Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

GAGE UNIVERSITY COLLEGE

TVET-PROGRAMS DEPARTMENT OF INFORMATION TECHNOLOGY


Hardware and network service (HNS) Level III EXTESION FIRST SEMESTER
SUMMATIVE ASSESSMENT (40%) KNOWLEDGE AND PRACTICAL PACKAGE

Trainee’s Name:

ID No.

Trainer’s name

Occupation/Department:

Section:

Entry & Level

Division. Please put tick mark() Regular Extension weekend

Learning module Unit Title: EIS HNS3 011221 Determine Best-Fit Topology

EIS HNS3 011221 Configure and Administer Server

EIS HNS3 011221 Install and Manage Network Protocols

EIS HNS3 071221 Create Technical Documentation

Date of Assessment: -------/------/ 2016 E.C

Time Allowed: 1:30 Hrs.

Prepared by: All ICT(HNS ---Level-III) Trainer’s


PART ONE Choose the best answer for the following alternative (1 pts.each

1. The network found in Gage University college


A. LAN
B. MAN
C. WAN
2. The type of computer which provide services to other computers in a network
A. Client
B. Standalone
C. Workstation
D. Server
3. - Which of the following is not true
A. In star topology if the central device fail the entire network will be down
B. Mesh topology have the maximum back up capability
C. In ring topology two computers can send data at the same time
D. In bus topology only one computer’s signal will transmit in the bus
4. - Transmit signal in the form of light signal
A. Coaxial cable
B. Fiber optic cable
C. UTP
D. STP
5. - The amount of data that can be transmitted in a fixed amount of time
A. Broadband
B. Internet
C. Bandwidth
D. Noise
6. - In which environment peer-to – peer network is a right choice
A. Centralized security is required
B. Where there is budget constraints
C. Where we need a security policy
D. All of the above
7. - Simplex transmission-------------------------
A. TV
B. Computer network
C. Telephone communication
8. - Which of the following is not true
A. In full duplex two device can communicate at the same time
B. In half duplex communication is takes place only in one direction
C. Telephone conversation is a full duplex communication
D. Radio uses a simplex communication
9. - Data formatting is takes place in layer of the OSI reference model
A. Physical layer
B. Presentation layer
C. Session layer
D. Application layer
10. - Internet explorer is found in layer of the OSI
A. Physical layer
B. Application layer
C. Data link layer
D. Presentation layer
11. - Makes to application to open, use and close a connection
A. Application layer
B. Network layer
C. Session layer
D. Data link layer
12. - The layer which is responsible for addressing computers
A. Presentation layer
B. Session layer
C. Transport layer
D. Network layer
13. - The set of rule and procedures which govern communication between computers
A. OSI
B. Topology
C. Protocol
D. IP
14. - The protocol which enables computer to send and receive e mail
A. FTP
B. SNMP
C. SMTP
D. HTTP
15. - Which of the following is connection oriented protocol
A. TCP
B. UDP
C. SMTP
D. Al
lA.
16. - One of the following doesn’t work in layer 2 of the OSI reference model
A. NIC
B. Repeater
C. Switch
D. Hub

17. Provides convenient, centralized access to files and directories for individual
users,departments, and entire organizations

A. Printer server B. File server C. Mail server D. all


18. Provide directory service to client in the network and used to mange computer , users
and othernetwork resource
a. Active Directory c. Database Server
b. Email server d. None
19. A method of accessing computer from another computer

A. File sharing B. Remote C. ipaddress D. Non


20. The Command used to access active directory installation wizard is called……

21. The protocol that automates IP configuration in your network is called----

A. DNS B. DHCP C. SMTP D. FTP


22. The configuration information for a DHCP client is received dynamically. The utility
used toread configuration IP address

A. PING
B. IPCONFIG
C. NSLOOKUP
D. TRACERT
PART Two Choose the best answer for the following alternative (1.5 pts. each

1. A security policy defines

A. When users cannot log in to their computers


B. What users can and cannot do with their computer
C. How the user should install their own software
D. How complex user password should be

2. A type of network that supports two /more organizations and that allows controlled access
from the outside for specific purposes.

A. Intranet
B. Extranet
C. Internet
D. Wide Area Network (WAN)

3. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue?

A. Identity symptoms and problems

B. Document the process and solutions

C. Establish the most probable cause

D. Escalate if necessary

4. You are giving training about computer and network maintenance for a maintenance team.
As a trainer, the first step in the maintenance process you recommend.
A. Gather data from the computer

B. Verify the obvious issues

C. Evaluate the problem and implement the solution

D. Gather data from the customer

5. The reason that end users need to be aware of the security policy.

A. Some security decisions are usually in their hands

B. They should understand the probability of every risk

C. They need to be aware of every threat

D. They should avoid responsibility for their actions

6. You are a network administrator at XYZ Company, and one of your tasks is designing the
company security policy. The element NOT to be specified in an enterprise security policy.

A. Risks and how to manage the risks


B. User roles and responsibilities

C. Software versions of the security products

D. Contingency plan in case of compromise

7. Firewall function.
A. Allowing only packets that pass security restriction to be forwarded

B. Rejecting all packets regardless of security restriction

C. Forwarding all packets that is forwarded

D. Allowing all packets that is forwarded

PART THREE This assessment exam contains 5 matching-type questions, each worth 2
points. Match the item in column “A” with the item in column “B” and write the letter of the
best match in the answer sheet provided.
Use only capital letters.
A B
A. Combinations of letters, numbers,
1. DNS
and symbol
2. DHCP B. 32-bit addressing
3. IPv4 C. Gives automatic IP address
4. IPv6 D. Hostname to IP address
5. Strong
E. Gives a static IP address
Password
128 bit addressing
64 bit addressing
Part three. Answer the following questions to be briefly
1. List and explain Steps of server Installation ? (3 point)

2. List and explain types Network Topology? (1.5 point)

3. List and explain types Network OSI Model? (1.5 point)

You might also like