0% found this document useful (0 votes)
16 views9 pages

NETWORK ADMINISTRATOR1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views9 pages

NETWORK ADMINISTRATOR1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

NETWORK ADMINISTRATOR PRACTICE EXAM

. Which layer of the OSI model is responsible for routing?

 A) Transport Layer
 B) Network Layer
 C) Data Link Layer
 D) Application Layer
Answer: B) Network Layer

2. What does DHCP stand for?

 A) Dynamic Host Communication Protocol


 B) Dynamic Host Configuration Protocol
 C) Direct Host Configuration Protocol
 D) Data Host Configuration Protocol
Answer: B) Dynamic Host Configuration Protocol

3. Which protocol is used to securely access a remote computer?

 A) FTP
 B) HTTP
 C) SSH
 D) SMTP
Answer: C) SSH

4. What is the primary purpose of a firewall?

 A) To encrypt data
 B) To block unauthorized access
 C) To speed up data transfer
 D) To assign IP addresses
Answer: B) To block unauthorized access

5. What is the default port number for HTTP?

 A) 25
 B) 443
 C) 80
 D) 21
Answer: C) 80

6. Which command can you use in Windows to check network connectivity?

 A) ping
 B) ipconfig
 C) netstat
 D) tracert
Answer: A) ping

7. What is an IP address?

 A) A device identifier
 B) A unique identifier for a network
 C) An identifier for a computer on a network
 D) A network configuration
Answer: C) An identifier for a computer on a network

8. Which layer of the OSI model manages encryption and decryption?

 A) Physical Layer
 B) Session Layer
 C) Presentation Layer
 D) Application Layer
Answer: C) Presentation Layer

9. What does VLAN stand for?

 A) Virtual Link Access Network


 B) Virtual Local Area Network
 C) Variable Local Access Network
 D) Virtual Line Area Network
Answer: B) Virtual Local Area Network

10. What does the command "netstat" display?

 A) IP configuration
 B) Active network connections
 C) Ping statistics
 D) Route information
Answer: B) Active network connections

11. A DNS server primarily resolves:

 A) IP addresses to MAC addresses


 B) Domain names to IP addresses
 C) IP addresses to domain names
 D) MAC addresses to IP addresses
Answer: B) Domain names to IP addresses

12. Which of the following IP addresses is private?


 A) 192.168.1.1
 B) 8.8.8.8
 C) 172.217.3.238
 D) 203.0.113.45
Answer: A) 192.168.1.1

13. Which tool would you use to trace the path packets take to a destination?

 A) ping
 B) tracert
 C) ipconfig
 D) nslookup
Answer: B) tracert

14. What does TCP/IP stand for?

 A) Transfer Control Protocol/Internet Protocol


 B) Transmission Control Protocol/Internet Protocol
 C) Transmission Communication Protocol/Internet Protocol
 D) Transfer Communication Protocol/Internet Protocol
Answer: B) Transmission Control Protocol/Internet Protocol

15. Which device can segment a network into multiple broadcast domains?

 A) Switch
 B) Hub
 C) Router
 D) Bridge
Answer: C) Router

16. The main difference between TCP and UDP is:

 A) TCP is connection-oriented, UDP is not


 B) TCP uses encryption, UDP does not
 C) TCP is faster than UDP
 D) UDP requires handshakes, TCP does not
Answer: A) TCP is connection-oriented, UDP is not

17. Which command provides a detailed configuration of network interfaces in


Windows?

 A) ipconfig /all
 B) ifconfig -a
 C) netstat -i
 D) traceroute
Answer: A) ipconfig /all
18. Which device connects different types of networks together?

 A) Switch
 B) Router
 C) Hub
 D) Access Point
Answer: B) Router

19. What is the purpose of a subnet mask?

 A) To determine the default gateway


 B) To differentiate network from host portions of an IP address
 C) To encrypt data
 D) To assign IP addresses
Answer: B) To differentiate network from host portions of an IP address

20. SNMP is used for:

 A) Network management
 B) File sharing
 C) Routing
 D) File transfer
Answer: A) Network management

21. Which layer in the OSI model is responsible for establishing, managing, and
terminating sessions between applications?

 A) Application Layer
 B) Presentation Layer
 C) Session Layer
 D) Transport Layer
Answer: C) Session Layer

22. What is the function of ARP in networking?

 A) To resolve domain names to IP addresses


 B) To resolve IP addresses to MAC addresses
 C) To secure network traffic
 D) To configure IP addresses
Answer: B) To resolve IP addresses to MAC addresses

23. Which of the following is NOT a common network topology?

 A) Star
 B) Tree
 C) Bus
 D) Matrix
Answer: D) Matrix

24. The command "ipconfig /release" in Windows:

 A) Displays the IP configuration


 B) Releases the DHCP lease
 C) Renews the DHCP lease
 D) Configures the DNS
Answer: B) Releases the DHCP lease

25. The protocol primarily used for email transmission is:

 A) FTP
 B) SMTP
 C) SNMP
 D) HTTPS
Answer: B) SMTP

26. Which type of attack uses a flood of ICMP packets to disrupt a network?

 A) Phishing
 B) SQL Injection
 C) Ping of Death
 D) DDoS
Answer: D) DDoS

27. What does SSL stand for?

 A) Secure Socket Layer


 B) Secure Software Layer
 C) System Security Layer
 D) Secure Server Link
Answer: A) Secure Socket Layer

28. Which of the following IP addresses is in Class A?

 A) 192.168.1.1
 B) 172.16.0.1
 C) 10.1.1.1
 D) 224.0.0.1
Answer: C) 10.1.1.1

29. A VPN primarily provides:


 A) Faster internet speeds
 B) Encrypted remote access
 C) A static IP address
 D) A new DNS server
Answer: B) Encrypted remote access

30. What is the function of NAT (Network Address Translation)?

 A) To assign IP addresses
 B) To map public IPs to private IPs and vice versa
 C) To manage DNS requests
 D) To detect network issues
Answer: B) To map public IPs to private IPs and vice versa

31. Which protocol is often used for real-time video streaming?

 A) FTP
 B) UDP
 C) ICMP
 D) SMTP
Answer: B) UDP

32. In IPv4, how many bits are used for an IP address?

 A) 32
 B) 64
 C) 128
 D) 256
Answer: A) 32

33. What is the standard port number for HTTPS?

 A) 80
 B) 443
 C) 21
 D) 25
Answer: B) 443

34. Which type of device connects multiple networks and forwards packets to
their destination?

 A) Hub
 B) Repeater
 C) Router
 D) Switch
Answer: C) Router
35. Which network device operates primarily at Layer 2 of the OSI model?

 A) Router
 B) Switch
 C) Firewall
 D) Modem
Answer: B) Switch

36. Which IP class is used for multicast addresses?

 A) Class A
 B) Class B
 C) Class C
 D) Class D
Answer: D) Class D

37. What is the main difference between IPv4 and IPv6?

 A) IPv4 is more secure


 B) IPv6 has a larger address space
 C) IPv4 is slower
 D) IPv6 does not support NAT
Answer: B) IPv6 has a larger address space

38. In a network, what does MTU stand for?

 A) Maximum Transmission Utility


 B) Minimum Transfer Unit
 C) Maximum Transfer Unit
 D) Maximum Transmission Unit
Answer: D) Maximum Transmission Unit

39. Which layer of the OSI model handles error correction and flow control?

 A) Physical Layer
 B) Network Layer
 C) Data Link Layer
 D) Transport Layer
Answer: D) Transport Layer

40. What command is used in Linux to display network interfaces?

 A) ipconfig
 B) ifconfig
 C) netstat
 D) traceroute
Answer: B) ifconfig

41. What type of attack involves intercepting and altering communications


between two parties?

 A) Phishing
 B) Man-in-the-Middle (MITM)
 C) DDoS
 D) SQL Injection
Answer: B) Man-in-the-Middle (MITM)

42. Which protocol is primarily used for wireless networking?

 A) TCP/IP
 B) IEEE 802.11
 C) IEEE 802.3
 D) SMTP
Answer: B) IEEE 802.11

43. In subnetting, what does CIDR stand for?

 A) Classless Inter-Domain Routing


 B) Central Internet Domain Routing
 C) Classful Inter-Domain Routing
 D) Core Internet Data Routing
Answer: A) Classless Inter-Domain Routing

44. The OSI layer responsible for converting data into signals is:

 A) Data Link Layer


 B) Network Layer
 C) Transport Layer
 D) Physical Layer
Answer: D) Physical Layer

45. Which protocol is used to find the hardware address of a local device?

 A) ICMP
 B) DHCP
 C) ARP
 D) SMTP
Answer: C) ARP

46. A network device that regenerates and amplifies signals is called a:


 A) Router
 B) Switch
 C) Hub
 D) Repeater
Answer: D) Repeater

47. Which routing protocol uses the hop count as a routing metric?

 A) OSPF
 B) BGP
 C) EIGRP
 D) RIP
Answer: D) RIP

48. What is the purpose of a DMZ in networking?

 A) To protect servers from unauthorized access


 B) To slow down traffic
 C) To create a secure tunnel
 D) To enhance wireless signal strength
Answer: A) To protect servers from unauthorized access

49. Which of the following is NOT a VPN protocol?

 A) PPTP
 B) L2TP
 C) IPsec
 D) SNMP
Answer: D) SNMP

50. Which of these commands can display the routing table in Windows?

 A) ipconfig
 B) route print
 C) tracert
 D) ping
Answer: B) route print

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy