration

• Answer: C


• 96. Sequencing, acknowledgements and flow control
are characteristic of which OSI layer?

• A. Layer 6

• B. Layer 3

• C. Layer 4

• D. Layer 1

• Answer c
•Good luc
k!!!!!!!!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy