NETWORK ADMINISTRATOR1
NETWORK ADMINISTRATOR1
NETWORK ADMINISTRATOR1
A) Transport Layer
B) Network Layer
C) Data Link Layer
D) Application Layer
Answer: B) Network Layer
A) FTP
B) HTTP
C) SSH
D) SMTP
Answer: C) SSH
A) To encrypt data
B) To block unauthorized access
C) To speed up data transfer
D) To assign IP addresses
Answer: B) To block unauthorized access
A) 25
B) 443
C) 80
D) 21
Answer: C) 80
A) ping
B) ipconfig
C) netstat
D) tracert
Answer: A) ping
7. What is an IP address?
A) A device identifier
B) A unique identifier for a network
C) An identifier for a computer on a network
D) A network configuration
Answer: C) An identifier for a computer on a network
A) Physical Layer
B) Session Layer
C) Presentation Layer
D) Application Layer
Answer: C) Presentation Layer
A) IP configuration
B) Active network connections
C) Ping statistics
D) Route information
Answer: B) Active network connections
13. Which tool would you use to trace the path packets take to a destination?
A) ping
B) tracert
C) ipconfig
D) nslookup
Answer: B) tracert
15. Which device can segment a network into multiple broadcast domains?
A) Switch
B) Hub
C) Router
D) Bridge
Answer: C) Router
A) ipconfig /all
B) ifconfig -a
C) netstat -i
D) traceroute
Answer: A) ipconfig /all
18. Which device connects different types of networks together?
A) Switch
B) Router
C) Hub
D) Access Point
Answer: B) Router
A) Network management
B) File sharing
C) Routing
D) File transfer
Answer: A) Network management
21. Which layer in the OSI model is responsible for establishing, managing, and
terminating sessions between applications?
A) Application Layer
B) Presentation Layer
C) Session Layer
D) Transport Layer
Answer: C) Session Layer
A) Star
B) Tree
C) Bus
D) Matrix
Answer: D) Matrix
A) FTP
B) SMTP
C) SNMP
D) HTTPS
Answer: B) SMTP
26. Which type of attack uses a flood of ICMP packets to disrupt a network?
A) Phishing
B) SQL Injection
C) Ping of Death
D) DDoS
Answer: D) DDoS
A) 192.168.1.1
B) 172.16.0.1
C) 10.1.1.1
D) 224.0.0.1
Answer: C) 10.1.1.1
A) To assign IP addresses
B) To map public IPs to private IPs and vice versa
C) To manage DNS requests
D) To detect network issues
Answer: B) To map public IPs to private IPs and vice versa
A) FTP
B) UDP
C) ICMP
D) SMTP
Answer: B) UDP
A) 32
B) 64
C) 128
D) 256
Answer: A) 32
A) 80
B) 443
C) 21
D) 25
Answer: B) 443
34. Which type of device connects multiple networks and forwards packets to
their destination?
A) Hub
B) Repeater
C) Router
D) Switch
Answer: C) Router
35. Which network device operates primarily at Layer 2 of the OSI model?
A) Router
B) Switch
C) Firewall
D) Modem
Answer: B) Switch
A) Class A
B) Class B
C) Class C
D) Class D
Answer: D) Class D
39. Which layer of the OSI model handles error correction and flow control?
A) Physical Layer
B) Network Layer
C) Data Link Layer
D) Transport Layer
Answer: D) Transport Layer
A) ipconfig
B) ifconfig
C) netstat
D) traceroute
Answer: B) ifconfig
A) Phishing
B) Man-in-the-Middle (MITM)
C) DDoS
D) SQL Injection
Answer: B) Man-in-the-Middle (MITM)
A) TCP/IP
B) IEEE 802.11
C) IEEE 802.3
D) SMTP
Answer: B) IEEE 802.11
44. The OSI layer responsible for converting data into signals is:
45. Which protocol is used to find the hardware address of a local device?
A) ICMP
B) DHCP
C) ARP
D) SMTP
Answer: C) ARP
47. Which routing protocol uses the hop count as a routing metric?
A) OSPF
B) BGP
C) EIGRP
D) RIP
Answer: D) RIP
A) PPTP
B) L2TP
C) IPsec
D) SNMP
Answer: D) SNMP
50. Which of these commands can display the routing table in Windows?
A) ipconfig
B) route print
C) tracert
D) ping
Answer: B) route print