0% found this document useful (0 votes)
51 views

Network Admin Exam

Ex

Uploaded by

Batife
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Network Admin Exam

Ex

Uploaded by

Batife
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ESCAE UNIVERSITY, BENIN

Course: Digital Marketing Exam Code: COSC 414 Time Allowed : 90min

Instruction: Answer all questions

_NAME : ______________________________________MATRIC NO:__________

1, What does DHCP stand for?  C) Network Address Transport


 D) Network Access Translation
 A) Dynamic Host Configuration
Protocol 7, Which protocol is used for securely
 B) Domain Host Control Protocol transmitting data over the internet?
 C) Dynamic Host Control Protocol
 D) Domain Host Configuration Protocol  A) HTTP
 B) FTP
2, Which layer of the OSI model is  C) SSH
responsible for routing packets?  D) Telnet

 A) Physical 8, Which of the following IP


 B) Data Link addresses is a private IP address?
 C) Network
 D) Transport  A) 192.168.1.1
 B) 8.8.8.8
3, What is the default port number for  C) 172.217.0.0
HTTP?  D) 216.58.214.14

 A) 21 9. What is the main purpose of the


 B) 80 Domain Name System (DNS)?
 C) 443
 D) 25  A) To assign IP addresses to devices
 B) To translate domain names into IP
4. Which command is used to check addresses
the network connectivity between two  C) To route packets between networks
nodes?  D) To manage network security

 A) ipconfig 10. Which device is used to connect


 B) ping multiple networks together?
 C) netstat
 D) tracert  A) Switch
 B) Router
5. What is the purpose of a firewall in  C) Hub
a network?  D) Modem

 A) To block email spam 11. What does VPN stand for?


 B) To prevent unauthorized access to
or from a private network  A) Virtual Private Network
 C) To accelerate internet speed  B) Virtual Public Network
 D) To manage network traffic  C) Virtual Permanent Network
 D) Virtual Protocol Network
6. What does NAT stand for in
networking? 12. Which protocol is used to send
email?
 A) Network Address Translation
 B) Network Access Technology  A) POP3
 B) SMTP  A) Router
 C) IMAP  B) Switch
 D) FTP  C) Hub
 D) Firewall
13. What is the function of a proxy
server? 20. What is the primary function of a
network switch?
 A) To provide internet access
 B) To cache web pages for faster access  A) To amplify signals
 C) To encrypt network traffic  B) To route data between networks
 D) To manage network bandwidth  C) To forward data to specific devices
within a network
14. Which command is used to display  D) To provide internet access
network configuration details on
Windows? 21. Which of the following is a
common wireless security protocol?
 A) ifconfig
 B) ipconfig  A) WPA2
 C) netstat  B) HTTP
 D) tracert  C) FTP
 D) ICMP
15, What is the main purpose of a
subnet mask? 22. What does the command 'tracert'
do in networking?
 A) To assign IP addresses dynamically
 B) To divide an IP address into network  A) Displays network configuration
and host parts  B) Tests connectivity to a remote host
 C) To encrypt data  C) Traces the route packets take to a
 D) To configure network devices destination
 D) Monitors network traffic
16. Which layer of the OSI model is
responsible for error detection and 23.Which port number is commonly
correction? used by the HTTPS protocol?

 A) Physical  A) 21
 B) Data Link  B) 25
 C) Network  C) 80
 D) Transport  D) 443

17. What does VLAN stand for? 24. Which protocol is used to
dynamically assign IP addresses to
 A) Virtual Local Area Network devices on a network?
 B) Virtual Line Access Network
 C) Virtual Link Address Network  A) DNS
 D) Virtual LAN Adapter Network  B) DHCP
 C) HTTP
18. Which protocol is used for remote  D) SMTP
login to a computer?
25 What is the main purpose of using
 A) FTP a VPN?
 B) Telnet
 C) SMTP  A) To increase internet speed
 D) DNS  B) To provide secure remote access to
a network
19. Which device operates at the data  C) To block unauthorized access
link layer of the OSI model?  D) To manage network traffic
Note: detailed explanations are required

Question 1:

Describe the TCP/IP model and its layers, highlighting the key functions of each
layer.

Question 2:

Explain the importance of network interconnectivity and describe the various


devices used to achieve it

Question 3:

Discuss the different types of network topologies and their advantages and
disadvantages.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy