

![]()


Network Administration covers the principles and practices essential for installing, configuring, managing, and maintaining computer networks within organizations. Students will learn about network protocols, routing and switching, network security, user account management, and troubleshooting techniques. The course emphasizes both theoretical understanding and hands-on experience with network hardware, software, and diagnostic tools. By the end of the course, students will be equipped to oversee network operations and ensure efficient, secure communication across different types of networks.
Recommended Textbook
Network+ Guide to Networks 5th Edition by Tamara Dean
Available Study Resources on Quizplus
15 Chapters
748 Verified Questions
748 Flashcards
Source URL: https://quizplus.com/study-set/430 Page 2

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7588
Sample Questions
Q1) Security auditing is handled by ____.
A) management services
B) communication services
C) access services
D) Internet services
Answer: A
Q2) Hardware diagnosis and failure alert are handled by ____.
A) management services
B) communication services
C) access services
D) Internet services
Answer: A
Q3) A network that connects two or more geographically distinct LANs or MANs is called a(n)_________________________.
Answer: WAN (wide area network)
wide area network
WAN
Q4) The means through which data is transmitted and received.
Answer: F
To view all questions and flashcards with answers, click on the resource link above. Page 3

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7589
Sample Questions
Q1) Determines standards for the electronics industry and other fields,such as chemical and nuclear engineering,health and safety,and construction.
Answer: A
Q2) The ____ is a fixed number associated with a device's NIC.
A) LLC address
B) frame address
C) logical address
D) physical address
Answer: D
Q3) Describe the OSI model Session layer's functions.
Answer: Among the Session layer's functions are establishing and keeping alive the communications link for the duration of the session,keeping the communication secure,synchronizing the dialogue between the two nodes,determining whether communications have been cut off,and,if so,figuring out where to restart transmission,and terminating communications.Session layer services also set the terms of communication by deciding which node communicates first and how long a node can communicate.Finally,the Session layer monitors the identification of session participants,ensuring that only the authorized nodes can access the session.
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7590
Sample Questions
Q1) Every pulse in a digital signal.
Answer: A
Q2) A digital signal composed of a pulse of positive voltage represents a ____.
A) 0
B) 1
C) 4
D) 8
Answer: B
Q3) Describe two benefits of digital signaling that make it worthwhile even though extra signaling pulses are involved.
Answer: Because digital transmission involves sending and receiving only a pattern of 1s and 0s,represented by precise pulses,it is more reliable than analog transmission,which relies on variable waves.In addition,noise affects digital transmission less severely.
Q4) ____________________ is a term used by networking professionals to describe the nondata information that must accompany data for a signal to be properly routed and interpreted by the network.
Answer: Overhead
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7591
Sample Questions
Q1) The ASCII text file called HOSTS.TXT that associates host names with IP addresses.
Q2) TCP is a(n)____ subprotocol.
A) open-ended
B) indiscriminating
C) connection-oriented
D) connectionless
Q3) A UDP header contains ____ fields.
A) four
B) six
C) eight
D) ten
Q4) Describe the Time to Live (TTL)field in an IP datagram.
Q5) The local host name plus its domain name.
Q6) Describe how ARP improves efficiency of MAC-to-IP address mappings.
Q7) The command used to view IP information on a Windows XP or Windows Vista workstation is ifconfig.
A)True
B)False
Q8) Any hosts on the Internet that need to look up domain name information.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
48 Verified Questions
48 Flashcards
Source URL: https://quizplus.com/quiz/7592
Sample Questions
Q1) Briefly describe the IEEE 802.3af standard.Use an analogy and explain why it is useful.
Q2) Describe the advantage of the star topology.
Q3) The most popular method for connecting nodes on a network is circuit switching.
A)True
B)False
Q4) Also known as Gigabit Ethernet.
Q5) Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead,____________________ is the frame type most commonly used on contemporary Ethernet networks.
Q6) In packet switching,when packets reach their destination node,the node ____ them based on their control information.
A) disassembles
B) deletes
C) reassembles
D) separates
Q7) Also known as Fast Ethernet.
Q8) Most Ethernet networks are based on the star topology.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7593
Sample Questions
Q1) Plugs into a port and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing.
Q2) External peripheral device specifying 32-bit interface running at 33 MHz.
Q3) To eliminate the possibility of a broadcast storm,switches and bridges implement the ____.
A) RIP (Routing Information Protocol)
B) STP (Spanning Tree Protocol)
C) BGP (Border Gateway Protocol)
D) OSPF (Open Shortest Path First) protocol
Q4) The ____________________ indicates,in hexadecimal notation,the area of memory that the NIC and CPU use for exchanging,or buffering,data.
Q5) A(n)____ is the circuit board wire over which a device issues voltage to signal this request.
A) interrupt
B) IRQ
C) IRQ number
D) RX
Q6) Describe several factors to consider when choosing a NIC for a workstation or server.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7594
Sample Questions
Q1) Describe an important difference between frame relay and X.25.
Q2) ATM is a WAN technology that functions in the Data Link layer.
A)True
B)False
Q3) On most modern WANs,a ring topology relies on ____ rings to carry data.
A) flexible
B) open
C) serial
D) redundant
Q4) Contain sites that are connected in star or ring formations are interconnected at different levels,with the interconnection points being organized into layers to form hierarchical groupings.
Q5) The data rate of a particular SONET ring is indicated by its ____,a rating that is internationally recognized by networking professionals and standards organizations.
A) OC (Optical Carrier) level
B) CIR (committed information rate)
C) BRI (Basic Rate Interface)
D) DS0 (digital signal, level 0)
Q6) Occurs when downstream throughput is higher than upstream throughput.
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7595
Sample Questions
Q1) In ____ wireless systems,the result is a point-to-point link.
A) mobile
B) variable
C) fixed
D) open
Q2) The creation of a communications channel for a transmission from an Earth-based transmitter to an orbiting satellite.
Q3) ____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.
A) ipconfig
B) iwconfig
C) config
D) ivconfig
Q4) Boasts a maximum throughput of 600 Mbps.
Q5) LEO satellites orbit the Earth with an altitude as low as ____ miles.
A) 100
B) 1240
C) 6,000
D) 22,300
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7596
Sample Questions
Q1) A protocol used to access information stored in a directory.
Q2) A logical representation of multiple,hierarchical levels within a directory.
Q3) Administrator account on a UNIX or Linux system.
Q4) A service on the client workstation,called the ____________________,intercepts a request to determine whether it should be handled by the client or by the server.
Q5) The core of all UNIX and Linux systems is called the kernel.
A)True
B)False
Q6) The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.
A)True
B)False
Q7) ____ memory may be logically carved out of space on the hard drive for temporary use.
A) Virtual
B) Logical
C) Physical
D) Hierarchical
To view all questions and flashcards with answers, click on the resource link above. Page 11
Q8) The most privileged user account on an NOS is the ____________________.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7597
Sample Questions
Q1) Describe four features of IMAP4.
Q2) The TCP/IP configuration and management utility used on UNIX and Linux systems.
Q3) The combination of additional bits used for subnet information plus the existing network ID is known as the _________________________.
Q4) Within a classful addressing,____ is the default subnet mask for a Class C address.
A) 255.255.255.255
B) 255.255.255.0
C) 255.255.0.0
D) 255.0.0.0
Q5) The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.
A) 100
B) 1000
C) 10,000
D) 1,000,000
Q6) Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Q7) Useful only on networks that run Windows-based operating systems and NetBIOS.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7598
Sample Questions
Q1) ____ is a measure of how well a network service matches its expected performance.
A) QoS
B) RSVP
C) DiffServ
D) MPLS
Q2) A(n)____ is a computer that manages multiple media gateways.
A) MPLS
B) MGCP
C) MEGACO
D) MGC
Q3) Many VoIP vendors prefer ____________________ over H.323.
Q4) Besides being extremely mobile,describe another advantage to softphones.
Q5) Many network engineers consider ____ to be superior to MGCP.
A) SIP
B) RTCP
C) MEGACO
D) MGC
Q6) When streaming videos are supplied via the Web,they are often called ____________________.
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7599
Sample Questions
Q1) Data is encrypted using a single key.
Q2) Network security is more often compromised "from the inside" than from external sources.
A)True
B)False
Q3) A(n)____________________ identifies an organization's security risks,levels of authority,designated security coordinator and team members,responsibilities for each team member,and responsibilities for each employee.
Q4) ____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
A) Cracking
B) Hacking
C) War driving
D) Phishing
Q5) An NOS that contains a "back door"is an example of a risk associated with ____. A) people
B) transmission and hardware
C) protocols and software
D) Internet access
To view all questions and flashcards with answers, click on the resource link above. Page 14
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7600
Sample Questions
Q1) Describe five functions all network monitoring tools perform.
Q2) ____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.
A) Cost
B) Scope
C) Scalability
D) Security
Q3) Tone generators and tone locators are used to determine characteristics about a cable.
A)True
B)False
Q4) Some software errors point to a physical connectivity problem.
A)True
B)False
Q5) In a ____ cable,the transmit and receive wire pairs in one of the connectors are reversed.
A) switched
B) probe
C) twisted pair
D) crossover

