Desktop - Network Admin

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bsherrill676
B
Bsherrill676
Community Contributor
Quizzes Created: 1 | Total Attempts: 249
Questions: 29 | Attempts: 249

SettingsSettingsSettings
Network Admin Quizzes & Trivia

Questions and Answers
  • 1. 

    What would cause the error message “bad or missing operating system” at boot up? (choose two)

    • A.

      No CD-ROM

    • B.

      Missing or corrupt boot sector

    • C.

      Slave hard drive not powered up

    • D.

      A bad floppy drive cable connections

    • E.

      A non-bootable floppy disk is in the floppy drive

    Correct Answer(s)
    B. Missing or corrupt boot sector
    E. A non-bootable floppy disk is in the floppy drive
    Explanation
    The error message "bad or missing operating system" can occur at boot up if the boot sector of the operating system is either missing or corrupted. This means that the computer is unable to locate the necessary files to start the operating system. Additionally, if a non-bootable floppy disk is inserted into the floppy drive, the system will not be able to boot from it and may display the same error message.

    Rate this question:

  • 2. 

    Explain how to map a network drive from the desktop of a Windows XP Pro machine:

    • A.

      From a DOS command prompt type net use followed by the drive letter and the UNC.

    • B.

      Right click on My Computer, select map network drive. Select the drive letter, enter the path, and check the box if you want it to map each time you login, click OK.

    • C.

      Right click on My Network Places, select map network drive. Select the drive letter, enter the path, and check the box if you want it to map each time you login, click OK

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The explanation for the given correct answer is that all of the mentioned methods can be used to map a network drive from the desktop of a Windows XP Pro machine. The first method is using a DOS command prompt by typing "net use" followed by the drive letter and the UNC. The second method is right-clicking on My Computer and selecting "map network drive" where you can choose the drive letter, enter the path, and select if you want it to map each time you login. The third method is right-clicking on My Network Places and selecting "map network drive" where you can also choose the drive letter, enter the path, and select if you want it to map each time you login.

    Rate this question:

  • 3. 

    Where are user files stored locally in Windows XP Pro, with a clean install?

    • A.

      C:\Profiles\%Username%\My Documents

    • B.

      C:\Windows\Profiles\%Username%\Personal

    • C.

      C:\Documents and Settings\%Username%\My Documents

    • D.

      C:\Winnt\%Username%

    Correct Answer
    C. C:\Documents and Settings\%Username%\My Documents
    Explanation
    The user files are stored locally in the "C:\Documents and Settings\%Username%\My Documents" directory. This is the default location for user files in Windows XP Pro with a clean install.

    Rate this question:

  • 4. 

    This wireless standard is widely used to connect computers to each other and to the Internet.

    • A.

      802.11

    • B.

      RJ45

    • C.

      Blueband

    • D.

      Broadband

    Correct Answer
    A. 802.11
    Explanation
    802.11 is the correct answer because it is a wireless standard that is widely used for connecting computers to each other and to the Internet. It is commonly known as Wi-Fi and is used in various devices such as laptops, smartphones, and routers to establish wireless connections and access the Internet. RJ45 is a type of connector used for Ethernet connections, Blueband is not a recognized wireless standard, and Broadband refers to a high-speed Internet connection but is not specifically a wireless standard.

    Rate this question:

  • 5. 

    What can greatly reduce TCP/IP configuration problems?

    • A.

      WINS Server

    • B.

      WINS Proxy

    • C.

      DHCP Server

    • D.

      PDC

    Correct Answer
    C. DHCP Server
    Explanation
    A DHCP server can greatly reduce TCP/IP configuration problems by automatically assigning IP addresses, subnet masks, default gateways, and other network configuration settings to devices on a network. This eliminates the need for manual configuration, reducing the chances of human error and ensuring that all devices have the correct network settings. Additionally, a DHCP server can also manage and allocate IP addresses dynamically, allowing for efficient use of available IP addresses and avoiding conflicts.

    Rate this question:

  • 6. 

    Which of the following device is used to connect two systems, especially if the systems use different protocols?

    • A.

      Hub

    • B.

      Bridge

    • C.

      Gateway

    • D.

      Repeater

    Correct Answer
    C. Gateway
    Explanation
    A gateway is used to connect two systems, especially if they use different protocols. It acts as a translator, converting data from one protocol to another so that the systems can communicate effectively. This allows for seamless communication between systems that would otherwise be incompatible. A hub, bridge, and repeater do not perform this specific function of protocol translation.

    Rate this question:

  • 7. 

    The rules for exchanging data between computers are called

    • A.

      Interconnections

    • B.

      Synchronous packages

    • C.

      protocols

    • D.

      data transmission synchronization

    Correct Answer
    C. protocols
    Explanation
    Protocols are the rules or guidelines that govern the exchange of data between computers. They define the format, timing, sequencing, and error control of data transmission. Protocols ensure that data is transmitted accurately and efficiently across different computer networks. They establish a common language and set of rules that computers can follow to communicate with each other. Therefore, protocols are the correct answer as they are specifically designed to facilitate data exchange between computers.

    Rate this question:

  • 8. 

    Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

    • A.

      FTP

    • B.

      SNMP

    • C.

      SMTP

    • D.

      RPC

    Correct Answer
    C. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is the correct answer because it is a TCP/IP protocol specifically designed for transferring electronic mail messages from one machine to another. FTP (File Transfer Protocol) is used for transferring files, SNMP (Simple Network Management Protocol) is used for managing and monitoring network devices, and RPC (Remote Procedure Call) is used for communication between networked computers. Therefore, SMTP is the most appropriate protocol for email transfer.

    Rate this question:

  • 9. 

    What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

    • A.

      192

    • B.

      192.168.10

    • C.

      0.0.0.5

    • D.

      None of the above

    Correct Answer
    B. 192.168.10
    Explanation
    The network ID is the portion of an IP address that identifies the network to which the device belongs. In this case, the IP address is 192.168.10.51 and the default subnet mask is assumed. The subnet mask determines the size of the network ID and host ID portions of the IP address. Since the default subnet mask for a Class C network is 255.255.255.0, the network ID is the first three octets of the IP address, which is 192.168.10. Therefore, the correct answer is 192.168.10.

    Rate this question:

  • 10. 

    What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

    • A.

      Switch

    • B.

      Bridge

    • C.

      Gateway

    • D.

      Router

    Correct Answer
    D. Router
    Explanation
    A router is a device that separates a single network into two segments but lets the two segments appear as one to higher protocols. It does this by examining the destination IP address of incoming packets and determining the best path for them to reach their destination. Routers operate at the network layer of the OSI model and can connect different types of networks together, such as LANs and WANs. Unlike switches and bridges, routers can make intelligent decisions about where to send packets based on network information, making them ideal for dividing networks into segments while still allowing communication between them.

    Rate this question:

  • 11. 

    Which of the following best illustrates the default subnet mask for a class A,B, and C Network?

    • A.

      0.0.0.0, 0.0.0.1, 0.0.1.1

    • B.

      255.255.255.0, 255.255.0.0, 255.0.0.0

    • C.

      255.0.0.0, 255.255.0.0, 255.255.255.0

    • D.

      255.255.0.0, 255.255.255.0, 255.255.255.255

    Correct Answer
    C. 255.0.0.0, 255.255.0.0, 255.255.255.0
    Explanation
    The default subnet mask for a class A network is 255.0.0.0, for a class B network is 255.255.0.0, and for a class C network is 255.255.255.0.

    Rate this question:

  • 12. 

    Which of the following is the address of the router?

    • A.

      The IP address

    • B.

      The TCP address

    • C.

      The subnet mask

    • D.

      The default gateway

    Correct Answer
    D. The default gateway
    Explanation
    The default gateway is the address of the router that connects a local network to other networks. It serves as the entry and exit point for network traffic, allowing devices on the local network to communicate with devices on other networks. The IP address, TCP address, and subnet mask are all network-related addresses, but they do not specifically refer to the router's address. Therefore, the correct answer is the default gateway.

    Rate this question:

  • 13. 

    Because the configuration information for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?

    • A.

      PING

    • B.

      TRACERT

    • C.

      ARP

    • D.

      IPCONFIG

    Correct Answer
    D. IPCONFIG
    Explanation
    IPCONFIG is the correct answer because it is a utility that allows you to view the current configuration information of a DHCP client. It displays the IP address, subnet mask, default gateway, and other network settings that have been dynamically assigned to the client by a DHCP server. By using IPCONFIG, you can verify the settings and ensure that the client has received the correct configuration from the DHCP server.

    Rate this question:

  • 14. 

    As you are walking down the hallway to help an important client with a trouble ticket they submitted, one of your coworkers rushes up to you and begs you to help them install some software on their computer.  The appropriate answer is:

    • A.

      "Be right there!"

    • B.

      "Do you have a license for me to install the software?"

    • C.

      "I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP."

    • D.

      "Can this wait until tomorrow? I'm very busy right now."

    • E.

      "As soon as I help Mr/s. X I'll be right with you!"

