Rift Vally University Woliso Campus Occupation Hns Level Iii
Rift Vally University Woliso Campus Occupation Hns Level Iii
Rift Vally University Woliso Campus Occupation Hns Level Iii
CAMPUS
OCCUPATION HNS LEVEL III
I.Choose the best answer from the given alternatives
1. Resolve Domain Name in IP Address
A. ipconfig
B. telnet
C. DNS
D. RJ-45
2. Moves packets between computers on different networks and Routers operate at this
layer
A. Network layer
B. Data Link layer
C. Session Layer
3. You are designing a network which needs to support 200 users. You do not plan to
extend the segment beyond the current number of users. Which subnet mask would best
meet your needs?
A 255.0.0.0
B 255.255.255.0
C 255.255.255.200
D 255.255.0.0
Prepared By Milkesashelema2019@gmail.com
4. Which layer organizes and synchronizes the exchange of data between application
processes.
A physical layer
B transport layer
C application layer
D session layer
11. Which of the following is commonly used to restrict access to a network, based on the physical
hardware address of the client’s network device?
A. DHCP settings B. MAC filtering C. SSID broadcast D. WEP key
12. Which of the following protocols is used to connect to a secure Internet website?
All is in the Hand of you so take and test it!!!!!
Good Luck
Prepared By Milkesashelema2019@gmail.com
A. POP3 B. FTP C. HTTPS D. HTTP
12. Of the ports below which of the following is the standard HTTPS port?
A. 25 B. 80 C. 110 D. 443
13. A network extension needs to be run 500 meters (164 feet) across a machine shop. The path will take
the extension near a number of fluorescent light fixtures and a large electric motor. Which of the
following cable types would be BEST suited for this environment?
A. Fiber B. UTPCat3 C. STPCat5 D. Coaxial
15. Which of the following commands is BEST to use when testing remote connectivity to a host?
A. win/s B. ping C. telnet D. ipconfig
16. Network administrator is veryfing the configuration of newly installed hosts by establish an FTP
connection to an remote server
A. Application B. Presentation C. Session D. Transport E. Data link
18. Which of the layer ensure reliable and end-to – end delivery data
19. What is the correct order of protocol data unit is data Encapsulation
20. Which type of LAN segmentation device enable high speed data exchange?
21. Which of the Layer ensure Point- to- point delivery data
22. You have been asked to install a network that will provide the network users with the greatest amount
of fault tolerance. The preferred network topology.
Prepared By Milkesashelema2019@gmail.com
24. Network Interface card to check Loop Back using address?
A. 19.168.1.1 B. 10.0.0.5 C. 192.168.0.2 D.127.0.0.1
25. Calculate subnet mask with IP address 172.16.0.0
A. 172.16.0.0 with subnet mask of 255.240.0.0
B. 172.16.0.0 with subnet mask of 255.255.0.0
C. 172.16.0.0 with subnet mask of 255.255.255.0
D. 172.16.0.0 with subnet mask of 255.0.0.0
26. A set of protocol layers that is designed to make data exchange possible on different types
of computer networks.
A. TCP/IP
B. DNS
C. FTP
D. Printer server
A. 119 B. 80
79 D.70
C.
31. Which of the following TCP/IP protocol allows an application program on one machine to send
a datagram to an application program on another machine?
A
UDP
.
B.VMTP
C.X.25
D
SMTP
.
E. None of the above
33. You are planning to implement a LAN that supports 180 clients and you do not have a plan
to extend it. Which subnet mask is best fit the requirement?
Prepared By Milkesashelema2019@gmail.com
34. How many hosts are attached to each of the local area networks at your site?
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another?
A
FTP
.
B.SNMP
C.SMTP
D
RPC
.
35. Which of the following layer protocols are responsible for user and the application programme
support such as passwords, resource sharing, file transfer and network management?
A.Layer 7 protocols
B. Layer 6 protocols
C. Layer 5 protocols
D.Layer 4 protocols
D
255.255.0.0, 255.255.255.0, 255.255.255.255
.
B. FTP
C. TCP
D.UDP
38. The communication mode that supports two-way traffic but only one direction at a time is
A.Simplex
Prepared By Milkesashelema2019@gmail.com
B. Duplex
C. half duplex
D.multiplex
40. Which of the following protocols is used to connect to a secure Internet website?
A. POP3 B. FTP C. HTTPS D. HTTP
Column A Column B
__S_6. Breaks data down into manageable chunks and H. Data Link layer
TCP and UDP operate at this layer I. Network layer
Prepared By Milkesashelema2019@gmail.com
11. Peer to peer T R. Session Layer
S. Transport layer
12. Logical topology P T. No indicated server
13. Router Q
14. SMTP M
Prepared By Milkesashelema2019@gmail.com