Đề thi cuối kỳ môn Mạng máy tính (có đáp án)
Đề thi cuối kỳ môn Mạng máy tính gồm các câu hỏi trắc nghiệm có đáp án, giúp sinh viên ngành Công nghệ thông tin tham khảo và ôn luyện kiến thức, đạt kết quả cao trong bài thi cuối kỳ. Mời bạn đọc tham khảo!
Preview text:
lOMoAR cPSD| 35883770 lOMoAR cPSD| 3588377
1. Which of the following is a component of Active Directory’s physical structure? A. Sites B. Organizational units C. Forests D. Domains
6 2. Which of the following is not part of Active Directory’s logical structure? A. Tree B. Forest C. Domain controller D. Ou
7 3. Which of the following statements is correct?
A. Hypervisor asks OS to make hardware calls
B. Type2 Hypervisor asks OS to make hardware calls
C. Guest OS accesses the hardware through both hypervisor and underlying host OS
D. Hypervisors run on host operating systems
4. Which of the following is a default folder object in Active Directory? A. Sites B. Groups C. Computers D. Domain Controllers 8
5. Which of the following is associated with an Active Directory forest? (choose all that apply)
A. contains trees with different naming strictures
B. Allows independent domain administration
C. Contains domains with different schemas
D. represents the broadest element in Active Directory
6. Which of the following defines the types of objects in Active Directory? A. Schema classes B. GPOs C. Attribute values D. Schema attributes
7. Which of the following best describes the first domain installed in a forest? A. Master domain B. Forest root C. Child Domain lOMoAR cPSD| 35883770 D. Primary tree
8. All domains in a forest have which of the following in common? (Choose all that apply) A. The same schema B. The same domain name C. The same global catalog D. The same user accounts
3 9. Which two small footprint installation options are available for Windows
Server 2019? (Choose two answer) A. Nano server B. Windows Container C. Server core
D. Windows Server 2019 Standard (Desktop Experience)
10. What advantages are inherent in utilizing a Server Core installation when
compared to selecting a Windows Server installation with a GUI? (Choose all that apply) A. Less maintenance tasks
B. Using PowerShell for managing tasks C. Mini OS vulnerabilities
D. User friendly management interface
2 11. Commands with Windows PowerShell are referred to as…………… A. Command B. Cmdlets C. Cmdlet D. Batch script
12. Which of the following terms describes the process of granting users access
to file server shares by reading their permissions? A. Enumeration B. Authorization C. Authotrication D. Accounting
13. How many group scopes are there in Active Directory? A. 4 B. 2 C. 3 D. 1 lOMoAR cPSD| 35883770
ANSWER: universal, global, domain local.
14. Which of the following group scopes can contain objects from any domain
within the forest? (Choose all apply) A. Distribution B. Domain local C. Global D. Universal
15. Which functions does the global catalog provide? (Choose all that apply)
A. Domain authentication using UPNs B. Time synchronization C. Fast object searching
D. Universal group membership
16. If you have logged on to domain-joined Windows machine at least once,
you can logon to that machine again even if the machine no logon Explain the reason?
A. Windows stores the information of the previous session
B. Windows stores username and a hash of a hash of the password in cache
C. Windows stores username and password in cache
D. Windows stores a copy of AD’s user account database in cache
17.GPOs assigned to the computer level are applied when computer are:…………… A. Hibernate mode B. Turned off C. Turned on D. Sleep mode
18. Which of the following represent GPO configurations values? (Choose two) A. Disable B. Enable C. Deny D. Allow
19. Which of the following Active Directory containers can Group Policies be applied? A. Tree B. Forest C. Domain lOMoAR cPSD| 35883770 D. Ous