    Correct Answer
    C. "I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP."
    Explanation
    The correct answer is "I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP." This answer is appropriate because it acknowledges the coworker's request and offers a solution by asking them to submit a ticket. It also prioritizes helping the important client first, showing professionalism and good time management skills.

    Rate this question:

  • 15. 

    If, while trying to run a new software title, you get the error message "Access Denied" and the program fails to launch, where would you look for the problem?

    • A.

      In the flash drive

    • B.

      In the device drivers

    • C.

      In the integrity of the resident memory

    • D.

      In the file permissions

    • E.

      In the user's profile

    Correct Answer
    D. In the file permissions
    Explanation
    If you receive an "Access Denied" error message and the program fails to launch, the problem is likely to be found in the file permissions. File permissions determine who can access and modify a file, and if the permissions are not set correctly, it can result in an access denied error. Therefore, checking the file permissions would be the appropriate place to look for the problem in this scenario.

    Rate this question:

  • 16. 

    Select the fastest latency for a network ping

    • A.

      1000ms

    • B.

      500ms

    • C.

      250ms

    • D.

      100ms

    • E.

      60ms

    Correct Answer
    E. 60ms
    Explanation
    The fastest latency for a network ping is 60ms. Latency refers to the time it takes for data to travel from one point to another in a network. The lower the latency, the faster the data transmission. In this case, 60ms is the lowest value among the given options, indicating the shortest delay for the network ping.

    Rate this question:

  • 17. 

    What's the easiest and most common way to resolve most Windows problems?

    Correct Answer
    Reboot.
    Save all data. Close all applications. Restart Windows.
    Explanation
    The easiest and most common way to resolve most Windows problems is to reboot the system. This helps to clear any temporary issues or conflicts that may be causing the problem. Additionally, it is recommended to save all data, close all applications, and then restart Windows to ensure a clean start and prevent any potential issues from recurring.

    Rate this question:

  • 18. 

    What does an assigned IP address 169.254.0.12 indicate?

    • A.

      The computer is configured with a static IP address.

    • B.

      The computer is using a dial-up modem.

    • C.

      The computer is being used as an Internet shared connection host.

    • D.

      The computer is configured for DHCP and cannot connect to the DHCP server.

    • E.

      The computer has been configured to work with a Linux system.

    Correct Answer
    D. The computer is configured for DHCP and cannot connect to the DHCP server.
    Explanation
    The assigned IP address 169.254.0.12 indicates that the computer is configured for DHCP and cannot connect to the DHCP server. This IP address falls within the Automatic Private IP Addressing (APIPA) range, which is used when a computer is unable to obtain an IP address from a DHCP server. In this case, the computer has automatically assigned itself an IP address in order to establish a local network connection, but it cannot connect to the DHCP server to obtain a valid IP address.

    Rate this question:

  • 19. 

    Which two are examples of wireless encryption? (Select two answers)

    • A.

      VPN

    • B.

      PPP

    • C.

      WEP

    • D.

      WPA

    • E.

      MAC

    Correct Answer(s)
    C. WEP
    D. WPA
    Explanation
    WEP and WPA are both examples of wireless encryption. WEP (Wired Equivalent Privacy) is an older encryption standard that was commonly used in early Wi-Fi networks. However, it is now considered to be weak and easily compromised. WPA (Wi-Fi Protected Access) is a more secure encryption standard that replaced WEP. It provides stronger encryption and better security features, making it the preferred choice for securing wireless networks. VPN (Virtual Private Network), PPP (Point-to-Point Protocol), and MAC (Media Access Control) are not examples of wireless encryption.

    Rate this question:

  • 20. 

    Which item is an example of a physical network address?

    • A.

      IP address

    • B.

      MAC address

    • C.

      Workstation name

    • D.

      Www.proprofs.com

    • E.
    Correct Answer
    B. MAC address
    Explanation
    A physical network address is a unique identifier assigned to a network device. An IP address is a logical network address used for communication over the internet, while a MAC address is a physical address assigned to the network interface card of a device. Therefore, the MAC address is the correct answer as it represents a physical network address. Workstation name, www.proprofs.com, and [email protected] are not examples of physical network addresses.

    Rate this question:

  • 21. 

    What does the term "Map Network Drive" mean?

    • A.

      Divide the host HDD into memory locations

    • B.

      Create a shortcut to a network location

    • C.

      Trace the path to the local area network gateway

    • D.

      Send instructions to a user to access the remote local area network

    • E.

      A schematic drawing of all network adapter locations on the network system

    Correct Answer
    B. Create a shortcut to a network location
    Explanation
    The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access files and folders located on a remote server or network storage device as if they were on their own computer. By mapping a network drive, the user can quickly and conveniently access and manage files without having to manually navigate to the network location every time.

    Rate this question:

  • 22. 

    What is the purpose of a DNS server?

    • A.

      To resolve MAC addresses to NetBIOS names

    • B.

      To resolve domain names to IP addresses

    • C.

      To resolve host names to NetBeui names

    • D.

      To resolve IP addresses to MAC address

    Correct Answer
    B. To resolve domain names to IP addresses
    Explanation
    A DNS server is used to resolve domain names to IP addresses. When a user enters a domain name in their web browser, the DNS server translates that domain name into the corresponding IP address of the server hosting the website. This allows the user's device to establish a connection with the correct server and retrieve the requested web page.

    Rate this question:

  • 23. 

    Which is an example of a MAC address?

    • A.

      192.168.000.001

    • B.

      2001:0:4137:9e50:1418:fe9b

    • C.

      00-1F-E2-57-DD-A6

    • D.

      00010001:01100110:11110000:01010000

    Correct Answer
    C. 00-1F-E2-57-DD-A6
  • 24. 

    As a network administrator you have been requested to move a printer from your company's Marketing OU to your company's Research OU. After the move you test the printer and find that the local administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can you do to change this?

    • A.

      Remove the permissions for the local administrator from the printer

    • B.

      Remove printer permissions from the local administrator

    • C.

      Remove the Everyone group from the printer

    • D.

      Delete the printer object

    Correct Answer
    A. Remove the permissions for the local administrator from the printer
    Explanation
    To change the access of the local administrator to the printer, you need to remove the permissions assigned to them from the printer. This will ensure that the local administrator no longer has access to remove print jobs from the printer.

    Rate this question:

  • 25. 

    Which command will display the assigned IP address of a network adapter installed on a Windows XP system?

    • A.

      Ipadapter/all

    • B.

      WinIP

    • C.

      Ipconfig

    • D.

      Configip

    Correct Answer
    C. Ipconfig
    Explanation
    Ipconfig is the correct command to display the assigned IP address of a network adapter installed on a Windows XP system. This command is used to view the IP configuration settings of all network adapters on the system, including the assigned IP address, subnet mask, default gateway, and other network information. It is a commonly used command for troubleshooting network connectivity issues and obtaining network configuration details.

    Rate this question:

  • 26. 

    What is the standard port for HTTP?

    • A.

      443

    • B.

      80

    • C.

      25

    • D.

      143

    Correct Answer
    B. 80
    Explanation
    The standard port for HTTP is 80. HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting web pages over the internet. When a web browser sends a request to a web server for a webpage, it typically uses port 80 to establish a connection and retrieve the requested information. Port 80 is the default port for HTTP, and most web servers and web browsers use this port by default for HTTP communication.

    Rate this question:

  • 27. 

    What is the standard port for HTTPS?

    • A.

      80

    • B.

      443

    • C.

      25

    • D.

      143

    Correct Answer
    B. 443
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP, the protocol used for transmitting data over the internet. It uses encryption to protect the data being transmitted. The standard port for HTTPS is 443, which means that when a user types "https://" before a website address, their browser will automatically connect to the server through port 443 to establish a secure connection. This ensures that the data exchanged between the user and the website is encrypted and cannot be easily intercepted or tampered with by unauthorized individuals.

    Rate this question:

  • 28. 

    What is the standard port for SMTP?

    • A.

      443

    • B.

      25

    • C.

      80

    • D.

      143

    Correct Answer
    B. 25
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a standard protocol used for sending email messages between servers. The standard port for SMTP is 25. This port is used by mail servers to establish a connection and transfer email data. By using this port, email clients can communicate with the server and send outgoing emails. Therefore, the correct answer is 25.

    Rate this question:

  • 29. 

    What is the standard port for IMAP?

    • A.

      80

    • B.

      443

    • C.

      143

    • D.

      25

    Correct Answer
    C. 143
    Explanation
    IMAP (Internet Message Access Protocol) is a standard protocol used for retrieving emails from a mail server. The standard port for IMAP is 143. This port is specifically designated for IMAP communication, allowing email clients to connect to the mail server and retrieve emails. Port 80 is the standard port for HTTP communication, port 443 is the standard port for HTTPS communication, and port 25 is the standard port for SMTP (Simple Mail Transfer Protocol) used for sending emails. Therefore, the correct answer is 143.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 12, 2012
    Quiz Created by
    Bsherrill676
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.