Adama PTC HNS-III COC Exam!
Adama PTC HNS-III COC Exam
Test your knowledge with the Adama PTC HNS-III COC Exam! This quiz is designed to assess your understanding of network administration, maintenance best practices, and IT protocols.
Challenge yourself and improve your skills with topics that include:
- Network configurations
- Maintenance strategies
- Kaizen implementation
- Firewall fun
ctionalities - Active Directory management
1. Which of the following is behavior of good team members?
Do not take turns
Share responsibilities
Do not respect the opinions of others in the team
Keep individual information about development
2. You are the network administrator for a small window 2003. One of your users has come to you because he cannot remember the password he uses to log onto your windows server 2003 domain. Which utility should you use to change a user’s password?
15
20
30
22
3. All of the following are results of Kaizen implementation in workplaces except?
Improvement in product quality
Safety in workplaces
High waiting time
Efficient space utilization
4. A type of maintenance that has regular schedule?
Proactive Maintenance
Preventive Maintenance
Breakdown Maintenance
Predictive Maintenance
5. What does the 10Base T refers?
Transmit data at 100 Mbps with a distance limit of 100 meters per segment.
Transmit signals at 10 Mbps with a distance limit of 200 meters per segment.
Transmit signals at 10 Mbps with a distance limit of 100 meters per segment.
Transmit data at 1 Gbps with a distance limitation of 220 meters per segment.
6. A computer cannot communicate with any of the computer on a different network segment. It has no problem connecting to other computer that is located on its own network segment. The IP address parameter that is possibly incorrectly on the computer?
IP address
Subnet Mask
Default gateway
DNS server
7. One of the options below is correct steps in conducting ICT Training?
Identifying training needs - Planning - Implementation
Implementation - Planning - Identifying training needs
Planning - Identifying training needs - Implementation
Planning - Implementation - Identifying training needs
8. There are one thousand employees in the entire company at present and the company is experiencing growth. Additionally, some of the information that will be sent over the network is confidential. Which network Types would be most appropriate in this situation?
Server Based
Peer to Peer
Stand alone Computer
Workstation
9. Which of the following statements are associated with a bus LAN network?
IPCONFIG/renew
IPCONFIG/all
IPCONFIG/registerdns
IPCONFIG/release
10. You have just created an active directory user on a windows 2003 domain controller. The security requirements for this user specify that the user should not be able to logon to the computer between 12:01 AM and 4:00 AM because this is when your company runs automated backups for the computer. You want to specify that the user account can logon only during specified hours. Which users properties dialog box tab should you use to configure logon hours?
The profile tab
The general tab
You cannot restrict logon hours for an active directory user account
The account tab
11. At which layer of the OSI are 1s and 0s converted to a digital signal?
Physical
Network
Data link
Transport
12. Which of the following are firewall-related constraints relating to Remote Assistance?
You cannot use Remote Assistance across a virtual Network (VPN).
NAT cannot be used.
Internet connection sharing is not possible.
Port 3389 must be open.
13. The best method which is used to repair your system partition or make minor changes to windows to get the operating system functional.
Emergency Repair Disk (ERD)
Last known good configuration
Recovery console
Directory services restore mode
14. Which of the following versions of windows server 2003 require product activation?
Windows server 2003, standard Edition, volume license version C.
Windows server 2003, standard Edition, normal version
Windows server 2003, Enterprise Edition, Evaluation version
Windows server 2003, Enterprise Edition, open license version
15. Which one of the following is a private IP address?
172.33.194.30
168.172.19.39
127.0.0.1
172.20.14.36
16. To decide what type of network resource model is not needed?
The need of the network designer
What is the size of the organization?
How much will it cost?
How much security does the company require?
17. Where would you configure workstations to boot from the USB drive first and hard drive only if there is not a bootable USB device attached?
C:\windows\TEMP\1st.txt
Configured in workstations BIOS
NTLDR
Boot.ini
18. Which layer 1 device can be used to enlarge the area covered by a single LAN segment?
Switch
NIC
RJ-45 transceiver
Repeater
29. A user has forgotten his or her password and attempts to logon several times with an incorrect password. Eventually, the user receives a logon message indicating that the account is either disabled or locked out. The message suggests that the user contact an administrator. What must you do?
Delete the user object and recreate it.
Enable the user object
Unlock the user object
Rename the user object
20. The flow of information across persons of work units at the same hierarchical level is called?
Upward communication
Lateral communication
Vertical communication
Down ward communication
21. ____ is the protocol used for communication between a web server and a web browser. By default, it uses port 80.
SMTP
HTML
IMAP
HTTP
22. Which of the following is categorized as richest channel in conveying information effectively?
E-mail
Telephone
Face to face communication
Posted notices and bulletins
23. You are the administrator for your company’s domain. You need to subdivide groups in your organization with in active directory. If you want to separate sales from marketing department what could you use as a system of organizing this subdivision?
Create site and subnet grouping
Creating organizational units
Build a container in subnet group
Use user and groups
24. Which of the following is not market promotional tool?
Supply/Demand
Networking and referrals
Seminars
Advertising
25. One of following is type of account policies?
Security options
Audit policy
User right assignment
Password policy
26. One of the following is not function of firewalls
Packet filter
Proxy firewall
Differential backup
Stetful inspection
27. Let say you are a network administrator in your office. You have an interface on a router with the IP address of 192.168.192.10/29. What is the broadcast address the hosts will use on this LAN?
192.168.192.127
192.168.192.15
192.168.192.31
192.168.192.63
28. A _____ system to join two or more device and computers together to communicate and share resources.
Modem
Resource
Network
NIC
29. The most effective way to migrate congestion on a LAN would be to ____________
Replace the HUBs with switches
Upgrade the network cards
Change the cabling to cat 6
Upgrade the CPUs in the routers
30. Which topology the workstation goes down, it does not affect the entire network?
Straight line
Ring
Star
Bus
31. One of your printers is not working properly and you want to prevent users from sending print jobs to the logical printer servicing that device. What should you do?
Rename the share
Change the printer post
Remove the printer from active directory
Stop sharing the printer
32. What type of profile will be most useful to maintain a locked-down desktop common to all sales representatives?
Local profile
Preconfigured roaming group profile
Local mandatory profile
The all users profile
33. While reviewing the security logs for your server, you notice that a user on the internet has attempted to access your internal mail server. Although it appears that the user’s attempts were unsuccessful you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?
A firewall system all the connection point to the internet
File-level encryption
Kerberos authentication
A more secure password policy
34. One of the following is not an example of network resource.
Disk storage
Hub
Printer and other peripherals
Files and applications
35. A user can determine the network settings on the client’s network interface cards as well as any that a DHCP server has leased to your computer by typing the following command at a command prompt.
Ping
Connect
Ipconfig/all
IP
36. You want to ensure the highest level of security for your corporate intranet without the infrastructure of certificate services. The goal is to provide Authentication that is transparent to users and to allow securing intranet recourses with the group accounts existing in active directory. All users are within the corporate firewall. What Authentication method should you choose?
Basic Authentication
Digest Authentication
Anonymous Access
Integrated windows Authentication
{"name":"Adama PTC HNS-III COC Exam!", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge with the Adama PTC HNS-III COC Exam! This quiz is designed to assess your understanding of network administration, maintenance best practices, and IT protocols.Challenge yourself and improve your skills with topics that include:Network configurationsMaintenance strategiesKaizen implementationFirewall functionalitiesActive Directory management","img":"https:/images/course8.png"}
More Quizzes
MCSA Review Q's - Chapter 20
10531
NOS 2
5226119
MCSA Review Q's - Chapter 19
10543
Net admin 1-37
30150
Active Directory Group Policy Mastery
13634
The Last Hurrah: All=
14742
Common port numbers
1476
Unmanaged endpoints - take the quiz
5237
ICT-212 Spring 2022 Final Exam Study Guide
502520
NOS Part 2
2512103
CS240 Chapter 2
201026
CIS 140 Final Quiz Chp. 10
201020