0

MCSE (NCO)

Description: The test contains questions based on MCSE course.
Number of Questions: 20
Created by:
Tags: MCSE Networking CCNA/MCSE
Attempted 0/20 Correct 0 Score 0

Which of the following is a component of WAN?

  1. Network Interface Card

  2. Co-axial

  3. Router

  4. Hub

  5. Switch


Correct Option: C
Explanation:

Router is a component of WAN.

Which component represents the physical structure of AD components?

  1. Domain

  2. Site

  3. Tree

  4. Forest

  5. Organisational unit


Correct Option: B
Explanation:

Sites are used as a physical structure to represent active directory components.

Which of the following is incorrect about IP addressing?

  1. IP address is of 32 bits, divided in four octets and each octet is of 8 bits, separated by a (.) dot.

  2. For IP addressing, number range is between 0-256.

  3. IP address is used for identifying the system and provides communication.

  4. IP address is a combination of network ID and host ID.

  5. IP address uses subnet mask to differentiate network ID from host ID.


Correct Option: B
Explanation:

For IP addressing, number range is between 0-255. Hence it is an incorrect statement.

Which class of IP address is used for multicasting?

  1. Class A

  2. Class C

  3. Class B

  4. Class D

  5. Class E


Correct Option: D
Explanation:

Class D is used for multicasting.

In terms of networking, which of the following is incorrect about tree?

  1. A tree is a group of domains which share contiguous name-space.

  2. A hierarchical tree structure is the combination of multiple domains.

  3. The first domain created is the child domain of the tree.

  4. Additional domains in the same domain tree are child domains.

  5. A domain immediately above another domain in the same domain tree is its parent.


Correct Option: C
Explanation:

The first domain created is the root domain of the first tree. Hence it is incorrect about a tree in terms of networking.

Which of the following is not true about workgroup [peer to peer] logical topology?

  1. A collection of computers connected together to share the resources is called workgroup.

  2. Any Operating system can be configured as workgroup model.

  3. Workgroup logical topology is suitable for smaller organisations.

  4. Servers are used in workgroup.

  5. No administrator is required in workgroup logical topology.


Correct Option: D
Explanation:

Server is a computer from which several clients are connected but in workgroup topology all computer are equals hence it is incorrect  statement.

Which of the following is/are a component of Local Area Network [LAN]?

  1. Hub

  2. Router

  3. Brouter

  4. ATM switches

  5. DSL


Correct Option: A
Explanation:

Hub is a component of LAN.

What is the art of gathering complete security profiles of an organisation or a target computer ?

  1. Scanning

  2. Foot printing

  3. Printing

  4. Exploits

  5. Trojan horses


Correct Option: B
Explanation:

The art of gathering complete security profiles of an organisation or a target computer is called footprinting.

Which service responsible for maintaining information about the objects and serving the requests made by the users by providing the location of the object?

  1. Global catalog

  2. Permissions

  3. Profiles

  4. Scripts

  5. Sharing


Correct Option: A
Explanation:

Global catalog is responsible for maintaining information about the objects and serving the requests made by the users by providing the location of the object.

Win spoof a7 is which type of attack?

  1. Scanning

  2. Port scanning

  3. Trojan horses

  4. DOS [denial of service] attack

  5. Exploits


Correct Option: D
Explanation:

Win spoof a7 is a DOS attack.

Which of the following is not true about domain logical topology?

  1. Domain is a collection of computers connected together with a server and users.

  2. It is suitable for smaller networks/organisations.

  3. Domain logical topology can have servers like UNIX, Novell NetWare, WIN-NT server, 2000 server and 2003 server.

  4. It provides centralised administration.

  5. Domain offers security and provides logon authentication.


Correct Option: B
Explanation:

Domain logical topology is a collection of computers connected together with a server and users which is based on client server model. A client server model can be implemented on large organization hence it is incorrect statement.

Which new feature of Windows 2003 server centralises the management of group policies?

  1. RSOP or Resultant Set of Policies

  2. MBSA or Microsoft Baseline Security Analyser

  3. VSCS or Volume shadow copy services

  4. GPMC or Group Policy Management Console

  5. Mounting


Correct Option: D
Explanation:

It is a new feature of windows 2003 server which centralises the management of group policies.

Which type of volume can be created by selecting free space from more than 1 hard disk?

  1. Spanned volume

  2. Simple volume

  3. Partition

  4. Striped volume

  5. Volume


Correct Option: A
Explanation:

Spanned volume can be created by selecting free space from more than 1 hard disk.

Which of the following features is available in Windows 2000 server and Windows 2003 server family?

  1. Volume shadow copy services [VSCS]

  2. Mounting

  3. Software Update Services [SUS]

  4. Microsoft Baseline Security Analyser

  5. Resultant Set of Policies [RSOP]


Correct Option: B
Explanation:

This feature is available both in Windows 2000 and Windows 2003 server family.

Which of the following is a trojan horse?

  1. Bo2k

  2. Shadow security scanner

  3. My spoof

  4. Perl scripts

  5. Ratina


Correct Option: A
Explanation:

It is a type of trojan horse.

Which of the following is a WAN protocol?

  1. NETBEUI

  2. TCP/IP

  3. Apple talk

  4. PPP

  5. NW link


Correct Option: D
Explanation:

PPP is a Point to Point Protocol used as WAN protocol. 

Which FTP command is used for downloading?

  1. Mget

  2. Get

  3. Put

  4. Del

  5. Cd


Correct Option: B
Explanation:

Get command is used for downloading files.

Which of the following is a desktop operating system?

  1. Unix

  2. Windows 98

  3. Win 2000 server

  4. Win 2003 server

  5. Win NT server 4.0


Correct Option: B
Explanation:

It is a desktop operating system.

Which class is represented by the first three bits [110] of first octet of IP address?

  1. class C

  2. class A

  3. class D

  4. class E

  5. class B


Correct Option: A
Explanation:

The first three bits [110] of first octet of IP address represents class C.

Which backup backs up all selected files and folders and after backup, does not remove the archive bit?

  1. Incremental backup

  2. Differential backup

  3. Daily backup

  4. Copy backup

  5. Normal backup


Correct Option: B
Explanation:

Differential backup backs up all selected files and folders and after backup, does not remove the archive bit. 

- Hide questions