Page 15
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7601
Sample Questions
Q1)

refers to a collection of disks that provide fault tolerance for shared data and applications.
Q2) Describe an alert known as a hoax.
Q3) A place where the computers,devices,and connectivity necessary to rebuild a network exist,and all are appropriately configured,updated,and connected to match your network's current state.
Q4) Protection against harmful code involves more than just installing anti-malware software.
A)True
B)False
Q5) Generators provide surge protection.
A)True
B)False
Q6) Define mirroring and server mirroring.Describe the necessary requirement for server mirroring.
Q7) Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
Q8) Define and describe a virus.
Q9) A complete power loss. Page 16
To view all questions and flashcards with answers, click on the resource link above.
Page 17

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7602
Sample Questions
Q1) An example of commercial network management software.
Q2) Documenting and capturing an accurate picture of a network's physical and logical elements are initial steps in understanding the network.
A)True
B)False
Q3) Describe the purpose of baseline measurements.
Q4) Explain how a network management application can present an administrator with results after data is collected.
Q5) Describe the preparation and implementation requirements when upgrading a networked printer.
Q6) Addresses the security and privacy of medical records.
Q7) A networked ____ is perhaps the simplest device to add.
A) workstation
B) hub
C) printer
D) server
Q8) Describes a flaw in a software application that causes some part of the application to malfunction.
To view all questions and flashcards with answers, click on the resource link above. Page 18
Q9) Changes to ____________________ applications affect all users at once.