Network Administrator Exam: Trivia Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kharoldsen
K
Kharoldsen
Community Contributor
Quizzes Created: 2 | Total Attempts: 2,695
Questions: 37 | Attempts: 724

SettingsSettingsSettings
Network Administrator Exam: Trivia Quiz - Quiz


Are you preparing for a network administrator exam? A network administrator is tasked with ensuring the computer systems needed by specific organizations are properly set up and support networks required. How do you detect malware in a network and fix them? Do you know the major computer components in detail? This quiz will help to check out how competent you are as a network administrator. Do give it a shot and see how well you do!


Questions and Answers
  • 1. 

    ____________ is to authenticate user when logging on to a domain.

    Explanation
    A domain controller (DC) is responsible for authenticating users when they log on to a domain. It verifies the user's credentials and grants access to the domain's resources. The DC acts as the central authority for user authentication and manages the security policies and permissions within the domain. The abbreviation "dc" is often used as a shorthand for domain controller.

    Rate this question:

  • 2. 

    If I have a workgroup of 10 users, when I make a user account for user 1 on computer 1,

    • A.

      I have to run a Work Group Policy Updates on computer 1 so that the other 9 computers will recognize user 1 too.

    • B.

      Work Group Policy will propagate through the other 9 computers and user 1 can log onto them too.

    • C.

      User 1 must select Work Group as the domain when log onto the other 9 computers.

    • D.

      I have to make the same account for user 1 on the remaining 9 computers.

    • E.

      I have to make user 1 as a Work Group user so that the other 9 computers will see the user too.

    Correct Answer
    D. I have to make the same account for user 1 on the remaining 9 computers.
    Explanation
    There is no such thing as Work Group Policy or Work Group domain.
    Workgroup
    - are a small group of less than 10 computers.
    - has decentralized database
    - has decentralized administration
    Domain
    - has centralized database
    - has centralized administration

    Rate this question:

  • 3. 

    What are the benefits does NTFS offer that FAT doesn't?

    • A.

      File level security/permission

    • B.

      Encrypted File System

    • C.

      File compression

    • D.

      Disk Quota

    • E.

      Single file size can be larger than 4GB

    Correct Answer(s)
    A. File level security/permission
    B. Encrypted File System
    C. File compression
    D. Disk Quota
    E. Single file size can be larger than 4GB
    Explanation
    http://www.ntfs.com/ntfs_vs_fat.htm
    http://en.wikipedia.org/wiki/Ntfs
    http://en.wikipedia.org/wiki/FAT_32

    Rate this question:

  • 4. 

    A folder A is shared with shared permission READ and NTFS permission full control. The combined permission is

    • A.

      Full control

    • B.

      Modify

    • C.

      Read

    • D.

      Read & Execute

    • E.

      Write

    Correct Answer
    C. Read
    Explanation
    The most restrictive permission is use when you combine permission.

    Rate this question:

  • 5. 

    An IP address is best defined as?

    • A.

      An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) associated with every system connected to a network.

    • B.

      Internet Provider Address. The address of a company that provides individuals and other companies access to the Internet.

    • C.

      The location of Internet Packets measured in kilobytes on a network.

    • D.

      All of the above.

    Correct Answer
    A. An IP Address is a unique number consisting of 4 parts separated by dots (eg: 217.247.84.89) associated with every system connected to a network.
    Explanation
    An IP address is a unique number consisting of 4 parts separated by dots that is associated with every system connected to a network. This address allows devices to communicate with each other over the internet. It is not the address of an internet provider or the location of internet packets on a network. Therefore, the correct answer is that an IP address is a unique number associated with every system connected to a network.

    Rate this question:

  • 6. 

    Malware is best defined as?

    • A.

      A computer program designed to protect the operating system from viruses.

    • B.

      Microsoft Arithmetic LAN software. Software run in the background of any Windows based computer system used to manage network connections

    • C.

      Software designed to infiltrate or damage a computer system without the owner's informed consent.

    • D.

      None of the above.

    Correct Answer
    C. Software designed to infiltrate or damage a computer system without the owner's informed consent.
    Explanation
    The correct answer is "Software designed to infiltrate or damage a computer system without the owner's informed consent." This definition accurately describes malware, which refers to any malicious software that is created with the intention of causing harm to a computer system, such as stealing sensitive information, disrupting system operations, or gaining unauthorized access. It is important to note that malware is different from antivirus software, which is designed to protect the operating system from viruses and other malicious threats.

    Rate this question:

  • 7. 

    One MB is equal to?

    • A.

      One thousand bytes

    • B.

      1 billion bytes

    • C.

      The amount of RAM in every computer

    • D.

      1024KB

    Correct Answer
    D. 1024KB
    Explanation
    One MB is equal to 1024KB. This is because in digital storage, the binary system is used where each unit is a power of 2. Therefore, 1 MB is equal to 1024 kilobytes (KB) and not 1000 bytes.

    Rate this question:

  • 8. 

    Select the 3 graphics files from the list below.

    • A.

      Untitled.nfo

    • B.

      Untitled.jpg

    • C.

      Untitled.bmp

    • D.

      Untitled.ogg

    • E.

      Untitled.tiff

    Correct Answer(s)
    B. Untitled.jpg
    C. Untitled.bmp
    E. Untitled.tiff
    Explanation
    The correct answer is untitled.jpg, untitled.bmp, and untitled.tiff. These three file extensions (.jpg, .bmp, .tiff) are commonly used for graphics files, while the other options (.nfo, .ogg) are not typically associated with graphics.

    Rate this question:

  • 9. 

    Select the URL from the list below.

    Correct Answer
    B. Http://www.yahoo.com
    Explanation
    The correct answer is http://www.yahoo.com. This is the correct URL from the given list. The other options are an email address ([email protected]), a file path (D:\downloads\standard), and an IP address (192.168.0.1), which are not valid URLs.

    Rate this question:

  • 10. 

    Which of the following programs is not an email client.

    • A.

      Microsoft Outlook 2003

    • B.

      Windows Live Mail

    • C.

      Mozilla Firefox

    • D.

      Outlook Express 6

    Correct Answer
    C. Mozilla Firefox
    Explanation
    Mozilla Firefox is not an email client. It is a web browser developed by Mozilla Foundation. While it does have some email-related features such as the ability to open email links, it is primarily used for browsing the internet and does not have the full functionality of an email client like Microsoft Outlook, Windows Live Mail, or Outlook Express.

    Rate this question:

  • 11. 

    What is the shortcut for PASTE in Windows operating systems?

    • A.

      Ctrl + P

    • B.

      Ctrl + V

    • C.

      Ctrl + C

    • D.

      Caps Lock + V

    Correct Answer
    B. Ctrl + V
    Explanation
    The shortcut for PASTE in Windows operating systems is Ctrl + V. This combination of keys allows the user to paste copied or cut content from the clipboard into a document or application.

    Rate this question:

  • 12. 

    In the computer component responsible for calculations, moving, and processing information?

    • A.

      CPU

    • B.

      RAM

    • C.

      Motherboard

    • D.

      Hard Drive

    Correct Answer
    A. CPU
    Explanation
    The CPU (Central Processing Unit) is responsible for calculations, moving, and processing information in a computer. It is often referred to as the "brain" of the computer as it performs all the necessary calculations and instructions to execute tasks. The CPU carries out arithmetic and logical operations, retrieves and stores data, and controls the flow of information within the computer system.

    Rate this question:

  • 13. 

    What is this computer component?

    • A.

      Video Card

    • B.

      Sound Card

    • C.

      RAM

    • D.

      Network Interface Card

    Correct Answer
    D. Network Interface Card
    Explanation
    A Network Interface Card (NIC) is a computer component that allows a computer to connect to a network. It provides the necessary hardware for a computer to communicate with other devices on the network, such as routers, switches, and other computers. The NIC typically has an Ethernet port that allows for a wired connection, but it can also support wireless connections through Wi-Fi. This component is essential for accessing the internet, sharing files and resources, and participating in network activities.

    Rate this question:

  • 14. 

    What is this computer component?

    • A.

      RAM

    • B.

      CPU

    • C.

      Hard Disk

    • D.

      Motherboard

    Correct Answer
    B. CPU
    Explanation
    The correct answer is CPU. The CPU, or Central Processing Unit, is a computer component responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer, as it carries out the majority of the processing tasks. RAM, or Random Access Memory, is a different component that stores temporary data for the CPU to access quickly. The hard disk is a storage device, while the motherboard is the main circuit board that connects all the components of the computer.

    Rate this question:

  • 15. 

    This is a measurement of speed over a network.

    • A.

      Megabytes

    • B.

      Bits

    • C.

      Megahertz

    • D.

      Megabits per second.

