NETWORK ADMINISTRATOR1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

NETWORK ADMINISTRATOR PRACTICE EXAM

. Which layer of the OSI model is responsible for routing?

 A) Transport Layer
 B) Network Layer
 C) Data Link Layer
 D) Application Layer
Answer: B) Network Layer

2. What does DHCP stand for?

 A) Dynamic Host Communication Protocol


 B) Dynamic Host Configuration Protocol
 C) Direct Host Configuration Protocol
 D) Data Host Configuration Protocol
Answer: B) Dynamic Host Configuration Protocol

3. Which protocol is used to securely access a remote computer?

 A) FTP
 B) HTTP
 C) SSH
 D) SMTP
Answer: C) SSH

4. What is the primary purpose of a firewall?

 A) To encrypt data
 B) To block unauthorized access
 C) To speed up data transfer
 D) To assign IP addresses
Answer: B) To block unauthorized access

5. What is the default port number for HTTP?

 A) 25
 B) 443
 C) 80
 D) 21
Answer: C) 80

6. Which command can you use in Windows to check network connectivity?

 A) ping
 B) ipconfig
 C) netstat
 D) tracert
Answer: A) ping

7. What is an IP address?

 A) A device identifier
 B) A unique identifier for a network
 C) An identifier for a computer on a network
 D) A network configuration
Answer: C) An identifier for a computer on a network

8. Which layer of the OSI model manages encryption and decryption?

 A) Physical Layer
 B) Session Layer
 C) Presentation Layer
 D) Application Layer
Answer: C) Presentation Layer

9. What does VLAN stand for?

 A) Virtual Link Access Network


 B) Virtual Local Area Network
 C) Variable Local Access Network
 D) Virtual Line Area Network
Answer: B) Virtual Local Area Network

10. What does the command "netstat" display?

 A) IP configuration
 B) Active network connections
 C) Ping statistics
 D) Route information
Answer: B) Active network connections

11. A DNS server primarily resolves:

 A) IP addresses to MAC addresses


 B) Domain names to IP addresses
 C) IP addresses to domain names
 D) MAC addresses to IP addresses
Answer: B) Domain names to IP addresses

12. Which of the following IP addresses is private?


 A) 192.168.1.1
 B) 8.8.8.8
 C) 172.217.3.238
 D) 203.0.113.45
Answer: A) 192.168.1.1

13. Which tool would you use to trace the path packets take to a destination?

 A) ping
 B) tracert
 C) ipconfig
 D) nslookup
Answer: B) tracert

14. What does TCP/IP stand for?

 A) Transfer Control Protocol/Internet Protocol


 B) Transmission Control Protocol/Internet Protocol
 C) Transmission Communication Protocol/Internet Protocol
 D) Transfer Communication Protocol/Internet Protocol
Answer: B) Transmission Control Protocol/Internet Protocol

15. Which device can segment a network into multiple broadcast domains?

 A) Switch
 B) Hub
 C) Router
 D) Bridge
Answer: C) Router

16. The main difference between TCP and UDP is:

 A) TCP is connection-oriented, UDP is not


 B) TCP uses encryption, UDP does not
 C) TCP is faster than UDP
 D) UDP requires handshakes, TCP does not
Answer: A) TCP is connection-oriented, UDP is not

17. Which command provides a detailed configuration of network interfaces in


Windows?

 A) ipconfig /all
 B) ifconfig -a
 C) netstat -i
 D) traceroute
Answer: A) ipconfig /all
18. Which device connects different types of networks together?

 A) Switch
 B) Router
 C) Hub
 D) Access Point
Answer: B) Router

19. What is the purpose of a subnet mask?

 A) To determine the default gateway


 B) To differentiate network from host portions of an IP address
 C) To encrypt data
 D) To assign IP addresses
Answer: B) To differentiate network from host portions of an IP address

20. SNMP is used for:

 A) Network management
 B) File sharing
 C) Routing
 D) File transfer
Answer: A) Network management

21. Which layer in the OSI model is responsible for establishing, managing, and
terminating sessions between applications?

 A) Application Layer
 B) Presentation Layer
 C) Session Layer
 D) Transport Layer
Answer: C) Session Layer

22. What is the function of ARP in networking?

 A) To resolve domain names to IP addresses


 B) To resolve IP addresses to MAC addresses
 C) To secure network traffic
 D) To configure IP addresses
Answer: B) To resolve IP addresses to MAC addresses

23. Which of the following is NOT a common network topology?

 A) Star
 B) Tree
 C) Bus
 D) Matrix
Answer: D) Matrix

24. The command "ipconfig /release" in Windows:

 A) Displays the IP configuration


 B) Releases the DHCP lease
 C) Renews the DHCP lease
 D) Configures the DNS
Answer: B) Releases the DHCP lease

25. The protocol primarily used for email transmission is:

 A) FTP
 B) SMTP
 C) SNMP
 D) HTTPS
Answer: B) SMTP

26. Which type of attack uses a flood of ICMP packets to disrupt a network?

 A) Phishing
 B) SQL Injection
 C) Ping of Death
 D) DDoS
Answer: D) DDoS

27. What does SSL stand for?

 A) Secure Socket Layer


 B) Secure Software Layer
 C) System Security Layer
 D) Secure Server Link
Answer: A) Secure Socket Layer

28. Which of the following IP addresses is in Class A?

 A) 192.168.1.1
 B) 172.16.0.1
 C) 10.1.1.1
 D) 224.0.0.1
Answer: C) 10.1.1.1

29. A VPN primarily provides:


 A) Faster internet speeds
 B) Encrypted remote access
 C) A static IP address
 D) A new DNS server
Answer: B) Encrypted remote access

30. What is the function of NAT (Network Address Translation)?

 A) To assign IP addresses
 B) To map public IPs to private IPs and vice versa
 C) To manage DNS requests
 D) To detect network issues
Answer: B) To map public IPs to private IPs and vice versa

31. Which protocol is often used for real-time video streaming?

 A) FTP
 B) UDP
 C) ICMP
 D) SMTP
Answer: B) UDP

32. In IPv4, how many bits are used for an IP address?

 A) 32
 B) 64
 C) 128
 D) 256
Answer: A) 32

33. What is the standard port number for HTTPS?

 A) 80
 B) 443
 C) 21
 D) 25
Answer: B) 443

34. Which type of device connects multiple networks and forwards packets to
their destination?

 A) Hub
 B) Repeater
 C) Router
 D) Switch
Answer: C) Router
35. Which network device operates primarily at Layer 2 of the OSI model?

 A) Router
 B) Switch
 C) Firewall
 D) Modem
Answer: B) Switch

36. Which IP class is used for multicast addresses?

 A) Class A
 B) Class B
 C) Class C
 D) Class D
Answer: D) Class D

37. What is the main difference between IPv4 and IPv6?

 A) IPv4 is more secure


 B) IPv6 has a larger address space
 C) IPv4 is slower
 D) IPv6 does not support NAT
Answer: B) IPv6 has a larger address space

38. In a network, what does MTU stand for?

 A) Maximum Transmission Utility


 B) Minimum Transfer Unit
 C) Maximum Transfer Unit
 D) Maximum Transmission Unit
Answer: D) Maximum Transmission Unit

39. Which layer of the OSI model handles error correction and flow control?

 A) Physical Layer
 B) Network Layer
 C) Data Link Layer
 D) Transport Layer
Answer: D) Transport Layer

40. What command is used in Linux to display network interfaces?

 A) ipconfig
 B) ifconfig
 C) netstat
 D) traceroute
Answer: B) ifconfig

41. What type of attack involves intercepting and altering communications


between two parties?

 A) Phishing
 B) Man-in-the-Middle (MITM)
 C) DDoS
 D) SQL Injection
Answer: B) Man-in-the-Middle (MITM)

42. Which protocol is primarily used for wireless networking?

 A) TCP/IP
 B) IEEE 802.11
 C) IEEE 802.3
 D) SMTP
Answer: B) IEEE 802.11

43. In subnetting, what does CIDR stand for?

 A) Classless Inter-Domain Routing


 B) Central Internet Domain Routing
 C) Classful Inter-Domain Routing
 D) Core Internet Data Routing
Answer: A) Classless Inter-Domain Routing

44. The OSI layer responsible for converting data into signals is:

 A) Data Link Layer


 B) Network Layer
 C) Transport Layer
 D) Physical Layer
Answer: D) Physical Layer

45. Which protocol is used to find the hardware address of a local device?

 A) ICMP
 B) DHCP
 C) ARP
 D) SMTP
Answer: C) ARP

46. A network device that regenerates and amplifies signals is called a:


 A) Router
 B) Switch
 C) Hub
 D) Repeater
Answer: D) Repeater

47. Which routing protocol uses the hop count as a routing metric?

 A) OSPF
 B) BGP
 C) EIGRP
 D) RIP
Answer: D) RIP

48. What is the purpose of a DMZ in networking?

 A) To protect servers from unauthorized access


 B) To slow down traffic
 C) To create a secure tunnel
 D) To enhance wireless signal strength
Answer: A) To protect servers from unauthorized access

49. Which of the following is NOT a VPN protocol?

 A) PPTP
 B) L2TP
 C) IPsec
 D) SNMP
Answer: D) SNMP

50. Which of these commands can display the routing table in Windows?

 A) ipconfig
 B) route print
 C) tracert
 D) ping
Answer: B) route print

You might also like