Knowl Ass
Knowl Ass
Knowl Ass
Ministry of Education
Knowledge Assessment
Candidate name
Registration number
Name of training provider
Name of Assessment Center
Structure of Test
Section No of questions No of marks Suggested time
A-Multiple choice 21 21 30min
questions
B-Matching Type 15 15 20min
Total 36 50min
Dec 2013
Instructions
1. Write your name, Registration number, name of training provider and
Assessment center name in the space provided on Cover page of this booklet
2. You have 10 minutes reading time and opportunity to ask questions to the
Assessor
3. All written responses must be in English.
4. At the end of the examination return this book let to the assigned Accredited
Assessor
5. You may use the following references in this test
Non-programmable calculators
6. Do not bring the following items into the assessment venue
Mobile telephones
Programmable calculators
Written notes
1. You have been asked to install a network that will provide the network users with the
greatest amount of fault tolerance. The preferred network topology.
A. Star
B. Ring
C. Mesh
D. Bus
2. The command used to access Active Directory Installation wizard
A. DOMAININSTALL
B. DCPROMO
C. DCONFIG
D. DCINSTALL
3. The tool that can be used to prevent users from starting or stopping specific services on
the domain controller.
4. The configuration information for a DHCP client is received dynamically. The utility
used to read configuration for verifying this setting.
A. TRACERT
B. PING
C. NETSTAT
D. IPCONFIG
5. You are requested to setup a 100Mbps network for a client in an office that already has
10Mbps throughput. Your client wants to keep the costs to a minimum but he needs the
100Mbps throughput. The cabling solution you recommend.
A. STP
B. Cat 6e UTP
C. Coaxial cable
D. Fiber Cable
6. The following figure shows a typical small size organization Network Setup. Identify the
network components marked with letters A, B, C, and D consecutively.
7. You are assigned to lead a small team in your company for managing networks. Identify
the wrong statement in leading a team.
A. Understand the team role
B. Possess necessary leadership skill
8. One of your users calls you with a complaint that they can’t reach the site
www.yahoo.com . You try and access the site and discover that you can’t access either,
but you can PING the site with its IP address. The most probable cause of the problem.
A. Yahoo! is down
B. The working switch is down
C. The gateway is down
D. The DNS server is down
9. An application that used to remotely and securely access the remote server.
A. Telnet
B. SSH
C. SFTP
D. RSA
10. The next step you should do after you have just implemented a solution for a major
network problem in your company.
A. Document the issue and the solution that has implemented
B. Escalate the issue
C. Gather more information about the issue
D. Test the solution in a similar organization
11. When troubleshooting a network connectivity problem, you are able to ping your local
loopback, the IP address of your system, and the IP address of another system on your
network. However, you cannot ping the default gateway. The valid reason for this
problem.
A. The default gateway is operational.
B. The IP address of the default gateway is configured correctly.
12. While gathering data to determine the organization business requirement you might take
records of the organization like organizational policies and procedures. These kinds of
information resources are considered as
A. Informal sources
B. Primary sources
C. Secondary sources
D. Tertiary sources
13. You are the administrator of a Windows 2008 network. Masho, a help desk technician,
resigns the company. Desta, a new hire, takes Mashos’s place. You want Desta to have
the same level of access that Masho had. What should you do?
A. Rename Mashos’s account to Desta. Reset the password.
B. Copy Masho’s account and create a new account for Desta. Disable Masho’s
account.
C. Create a new account for Desta. Recreate the group membership of Masho’s
account to Desta’s account.
D. Copy Masho’s account and create a new account for Desta. Delete Masho’s
account.
14. The protocol that automates the IP configuration in your company’s network.
A. DHCP
B. DNS
C. SMTP
D. STP
15. You enable disk quotas on a Windows Server 2008 file server. You configure a quota
limit of 100MB. A user, named Eyob, reports that he can still save large files to the
server, even though he is well above his quota limit. What should you do to correct the
problem?
A. Check the “Deny disk space to users exceeding quota limit” check box on the
Quota tab for the volume.
B. Instruct Mark to take ownership of all of his files.
C. Create a quota entry for Mark and specify 100MB as the limit.
D. Change the quota limit from 100MB to 50MB.
16. A hierarchical structure made up of multiple domains that trust each other.
A. Root
B. Site
C. Organizational Unit
D. Tree
17. Every morning you run an Excel spreadsheet locally on the Windows Server 2008 to
analyze data collected the night before. Users report that access to files at this time is
significantly slower than at other times. What should you do to resolve the problem?
A. Run the Start /normal csrss.exe command before starting Excel.
B. Run the Start /normal Excel.exe command to start Excel.
C. Use Task Manager to set the Explorer.exe process to high priority.
D. Use Task Manager to set the Excel.exe process to low priority.
18. When you tried to login to the server, your trial may failed, this failure event is recorded
in
A. System log
B. Security log
C. Application log
D. Event log
19. A user reported that his computer is slow. When a technician arrives, he finds many
unwanted programs running at startup. The application that helps to configure programs
at startup.
A. MSCONFIG
B. SYSTRAY
C. WINLOGON
D. REGSVR32
20. You have a server that runs Windows Server 2008. You need to identify all the unsigned
drivers that are installed on the server. What should you do?
A. Run Chkdsk.exe.
B. Run Sigverif.exe.
C. Review %systemroot%\repair\setup.log.
D. Open Device Manager and review all the devices that contain a warning.
21. You are the network administrator for a large company. One of your users, Lidya,
recently returned from a three-month maternity leave. While she was on leave, no one
used her computer. When Lidya attempted to log on to her computer, she received an
error because the computer’s password had expired. What should you do?
A. Reset her computer account through the Active Directory Users and Computers
utility.
C. Change the group policy setting for Assign New Computer Password for her
computer.
D. Log on to her computer running Safe Mode and run the Setpass command-line
utility.
Column A Column B
___1. Translates IP addresses into computer names A. FTP
___2. Dynamically assigns IP addresses to computers B. 172.16.0.20
C. NIC
___3. Provides fast transfer of non-Web downloadable files D. 255.0.0.0
___4. Floppy drive E. Data encryption
___5. Class B IP Address F. 1.44 MB
G. Modem
___6. Used for modulation and demodulation
H. Router
___7. A network topology that requires the use of terminators I. File server
___8. default subnet mask for a class A network J. DHCP
K. Get way
___9. Physical layer
L. RJ 45
___10. Telephone Wire connecter M. Create and manage
___11. Reports all servers used between your computer and a domain user
N. TRACERT
specified Internet server
O. World wide Web
___12. IIS Component P. Bus
___13. Account operator Q. 127.0.0.1
___14. Network layer Device R. RJ 11
S. DNS
___15.Translation data in to code that is not easily accessible