    Correct Answer
    D. Megabits per second.
    Explanation
    The correct answer is "Megabits per second." This is because when measuring speed over a network, the most commonly used unit is "bits" or "bits per second." Megabits per second (Mbps) is a unit used to measure data transfer rate or network speed. Megabytes, on the other hand, is a unit used to measure data storage capacity, not speed. Megahertz is a unit used to measure frequency, not speed over a network. Therefore, the most appropriate unit for measuring speed over a network is "megabits per second."

    Rate this question:

  • 16. 

    Ping is a term for?

    • A.

      A measurement of data transferred to your local station from a specific network source.

    • B.

      A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer.

    • C.

      A sound used for testing your computer speakers.

    • D.

      None of the above.

    Correct Answer
    B. A computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self-test the Network Interface Card (NIC) of the computer.
    Explanation
    Ping is a computer network tool used to test whether a particular host is reachable across an IP network. It sends a small packet of data to the host and waits for a response. If the host responds, it means that it is reachable. Ping is also used to self-test the Network Interface Card (NIC) of the computer, ensuring that it is functioning properly.

    Rate this question:

  • 17. 

    Bandwidth is a term for?

    • A.

      The speed at which data can be transferred from the server to the client.

    • B.

      A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.

    • C.

      A unit of information or computer storage equal to one billion bytes.

    • D.

      None of the above.

    Correct Answer
    B. A measurement of how much information can be carried in a given time period (usually a second) over a wired or wireless communications link.
    Explanation
    Bandwidth refers to the measurement of how much information can be carried over a wired or wireless communications link within a specific time period, typically a second. It is not related to the speed of data transfer from the server to the client or the unit of information or computer storage. Therefore, the correct answer is that bandwidth is a measurement of how much information can be carried in a given time period over a communications link.

    Rate this question:

  • 18. 

    What does an assigned IP address 169.254.0.12 indicate?

    • A.

      The computer is configured with a static IP address.

    • B.

      The computer is using a dial-up modem.

    • C.

      The computer is being used as an Internet shared connection host.

    • D.

      The computer is configured for DHCP and cannot connect to the DHCP server.

    • E.

      The computer has been configured to work with a Linux system.

    Correct Answer
    D. The computer is configured for DHCP and cannot connect to the DHCP server.
    Explanation
    An IP address of 169.254.0.12 is within the range of APIPA (Automatic Private IP Addressing), which is used when a computer is unable to obtain an IP address from a DHCP server. This suggests that the computer is configured for DHCP but is unable to connect to the DHCP server, resulting in the automatic assignment of an APIPA address.

    Rate this question:

  • 19. 

    Which two are examples of wireless encryption? 

    • A.

      VPN

    • B.

      PPP

    • C.

      WEP

    • D.

      WPA

    • E.

      MAC

    Correct Answer(s)
    C. WEP
    D. WPA
    Explanation
    WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) are both examples of wireless encryption. WEP was one of the first encryption protocols used for securing wireless networks but is now considered to be weak and easily cracked. WPA, on the other hand, is a more secure and robust encryption protocol that was introduced as an improvement over WEP. Both WEP and WPA are used to protect the confidentiality and integrity of data transmitted over wireless networks.

    Rate this question:

  • 20. 

    Which item is an example of a physical network address?

    • A.

      IP address

    • B.

      MAC address

    • C.

      Workstation name

    • D.

      Www.proprofs.com

    • E.
    Correct Answer
    B. MAC address
    Explanation
    A physical network address refers to a unique identifier assigned to a network device. The MAC address, also known as the Media Access Control address, is a physical network address that is assigned to the network interface card (NIC) of a device. It is a 48-bit alphanumeric code that is embedded in the hardware of the device. The MAC address is used to identify devices on a local network and is essential for data transmission. Therefore, the MAC address is an example of a physical network address.

    Rate this question:

  • 21. 

    Which are the default settings for a Windows XP computer network adapter?

    • A.

      DHCP and configured as part of a workgroup

    • B.

      DHCP and configured as a part of a domain

    • C.

      Static IP address and configured as part of a workgroup

    • D.

      Static IP address and configured as part of a domain

    • E.

      There is no default settings for a Windows XP network adapter card

    Correct Answer
    A. DHCP and configured as part of a workgroup
    Explanation
    The default settings for a Windows XP computer network adapter are DHCP and configured as part of a workgroup. This means that the network adapter will obtain its IP address automatically from a DHCP server, and it will be part of a workgroup rather than a domain.

    Rate this question:

  • 22. 

    What does the term "Map Network Drive" mean?

    • A.

      Divide the host HDD into memory locations

    • B.

      Create a shortcut to a network location

    • C.

      Trace the path to the local area network gateway

    • D.

      Send instructions to a user to access the remote local area network

    • E.

      A schematic drawing of all network adapter locations on the network system

    Correct Answer
    B. Create a shortcut to a network location
    Explanation
    The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access and connect to a specific folder or drive on a remote network. By mapping a network drive, the user can treat the network location as if it were a local drive on their computer, making it convenient to access and work with files and folders stored on the network.

    Rate this question:

  • 23. 

    Which is the best example of a secure password?

    • A.

      Mysecretpassword

    • B.

      MySpecialPa$$w0rd

    • C.

      Xyz

    • D.

      Keep this place private

    • E.

      Password12345

    Correct Answer
    B. MySpecialPa$$w0rd
    Explanation
    "MySpecialPa$$w0rd" is the best example of a secure password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password using common methods such as dictionary attacks or brute force attacks. Additionally, the length of the password is also important, and "MySpecialPa$$w0rd" is longer than the other options provided, further enhancing its security.

    Rate this question:

  • 24. 

    What icon is used to identify a shared folder?

    • A.

      An open hand palm up

    • B.

      Two folder icons side by side

    • C.

      Folder icon in green

    • D.

      Folder icon in red

    • E.

      You cannot tell if a folder is shared by looking at the icon

    Correct Answer
    A. An open hand palm up
    Explanation
    The open hand palm up icon is used to identify a shared folder. This icon represents the concept of sharing, as if someone is offering their hand to share something. It is commonly used to indicate that a folder is shared and can be accessed by multiple users.

    Rate this question:

  • 25. 

    Which is used to provide a centralized authentication method from remote locations?

    • A.

      HTTPS

    • B.

      FTP

    • C.

      RADIUS

    • D.

      DNS

    • E.

      DHCP

    Correct Answer
    C. RADIUS
    Explanation
    RADIUS (Remote Authentication Dial-In User Service) is used to provide a centralized authentication method from remote locations. It is a networking protocol that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the network. RADIUS allows for secure authentication and authorization for various network services, such as VPNs, wireless networks, and dial-up connections. It provides a centralized and efficient way to manage user authentication and access control from remote locations.

    Rate this question:

  • 26. 

    What is the purpose of a DNS server?

    • A.

      To resolve MAC addresses to NetBIOS names

    • B.

      To resolve domain names to IP addresses

    • C.

      To resolve host names to NetBeui names

    • D.

      To resolve IP addresses to MAC address

    Correct Answer
    B. To resolve domain names to IP addresses
    Explanation
    The purpose of a DNS server is to resolve domain names to IP addresses. This is necessary because domain names are easier for humans to remember and use, while computers communicate using IP addresses. The DNS server acts as a translator, converting the domain name entered by a user into the corresponding IP address so that the correct website or service can be accessed.

    Rate this question:

  • 27. 

    What is the default name of the folder used by the Windows Vista operating system to share documents, downloads, music, pictures, videos, and recorded TV?

    • A.

      Media

    • B.

      Private

    • C.

      MyShares

    • D.

      Public

    Correct Answer
    D. Public
    Explanation
    The default name of the folder used by the Windows Vista operating system to share documents, downloads, music, pictures, videos, and recorded TV is "Public". This folder is accessible to all users on the computer and allows for easy sharing of files and media between different accounts.

    Rate this question:

  • 28. 

    What is the default workgroup name for a computer running Windows XP professional?

    • A.

      Microsoft

    • B.

      Home

    • C.

      Workgroup

    • D.

      Netgroup

    Correct Answer
    C. Workgroup
    Explanation
    The default workgroup name for a computer running Windows XP professional is "Workgroup". This is the default name assigned to a computer when it is set up on a local network. The workgroup name is used to identify and group computers together on the network, allowing them to share files, printers, and other resources.

    Rate this question:

  • 29. 

    Which is an example of a MAC address?

    • A.

      192.168.000.001

    • B.

      2001:0:4137:9e50:1418:fe9b

    • C.

      00-1F-E2-57-DD-A6

    • D.

      00010001:01100110:11110000:01010000

    Correct Answer
    C. 00-1F-E2-57-DD-A6
    Explanation
    A MAC address is a unique identifier assigned to a network interface controller (NIC) for communication on a network. It is represented as a series of six pairs of hexadecimal digits separated by hyphens or colons. The given answer "00-1F-E2-57-DD-A6" follows this format and is a valid example of a MAC address.

    Rate this question:

  • 30. 

