
Course Introduction
![]()

Course Introduction
Systems Administration provides students with a thorough understanding of managing and maintaining computer systems and networks in organizational environments. The course covers fundamental concepts such as operating system installation, user and group management, file systems, system security, network configuration, backup and recovery, and automated task scheduling. Students will gain hands-on experience with common administrative tasks using both graphical user interfaces and command-line tools across various operating systems. Emphasis is placed on troubleshooting, performance monitoring, documentation, and best practices essential to ensuring seamless and secure system operations.
Recommended Textbook
Network Guide to Networks 6th Edition by Tamara Dean
Available Study Resources on Quizplus
15 Chapters
627 Verified Questions
627 Flashcards
Source URL: https://quizplus.com/study-set/1111

Page 2

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21837
Sample Questions
Q1) A common way of sharing resources on a peer-to-peer network is by modifying the ____ controls using the computer's operating system.
A) file-serving
B) file-sharing
C) resource-sharing
D) resource-monitoring
Answer: B
Q2) Hardware diagnosis and failure alert are handled by ____.
A) network management services
B) communication services
C) access services
D) Internet services
Answer: A
Q3) A ____ facilitates communication and resource sharing between other computers on the network.
A) servlet
B) workstation
C) personal computer
D) server
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 3

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21838
Sample Questions
Q1) In which OSI model layer does IP operate?
A) Physical
B) Transport
C) Network
D) Data Link
Answer: C
Q2) Briefly describe IEEE's Project 802.
Answer: IEEE's Project 802 is an effort to standardize physical and logical elements of a network. IEEE developed these standards before the OSI model was standardized by ISO, but IEEE's 802 standards can be applied to the layers of the OSI model.
Q3) In which OSI model layer does TCP operate?
A) Physical
B) Transport
C) Network
D) Data Link
Answer: B
Q4) ____________________ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.
Answer: Flow control
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21839
Sample Questions
Q1) Many network problems can be traced to poor cable ____ techniques.
A) manufacturing
B) engineering
C) installation
D) planning
Answer: C
Q2) Which standard is also known as structured cabling?
A) TIA/EIA Commercial Building Wiring Standard
B) TIA/EIA RS-232 (Recommended Standard 232)
C) TIA/EIA 568A Standard
D) TIA/EIA 568BA Standard
Answer: A
Q3) Describe the benefits of fiber-optic cabling over copper cabling.
Answer: Fiber-optic cable provides the following benefits over copper cabling:
· Extremely high throughput
· Very high resistance to noise
· Excellent security
· Ability to carry signals for much longer distances before requiring repeaters than copper cable
· Industry standard for high-speed networking
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21840
Sample Questions
Q1) Describe the size differences in IPv4 and IPv6 IP addresses.
Q2) A UDP header contains ____fields.
A) four
B) six
C) eight
D) ten
Q3) In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
A) TCP
B) UDP
C) IP
D) ARP
Q4) If your network does not need or use APIPA, it must be uninstalled to avoid conflicts.
A)True
B)False
Q5) TCP ensures reliable data delivery through sequencing and ____________________.
Q6) Describe the DHCP leasing process.
Q7) Describe how ARP improves efficiency of MAC-to-IP address mappings.
Q8) Define and describe DDNS (Dynamic DNS).
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
39 Verified Questions
39 Flashcards
Source URL: https://quizplus.com/quiz/21841
Sample Questions
Q1) ____________________ is a component of a network's logical topology that determines how connections are created between nodes.
Q2) Briefly describe the IEEE 802.3af standard. Use an analogy and explain why it is useful.
Q3) Without ____, a bus network would suffer from signal bounce.
A) hubs
B) repeaters
C) terminators
D) jamming
Q4) A ____ occurs when two transmissions interfere with each other.
A) jam
B) collision
C) carrier sense
D) multiple access event
Q5) A physical topology ____.
A) specifies device types
B) depicts a network in broad scope
C) specifies connectivity methods
D) specifies addressing schemes
Q6) Explain why it is important to understand logical topologies.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21842
Sample Questions
Q1) At its most primitive, a ____ is a repeater with more than one output port.
A) base
B) hub
C) switch
D) bridge
Q2) Describe two popular types of gateways.
Q3) Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
A) ROM
B) EEPROM
C) RAM
D) CMOS
Q4) Advances in NIC technology are making this hardware smarter than ever.
A)True
B)False
Q5) A(n) ____________________ NIC is integrated into the motherboard.
Q6) On a Linux workstation, a popular utility called ____________________ allows you to view and change NIC settings.
Q7) Define wireless NICS. Include a description of disadvantages associated with their use.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21843
Sample Questions
Q1) A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
A) CO
B) EO
C) DO
D) TO
Q2) ____ WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points.
A) Bus
B) Star
C) Mesh
D) Tiered
Q3) The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.
A) OC (Optical Carrier) level
B) CIR (committed information rate)
C) BRI (Basic Rate Interface)
D) DS0 (digital signal, level 0)