20. Which of the following is not a characteristic of a VPN?
A. It may use tunneling techniques
B. It does not provide any cost savings to alternate connectivity options
C. It is deployed over a shared infrastructure D. It is a secure network
21. Which of the following is not a Layer 2 tunneling protocol? A. IPSEC B. Both IPSEC and PPIP C. L2TP D. PPIP
22. DES, 3DES and AES are exaples encryption algorithms which use the same
key for encrytion and decryption. Such encryption A. Public key infrastructure B. Asymmetrical encryption C. Symmetrical encryption D. Secure Hash Function
23. Which of the following services is not provided by an IPSEC tunnel? A. Origin Authentication
B. Protection from Spy Ware C. Data Integrity D. Data Confidentiality
24. Which of the following services is not provided by AH?
A. Data Confidentiality (encryption)
B. Protection against Anti Replay attacks C. Origin Authentication D. Data Integrity
25. Which of the following are optional components of a DHCP scope? A. Revervation B. IP address exclusions C. DHCP options D. DHCP policy
The optional components of a DHCP scope are Reservation, IP address
exclusions, and DHCP options 12. Therefore, the service that is not an
optional component of a DHCP scope is DHCP policy 1. lOMoAR cPSD| 35883770
26. You want to create a scope for an Ipv4 subnet with the address
172.16.16.0/255.255.255.240.0. How may subnet bits must you configure when you create the scope? A. 24 B. 20 C. 21 D. 22
27. Which resource record stores zone transfer settings? A. SOA B. NS C. PTR D. A
28. DHCP servers respond to DHCPDISCOVER packets received from DHCP
replay agents with a DHCPACK pack A. True B. False
29. Which DHCP option number provides a default gateway router? A. 005 B. 003 C. 004 D. 006
30. What step does a DNS client perform first to resolve a DNS name?
A. The client queries its primary DNS server
B. The client broadcasts on the local subnet
C. The client checks its local DNS resolver cache
31. The DHCP client is unable to obtain IP configuration from DHCP server.
The administrator checks and see that DHCP server works computer. In
addition, the network connection of the client computer is perfect. What
could be a problem in this case? (Choose all apply)
A. The client computer and DHCP are located in a different subnets
and there is no relay agent implemented on the client subnet
B. The scope which provides IP configurations for client subnet run out of IP address
C. The scope which provides IP configurations for client subnet is inactive
D. The client computer and DHCP are located in a different subnets
implementation on the subnet of DHCP server lOMoAR cPSD| 35883770
32. What is the purpose of the SRV (Service Location) record?
A. SRV record is used to identify the FQDN of s domain controller that
provides Active Directory Services
B. SRV record is used to identify the Email servers at domain
C. SRV record is used to identify the Name service for a domain
D. SRV record is used to identify the zone configuration for a domain
33. If a DNS server does not contain a zone file that contains the resource
records for a lookup, and is not configured as a conditional or default
forwarder, it will use its root hint file to perform a recursive query A. True B. False
34. Which of the following NFS shared folder permissions allows computers to
access an NFS shared folder and modify content (Choose two) A. Modify B. Change C. Read-write D. Pull Control
35. Which statements are correct about Encrypting File System (EFS) (Choose all that apply)
A. EFS requires the computer has TPM to work
B. Users need to input password to access files or folder
C. EFS encrypt only particular documents or folder
D. The process of encryption and decryption its transparent to the user and applications
36. Which of the following roles can you install in Windows Server 2016 to
provide ISCSI storage to other clients? A. ISCSI Server role B. ISCSI Initiator role C. ISCSI Target role
D. ISCSI Target Server role
37. What is the default TCP port for ISCSI? A. 3260 B. 3369 C. 1443 D. 443
38. You are configuring a DFS replication group to synchronize folder contents
between four file servers. To minimize the network brandwidth used by DFS lOMoAR cPSD| 35883770
replication, you should choose a full mesh topology for your replication group. A. True B. False
39. Which type of object is used by Active Directory Domain Service to add structure to the directory? A. Groups B. Users C. Ous D. Computers
40. Which of the following is not a type of user account that can be configured in Windows Server 2019? A. Domain accounts B. Built-in accounts C. Network accounts D. Local accounts lOMoAR cPSD| 35883770
1 1. Which of the following is a valid reason for using multiple forest?
