Introduction to Networking Test Questions - 600 Verified Questions

Page 1


Introduction to Networking Test Questions

Course Introduction

Introduction to Networking provides a foundational understanding of how computer networks operate, covering essential concepts such as network topologies, protocols, transmission media, and network devices. This course explores the fundamental principles behind data communication, addressing the OSI and TCP/IP models, IP addressing, subnetting, and the configuration of basic networking hardware. Students will gain practical skills in establishing and managing small-scale networks, analyzing network traffic, and troubleshooting connectivity issues, preparing them for more advanced study in network administration and security.

Recommended Textbook

Network+ Guide to Networks 8th Edition Jill West

Available Study Resources on Quizplus

12 Chapters

600 Verified Questions

600 Flashcards

Source URL: https://quizplus.com/study-set/183

Page 2

Chapter 1: Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2566

Sample Questions

Q1) Which of the following is an example of encapsulation?

A) The addition of a header to data inherited from the layer above in the OSI model.

B) The subtraction of a header from data inherited from the layer below in the OSI model.

C) The modification of headers from a higher layer in the OSI model.

D) The addition of a trailer to data inherited from the layer above in the OSI model.

Answer: A

Q2) Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.

A)True

B)False

Answer: False

Q3) The protocol data unit for the Physical layer of the OSI model is payload, or data. A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Network Infrastructure and Documentation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2567

Sample Questions

Q1) When creating network diagrams, what icon description typically represents a network router?

A) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

B) An icon that resembles a brick wall.

C) An icon that is rectangular in shape, with squiggly lines on the front.

D) An icon that is rectangular, which contains four arrows pointing in opposite directions.

Answer: A

Q2) Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?

A) master service agreement

B) master license agreement

C) service-level agreement

D) memorandum of understanding

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Addressing on Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2568

Sample Questions

Q1) How is an IPv6 address written and displayed?

Answer: IPv6 addresses are written and displayed as follows:

* An IPv6 address has 128 bits that are written as eight blocks (also called quartets) of hexadecimal numbers separated by colons, like this:

2001:0000:0B80:0000:0000:00D3:9C5A:00CC.

* Each block is 16 bits. For example, the first block in the preceding IP address is the hexadecimal number 2001, which can be written as 0010 0000 0000 0001 in binary.

* Leading zeroes in a four-character hex block can be eliminated. This means our sample IP address can be written as 2001:0000:B80:0000:0000:D3:9C5A:CC.

* If blocks contain all zeroes, they can be eliminated and replaced by double colons (::).

To avoid confusion, only one set of double colons is used in an IP address. This means our sample IP address can be written two ways: 2001::B80:0000:0000:D3:9C5A:CC or 2001:0000:B80::D3:9C5A:CC

Q2) ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Protocols and Routing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2569

Sample Questions

Q1) Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

A) ipconfig -s

B) netstat -s

C) ipstat -a

D) netstat -an

Q2) What IPv6 field is similar to the TTL field in IPv4 packets?

A) flow label

B) next header

C) hop limit

D) distance vector

Q3) TCP uses a four-step process called a four-way handshake to establish a TCP connection.

A)True

B)False

Q4) The pathping utility sends 10 pings per hop by default.

A)True

B)False

Q5) How can a network switch be said to operate at Layer 4 of the OSI model?

Q6) How is the TTL (Time to Live) field utilized in IPv4?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Network Cabling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2570

Sample Questions

Q1) Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?

A) RG-59

B) RG-6

C) RG-20

D) LRG-50

Q2) A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?

A) fiber stripper

B) fiber snipper

C) fiber cleaver

D) fiber saw

Q3) Latency on data networks is based on a calculation of a packet's round trip time (RTT).

A)True

B)False

Q4) What is a fiber distribution panel, and how is it used?

Q5) What is the difference between single mode fiber and multimode fiber, and how do they compare?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2571

Sample Questions

Q1) What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

A) management frames

B) control frames

C) data frames

D) extended frames

Q2) The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

A)True

B)False

Q3) How does the 802.11 data frame indicate how a large packet should be fragmented?

A) It uses the preamble header to estimate the ideal packet size.

B) The frame check sequence dictates the calculated packet size.

