IT Officer EXAM ( Questions and Answers)

Share this to colleagues

IT Officer EXAM ( Questions and Answers)


Describe  the Difference between  Hub, Switch  and Router? Tabular Form 


Rich results on Google's SERP when searching for 'IT_Officer Exam0001'

Interior Gateway Protocol (IGP) is a Routing Protocol which is used to
find network path information within an Autonomous System.

Exterior Gateway Protocol(EGP) is a Routing Protocol which is used to find network path information between different Autonomous Systems.
Examples of Interior Gateway Protocol IGPs include Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Intermediate System to Intermediate System (IS-IS) and Enhanced Interior Gateway Routing Protocol (EIGRP).

Examples of Exterior gateway protocols include Exterior Gateway Protocol (EGP), now obsolete, and Border Gateway Protocol (BGP)


What is the main importance of remote desktop?


Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer’s desktop and interact with it as if it were local. which TCP port does remote desktop use? By default, the server listens on TCP port 3389 and UDP port 3389.


What do you mean by network topology?


A network topology is the pattern in which nodes (i.e., computers, printers, routers or other devices) are connected to a local area network (LAN) or other network via links (e.g., twisted pair copper wire cable or optical fiber cable).

There are four principal topologies used in LANs: bus, ring, star and mesh.


What is OSI model?


The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. …

The OSI model doesn’t perform any functions in the networking process.


Explain different layers of the OSI model?



What are the main components of computers and tell us the role of each


CPU itself has following three components.

  • Memory or Storage Unit Both memory and storage are terms used to refer to internal storage space on a computer. Memory, usually referred to as random access memory (RAM), is where an application loads its data during processing by the CPU, while a storage drive is where data is stored for long- or short term retention.
  • Control Unit directs operation of the processor. It tells the computer’s memory, arithmetic/logic unit and input and output devices how to respond to a program’s instructions.
  • ALU(Arithmetic Logic Unit) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer.



Briefly explain the role of these servers in a network and give me the udp or tcp ports number on which it is listed?


Domain Name Servers (DNS) are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

The basic function of a web server is to host websites and to deliver web content from its hosted websites over the internet. During the delivery of webpages, web servers follow a network protocol known as hyper text transfer protocol (HTTP).

DHCP (Dynamic Host Configuration Protocol ) server automatically assigns IP addresses to the computers and other devices on each local area network (LAN)
An email server, or simply mail server, is an application or computer in a network whose sole purpose is to act as a virtual post office.

The server stores incoming mail for distribution to local users and sends out outgoing messages. This uses a client-server application model to send and receive messages using Simple Mail Transfer Protocol (SMTP).
File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or exchanging files with a host computer. … Anonymous FTP allows users to access files, programs and other data from the Internet without the need for a user ID or password.

Telnet Server allows command line access to an embedded module over an IP network. Telnet is a protocol used on a network to provide a twoway interactive command line interface (CLI) using a virtual terminal connection.

User data and Telnet control information is transferred on a data connection using TCP.

SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the SSH protocol. … SFTP also protects against password sniffing and man-in-the-middle attacks. It protects the integrity of the data using encryption and cryptographic hash functions, and autenticates both the server and the user.

Figure 1 For sFTPserver is as SSH



You have been allocated a class B network address of and
and need to create 4 subnets each with around 200 hosts what is the
easiest mask to use to satisfy the criteria?


Easiest is to sub net on a byte boundary which would mean a subnet mask
This would allocate 8 bits for the subnet and 8 bits for the host.
We need to accommodate around 200 hosts which requires 8 bits which
we have.
We need 4 subnets which require 4 bits and we have 8 bits. So we have
more than enough.


Write the IP address mask in CIDR notation


Decimal 192 =11000000 binary which means that 2 bits of this octet are
used for the subnet. Now add the 24 bits 255.255.255 and we have 26
bits. So we write:


CLICK HERE to Join Our Careers WhatsApp group 

 512 All the time,  3 To day

Share this to colleagues

You May also read these Posts