Systems Administration Chapter Exam Questions - 627 Verified Questions

Page 1


Course Introduction

Systems Administration

Chapter Exam Questions

Systems Administration is a comprehensive course that introduces students to the principles and practices involved in managing and maintaining computer systems and networks in organizational environments. Covering both Windows and Unix/Linux platforms, the course equips participants with knowledge of user and group management, file systems, backup and recovery, security policies, shell scripting, performance monitoring, and troubleshooting. Students gain hands-on experience with administrative tools and automation techniques to ensure system reliability, efficiency, and security, preparing them for real-world roles in IT support, network management, and enterprise infrastructure maintenance.

Recommended Textbook Network Guide to Networks 6th Edition by Tamara

Available Study Resources on Quizplus

15 Chapters

627 Verified Questions

627 Flashcards

Source URL: https://quizplus.com/study-set/1111

Page 2

Chapter 1: An Introduction to Networking

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21837

Sample Questions

Q1) ____ is a popular career development tool for job seekers and a measure of an employee's qualifications for employers.

A) Certification

B) Evaluation

C) Degree auditing

D) Apprenticeship

Answer: A

Q2) ____ are the distinct units of data that are exchanged between nodes on a network.

A) Segments

B) Packets

C) Topologies

D) Protocols

Answer: B

Q3) Hardware diagnosis and failure alert are handled by ____.

A) network management services

B) communication services

C) access services

D) Internet services

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards and the OSI Model

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21838

Sample Questions

Q1) Compare Ethernet and Token Ring frames in terms of their operation on a network. Answer: Ethernet frames are different from token ring frames, and the two will not interact with each other on a network. In fact, most LANs do not support more than one frame type, because devices cannot support more than one frame type per physical interface, or NIC. (NICs can, however, support multiple protocols.) Although you can conceivably transmit both token ring and Ethernet frames on a network, Ethernet interfaces cannot interpret token ring frames, and vice versa. Normally, LANs use either Ethernet or token ring, and almost all contemporary LANs use Ethernet.

Q2) Describe how error checking is handled in the Data Link layer.

Answer: Error checking is accomplished by a 4-byte FCS (frame check sequence) field, whose purpose is to ensure that the data at the destination exactly matches the data issued from the source. When the source node transmits the data, it performs an algorithm (or mathematical routine) called a CRC (cyclic redundancy check). CRC takes the values of all of the preceding fields in the frame and generates a unique 4-byte number, the FCS. When the destination node receives the frame, its Data Link layer services unscramble the FCS via the same CRC algorithm and ensure that the frame's fields match their original form. If this comparison fails, the receiving node assumes that the frame has been damaged in transit and requests that the source node retransmit the data.

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Transmission Basics and Networking Media

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21839

Sample Questions

Q1) The points where circuits interconnect with other circuits is known as ____.

A) entrance facilities

B) cross-connect facilities

C) IDF (intermediate distribution frame)

D) telecommunications closet

Answer: B

Q2) Describe what FDM (frequency division multiplexing) is and how it works. Answer: FDM (frequency division multiplexing) is a type of multiplexing that assigns a unique frequency band to each communications subchannel. Signals are modulated with different carrier frequencies, then multiplexed to simultaneously travel over a single channel. The first use of FDM was in the early 20th century when telephone companies discovered they could send multiple voice signals over a single cable. That meant that rather than stringing separate lines for each residence (and adding to the urban tangle of wires), they could send as many as 24 multiplexed signals over a single neighborhood line. Each signal was then demultiplexed before being brought into the home.

Q3) The use of 1s and 0s to represent information is characteristic of a(n) ____________________ system.

Answer: binary

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Introduction to TCP/IP Protocols

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21840

Sample Questions

Q1) The command used to view IP information on a Windows workstation is ipconfig.

A)True

B)False

Q2) The format of ARP tables is the same from one operating system to another.

A)True

B)False

Q3) TCP ensures reliable data delivery through sequencing and ____________________.

Q4) Describe multicasting.

Q5) ____ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

A) NNTP

B) NTP

C) PING

D) ARP

Q6) In IPv4 addressing, explain what is special about an address containing 127 in the first octet and how this address is used in troubleshooting.

Q7) In IPv4 addressing, eight bits have 256 possible combinations.Only the numbers 1 through 254 can be used to identify networks and hosts in an IP address. Explain what the number 0 and the number 255 are used for in IPv4 addressing.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Topologies and Ethernet Standards

Available Study Resources on Quizplus for this Chatper

39 Verified Questions

39 Flashcards

Source URL: https://quizplus.com/quiz/21841

Sample Questions

Q1) A complex combination of topologies is known as a ____ topology.

A) mixed

B) hybrid

C) compound

D) mulitpart

Q2) On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

A) collision domain

B) crash domain

C) interference domain

D) duplicate domain

Q3) The smallest LANs do not have a backbone.

A)True

B)False

Q4) The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.

A) coaxial

B) twisted pair

C) fiber

D) atmosphere

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Hardware, Switching, and Routing

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21842

Sample Questions

Q1) A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.

Q2) It is best to perform connectivity tests on a computer connected to a live network.

A)True

B)False

Q3) To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

A) RIP (Routing Information Protocol)

B) STP (Spanning Tree Protocol)

C) BGP (Border Gateway Protocol)

D) OSPF (Open Shortest Path First) protocol

Q4) CompactFlash is an example of a peripheral device attached to the computer's ____ bus.

A) internal

B) external

C) onboard

D) remote

Q5) Explain hybrid routing protocols. Describe an example.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21843

Sample Questions

Q1) The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.

A) demarcation point

B) NIU (Network Interface Unit)

C) local loop

D) central office

Q2) WANs typically send data over ____ available communications networks.

A) privately

B) publicly

C) individually

D) serially

Q3) ____ WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points.

A) Bus

B) Star

C) Mesh

D) Tiered

Q4) A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single channel into multiple channels.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless Networking

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/21844

Sample Questions

Q1) What is the purpose of the Frame Control field in an 802.11 frame?

Q2) ____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

A) Channel bonding

B) Channel aggregation

C) Frame aggregation

D) Frame bonding

Q3) The average geographic range for an 802.11a antenna is ____ meters.

A) 20

B) 100

C) 330

D) 600

Q4) ____ may use either the 2.4-GHz or 5-GHz frequency range.

A) 802.11a

B) 802.11b

C) 802.11g

D) 802.11n

Q5) Define and explain the MIMO innovation in the 802.11n standard. Include a description of the advantages it provides.

Q6) Describe the wireless spectrum.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: In-Depth TCP/IP Networking

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21845

Sample Questions

Q1) An administrator can discover the host name assigned to a client by using the ____ utility.

A) host

B) nbstat

C) hostname

D) nslookup

Q2) ____________________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.

Q3) IMAP4 servers require less storage space and usually more processing resources than POP servers do.

A)True

B)False

Q4) In classful addressing, the Class B IPv4 address network ID is located in the ____.

A) last 8 bits

B) last 16 bits

C) first 8 bits

D) first 16 bits

Q5) Describe what PAT is and how it works.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Virtual Networks and Remote Access

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21846

Sample Questions

Q1) Describe how remote virtual computing is used.

Q2) On network diagrams, the Internet is frequently depicted as a ____.

A) block

B) cloud

C) line

D) lightening bolt

Q3) ____ is the remote virtual computing software that comes with Windows client and server operating systems.

A) Remote Server

B) Remote Client

C) Remote Windows

D) Remote Desktop

Q4) In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.

Q5) VPNs can be classified based on the kinds of ____ they connect.

A) hardware

B) software

C) endpoints

D) circuits

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Network Security

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21847

Sample Questions

Q1) Describe the three-way handshake used in CHAP.

Q2) ____ is a method of encrypting TCP/IP transmissions above the network layer.

A) PGP

B) IPSec

C) PAP

D) SSL

Q3) A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

A) packet-filtering

B) gateway

C) proxy

D) selective

Q4) RADIUS and TACACS belong to a category of protocols known as AAA (____).

A) access, authorization, and accounting

B) authentication, authorization, and accounting

C) authentication, authorization, and authority

D) authentication, authorization, and access

Q5) Describe an advantage of using EAP.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Voice and Video Over IP

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21848

Sample Questions

Q1) The popular Internet telephony software, Skype, is a type of ____.

A) IP telephone

B) softphone

C) teleapplication

D) compu-phone

Q2) ____ messaging is a service that makes several forms of communication available from a single user interface.

A) Unified

B) Instant

C) Diversified

D) Open

Q3) Describe six functions performed by signaling protocols.

Q4) When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.

A) bridge

B) switch

C) gateway

D) router

Q5) Aside from extreme mobility, describe another advantage to softphones.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Troubleshooting Network Problems

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21849

Sample Questions

Q1) Describe how a problem's solution might affect users and network functionality in terms of security.

Q2) The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.

A) cable continuity tester

B) multimeter

C) protocol analyzer

D) wireless network tester

Q3) A sophisticated ____________________ will include a TDR (time domain reflectometer) that issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR.

Q4) List eight questions to ask to help identify network problem symptoms that are not immediately obvious.

Q5) A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.

A) network monitor

B) sniffer

C) protocol analyzer

D) multimeter

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Ensuring Integrity and Availability

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21850

Sample Questions

Q1) A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

A) standby

B) offline

C) offsite

D) online

Q2) When implementing anti-malware software on a network, one of your most important decisions is where to install the software.

A)True

B)False

Q3) ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

A) Integrity checking

B) Polymorphic

C) Signature

D) Heuristic

Q4) A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Network Management

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/21851

Sample Questions

Q1) The most critical type of software upgrade you will perform is an upgrade to your

A) database

B) application

C) NOS

D) backbone

Q2) ____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.

Q3) List six characteristics software running on network devices may use to prioritize traffic.

Q4) ____ management refers to the detection and signaling of device, link, or component faults.

A) Performance

B) Fault

C) Network

D) Configuration

Q5) On Windows-based computers an event log and can be easily viewed with the GUI ____________________ application.

Q6) Describe how to select an asset management tool.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Turn static files into dynamic content formats.

Create a flipbook