Information Technology Infrastructure Exam Materials - 838 Verified Questions

Page 1


Information Technology Infrastructure

Exam Materials

Course Introduction

Information Technology Infrastructure provides an in-depth introduction to the foundational technologies and organizational concepts that support modern digital enterprises. The course covers core components such as hardware, software, networking, data storage, and cloud computing, emphasizing their roles in delivering reliable, scalable, and secure information services. Students will explore best practices in infrastructure management, virtualization, disaster recovery, business continuity, and emerging trends like the Internet of Things and green IT. This course prepares students to understand, assess, and manage the complex infrastructure environments critical to todays organizations.

Recommended Textbook

Business Data Networks and Security 10th Edition by

Available Study Resources on Quizplus

15 Chapters

838 Verified Questions

838 Flashcards

Source URL: https://quizplus.com/study-set/1485

Page 2

Chapter 1: Welcome to the Cloud

Available Study Resources on Quizplus for this Chatper

95 Verified Questions

95 Flashcards

Source URL: https://quizplus.com/quiz/29502

Sample Questions

Q1) Packets are ________.

A)switched

B)routed

C)both A and B

D)neither A nor B.

Answer: B

Q2) Which layer's standards govern signaling?

A)1

B)2

C)3

D)4

Answer: A

Q3) Netflix uses AWS for its ________.

A)recommendation system

B)content delivery appliances

C)both A and B

D)neither A nor B

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Standards

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/29509

Sample Questions

Q1) To represent 65 alternatives,your alternatives field would have to be at least ________ bits long.

A)5

B)6

C)7

D)8

Answer: C

Q2) How long are IPv4 addresses?

A)4 bits

B)32 bits

C)48 bits

D)128 bits

Answer: B

Q3) Converting application messages into bits is called ________.

A)encapsulation

B)encryption

C)encoding

D)exchange

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Network Security

Available Study Resources on Quizplus for this Chatper

88 Verified Questions

88 Flashcards

Source URL: https://quizplus.com/quiz/29510

Sample Questions

Q1) The general name for a security flaw in a program is a ________.

A)virus

B)malware

C)security fault

D)vulnerability

Answer: D

Q2) How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP segment which is an acknowledgement?

A)process it through the Access Control List (ACL)

B)pass it if it is part of an approved connection

C)both A and B

D)neither A nor B

Answer: B

Q3) A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.

A)malware

B)security error

C)vulnerability

D)security fault

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network and Security Management

Available Study Resources on Quizplus for this Chatper

64 Verified Questions

64 Flashcards

Source URL: https://quizplus.com/quiz/29511

Sample Questions

Q1) Attacking your own firm occurs in ________.

A)vulnerability testing

B)auditing

C)both A and B

D)neither A nor B

Q2) Errors may substantially reduce throughput in ________.(Pick the standard most affected.)

A)IP

B)TCP

C)UDP

D)HTTP

Q3) Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.

A)have comprehensive security

B)have defense in depth

C)do risk analysis

D)only give minimum permissions

Q4) In SNMP,the manager communicates directly with the managed device.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Ethernet 8023switched Lans

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/29512

Sample Questions

Q1) Which UTP quality levels can send signals at 10 gigabits per second?

A)category 6

B)category 6A

C)both A and B

D)neither A nor B

Q2) The ________ standard was created to prevent attackers from walking in and simply plugging a computer into a wall jack and therefore accessing the network.

A)Ethernet firewall

B)802.1AE

C)802.3X

D)802.1X

Q3) The Ethernet length field gives the length of the ________.

A)frame

B)frame, less the frame check field's size

C)data field

D)data field plus PAD

Q4) In this book,we use the terms Ethernet and 802.3 interchangeably.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/29513

Sample Questions

Q1) What happens if two nearby access points use the same channel?

A)They will interfere with each other.

B)They will be bonded for joint operation automatically.

C)They will be bonded for joint operation automatically if they are on the same ESS.

D)They will be bonded for joint operation automatically if they have the same SSID.

Q2) Spread spectrum transmission is used in WLANs for ________.

A)higher transmission speed

B)more reliable transmission

C)greater security

D)more efficient transmission

Q3) In the 5 GHz band,how many channels can you have with 802.11ac with 80 GHz channels?

A)1

B)6

C)12

D)24

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wireless Lans 2

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/29514

Sample Questions

Q1) What is the strongest security protocol for 802.11 today?

A)802.11i

B)802.11s

C)802.11X

D)WPA

Q2) Managed access points should ________.

A)identify rogue access points

B)be able to push updates out to access points

C)both A and B

D)neither A nor B

Q3) Which offers stronger security?

A)WPA

B)802.11i

C)Both A and B offer equally strong security.

Q4) Which of the following has a dangerous vulnerability that is causing problems today?

