Back to home
System and Network Administration
Review all questions and their correct answers.
Question 1
Who is primarily responsible for managing user accounts, performing backups, and ensuring server security?
- Network Administrator
- System Administrator
- Database Administrator
- Web Developer
Question 2
Which professional is responsible for maintaining network hardware like routers and implementing firewall policies?
- System Administrator
- Network Administrator
- Security Analyst
- IT Support
Question 3
In the Client-Server model, which role typically initiates communication?
- Server
- Client
- Router
- Switch
Question 4
Which type of computer in a network is characterized by powerful hardware and running in the background to respond to requests?
- Client
- Desktop
- Server
- Laptop
Question 5
Your web browser making a request to a website is an example of what?
- A server requesting a service
- A peer-to-peer connection
- A client requesting a service
- A network switch operating
Question 6
What network topology connects all devices to a single central cable or backbone?
- Star
- Ring
- Mesh
- Bus
Question 7
What is the main disadvantage of a Bus topology?
- It is too expensive
- If the central hub fails, the network fails
- If the main cable fails, the entire network goes down
- It is too complex to install
Question 8
Which network topology is the most common today, where all devices connect to a central switch?
- Star
- Bus
- Ring
- Mesh
Question 9
Which topology offers the highest reliability and redundancy by connecting every device to every other device?
- Star
- Bus
- Mesh
- Ring
Question 10
What is a major drawback of a full Mesh topology?
- Low reliability
- Slow data transfer
- A single point of failure
- High cost and complexity
Question 11
At which layer of the OSI model does routing and logical addressing (IP addresses) occur?
- Layer 1 (Physical)
- Layer 2 (Data Link)
- Layer 3 (Network)
- Layer 4 (Transport)
Question 12
Which OSI layer is responsible for data translation, encryption, and compression?
- Application
- Presentation
- Session
- Transport
Question 13
The Transport layer of the OSI model provides reliable data transfer using which protocol?
- IP
- HTTP
- UDP
- TCP
Question 14
MAC addresses are used at which layer of the OSI model?
- Network
- Physical
- Data Link
- Transport
Question 15
The TCP/IP model's Application layer corresponds to which three layers of the OSI model?
- Application, Presentation, Session
- Session, Transport, Network
- Application, Transport, Internet
- Data Link, Network, Transport
Question 16
Which network device operates at Layer 1 and broadcasts signals to all connected ports?
- Router
- Switch
- Hub
- Firewall
Question 17
What device operates at Layer 2 and forwards frames to specific ports based on MAC addresses?
- Hub
- Router
- Switch
- WAP
Question 18
Which Layer 3 device is used to connect different networks together using IP addresses?
- Switch
- Router
- Hub
- Firewall
Question 19
What is the primary function of a firewall?
- To connect wireless devices
- To connect different networks
- To monitor and control network traffic based on security rules
- To broadcast network signals
Question 20
A Wireless Access Point (WAP) primarily allows what?
- Connection of different IP networks
- Filtering of network traffic
- Wireless devices to connect to a wired network
- Extension of a bus topology
Question 21
What is the process of dividing a large network into smaller sub-networks called?
- Routing
- Switching
- Subnetting
- Addressing
Question 22
What is the default subnet mask for a Class B network?
- 255.0.0.0
- 255.255.0.0
- 255.255.255.0
- 255.255.255.255
Question 23
How many bits must be borrowed from the host portion of a Class B network to create at least 50 subnets?
- 4
- 5
- 6
- 7
Question 24
If you borrow 6 bits from a Class B network, what is the new subnet mask?
- 255.255.192.0
- 255.255.224.0
- 255.255.240.0
- 255.255.252.0
Question 25
What is the CIDR notation for a Class B network that has borrowed 6 bits for subnetting?
- /16
- /20
- /22
- /24
Question 26
For a network with a /22 subnet mask, how many host bits are available?
- 8
- 10
- 12
- 14
Question 27
Using the formula 2^h - 2, how many usable hosts are there per subnet in a /22 network?
- 254
- 1022
- 2046
- 4094
Question 28
What is the "magic number" or block size for a subnet mask of 255.255.252.0?
- 2
- 4
- 8
- 16
Question 29
Given the network 172.16.0.0 and a block size of 4, what is the Network ID of the second subnet?
- 172.16.0.0
- 172.16.4.0
- 172.16.8.0
- 172.16.1.0
Question 30
For the subnet 172.16.4.0 /22, what is the broadcast address?
- 172.16.4.255
- 172.16.5.255
- 172.16.7.255
- 172.16.8.0
Question 31
What is the first usable host IP address for the subnet 172.16.8.0 /22?
- 172.16.8.0
- 172.16.8.1
- 172.16.9.1
- 172.16.11.254
Question 32
What is the last usable host IP address for the subnet 172.16.12.0 /22?
- 172.16.12.255
- 172.16.15.254
- 172.16.15.255
- 172.16.16.0
Question 33
Which of these IP addresses cannot be assigned to a host computer?
- 172.16.4.1
- 172.16.5.254
- 172.16.7.255
- 172.16.6.100
Question 34
The OSI layer responsible for managing connections between applications is the:
- Transport Layer
- Network Layer
- Session Layer
- Application Layer
Question 35
Which topology provides low redundancy but is cheap and easy to set up for small networks?
- Mesh
- Star
- Ring
- Bus
Question 36
HTTP, FTP, and SMTP are all protocols that operate at which layer of the TCP/IP model?
- Internet
- Transport
- Network Access
- Application
Question 37
A switch is considered "smarter" than a hub because it uses a __________ to forward traffic.
- IP address table
- Routing table
- MAC address table
- Port number list
Question 38
In a Star topology, what is the single point of failure?
- The main backbone cable
- Any client computer
- The central hub or switch
- The router
Question 39
Which of the following is NOT a primary role of a System Administrator?
- Managing user accounts
- Designing network topologies
- Performing system backups
- Installing server software
Question 40
What part of an IP address does a subnet mask separate?
- Physical and Logical portions
- MAC and IP portions
- Network and Host portions
- TCP and UDP portions
Question 41
Which OSI layer is concerned with bits, signals, and physical hardware like cables?
- Layer 1 (Physical)
- Layer 2 (Data Link)
- Layer 3 (Network)
- Layer 4 (Transport)
Question 42
What is the Network ID for the IP address 172.16.202.55 with a /22 subnet mask?
- 172.16.202.0
- 172.16.201.0
- 172.16.200.0
- 172.16.0.0
Question 43
Which protocol at the Transport layer provides fast but unreliable data transfer?
- TCP
- UDP
- IP
- HTTP
Question 44
What is the 50th subnet Network ID created from 172.16.0.0 when borrowing 6 bits?
- 172.16.196.0
- 172.16.200.0
- 172.16.204.0
- 172.16.50.0
Question 45
A computer network is best defined as a collection of interconnected devices for the purpose of...
- Running powerful applications
- Exchanging data and sharing resources
- Securing individual computers
- Enhancing CPU performance
Question 46
In a Ring topology, how does a device failure typically affect the network?
- Only that single device is affected
- It has no effect on the network
- It can break the loop and take down the entire network
- It improves network speed
Question 47
The Internet Layer of the TCP/IP model is responsible for which function?
- Reliable data transfer
- Physical hardware connection
- Logical addressing and routing
- User-facing services
Question 48
What is the primary reason for subnetting a network?
- To increase the total number of IP addresses
- To reduce traffic and improve security
- To make the network faster for everyone
- To simplify the physical cabling
Question 49
What is the last subnet Network ID created from 172.16.0.0 /16 when borrowing 6 bits?
- 172.16.255.0
- 172.16.252.0
- 172.16.248.0
- 172.16.254.0
Question 50
Which term refers to the physical or logical arrangement of nodes and connections in a network?
- Network Architecture
- Network Topology
- Network Model
- Network Framework