| Sr. No. | Questios | Option A | Option B | Option C | Option D | Answer |
| 1 | Find which is not one of the four divisions or container structures in Active Directory? | Forests | Domain | Webs | Organizational units | C |
| 2 | Find what is a forest? | Physical groupings are independent of the domain and OU structure. Sites distinguish between locations connected by low- and high-speed connections and are defined by one or more IP subnets. | The collection of every object, its attributes and attribute syntax in the Active Directory. | Containers in Find which domains can be grouped. They create a hierarchy for the domain and create the structure of the Active Directory’s company in geographical or organizational terms. | A collection of computers that share a common set of policies, a name and a database of their members. | B |
| 3 | Find what do domain controllers do? | Store the database, maintain the policies and provide the authentication of domain logons. | Control granular settings in a domain environment. | Receive and relay domain commands | | A |
| 4 | Find what are Group Policy Objects? | A set of folder rules that determine where Outlook will save email messages. | Affords the capability for secure extension of network operations to the Web | They determine the hierarchy of a domain, Find which can fit the operational structure of an organization. | A collection of settings that define Find what a system will look like and how it will behave for a defined group of users. | D |
| 5 | Active Directory is a technology created by ________ that provides a variety of network services, including: | Microsoft | Internet Explorer | Microsoft Office | Microsoft Windows | A |
| 6 | To Find which of the following Active Directory containers can Group Policies be applied? | sites | OUs | domains | all of the above | D |
| 7 | Which of the following protocols is Active Directory based upon? | LDAP | L2TP | PPP | IPSec | A |
| 8 | Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)? | Forest, Domain, Tree, Branch, Computer | Tree, Forest, Domain, Computer | Computer, Forest, Domain, Tree | Forest, Tree, Domain, Computer | D |
| 9 | Which of the following is not an organizational unit within an Active Directory environment? | User | Security Group | Distribution Group | Administrative Group | D |
| 10 | The main purpose of Active Directory is to _ | Provide authentication and authorization to users and computers. | Provide File and Print services | Give administrators the ability to control access to restricted hardware | allow users to organize their files systems into a cohesive and high performance directory structure | A |
| 11 | What is the name of the communications protocol called for by the original X.500 standard? | Directory Access Protocol | Data Access Protocol | Lightweight Directory Access Protocol | Lightweight Data Access Protocol | A |
| 12 | This Windows 2000 component stores all of the objects that make up a Windows 2000 network, such as user objects, group objects, and computer objects. It also provides the services that enable users to locate objects on the network and also provides administrators with the tools that are necessary to manage a Windows 2000 network.” What does this best describe? Select one. | WINS | DNS | Domains | Active Directory | D |
| 13 | VPN is abbreviated as __________ | Visual Private Network | Virtual Protocol Network | Virtual Private Network | Virtual Protocol Networking | C |
| 14 | __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. | Visual Private Network | Virtual Protocol Network | Virtual Protocol Networking | Virtual Private Network | D |
| 15 | Site-to-site VPNs are also known as ________ | Switch-to-switch VPNs | Peer-to-Peer VPNs | Point-to-point VPNs | Router-to-router VPNs | D |
| 16 | _________ type of VPNs are used for home private and secure connectivity. | Remote access VPNs | Site-to-site VPNs | Peer-to-Peer VPNs | Router-to-router VPNs | A |
| 17 | Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? | Remote access VPNs | Site-to-site VPNs | Peer-to-Peer VPNs | Country-to-country VPNs | B |
| 18 | A ______ can hide a user’s browsing activity. | Firewall | Antivirus | Incognito mode | VPN | D |
| 19 | __________ masks your IP address. | Firewall | Antivirus | VPN | Incognito mode | C |
| 20 | _________ are also used for hides user’s physical location. | Firewall | Antivirus | Incognito mode | VPN | D |
| 21 | ISDN stands for ________ | Integrated Services Digital Network | Integrated Services Discrete Network | Integrated Services Digital Node | Integrated Services Discrete Node | A |
| 22 | Information bearing channels in ISDN are called ______ | D channels | Data channels | B channels | Voice channels | C |
| 23 | The DSL technology is a | Broadband | Narrowband | Both a) & b) | None of the above | A |
| 24 | What is the keyword used to define a domain alias? | PTR | NS | CNAME | MX | C |
| 25 | Multiplexing is used in _______ | Circuit switching | Data switching | Packet switching | Packet & Circuit switching | A |
| 26 | The structure or format of data is called ___________ | Syntax | Semantics | Struct | Formatting | A |
| 27 | When collection of various computers seems a single coherent system to its client, then it is called _________ | computer network | distributed system | networking system | mail system | B |
| 28 | Which of the following networks extends a private network across public networks? | local area network | virtual private network | enterprise private network | storage area network | B |
| 29 | DSL telcos provide which of the following services? | Wired phone access | ISP | Wired phone access and ISP | Network routing and ISP | C |
| 30 | Home Access is provided by __________ | DSL | FTTP | Cable | All of the mentioned | D |
| 31 | Secure shell (SSH) network protocol is used for __________ | secure data communication | remote command-line login | remote command execution | all of the mentioned | D |
| 32 | The header length of an IPv6 datagram is ___________ | 10bytes | 25bytes | 30bytes | 40bytes | B |
| 33 | Directory service is the part of ‘NetworkServices’ | Haedware | Sotware | Pocesses | All of the above | D |
| 34 | Which of the following is not the example of directoryservice | Domain NameServer | PrintServer | NIS | LDAP | B |
| 35 | A directory service must consist ofatleast one | DirectoryServer | DirectoryClient | Compuer | Both A & B | D |
| 36 | Novell Directoryprovides | Multi- pointadministration | Singal pointadminisrion | Cenal Pointadministration | None of the above | B |
| 37 | GUIDis bits long number? | 128 | 528 | 1024 | 64 | A |