

Introduction to Networking Test Questions
Course Introduction
Introduction to Networking provides a foundational understanding of how computer networks operate, covering essential concepts such as network topologies, protocols, transmission media, and network devices. This course explores the fundamental principles behind data communication, addressing the OSI and TCP/IP models, IP addressing, subnetting, and the configuration of basic networking hardware. Students will gain practical skills in establishing and managing small-scale networks, analyzing network traffic, and troubleshooting connectivity issues, preparing them for more advanced study in network administration and security.
Recommended Textbook
Network+ Guide to Networks 8th Edition Jill West
Available Study Resources on Quizplus
12 Chapters
600 Verified Questions
600 Flashcards
Source URL: https://quizplus.com/study-set/183

Page 2
Chapter 1: Introduction to Networking
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2566
Sample Questions
Q1) Which of the following is an example of encapsulation?
A) The addition of a header to data inherited from the layer above in the OSI model.
B) The subtraction of a header from data inherited from the layer below in the OSI model.
C) The modification of headers from a higher layer in the OSI model.
D) The addition of a trailer to data inherited from the layer above in the OSI model.
Answer: A
Q2) Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.
A)True
B)False
Answer: False
Q3) The protocol data unit for the Physical layer of the OSI model is payload, or data. A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.

3
Chapter 2: Network Infrastructure and Documentation
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2567
Sample Questions
Q1) When creating network diagrams, what icon description typically represents a network router?
A) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.
B) An icon that resembles a brick wall.
C) An icon that is rectangular in shape, with squiggly lines on the front.
D) An icon that is rectangular, which contains four arrows pointing in opposite directions.
Answer: A
Q2) Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?
A) master service agreement
B) master license agreement
C) service-level agreement
D) memorandum of understanding
Answer: B
To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Addressing on Networks
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2568
Sample Questions
Q1) How is an IPv6 address written and displayed?
Answer: IPv6 addresses are written and displayed as follows:
* An IPv6 address has 128 bits that are written as eight blocks (also called quartets) of hexadecimal numbers separated by colons, like this:
2001:0000:0B80:0000:0000:00D3:9C5A:00CC.
* Each block is 16 bits. For example, the first block in the preceding IP address is the hexadecimal number 2001, which can be written as 0010 0000 0000 0001 in binary.
* Leading zeroes in a four-character hex block can be eliminated. This means our sample IP address can be written as 2001:0000:B80:0000:0000:D3:9C5A:CC.
* If blocks contain all zeroes, they can be eliminated and replaced by double colons (::).
To avoid confusion, only one set of double colons is used in an IP address. This means our sample IP address can be written two ways: 2001::B80:0000:0000:D3:9C5A:CC or 2001:0000:B80::D3:9C5A:CC
Q2) ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Protocols and Routing
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2569
Sample Questions
Q1) Which command will produce statistics about each message transmitted by a host, separated according to protocol type?
A) ipconfig -s
B) netstat -s
C) ipstat -a
D) netstat -an
Q2) What IPv6 field is similar to the TTL field in IPv4 packets?
A) flow label
B) next header
C) hop limit
D) distance vector
Q3) TCP uses a four-step process called a four-way handshake to establish a TCP connection.
A)True
B)False
Q4) The pathping utility sends 10 pings per hop by default.
A)True
B)False
Q5) How can a network switch be said to operate at Layer 4 of the OSI model?
Q6) How is the TTL (Time to Live) field utilized in IPv4?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Network Cabling
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2570
Sample Questions
Q1) Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?
A) RG-59
B) RG-6
C) RG-20
D) LRG-50
Q2) A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?
A) fiber stripper
B) fiber snipper
C) fiber cleaver
D) fiber saw
Q3) Latency on data networks is based on a calculation of a packet's round trip time (RTT).
A)True
B)False
Q4) What is a fiber distribution panel, and how is it used?
Q5) What is the difference between single mode fiber and multimode fiber, and how do they compare?
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Networking
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2571
Sample Questions
Q1) What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
A) management frames
B) control frames
C) data frames
D) extended frames
Q2) The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
A)True
B)False
Q3) How does the 802.11 data frame indicate how a large packet should be fragmented?
A) It uses the preamble header to estimate the ideal packet size.
B) The frame check sequence dictates the calculated packet size.
C) The sequence control field indicates how packets will be subdivided.
D) The duration field determines how long the station can transmit a packet, which then determines how it is divided.
Q4) All wireless signals are carried through the air by electromagnetic waves.
A)True
B)False
Q5) What are some of the different types of wireless topologies that can be created?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Virtualization and Cloud Computing
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2572
Sample Questions
Q1) Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
A) VMware vSphere
B) Oracle VirtualBox
C) Parallels
D) Citrix Xen
Q2) What two different types of encryption can be utilized with IPsec?
Q3) Why is the telnet utility a poor choice for remote access to a device?
A) It provides no mechanism for authentication.
B) It does not allow for control of a computer remotely.
C) It cannot be used over a public WAN connection.
D) It provides poor authentication and no encryption.
Q4) When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
A) VPN proxy
B) VPN server
C) VPN transport
D) VPN gateway
Q5) How does public key encryption work?
Q6) What is the difference between a virtual firewall and a software firewall?
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Subnets and VLANs
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2573
Sample Questions
Q1) You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal?
A) 10.3.0.0/19
B) 172.20.50.0/23
C) 192.168.0.0/20
D) 10.90.0.0/22
Q2) Subtracting an interesting octet value from 256 yields what number?
A) network ID
B) subnet ID
C) magic number
D) host ID
Q3) What are some of the different reasons to use VLANs?
Q4) All that is needed to provide communication between two VLANs is a DHCP relay agent.
A)True B)False
Q5) What are some common configuration errors that can occur when configuring VLANs?
Q6) Network segmentation decreases both performance and security on a network. A)True B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Risk Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2574
Sample Questions
Q1) Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
A) acceptable use policy document
B) terms of service document
C) license restrictions document
D) non-disclosure agreement document
Q2) Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?
A) cached denial-of-service attack
B) distributed denial-of-service attack
C) distributed reflection denial-of-service attack
D) permanent denial-of-service attack
Q3) When configuring a new device, why should changing the administrative credentials be a top priority?
Q4) The day after Patch Tuesday is informally dubbed Exploit Wednesday.
A)True
B)False
Q5) How is motion detection technology used to monitor and provide security for sensitive areas, and how can it deal with false positives?
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Security in Network Design
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2575
Sample Questions
Q1) By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.
A)True
B)False
Q2) What kind of firewall can block designated types of traffic based on application data contained within packets?
A) stateful firewall
B) stateless firewall
C) content-filtering firewall
D) packet-filtering firewall
Q3) When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?
A) file integrity monitoring (FIM)
B) file change management (FCM)
C) file access auditing (FAA)
D) file checksum watching (FCW)
Q4) Describe the TACACS+ AAA protocol, and detail how it differs from RADIUS.
Q5) How does a reverse proxy differ from a normal proxy?
To view all questions and flashcards with answers, click on the resource link above. Page 12
Chapter 11: Network Performance and Recovery
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2576
Sample Questions
Q1) The Link Aggregation Control Protocol was initially defined by what IEEE standard?
A) IEEE 802.3af
B) IEEE 802.1cd
C) IEEE 802.3ad
D) IEEE 802.3bd
Q2) What statement regarding the use of a network attached storage device is accurate?
A) A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.
B) A NAS reads and writes from its disks significantly slower than other types of servers.
C) A NAS can be easily expanded without interrupting service.
D) A NAS can typically only support RAID-0 configurations.
Q3) What happens when an NMS uses the SNMP walk command?
A) The NMS sends a request for data to the agent on a managed device.
B) The NMS uses get requests to move through sequential rows in the MIB database.
C) The NMS requests a list of all active SNMP traps on the system.
D) The NMS walks through a list of given SNMP hosts.
To view all questions and flashcards with answers, click on the resource link above.

Page 13

Chapter 12: Wide Area Networks
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/2577
Sample Questions
Q1) WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.
A)True
B)False
Q2) In a public switched telephone network, lines are terminated at the central office.
A)True
B)False
Q3) DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.
A)True
B)False
Q4) Describe the Synchronous Optical Network standard.
Q5) DSL services require many subscribers to share the same local line, causing potential security concerns.
A)True
B)False
Q6) What is the role of a multiplexer when working with T-carrier lines?
Q7) All ISDN connections were based on what two different types of channels?
Q8) How does a LAN connection differ from a WAN connection?
To view all questions and flashcards with answers, click on the resource link above. Page 14