C) The sequence control field indicates how packets will be subdivided.

D) The duration field determines how long the station can transmit a packet, which then determines how it is divided.

Q4) All wireless signals are carried through the air by electromagnetic waves.

A)True

B)False

Q5) What are some of the different types of wireless topologies that can be created?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Virtualization and Cloud Computing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2572

Sample Questions

Q1) Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

A) VMware vSphere

B) Oracle VirtualBox

C) Parallels

D) Citrix Xen

Q2) What two different types of encryption can be utilized with IPsec?

Q3) Why is the telnet utility a poor choice for remote access to a device?

A) It provides no mechanism for authentication.

B) It does not allow for control of a computer remotely.

C) It cannot be used over a public WAN connection.

D) It provides poor authentication and no encryption.

Q4) When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

A) VPN proxy

B) VPN server

C) VPN transport

D) VPN gateway

Q5) How does public key encryption work?

Q6) What is the difference between a virtual firewall and a software firewall?

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Subnets and VLANs

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2573

Sample Questions

Q1) You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal?

A) 10.3.0.0/19

B) 172.20.50.0/23

C) 192.168.0.0/20

D) 10.90.0.0/22

Q2) Subtracting an interesting octet value from 256 yields what number?

A) network ID

B) subnet ID

C) magic number

D) host ID

Q3) What are some of the different reasons to use VLANs?

Q4) All that is needed to provide communication between two VLANs is a DHCP relay agent.

A)True B)False

Q5) What are some common configuration errors that can occur when configuring VLANs?

Q6) Network segmentation decreases both performance and security on a network. A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Risk Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2574

Sample Questions

Q1) Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

A) acceptable use policy document

B) terms of service document

C) license restrictions document

D) non-disclosure agreement document

Q2) Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?

A) cached denial-of-service attack

B) distributed denial-of-service attack

C) distributed reflection denial-of-service attack

D) permanent denial-of-service attack

Q3) When configuring a new device, why should changing the administrative credentials be a top priority?

Q4) The day after Patch Tuesday is informally dubbed Exploit Wednesday.

A)True

B)False

Q5) How is motion detection technology used to monitor and provide security for sensitive areas, and how can it deal with false positives?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Security in Network Design

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2575

Sample Questions

Q1) By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.

A)True

B)False

Q2) What kind of firewall can block designated types of traffic based on application data contained within packets?

A) stateful firewall

B) stateless firewall

C) content-filtering firewall

D) packet-filtering firewall

Q3) When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?

A) file integrity monitoring (FIM)

B) file change management (FCM)

C) file access auditing (FAA)

D) file checksum watching (FCW)

Q4) Describe the TACACS+ AAA protocol, and detail how it differs from RADIUS.

Q5) How does a reverse proxy differ from a normal proxy?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Network Performance and Recovery

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2576

Sample Questions

Q1) The Link Aggregation Control Protocol was initially defined by what IEEE standard?

A) IEEE 802.3af

B) IEEE 802.1cd

C) IEEE 802.3ad

D) IEEE 802.3bd

Q2) What statement regarding the use of a network attached storage device is accurate?

A) A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.

B) A NAS reads and writes from its disks significantly slower than other types of servers.

C) A NAS can be easily expanded without interrupting service.

D) A NAS can typically only support RAID-0 configurations.

Q3) What happens when an NMS uses the SNMP walk command?

A) The NMS sends a request for data to the agent on a managed device.

B) The NMS uses get requests to move through sequential rows in the MIB database.

C) The NMS requests a list of all active SNMP traps on the system.

D) The NMS walks through a list of given SNMP hosts.

To view all questions and flashcards with answers, click on the resource link above.

Page 13

Chapter 12: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2577

Sample Questions

Q1) WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.

A)True

B)False

Q2) In a public switched telephone network, lines are terminated at the central office.

A)True

B)False

Q3) DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.

A)True

B)False

Q4) Describe the Synchronous Optical Network standard.

Q5) DSL services require many subscribers to share the same local line, causing potential security concerns.

A)True

B)False

Q6) What is the role of a multiplexer when working with T-carrier lines?

Q7) All ISDN connections were based on what two different types of channels?

Q8) How does a LAN connection differ from a WAN connection?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.