

Introduction to Networking Study Guide Questions
Course Introduction
Introduction to Networking provides students with a foundational understanding of computer networks, focusing on how data is transmitted and received across connected devices. The course covers essential concepts such as network models (including the OSI and TCP/IP models), hardware components, protocols, IP addressing, and network topologies. Students will explore the basics of wired and wireless networking, network security fundamentals, and troubleshooting techniques. Through theoretical lessons and practical activities, learners gain the skills necessary to understand and support networking environments in both personal and professional settings.
Recommended Textbook
Network+ Guide to Networks 8th Edition Jill West
Available Study Resources on Quizplus
12 Chapters
600 Verified Questions
600 Flashcards
Source URL: https://quizplus.com/study-set/183

Page 2

Chapter 1: Introduction to Networking
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2566
Sample Questions
Q1) What is a remote application, and how can remote applications be implemented on Windows Server?
Answer: A remote application is an application that is installed and executed on a server and is presented to a user working at a client computer. Windows Server 2008 and later versions include Remote Desktop Services to manage remote applications, and versions of Windows Server prior to 2008 provided Terminal Services. Both use RDP (Remote Desktop Protocol) to present the remote application and its data to the client.
Q2) What statement accurately reflects what occurs when a message is too large to transport on a network?
A) The message is discarded and must be sent again.
B) The message is sent anyway, and is received by the destination as garbage data.
C) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
D) An ICMP error is generated, and the application must reformat the data for transmission.
Answer: C
To view all questions and flashcards with answers, click on the resource link above.
Chapter 2: Network Infrastructure and Documentation
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2567
Sample Questions
Q1) What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
A) IEEE 802.3
B) TIA/EIA-568
C) ITU 922
D) ISO 9001
Answer: B
Q2) What statement accurately describes what a cable bend radius determines?
A) A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.
B) A cable bend radius is the radius of the minimum arc into which you can loop the cable without impairing data.
C) A cable bend radius determines the total number of bends that can exist in an overall cable before data is impaired.
D) A cable bend radius defines the twist rate of the cable inside of the insulation.
Answer: A
To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Addressing on Networks
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2568
Sample Questions
Q1) What command can be used to check a domain computer's time source from a Command Prompt window?
A) date /source
B) w32tm /query /source
C) ntpd show source
D) time --source
Answer: B
Q2) What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
A) traceroute
B) ifconfig
C) ping
D) route
Answer: C
Q3) ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Protocols and Routing
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2569
Sample Questions
Q1) What occurs when a collision happens on a network?
A) The collision goes undetected, and data transmission continues.
B) The collision will create an error in the network switch, but otherwise, no issues will occur as a result.
C) Each node on the network stops transmitting, until manually told to reconnect and transmit.
D) Each node on the network waits a random amount of time and then resends the transmission.
Q2) How are routing paths determined?
Q3) Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?
A) traceroute -i srv1.mycompany.com
B) traceroute -w srv1.mycompany.com
C) traceroute -o ICMP srv1.mycompany.com
D) traceroute -I srv1.mycompany.com
Q4) In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 6

Chapter 5: Network Cabling
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2570
Sample Questions
Q1) What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?
A) 100Base-T
B) 1000Base-T
C) 10GBase-T
D) 10TBase-T
Q2) What statement describes a transmission flaw that is occurring due to attenuation?
A) A customer modem is continuously losing signal due to large distance from the transmitting device.
B) A network switch interface is dropping due to a powerful radio transmitter in the adjacent room.
C) A customer's video conferencing application is experiencing delay in audio and video that comes and goes.
D) Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs.
Q3) A continuity tester should not be used on a live network segment.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Chapter 6: Wireless Networking
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2571
Sample Questions
Q1) How does the 802.11 data frame indicate how a large packet should be fragmented?
A) It uses the preamble header to estimate the ideal packet size.
B) The frame check sequence dictates the calculated packet size.
C) The sequence control field indicates how packets will be subdivided.
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided.
Q2) Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.
A)True
B)False
Q3) How does configuration of wireless clients for wireless access in an enterprise environment differ from normal setup?
Q4) Most wireless devices use one of two technologies to avoid interference. What are these technologies?
Q5) Why should an access point not always utilize all the power it has for broadcasting wireless signals?
Q6) The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
A)True
B)False

Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Virtualization and Cloud Computing
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2572
Sample Questions
Q1) What are some of the features that all cloud services usually have in common?
Q2) A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?
A) Layer 1
B) Layer 2
C) Layer 4
D) Layer 7
Q3) When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
A) VPN proxy
B) VPN server
C) VPN transport
D) VPN gateway
Q4) What two different types of encryption can be utilized with IPsec?
Q5) VMware Player and Linux KVM are both examples of what type of hypervisor?
A) Type 1 hypervisor
B) Type 2 hypervisor
C) barebones hypervisor
D) bare-metal hypervisor
Q6) What is the difference between a virtual firewall and a software firewall?
To view all questions and flashcards with answers, click on the resource link above. Page 9
Chapter 8: Subnets and VLANs
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2573
Sample Questions
Q1) A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.
A)True
B)False
Q2) Network segmentation decreases both performance and security on a network.
A)True
B)False
Q3) How does the logical process of combining bits known as ANDing work?
Q4) How many subnets can a /48 site prefix support?
A) 256 subnets
B) 16384 subnets
C) 65,536 subnets
D) 131,072 subnets
Q5) By default, the native VLAN is the same as the default VLAN.
A)True
B)False
Q6) When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?
A) VLAN 1
B) VLAN 1001
C) VLAN 1003
D) VLAN 1005

Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Network Risk Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2574
Sample Questions
Q1) A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
A) phishing
B) baiting
C) quid pro quo
D) tailgating
Q2) In a red team-blue team exercise, what is the purpose of the blue team?
A) The blue team is tasked with attacking the network.
B) The blue team must observe the actions of the red team.
C) The blue team is charged with the defense of the network.
D) The blue team consists of regulators that ensure no illegal activity is undertaken.
Q3) Different types of organizations have similar levels of network security risks. A)True
B)False
Q4) How does a zero-day exploit differ from a typical exploit?
Q5) A drop ceiling could be used by an intruder to gain access to a secured room. A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Security in Network Design
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2575
Sample Questions
Q1) You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?
A) set max-mac
B) set total-macs
C) mac-address limit
D) mac-limit
Q2) The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.
A)True
B)False
Q3) On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
A) ipf
B) modfire
C) iptables
D) netwall
Q4) What is the purpose of Unified Threat Management (UTM)?
Q5) How does the CCMP help ensure data confidentiality?
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Network Performance and Recovery
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2576
Sample Questions
Q1) In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?
Q2) When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
A) assured forwarding
B) prioritized forwarding
C) scaled forwarding
D) expedited forwarding
Q3) Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
A)True
B)False
Q4) The Link Aggregation Control Protocol was initially defined by what IEEE standard?
A) IEEE 802.3af
B) IEEE 802.1cd
C) IEEE 802.3ad
D) IEEE 802.3bd
Q5) What is the difference between a fault and a failure in relation to networking?
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Wide Area Networks
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2577
Sample Questions
Q1) What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete?
A) permanent virtual circuit (PVC)
B) switched virtual circuit (SVC)
C) dynamic virtual circuit (DVC)
D) looping virtual circuit (LVC)
Q2) How does a LAN connection differ from a WAN connection?
Q3) In North America, what ISDN connection type used two B channels and one D channel?
A) Basic Rate Interface (BRI)
B) Primary Rate Interface (PRI)
C) Bearer Rate Interface (BRI)
D) Dedicated Rate Interface (DRI)
Q4) The word "synchronous" as used in the name of Synchronous Optical Network means that data being transmitted and received by nodes must conform to a timing scheme.
A)True
B)False
Q5) Describe the Synchronous Optical Network standard.
Q6) List and describe the four different generations of cellular technology.
Page 14
To view all questions and flashcards with answers, click on the resource link above.