Examplify
Back to home

System and Network Administration

Review all questions and their correct answers.

Question 1
Who is primarily responsible for managing user accounts, performing backups, and ensuring server security?
  • Network Administrator
  • System Administrator
  • Database Administrator
  • Web Developer
Question 2
Which professional is responsible for maintaining network hardware like routers and implementing firewall policies?
  • System Administrator
  • Network Administrator
  • Security Analyst
  • IT Support
Question 3
In the Client-Server model, which role typically initiates communication?
  • Server
  • Client
  • Router
  • Switch
Question 4
Which type of computer in a network is characterized by powerful hardware and running in the background to respond to requests?
  • Client
  • Desktop
  • Server
  • Laptop
Question 5
Your web browser making a request to a website is an example of what?
  • A server requesting a service
  • A peer-to-peer connection
  • A client requesting a service
  • A network switch operating
Question 6
What network topology connects all devices to a single central cable or backbone?
  • Star
  • Ring
  • Mesh
  • Bus
Question 7
What is the main disadvantage of a Bus topology?
  • It is too expensive
  • If the central hub fails, the network fails
  • If the main cable fails, the entire network goes down
  • It is too complex to install
Question 8
Which network topology is the most common today, where all devices connect to a central switch?
  • Star
  • Bus
  • Ring
  • Mesh
Question 9
Which topology offers the highest reliability and redundancy by connecting every device to every other device?
  • Star
  • Bus
  • Mesh
  • Ring
Question 10
What is a major drawback of a full Mesh topology?
  • Low reliability
  • Slow data transfer
  • A single point of failure
  • High cost and complexity
Question 11
At which layer of the OSI model does routing and logical addressing (IP addresses) occur?
  • Layer 1 (Physical)
  • Layer 2 (Data Link)
  • Layer 3 (Network)
  • Layer 4 (Transport)
Question 12
Which OSI layer is responsible for data translation, encryption, and compression?
  • Application
  • Presentation
  • Session
  • Transport
Question 13
The Transport layer of the OSI model provides reliable data transfer using which protocol?
  • IP
  • HTTP
  • UDP
  • TCP
Question 14
MAC addresses are used at which layer of the OSI model?
  • Network
  • Physical
  • Data Link
  • Transport
Question 15
The TCP/IP model's Application layer corresponds to which three layers of the OSI model?
  • Application, Presentation, Session
  • Session, Transport, Network
  • Application, Transport, Internet
  • Data Link, Network, Transport
Question 16
Which network device operates at Layer 1 and broadcasts signals to all connected ports?
  • Router
  • Switch
  • Hub
  • Firewall
Question 17
What device operates at Layer 2 and forwards frames to specific ports based on MAC addresses?
  • Hub
  • Router
  • Switch
  • WAP
Question 18
Which Layer 3 device is used to connect different networks together using IP addresses?
  • Switch
  • Router
  • Hub
  • Firewall
Question 19
What is the primary function of a firewall?
  • To connect wireless devices
  • To connect different networks
  • To monitor and control network traffic based on security rules
  • To broadcast network signals
Question 20
A Wireless Access Point (WAP) primarily allows what?
  • Connection of different IP networks
  • Filtering of network traffic
  • Wireless devices to connect to a wired network
  • Extension of a bus topology
Question 21
What is the process of dividing a large network into smaller sub-networks called?
  • Routing
  • Switching
  • Subnetting
  • Addressing
Question 22
What is the default subnet mask for a Class B network?
  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255
Question 23
How many bits must be borrowed from the host portion of a Class B network to create at least 50 subnets?
  • 4
  • 5
  • 6
  • 7
Question 24
If you borrow 6 bits from a Class B network, what is the new subnet mask?
  • 255.255.192.0
  • 255.255.224.0
  • 255.255.240.0
  • 255.255.252.0
Question 25
What is the CIDR notation for a Class B network that has borrowed 6 bits for subnetting?
  • /16
  • /20
  • /22
  • /24
Question 26
For a network with a /22 subnet mask, how many host bits are available?
  • 8
  • 10
  • 12
  • 14
Question 27
Using the formula 2^h - 2, how many usable hosts are there per subnet in a /22 network?
  • 254
  • 1022
  • 2046
  • 4094
Question 28
What is the "magic number" or block size for a subnet mask of 255.255.252.0?
  • 2
  • 4
  • 8
  • 16
Question 29
Given the network 172.16.0.0 and a block size of 4, what is the Network ID of the second subnet?
  • 172.16.0.0
  • 172.16.4.0
  • 172.16.8.0
  • 172.16.1.0
Question 30
For the subnet 172.16.4.0 /22, what is the broadcast address?
  • 172.16.4.255
  • 172.16.5.255
  • 172.16.7.255
  • 172.16.8.0
Question 31
What is the first usable host IP address for the subnet 172.16.8.0 /22?
  • 172.16.8.0
  • 172.16.8.1
  • 172.16.9.1
  • 172.16.11.254
Question 32
What is the last usable host IP address for the subnet 172.16.12.0 /22?
  • 172.16.12.255
  • 172.16.15.254
  • 172.16.15.255
  • 172.16.16.0
Question 33
Which of these IP addresses cannot be assigned to a host computer?
  • 172.16.4.1
  • 172.16.5.254
  • 172.16.7.255
  • 172.16.6.100
Question 34
The OSI layer responsible for managing connections between applications is the:
  • Transport Layer
  • Network Layer
  • Session Layer
  • Application Layer
Question 35
Which topology provides low redundancy but is cheap and easy to set up for small networks?
  • Mesh
  • Star
  • Ring
  • Bus
Question 36
HTTP, FTP, and SMTP are all protocols that operate at which layer of the TCP/IP model?
  • Internet
  • Transport
  • Network Access
  • Application
Question 37
A switch is considered "smarter" than a hub because it uses a __________ to forward traffic.
  • IP address table
  • Routing table
  • MAC address table
  • Port number list
Question 38
In a Star topology, what is the single point of failure?
  • The main backbone cable
  • Any client computer
  • The central hub or switch
  • The router
Question 39
Which of the following is NOT a primary role of a System Administrator?
  • Managing user accounts
  • Designing network topologies
  • Performing system backups
  • Installing server software
Question 40
What part of an IP address does a subnet mask separate?
  • Physical and Logical portions
  • MAC and IP portions
  • Network and Host portions
  • TCP and UDP portions
Question 41
Which OSI layer is concerned with bits, signals, and physical hardware like cables?
  • Layer 1 (Physical)
  • Layer 2 (Data Link)
  • Layer 3 (Network)
  • Layer 4 (Transport)
Question 42
What is the Network ID for the IP address 172.16.202.55 with a /22 subnet mask?
  • 172.16.202.0
  • 172.16.201.0
  • 172.16.200.0
  • 172.16.0.0
Question 43
Which protocol at the Transport layer provides fast but unreliable data transfer?
  • TCP
  • UDP
  • IP
  • HTTP
Question 44
What is the 50th subnet Network ID created from 172.16.0.0 when borrowing 6 bits?
  • 172.16.196.0
  • 172.16.200.0
  • 172.16.204.0
  • 172.16.50.0
Question 45
A computer network is best defined as a collection of interconnected devices for the purpose of...
  • Running powerful applications
  • Exchanging data and sharing resources
  • Securing individual computers
  • Enhancing CPU performance
Question 46
In a Ring topology, how does a device failure typically affect the network?
  • Only that single device is affected
  • It has no effect on the network
  • It can break the loop and take down the entire network
  • It improves network speed
Question 47
The Internet Layer of the TCP/IP model is responsible for which function?
  • Reliable data transfer
  • Physical hardware connection
  • Logical addressing and routing
  • User-facing services
Question 48
What is the primary reason for subnetting a network?
  • To increase the total number of IP addresses
  • To reduce traffic and improve security
  • To make the network faster for everyone
  • To simplify the physical cabling
Question 49
What is the last subnet Network ID created from 172.16.0.0 /16 when borrowing 6 bits?
  • 172.16.255.0
  • 172.16.252.0
  • 172.16.248.0
  • 172.16.254.0
Question 50
Which term refers to the physical or logical arrangement of nodes and connections in a network?
  • Network Architecture
  • Network Topology
  • Network Model
  • Network Framework