A)PEAP

B)802.11i

C)WPA

D)WPS

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Tcp-Ip Internet Working I

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/29515

Sample Questions

Q1) After selecting a row on a routing table,a router will send packets out to the

A)port

B)socket

C)interface

D)plug

Q2) Which of the following can handle an application message that is one megabyte in size?

A)TCP

B)UDP

C)both A and B

D)neither A nor B

Q3) For human reading,IPv6 fields are separated by ________.

A)dashes

B)slashes

C)colons

D)none of the above

To view all questions and flashcards with answers, click on the resource link above.

10

Chapter 9: Tcp-Ip Internet Working 2

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/29516

Sample Questions

Q1) SNMPv3 uses ________ for authentication.

A)community names

B)digital certificates and digital signatures

C)a different password for each manager-agent pair

D)all of the above

Q2) In SNMP,companies are often reluctant to use ________ commands because of security dangers.

A)Get

B)Set

C)trap

D)request

Q3) Which of the following is true about NAT?

A)It can enhance security.

B)It presents problems for some protocols.

C)both A and B

D)neither A nor B

Q4) Which has stronger security?

A)SSL/TLS

B)IPsec

C)Both have about equal security.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Carrier Wide Area Networks Wans

Available Study Resources on Quizplus for this Chatper

74 Verified Questions

74 Flashcards

Source URL: https://quizplus.com/quiz/29503

Sample Questions

Q1) Which of the following is a common use for carrier WANs?

A)to connect corporate sites

B)to connect a corporate site to the Internet

C)both A and B

D)neither A nor B

Q2) The PSTN core is organized as a ________.

A)mesh

B)hierarchy

C)modified hierarchy

D)loop

Q3) OpenFlow can be used to standardize ________.

A)northbound APIs

B)southbound APIs

C)both A and B

D)neither A nor B

Q4) In ADSL,the residential customer needs a(n)________.

A)DSLAM

B)ADSL modem

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Networked Applications

Available Study Resources on Quizplus for this Chatper

62 Verified Questions

62 Flashcards

Source URL: https://quizplus.com/quiz/29504

Sample Questions

Q1) VoIP users have ________ in their phones or on their computers.

A)media gateways

B)codecs

C)both A and B

D)neither A nor B

Q2) Which of the following is a processor-sharing application?

A)BitTorrent

B)SETI@home

C)SIP

D)Skype

Q3) Having all privileges on a computer is known as having ________.

A)access

B)omniscience

C)root privileges

D)mojo

Q4) Which of the following is used to retrieve Web pages?

A)HTTP

B)HTML

C)RTP

D)SQL

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module a More on Tcp

Available Study Resources on Quizplus for this Chatper

4 Verified Questions

4 Flashcards

Source URL: https://quizplus.com/quiz/29505

Sample Questions

Q1) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does the sending host put in the sequence number field?

A)8,658

B)8,659

C)12,783

D)12,784

Q2) Flow control in TCP depends on the ________ field.

A)acknowledgement number

B)window size

C)both A and B

D)neither A nor B

Q3) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does the receiving host put in the acknowledgment number field of the TCP segment that acknowledges this TCP segment?

A)8,658

B)8,659

C)12,783

D)12,784

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Module B More on Modulation

Available Study Resources on Quizplus for this Chatper

12 Verified Questions

12 Flashcards

Source URL: https://quizplus.com/quiz/29506

Sample Questions

Q1) In QAM,if you have eight possible amplitudes,how many bits can you send per clock cycle?

A)3

B)6

C)8

D)16

Q2) Phase modulation uses two ________ levels.

A)loudness

B)frequency

C)wave

D)none of the above

Q3) In QAM,if you have four possible amplitudes,you have ________ possible states.

A)4

B)8

C)16

D)none of the above

Q4) Frequency modulation uses two loudness levels.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Module C More on Telecommunications

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/29507

Sample Questions

Q1) For PBXs,call detail reporting is ________.

A)a user service

B)an attendant service

C)a management service

Q2) SONET/SDH uses a ________ topology.

A)point-to-point

B)hierarchy

C)mesh

D)ring

Q3) Which of the following have an altitude of a few thousand kilometers (a few thousand miles)?

A)GEOs

B)LEOs

C)MEOs

D)none of the above

Q4) A ring topology is attractive because it brings ________.

A)higher speed

B)lower cost

C)greater reliability

D)all of the above

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Module D Directory Servers

Available Study Resources on Quizplus for this Chatper

11 Verified Questions

11 Flashcards

Source URL: https://quizplus.com/quiz/29508

Sample Questions

Q1) A group of Active Directory domains organized in a hierarchy is a ________.

A)network

B)tree

C)forest

D)none of the above

Q2) A group of Active Directory trees organized in a hierarchy is a forest.

A)True

B)False

Q3) If a company has multiple authentication servers,which devices are likely to hold the authentication data?

A)authenticators

B)authentication servers individually

C)authentication servers doing replication

D)directory servers

Q4) Which device holds authentication data?

A)authenticator

B)authentication server

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 17

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook