Network Administrator Exam: Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kharoldsen
K
Kharoldsen
Community Contributor
Quizzes Created: 2 | Total Attempts: 2,782
| Attempts: 800 | Questions: 37
Please wait...
Question 1 / 37
0 %
0/100
Score 0/100
1. Select the URL from the list below.

Explanation

The correct answer is http://www.yahoo.com. This is the correct URL from the given list. The other options are an email address ([email protected]), a file path (D:\downloads\standard), and an IP address (192.168.0.1), which are not valid URLs.

Submit
Please wait...
About This Quiz
Network Administrator Exam: Trivia Quiz - Quiz


Are you preparing for a network administrator exam? A network administrator is tasked with ensuring the computer systems needed by specific organizations are properly set up and support... see morenetworks required. How do you detect malware in a network and fix them? Do you know the major computer components in detail? This quiz will help to check out how competent you are as a network administrator. Do give it a shot and see how well you do! see less

2. Ping is a term for?

Explanation

Ping is a computer network tool used to test whether a particular host is reachable across an IP network. It sends a small packet of data to the host and waits for a response. If the host responds, it means that it is reachable. Ping is also used to self-test the Network Interface Card (NIC) of the computer, ensuring that it is functioning properly.

Submit
3. Which of the following programs is not an email client.

Explanation

Mozilla Firefox is not an email client. It is a web browser developed by Mozilla Foundation. While it does have some email-related features such as the ability to open email links, it is primarily used for browsing the internet and does not have the full functionality of an email client like Microsoft Outlook, Windows Live Mail, or Outlook Express.

Submit
4. In the computer component responsible for calculations, moving, and processing information?

Explanation

The CPU (Central Processing Unit) is responsible for calculations, moving, and processing information in a computer. It is often referred to as the "brain" of the computer as it performs all the necessary calculations and instructions to execute tasks. The CPU carries out arithmetic and logical operations, retrieves and stores data, and controls the flow of information within the computer system.

Submit
5. What is the shortcut for PASTE in Windows operating systems?

Explanation

The shortcut for PASTE in Windows operating systems is Ctrl + V. This combination of keys allows the user to paste copied or cut content from the clipboard into a document or application.

Submit
6. What is this computer component?

Explanation

A Network Interface Card (NIC) is a computer component that allows a computer to connect to a network. It provides the necessary hardware for a computer to communicate with other devices on the network, such as routers, switches, and other computers. The NIC typically has an Ethernet port that allows for a wired connection, but it can also support wireless connections through Wi-Fi. This component is essential for accessing the internet, sharing files and resources, and participating in network activities.

Submit
7. Which is the best example of a secure password?

Explanation

"MySpecialPa$$w0rd" is the best example of a secure password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password using common methods such as dictionary attacks or brute force attacks. Additionally, the length of the password is also important, and "MySpecialPa$$w0rd" is longer than the other options provided, further enhancing its security.

Submit
8. What is the purpose of a DNS server?

Explanation

The purpose of a DNS server is to resolve domain names to IP addresses. This is necessary because domain names are easier for humans to remember and use, while computers communicate using IP addresses. The DNS server acts as a translator, converting the domain name entered by a user into the corresponding IP address so that the correct website or service can be accessed.

Submit
9. Which type or connecter is commonly used for CAT6 cable?

Explanation

RJ45 is commonly used for CAT6 cable. RJ45 is a type of connector that is specifically designed for Ethernet networking. It has 8 pins and is used to connect devices such as computers, routers, and switches to a local area network (LAN). CAT6 cable, on the other hand, is a type of twisted pair cable that is used for high-speed Ethernet connections. It supports data transfer rates of up to 10 gigabits per second and is backward compatible with lower category cables. Therefore, RJ45 is the correct answer as it is the commonly used connector for CAT6 cable.

Submit
10. Which command will display the assigned IP address of a network adapter installed on a Windows XP system?

Explanation

The command "Ipconfig" is used to display the assigned IP address of a network adapter installed on a Windows XP system.

Submit
11. Malware is best defined as?

Explanation

The correct answer is "Software designed to infiltrate or damage a computer system without the owner's informed consent." This definition accurately describes malware, which refers to any malicious software that is created with the intention of causing harm to a computer system, such as stealing sensitive information, disrupting system operations, or gaining unauthorized access. It is important to note that malware is different from antivirus software, which is designed to protect the operating system from viruses and other malicious threats.

Submit
12. What is this computer component?

Explanation

The correct answer is CPU. The CPU, or Central Processing Unit, is a computer component responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer, as it carries out the majority of the processing tasks. RAM, or Random Access Memory, is a different component that stores temporary data for the CPU to access quickly. The hard disk is a storage device, while the motherboard is the main circuit board that connects all the components of the computer.

Submit
13. One MB is equal to?

Explanation

One MB is equal to 1024KB. This is because in digital storage, the binary system is used where each unit is a power of 2. Therefore, 1 MB is equal to 1024 kilobytes (KB) and not 1000 bytes.

Submit
14. What is the standard port for HTTP?

Explanation

The standard port for HTTP is 80. This port is used for transmitting data over the internet using the HTTP protocol. When a user enters a website URL in their browser, the browser sends a request to the server on port 80 to retrieve the website's content. This port is commonly used for accessing websites and is the default port for HTTP communication.

Submit
15. What is the standard port for IMAP?

Explanation

IMAP (Internet Message Access Protocol) is a standard protocol used for receiving emails from a mail server. The standard port for IMAP is 143. This port is used by email clients to establish a connection with the mail server and retrieve emails. Port 80 is the standard port for HTTP, port 443 is the standard port for HTTPS, and port 25 is the standard port for SMTP (Simple Mail Transfer Protocol), which is used for sending emails.

Submit
16. This is a measurement of speed over a network.

Explanation

The correct answer is "Megabits per second." This is because when measuring speed over a network, the most commonly used unit is "bits" or "bits per second." Megabits per second (Mbps) is a unit used to measure data transfer rate or network speed. Megabytes, on the other hand, is a unit used to measure data storage capacity, not speed. Megahertz is a unit used to measure frequency, not speed over a network. Therefore, the most appropriate unit for measuring speed over a network is "megabits per second."

Submit
17. Which item is an example of a physical network address?

Explanation

A physical network address refers to a unique identifier assigned to a network device. The MAC address, also known as the Media Access Control address, is a physical network address that is assigned to the network interface card (NIC) of a device. It is a 48-bit alphanumeric code that is embedded in the hardware of the device. The MAC address is used to identify devices on a local network and is essential for data transmission. Therefore, the MAC address is an example of a physical network address.

Submit
18. Bandwidth is a term for?

Explanation

Bandwidth refers to the measurement of how much information can be carried over a wired or wireless communications link within a specific time period, typically a second. It is not related to the speed of data transfer from the server to the client or the unit of information or computer storage. Therefore, the correct answer is that bandwidth is a measurement of how much information can be carried in a given time period over a communications link.

Submit
19. An IP address is best defined as?

Explanation

An IP address is a unique number consisting of 4 parts separated by dots that is associated with every system connected to a network. This address allows devices to communicate with each other over the internet. It is not the address of an internet provider or the location of internet packets on a network. Therefore, the correct answer is that an IP address is a unique number associated with every system connected to a network.

Submit
20. Which two are examples of wireless encryption? 

Explanation

WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) are both examples of wireless encryption. WEP was one of the first encryption protocols used for securing wireless networks but is now considered to be weak and easily cracked. WPA, on the other hand, is a more secure and robust encryption protocol that was introduced as an improvement over WEP. Both WEP and WPA are used to protect the confidentiality and integrity of data transmitted over wireless networks.

Submit
21. What is the default workgroup name for a computer running Windows XP professional?

Explanation

The default workgroup name for a computer running Windows XP professional is "Workgroup". This is the default name assigned to a computer when it is set up on a local network. The workgroup name is used to identify and group computers together on the network, allowing them to share files, printers, and other resources.

Submit
22. What is the standard port for SMTP?

Explanation

The standard port for SMTP (Simple Mail Transfer Protocol) is 25. SMTP is the protocol used for sending email messages between servers. By default, SMTP servers listen on port 25 for incoming email traffic. This port is used for establishing a connection between the email client and the email server, allowing the client to send outgoing emails.

Submit
23. What is the standard port for HTTPS?

Explanation

The standard port for HTTPS is 443. HTTPS is the secure version of HTTP, and it uses SSL/TLS encryption to establish a secure connection between a web browser and a web server. Port 443 is specifically designated for secure HTTP communication, ensuring that data transmitted over this port is encrypted and protected from unauthorized access.

Submit
24. Select the 3 graphics files from the list below.

Explanation

The correct answer is untitled.jpg, untitled.bmp, and untitled.tiff. These three file extensions (.jpg, .bmp, .tiff) are commonly used for graphics files, while the other options (.nfo, .ogg) are not typically associated with graphics.

Submit
25. Which is an example of a MAC address?

Explanation

A MAC address is a unique identifier assigned to a network interface controller (NIC) for communication on a network. It is represented as a series of six pairs of hexadecimal digits separated by hyphens or colons. The given answer "00-1F-E2-57-DD-A6" follows this format and is a valid example of a MAC address.

Submit
26. What does the term "Map Network Drive" mean?

Explanation

The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access and connect to a specific folder or drive on a remote network. By mapping a network drive, the user can treat the network location as if it were a local drive on their computer, making it convenient to access and work with files and folders stored on the network.

Submit
27. What icon is used to identify a shared folder?

Explanation

The open hand palm up icon is used to identify a shared folder. This icon represents the concept of sharing, as if someone is offering their hand to share something. It is commonly used to indicate that a folder is shared and can be accessed by multiple users.

Submit
28. What does an assigned IP address 169.254.0.12 indicate?

Explanation

An IP address of 169.254.0.12 is within the range of APIPA (Automatic Private IP Addressing), which is used when a computer is unable to obtain an IP address from a DHCP server. This suggests that the computer is configured for DHCP but is unable to connect to the DHCP server, resulting in the automatic assignment of an APIPA address.

Submit
29. Which is used to provide a centralized authentication method from remote locations?

Explanation

RADIUS (Remote Authentication Dial-In User Service) is used to provide a centralized authentication method from remote locations. It is a networking protocol that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the network. RADIUS allows for secure authentication and authorization for various network services, such as VPNs, wireless networks, and dial-up connections. It provides a centralized and efficient way to manage user authentication and access control from remote locations.

Submit
30. What is the default name of the folder used by the Windows Vista operating system to share documents, downloads, music, pictures, videos, and recorded TV?

Explanation

The default name of the folder used by the Windows Vista operating system to share documents, downloads, music, pictures, videos, and recorded TV is "Public". This folder is accessible to all users on the computer and allows for easy sharing of files and media between different accounts.

Submit
31. Which are the default settings for a Windows XP computer network adapter?

Explanation

The default settings for a Windows XP computer network adapter are DHCP and configured as part of a workgroup. This means that the network adapter will obtain its IP address automatically from a DHCP server, and it will be part of a workgroup rather than a domain.

Submit
32. File extension for an Outlook Archive file is ………….

Explanation

The file extension for an Outlook Archive file is .pst. This file extension is used to save and store archived emails, contacts, calendar events, and other data in Microsoft Outlook. The .pst extension stands for "Personal Storage Table" and is commonly used for backing up and organizing Outlook data.

Submit
33. ____________ is to authenticate user when logging on to a domain.

Explanation

A domain controller (DC) is responsible for authenticating users when they log on to a domain. It verifies the user's credentials and grants access to the domain's resources. The DC acts as the central authority for user authentication and manages the security policies and permissions within the domain. The abbreviation "dc" is often used as a shorthand for domain controller.

Submit
34. A folder A is shared with shared permission READ and NTFS permission full control. The combined permission is

Explanation

The most restrictive permission is use when you combine permission.

Submit
35. If I have a workgroup of 10 users, when I make a user account for user 1 on computer 1,

Explanation

There is no such thing as Work Group Policy or Work Group domain.
Workgroup
- are a small group of less than 10 computers.
- has decentralized database
- has decentralized administration
Domain
- has centralized database
- has centralized administration

Submit
36. Choose the advantages of using Word as an Email Editor in Outlook from the following:

Explanation

Using Word as an Email Editor in Outlook provides several advantages. Firstly, it offers formatting benefits to emails, allowing users to customize the appearance of their messages with various fonts, colors, and styles. Secondly, it includes a spell check feature, ensuring that emails are free from spelling errors. Lastly, Word as an Email Editor provides auto-save benefits, automatically saving drafts of emails at regular intervals, preventing the loss of unsaved work. However, there is no mention of a decrease in RAM usage as an advantage of using Word as an Email Editor in Outlook.

Submit
37. What are the benefits does NTFS offer that FAT doesn't?

Explanation

http://www.ntfs.com/ntfs_vs_fat.htm
http://en.wikipedia.org/wiki/Ntfs
http://en.wikipedia.org/wiki/FAT_32

Submit
View My Results

Quiz Review Timeline (Updated): Sep 11, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 18, 2013
    Quiz Created by
    Kharoldsen
Cancel
  • All
    All (37)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Select the URL from the list below.
Ping is a term for?
Which of the following programs is not an email client.
In the computer component responsible for calculations,...
What is the shortcut for PASTE in Windows operating systems?
What is this computer component?
Which is the best example of a secure password?
What is the purpose of a DNS server?
Which type or connecter is commonly used for CAT6 cable?
Which command will display the assigned IP address of a network...
Malware is best defined as?
What is this computer component?
One MB is equal to?
What is the standard port for HTTP?
What is the standard port for IMAP?
This is a measurement of speed over a network.
Which item is an example of a physical network address?
Bandwidth is a term for?
An IP address is best defined as?
Which two are examples of wireless encryption? 
What is the default workgroup name for a computer running Windows XP...
What is the standard port for SMTP?
What is the standard port for HTTPS?
Select the 3 graphics files from the list below.
Which is an example of a MAC address?
What does the term "Map Network Drive" mean?
What icon is used to identify a shared folder?
What does an assigned IP address 169.254.0.12 indicate?
Which is used to provide a centralized authentication method from...
What is the default name of the folder used by the Windows Vista...
Which are the default settings for a Windows XP computer network...
File extension for an Outlook Archive file is...
____________ is to authenticate user when logging on to a domain.
A folder A is shared with shared permission READ and NTFS permission...
If I have a workgroup of 10 users, when I make a user account for user...
Choose the advantages of using Word as an Email Editor in Outlook from...
What are the benefits does NTFS offer that FAT doesn't?
Alert!

Advertisement