A. Need for single global catalog
B. Easy access to all domain resources C. Centralized management
D. Need for different schemas
4 2. To which of the following can a GPO be linked (Choose all that apply) A. Domains B. Sites C. Trees D. Folders 5 3.
Which of the following best describes a directory services?
A. A program for managing folders, files, and permissions on a distributed server
B. Similar to a database program but with the capability to manage objects in it
C. A program for managing the user interface on a server
D. Similar to a list of information in a text file 9 4.
Which type of account is not found in Active Directory? Select one A. Local user account B. Domain user account C. Computer user account
D. Built-in user account
5. Which of the following can contain multiple Active Directory domains? A. Ous B. Domains C. Sites D. Trees
6. Which of the following trust relationships can be created between two domains
in separate Active Directory in separate Active Directory forest? A. Shortcut trust B. External trust C. Realm trust D. Forest trust
7. Which of the following FSMO roles are stored on the one domain controller
within each domain? (Choose that apply) A. Domain Naming Master B. PDC Emulator C. Schema Master D. RID Master
8. GPOs are processed in the following order:……………………….. lOMoAR cPSD| 35883770
A. Local, Domain, Organization Units (Ous).
B. Local, Site, Domain, Organization Units (Ous).
C. Site, Domain, Organization Unit (Ous), Local
D. Site, Domain, Organization Units (Ous)
9. Windows computers contact their DNS server at boot time to create or update
their host resource record. This feature is call…… A. Zone tranfer B. Recursive query C. Round join D. Dynamic update
10. After obtaining certificate from a CA server inside your network and install it
on web server to enable HTTPS, receives a warning say that “name mismatch
error.”. This problem happens because………….
A. The web server does not have a domain name
B. The SSL certificate contains multiple domain names
C. The domain name in the SSL certificate doesn’t match the
address that its in the address bar of the browser
D. The SSL certificate is issued by non-trusted CA
11. A user complains that they are unable to contact a specific server in your
organization. You remember that
A. Clear the DNS cache on the DNS server
B. Clear the DNS cache on the user’s computer
C. Restart the DNS Server service
D. Run the nslookup command on the user's computer
12. Which two resource records can you create in a zone tyo provide the FQDN of
an email server for the Ipv6 address? (Choose two answer) A. AAAA B. MX C. CNAME D. A
13. You would like to provide a central shared folder that users can access to view
all other shared folders with do ? (Choose all that apply)
A. Add target to the DFS namespace for each shared folder
B. Install the DFS Namespace role and configure a DFS namespace
C. Install the DFS Replication role on each file server
D. Configure a replication group
14. Which statements are correct about Encrypting File System (EFS) (Choose all that apply)
A. EFS encrypt only particular documents or folder
B. Users need to input password to access files or folders lOMoAR cPSD| 35883770
C. EFS requires the computers has TPM to work
D. The process of encryption and decryption is transparent to the user and applications
15. Which of the following is the underlying network protocol used by an ISCSI storage network? A. SCSI B. ISCSI C. TCP/IP D. SMB
16. Hashing functions like MD5 and SHA are used in IPSEC to provide which of the following services?
A. Securely negotiating a key over a unsecure media
B. Data integrity (data protected from being changed during transit)
C. Data confidentiality (privacy from eavesdropping)
D. Securely negotiating a key over a unsecure media
17. Which of the following services is not provided by AH?
A. Protect against Anti Replay attacts B. Data integrity
C. Data Confidentiality (encryption) D. Origin Authentication
18. Which of the following is responsibility of domain controllers (Choose all that apply)?
A. Providing data search and retrieval functions
B. Storing copy of domain data
C. Providing authentication services
D. Servicing multiple domains
19. All domains in a forest have which of the following in common? (Choose all that apply) A. The same schema B. The same global catalog C. The same domain name D. The same user account