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/21844
Sample Questions
Q1) WiMAX is defined by the IEEE 802.11 standard.
A)True
B)False
Q2) The use of multiple frequencies to transmit a signal is known as ____________________ technology.
Q3) What is the purpose of the Frame Control field in an 802.11 frame?
Q4) Describe what an administrator can do if during a wireless router configuration, something goes awry.
Q5) An ad hoc arrangement would work well for a WLAN with many users.
A)True
B)False
Q6) Describe the wireless spectrum.
Q7) In the case of connecting two WLANs, access points could be as far as ____ feet apart.
A) 500
B) 800
C) 1000
D) 1200
Q9) Describe the FHSS and DSSS spread spectrum technologies. Page 10
Q8) Define reassociation and provide two examples explaining when it occurs.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21845
Sample Questions
Q1) Describe four features of IMAP4.
Q2) When using classful IPv4 addressing, a network ID always ends with an octet of
A) 0
B) 00000000
C) 1
D) 255
Q3) The gateways that make up the Internet backbone are called ____ gateways.
A) proxy
B) core
C) Internet
D) default
Q4) In classful addressing, Class C IPv4 address host information is located in the ____.
A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
Q5) Describe the formula determining how to modify a default subnet mask to create subnets.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21846
Sample Questions
Q1) In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
Q2) The physical computer on a virtual machine is known as a ____.
A) guest
B) client
C) host
D) server
Q3) To connect to a network, a virtual machine requires a ____.
A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
Q4) ____ is the remote virtual computing software that comes with Windows client and server operating systems.
A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
Q5) Describe PPPoE.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21847
Sample Questions
Q1) Describe the two phases IPSec use to accomplish authentication.
Q2) Define SSH (secure shell) and explain the threats it guards against. Include an explanation of the encryption algorithms that may be used with it.
Q3) In ____, both computers verify the credentials of the other.
A) mutual authorization
B) mutual access
C) mutual authentication
D) mutual verification
Q4) A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
A) flashing
B) denial-of-service
C) dictionary
D) brute force
Q5) By default, the 802.11 standard offers substantial security.
A)True
B)False
Q6) Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21848
Sample Questions
Q1) An off-the-shelf workstation can be programmed to act like an IP telephone.
A)True
B)False
Q2) ____________________ performs the same functions as MGCP, but using different commands and processes.
Q3) Explain how gateways on a converged network exchange and translate signaling and control information with each other so that voice and video packets are properly routed through the network.
Q4) Describe five capabilities to which SIP is limited.
Q5) SIP and H.323 account for communication between media gateways.
A)True
B)False
Q6) IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.
A) voice over IP
B) data over IP
C) video over IP
D) Web over IP
Q7) Describe six functions performed by signaling protocols.
Q8) Describe IP telephones and how they are connected to a network.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21849
Sample Questions
Q1) Describe five causes of unreliable network connectivity.
Q2) ____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
A) Jabbers
B) Ghosts
C) Giants
D) Runts
Q3) Describe five functions all network monitoring tools perform.
Q4) ____ is a fundamental property of wire that depends on a wire's molecular structure and size.
A) Voltage
B) Current
C) Resistance
D) Impedance
Q5) A ____ can be used to intercept a telephone conversation.
A) sniffer
B) protocol analyzer
C) network monitor
D) butt set
Q6) Describe three advantages of using wireless network tools.
To view all questions and flashcards with answers, click on the resource link above. Page 16
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21850
Sample Questions
Q1) ____ is intended to eliminate single points of failure.
A) Availability
B) Redundancy
C) Contingency
D) Integrity
Q2) Protection against harmful code involves more than just installing anti-malware software.
A)True
B)False
Q3) ____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
Q4) Describe clustering and explain why it is more cost-effective than mirroring for large networks.
Q5) Explain why it is important to keep backups, boot disks, and emergency repair disks current and available.
Q6) Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
Q7) What is integrity checking?

17
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21851
Sample Questions
Q1) A network management agent is a ____ that collects information about a device's operation and provides it to the network management application.
A) software routine
B) hardware device
C) GUI
D) probe
Q2) ____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.
Q3) List six characteristics software running on network devices may use to prioritize traffic.
Q4) Explain how a network management application can present an administrator with results after data is collected.
Q5) A(n) ____ is a graphical representation of a network's wired infrastructure.
A) Multi Router Traffic Grapher
B) network diagram
C) wiring schematic
D) event viewer
Q6) The definition of managed devices and their data are collected in a(n)
To view all questions and flashcards with answers, click on the resource link above. Page 18