    Which type or connecter is commonly used for CAT6 cable?

    • A.

      RJ11

    • B.

      RJ45

    • C.

      BNC

    • D.

      SC

    Correct Answer
    B. RJ45
    Explanation
    RJ45 is commonly used for CAT6 cable. RJ45 is a type of connector that is specifically designed for Ethernet networking. It has 8 pins and is used to connect devices such as computers, routers, and switches to a local area network (LAN). CAT6 cable, on the other hand, is a type of twisted pair cable that is used for high-speed Ethernet connections. It supports data transfer rates of up to 10 gigabits per second and is backward compatible with lower category cables. Therefore, RJ45 is the correct answer as it is the commonly used connector for CAT6 cable.

    Rate this question:

  • 31. 

    Which command will display the assigned IP address of a network adapter installed on a Windows XP system?

    • A.

      Ipadapter/all

    • B.

      WinIP

    • C.

      Ipconfig

    • D.

      Configip

    Correct Answer
    C. Ipconfig
    Explanation
    The command "Ipconfig" is used to display the assigned IP address of a network adapter installed on a Windows XP system.

    Rate this question:

  • 32. 

    What is the standard port for HTTP?

    • A.

      443

    • B.

      80

    • C.

      25

    • D.

      143

    Correct Answer
    B. 80
    Explanation
    The standard port for HTTP is 80. This port is used for transmitting data over the internet using the HTTP protocol. When a user enters a website URL in their browser, the browser sends a request to the server on port 80 to retrieve the website's content. This port is commonly used for accessing websites and is the default port for HTTP communication.

    Rate this question:

  • 33. 

    What is the standard port for HTTPS?

    • A.

      80

    • B.

      443

    • C.

      25

    • D.

      143

    Correct Answer
    B. 443
    Explanation
    The standard port for HTTPS is 443. HTTPS is the secure version of HTTP, and it uses SSL/TLS encryption to establish a secure connection between a web browser and a web server. Port 443 is specifically designated for secure HTTP communication, ensuring that data transmitted over this port is encrypted and protected from unauthorized access.

    Rate this question:

  • 34. 

    What is the standard port for SMTP?

    • A.

      443

    • B.

      25

    • C.

      80

    • D.

      143

    Correct Answer
    B. 25
    Explanation
    The standard port for SMTP (Simple Mail Transfer Protocol) is 25. SMTP is the protocol used for sending email messages between servers. By default, SMTP servers listen on port 25 for incoming email traffic. This port is used for establishing a connection between the email client and the email server, allowing the client to send outgoing emails.

    Rate this question:

  • 35. 

    What is the standard port for IMAP?

    • A.

      80

    • B.

      443

    • C.

      143

    • D.

      25

    Correct Answer
    C. 143
    Explanation
    IMAP (Internet Message Access Protocol) is a standard protocol used for receiving emails from a mail server. The standard port for IMAP is 143. This port is used by email clients to establish a connection with the mail server and retrieve emails. Port 80 is the standard port for HTTP, port 443 is the standard port for HTTPS, and port 25 is the standard port for SMTP (Simple Mail Transfer Protocol), which is used for sending emails.

    Rate this question:

  • 36. 

    Choose the advantages of using Word as an Email Editor in Outlook from the following:

    • A.

      Formatting benefits to e-mails

    • B.

      Spell Check in e-mails

    • C.

      Decrease in RAM usage

    • D.

      Auto-Save benefits

    Correct Answer(s)
    A. Formatting benefits to e-mails
    B. Spell Check in e-mails
    D. Auto-Save benefits
    Explanation
    Using Word as an Email Editor in Outlook provides several advantages. Firstly, it offers formatting benefits to emails, allowing users to customize the appearance of their messages with various fonts, colors, and styles. Secondly, it includes a spell check feature, ensuring that emails are free from spelling errors. Lastly, Word as an Email Editor provides auto-save benefits, automatically saving drafts of emails at regular intervals, preventing the loss of unsaved work. However, there is no mention of a decrease in RAM usage as an advantage of using Word as an Email Editor in Outlook.

    Rate this question:

  • 37. 

    File extension for an Outlook Archive file is ………….

    Correct Answer(s)
    .pst
    Explanation
    The file extension for an Outlook Archive file is .pst. This file extension is used to save and store archived emails, contacts, calendar events, and other data in Microsoft Outlook. The .pst extension stands for "Personal Storage Table" and is commonly used for backing up and organizing Outlook data.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 18, 2013
    Quiz Created by
    Kharoldsen
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.